Bilgi Teknolojisi Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/298
Browse
Browsing Bilgi Teknolojisi Bölümü Tezleri by Issue Date
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Master Thesis Expanding m-commerce possibilities through technology enabled devices(2013) Özbey, EnginPopular payment systems including asynchronous, online and mobile payments are investigated. Mobile phone payment systems are targeted after finding that mcommerce is projected to rise. With this increase in the market share, mobile devices are found-out to share physical wallets’ load as they can merge credit and ATM cards. The possibilities increase with the adoption of new technologies, such as NFC (Near Field Communication), so that the handsets can house loyalty, mass transport cards as well as electronically held money transfer ability. On the other side, the security issues including identity and money theft remain important although the expectations on converging physical wallets into the handsets are strong. However, this is not a definite obstacle and big service providers and vendors give signals to adopt such a technology in their services and products. As the conclusion, the thesis argues that e-commerce can expand more through additional technologies on the mobile devices.Master Thesis Obstacles to activating e-learning at Iraqi universities(Çankaya Üniversitesi, 2016) Shahoodh, GailanThis study adopts a quantitative research approach to evaluate the research problem using collected data from a survey questionnaire administered to 124 respondents (professors, instructors, employee and students) from different Iraqi universities. Using both online and hardcopy questionnaires that were based on the TAM framework, it included questions related to the demographics of the respondents and any obstacles in activating e-learning. The reliability of the questionnaire was tested and a high degree of internal consistency was found. Our study provides an analysis of each variable using descriptive statistics. Using factor analysis, we extracted four factors (Perceived Ease of Use (PEU), Perceived Usefulness (PU), Attitude toward Using and Actual System Use (ATU), and Behavioral Intention to Use (BIU) which were used in the correlation and regression analysis. Per the results of the regression test, the impact of PEU and PU were shown to be statistically significant in predicting and explaining both ATU and BIU. The results revealed that the impact of Perceived Ease of Use and Perceived Usefulness is significantly positive in affecting the attitude and behavioral intention of Iraqi universities' users towards LMS/e-learning, which is consistent with the TAM theory. Moreover, it shows that the two factors play a significant role in the acceptance of the new technology; i.e. the LMS at Iraqi universities can help to reduce any obstacles to e-learning implementation. In addition, conclusions and suggestions for future work are highlightedMaster Thesis Emoji usage in twitter data: Analyzing users' interpretations of emoji ideograms(Çankaya Üniversitesi, 2017) Marzoog, Dheyauldeen AbedIn conjunction with the significant growth in the use of social media, emojis have become a trending topic in informational technology related studies. New writing and communication styles using emojis are being used by people as a new language in different social media channels. This study adopts a quantitative research approach regarding emoji interpretations of users in order to evaluate the research problem using collected data from Twitter which is combined using the R program. These collected data are used in a survey questionnaire administered to 201 participants (students, staff and employees) from Çankaya University using Google Forms and shared by visiting the classes of students and by sending the survey using social media channels. This study aims to evaluate the interpretation of emojis by users. The methodology of the study depends on two parts, the first of which is the collection of data and the second using these data in a survey. The survey included questions related to the demographics of the respondents and questions about using social media and emojis. Then the remaining questions about the interpretation of the 201 participants for each of the top 100 emojis were collected from the R program as 'negative,' 'neutral' and 'positive.' Later, the study analyzed the results, which revealed that some of the emojis have different interpretations for different users.Master Thesis Use of content management systems in business: A comparison of open source content management systems(Çankaya Üniversitesi, 2017) Al-Tameemi, Ahmed Abdulmahdi HusseinThere are many Content Management Systems (CMSs) that have appeared and were adopted in the mid-1990s to satisfy the needs of providing optimal solutions in organizing business website content. Due to the many controversial arguments about what CMS is appropriate for a business website, this study aims to help decision makers and IT managers in businesses to decide on the best open source CMS. In this study, the latest versions of three widely used CMSs, namely WordPress, Joomla and Drupal, have been selected according to their market share. Our methodology has four steps. In the first step, while developing comparison criteria, we published an online survey that represents a pool of 76 candidate criteria to be determined according to IT experts' opinion according to their importance. We installed CMSs on online servers and we tested these systems according to absolutely essential and important criteria determined by experts in the field. We performed a functional analysis for each system, i.e., whether a system performs a specific criterion depending on a core feature "Built-in," or the system needs to be extended with a third-party extension "Plug-in." Our criteria covered the complexity of installation, social media integration, security, performance and usability features. Lastly, usability tests were conducted using the Post-Study-System-Usability-Questionnaire tool to discover which CMS offers the easiest learning curve. We concluded that Joomla is the best among its competitors because this system outperformed the other two systems and supported most of our criteria as core features. Furthermore, Joomla combines the flexibility of Drupal and the intuitive "User Friendliness" of WordPress as it allows the creation of high-quality websites by non-technical users. Joomla also offers a moderate learning curve based on final usability test results.Master Thesis Cloud computing impact on communication and service sector: Iraq case study(Çankaya Üniversitesi, 2018) Almafrchi, Sabah Salam HusseinRapid advancements in technology have enhanced the significance of the use of cloud technology. The deployment of cloud computing as effective technology integration has been successful, particularly across the developed states of the world. However, there have been certain behavioural issues regarding the cloud technology activation in certain developing regions, rather than the technical limitations. In the context, the current research aims to evaluate the impact of deployment of cloud computing on the communication and service sector of Iraq. Even though the cloud computing approach seems appealing, yet certain challenges of adverse extent are encountered across the states where internet penetration and technology acceptance is not considerable. Similar is the case with Iraq; hence, the researcher has targeted the communication and service sector of Iraq with respect to assessing the deployment of cloud computing. In this regard, the constructs of UTAUT model as identified dependent and independent variables of the study have been employed, in terms of conducting a multiple-item 5-point scale online survey across 251 IT experts of the targeted domain. Resultantly, it has been established that there have been certain challenges of disregarding cloud computing as an effective measure of enhancing productivity, and efficiency of the employees in a secure and feasible manner. Therefore, the study has recommended training and awareness programs that must present the credibility and integrity of cloud computing as an effective technological deployment. These programs assist accepting the cloud computing technology by the employees in the communication sector, which enables the employees, as well as the organizations, providing more efficient tasks by reducing the costs and efforts needed to perform the exact same tasks without the use of cloud computing technologies. This improvement also assists other employees and organization to accept that technology, which eventually leads to more and more acceptance to the cloud computing technology in the communication and service sector.Conference Object Adoption of Case Tools & Uml: a Local Study(Association for Computing Machinery, 2020) Ashour, O.I.A.; Pusatli, T.This research investigates the role of CASE tools in the software development process by considering importance of CASE in adopting a number of standards. A survey was conducted in six selected companies in Ankara in which semi-structured interviews are conducted with information system managers and developers as key informants. As results, CASE and UML are reported as being considerably used in Ankara with CASE tools being used for project members' communication and documentations. Furthermore, CASE tools have been used for some companies for documentation as parts of contracts and to follow standards such as ISO and CMMI. CASE tools are used to facilitate project developments, especially when enforced by the standards and methodologies required in the contracts. © 2020 ACM.Article A Model for Adopting Cloud Computing in Government Sector: Case Study in Iraq(Nadia, 2020) Al Bajjari, Faten; Hassanpour, RezaCloud computing is an on-demand delivery system of computing resources, such as servers, databases, storage, networking, software, and analytics, over the Internet on a pay-for-use basis. This technology is not currently widely utilized in government institutions, especially in the case of Iraq, for different factors. The main objective of this research is to identify the most critical factors that prevent the adoption of cloud computing, through developing a conceptual model that integrates the Technology Organization, and Environment (TOE) framework, Iacovou et al.' s model, and the Diffusion of Innovation (DOI) theory. The key factors influencing the adoption of cloud technology have been determined through literature review. The results show that the most significant concerns that can have a negative impact in the decision of adoption are as follows: feasibility, trust, regulatory concerns, IT readiness, privacy, compatibility, government support, availability and reliability, industry type, security, cost, complexity, organization size, organization culture, as well as direct benefits and indirect benefits have a positive impact in the decision of cloud adoption. Moreover, the researchers used the CloudAnalyst simulator to identify the real time performance of the cloud technology environment, and applied two algorithms via this tool, namely the Analytical Hierarchy Process (AHP) technique, which used to obtain the weight of variables depending on the questionnaire results, and the Elliptic Curve Digital Signature Algorithm (ECDSA), which used to identify the privacy and security of cloud technology. Finally, the researchers have proposed guidelines to help government institutions to move to the cloud environment in an effective manner.Book Part Maintaining Cybersecurity Awareness in Large-Scale Organizations: a Pilot Study in a Public Institution(IGI Global, 2023) Aslan, M.; Pusatli, T.Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users' cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. © 2023, IGI Global. All rights reserved.

