Browsing by Author "Tolga Pusatli, O."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Book Part Citation - Scopus: 4Cyber Attacks and Preliminary Steps in Cyber Security in National Protection(IGI Global, 2015) Aydin, F.; Tolga Pusatli, O.Cyber attacks launched by individuals and/or supported by nation states have increased due to the prevalence of information technologies at critical infrastructure of the states. In this chapter, such attacks and consecutive impacts are visited. In connection with this issue, evolution of cyber threats from annoying malware to serious weapons is studied by examples; hence, precautions against such threats are visited and usage of anti-malware applications as prevalent precautions is assessed within the scope. Selected information security standards and strategies of selected states and precautions for cyber security of Turkey are studied. Our findings underline that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that governments should play an affective role to protect, educate, and guide governmental and private companies and citizens on the cyber security by promoting the cyber security topic in the successive national development plans. © 2015, IGI Global. All rights reserved.Book Part Citation - Scopus: 2A Model to Assist the Maintenance Vs. Replacement Decision in Information Systems(IGI Global, 2012) Tolga Pusatli, O.; Regan, B.An extensive literature review shows that Information Systems (IS) are changed and eventually replaced by substitutes under the influence of productivity, popularity, and specialisation of IS along with associated available support facilities, maintenance activities, failures, and user feedback. This chapter compiles those factors emerged from software engineering, IS, software quality assurance measurements, and computer science literature. A final product is a proposed model bringing those factors together as they are suspected to raise a need for taking the decision of evaluating change requests that may lead to a further maintenance or replace the IS. While keeping in mind that limitations on advanced testing exist, an expected service of such a model may help decision makers to explain maintenance/replacement decision of IS/component in a more itemized manner, hence diminish overburden pressure of experience responsibility on them. © 2012, IGI Global.Book Part Citation - Scopus: 1Cyber Attacks and Preliminary Steps in Cyber Security in National Protection(IGI Global, 2018) Tolga Pusatli, O.; Aydin, F.Cyber attacks launched by individuals and/or supported by nation states have increased due to the prevalence of information technologies at critical infrastructure of the states. In this chapter, such attacks and consecutive impacts are visited. In connection with this issue, evolution of cyber threats from annoying malware to serious weapons is studied by examples; hence, precautions against such threats are visited and usage of anti-malware applications as prevalent precautions is assessed within the scope. Selected information security standards and strategies of selected states and precautions for cyber security of Turkey are studied. Our findings underline that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that governments should play an affective role to protect, educate, and guide governmental and private companies and citizens on the cyber security by promoting the cyber security topic in the successive national development plans. © 2018 by IGI Global. All rights reserved.

