Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI201 | ||||
Course Name: | Management in a Crisis Period | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Dr. Öğr. Üy. LEVENT SÜMER | ||||
Course Lecturer(s): | |||||
Course Assistants: |
Course Objectives: | This course focuses on crisis management of organizations, investigates in details an important management area where many organizations lack of and gives an important insight and perspective to students including case studies. |
Course Content: | Definition of crisis, preparation for crisis, methods to get protected from crisis, management at crisis, planning and organization after crisis. |
The students who have succeeded in this course;
1) Students will learn • how to define crisis • how to get prepared for the crisis • things to do before, at and after crisis • decision processes at crisis and organizational processes • the effects of global crisis on the organizations |
Week | Subject | Related Preparation |
1) | The Aim of the Course and the Content | |
2) | Global Economic Outlook | |
3) | Past Financial Crisis | |
4) | Definition of Crisis and Preparation for Crisis | |
5) | Methods to get Protected from Crisis | |
6) | Case Studies | |
7) | Project Presentations | |
8) | Project Presentations | |
9) | Project Presentations | |
10) | Marketing Strategies and Organizational Re-Structuring | |
11) | Planning after Crisis | |
12) | Paper Presentations | |
13) | Paper Presentations | |
14) | Summary of the Course |
Course Notes / Textbooks: | Ders notları |
References: | • Drucker Peter F. Fırtınalı Dönemlerde Yönetim, İnkılap Kitapevi |
Course Learning Outcomes | 1 |
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 10 |
Presentation | 1 | % 20 |
Project | 1 | % 30 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 14 |
Presentations / Seminar | 3 | 18 |
Project | 4 | 25 |
Homework Assignments | 4 | 24 |
Final | 1 | 36 |
Total Workload | 117 |