CYS5789 Cyber Security LawBahçeşehir UniversityDegree Programs CYBER SECURITY (ENGLISH, NONTHESIS)General Information For StudentsDiploma SupplementErasmus Policy StatementNational QualificationsBologna Commission
CYBER SECURITY (ENGLISH, NONTHESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CYS5789 Cyber Security Law Fall 3 0 3 8
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi AHMET NACİ ÜNAL
Course Lecturer(s): Dr. Öğr. Üyesi TAYFUN ACARER
Recommended Optional Program Components: None
Course Objectives: This course will analyze national and international legal frameworks for malicious and defensive activities in cyber space.

Learning Outcomes

The students who have succeeded in this course;
The course will consider legal questions within the context of broader debates about issues such as governance of cyberspace and the Internet, the roles of governmental and non-governmental actors, evolving understandings of privacy, and the role of law in governing a constantly changing domain where many actors operate in secret.

Course Content

Legal and policy challenges stemming from rapidly evolving cybersecurity threats. The situation of victims of Cybercrime. The status of media outlets that have been hacked or brought offline to websites. Intellectual property and cyber space. The national and international legal frameworks. Manage malicious and defensive actions in cyberspace. Discussion and case studies.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Explanation of the course, its activity and its content. Lecture notes.
2) Legal and policy challenges stemming from rapidly evolving cybersecurity threats. Lecture notes.
3) The situation of victims of cybercrime. Lecture notes.
4) The situation of victims of cybercrime. Lecture notes.
5) The status of media outlets that have been hacked or brought offline to websites. Lecture notes.
6) Intellectual property and cyber space. Lecture notes.
7) Intellectual property and cyber space Lecture notes.
8) Intellectual property and cyber space Lecture notes.
9) The national and international legal frameworks. Lecture notes.
10) The national and international legal frameworks. Lecture notes.
11) Manage malicious and defensive actions in cyberspace. Lecture notes.
12) Manage malicious and defensive actions in cyberspace. Lecture notes.
13) Discussion and case studies. Lecture notes.
14) Discussion and case studies. Lecture notes.

Sources

Course Notes / Textbooks: Lecture notes
References: Case studies.

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 0
Homework Assignments 4 % 10
Presentation 1 % 10
Midterms 1 % 20
Final 1 % 60
Total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 14 5 70
Presentations / Seminar 2 3 6
Homework Assignments 4 8 32
Midterms 1 20 20
Final 1 20 20
Total Workload 190

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Being able to develop and deepen their knowledge at the level of expertise in the same or a different field, based on undergraduate level qualifications. 4
1) Being able to independently carry out a work that requires expertise in the field. 4
1) To be able to supervise and teach these values by observing social, scientific, cultural and ethical values in the stages of collecting, interpreting, applying and announcing the data related to the field. 4
1) To be able to critically evaluate the knowledge and skills acquired in the field of expertise and to direct their learning. 4
1) To be able to interpret and create new knowledge by integrating the knowledge gained in the field with the knowledge from different disciplines, 4
1) To be able to systematically transfer current developments in the field and their own studies to groups in and outside the field, in written, verbal and visual forms, by supporting them with quantitative and qualitative data. 4
2) To be able to comprehend the interdisciplinary interaction with which the field is related. 5
2) To be able to use the theoretical and applied knowledge at the level of expertise acquired in the field. 5
2) To be able to critically examine social relations and the norms that guide these relations, to develop them and take action to change them when necessary. 5
2) To be able to develop strategy, policy and implementation plans in the fields related to the field and to evaluate the obtained results within the framework of quality processes. 5
2) To be able to develop new strategic approaches for the solution of complex and unpredictable problems encountered in applications related to the field and to produce solutions by taking responsibility. 4
3) To be able to use the knowledge, problem solving and/or application skills they have internalized in their field in interdisciplinary studies. 5
3) Being able to lead in environments that require the resolution of problems related to the field. 5
3) To be able to solve the problems encountered in the field by using research methods. 4