Search Results

Now showing 1 - 10 of 22
  • Article
    Citation - WoS: 16
    Citation - Scopus: 17
    Organizational Software Piracy: an Empirical Assessment
    (Taylor & Francis Ltd, 2007) Mishra, Alok; Akman, Ibrahim; Yazici, Ali
    Application of Information Technology (IT) has had a significant impact on all aspects of business. Due to technology, the ease with which software can be pirated is increasing and is leading to increased concern for copyright protection. This paper reviews and discusses software piracy issues from a global perspective and reports the findings of a survey concerning the impact of sectors like government, private and academic in Turkey. Although software piracy has long been attracting the interest of academics, no quantitative research has ever been realized in this field in the country. Elsewhere also, most of the software piracy-related studies are from individuals' perspectives and are limited to students, academics, cost, and attitudes. Very few have reported findings related to IT professionals and organizations. The survey was conducted among IT managers of large-scale organizations from different sectors such as the government, private and academic community. Based on the survey of 162 IT managers, the results indicated that sectors have significant impact on software piracy to some extent.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 8
    It Service Management (itsm) Education and Research: Global View
    (Tempus Publications, 2015) Yazici, Ali; Mishra, Alok; Kontogiorgis, Paul; Software Engineering
    This article provides an overview of Information Technology Service Management (ITSM) and investigates the education and research activities in this discipline from a global perspective. The objectives of the study are to inform the training organizations (e.g., universities, training institutes) on the current status of the educational activities in ITSM at undergraduate and graduate levels; and to guide the researchers by providing quantitative data on the research activities conducted in the field. In the educational arena, the statistical data showed that, stand-alone undergraduate/graduate programs are becoming popular among the high school graduates with elevated expectations of the market place, in addition to the appreciation of the IT service management area by the IT sector and the public. The results of the research findings provide guidelines for curriculum developers in the design and implementation of courses for the de facto interdisciplinary ITSM degree/certificate training programs and motivate and guide the researchers by providing the most recent quantitative data on the ITSM field. It is one of the first studies to provide education and research trends in ITSM area. The present study adds to this important stream of emerging research area and contributes by advancing the understanding of ITSM education and research issues. This paper advances the current state of knowledge on ITSM education and explores recent research trends in this area which is becoming standard towards providing quality IT services in enterprises.
  • Conference Object
    Citation - Scopus: 2
    Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions
    (Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, Ali
    Big Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.
  • Conference Object
    Citation - WoS: 6
    Jmathnorm: a Database Normalization Tool Using Mathematica
    (Springer-verlag Berlin, 2007) Yazici, Ali; Karakaya, Ziya
    This paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's Mink facility to drive the Mathematica kernel.
  • Article
    Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing
    (Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, Ali
    A major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Conference Object
    Citation - WoS: 7
    Successful Requirement Elicitation by Combining Requirement Engineering Techniques
    (Ieee, 2008) Mishra, Deepti; Mishra, Alok; Yazici, Ali
    The role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization, This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements.
  • Editorial
    Foreword
    (CEUR-WS, 2017) Yazici, Ali; Oǧuztüzün, Halit
  • Conference Object
    Informatics Engineering Education in Turkey and Expectations of Software Industry
    (Ieee, 2018) Yazici, Ali; Mishra, Alok; Karakaya, Ziya; Ustunkok, Tolga
    In this study, using the OSYM data, the number of intakes in Informatics Engineering programs in Turkey, accreditation data and the medium of instruction of the program are summarized for the years 2016 and 2017. In addition, the software sector's expectations from the informatics engineering graduates are reassessed based on the academic studies. The developed knowledge-skill gap set was used to evaluate the situation in Turkish informatics engineering programs. Sector expectations are discussed in the context of 2017-2019 Turkey Software Sector Strategy and Action Plan prepared by the Ministry of Science, Industry and Technology of Turkey and some proposals are made for the academia. As a result, it was observed that the expectations of the software industry were similar in all studies. Additionally, the expectations were changed in the direction of developing technologies and this change should be reflected in the informatics engineering programs.
  • Conference Object
    A Casestudy of Data Models in Data Warehousing
    (Ieee, 2008) Mishra, Deepti; Yazici, Ali; Basaran, Beril Pinar
    Data warehousing (DFV) provides an excellent approach in transforming operational data into useful and reliable information to support the decision making process in any organization. In this paper, a case study is performed to implement a DW. This case-study is used to describe and compare various conceptual and logical design models for data warehousing. This comparison is done to find which of the conceptual and logical data models are more appropriate for implementing data warehouse for sales and shipping system.