Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI233 | ||||
Course Name: | Innovative Approaches in Health | ||||
Semester: |
Fall Spring |
||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. ELİF ÖRSELOĞLU | ||||
Course Lecturer(s): | ELİF ÖRSELOĞLU | ||||
Course Assistants: |
Course Objectives: | In this course, it is aimed to explain the concepts such as innovation, creativity and entrepreneurship to the students, to enable them to comprehend the connection between each other, and to develop behaviors in this regard by enabling them to think innovatively in health service presentations. |
Course Content: | This course includes information on innovative approaches, entrepreneurship and innovation in healthcare delivery, the relationships between entrepreneurship and innovation, and innovative initiatives in healthcare delivery. |
The students who have succeeded in this course;
1) 1) Defines innovation 2) 2) Defines entrepreneurship 3) 3) Establishes the connection between innovation and entrepreneurship. 4) 4) Follows the innovation studies in the health sector |
Week | Subject | Related Preparation |
1) | Introduction of the course, Getting to know | |
2) | The Concept and Scope of Creativity | |
3) | Innovation Concept and Scope | |
4) | Types of Innovation | |
5) | The concept and scope of entrepreneurship | |
6) | Entrepreneurship culture and dimensions | |
7) | MİDTERM | |
8) | Characteristics of the entrepreneur | |
9) | Generating innovative ideas | |
10) | Innovative Product Development Process-1 | |
11) | Innovative Product Development Process-2 | |
12) | Innovation and entrepreneurship in the Health Sector | |
13) | Examples of innovation in Healthcare Delivery-1 | |
14) | Examples of innovation in Healthcare Delivery-2 | |
15) | FINAL |
Course Notes / Textbooks: | 1) Merih YD. İnovatif Hemşirelerin Yol Haritası. Nobel Tıp Kitabevleri, 2018. 2) Stell G., “İnovasyonu Haritalamak Dijital Çağda Özgün İnovasyon Stratejileri” TTGV, 2018. |
References: | 1. Stell G., “İnovasyonu Haritalamak Dijital Çağda Özgün İnovasyon Stratejileri” TTGV, 2018. 2. İnovatif Hemşireler Derneği - web linki http://inovatifhemsirelikdernegi.com. 3. Drucker P. İnovasyon ve Girişimcilik, 1. Baskı, Optimistik Yayınları, 2017 |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 28 | % 0 |
Quizzes | 1 | % 20 |
Midterms | 1 | % 40 |
Final | 1 | % 40 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 60 | |
PERCENTAGE OF FINAL WORK | % 40 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 16 | 32 |
Study Hours Out of Class | 15 | 75 |
Homework Assignments | 2 | 2 |
Quizzes | 2 | 2 |
Midterms | 1 | 1 |
Final | 1 | 1 |
Total Workload | 113 |