Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI142 | ||||
Course Name: | Advertising and Consumption | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Prof. Dr. AYBİKE SERTTAŞ | ||||
Course Lecturer(s): | Assoc Prof Aybike Serttaş | ||||
Course Assistants: |
Course Objectives: | The aim of the course is to provide the student the competence to discuss globalization, capitalism, commodification, alienation, consumption by referring to basic theories and authors. |
Course Content: | Globalization, capitalism, commodification, alienation, consumer society and advertising |
The students who have succeeded in this course;
1) Analyzes the advertisements within the scope of consumption society. 2) Establishes the link between alienation and marketing communication. 3) Defines creative destruction and evaluates brands in this regard. 4) Explain the relationship between consumption and status. 5) Tell the link between materialism and consumer society. |
Week | Subject | Related Preparation |
1) | Meeting, information about the lesson, movie and book suggestions | |
1) | Hedonism | |
2) | History of advertising, changing advertising approaches from past to present | |
3) | Functions of advertisements | |
4) | Creative destruction and controversy over the black swan | |
5) | Consumption theories | |
6) | Fordism ve Taylorism | |
7) | Commodification, reification, alienation | |
8) | Practise for midterm | |
9) | Ethical Issues in Advertising | |
10) | Conformism | |
11) | Consumption society criticism in cinema | |
12) | Consumption society criticism in cinema/ 2 | |
13) | Consumption society debates | |
14) | Consumption society debates |
Course Notes / Textbooks: | Daron Acemoğlu -- James Robinson, Ulusların Düşüşü Robert Bocock, Tüketim |
References: | Aybike Serttaş, Reklam Temel Kavramlar Teknik Bilgiler Örnekler Aybike Serttaş – Recep Yılmaz, Reklamcılığın Anahtar Kavramları |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 14 | % 10 |
Homework Assignments | 1 | % 40 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 14 | 0 | 3 | 42 | |||
Midterms | 2 | 10 | 2 | 24 | |||
Final | 3 | 15 | 2 | 51 | |||
Total Workload | 117 |