Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | UNI094 | ||||
Course Name: | Research Methods | ||||
Semester: | Spring | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | University Elective | ||||
Course Level: |
|
||||
Mode of Delivery: | E-Learning | ||||
Course Coordinator: | Öğr. Gör. AYLİN KERİME BİBERCİ | ||||
Course Lecturer(s): | HİLAL ÇAKAR | ||||
Course Assistants: |
Course Objectives: | In the context of the importance of scientific method in the modern world, providing the necessary information about the stages and types of scientific research, making it easier to make sense of scientific writings in terms of linguistic, formal and contextual, and to enable them to solve problems or make researches and report related to the field of study. |
Course Content: | Definition of Science, Basic Concepts, Qualitative and Quantitative Data Collecting Methods, Research Process, Measuring and Scaling, Sampling, Data Analysis, Research Proposal, Ethic. |
The students who have succeeded in this course;
1) 1. Define the concepts of scientific research 2) 2. List the stages of scientific research. 3) 3. Identify appropriate research methods and techniques for specific issues or problems 4) 4. Develops comments and suggestions in the context of the findings of the research 5) 5. Reports his research with the steps of scientific method and general pass writing rules |
Week | Subject | Related Preparation |
1) | What is Science? | - |
2) | Bilimsel Araştırmalar ile ilgili Temel Kavramlar | - |
3) | Research Process and Data Collection | - |
4) | Data collection techniques-Quantitative | - |
5) | Data collection techniques-Qualitative | - |
6) | Measuring and Scaling | - |
7) | Sampling | - |
8) | MIDTERM EXAM | - |
9) | Reliability and validity concepts | - |
10) | Quantitative Data Analysis | - |
11) | Qualitative Data Analysis | - |
12) | Research Proposal, Literature Review | - |
13) | Preparation of research report | - |
14) | Ethical principles in scientific research | - |
Course Notes / Textbooks: | Bulunmamaktadır. |
References: | Creswell. J.W. (2016). Araştırma Deseni. Çeviri: Selçuk Beşir Demir. Kurtuluş, K. (2010). Araştırma Yöntemleri. Türkmen Kitapevi. Kıncal, R.Y. (2015). Bilimsel Araştırma Yöntemleri. Nobel Akademik Yayıncılık. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
5 |
|||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | ||||||||||||
2) Can install and manage software and hardware required for end user security. | ||||||||||||
3) Can follow current security products. | ||||||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | ||||||||||||
5) Installs the basic software and hardware of the computer. | ||||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | |
2) | Can install and manage software and hardware required for end user security. | |
3) | Can follow current security products. | |
4) | It can manage both software and people in the environment against cyber attack incidents. | |
5) | Installs the basic software and hardware of the computer. | |
6) | Installs and manages open source operating system and computer networks software. | |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | |
9) | Creates, manages and organizes space on cloud platforms. | |
10) | Firewall software also enables, manages and regulates the installation of hardware. | |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 1 | % 10 |
Midterms | 1 | % 30 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 42 |
Study Hours Out of Class | 13 | 13 |
Midterms | 4 | 31 |
Final | 4 | 31 |
Total Workload | 117 |