Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI231 | ||||
Course Name: | Health Literacy | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Doç. Dr. İNCİ KAYIN | ||||
Course Lecturer(s): |
Öğr. Gör. DİLEK KOLCA Doç. Dr. İNCİ KAYIN |
||||
Course Assistants: |
Course Objectives: | It is aimed to increase the ability to reach a sufficient level of knowledge about health literacy, to use the obtained information in daily life and to access the right information sources in the field of health. |
Course Content: | It consists of basic information about health literacy and other concepts related to health literacy. |
The students who have succeeded in this course;
1) Knows the concept of health literacy and its importance. 2) Explain the factors affecting health literacy. 3) Uses the information obtained about health literacy in daily life. 4) Gains the ability to access the right information sources in the field of health. 5) Have effective literacy skills on individual and community health. |
Week | Subject | Related Preparation |
1) | Introduction to the Course, Purpose of the Course and Learning Objectives | |
1) | Media and Health Literacy | |
2) | Health Literacy Concept | |
3) | Key Determinants of Health Literacy | |
4) | Factors Affecting Health Literacy | |
5) | Classification of Health Literacy | |
6) | Measuring Health Literacy | |
7) | Health Literacy and Health Expenditures | |
8) | Midterm | |
9) | Health Education and Health Literacy | |
10) | The Effect of Health Literacy on Community Health | |
11) | Oral and Dental Health Literacy | |
12) | Healthy Nutrition Literacy | |
13) | COVID-19 Pandemic and Health Literacy | |
14) | Final Exam |
Course Notes / Textbooks: | Hocanın kendi notları |
References: | Yıldırım, H. H., Sağlık Okuryazarlığı: Türkiye Resmin Neresinde? Ne Yapmalı? Absam, 2015. Yıldırım, F. ve Keser, A. Sağlık Okuryazarlığı, Ankara Üniversitesi Sağlık Bilimleri Fakültesi Yayını, 2015. https://www.skb.gov.tr/wp-content/uploads/2015/05/saglik-okur-yazarligi-WEB.pdf. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Preparation for the Activity | Spent for the Activity Itself | Completing the Activity Requirements | Workload | ||
Course Hours | 2 | 20 | 40 | ||||
Study Hours Out of Class | 6 | 10 | 60 | ||||
Midterms | 1 | 10 | 10 | ||||
Final | 1 | 10 | 10 | ||||
Total Workload | 120 |