UNI142 Advertising and ConsumptionIstinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: UNI142
Course Name: Advertising and Consumption
Semester: Spring
Course Credits:
ECTS
5
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: University Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Prof. Dr. AYBİKE SERTTAŞ
Course Lecturer(s): Assoc Prof Aybike Serttaş
Course Assistants:

Course Objective and Content

Course Objectives: The aim of the course is to provide the student the competence to discuss globalization, capitalism, commodification, alienation, consumption by referring to basic theories and authors.
Course Content: Globalization, capitalism, commodification, alienation,
consumer society and advertising

Learning Outcomes

The students who have succeeded in this course;
1) Analyzes the advertisements within the scope of consumption society.
2) Establishes the link between alienation and marketing communication.
3) Defines creative destruction and evaluates brands in this regard.
4) Explain the relationship between consumption and status.
5) Tell the link between materialism and consumer society.

Course Flow Plan

Week Subject Related Preparation
1) Meeting, information about the lesson, movie and book suggestions
1) Hedonism
2) History of advertising, changing advertising approaches from past to present
3) Functions of advertisements
4) Creative destruction and controversy over the black swan
5) Consumption theories
6) Fordism ve Taylorism
7) Commodification, reification, alienation
8) Practise for midterm
9) Ethical Issues in Advertising
10) Conformism
11) Consumption society criticism in cinema
12) Consumption society criticism in cinema/ 2
13) Consumption society debates
14) Consumption society debates

Sources

Course Notes / Textbooks: Daron Acemoğlu -- James Robinson, Ulusların Düşüşü
Robert Bocock, Tüketim
References: Aybike Serttaş, Reklam Temel Kavramlar Teknik Bilgiler Örnekler
Aybike Serttaş – Recep Yılmaz, Reklamcılığın Anahtar Kavramları

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

5

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Attendance 14 % 10
Homework Assignments 1 % 40
Final 1 % 50
total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Preparation for the Activity Spent for the Activity Itself Completing the Activity Requirements Workload
Course Hours 14 0 3 42
Midterms 2 10 2 24
Final 3 15 2 51
Total Workload 117