SECTION I: GENERAL INFORMATION ABOUT THE COURSE |
| Course Code | Course Name | Year | Semester | Theoretical | Practical | Credit | ECTS |
| 50223YETOS-SOS2290 | Social Groups and Discrimination | 1 | Spring | 2 | 0 | 2 | 3 |
| Course Type : | University Elective |
| Cycle: | Associate TQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree |
| Language of Instruction: | Turkish |
| Prerequisities and Co-requisities: | N/A |
| Mode of Delivery: | E-Learning |
| Name of Coordinator: | Dr. Öğr. Üyesi SEVAL ÜNLÜ GÖK |
| Dersin Öğretim Eleman(lar)ı: |
Dr. Öğr. Üyesi SEVAL ÜNLÜ GÖK |
| Dersin Kategorisi: | Competency Development (University Elective) |
SECTION II: INTRODUCTION TO THE COURSE |
| Course Objectives: | This course aims that students will be able to approach discrimination from the perspective of social sciences, to increase their awareness of disparate forms of discrimination, to problematize the discrimination they face in everyday life, and to develop solutions against discrimination on individual level as well as on social level. |
| Course Content: | Discrimination as current social problem, social groups faced with discrimination and their characteristics, methods and policies of struggle against discrimination. |
| Regular attendance and engaged participation are expected. |
| Knowledge (Described as Theoritical and/or Factual Knowledge.) | ||
|
1) Distinguish types of discrimination and define them |
||
| Skills (Describe as Cognitive and/or Practical Skills.) | ||
| Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.) | ||
|
1) Communicate without prejudices and strereotypes |
||
|
2) Be receptive to different opinions |
||
|
3) Adopt democratic discussion |
||
|
4) Object to discriminatory language and hate speech |
||
|
5) Question discriminatory behavior, institution and policy |
||
| Week | Subject | ||
| Related Preparation | Further Study | ||
| 1) | Introductory lesson: Basic concepts and categories | ||
| 2) | Concept of racism | ||
| 3) | Racist systems and regimes | ||
| 4) | Historical origins of ethnic and religious discrimination | ||
| 5) | Minorities, othering, assimilation | ||
| 6) | Histrocial evolution of poverty concept | ||
| 7) | Urban Poverty | ||
| 8) | Midterm exam | ||
| 9) | Sex Discrimination | ||
| 10) | Sex, Gender, Sexual Orientation | ||
| 11) | Sexual harassment and assault | ||
| 12) | Disability Discrimination | ||
| 13) | Age Discrimination | ||
| 14) | Discrimatory language and hate speech | ||
| 15) | Struggle against discrimination | ||
| 16) | Final Exam | ||
| Course Notes / Textbooks: | |
| References: | Kenan Çayır ve Müge Ayan Ceyhan (der). 2012. Ayrımcılık: Çok Boyutlu Yaklaşımlar, İstanbul: İstanbul Bilgi Üniversitesi Yayınları. |
DERS ÖĞRENME ÇIKTILARI - PROGRAM ÖĞRENME ÇIKTILARI İLİŞKİSİ |
| Ders Öğrenme Çıktıları (DÖÇ) | 1 |
2 |
3 |
4 |
5 |
6 |
|||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Program Öğrenme Çıktıları (PÖÇ) | |||||||||||||||||||||||||||||||
| 1) Defines the corporate cyber security rules and guidelines. | |||||||||||||||||||||||||||||||
| 1) Experiences all processes in business life. | |||||||||||||||||||||||||||||||
| 1) Explains the basic, theoretical and practical information in the field of information security technology. | |||||||||||||||||||||||||||||||
| 1) Follow the patches of information technology systems published against known cyber security gaps. | |||||||||||||||||||||||||||||||
| 1) Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. | |||||||||||||||||||||||||||||||
| 1) Acquires competency of analyzing and solving the problems. | |||||||||||||||||||||||||||||||
| 2) Know and analyze cyber assets in terms of information security. | |||||||||||||||||||||||||||||||
| 2) Has awareness for ethical and social responsibility. | |||||||||||||||||||||||||||||||
| 2) Explains the importance of authorizing users as much as they can. | |||||||||||||||||||||||||||||||
| 2) Information Security Creates procedure and control components | |||||||||||||||||||||||||||||||
| 2) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. | |||||||||||||||||||||||||||||||
| 2) Takes part in activities related to the field of education in a business operating in the field. | |||||||||||||||||||||||||||||||
| 3) Identify non-technological tools and methods against cyber attack. | |||||||||||||||||||||||||||||||
| 3) Questions the application with theoretical knowledge. | |||||||||||||||||||||||||||||||
| 3) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. | |||||||||||||||||||||||||||||||
| 3) Takes responsibility as a team member in works and operations of his/her field. | |||||||||||||||||||||||||||||||
| 3) Experience the cyber security risk management system. | |||||||||||||||||||||||||||||||
| 3) Explains the necessary policies and processes for effective event management. | |||||||||||||||||||||||||||||||
| 4) Applies the theoretical knowledge learned in business life for a semester. | |||||||||||||||||||||||||||||||
| 4) Compiles the knowledge and experience gained in the field. | |||||||||||||||||||||||||||||||
| 4) Is aware of written, verbal communication and interaction. | |||||||||||||||||||||||||||||||
| 4) Identifies the methods and methods of technological methods against cyber attack. | |||||||||||||||||||||||||||||||
| 4) Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. | |||||||||||||||||||||||||||||||
| 5) Follows the developments of advanced technology and digital transformation. | |||||||||||||||||||||||||||||||
| 5) Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. | |||||||||||||||||||||||||||||||
| 5) User training and security awareness describes the importance of cyberspace. | |||||||||||||||||||||||||||||||
| 6) Acquires the awareness for lifelong learning. | |||||||||||||||||||||||||||||||
| 6) Recall national and international legislation and regulations related to the field of Information Security Technology. | |||||||||||||||||||||||||||||||
| 7) Defines the fundamentals of programming and algorithm information. | |||||||||||||||||||||||||||||||
| 7) Has awareness about citizenship competency. | |||||||||||||||||||||||||||||||
| 8) Evaluates the developments of his/her field with the understanding of an entrepreneur. | |||||||||||||||||||||||||||||||
| 9) Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). | |||||||||||||||||||||||||||||||
SECTION III: RELATIONSHIP BETWEEN COURSE UNIT AND COURSE LEARNING OUTCOMES (CLOs) |
| No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
| Programme Learning Outcomes | Contribution Level (from 1 to 5) | |
| 1) | Defines the corporate cyber security rules and guidelines. | |
| 1) | Experiences all processes in business life. | |
| 1) | Explains the basic, theoretical and practical information in the field of information security technology. | |
| 1) | Follow the patches of information technology systems published against known cyber security gaps. | |
| 1) | Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware. | |
| 1) | Acquires competency of analyzing and solving the problems. | |
| 2) | Know and analyze cyber assets in terms of information security. | |
| 2) | Has awareness for ethical and social responsibility. | |
| 2) | Explains the importance of authorizing users as much as they can. | |
| 2) | Information Security Creates procedure and control components | |
| 2) | Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components. | |
| 2) | Takes part in activities related to the field of education in a business operating in the field. | |
| 3) | Identify non-technological tools and methods against cyber attack. | |
| 3) | Questions the application with theoretical knowledge. | |
| 3) | Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks. | |
| 3) | Takes responsibility as a team member in works and operations of his/her field. | |
| 3) | Experience the cyber security risk management system. | |
| 3) | Explains the necessary policies and processes for effective event management. | |
| 4) | Applies the theoretical knowledge learned in business life for a semester. | |
| 4) | Compiles the knowledge and experience gained in the field. | |
| 4) | Is aware of written, verbal communication and interaction. | |
| 4) | Identifies the methods and methods of technological methods against cyber attack. | |
| 4) | Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements. | |
| 5) | Follows the developments of advanced technology and digital transformation. | |
| 5) | Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society. | |
| 5) | User training and security awareness describes the importance of cyberspace. | |
| 6) | Acquires the awareness for lifelong learning. | |
| 6) | Recall national and international legislation and regulations related to the field of Information Security Technology. | |
| 7) | Defines the fundamentals of programming and algorithm information. | |
| 7) | Has awareness about citizenship competency. | |
| 8) | Evaluates the developments of his/her field with the understanding of an entrepreneur. | |
| 9) | Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1). |
SECTION IV: TEACHING-LEARNING & ASSESMENT-EVALUATION METHODS OF THE COURSE |
| Lectures | |
| Discussion | |
| Problem Solving | |
| Demonstration | |
| Views | |
| Reading | |
| Homework | |
| Brain Storming | |
| Questions Answers | |
| Individual and Group Work | |
| Role Playing-Animation-Improvisation |
| Midterm | |
| Final Exam | |
| Quiz | |
| Homework Evaluation |
| Measurement and Evaluation Methods | # of practice per semester | Level of Contribution |
| Quizzes | 2 | % 20.00 |
| Midterms | 1 | % 30.00 |
| Semester Final Exam | 1 | % 50.00 |
| Total | % 100 | |
| PERCENTAGE OF SEMESTER WORK | % 50 | |
| PERCENTAGE OF FINAL WORK | % 50 | |
| Total | % 100 | |
SECTION V: WORKLOAD & ECTS CREDITS ALLOCATED FOR THE COURSE |
| WORKLOAD OF TEACHING & LEARNING ACTIVITIES | |||
| Teaching & Learning Activities | # of Activities per semester | Duration (hour) | Total Workload |
| Course | 14 | 2 | 28 |
| Laboratory | 0 | 0 | 0 |
| Application | 0 | 0 | 0 |
| Special Course Internship (Work Placement) | 0 | 0 | 0 |
| Field Work | 0 | 0 | 0 |
| Study Hours Out of Class | 13 | 1 | 13 |
| Presentations / Seminar | 0 | 0 | 0 |
| Project | 0 | 0 | 0 |
| Homework Assignments | 1 | 5 | 5 |
| Total Workload of Teaching & Learning Activities | - | - | 46 |
| WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES | |||
| Assesment & Evaluation Activities | # of Activities per semester | Duration (hour) | Total Workload |
| Quizzes | 1 | 4 | 4 |
| Midterms | 1 | 5 | 5 |
| Semester Final Exam | 1 | 10 | 10 |
| Total Workload of Assesment & Evaluation Activities | - | - | 19 |
| TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) | 65 | ||
| ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) | 3 | ||