Search Results

Now showing 1 - 10 of 29
  • Article
    Citation - WoS: 11
    Citation - Scopus: 13
    Challenges in Agile Software Maintenance for Local and Global Development: an Empirical Assessment
    (Mdpi, 2023) Almashhadani, Mohammed; Mishra, Alok; Yazici, Ali; Younas, Muhammad
    Agile methods have gained wide popularity recently due to their characteristics in software development. Despite the success of agile methods in the software maintenance process, several challenges have been reported. In this study, we investigate the challenges that measure the impact of agile methods in software maintenance in terms of quality factors. A survey was conducted to collect data from agile practitioners to establish their opinions about existing challenges. As a result of the statistical analysis of the data from the survey, it has been observed that there are moderately effective challenges in manageability, scalability, communication, collaboration, and transparency. Further research is required to validate software maintenance challenges in agile methods.
  • Article
    Citation - WoS: 16
    Citation - Scopus: 17
    Organizational Software Piracy: an Empirical Assessment
    (Taylor & Francis Ltd, 2007) Mishra, Alok; Akman, Ibrahim; Yazici, Ali
    Application of Information Technology (IT) has had a significant impact on all aspects of business. Due to technology, the ease with which software can be pirated is increasing and is leading to increased concern for copyright protection. This paper reviews and discusses software piracy issues from a global perspective and reports the findings of a survey concerning the impact of sectors like government, private and academic in Turkey. Although software piracy has long been attracting the interest of academics, no quantitative research has ever been realized in this field in the country. Elsewhere also, most of the software piracy-related studies are from individuals' perspectives and are limited to students, academics, cost, and attitudes. Very few have reported findings related to IT professionals and organizations. The survey was conducted among IT managers of large-scale organizations from different sectors such as the government, private and academic community. Based on the survey of 162 IT managers, the results indicated that sectors have significant impact on software piracy to some extent.
  • Article
    Citation - WoS: 2
    Citation - Scopus: 8
    It Service Management (itsm) Education and Research: Global View
    (Tempus Publications, 2015) Yazici, Ali; Mishra, Alok; Kontogiorgis, Paul; Software Engineering
    This article provides an overview of Information Technology Service Management (ITSM) and investigates the education and research activities in this discipline from a global perspective. The objectives of the study are to inform the training organizations (e.g., universities, training institutes) on the current status of the educational activities in ITSM at undergraduate and graduate levels; and to guide the researchers by providing quantitative data on the research activities conducted in the field. In the educational arena, the statistical data showed that, stand-alone undergraduate/graduate programs are becoming popular among the high school graduates with elevated expectations of the market place, in addition to the appreciation of the IT service management area by the IT sector and the public. The results of the research findings provide guidelines for curriculum developers in the design and implementation of courses for the de facto interdisciplinary ITSM degree/certificate training programs and motivate and guide the researchers by providing the most recent quantitative data on the ITSM field. It is one of the first studies to provide education and research trends in ITSM area. The present study adds to this important stream of emerging research area and contributes by advancing the understanding of ITSM education and research issues. This paper advances the current state of knowledge on ITSM education and explores recent research trends in this area which is becoming standard towards providing quality IT services in enterprises.
  • Conference Object
    Citation - Scopus: 2
    Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions
    (Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, Ali
    Big Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.
  • Conference Object
    Citation - WoS: 6
    Jmathnorm: a Database Normalization Tool Using Mathematica
    (Springer-verlag Berlin, 2007) Yazici, Ali; Karakaya, Ziya
    This paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's Mink facility to drive the Mathematica kernel.
  • Article
    Education With Experience: Assessment of a Co-Op Model in Undergraduate Engineering Programs in Computing
    (Ieee Computer Soc, 2023) Nazlioglu, Selma; Turhan, Cigdem; Yazici, Ali
    A major concern among graduates of computing departments is the discrepancy between the expectations of software companies and the competencies provided by the academic departments. This ongoing problem makes co-op education inevitable, as it combines industrial experience with traditional education.
  • Conference Object
    Citation - WoS: 13
    A Decentralized Application for Secure Messaging in a Trustless Environment
    (Ieee, 2018) Abdulaziz, Mohamed; Culha, Davut; Yazici, Ali
    Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
  • Article
    STUDY ON CLOUD COMPUTING PERCEPTION OF TURKISH IT SECTOR
    (Univ Osijek, Tech Fac, 2016) Okan, Aylin Akca; Hacaloglu, Tuna; Yazici, Ali
    In this paper an empirical study was carried out to study the Cloud Computing (CC) perception in Turkey. To this extent this study intends to determine the perception of Information Technology decision makers such as Chief Executive Officers and Chief Information Officers by means of a survey by questionnaire approach to explore 98 both public and private IT executives' understandings and concerns about CC. The survey aims to determine how CC is perceived by public or private organizations that are already involved in the e-transformation process. Major results of the study are as follows: both public and private sector executives have positive perception over adoption of CC, participants think that especially web, e-mail, data storage and process management applications are adequate for CC. Lack of well-educated and experienced staff is found to be the common barrier on adopting CC by both public and private sector participants.
  • Conference Object
    Citation - WoS: 7
    Successful Requirement Elicitation by Combining Requirement Engineering Techniques
    (Ieee, 2008) Mishra, Deepti; Mishra, Alok; Yazici, Ali
    The role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization, This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements.
  • Editorial
    Foreword
    (CEUR-WS, 2017) Yazici, Ali; Oǧuztüzün, Halit