1 |
Course Title: |
IT CRIMES AND LAWS |
2 |
Course Code: |
YBS5108 |
3 |
Type of Course: |
Optional |
4 |
Level of Course: |
Second Cycle |
5 |
Year of Study: |
1 |
6 |
Semester: |
2 |
7 |
ECTS Credits Allocated: |
3 |
8 |
Theoretical (hour/week): |
2 |
9 |
Practice (hour/week) : |
0 |
10 |
Laboratory (hour/week) : |
0 |
11 |
Prerequisites: |
|
12 |
Recommended optional programme components: |
None |
13 |
Language: |
Turkish |
14 |
Mode of Delivery: |
Face to face |
15 |
Course Coordinator: |
Dr. Ögr. Üyesi MERYEM AYŞEGÜL KOZAK ÇAKIR |
16 |
Course Lecturers: |
|
17 |
Contactinformation of the Course Coordinator: |
Dr. Öğretim Üyesi Ayşegül KOZAK ÇAKIR kozak@uludag.edu.tr +90 224 294 26 95 Dahili: 62728 Uludağ Üniversitesi İnegöl İşletme Fakültesi Yönetim Bilişim Sistemleri Bölümü İnegöl-BURSA |
18 |
Website: |
|
19 |
Objective of the Course: |
To be able to distinguish crimes committed in the field of informatics from other crimes, to be able to think about specific legal issues such as the problem of the place where the crime was committed, to have an idea about the cases of other crimes organized in the Turkish Penal Code that were committed by means of information systems. |
20 |
Contribution of the Course to Professional Development |
Gains knowledge of cyber crimes. |
Week |
Theoretical |
Practical |
1 |
General information about the course |
|
2 |
Informatics, internet and crime concept |
|
3 |
Overview of regulations in the field of history and informatics |
|
4 |
TCK'da düzenlenen bilişim suçları |
|
5 |
The crime of entering the information system illegally |
|
6 |
Crimes of blocking, destroying, destroying or modifying the system |
|
7 |
lesson repetition |
|
8 |
The crime of misuse of debit and credit cards |
|
9 |
Crimes related to private life and the secret sphere of life as a cyber crime |
|
10 |
The Commitment of the Classic Crimes in the Turkish Penal Code through Information Systems |
|
11 |
Cyber Crime Agreement |
|
12 |
Searching Copy Confiscation on Computers |
|
13 |
The Problem of Place of Crime on the Internet |
|
14 |
lesson repetition |
|