HOME INSTITUTIONAL INFORMATIONINFORMATION ON DEGREE PROGRAMMES Information Security TechnologyCERTIFICATE PROGRAMMESUSEFUL INFORMATION, RESOURCES & SERVICES FOR STUDENTSUSEFUL LINKS AND DOCUMENTSADITIONAL & SUPPORTING INFORMATION

SECTION I: GENERAL INFORMATION ABOUT THE COURSE

Course Code Course Name Year Semester Theoretical Practical Credit ECTS
50314YETOS-SOS2230 Gender Equality 2 Fall 2 0 2 3
Course Type : University Elective
Cycle: Associate      TQF-HE:5. Master`s Degree      QF-EHEA:Short Cycle      EQF-LLL:5. Master`s Degree
Language of Instruction: Turkish
Prerequisities and Co-requisities: N/A
Mode of Delivery:
Name of Coordinator: Dr. Öğr. Üyesi NİLAY ÖZER PELVANOĞLU
Dersin Öğretim Eleman(lar)ı:



Dersin Kategorisi: Competency Development (University Elective)

SECTION II: INTRODUCTION TO THE COURSE

Course Objectives & Content

Course Objectives:
Course Content:

Course Learning Outcomes (CLOs)

Course Learning Outcomes (CLOs) are those describing the knowledge, skills and competencies that students are expected to achieve upon successful completion of the course. In this context, Course Learning Outcomes defined for this course unit are as follows:
Knowledge (Described as Theoritical and/or Factual Knowledge.)
  1) Students learn the basic concepts in the fields of gender studies and feminist theory.
  2) Students learn about the history of the feminist movement in the world and in Turkey. Feminist pioneers are introduced to students through their struggles and books.
  3) As a result of the examinations, readings and discussions in the course, students can analyze the patriarchal structure that establishes the contexts of politics, economy, philosophy, literature, historiography, religion, urban planning, employment, social organization, public sphere-private sphere, sexuality and daily life.
Skills (Describe as Cognitive and/or Practical Skills.)
  1) By having knowledge of feminist theory, masculinity studies, queer theory, students can evaluate them in the context of democracy and human rights.
  2) Students can follow the work of the United Nations and developed countries to achieve gender equality and compare countries that have been successful in achieving gender equality with others on issues such as welfare, democracy and violence.
Competences (Described as "Ability of the learner to apply knowledge and skills autonomously with responsibility", "Learning to learn"," Communication and social" and "Field specific" competences.)
  1) By using the knowledge, approaches and research methods gained from this course, students can produce projects to ensure gender equality and take on social responsibility.

Weekly Course Schedule

Week Subject
Materials Sharing *
Related Preparation Further Study
1) Concepts of "sex" and "gender". - Gender in History Materyal
2) History of feminism Materyal
3) History of feminism Materyal
4) History of the feminist movement in Turkey Materyal
5) History of the feminist movement in Turkey Materyal
6) Politics and Gender - History and Gender Materyal
7) Literature and Gender - Philosophy and Gender
8) Virginia Woolf. A Room of One's Own Materyal
9) Economy and Gender - Social Policies and Gender Materyal
10) Women's Labor - Urban Policy and Gender Materyal
11) Female Body and Patriarchal Body Policies - Media and Gender
12) Queer Theory
13) Masculinity Studies Materyal
14) Patriarchal Violence, Violence Against Women Materyal
15) We Need Gender Equality
*These fields provides students with course materials for their pre- and further study before and after the course delivered.

Recommended or Required Reading & Other Learning Resources/Tools

Course Notes / Textbooks: Öğrencilerin edinmesi gereken zorunlu ders kitapları şunlardır:

Toplumsal Cinsiyet Tartışmaları. Hazırlayan: Feryal Saygılıgil. Ankara: Dipnot Yayınları, 2022.

Bell Hooks. Feminizm Herkes İçindir. Çev. Ece Aydın ve diğer. İstanbul: BGST Yayınları, 2019.
References: Angela Davis. Kadınlar, Irk ve Sınıf. Çev. Selda Arıt. Ankara: Heretik Yayın, 2021.
Bell Hooks. Feminizm Herkes İçindir. Çev. Ece Aydın ve diğer. İstanbul: BGST Yayınları, 2019.
Eleştirel Feminizm Sözlüğü. Haz. Helena Hırata ve diğer. Çev. Gülnur Acar Savran. Ankara: Dipnot Yayınları, 2015.
Fatmagül Berktay. Tarihin Cinsiyeti. İstanbul: Metis Yayıncılık, 2018.
Fatmagül Berktay. Tek Tanrılı Dinler Karşısında Kadın. İstanbul: Metis Yayınları, 2019.
Feminizm. Modern Türkiye'de Siyasi Düşünce Cilt 10. Ed. Tanıl Bora. İstanbul: İletişim Yayınları, 2020.
Gülnur Acar Savran. Beden Emek Tarih: Diyalektik Bir Feminizm İçin. Ankara: Dipnot Yayınları, 2019.
Mary Wollstonecraft. Kadın Haklarının Gerekçelendirilmesi. Çev. Deniz Hakyemez. İstanbul: Türkiye İş Bankası Kültür Yayınları, 2021.
Merry E. Wiesner-Hanks. Tarihte Toplumsal Cinsiyet. Çev. Merak Çiyan Şenerdi. İstanbul: Türkiye İş Bankası Kültür Yayınları, 2022.
Sara Ahmed. Feminist Bir Yaşam Sürmek. Çev. Beyza Sümer Aydaş. İstanbul: Sel Yayıncılık, 2017.
Serpil Sancar. Türk Modernleşmesinin Cinsiyeti: Erkekler Devlet Kadınlar Aile Kurar. İstanbul: İletişim Yayınları, 2013.
Simone De Beauvoir. İkinci Cinsiyet. İki cilt. Çev. Gülnur Acar Savran. İstanbul: Koç Üniversitesi Yayınları, 2021.
Şirin Tekeli. Feminizmi Düşünmek. İstanbul: İstanbul Bilgi Üniversitesi Yayınları,2017.
Tanıl Bora. "Feminizm". Cereyanlar: Türkiye'de Siyasi İdeolojiler. İstanbul: İletişim Yayınları, 2020. 741-819.

DERS ÖĞRENME ÇIKTILARI - PROGRAM ÖĞRENME ÇIKTILARI İLİŞKİSİ

Relationship Between CLOs & PLOs

Ders Öğrenme Çıktıları (DÖÇ)

1

2

3

4

5

6

Program Öğrenme Çıktıları (PÖÇ)
1) Follow the patches of information technology systems published against known cyber security gaps.
1) Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware.
1) Acquires competency of analyzing and solving the problems.
1) Explains the basic, theoretical and practical information in the field of information security technology.
1) Experiences all processes in business life.
1) Defines the corporate cyber security rules and guidelines.
2) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components.
2) Takes part in activities related to the field of education in a business operating in the field.
2) Know and analyze cyber assets in terms of information security.
2) Has awareness for ethical and social responsibility.
2) Information Security Creates procedure and control components
2) Explains the importance of authorizing users as much as they can.
3) Explains the necessary policies and processes for effective event management.
3) Questions the application with theoretical knowledge.
3) Identify non-technological tools and methods against cyber attack.
3) Experience the cyber security risk management system.
3) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks.
3) Takes responsibility as a team member in works and operations of his/her field.
4) Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements.
4) Is aware of written, verbal communication and interaction.
4) Applies the theoretical knowledge learned in business life for a semester.
4) Identifies the methods and methods of technological methods against cyber attack.
4) Compiles the knowledge and experience gained in the field.
5) Follows the developments of advanced technology and digital transformation.
5) Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society.
5) User training and security awareness describes the importance of cyberspace.
6) Acquires the awareness for lifelong learning.
6) Recall national and international legislation and regulations related to the field of Information Security Technology.
7) Defines the fundamentals of programming and algorithm information.
7) Has awareness about citizenship competency.
8) Evaluates the developments of his/her field with the understanding of an entrepreneur.
9) Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1).

SECTION III: RELATIONSHIP BETWEEN COURSE UNIT AND COURSE LEARNING OUTCOMES (CLOs)

Level of Contribution of the Course to PLOs

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Programme Learning Outcomes Contribution Level (from 1 to 5)
1) Follow the patches of information technology systems published against known cyber security gaps.
1) Lists the tasks and responsibilities required to identify and prevent any exploitation of hardware.
1) Acquires competency of analyzing and solving the problems.
1) Explains the basic, theoretical and practical information in the field of information security technology.
1) Experiences all processes in business life.
1) Defines the corporate cyber security rules and guidelines.
2) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in software components.
2) Takes part in activities related to the field of education in a business operating in the field.
2) Know and analyze cyber assets in terms of information security.
2) Has awareness for ethical and social responsibility.
2) Information Security Creates procedure and control components
2) Explains the importance of authorizing users as much as they can.
3) Explains the necessary policies and processes for effective event management.
3) Questions the application with theoretical knowledge.
3) Identify non-technological tools and methods against cyber attack.
3) Experience the cyber security risk management system.
3) Lists the tasks and responsibilities required to identify and prevent any abuse that may occur in local area networks.
3) Takes responsibility as a team member in works and operations of his/her field.
4) Explains the importance of monitoring the cyber systems for the correct structuring of the powers, the realization of the realized, failed or failed cyber attacks, the timely response to the protection and the fulfillment of the legal requirements.
4) Is aware of written, verbal communication and interaction.
4) Applies the theoretical knowledge learned in business life for a semester.
4) Identifies the methods and methods of technological methods against cyber attack.
4) Compiles the knowledge and experience gained in the field.
5) Follows the developments of advanced technology and digital transformation.
5) Acquires the competencies defined as the institutional outcomes of Beykoz University on the basic level, inline with the expectations of business world and the society.
5) User training and security awareness describes the importance of cyberspace.
6) Acquires the awareness for lifelong learning.
6) Recall national and international legislation and regulations related to the field of Information Security Technology.
7) Defines the fundamentals of programming and algorithm information.
7) Has awareness about citizenship competency.
8) Evaluates the developments of his/her field with the understanding of an entrepreneur.
9) Acquires communication in a Foreign Language (English) competence defined on the level of at least A2 in European Language Portfolio. (In programs whose medium of instruction is English, on the level of B1).

SECTION IV: TEACHING-LEARNING & ASSESMENT-EVALUATION METHODS OF THE COURSE

Teaching & Learning Methods of the Course

(All teaching and learning methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Teaching and Learning Methods defined at the Programme Level
Teaching and Learning Methods Defined for the Course
Lectures
Discussion
Views
Reading
Homework
Technical Visit
Course Conference
Brain Storming

Assessment & Evaluation Methods of the Course

(All assessment and evaluation methods used at the university are managed systematically. Upon proposals of the programme units, they are assessed by the relevant academic boards and, if found appropriate, they are included among the university list. Programmes, then, choose the appropriate methods in line with their programme design from this list. Likewise, appropriate methods to be used for the course units can be chosen among those defined for the programme.)
Aassessment and evaluation Methods defined at the Programme Level
Assessment and Evaluation Methods defined for the Course
Midterm
Final Exam
Quiz
Homework Evaluation

Contribution of Assesment & Evalution Activities to Final Grade of the Course

Measurement and Evaluation Methods # of practice per semester Level of Contribution
Quizzes 1 % 10.00
Homework Assignments 1 % 10.00
Midterms 1 % 30.00
Semester Final Exam 1 % 50.00
Total % 100
PERCENTAGE OF SEMESTER WORK % 50
PERCENTAGE OF FINAL WORK % 50
Total % 100

SECTION V: WORKLOAD & ECTS CREDITS ALLOCATED FOR THE COURSE

WORKLOAD OF TEACHING & LEARNING ACTIVITIES
Teaching & Learning Activities # of Activities per semester Duration (hour) Total Workload
Course 15 2 30
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 2 15 30
Presentations / Seminar 0 0 0
Project 0 0 0
Homework Assignments 1 8 8
Total Workload of Teaching & Learning Activities - - 68
WORKLOAD OF ASSESMENT & EVALUATION ACTIVITIES
Assesment & Evaluation Activities # of Activities per semester Duration (hour) Total Workload
Quizzes 1 1 1
Midterms 1 1 1
Semester Final Exam 1 1 1
Total Workload of Assesment & Evaluation Activities - - 3
TOTAL WORKLOAD (Teaching & Learning + Assesment & Evaluation Activities) 71
ECTS CREDITS OF THE COURSE (Total Workload/25.5 h) 3