Browsing by Author "Pusatli, Tolga"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Article Citation - WoS: 21Citation - Scopus: 22A Discussion on the Role of People in Global Software Development(Univ Osijek, Tech Fac, 2013) Misra, Sanjay; Colomo-Palacios, Ricardo; Pusatli, Tolga; Soto-Acosta, Pedro; Computer Engineering; Computer EngineeringLiterature is producing a considerable amount of papers which focus on the risks, challenges and solutions of global software development (GSD). However, the influence of human factors on the success of GSD projects requires further study. The aim of our paper is twofold. First, to identify the challenges related to the human factors in GSD and, second, to propose the solution(s), which could help in solving or reducing the overall impact of these challenges. The main conclusions of this research can be valuable to organizations that are willing to achieve the quality objectives regarding GSD projects.Article Citation - WoS: 1Exploring Supportive and Deterrent Factors on Online Shopping in a Developing Country(Igi Global, 2020) Pusatli, Tolga; Akman, Ibrahim; Computer EngineeringThis study explores the influence of the reasons of individuals' supportive and deterrent behaviors against commercial usage of online media in the emerging market of Turkey. The supportive and deterrent factors are grouped in empirical categories as discouragement and encouragement, respectively. The impact of these factors on actual behavior were assessed via intermediary empirical category including the variables inefficiency, efficiency, intention, and subjective norm. A survey was conducted using a sample of 251 observations obtained from the visitors of three large/busy malls using purposive sampling. The multiple least-square regression was utilized to test the nature of the relationships between variables. Results indicated a significant discouraging impact of warranty, finance, habits, security on inefficiency perceptions, an encouraging impact of geography and convenience on efficiency perceptions. Significant behavioral impact of perceptions regarding inefficiency, efficiency, subjective norms, and intention on actual usage of online shopping was also observed.Conference Object Is Change and Rfid Deployment Protocol: a Collaboration of Two Models(World Scientific and Engineering Acad and Soc, 2009) Pusatli, Tolga; Lutton, Eugene; Regan, BrianThis paper presents our approach to explain information systems (IS) change in organisations and its applicability in the RFID (radio frequency identification) application management. It aims to investigate collaboration of these two models: an IS change model (Information System Maintenance/Replacement Model (ISMRM)) and RFID deployment model. Similar to other changes in business process and IT infrastructure, RFID deployment requires a business commitment, combined with a thorough analysis, planning and control to enable the organisation to obtain an optimal solution. To assist and guide an organisation in this activity a RFID Rationale and Deployment Methodology was developed, recently. As reported in the literature, this methodology is divided into three phases and has phase transitional motivators that are utilised to support the decision making during the possible deployment of RFID technology. Meanwhile, the ISMRM model lends support and extends the decision making process, within the RFID Rationale and Deployment Methodology, so that decision to implement such technology can be approved with additional factors of productivity, error/failure rate, available support facilities, user feedback, system specialisation and maintenance. This exploratory research concludes that there is a considerable potential for further research including implementation, testing and validation of the true linkages and purpose of the melding of these models.Article Citation - WoS: 25Citation - Scopus: 34Security Awareness Level of Smartphone Users: an Exploratory Case Study(Hindawi Ltd, 2019) Koyuncu, Murat; Pusatli, Tolga; Information Systems EngineeringAs smartphone technology becomes more and more mature, its usage extends beyond and covers also applications that require security. However, since smartphones can contain valuable information, they normally become the target of attackers. A physically lost or a hacked smartphone may cause catastrophic results for its owner. To prevent such undesired events, smartphone users should be aware of existing threats and countermeasures to be taken against them. Therefore, user awareness is a critical factor for smartphone security. This study investigates the awareness level of smartphone users for different security-related parameters and compares the awareness levels of different user groups categorized according to their demographic data. It is based on a survey study conducted on a population with a different range of age, education level, and IT security expertise. According to the obtained results, in general, the awareness level of participants is fairly low, which needs considerable improvement. In terms of age, the oldest group has the lowest level followed by the youngest group. Education level, in general, has a positive effect on the awareness level. Having knowledge about IT is another factor increasing the security awareness level of smartphone users.