Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI148 | ||||
Course Name: | Uncertainty and Change Management | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. GÜLSÜM GÖKGÖZ | ||||
Course Lecturer(s): | Prof. Dr. Canan Çetin | ||||
Course Assistants: |
Course Objectives: | A change can be a project, initiative or solution being introduced in the organization to improve the way work gets done, solve a problem, or take advantage of an opportunity. At the same time, risk can include an unexperienced, unexplained and complex situation. The aim of the course is to build knowledge and skills for change management, the application of a structured set of processes and tools to guide people through change to achieve a desired outcome. |
Course Content: | The core of organizational change management is a thorough knowledge of how to successfully introduce change to people. In this course, students will learn how to clearly define roles and responsibilities and handle resistance to change, to explore the impact of organizational change management. They will gain the knowledge to help people transition through change and the key activities for effective organizational change management. |
The students who have succeeded in this course;
1) • Appreciates the impact of organisational change on people 2) • Identifies ways they can positively lead and motivate people through cultural or organisational change 3) • Develops skills for effectively communicating change 4) • Identifies ways they can help team members cope with change |
Week | Subject | Related Preparation |
1) | VUCA and New World | |
2) | Change Management | |
3) | Kinds of Organizational Change | |
4) | Awareness and Learning | |
5) | Anxiety and Fear | |
6) | Crisis Management-1 | |
7) | Crisis Management-1 | |
8) | Midterm Exam | |
9) | The Seven Habits of Highly Effective People | |
10) | The Seven Habits of Highly Effective People | |
11) | Cultural Aspect of Change in Businesses and Resistance to Change | |
12) | Management of change stakeholders | |
13) | Change Agent and Roles | |
14) | Planning in the Process of Change | |
15) | Measuring Change in Business | |
16) | Finals Week |
Course Notes / Textbooks: | Öğretim üyesi notları Lecturer's notes |
References: | Nermin Uyguç, Etkili Değişim Yönetimi, İstanbul: Nobel Akademik Yayıncılık, 2019 |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 2 | % 20 |
Midterms | 1 | % 30 |
Final | 1 | % 50 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 56 |
Quizzes | 4 | 20 |
Midterms | 4 | 16 |
Final | 5 | 26 |
Total Workload | 118 |