Browsing by Author "Pusatli, T."
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Conference Object Citation - Scopus: 0Adoption of case tools & uml: A local study(Association for Computing Machinery, 2020) Ashour, O.I.A.; Pusatli, T.This research investigates the role of CASE tools in the software development process by considering importance of CASE in adopting a number of standards. A survey was conducted in six selected companies in Ankara in which semi-structured interviews are conducted with information system managers and developers as key informants. As results, CASE and UML are reported as being considerably used in Ankara with CASE tools being used for project members' communication and documentations. Furthermore, CASE tools have been used for some companies for documentation as parts of contracts and to follow standards such as ISO and CMMI. CASE tools are used to facilitate project developments, especially when enforced by the standards and methodologies required in the contracts. © 2020 ACM.Article Citation - Scopus: 0Do Users Sacrifice Security for Speed and Ease-of-Use on Smartphones?: A Case Study on Attitude(IGI Global, 2020) Koyuncu, Murat; Pusatli, T.; Koyuncu, M.; Nakip, Mahir; Nakip, M.; 51704; 118963; Uluslararası Ticaret ve FinansmanStoring credentials on smartphones to perform online activities increases ease-of-use (EoU) and speed. However, such practices increase security risks, especially if users use a number of applications or store data on their smartphones. Risks become more complicated by keeping smartphones online. This work aims to find potential relationships between security perceptions of smartphone users and their ease-of-use and speed preferences. Two user attitudes are defined as “not considering risk” and “risk exaggeration.” User ease-of-use and speed preferences are limited with the factors related to storing credentials on a smartphone and always keeping the device online. A survey of 154 participants was conducted through convenience sampling. Through regression analyses, logarithmic causality relations are found between EoU and speed and attitudes of not considering risk or risk exaggeration; so the participants preferred to take advantage of EoU and speed despite the fact that they were aware of the risks. Copyright © 2020, IGI Global.Conference Object Citation - Scopus: 5Investigating end user errors in oil and gas critical control systems(Association for Computing Machinery, 2020) Alrawi, L.N.; Pusatli, T.; 51704System availability and efficiency are critical in the petroleum sector as any fault affecting those systems may negatively impact operations resources, such as money, human resources and time. Therefore, it has become important to investigate the reasons for such errors. In this study, human error has been targeted since a number of these errors is projected to increase in the sector. The factors that affect end user behavior are investigated in addition to an evaluation of the relation between system availability and human behavior. An investigation has been performed following the descriptive methodology in order to gain insights into human error factors. Questionnaires related to software/hardware errors and errors due to the end user were collected from 81 site workers. The findings indicate a potential relation between end user behavior and system availability. Training, experience, education, work shifts, system interface, usage of memory sticks and I/O devices were identified as factors affecting end user behavior, hence system availability and efficiency. © 2020 ACM.Book Part Citation - Scopus: 0Maintaining cybersecurity awareness in large-scale organizations: A pilot study in a public institution(IGI Global, 2023) Aslan, M.; Pusatli, T.Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users' cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. © 2023, IGI Global. All rights reserved.