Course Contents |
This course; Definition of Computer, Computer Related Concepts and Information System and its History its place in the legal order and the disclosure and criticism of the information crimes in the Turkish Penal Code No. 765, the general explanation about the new TCK, the systematics of the information crimes in this law, the crime of entering and staying in the information system unlawfully, the prevention and disruption of the information system. the crime of destroying or changing the data; offense of illegal use of information via the information system, misuse of bank or credit cards, offenses against personal data, theft and fraud crimes through the use of information systems, other offenses committed with information systems, information offenses in FSEK and Electronic Signature Law , Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminal procedure protection measures in terms of cyber crimes, forensic informatics and measures to be taken in the fight against these crimes, Criminology of cyber terrorism, economic crimes and cyber terrorism relationship, IT crimes in terms of law required; topics. |
Weekly Course Content |
Week |
Subject |
Learning Activities and Teaching Methods |
1 |
Definition and History of Computer, Computer Related Concepts and Information System |
Expression / Question-Answer |
2 |
The place of informatics law as a discipline of law in the legal order, its relation to the basic legal disciplines, the concept of informatics crimes, the ways of processing, the history, regulation methods and informatics crimes in comparative law |
Expression / Question-Answer |
3 |
The place of informatics crimes in Turkish legal order and explanation and criticism of informatics crimes in Turkish Penal Code No. 765 |
Expression / Question-Answer |
4 |
Making a general statement about the new TPC, the systematics of the information crimes in this law, entering into the information system against the law |
Expression / Question-Answer |
5 |
Prevention, corruption, destruction or alteration of information system; criminal offense |
Expression / Question-Answer |
6 |
Misuse of debit or credit cards |
Expression / Question-Answer |
7 |
Offenses against personal data |
Expression / Question-Answer |
8 |
mid-term exam |
|
9 |
Theft and fraud crimes through the use of information systems |
Expression / Question-Answer |
10 |
Other crimes committed with information systems |
Expression / Question-Answer |
11 |
Informatics crimes regulated in FSEK and the Electronic Signature Law |
Expression / Question-Answer |
12 |
Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes |
Expression / Question-Answer |
13 |
Criminal procedure protection measures in terms of IT crimes, forensic IT and measures to be taken in the fight against these crimes |
Expression / Question-Answer |
14 |
The relation of cyber crimes with criminology, economic crimes and cyber terrorism |
Expression / Question-Answer |
15 |
Information crimes in terms of law that should be |
Expression / Question-Answer |
16 |
final exam |
|
Recommend Course Book / Supplementary Book/Reading |
1 |
Murat Volkan Dülger, Bilişim Suçları ve İnternet İletişim Hukuku, 6. Baskı, Seçkin Yayıncılık, 2015, Ankara |
2 |
Ali Karagülmez, Bilişim Suçları ve Soruşturma-Kovuşturma Evreleri, 5. Baskı, Seçkin Yayıncılık, 2014, Ankara |
Required Course instruments and materials |
Supplementary textbook |