Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI079 | ||||
Course Name: | Scientific Writing Skills | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Dr. Öğr. Üy. EZGİ ILDIRIM | ||||
Course Lecturer(s): | |||||
Course Assistants: |
Course Objectives: | The course aims to provide students understanding basic principles of asking a research question, scientifically collected and analysed data and, to provide academic writing and reading skills. The primary aims of the course are presenting reading and writing deficiencies and solutions and providing the ability to acquire effective scientific communication. |
Course Content: | The course includes the communicating in professional settings by effective language, asking a research question, reviewing the literature, seeking and using academic reference, ethical principles in science, the examination of a scientific paper, notification, and thesis. |
The students who have succeeded in this course;
1) Gains written-oral effective communication and language skills in professional settings. 2) Develops a basic research question based on the observations. 3) Provides correctly knowledge and the ability for using references and literature 4) Understands ethical issues in science, and to gain the ability to comply with academic ethical principles. 5) Understands the basic principles in reading and writing of a scientific paper, thesis proposal and reports; and conducts the examination of scientific writings. |
Week | Subject | Related Preparation |
1) | An Introduction to Scientific Writing Skills I: Written-Oral Effective Communication in Professional Settings | |
2) | An Introduction to Scientific Writing Skills II: The Language of Scientific Communication | |
3) | Scientific Theory: Basic Concepts | |
4) | Determining of a Scientific Topic, Asking a Research Question, and Developing a Hypothesis- Theoretical Foundations | |
5) | Determining of a Scientific Topic, Asking a Research Question, and Developing a Hypothesis: Homework-Applications | |
6) | Academic Definitions, and Roles | |
7) | Aims and Types of Academic Writing | |
8) | Giving homeworks for mid-Term exam, Reviewing Literature, Seeking and Using Reference. | |
9) | Ethical Principles in Science | |
10) | Scientific Papers (Review and Research Papers) and Notifications: Basic Principles. | |
11) | The Examination of a Paper -I (Heading, Abstract, Introduction and Method)-Theoretical Foundations | |
12) | The Examination of a Paper-II (Results, Discussion and Conclusion)- Theoretical Foundations | |
13) | Presentation of A Scientific Research Paper | |
14) | Writing Thesis Proposal and Thesis Report: Basic Principles | |
15) | Final Exam |
Course Notes / Textbooks: | Akademik Yazım ve Araştırmacılara Öneriler- (2018, 1. Basım) Serkan Dinçer, Pegem Akademi Yayıncılık. |
References: | 1. Akademik Yazım, İlkeler, Uygulamalar, Örnekler (2018, 2.Basım) -Metin Kozak, Detay Yayıncılık 2. Yanlış Yönde Kuantum Sıçramalar-Charles M. Wynn-Arthur W.Wiggins (Çev. Aykut Kence) (2001, 4. Basım). Tübitak Popüler Bilim Kitapları. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 42 |
Midterms | 1 | 33 |
Final | 1 | 50 |
Total Workload | 125 |