GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
DATA PRIVACY AND SECURITY/5151309
Course Title: DATA PRIVACY AND SECURITY
Credits 3 ECTS 8
Semester 2 Compulsory/Elective Elective
COURSE INFO
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- NAME OF LECTURER(S)
  Prof.Dr. F. Nur BARAN AKSAKAL
 -- WEB SITE(S) OF LECTURER(S)
  http://websitem.gazi.edu.tr/site/naksakal
 -- EMAIL(S) OF LECTURER(S)
  naksakal@gazi.edu.tr, nuraksakal@gmail.com
 -- LEARNING OUTCOMES OF THE COURSE UNIT
Describe data, information and knowledge concepts
Explain the relations between data, information, and knowledge concepts and their meanings in different sciences
Describe the electronic health records (EHRs), say the pros and cons of their use
Explain the main principles about Electronic Health Records (EHRs)
Gain awareness about importance of privacy concerning the personal and tangible data within EHRs.
Describe data privacy, information security concepts
Describe information economics and order its processes
Explain the legal infrastructure of information economics and information society
Explain the "Differential Privacy" concept
Explain Registered e-mail and electronic signature processes and explain the importance within data privacy and information security
 -- MODE OF DELIVERY
  The mode of delivery of this course is distance education.
 -- PREREQUISITES AND CO-REQUISITES
  There is no prerequisite or co-requisite for this course.
 -- RECOMMENDED OPTIONAL PROGRAMME COMPONENTS
  There is no recommended optional programme component for this course.
 --COURSE CONTENT
1. Week  Main concepts in Data Privacy and Information security
2. Week  Monitoring the Personal Data within Health Services-1 (Data, Personal Health Data-Information, Electronic Health Records, Main principles of recording
3. Week  Monitoring the Personal Data within Health Services-2 (National Health Information System, Principles of Using EHRs)
4. Week  Electronic Health Records and Privacy-1 (Progress in Health Informatics and emerging problems)
5. Week  Electronic Health Records and Privacy-2 ( e-health, Information Security Infrastructure)
6. Week  Information Economics (Description of information economics, components, areas of regulation)
7. Week  Information Society and Law (Description of information society, legal infrastructure, legal risk analysis)
8. Week  Differential Privacy (Data mining and differential privacy, Ways to protect privacy)
9. Week  Information Security (The importance of information security, institutional information security, infromation security for health institutions)
10. Week  Information security and quality (Quality standards for health information security, ISO IEC/27001 Information Security Standard)
11. Week  Registered e-mail (Definition of registered e-mail, Registered e-mail service, the difference between classical e-mail and registered e-mail)
12. Week  Electronic signature and its areas of usage
13. Week  Internet privacy and protection of personal data-1 (Privacy and its importance, description of internet privacy,properties and protection of internet
14. Week  Internet privacy and protection of personal data-2 (Concept of internet privacy and threats against internet privacy)
15. Week  Internet privacy and protection of personal data-3 (Basic human rights and internet, threats due to internet abuse and misuse, abuse of the privacy)
16. Week  Privacy and ethics
 -- RECOMMENDED OR REQUIRED READING
  Academy on Human Rights (1993). Handbook of Human Rights. Fischer-Hubner, S. (2000) ‘Privacy and Security at Risk in the Global Information Society’ D. Thomas & B. D. Loader (der.) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge içinde. Foley, C. (1999). ‘Human rights and the Internet’ Liberty (der.) Liberating Cyberspace: Civil Liberties, Human Rights & The Internet, London: Pluto Press içinde. Lyon, D. (1994). The Electronic Eye: The Rise of Surveillance Society, Cambridge: Polity Press. Volio, F. (1981). ‘Legal Personality, Privacy, and the Family’ Henkin (der.) The International Bill of Rights, New York: Columbia University Press içinde. Westin, A. F. (1970). Privacy and Freedom, London: Mansell. Bosij, P., D. Chafey, A. Greasley ve S. Hickie. (2003). Business Information Systems: Technology, Development and Management for the E-Business. 2. Basım. S. 4-5. Financial Times-Prentice Hall. Anderson, D. R., D. J. Sweeney ve T
 -- PLANNED LEARNING ACTIVITIES AND TEACHING METHODS
  Lecture, Question & Answer
 -- WORK PLACEMENT(S)
  Not Applicable
 -- ASSESSMENT METHODS AND CRITERIA
 
Quantity
Percentage
 Mid-terms
0
0
 Assignment
1
20
 Exercises
0
0
 Projects
0
0
 Practice
0
0
 Quiz
0
0
 Contribution of In-term Studies to Overall Grade  
20
 Contribution of Final Examination to Overall Grade  
80
 -- WORKLOAD
 Efficiency  Total Week Count  Weekly Duration (in hour)  Total Workload in Semester
 Theoretical Study Hours of Course Per Week
16
3
48
 Practising Hours of Course Per Week
0
 Reading
16
3
48
 Searching in Internet and Library
16
4
64
 Designing and Applying Materials
0
 Preparing Reports
0
 Preparing Presentation
0
 Presentation
0
 Mid-Term and Studying for Mid-Term
0
 Final and Studying for Final
2
10
20
 Other
1
20
20
 TOTAL WORKLOAD: 
200
 TOTAL WORKLOAD / 25: 
8
 ECTS: 
8
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1-Improve and deepen their knowledge in the field at expert level based on Bachelor’s degree competenciesX
2-Understand the interaction between the disciplines related to the fieldX
3-Use the theoretical and applied knowledge that he/she acquires in thefieldX
4-Develop new knowledge combining the knowledge from the related disciplines and the knowledge in the fieldX
5-Analyze the problems in the field using scientific research methodsX
6- Identify a problem in the fieldX
7- Develop suggestions for the problems in the fieldX
8-Solves the problemX
9Evaluate solution results in terms of quality processesX
10-Develop new approaches and methods by taking responsibility in complex situations encountered in practice of the fieldX