Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI052 | ||||
Course Name: | Media Management | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Doç. Dr. MİHALİS KUYUCU | ||||
Course Lecturer(s): | Assoc.Prof.Mihalis Kuyucu | ||||
Course Assistants: |
Course Objectives: | To apply the science of Management to Media Industry and to give general industrial information about Media |
Course Content: | The topics and that are related to media management. |
The students who have succeeded in this course;
1) To have a general information and idea about how media industry works 2) To learn how management is applied to media field. 3) To present information about how media industry works in the field |
Week | Subject | Related Preparation |
1) | Concept of media company | |
2) | The main key players in media industry | |
3) | The functions of media industry | |
4) | The market structures/types in media industry | |
5) | Classifying media companies according to their structures | |
6) | The concept of "life cycle" in media industry and application | |
7) | SWOT in Media İndustry | |
8) | Feasibility in media industry | |
9) | Marketing in Media - Part I | |
10) | Marketing Applications in Media Part II | |
11) | The economic structure of media environment and industry. | |
12) | Media ownership and Cross Ownership and today's media environment analysis in terms of ownership | |
13) | The relation of Rating and Advertising in media industry | |
14) | A general overview of the economic structure and ownership status of Turkish media industry |
Course Notes / Textbooks: | The lecturer will give his own sources collected from different sources and the experience of the lecturer media manager activities will be added. |
References: | Öğretim üyesi kendi kaynaklarından oluşan bir seçki hazırlamıştır. Bunlara öğretim görevlisi kendi medya yöneticiliği deneyimlerini de eklemektedir. |
Course Learning Outcomes | 1 |
2 |
3 |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 1 | % 20 |
Homework Assignments | 2 | % 10 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 16 | 48 |
Application | 16 | 16 |
Study Hours Out of Class | 15 | 15 |
Presentations / Seminar | 15 | 15 |
Homework Assignments | 16 | 16 |
Quizzes | 3 | 3 |
Midterms | 1 | 2 |
Final | 2 | 2 |
Total Workload | 117 |