Graduate School of Natural and Applied Sciences
Permanent URI for this community
Browse
Browsing Graduate School of Natural and Applied Sciences by Subject "information systems"
Now showing 1 - 20 of 20
Results Per Page
Sort Options
Item A LITERATURE SURVEY ABOUT VERTICAL AND HORIZONTAL SCALABILITY IN CLOUD COMPUTING(2022-02-14) TAYEB, Abdulsalam Salim Tayeb; KOYUNCU, MuratCloud computing has gained popularity in the industry due to the expansion of data generation from various domains such as physics, sciences, business and so on. Scalability can play an essential role in clouds and can improve their performance. The importance of scalability lies in its ability to cope with the increasing workloads by adding additional resources when demand increases. Typically, there are two types of scalability, namely horizontal scalability and vertical scalability. Hence, there are different classifications of scalability in the literature. This thesis is intended to be a comprehensive survey covering all available scalability techniques in cloud including different classifications based on different criteria. This study basically investigated vertical and horizontal scalability methods. In addition, it explores the used technologies for both of them. Moreover, it determines the amount of research publications related to scalability from different perspectives. To reach the specified goal, a systematic mapping study has been done about scalability.Item A PROPOSED INTEROPERABLE MODEL FOR THE REPUBLIC OF TURKEY ON PUBLIC ELECTRONIC PROCUREMENT SYSTEM(2015-02-27) YILDIRIM İMAMOĞLU, Meltem; REHAN, MohammedApproximately 15% of the government‘s Gross Domestic Products (GDP) is spent on public procurement process. Therefore, accountability and transparency in public procurement is very important. For the regulation of public expenditures and effective use of the budget, not only public procurements but also efficient use of infrastructure that make up the system for public procurements should be considered. As a result, the importance of the public electronic procurement (PeP) processes is emphasized in this thesis. Public Procurement Authority (PPA) and the State Procurement and Supply Office (SPSO) responsible for public tenders in the Republic of Turkey, are two organizations affiliated to the Ministry of Finance. However, in public procurement process, both institutions have their own system, own business processes and legal obligations. Yet is it a privilege to have two different systems? To find the answer to this question and to analyze the current situation in both systems, satisfaction measurement surveys for both public and private organizations are conducted. In addition to the surveys, interviews are carried out by authorized people from different organizations concerned with public procurement process in the European Union (EU) and in the Republic of Turkey. In light of the information obtained from these interviews, the best three countries (England, Germany and Denmark) are investigated in detail. The results of these studies showed that EU countries, are paying an increasing importance to the efficient use of resources by the Digital Single Market system, a shift to a more centralized application is noted. In the thesis, based on the current Public electronic Procurement (PeP) system analysis, Critical Success Factors (CSFs) and required performance criteria in public procurement for achieving these success factors have been identified. It seems that the execution of public procurement process from a single platform is inevitable for the Republic of Turkey. Transparent and accountable systems are necessary to increase the participation of the public institutions and Small and Medium Sized Enterprises (SMEs) into the PeP system. All of results after the research study indicate that an interoperable PeP system is inevitable for the Republic of Turkey. This study may be claimed to be a pioneer for the use of supply chain management in public procurement process.Item A TASK FLOW DESIGN TOOL FOR SERIOUS GAMES: AN EXTENDED VERSION OF UML-AD (UML-ADE)(2014-10-06) TOPALOĞLU, Eda; ÇAĞILTAY, NergizBy improving technology, serious game is widely used by several areas such as defense, science, exploration, health care, emergency management, military management, city planning, engineering, religion and politics. However, development and design of these serious games is more important than playing them. Therefore, in order to create successful serious games, involving domain experts and end-users into the development process is important and necessary. During the development process, communication among those people is a very critical factor to better design and development of the game features according to the expected outcomes. In this study, UML Activity Diagram (UML-AD) is analyzed to represent the scenario flow of a serious game and document the serious game design. Additionally, for the design of serious game, an extension of UML-AD, named as UML-Activity Diagram Extended (UML-ADE), is proposed. The main purpose of the UML-ADE model is to improve the level of understandability of the UML-ADE with both the domain-experts, technicians and end-users. Therefore, the understandability level of the proposed UML-ADE model by technicians is investigated, evaluated experimentally. Results of this study show that the understandability level of proposed UML-ADE model is significantly higher than that of UML-AD.Item BENEFITS AND CHALLENGES OF BIG DATA ON CLOUD FOR SMES AND GOVERNMENT AGENCIES(2022-02-25) Rashed, Alaa Hussain Rashed; Karakaya, Ziya; Yazıcı, AliBig Data and Cloud computing are the most important technologies that give the opportunity for SMEs and government agencies to gain a competitive advantage and improve their organizations. Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. Cloud computing, on the hand, offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to identify the benefits and challenges of Big Data on Cloud for SMEs and government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for the challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from literature.Item DETECTING RESEARCH THEMES AND TRENDS IN MOBILE LEARNING FROM ITS EXISTENCE TO TODAY, USING TOPIC MODELING(2022-01-11) ALGABSI, SALAH EDDIN; Ekin, Cansu ÇiğdemNowadays, a mobile phone is more than just a phone; it is a smart device that can be used to educate individuals, enabling enhanced features for learning, and leading to an increased interest by scholars in leveraging mobile devices to develop a new paradigm of modern education. Recently, with the spread out of the Covid-19 pandemic, countries worldwide have become more orientated towards developing distance learning technologies, specifically online/e-learning, resulting in the emergence of Mobile Learning domain (m-learning) that becomes attractive and pervasive globally. This study aims to detect the longitudinal research trends of mobile learning from its existence to today. First, the study conducted a wide-spectrum literature review on the former studies in m-learning to evaluate the former state of the domain knowledge. Second, the study applied text mining techniques using Latent Dirichlet Allocation (LDA) Topic Modeling to the mobile learning publications content. The main findings of this study concluded 12 dominant topics in m-learning. The Top Three Topics were: “Learn with Mobile Technology”, “Student Language Learn”, and “Learning Design”Item FACTORS AFFECTING THE INTENTION TO ADOPT CLOUD COMPUTING AMONG COLLEGE STUDENTS IN IRAQI HIGHER EDUCATION INSTITUTIONS(2022-01-20) Fadhil, Estabraq Abbas; Toker, SacipCloud computing is a revolutionary technology that has remodeled many fields, including education, health, government organizations and business. This technology offers numerous on-demand options for organizations to boost their performance and to reduce the cost of production, infrastructure and applications. However, many academics have investigated the topic of cloud computing with regard to factors that influence the adoption decision, especially in developed countries. But, the study still at an immature stage in emerging countries, especially in Iraq. Furthermore, many of the current problems have not been fully researched, particularly in the higher education institutions. As it is known cloud computing is based on services managed by third-party providers. For that reason, trust in cloud services and the perception of possible threats, such as privacy and security concerns, are critical to ensuring the efficient adoption of the appropriate cloud. On the other hand, most studies have researched the technological dimensions of cloud based systems, such as cloud virtualization and scalability. Even though, it is claimed that the biggest challenge to cloud computing is not technical, but instead cognitive or attitudinal. Accordingly, and in an attempt to close this gap, this study investigates the influences that impact the acceptance of cloud technologies by Iraqi universities. This study is focused on the modified Technology Acceptance Model (TAM) as a framework for the creation of the study model. Based on the factors of the proposed modified TAM, research questions are investigated. The factors are: Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitudes toward the cloud (ATT), Behavioral Intention (BI), Perceived Risks (PR), Trust (TR), Anxiety (ANX), Actual Use (AU), Perceived Benefit (PB), Perceived Overall Concern (POC), Perceived Cost of Usage (PCU), Perceived Speed of Access (PSA), Social Influence (SI), Culture Context Issues (CCI) and External Storage (ES). These variables are determined through the use of verified items from previous studies. This study employed a quantitative process methodology including data collection and analysis. The suggested model is reviewed and validated using a questionnaire survey conducted online in Iraqi universities groups. Amidst 601 responses received, 576 are valid for data analysis. The questionnaire is divided into two parts: the first set for participants who use cloud computing, and the second directed for the one who do not use cloud computing. The IBM SPSS Statistical Package and the Analysis of Moment Structures (AMOS ver. 24) software are used for data analysis. The suggested model was empirically examined using hierarchical multiple linear regression alongside the Structural Equation Model (SEM). The findings of this study indicate that factors such as Perceived cost, Perceived speed, Social Influence to use cloud computing, a general positive feeling about clouds, variables, that play a significant role in motivating students to adopt cloud computing as part of their core curriculum. On the contrary, factors such as a general negative feeling about clouds, Availability of information and Using External storage It has proven to have a negative impact on the student's intention to adopt cloud computing. Such factors proved to play a significant role in preventing students from embracing cloud computing as part of their education. In conclusion, this study has led to a greater comprehension of the students' intention to use cloud computing at Iraqi universities. This offered deeper insight into the key factors that affect students ' decision to accept and use cloud computing services. As well as, the proposed model, including such factors, has been demonstrated to be a true predictor of user intentions, within the context of Iraq.Item Factors Affecting Trust in B2C E-Commerce: A Case Study on Foreigners Residing in Turkey from Middle East and North Africa Region(2022-02-25) ALSWIAY, SALAHEDDIN ALI NASERE; Çağıltay, Nergiz ErcilE-services are a real revolution at present as they have contributed to time savings and speeding transactions in addition to transferring business from traditional to electronic. E-commerce crosses borders and makes possible the completion of purchases from thousands of miles away. In other words, buying and selling products and services online is possible through e-commerce services, with all transactions being performed electronically, without actual contact between the customer and merchant. However, the quality of these services is critical for the improvement and success of e-commerce. Certainty and confidence in e-commerce should be essentials factor to improve trust. A combination of self-regulation, technology, and legislation should be adopted by enacting similar regulations and regulations applied in the traditional trade to protect consumers and identify related consumer obligations. Trust is a critical factor in developing relationships between online merchants and customers. Faith is also necessary to close the gap between the developments in information systems and people’s understanding of their socio economic impacts (such as an information system’s perceived effect on customer confidence). This study reviews the results of previous confidence studies from a social, economic and technological perspectives and it sets a comprehensive model for maintaining trust in online transactions to identify ways to increase trust. For a better understanding of trust in e-commerce, we prepared a questionnaire and sent it to foreign people living in Turkey. The study relied on the answers to the questions about the correlation between the factors affecting trust and whether there was an impact on the direction of the market and also whether there was a statistical significance between the demographic variables of the questionnaire respondents. The SPSS application was used to analyze the data collected. The results showed that the factors that directly affected confidence in B2C include market orientation, perceived security, technological doctrine, and relational excellence. Therefore, we needed to develop a comprehensive model that explained the interaction between the factors that affected trust in e-commerce. Trust e-commerce consists of four dimensions, namely ability, goodness, integrity, and predictability. Moreover, based on our results there is a need to improve security features and privacy issues, which can be carried out by updating the previously proposed model to address B2C confidence factors in e-commerce.Item FPGA BASED PACKET HEADER CLASSIFICATION FOR NETWORK INTRUSION DETECTION SYSTEM USING SNORT RULES(2022-01-17) AL BEHAADILI, YOUSIF HOSAIN DAKHIL; Özbek, Mehmet EfeIn data communication through internet, network security became an influential issue. One way to support it is by classifying and filtering incoming packets within devices of network. Packet header classification is an essential task for network devices such as Intrusion Detection System (IDS), it is an important technique for secure networking and communication. Internet services and security tools utilize technique of packet classification which includes checking of each incoming packets against predefined rules. In this research, a new algorithm for packet header classification of network intrusion detection system based on Field Programmable Gate Array (FPGA) has been presented using finite state Machine (FSM) technique. The presented algorithm compares the header fields of incoming packet with predefined rules that stored in block ROM FPGA memory to finding the matching between them and applying some snort actions on them to classify the incoming packet. The FPGA platform has been chosen for this research because of its high speed and quality in processing especially in digital system design. The proposed packet header classification algorithm described in Verilog language and then implemented in Xc7a100tcsg324-1 FPGA board using Xilinx_Vivado 18.2 software. The simulation result show the proposed architecture can classify the incoming packet successfully as desired and the maximum throughput of more than 100 Mbps was achieved.Item INVESTIGATING CONFORMANCE OF E-GOVERNMENT WEB SITES IN LIBYA TO W3C ACCESSIBILITY STANDARDS(2022-02-25) ALGHOUL, Haifa; KOYUNCU, MuratToday's people cannot bear a life without the Internet. It provides access to many things like news, email, shopping, and entertainment, at anytime and anywhere. Governments around the world have adopted the Internet as a channel to introduce their information and services to citizens, businesses and other government sectors. The government websites work as an interface between the government and the citizens. E-government applications utilizes web technology for making information accessible online to as many people as possible regardless of their disabilities. Accessibility is essential for governments that want to create high quality websites and web tools, and not exclude citizens from using their services. This thesis investigates the status of current government websites in Libya in terms of accessibility, which is one of the World Wide Web Consortium (W3C) criteria to develop high quality web sites. It tries to find out whether e-government websites comply with the guidelines developed by W3C. In this study, several web diagnostic tools are used for investigation. Several suggestions are offered based on the results of the research.Item LOGISTICS SYSTEM TRANSITION TOWARDS ENTERPRISE RESOURCE PLANNING: A CASE STUDY(2022-01-25) Alansari, Saeeda; MISHRA, AlokToday, in order to achieve a competitive advantage organization should implement supply chain effectively and have such a product in logistics services. Otherwise, the traditional way of this process causes a problem of not covering everything and it is releasing the risk in organization of missing invoices yearly and not recording it. The director needs to have statistics recorded and accounting payment for every purchase and inventory. In the traditional way, the clerk enroll the data by using excel sheet and count manually by hand with old calculation methods which is very risky for he company. Further more, old machine can be damaged or crash from different reasons an example of that, viruses‘ issues in hard disk that crash the machine then all the data will be lost. Moreover, only one clerk is responsible so if the clerk gets sick the all works for purchases and inventory risk to be delayed. To perform activities effectively and value chain for organization competitiveness it is required to run supply chain in best manner by logistic services information system. Supply chain management has two purposes, firstly product reaches to the end users for multiple departments of the organization, secondly to deliver product to the final customer because it provides many benefits in managing product with coordination and monitoring everyday materials management. To improve the departments in terms of best strategic information system and avoid all the associated risks it is required to have a specific system for inventory control system. Therefore, the main objective of this thesis is to illustrate transition of existing system towards Enterprise Resource Planning Systems (ERP). It also explains inception plan to develop the software and search towards the best system keeping in view many organizational constraints. This also include survey outcome to measure the relationship between management models and organizational innovation in internal processes as part of management efforts towards new system planning.Item PERCEPTIONS AND ATTITUDES OF LIBYAN HEALTHCARE PROVIDER TOWARDS ELECTRONIC HEALTH RECORDS(2022-02-17) Osman, Magdah; Çağıltay, Nergiz ErcilElectronic health records may have several benefits for hospitals, health professionals as well as patients. Electronic Health Record (EHR) systems provide basic clinical data that increase the quality of healthcare provided to citizens and benefits the community. The aim of this study is to evaluate and estimate the healthcare providers’ perceptions and attitudes towards the use of EHR in their environments in Libya. A sample of 110 health sector participants from various medical specialties in Libyan hospitals was targeted. The purpose of this research was to determine the perceptions and attitudes of Libyan healthcare providers towards EHR usage, by analyzing their demographics, organizational characteristics and the social, technical factors that possibly affect the EHR usage. Accordingly, survey method based on the previous studies is implemented through Survey Monkey environment; after the data collection was completed SPSS was used for statistical analysis, the results of the research lead to EHR factors Management support, Involvement and Adequate training have positive correlations with healthcare provider’s perceptions and Attitudes, while Autonomy and healthcare provider-patient communication have negative correlations with healthcare provider’s perceptions and had significant strong positive correlations with Attitude.Item PRACTICAL MODEL BASED SOFTWARE TESTING(2015-07-26) ÇOŞKUN, Rengin; MISHRA, DeeptiIn this thesis, it is proposed a new approach using both manual and automated testing for MBT. The goal is to find successful test cases. Many different research papers are studied and UML sequence diagram examples of these research papers as a model are used in this thesis. Two new algorithms are written for manual testing. It is designed a new tree technique using depth first search path algorithm to find test path. It is written a new java junit testing code to find test paths automatically in automated testing. It is used same operation for both manual and automated testing and also, it is examined these two methods with same sequence diagram examples. However, effective results are not achieved because of determination of same results and errors in automated testing. Therefore, automated testing (java junit testing) code is improved using different methods. It is compared manual, improved automated method and research papers methods using same examples. Finally, it is obtained more successful test paths and test cases from the improved automated testing method according to the manual and research papers testing methods.Item RELATIONSHIP BETWEEN WEB PRESENCE AND USABILITY OF UNIVERSITY WEBSITE: THE CASE OF LIBYA(2022-02-14) SALEH, MUFTAH S. SAIED; Toker, Sacip; Ertürk, Korhan L.Technology is still experiencing significant development in the area of communications and Internet services. Today’s commercial and educational institutions cannot compete in their field and gain new customers without an adequate online presence and satisfactory usability of their web portfolio. In this highly competitive world, websites are one of the main areas of interest for largescale organizations to increase their level of competitiveness. Some of the most important aspects of commercial websites are their visual esthetics and their usability from an end-user perspective, and therefore both of these aspects are developed and subsequently exploited in order to gain the satisfaction, confidence and ultimately the business of its target users. In the current research, two methods of study were followed: user testing and satisfaction survey. Usability assessment was conducted through interviews held with 61 Libyan students who were assigned to study at Turkish universities. The sample group were divided into two cohorts. Cohort 1 consisted of 31 participants who performed five predefined tasks in order to determine the ease of use and efficiency of Libyan universities’ websites. Analysis was performed of their task success rates, as well as the recording of participants’ observations. Cohort 2 consisted of 30 participants who carried out the same tasks as Cohort 1, but were then asked to complete a satisfaction questionnaire. The study aims to help Libyan universities to improve their web presence and to learn about common issues regarding the advantages and disadvantages found with these university websites in order that they can benefit from each other’s experiences. The choice of websites was based on the global classification of Webometrics. At the 2017 start of this research, four out of the top five universities in Libya, ranked according to the Webometrics ranking system, were selected for evaluation in the current study. So as to make a fair assessment, each participant was assigned five similar tasks to be performed on the Arabic language interfaces of the four selected Libyan universities’ websites. The survey consisted of a set of questions designed to prove the level of each websites’ effectiveness. At the beginning of the survey, the five tasks to be conducted by the participants were described based on the chosen university websites, and then the respondents are asked to complete the survey. Participants in Cohort 1 reported experiencing many problems in the usability of the websites, in addition they stated a failure to meet the end-user requirements, even though the phrases and words on the website were familiar to the participants. On the other hand, according to the participants’ observations and the method that they operated the selected universities’ websites, the participants found the most easy to use websites belonged to Misurata University and to the University of Tripoli, with the most difficult to use websites belonging to the Libyan International Medical University and the University of Benghazi. This result was also noticeable based on the length of time it took the participants to accomplish their tasks on each website. Results from both cohorts highlighted the weakness of presence of the Libyan universities’ websites. Participants in Cohort 2 were reportedly also dissatisfied with the Libyan universities websites as evidenced by their completion of the satisfaction survey.Item THE FACTORS IMPACTING E-READING MEDIA PREFERENCES(2022-01-10) ALBASRI, ANEES BASIL ABDULKAREEM; TOKER, SACİPE-reading has been a thing in its simple form since computers were introduced; the use of devices to read text (for leisure or professional purposes) has been drastically increasing over the years, especially in the recent ones, so much that it has become somewhat of a necessity for many people, due to the advantages it provides. It is considered a highly dense topic to research on since there is an increasing demand for it. Nowadays, all smart devices offer the ability to read books etc. and not just computers, as well as the introduction of the dedicated e-readers such as Kindle. Our study revolves around the factors that have an impact over the specific e-reading media preference. We discuss advantages and disadvantages of e-reading, how e reading is compared to paper reading, and mental effort associated with reading from screen among other things as well. The study is conducted by creating a questionnaire for an online survey, in which 331 people voluntarily participated, from different countries and age groups. Results are extracted and analysed to discover the relation between each factor and specific media preference using correlation analysis. The study results show consistency to previous research work about the topic, a general preference towards reading from paper can be seen, while males showing more interest in e-reading than females. Smartphones were the most available device to users, but nonetheless paper had the dominance of preference for iv most materials. Thinking skills and other factors were also discussed and showed relation to the type of reading and preference. All study findings were discussed as well as limitations to the study and ideas for future work. ÖZET E-okuma, bilgisayarların tanıtılmasından bu yana basit formlu bir şey olmuştur; (eğlence veya profesyonel amaçlar için) metin okumak için cihazların kullanımı, özellikle son zamanlarda olmak üzere, yıllar içinde büyük ölçüde artmış ve sağladığı avantajlar nedeniyle birçok insan için neredeyse bir zorunluluk haline gelmiştir. E okumaya artan bir talep söz konusu olduğu için araştırma açısından oldukça yoğun bir konu olarak kabul edilir. Kindle gibi özel e-okuyucuların tanıtılmasının yanı sıra, günümüzde sadece bilgisayarlar değil tüm akıllı cihazlar kitap vb. okuma olanakları sunmaktadır. Çalışmamız, belirli e-okuma ortamı tercihi üzerinde etkisi olan faktörlere odaklanmaktadır. Çalışmada E-okumanın avantajları ve dezavantajları, e okumanın kağıttan okumaya kıyasla nasıl olduğu ve diğer şeylerin yanı sıra ekrandan okumaya ilişkin zihinsel çabaya ele alınmıştır. Çalışma, farklı ülke ve yaş gruplarından 331 kişinin gönüllü olarak katıldığı çevrimiçi bir anket yapılarak gerçekleştirilmiştir. Elde edilen sonuçlar korelasyon analizi kullanılarak her bir faktör ile belirli ortam tercihi arasındaki ilişkiyi keşfetmek için analiz edilmiştir. Çalışma sonuçları, konuyla ilgili önceki araştırma çalışmalarıyla tutarlılık göstermektedir, genel olarak kağıttan okumaya yönelik bir tercih görülebilirken, erkeklerin e-okumaya kadınlara göre daha fazla ilgi gösterdiği görülmektedir. Akıllı telefonların kullanıcılar için en ulaşılabilir cihaz olmasına rağmen, yine de kağıt, vi çoğu materyal için tercih üstünlüğüne sahip olmuştur. Düşünme becerileri ve diğer faktörler de tartışılmış ve okuma türü ve tercihi ile ilişkisi gösterilmiştir. Tüm çalışma bulgularının yanı sıra, çalışmanın sınırlılıkları ve gelecekteki çalışmalar için fikirler de ele alınmıştır.Item THE IMPACT OF PRIVACY AND SECURITY, UBIQUITY AND ATTITUDES ON M-COMMERCE CONSUMER BEHAVIOURS AND ADOPTION(2022-01-18) Ibrahim, Abubakar; Toker, SacipThe advancement in mobile technologies and the rapid penetration of mobile device users is revolutionizing the e-commerce and resulting to the wide use of mobile commerce which appears to be the future of online purchasing. However, in spite of the latest growth and advancements in mobile technologies and m-commerce related activities, there is a corresponding increase in issues such as privacy, security and risk which poses a threat to both consumers and m-commerce service providers or practitioners alike. Hence, there is a need to investigate the factors that influences consumer behaviour, attitude and behaviour intention towards m-commerce in order to proffer some useful suggestion to stakeholder. This research fills the gap by developing a conceptual model based on the Technology Acceptance Model (TAM) variables (perceived usefulness and perceived ease of use) and using external variables or factors such as privacy, security, and ubiquity is employed. A total of 311 questionnaires were distributed to smartphone users in Atilim University. The Structural Equation Modelling (SEM) and path analysis was used to test the model of the study. Based in our findings, we made recommendations and guidelines which were. Consequently, make recommendations from the findings that would be beneficiary to the stakeholders in the mobile commerce industry. The result of findings of this study reveals the positive significance of privacy, security, perceived usefulness, perceived ease of use, ubiquity and their impact on consumer behaviour, altitude and behavioural intention towards the actual use of m-commerce in turkey. The findings of this study will contribute to the current understanding of the subject matter and will be of beneficial as guide and reference to stakeholders that involve in m-commerce activities such as brand managers, retailers, providers and consumers. Additionally, the study will also be beneficial to researchers and students who which to undergo similar study in the context of m-commerce use in Turkey and beyond.Item THE IMPACT OF TYPES OF CYBERLOAFING, METACOGNITION, COGNITIVE STYLE, PERSONALITY AND SMARTPHONE USE ON COLLEGE STUDENTS’ ACADEMIC SUCCESS(2022-01-14) MUŞABAK, GÖKBERK İLKER; TOKER, SacipToday’s one of the raised problems is Cyberloafing. The explanation of “cyber” is doing something with smart devices on the internet and “loafing” means wasting time in an aimless way. The combination of these two words is Cyberloafing, which means people who have a tendency to do anything about non-related work while they are at work or school. For this reason, we could say that working or studying can be affected by cyberloafing. The reason why cyberloafing increased is that people can access whatever they need, wherever they are and whenever they are by their smart devices such as smartphones, tablets, laptops and so on. In most of researches focused on how cyberloafing affects employee’s performance on producing in a work environment and just few of them focused on academic success in education. The results shows that there is both pros and cons related to cyberloafing at work and school. In our study investigates that how college students’ academic success (e.g., GPA) influenced by types of cyberloafing, metacognition, cognitive style and need, personality and smartphone use motives or demotives. This study conducted by quantitative process methodology which includes data collection and analysis. The quantitative data was collected by survey questionnaire. It was analyzed by IBM SPSS STATISTIC version 26 and IBM SPSS AMOS version 24 for social science software. The model examined using hierarchical multiple regression. Data collected by survey from Atılım University students who are studying in engineering departments. The research was conducted with 231 undergraduate students. The age of students is between 18 and 25 years old. They were selected by a convenience sampling method. To conclude, this study shows that which factors can directly or indirectly influence academic success positively or negatively.Item THE IMPACT OF DESIGN AESTHETICS, PERSONALITY TRAITS, AND COGNITIVE REFLECTION ON PERCEIVED USABILITY, PRIVACY, TRUST AND CUSTOMERS LOYALTY(2022-01-17) Akinyemi, Olabode Felix; Toker, SacipUsability and human personal characteristics are central issues for internet (both website and mobile apps) users, as users need to access various functionalities through a limited user interface while cognitive reflection and personality traits differ. This study proposes some key determinants of internet usability and assess their significant influence in three empirical settings. In addition, this study examines the impact of design aesthetics, traits and user’s cognitive reflection on usability, privacy, and customer loyalty, and provides a holistic view of the causal relationship between the adopted human factors and some important organizational variables for building and maintaining long term consumer relationships. The study was conducted using survey questionnaire data collected from 338 students of Atilim University, Turkey. The findings of the study confirmed that simplicity and high level interactive platform design, privacy and users’ cognitive reflections are the significant determinants of internet usability, and that interface simplicity is an important prerequisite for a positive usability experience. Also, the findings showed that trust, usability, design aesthetics and personality traits are the vital determinants of consumer loyalty, which shows that trust and guarantee of users’ information on the platform are what drives satisfaction which formulate customers loyalty in the brand. Contributions and limitations of study were also discussed.Item UNDERSTANDING THE EFFECT OF SERIOUS GAMES ON SURGICAL EDUCATION WITH RESPECT TO SIMULATION ENVIRONMENTS(2015-01-30) GÜNEY, Sinem; ÇAĞILTAY, NergizSerious games and simulations today are providing several benefits for areas such as education, training, health, military as well as commercial systems. However, the borderline between these environments is not very clear in literature. This information is important for designing more appropriate instructional systems according to the variations on learners’ behaviours and their expectations. Our main assumption is that, depending on their experience levels, knowledge levels and individual differences, learners may behave differently on simulation or game based educational systems. Then, as a part of neurosurgery Education Project (ECE), a simulation environment was developed in two versions by applying a gamification approach and simulation. Afterwards, an experimental study was conducted to better understand the effect of gamification on beginners of such an education program. The results of this study indicate that the success rates of the participants for performing assigned tasks in both versions of the application did not change significantly. On the other hand, the gamification group has spent significantly more time for performing the assigned tasks by rarely referring to the navigation feedback. This consequence is evidence showing that the participants’ behaviours have differed in simulation and game-based environments. The results of this study is expected to provide innovative perspectives to the instructional system designers for improving possible benefits of simulations and games in different fields and user groups.Item UNDERSTANDING THE KEY SKILLS FOR INFORMATION SECURITY MANAGERS A DELPHI METHOD STUDY(2022-02-25) HAQAF, Husam; KOYUNCU, MuratInformation Security Management (ISM) is a necessity for all institutions and enterprises that consider their information as valuable assets. Therefore, developing, auditing and managing information security is dependent on professional talent that could achieve the required information security governance. The research seeks the key skills for information security managers that are required to maintain competency in the domain, as well as methods to acquire these skills through professional certifications. The study adopts a Delphi method, which requires building a set of items through a literature survey and involves experts with minimum expertise to modify the list until a consensus on less than 20% of the items is reached. After performing a literature survey of the Information Security’s standards, frameworks and studies, in addition to a data collection round by the experts, a total of 82 skills under 5 categories were compiled. The results of the study shortlisted 19.51% of the items with minimum mean score of 3.25 on a 7-point Likert scale through relevance and ranking rounds, as recommended by studies on the Delphi method. Moreover, 43.75% of the final items are core information security skills, and certifications including CISSP, CISA and CISM are recommended to acquire them.Item UNIVERSITY STUDENTS’ ATTITUDES TOWARDS CAPTCHA USE(2022-02-15) ELATRESH, Khalid; KOYUNCU, MuratCompletely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a type of techniques that is utilized in order to be able to distinguish the actual human users from bots or for determining the users that are authorized to access a website or a file on the Internet. This thesis aims at determining attitudes of Libyan students towards different types of CAPTCHA in WWW environment. It also analyzes user attitudes according to demographic and Internet usage information including gender, age, education level, for how many years they have been using the Internet, and how often they use the Internet. To fulfill the purpose of the study, a questionnaire was prepared and Libyan students studying in different levels and departments answered to the questionnaire that is published through the Internet. The data obtained is processed using SPSS 18.0 software package. The obtained results reflect that the participants are familiar with all of types of CAPTCHA since they use them every day through navigating in the Web for books or scientific articles. However, user familiarity for text-based CAPTCHA is higher than the others. The No CAPTCHA reCAPTCHA type is the most favored one from different perspectives including error freeness, easiness, and security. Therefore, we conclude that the No CAPTCHA reCAPTCHA type is the most preferred type by users.