UNI108 Consumer BehaviorIstinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: UNI108
Course Name: Consumer Behavior
Semester: Fall
Spring
Course Credits:
ECTS
5
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: University Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator: Araş. Gör. AZİZ ARSLAN
Course Lecturer(s): Dr.Nezahat Yüceışık
Course Assistants:

Course Objective and Content

Course Objectives: It is aimed to learn the basic concepts of consumer, consumption culture, consumer behavior and consumer research, to define the learned information, to express it in different ways and to present it with the projects to be carried out.
Course Content: In the context of the Consumer Behavior course, the concept of consumption, the concept of consumer society, the socio-psychological and economic dynamics of consumer behavior in the consumer society, consumer behavior models, consumer purchasing decision process, perception-persuasion-attitude concepts and the relationship between consumer behaviors are discussed.

Learning Outcomes

The students who have succeeded in this course;
1) Gains information about consumption culture and consumer behavior process.
2) Have the necessary knowledge, skills and competence to define the learned information, to express and report it in different ways.
3) Have theoretical and theoretical knowledge about the concepts of consumption, consumption culture and consumer behavior.
4) Gains knowledge of how the concept of consumer behavior is handled in different disciplines.

Course Flow Plan

Week Subject Related Preparation
1) Introduction to consumer behavior
2) Basic Approaches in Consumer Behaviors
3) Consumer Purchase Decision Process
4) Factors Affecting Consumer Behaviors and Decisions
5) Marketing and Marketing Phases
6) Marketing and Consumer Behaviors
7) Midterm Exam
8) Consumption Ideology
9) Consumption Culture
10) Consumer Behavior Models
11) Perception, Attitude and Persuasion
12) Consumer Trends in the Digital World
13) Project Presentations I
14) Project Presentations II

Sources

Course Notes / Textbooks: Filiz Balta Peltekoğlu, Kavram ve Kuramlarıyla Reklam, 2015.
Jean Baudrillard, Tüketim Kültürü, Ayrıntı Yayınları, 2002.
References: Ders notları

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Presentation 2 % 30
Midterms 1 % 30
Final 1 % 40
total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Preparation for the Activity Spent for the Activity Itself Completing the Activity Requirements Workload
Course Hours 14 0 3 42
Presentations / Seminar 2 12 2 28
Midterms 1 24 2 26
Final 1 24 3 27
Total Workload 123