Search Results

Now showing 1 - 10 of 22
  • Article
    Citation - WoS: 16
    Citation - Scopus: 17
    Organizational Software Piracy: an Empirical Assessment
    (Taylor & Francis Ltd, 2007) Mishra, Alok; Akman, Ibrahim; Yazici, Ali
    Application of Information Technology (IT) has had a significant impact on all aspects of business. Due to technology, the ease with which software can be pirated is increasing and is leading to increased concern for copyright protection. This paper reviews and discusses software piracy issues from a global perspective and reports the findings of a survey concerning the impact of sectors like government, private and academic in Turkey. Although software piracy has long been attracting the interest of academics, no quantitative research has ever been realized in this field in the country. Elsewhere also, most of the software piracy-related studies are from individuals' perspectives and are limited to students, academics, cost, and attitudes. Very few have reported findings related to IT professionals and organizations. The survey was conducted among IT managers of large-scale organizations from different sectors such as the government, private and academic community. Based on the survey of 162 IT managers, the results indicated that sectors have significant impact on software piracy to some extent.
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Conference Object
    Citation - WoS: 7
    Successful Requirement Elicitation by Combining Requirement Engineering Techniques
    (Ieee, 2008) Mishra, Deepti; Mishra, Alok; Yazici, Ali
    The role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization, This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements.
  • Editorial
    Foreword
    (CEUR-WS, 2017) Yazici, Ali; Oǧuztüzün, Halit
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 2
    Smart Contract Upgradability: a Structured and Natural Approach
    (Institute of Electrical and Electronics Engineers Inc., 2024) Culha, Davut; Yazici, Ali
    Software maintenance is crucial as technology rapidly evolves, requiring software to meet new demands and correct errors. Smart contracts, immutable programs on blockchains like Ethereum, face challenges despite their immutability, often needing updates for errors or new features. Smart contracts are upgraded using different patterns, which are not natural because most of them implement upgrades using low-level operations that deviate from their intended use. In other words, these patterns are not natural because upgrades are done by implementing workarounds. Moreover, smart contracts are also susceptible to security vulnerabilities because they may hold large amounts of money. In this paper, upgradability of smart contracts is considered a necessity. For this purpose, a more structured method is proposed by adding high-level features and combining inheritance properties of object-oriented languages. A key component of this method is the gotoContract variable, which allows for the redirection of function calls to upgraded contracts. The proposed method provides a complete upgrade of data and functions in smart contracts. It aims to minimize the effects of upgrades on end users of the smart contracts. Additionally, this natural way of upgrading will help mitigate security risks in the smart contracts by providing a high-level approach to upgrade.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 8
    It Service Management (itsm) Education and Research: Global View
    (Tempus Publications, 2015) Yazici, Ali; Mishra, Alok; Kontogiorgis, Paul; Software Engineering
    This article provides an overview of Information Technology Service Management (ITSM) and investigates the education and research activities in this discipline from a global perspective. The objectives of the study are to inform the training organizations (e.g., universities, training institutes) on the current status of the educational activities in ITSM at undergraduate and graduate levels; and to guide the researchers by providing quantitative data on the research activities conducted in the field. In the educational arena, the statistical data showed that, stand-alone undergraduate/graduate programs are becoming popular among the high school graduates with elevated expectations of the market place, in addition to the appreciation of the IT service management area by the IT sector and the public. The results of the research findings provide guidelines for curriculum developers in the design and implementation of courses for the de facto interdisciplinary ITSM degree/certificate training programs and motivate and guide the researchers by providing the most recent quantitative data on the ITSM field. It is one of the first studies to provide education and research trends in ITSM area. The present study adds to this important stream of emerging research area and contributes by advancing the understanding of ITSM education and research issues. This paper advances the current state of knowledge on ITSM education and explores recent research trends in this area which is becoming standard towards providing quality IT services in enterprises.
  • Conference Object
    Informatics Engineering Education in Turkey and Expectations of Software Industry
    (Ieee, 2018) Yazici, Ali; Mishra, Alok; Karakaya, Ziya; Ustunkok, Tolga
    In this study, using the OSYM data, the number of intakes in Informatics Engineering programs in Turkey, accreditation data and the medium of instruction of the program are summarized for the years 2016 and 2017. In addition, the software sector's expectations from the informatics engineering graduates are reassessed based on the academic studies. The developed knowledge-skill gap set was used to evaluate the situation in Turkish informatics engineering programs. Sector expectations are discussed in the context of 2017-2019 Turkey Software Sector Strategy and Action Plan prepared by the Ministry of Science, Industry and Technology of Turkey and some proposals are made for the academia. As a result, it was observed that the expectations of the software industry were similar in all studies. Additionally, the expectations were changed in the direction of developing technologies and this change should be reflected in the informatics engineering programs.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 13
    Green Information Technology/Information System Education: Curriculum Views
    (Drunpp-sarajevo, 2012) Mishra, Alok; Yazici, Ali; Mishra, Deepti; Computer Engineering; Software Engineering
    Green information technology (Green IT) is an emerging discipline and issues related with it are of growing concern for the business, social and environmental impact in the 21st century. Sustainability is becoming an important topic in IT to safeguard our future, and as evolving market segment. Recently more specific focus on "greening" information technology (IT) and information systems (IS) has been evident all over the world. An increase in green jobs is also occurring with many of those associated with information technology. The main constraint with green jobs related with IT or otherwise, is finding educated and qualified professionals. Due to this, there is a growing demand for green computing/information technology/information system education. The objective of this paper is to review such an available green IT/IS curriculum recently introduced by leading universities and organizations.
  • Article
    Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing
    (Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, Ali
    A major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.
  • Conference Object
    Citation - Scopus: 2
    Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions
    (Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, Ali
    Big Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.