Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Koyuncu, M."

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Article
    Do Users Sacrifice Security for Speed and Ease-Of on Smartphones? a Case Study on Attitude
    (IGI Global, 2020) Nakip, M.; Pusatli, T.; Koyuncu, M.
    Storing credentials on smartphones to perform online activities increases ease-of-use (EoU) and speed. However, such practices increase security risks, especially if users use a number of applications or store data on their smartphones. Risks become more complicated by keeping smartphones online. This work aims to find potential relationships between security perceptions of smartphone users and their ease-of-use and speed preferences. Two user attitudes are defined as “not considering risk” and “risk exaggeration.” User ease-of-use and speed preferences are limited with the factors related to storing credentials on a smartphone and always keeping the device online. A survey of 154 participants was conducted through convenience sampling. Through regression analyses, logarithmic causality relations are found between EoU and speed and attitudes of not considering risk or risk exaggeration; so the participants preferred to take advantage of EoU and speed despite the fact that they were aware of the risks. Copyright © 2020, IGI Global.
  • Loading...
    Thumbnail Image
    Conference Object
    Security Requirements in Iot Environments
    (Springer Science and Business Media Deutschland GmbH, 2022) Koyuncu, M.; Pusatlı, T.; Binglaw, F.
    The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback