Bilgi Teknolojisi Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/298
Browse
Browsing Bilgi Teknolojisi Bölümü Tezleri by Scopus Q "N/A"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Article Citation - WoS: 0A model for adopting cloud computing in government sector: Case study in Iraq(Nadia, 2020) Al Bajjari, Faten; Hassanpour, Reza; Yazılım MühendisliğiCloud computing is an on-demand delivery system of computing resources, such as servers, databases, storage, networking, software, and analytics, over the Internet on a pay-for-use basis. This technology is not currently widely utilized in government institutions, especially in the case of Iraq, for different factors. The main objective of this research is to identify the most critical factors that prevent the adoption of cloud computing, through developing a conceptual model that integrates the Technology Organization, and Environment (TOE) framework, Iacovou et al.' s model, and the Diffusion of Innovation (DOI) theory. The key factors influencing the adoption of cloud technology have been determined through literature review. The results show that the most significant concerns that can have a negative impact in the decision of adoption are as follows: feasibility, trust, regulatory concerns, IT readiness, privacy, compatibility, government support, availability and reliability, industry type, security, cost, complexity, organization size, organization culture, as well as direct benefits and indirect benefits have a positive impact in the decision of cloud adoption. Moreover, the researchers used the CloudAnalyst simulator to identify the real time performance of the cloud technology environment, and applied two algorithms via this tool, namely the Analytical Hierarchy Process (AHP) technique, which used to obtain the weight of variables depending on the questionnaire results, and the Elliptic Curve Digital Signature Algorithm (ECDSA), which used to identify the privacy and security of cloud technology. Finally, the researchers have proposed guidelines to help government institutions to move to the cloud environment in an effective manner.Conference Object Citation - Scopus: 0Adoption of case tools & uml: A local study(Association for Computing Machinery, 2020) Ashour, O.I.A.; Pusatli, T.; Yönetim Bilişim SistemleriThis research investigates the role of CASE tools in the software development process by considering importance of CASE in adopting a number of standards. A survey was conducted in six selected companies in Ankara in which semi-structured interviews are conducted with information system managers and developers as key informants. As results, CASE and UML are reported as being considerably used in Ankara with CASE tools being used for project members' communication and documentations. Furthermore, CASE tools have been used for some companies for documentation as parts of contracts and to follow standards such as ISO and CMMI. CASE tools are used to facilitate project developments, especially when enforced by the standards and methodologies required in the contracts. © 2020 ACM.Book Part Citation - Scopus: 0Maintaining cybersecurity awareness in large-scale organizations: A pilot study in a public institution(IGI Global, 2023) Aslan, M.; Pusatli, T.; Yönetim Bilişim SistemleriResearch was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users' cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. © 2023, IGI Global. All rights reserved.