ECTS - Investigation of Computer Crime

Investigation of Computer Crime (ISE414) Course Detail

Course Name Course Code Season Lecture Hours Application Hours Lab Hours Credit ECTS
Investigation of Computer Crime ISE414 Area Elective 3 0 0 3 5
Pre-requisite Course(s)
N/A
Course Language English
Course Type Technical Elective Courses
Course Level Bachelor’s Degree (First Cycle)
Mode of Delivery Face To Face
Learning and Teaching Strategies Lecture.
Course Coordinator
Course Lecturer(s)
Course Assistants
Course Objectives The objective of this course is to teach common threats to security by means of viruses, hacking and electronic fraud. It also explains security risk management and existing computer crime laws.
Course Learning Outcomes The students who succeeded in this course;
  • Explain the historical, technological, and human context of computer crime and ability to categorize computer crime
  • Review the existing computer crime laws in Turkey
  • Identify the profile of the people involved over the lifecycle of a crime from perpetration, through prosecution to punishment and their perspective
  • Discuss professional behavior and ethical issues in the information technology field
Course Content Computer crimes, vulnerability, risk assessment, electronic fraud, viruses and worms, computer crime laws.

Weekly Subjects and Releated Preparation Studies

Week Subjects Preparation
1 Course overview Chapter 1 (main text)
2 Understanding computer crime 1 Chapter 1
3 Understanding computer crime 2 Chapter 1
4 Protecting the infrastructure Chapter 2
5 Categories of Cyber Abusers, Attackers and Criminals Chapter 3
6 Categorizing Cyber abusers, attackers and criminals Chapter 4
7 The Human and Financial Costs of Cyber Abuse and Cybercrime 1 Chapter 6
8 The Human and Financial Costs of Cyber Abuse and Cybercrime 2 Chapter 6
9 How is IT Creating New Opportunities? 1 Chapter 7
10 How is IT Creating New Opportunities? 2 Chapter 7
11 Key Federal Cyber Crime Laws and Information Security Regulations Chapter 8
12 Cyber Crime Laws and Information Security Regulations in Turkey Chapter 8
13 Computer viruses Chapter 11 (other sources 2)
14 Computer Ethics Education and Intolerance of Cybercrime Chapter 11
15 Final Examination Period Review of topics
16 Final Examination Period Review of topics

Sources

Course Book 1. Samuel C. McQuade, III. Understanding and Managing Cybercrime. Pearson, 2006. ISBN: 0-205-43973-X
Other Sources 2. Kevin Mitnick & William L. Simon. The Art of Deception. Wiley Publishing, 2002. ISBN: 0-76454280-X
3. Simson Garfinkel, Gene Spafford, Practical Unix and Internet Security, 2nd edition (April 1996), O'Reilly & Associates; ISBN: 1565921488
4. Internet Suçları Yasası: http://bt-stk.org.tr/k5651.html
5. Eoghan Casey , Digital Evidence and Computer Crime, Second Edition, Academic Press, 2004
6. Fighting Computer Crime: A New Framework for Protecting Information, John-Wiley, 1998

Evaluation System

Requirements Number Percentage of Grade
Attendance/Participation - -
Laboratory - -
Application - -
Field Work - -
Special Course Internship - -
Quizzes/Studio Critics - -
Homework Assignments - -
Presentation - -
Project 1 30
Report - -
Seminar - -
Midterms Exams/Midterms Jury 1 30
Final Exam/Final Jury 1 40
Toplam 3 100
Percentage of Semester Work 60
Percentage of Final Work 40
Total 100

Course Category

Core Courses
Major Area Courses
Supportive Courses X
Media and Managment Skills Courses
Transferable Skill Courses

The Relation Between Course Learning Competencies and Program Qualifications

# Program Qualifications / Competencies Level of Contribution
1 2 3 4 5
1 Adequate knowledge in mathematics, science and subjects specific to the software engineering discipline; the ability to apply theoretical and practical knowledge of these areas to complex engineering problems.
2 The ability to identify, define, formulate and solve complex engineering problems; selecting and applying proper analysis and modeling techniques for this purpose. X
3 The ability to design a complex system, process, device or product under realistic constraints and conditions to meet specific requirements; the ability to apply modern design methods for this purpose.
4 The ability to develop, select and utilize modern techniques and tools essential for the analysis and determination of complex problems in software engineering applications; the ability to utilize information technologies effectively. X
5 The ability to gather data, analyze and interpret results for the investigation of complex engineering problems or research topics specific to the software engineering discipline. X
6 The ability to work effectively in inter/inner disciplinary teams; ability to work individually.
7 Effective oral and written communication skills in Turkish; the ability to write effective reports and comprehend written reports, to prepare design and production reports, to make effective presentations, to give and receive clear and understandable instructions.
8 The knowledge of at least one foreign language; the ability to write effective reports and comprehend written reports, to prepare design and production reports, to make effective presentations, to give and receive clear and understandable instructions.
9 Recognition of the need for lifelong learning; the ability to access information and follow recent developments in science and technology with continuous self-development X
10 The ability to behave according to ethical principles, awareness of professional and ethical responsibility. X
11 Knowledge of the standards utilized in software engineering applications.
12 Knowledge on business practices such as project management, risk management and change management.
13 Awareness about entrepreneurship, and innovation.
14 Knowledge on sustainable development.
15 Knowledge of the effects of software engineering applications on the universal and social dimensions of health, environment, and safety. X
16 Awareness of the legal consequences of engineering solutions.
17 An ability to apply algorithmic principles, mathematical foundations, and computer science theory in the modeling and design of computer-based systems with the trade-offs involved in design choices. X
18 The ability to apply engineering approach to the development of software systems by analyzing, designing, implementing, verifying, validating and maintaining software systems.

ECTS/Workload Table

Activities Number Duration (Hours) Total Workload
Course Hours (Including Exam Week: 16 x Total Hours)
Laboratory
Application
Special Course Internship
Field Work
Study Hours Out of Class 16 3 48
Presentation/Seminar Prepration
Project 1 20 20
Report
Homework Assignments
Quizzes/Studio Critics
Prepration of Midterm Exams/Midterm Jury 1 15 15
Prepration of Final Exams/Final Jury 1 20 20
Total Workload 103