Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI108 | ||||
Course Name: | Consumer Behavior | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Araş. Gör. AZİZ ARSLAN | ||||
Course Lecturer(s): | Dr.Nezahat Yüceışık | ||||
Course Assistants: |
Course Objectives: | It is aimed to learn the basic concepts of consumer, consumption culture, consumer behavior and consumer research, to define the learned information, to express it in different ways and to present it with the projects to be carried out. |
Course Content: | In the context of the Consumer Behavior course, the concept of consumption, the concept of consumer society, the socio-psychological and economic dynamics of consumer behavior in the consumer society, consumer behavior models, consumer purchasing decision process, perception-persuasion-attitude concepts and the relationship between consumer behaviors are discussed. |
The students who have succeeded in this course;
1) Gains information about consumption culture and consumer behavior process. 2) Have the necessary knowledge, skills and competence to define the learned information, to express and report it in different ways. 3) Have theoretical and theoretical knowledge about the concepts of consumption, consumption culture and consumer behavior. 4) Gains knowledge of how the concept of consumer behavior is handled in different disciplines. |
Week | Subject | Related Preparation |
1) | Introduction to consumer behavior | |
2) | Basic Approaches in Consumer Behaviors | |
3) | Consumer Purchase Decision Process | |
4) | Factors Affecting Consumer Behaviors and Decisions | |
5) | Marketing and Marketing Phases | |
6) | Marketing and Consumer Behaviors | |
7) | Midterm Exam | |
8) | Consumption Ideology | |
9) | Consumption Culture | |
10) | Consumer Behavior Models | |
11) | Perception, Attitude and Persuasion | |
12) | Consumer Trends in the Digital World | |
13) | Project Presentations I | |
14) | Project Presentations II |
Course Notes / Textbooks: | Filiz Balta Peltekoğlu, Kavram ve Kuramlarıyla Reklam, 2015. Jean Baudrillard, Tüketim Kültürü, Ayrıntı Yayınları, 2002. |
References: | Ders notları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Presentation | 2 | % 30 |
Midterms | 1 | % 30 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 3 | 42 | |||
Presentations / Seminar | 2 | 12 | 2 | 28 | |||
Midterms | 1 | 24 | 2 | 26 | |||
Final | 1 | 24 | 3 | 27 | |||
Total Workload | 123 |