Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI021 | ||||
Course Name: | Leadership Strategies | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. EMEL TÖRE | ||||
Course Lecturer(s): | Ögrt.Gör.Dr.Emel Töre | ||||
Course Assistants: |
Course Objectives: | Basic concepts of leadership, leadership styles, teories, crisis & leadership, strategic leadership, gender & leadership, entrepreneur leadership, ethical leadership topics will be discussed. |
Course Content: | Basic concepts of leadership, leadership styles, teories, crisis & leadership, strategic leadership, gender & leadership, entrepreneur leadership, ethical leadership topics will be discussed. Case studies will be analyzed. |
The students who have succeeded in this course;
1) Learn the basic concepts of leadership and leadership theories. 2) Know the current leadership styles and characteristics. 3) Understand and analyze the relationship between leader & followers. 4) With the case studies, theoretical knowledge will be gathered. 5) Analyse the ledership examples and evaluate them. |
Week | Subject | Related Preparation |
1) | Strategic Leadership | Liderlik Çalışmaları, Editör: M. Leyla Yıldız, Beta Basım Yayın,2013 |
1) | Information About The Lecture On Leadership and Leadership from Different Perspectives | Liderlik Çalışmaları, Editör: M. Leyla Yıldız, Beta Basım Yayın,2013 |
2) | On Leadership and Leadership from Different Perspectives Bad leaders, Poor Leaders | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
3) | Leadership Theories and Leadership Stories | Liderlik Kuramlar ve Yeni Bakış Açıları, Hakan Vahit Erkutlu, Efil efil Yayınevi,2014 |
4) | Leadership, Change and Innovation | Liderlik Çalışmaları, Editör: M. Leyla Yıldız, Beta Basım Yayın,2013 |
5) | Leadership and Motivation Relationship | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
6) | Strategic Leadership | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
7) | Team Work and Leadership | -Ekip Çalışması ve Liderlik, A. Baltaş, Remzi Kitabevi,2002 |
8) | Cem Kozlu-Leader's Tool Bag | Liderin Takım Çantası: Cem Kozlu, Remzi Kitapevi,2013 |
9) | Atatürk and Leadership | -Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
10) | Matsusitha Leadership | Matsusitha Liderliği |
11) | Personality and Leadership | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
12) | Current Leadership Approaches | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
13) | Organizational Culture and Leadership | Liderlik Çalışmaları, Editör: M. Leyla Yıldız, Beta Basım Yayın,2013 |
14) | Decision Making, Risk Taking and Leadership | Liderlik Güncel Konular ve Yaklaşımlar, İ Bakan, İ.F. Doğan, Gazi Kitapevi,2013 |
15) | Final Exam |
Course Notes / Textbooks: | Liderlik, Kadri Mirze |
References: | - Öğretim üyesi ders notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Midterms | 1 | % 40 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 56 |
Study Hours Out of Class | 13 | 26 |
Midterms | 2 | 20 |
Final | 5 | 25 |
Total Workload | 127 |