Diğer Yayınlar / Other Publications
Permanent URI for this collectionhttps://ada.atilim.edu.tr/handle/123456789/27
Browse
Browsing Diğer Yayınlar / Other Publications by Author "Akman, Kamil İbrahim"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Article Analyzing the Requirements for E-government Transition of Iraqi ICS Services(Computer Science and Engineering (UBMK), 2017) Alameri, Mohammed Abdulbasit; Bostan, Atila; Akman, İbrahim; Computer EngineeringIraqi Correction Sercives (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision time and work over-load on ICS staff which translates into a high cost of service provision. E-government applications represent an opportunity to automate governmental services while improving both effectiveness and efficiency. This work presents the approach taken to determine the priority to automate ICS service from the perspective of service beneficiaries. The research is et to be completed, however, up to this point we developed four different questionnaire-sets in order to collect the requirements from the shareholders, verified them and implemented the actual survey in the field. The experience gained throughout these steps and the future analysis plan is reported in this paper.Article ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY(PEOPLE: International Journal of Social Sciences, 2018) Akman, İbrahim; Bostan, Atila; Computer EngineeringAlthough acquired-user security habits and user security awareness are qualified as the feeblest components in assuring the information and communication technologies security, they are deemed to be inevitable as well. While the technology in information processing domain efforts its best in establishing the highest plausible security, user awareness is still referred as the key component. Human demographic factors, ICT usage frequency might have correlation with security related behavior routines, this dimension not to be known yet. Hence, in this study we examined the influence of ICT usage characteristics on secure computer usage behaviors. In order to investigate this relation, a survey was carried out with the participation of 466 individuals from diverse layers of the community. The results demonstrated that statistically noteworthy relations exist between several socio-demographic features, frequency and reason of ICT usage factors and secure computer usage.