Department of Information Systems Engineering
Permanent URI for this collection
Browse
Browsing Department of Information Systems Engineering by Title
Now showing 1 - 20 of 32
Results Per Page
Sort Options
Item A CASE STUDY FOR DESIGNING AN ADAPTIVE LEARNING ENVIRONMENT BY APPLYING VARK MODEL(2017-05-02) Jaballa, Rabieaa Abdusalam Massaud; Eryılmaz, MeltemThe styles of learning are personal traits that affect how students relate with their learning environment, peers, and instructor. Four of the most popular are reading / writing, visual, auditory and kinetic, which used by students to gain information. Number of students is visual learners, while others are kinesthetic or audio or read /write learners. While some other students use a combination all of them to gain information, they seem to have preferences in how to learn better. Teachers must teach as more of these preferences as possible, in order to assist students learn. Teachers can put together these learning styles into core curriculum activities so that students can succeed in their classes. This study shows some parts of development framework to identify students learning styles and combination it automatically. This system is based on VARK learning style model and VARK questionnaire to measure students’ learning styles, it is hosting by internet to help students to use it. This study has used a sample of participants that consisted of 50 of engineering students from Atilim University. In addition, this study contain, an experimental design with a pre-post test Control group was utilized. Accordingly analysis of the data, the results show that distribution for t-test for two groups (Control group and Experimental group) was normality distribution and it was determined that the difference in mean scores between the Experimental group and the Control group was significantly in help of the Experimental group and the achievement level in the Experimental group, which applied the VARK teaching model, was higher compared to the Control group. In addition, student satisfaction questionnaire instrument, 10-items that measure students’ satisfaction by using the system, as the results found that students’ satisfaction with the system was significant very high.Item A COMPARATIVE STUDY OF CYBER SECURITY POLICIES(2017-06-02) Bderi,Haithem ABD Esharf; Mishra, AlokThe cyberspace is expanding faster than ever and with it cyber threats are also increasing making it imperative to have a strong cyber-security policy. Cyber-attacks don‘t only affect individual users and organization but can also cause national security issues. The different policies of different countries make it possible for hackers and intruders to carry cyber-attack while making it impossible for authorities to trace back offenders. It is important to develop a comprehensive Cyber-security policy to address all kinds of cyber threats so that every offender can be traced back and penalized accordingly. This research work examines and compares different attributes of cyber-security policies of selected countries. This research work identifies some important attributes which can help to develop an all-inclusive cyber security policy.Item A HYBRID METHOD FOR MISSING VALUE IMPUTATION(2022-02-16) Al-Brge, Basma; Koyuncu, MuratMissing data arises in almost all serious statistical analyses. Statistical analyses have a variety of methods to handle missing data, including some relatively simple approaches that can often yield reasonable results such as the random imputation approach. The missing data imputation process must be modeled in order to perform imputations correctly. Using datasets in empirical applications is very common to perform some tasks; however, missing values in datasets should be extracted from the datasets or should be estimated before they are used for processing to produce correct association rules or clustering in the preprocessing stage of data mining and processing. In this thesis, a hybrid approach is used that combines K-Nearest Neighbor (KNN) with Singular Value Decomposition (SVD) algorithm to improve the data imputation and produce data with high correlation with original missing values. The test results of the proposed hybrid method are compared with the results of several alternative methods for different rate of missing values and the results of the proposed method yields better performance than the others. The results are also compared with the reported results in the literature to give an idea about its performance.Item A LITERATURE SURVEY ABOUT VERTICAL AND HORIZONTAL SCALABILITY IN CLOUD COMPUTING(2022-02-14) TAYEB, Abdulsalam Salim Tayeb; KOYUNCU, MuratCloud computing has gained popularity in the industry due to the expansion of data generation from various domains such as physics, sciences, business and so on. Scalability can play an essential role in clouds and can improve their performance. The importance of scalability lies in its ability to cope with the increasing workloads by adding additional resources when demand increases. Typically, there are two types of scalability, namely horizontal scalability and vertical scalability. Hence, there are different classifications of scalability in the literature. This thesis is intended to be a comprehensive survey covering all available scalability techniques in cloud including different classifications based on different criteria. This study basically investigated vertical and horizontal scalability methods. In addition, it explores the used technologies for both of them. Moreover, it determines the amount of research publications related to scalability from different perspectives. To reach the specified goal, a systematic mapping study has been done about scalability.Item A SYSTEM PROPOSAL FOR COUNTING THE NUMBER OF PEOPLE IN STILL IMAGES(2017-01-07) AL-ZUBAIDI, Waleed; KOYUNCU, Murat; information technologyCounting people in images is a challenging task in the computer vison. This thesis targets to estimate the number of people in images accurately. Our focus is on implementing a robust counting algorithm that depends on different approaches together to detect humans having different appearances in images. Three different approaches are taken as the base of the proposed people counting method. These approaches are frontal face detection, human whole body detection, and people head detection. The main contribution of this thesis is using different approaches together for counting people in still images. We have done that by using Viola-Jones algorithm for face detection, the HOG features and SVM classifier for human body detection, and Hough transform and morphological image processing for head detection in crowded images. Any image is processed by three detectors in parallel and detected people are counted. Then, their results are combined for a final decision. The proposed method is implemented in the C++ language with the help of the OpenCV image processing library. The proposed method is tested and compared with some other approaches. The experimental results show that the proposed method achieves more successful results compared to other approaches when test dataset includes various image categories.Item A TASK FLOW DESIGN TOOL FOR SERIOUS GAMES: AN EXTENDED VERSION OF UML-AD (UML-ADE)(2014-10-06) TOPALOĞLU, Eda; ÇAĞILTAY, NergizBy improving technology, serious game is widely used by several areas such as defense, science, exploration, health care, emergency management, military management, city planning, engineering, religion and politics. However, development and design of these serious games is more important than playing them. Therefore, in order to create successful serious games, involving domain experts and end-users into the development process is important and necessary. During the development process, communication among those people is a very critical factor to better design and development of the game features according to the expected outcomes. In this study, UML Activity Diagram (UML-AD) is analyzed to represent the scenario flow of a serious game and document the serious game design. Additionally, for the design of serious game, an extension of UML-AD, named as UML-Activity Diagram Extended (UML-ADE), is proposed. The main purpose of the UML-ADE model is to improve the level of understandability of the UML-ADE with both the domain-experts, technicians and end-users. Therefore, the understandability level of the proposed UML-ADE model by technicians is investigated, evaluated experimentally. Results of this study show that the understandability level of proposed UML-ADE model is significantly higher than that of UML-AD.Item BENEFITS AND CHALLENGES OF BIG DATA ON CLOUD FOR SMES AND GOVERNMENT AGENCIES(2022-02-25) Rashed, Alaa Hussain Rashed; Karakaya, Ziya; Yazıcı, AliBig Data and Cloud computing are the most important technologies that give the opportunity for SMEs and government agencies to gain a competitive advantage and improve their organizations. Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. Cloud computing, on the hand, offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to identify the benefits and challenges of Big Data on Cloud for SMEs and government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for the challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from literature.Item COMPARISON OF FACE RECOGNITION METHODS(2017-01-07) Alaisawi, Salem Khalifa Mohamed; Şengül, GökhanMany studies and researches were conducted in the field of face recognition in order to get the best accuracy to attain and provide superior results. However, these studies achieved disparate results in terms of performance and accuracy, thus making it necessary to conduct studies that compare face recognition algorithms and emerge with results that demonstrate which of these algorithms give the best results. This study aims to compare three face recognition method, namely Principle Component Analysis (PCA), Speeded Up Robust Features (SURF), and Gray-Level Co-occurrence Matrix (GLCM). This comparison was tested on four images databases ORL, YALE, FEI, and FERET. The experimental results of this study showed that PCA outperformed the other two methods SURF and GLCM when tested on ORL, YALE, FEI, and FERET databases. The results of GLCM were less accurate and showed low performance as compared to the rest.Item DETECTING RESEARCH THEMES AND TRENDS IN MOBILE LEARNING FROM ITS EXISTENCE TO TODAY, USING TOPIC MODELING(2022-01-11) ALGABSI, SALAH EDDIN; Ekin, Cansu ÇiğdemNowadays, a mobile phone is more than just a phone; it is a smart device that can be used to educate individuals, enabling enhanced features for learning, and leading to an increased interest by scholars in leveraging mobile devices to develop a new paradigm of modern education. Recently, with the spread out of the Covid-19 pandemic, countries worldwide have become more orientated towards developing distance learning technologies, specifically online/e-learning, resulting in the emergence of Mobile Learning domain (m-learning) that becomes attractive and pervasive globally. This study aims to detect the longitudinal research trends of mobile learning from its existence to today. First, the study conducted a wide-spectrum literature review on the former studies in m-learning to evaluate the former state of the domain knowledge. Second, the study applied text mining techniques using Latent Dirichlet Allocation (LDA) Topic Modeling to the mobile learning publications content. The main findings of this study concluded 12 dominant topics in m-learning. The Top Three Topics were: “Learn with Mobile Technology”, “Student Language Learn”, and “Learning Design”Item DETECTION OF FORBIDDEN OBJECTS IN X-RAY IMAGES(2017-04-02) ALZEYADI, HaiderDetection of forbidden objects in x-ray scan images has become an important issue for customs border and airport security. Most border screening depends on the manual detection of possible forbidden objects by human experts. In this thesis, we present a system for detection of possible forbidden objects in x-ray scan images with minimal amounts of missing object (false negatives) and false alarms (false positives). Firstly, pre-processing steps are applied to obtain a clearer image. Then, segmentation is used to locate the potential objects in images. Feature extraction with two algorithms, local binary pattern and histogram oriented gradients, and classification with support vector machine are next steps in the system. The system is tested using handguns as the forbidden objects in question. The experimental results show that the system can effectively detect the handguns in x-ray scan images with minimal amounts of missing objects automatically.Item ENHANCEMENTS IN FINGERPRINT AUTHENTICATION(2017-06-02) Alsubaihawi, Mohammed Abdulraheem Taqi; BOSTAN, AtilaFingerprint identification and verification tasks are among the most challenging tasks in image processing and machine learning domains. Fingerprint processing presents a key issue in the biometric technologies and information security. According to the fraction of the people population based on the complete detection of the biometric fingerprint feature such as ridge structure, incomplete (portion) fingerprint image identification and verification task is very difficult to be accomplished. The main challenge in this problem is that the partial loss of the ridge structure in the incomplete fingerprint image. In this thesis, we studied the effectiveness of global feature approach in fingerprint identification and verification task that can deal with the partial image loss or incomplete fingerprint image. Global feature vector extraction is the main global approach that we contribute in this thesis. In this case, we implemented global geometrics based feature extraction for fingerprint identification and verification task. A set of global features (seven-moment values) were extracted from the partial fingerprint (incomplete fingerprint image). The study shows that global feature vector can more efficiently deal with incomplete fingerprint recognition problem when compared with the classical approach to the fingerprint identification and verification problem which is based on extracting minutia features from the fingerprint rides as well as the pores in different feature extraction levels. The studied system has been tested using a database that was randomly generated out of some random incomplete fingerprint images. Randomly generated incomplete fingerprint images were sorted into 10 groups according to the size of the missing part in each image. Then we randomly selected random images from each group to compose a new challenge dataset to be tested in two different approaches which are global, and Local feature extraction approaches. The experimental results show that global approach has about 87% while the local approach has 17% of identification and verification effectiveness. This means global approach improves the performance of the fingerprint identification and verification system on partial (incomplete) fingerprint images by 70% more than the classical approach.Item FACTORS AFFECTING ATTITUDES AND PERCEPTIONS OF CONSUMERS TOWARD E-COMMERCE TRANSACTIONS: A COMPARISON OF CITIZENS LIVING IN AND ABROAD LIBYA(2022-02-16) Elbarki, Ali Ibrahim; Toker, Sacip; Ertürk, Korhan L.This study is aimed to explore factors influencing customers’ online behaviors and their attitudes in E-commerce transactions in Libya focusing on differences between citizens living inside and outside Libya. The questionnaire was applied in this study depending on previous studies. The study targeted the Libyan citizens in Libya and abroad by sending the link of the questionnaire in the social media and pages of the Libyan communities abroad. The interaction was positive where 274 were responders in 24 days, some of the responses we consider outliers have been deleted so that we got a total of 249 respondents. The study examined the behavior of customers online with a focus on the barriers to the adoption of E-commerce, the cultural aspect and customer attitudes. The study concluded that differences between consumers of E-commerce in Libya and abroad and most negative indicators in who live in Libya. In general, Libyan consumers see E-commerce transaction not easy to learn. Also, although they believe the security level of the network is not easily invaded, they believe that there is a risk in dealing with E-commerce transactions. Besides, the consumers residing in Libya are less trust and more fearful for their personal information more than consumers residing abroad, On the other side, those who residing abroad believe for risk of identity theft more than who live in Libya. Therefore, we need to enhance all the factors and attitudes that have been negatively scored on residents within Libya. For example, suitable infrastructure, improve the online banking services, the increase of knowledge, overcome the difficulties and raise the level of confidence of consumers towards E commerce.Item FACTORS AFFECTING THE INTENTION TO ADOPT CLOUD COMPUTING AMONG COLLEGE STUDENTS IN IRAQI HIGHER EDUCATION INSTITUTIONS(2022-01-20) Fadhil, Estabraq Abbas; Toker, SacipCloud computing is a revolutionary technology that has remodeled many fields, including education, health, government organizations and business. This technology offers numerous on-demand options for organizations to boost their performance and to reduce the cost of production, infrastructure and applications. However, many academics have investigated the topic of cloud computing with regard to factors that influence the adoption decision, especially in developed countries. But, the study still at an immature stage in emerging countries, especially in Iraq. Furthermore, many of the current problems have not been fully researched, particularly in the higher education institutions. As it is known cloud computing is based on services managed by third-party providers. For that reason, trust in cloud services and the perception of possible threats, such as privacy and security concerns, are critical to ensuring the efficient adoption of the appropriate cloud. On the other hand, most studies have researched the technological dimensions of cloud based systems, such as cloud virtualization and scalability. Even though, it is claimed that the biggest challenge to cloud computing is not technical, but instead cognitive or attitudinal. Accordingly, and in an attempt to close this gap, this study investigates the influences that impact the acceptance of cloud technologies by Iraqi universities. This study is focused on the modified Technology Acceptance Model (TAM) as a framework for the creation of the study model. Based on the factors of the proposed modified TAM, research questions are investigated. The factors are: Perceived Usefulness (PU), Perceived Ease of Use (PEOU), Attitudes toward the cloud (ATT), Behavioral Intention (BI), Perceived Risks (PR), Trust (TR), Anxiety (ANX), Actual Use (AU), Perceived Benefit (PB), Perceived Overall Concern (POC), Perceived Cost of Usage (PCU), Perceived Speed of Access (PSA), Social Influence (SI), Culture Context Issues (CCI) and External Storage (ES). These variables are determined through the use of verified items from previous studies. This study employed a quantitative process methodology including data collection and analysis. The suggested model is reviewed and validated using a questionnaire survey conducted online in Iraqi universities groups. Amidst 601 responses received, 576 are valid for data analysis. The questionnaire is divided into two parts: the first set for participants who use cloud computing, and the second directed for the one who do not use cloud computing. The IBM SPSS Statistical Package and the Analysis of Moment Structures (AMOS ver. 24) software are used for data analysis. The suggested model was empirically examined using hierarchical multiple linear regression alongside the Structural Equation Model (SEM). The findings of this study indicate that factors such as Perceived cost, Perceived speed, Social Influence to use cloud computing, a general positive feeling about clouds, variables, that play a significant role in motivating students to adopt cloud computing as part of their core curriculum. On the contrary, factors such as a general negative feeling about clouds, Availability of information and Using External storage It has proven to have a negative impact on the student's intention to adopt cloud computing. Such factors proved to play a significant role in preventing students from embracing cloud computing as part of their education. In conclusion, this study has led to a greater comprehension of the students' intention to use cloud computing at Iraqi universities. This offered deeper insight into the key factors that affect students ' decision to accept and use cloud computing services. As well as, the proposed model, including such factors, has been demonstrated to be a true predictor of user intentions, within the context of Iraq.Item Factors Affecting Trust in B2C E-Commerce: A Case Study on Foreigners Residing in Turkey from Middle East and North Africa Region(2022-02-25) ALSWIAY, SALAHEDDIN ALI NASERE; Çağıltay, Nergiz ErcilE-services are a real revolution at present as they have contributed to time savings and speeding transactions in addition to transferring business from traditional to electronic. E-commerce crosses borders and makes possible the completion of purchases from thousands of miles away. In other words, buying and selling products and services online is possible through e-commerce services, with all transactions being performed electronically, without actual contact between the customer and merchant. However, the quality of these services is critical for the improvement and success of e-commerce. Certainty and confidence in e-commerce should be essentials factor to improve trust. A combination of self-regulation, technology, and legislation should be adopted by enacting similar regulations and regulations applied in the traditional trade to protect consumers and identify related consumer obligations. Trust is a critical factor in developing relationships between online merchants and customers. Faith is also necessary to close the gap between the developments in information systems and people’s understanding of their socio economic impacts (such as an information system’s perceived effect on customer confidence). This study reviews the results of previous confidence studies from a social, economic and technological perspectives and it sets a comprehensive model for maintaining trust in online transactions to identify ways to increase trust. For a better understanding of trust in e-commerce, we prepared a questionnaire and sent it to foreign people living in Turkey. The study relied on the answers to the questions about the correlation between the factors affecting trust and whether there was an impact on the direction of the market and also whether there was a statistical significance between the demographic variables of the questionnaire respondents. The SPSS application was used to analyze the data collected. The results showed that the factors that directly affected confidence in B2C include market orientation, perceived security, technological doctrine, and relational excellence. Therefore, we needed to develop a comprehensive model that explained the interaction between the factors that affected trust in e-commerce. Trust e-commerce consists of four dimensions, namely ability, goodness, integrity, and predictability. Moreover, based on our results there is a need to improve security features and privacy issues, which can be carried out by updating the previously proposed model to address B2C confidence factors in e-commerce.Item FPGA BASED PACKET HEADER CLASSIFICATION FOR NETWORK INTRUSION DETECTION SYSTEM USING SNORT RULES(2022-01-17) AL BEHAADILI, YOUSIF HOSAIN DAKHIL; Özbek, Mehmet EfeIn data communication through internet, network security became an influential issue. One way to support it is by classifying and filtering incoming packets within devices of network. Packet header classification is an essential task for network devices such as Intrusion Detection System (IDS), it is an important technique for secure networking and communication. Internet services and security tools utilize technique of packet classification which includes checking of each incoming packets against predefined rules. In this research, a new algorithm for packet header classification of network intrusion detection system based on Field Programmable Gate Array (FPGA) has been presented using finite state Machine (FSM) technique. The presented algorithm compares the header fields of incoming packet with predefined rules that stored in block ROM FPGA memory to finding the matching between them and applying some snort actions on them to classify the incoming packet. The FPGA platform has been chosen for this research because of its high speed and quality in processing especially in digital system design. The proposed packet header classification algorithm described in Verilog language and then implemented in Xc7a100tcsg324-1 FPGA board using Xilinx_Vivado 18.2 software. The simulation result show the proposed architecture can classify the incoming packet successfully as desired and the maximum throughput of more than 100 Mbps was achieved.Item INVESTIGATING CONFORMANCE OF E-GOVERNMENT WEB SITES IN LIBYA TO W3C ACCESSIBILITY STANDARDS(2022-02-25) ALGHOUL, Haifa; KOYUNCU, MuratToday's people cannot bear a life without the Internet. It provides access to many things like news, email, shopping, and entertainment, at anytime and anywhere. Governments around the world have adopted the Internet as a channel to introduce their information and services to citizens, businesses and other government sectors. The government websites work as an interface between the government and the citizens. E-government applications utilizes web technology for making information accessible online to as many people as possible regardless of their disabilities. Accessibility is essential for governments that want to create high quality websites and web tools, and not exclude citizens from using their services. This thesis investigates the status of current government websites in Libya in terms of accessibility, which is one of the World Wide Web Consortium (W3C) criteria to develop high quality web sites. It tries to find out whether e-government websites comply with the guidelines developed by W3C. In this study, several web diagnostic tools are used for investigation. Several suggestions are offered based on the results of the research.Item LOGISTICS SYSTEM TRANSITION TOWARDS ENTERPRISE RESOURCE PLANNING: A CASE STUDY(2022-01-25) Alansari, Saeeda; MISHRA, AlokToday, in order to achieve a competitive advantage organization should implement supply chain effectively and have such a product in logistics services. Otherwise, the traditional way of this process causes a problem of not covering everything and it is releasing the risk in organization of missing invoices yearly and not recording it. The director needs to have statistics recorded and accounting payment for every purchase and inventory. In the traditional way, the clerk enroll the data by using excel sheet and count manually by hand with old calculation methods which is very risky for he company. Further more, old machine can be damaged or crash from different reasons an example of that, viruses‘ issues in hard disk that crash the machine then all the data will be lost. Moreover, only one clerk is responsible so if the clerk gets sick the all works for purchases and inventory risk to be delayed. To perform activities effectively and value chain for organization competitiveness it is required to run supply chain in best manner by logistic services information system. Supply chain management has two purposes, firstly product reaches to the end users for multiple departments of the organization, secondly to deliver product to the final customer because it provides many benefits in managing product with coordination and monitoring everyday materials management. To improve the departments in terms of best strategic information system and avoid all the associated risks it is required to have a specific system for inventory control system. Therefore, the main objective of this thesis is to illustrate transition of existing system towards Enterprise Resource Planning Systems (ERP). It also explains inception plan to develop the software and search towards the best system keeping in view many organizational constraints. This also include survey outcome to measure the relationship between management models and organizational innovation in internal processes as part of management efforts towards new system planning.Item PERCEPTIONS AND ATTITUDES OF LIBYAN HEALTHCARE PROVIDER TOWARDS ELECTRONIC HEALTH RECORDS(2022-02-17) Osman, Magdah; Çağıltay, Nergiz ErcilElectronic health records may have several benefits for hospitals, health professionals as well as patients. Electronic Health Record (EHR) systems provide basic clinical data that increase the quality of healthcare provided to citizens and benefits the community. The aim of this study is to evaluate and estimate the healthcare providers’ perceptions and attitudes towards the use of EHR in their environments in Libya. A sample of 110 health sector participants from various medical specialties in Libyan hospitals was targeted. The purpose of this research was to determine the perceptions and attitudes of Libyan healthcare providers towards EHR usage, by analyzing their demographics, organizational characteristics and the social, technical factors that possibly affect the EHR usage. Accordingly, survey method based on the previous studies is implemented through Survey Monkey environment; after the data collection was completed SPSS was used for statistical analysis, the results of the research lead to EHR factors Management support, Involvement and Adequate training have positive correlations with healthcare provider’s perceptions and Attitudes, while Autonomy and healthcare provider-patient communication have negative correlations with healthcare provider’s perceptions and had significant strong positive correlations with Attitude.Item PRACTICAL MODEL BASED SOFTWARE TESTING(2015-07-26) ÇOŞKUN, Rengin; MISHRA, DeeptiIn this thesis, it is proposed a new approach using both manual and automated testing for MBT. The goal is to find successful test cases. Many different research papers are studied and UML sequence diagram examples of these research papers as a model are used in this thesis. Two new algorithms are written for manual testing. It is designed a new tree technique using depth first search path algorithm to find test path. It is written a new java junit testing code to find test paths automatically in automated testing. It is used same operation for both manual and automated testing and also, it is examined these two methods with same sequence diagram examples. However, effective results are not achieved because of determination of same results and errors in automated testing. Therefore, automated testing (java junit testing) code is improved using different methods. It is compared manual, improved automated method and research papers methods using same examples. Finally, it is obtained more successful test paths and test cases from the improved automated testing method according to the manual and research papers testing methods.Item RELATIONSHIP BETWEEN WEB PRESENCE AND USABILITY OF UNIVERSITY WEBSITE: THE CASE OF LIBYA(2022-02-14) SALEH, MUFTAH S. SAIED; Toker, Sacip; Ertürk, Korhan L.Technology is still experiencing significant development in the area of communications and Internet services. Today’s commercial and educational institutions cannot compete in their field and gain new customers without an adequate online presence and satisfactory usability of their web portfolio. In this highly competitive world, websites are one of the main areas of interest for largescale organizations to increase their level of competitiveness. Some of the most important aspects of commercial websites are their visual esthetics and their usability from an end-user perspective, and therefore both of these aspects are developed and subsequently exploited in order to gain the satisfaction, confidence and ultimately the business of its target users. In the current research, two methods of study were followed: user testing and satisfaction survey. Usability assessment was conducted through interviews held with 61 Libyan students who were assigned to study at Turkish universities. The sample group were divided into two cohorts. Cohort 1 consisted of 31 participants who performed five predefined tasks in order to determine the ease of use and efficiency of Libyan universities’ websites. Analysis was performed of their task success rates, as well as the recording of participants’ observations. Cohort 2 consisted of 30 participants who carried out the same tasks as Cohort 1, but were then asked to complete a satisfaction questionnaire. The study aims to help Libyan universities to improve their web presence and to learn about common issues regarding the advantages and disadvantages found with these university websites in order that they can benefit from each other’s experiences. The choice of websites was based on the global classification of Webometrics. At the 2017 start of this research, four out of the top five universities in Libya, ranked according to the Webometrics ranking system, were selected for evaluation in the current study. So as to make a fair assessment, each participant was assigned five similar tasks to be performed on the Arabic language interfaces of the four selected Libyan universities’ websites. The survey consisted of a set of questions designed to prove the level of each websites’ effectiveness. At the beginning of the survey, the five tasks to be conducted by the participants were described based on the chosen university websites, and then the respondents are asked to complete the survey. Participants in Cohort 1 reported experiencing many problems in the usability of the websites, in addition they stated a failure to meet the end-user requirements, even though the phrases and words on the website were familiar to the participants. On the other hand, according to the participants’ observations and the method that they operated the selected universities’ websites, the participants found the most easy to use websites belonged to Misurata University and to the University of Tripoli, with the most difficult to use websites belonging to the Libyan International Medical University and the University of Benghazi. This result was also noticeable based on the length of time it took the participants to accomplish their tasks on each website. Results from both cohorts highlighted the weakness of presence of the Libyan universities’ websites. Participants in Cohort 2 were reportedly also dissatisfied with the Libyan universities websites as evidenced by their completion of the satisfaction survey.