Browsing by Author "Ercan, Tuncay"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Article Critical Factors Affecting Cloud Computing Adoption in Turkish Companies With Diffusion of Innovation Theory(2021) Sayginer, Can; Ercan, TuncayCloud computing provides an effective computing technology in the way IT services such as data storage, network, andapplication are supplied externally by companies without software and hardware, long implementations, and delayedmaintenance to decrease operational expenditures. However, there is an inadequate amount of scholars studying the effectsof cloud computing adoption among Turkish companies. In order to fill the gap, this study aims to exhibit the factors affectingcloud computing adoption in Turkish companies. Diffusion of innovation (DOI) theory was developed to understand the criticalfactors affecting cloud computing adoption, deriving three factors: perceived advantage, cost-saving, and compatibility.Confirmatory factor analysis was applied to assess data. The findings showed that compatibility directly affected cost-savings.Cost-savings directly affected perceived advantage, and perceived advantage directly affected cloud computing adoption. Thevariance of perceived advantage also explained 15.8% of the proposed model. By adopting DOI theory, this study will intendto contribute to businesses for increasing the awareness of companies’ IT decision-makers about the perception of cloudcomputing adoption in the cloud computing decision making period in Turkey.Article Citation - WoS: 5Citation - Scopus: 7Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors(Mdpi, 2008) Sahin, Yasar Guneri; Ercan, TuncayTerrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.Article Citation - WoS: 24Citation - Scopus: 34The Use of Internet Resources by University Students During Their Course Projects Elicitation: a Case Study(Turkish Online Journal Educational Tech-Tojet, 2010) Sahin, Yasar Guneri; Balta, Sabah; Ercan, TuncayAlthough technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their course project requirements during the project elicitation phase, how they access the Internet and other resources, and their trends in the literature review using the Internet. Furthermore, the diversity of Internet resources which are used for homework and course projects studies, and the reliability and accessibility of these resources have also been investigated and assessed. In addition, the results obtained from the study have been discussed and evaluated, the academic resources accessibility and usability in universities have been assessed and their importance discussed. The internet resources have been divided into sub categories according to their accessibility and reliability. Finally, the effects of reliable and limited accessible internet resources and unreliable and unlimited internet resources on university students' out-of-class works and projects have been presented and discussed.
