Cyber crimes(KHYL-228)
Course Code | Course Name | Semester | Theory | Practice | Lab | Credit | ECTS |
---|---|---|---|---|---|---|---|
KHYL-228 | Cyber crimes | 1 | 3 | 0 | 0 | 3 | 7 |
Prerequisites | |
Admission Requirements |
Language of Instruction | Turkish |
Course Type | Elective |
Course Level | Masters Degree |
Course Instructor(s) | Emine Eylem AKSOY RETORNAZ eaksoy@gsu.edu.tr (Email) |
Assistant | |
Objective | Students learn the general characteristics, criminological aspects, as well as the investigation of cybercrime. |
Content | Cybercrimes and digital evidence |
Course Learning Outcomes | Students will develop awareness on concepts related to cyber crimes and digital forensics. |
Teaching and Learning Methods | Lectures, presentation |
References |
naïk Purenne, Anne Wuilleumier, L’introduction des Technologies de Surveillance dans le Travail Policier: Facteur de Changement ou de Réassurance ? Vol: 61, Rev: 2011-, Technologies, Droit et Justice Berrin Akbulut, Bilişim Alanında Suçlar, Adalet Yayınevi, 2. Baskı, 2017. DÜLGER Volkan Murat Bilişim Suçları ve İnternet İletişim Hukuku, Seçkin, Ankara George Curtis, The Law of Cybercrimes and Their Investigations, CRC Press, 2011 Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi, Cybercrime, Digital Forensics and Jurisdiction (Studies in Computational Intelligence),Springer; 2015 edition (February 26, 2015) Patricia Bellia ,Paul Berman, Brett Frischmann ,David Post, Cyberlaw: Problems of Policy and Jurisprudence in the Information Age,American Casebook Series, 5th Edition, 2018 Sheena Lewisa Dan A Lewis, “Digitalizing Crime Prevention Theories: How Technology Affects Victim and Offender Behavior”, International Journal of Criminology and Sociological Theory, Vol. 4, No. 2, December 2011, Thomas K. Clancy,Cyber Crime and Digital Evidence Materials and Cases Walter L. Perry, Brian McInnis, Carter C. Price, Susan C. Smith, John S. Hollywood, Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations, Rand Corporation, 2013. Yener Ünver, İnternet Hukuku, Seçkin Yayınevi, 1. Baskı Karşılaştırmalı Güncel Ceza Hukuku Serisi, 2013. |
Theory Topics
Week | Weekly Contents |
---|---|
1 | Notions of information technology law |
2 | Basic concepts of cyber crime |
3 | Undue access to a computer system (art. 243 TPC) |
4 | Deteoriation of data (art. 244 TPC) |
5 | Prohibited devices and software (art 245/A TPC) |
6 | Desinformation and criminal law |
7 | Cyber violence and cyber harassment |
8 | Social engineering |
9 | Blockchain and criminal law |
10 | Artificial intelligence and criminal law |
11 | Cyber attacks |
12 | Digital evidence |
13 | Digital evidence |
14 | Profiling |
Practice Topics
Week | Weekly Contents |
---|---|
1 | |
2 | |
3 | |
4 | |
5 | |
6 | |
7 | |
8 | |
9 | |
10 | |
11 | |
12 | |
13 | |
14 |
Contribution to Overall Grade
Number | Contribution | |
---|---|---|
Contribution of in-term studies to overall grade | 1 | 4 |
Contribution of final exam to overall grade | 1 | 6 |
Toplam | 2 | 10 |
In-Term Studies
Number | Contribution | |
---|---|---|
Assignments | 0 | 0 |
Presentation | 1 | 44 |
Midterm Examinations (including preparation) | 0 | 0 |
Project | 0 | 0 |
Laboratory | 0 | 0 |
Other Applications | 0 | 0 |
Quiz | 0 | 0 |
Term Paper/ Project | 0 | 0 |
Portfolio Study | 0 | 0 |
Reports | 0 | 0 |
Learning Diary | 0 | 0 |
Thesis/ Project | 0 | 0 |
Seminar | 0 | 0 |
Other | 0 | 0 |
Toplam | 1 | 44 |
No | Program Learning Outcomes | Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 |
Activities | Number | Period | Total Workload |
---|---|---|---|
Total Workload | 0 | ||
Total Workload / 25 | 0.00 | ||
Credits ECTS | 0 |