UNI198 Article Reading and ReviewIstinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: UNI198
Course Name: Article Reading and Review
Semester: Fall
Spring
Course Credits:
ECTS
5
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: University Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: E-Learning
Course Coordinator: Dr. Öğr. Üy. GÜLSÜM GÖKGÖZ
Course Lecturer(s): Atiye Türker
Course Assistants:

Course Objective and Content

Course Objectives: This course is an introduction to the article evaluation process. Topics to improve reading and evaluation skills of scientific articles are covered.
Course Content: Scientific publication resources (Journals and search engines) Literature search, article types and features, article reading and evaluation

Learning Outcomes

The students who have succeeded in this course;
1) Can explain the periodicals in which scientific articles are published and their features
2) Can explain article types and features
3) Can perform a literature search using national journals and search engines
4) Can explain the structure and features of a scientific article
5) Can evaluate the research article

Course Flow Plan

Week Subject Related Preparation
1) Scientific publication resources (Journals and search engines)
2) Article scanning using national journals
3) Article search using national engines
4) Scientific article types and features
5) Parts of a scientific article
6) Research article reading and evaluation
7) Midterm exam
8) Research article reading and evaluation
9) Review article reading and evaluation
10) Review article reading and evaluation
11) Case report article reading and evaluation
12) Systematic review Article reading and evaluation
13) Meta analysis article reading and evaluation
14) Course evaluation
15) FINAL EXAM PERIOD

Sources

Course Notes / Textbooks: Akoğlu, H., Doğan, N.Ö. (2017). Bir Makalenin Anatomisi. Nobel Tıp Kitabevi, İstanbul.
References: -Akoğlu, H., Doğan, N.Ö. (2017). Bir Makalenin Anatomisi. Nobel Tıp Kitabevi, İstanbul.

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

2

3

4

5

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Presentation 1 % 25
Midterms 1 % 35
Final 1 % 40
total % 100
PERCENTAGE OF SEMESTER WORK % 60
PERCENTAGE OF FINAL WORK % 40
total % 100

Workload and ECTS Credit Calculation

Activities Number of Activities Workload
Course Hours 15 30
Study Hours Out of Class 14 14
Presentations / Seminar 1 2
Homework Assignments 1 8
Midterms 2 38
Final 1 28
Total Workload 120