<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Rektörlük</title>
<link href="http://hdl.handle.net/20.500.12397/13813" rel="alternate"/>
<subtitle>Rektörlüğe bağlı tüm birimlerde çalışan personellerimizin (Öğr. Gör., Öğr. Gör. Dr. vb..) akademik çalışmalarını içermektedir.</subtitle>
<id>http://hdl.handle.net/20.500.12397/13813</id>
<updated>2026-04-09T12:26:14Z</updated>
<dc:date>2026-04-09T12:26:14Z</dc:date>
<entry>
<title>Teknoloji ve Yenilik Politikaları: Uluslararası Rekabet Açısından 2010 Sonrası Avrupa Birliği'nin Performansına Genel Bir Bakış</title>
<link href="http://hdl.handle.net/20.500.12397/13936" rel="alternate"/>
<author>
<name>Alpaslan, Barış</name>
</author>
<author>
<name>Cengiz, Çağdaş</name>
</author>
<id>http://hdl.handle.net/20.500.12397/13936</id>
<updated>2022-05-20T04:45:16Z</updated>
<published>2021-01-01T00:00:00Z</published>
<summary type="text">Teknoloji ve Yenilik Politikaları: Uluslararası Rekabet Açısından 2010 Sonrası Avrupa Birliği'nin Performansına Genel Bir Bakış
Alpaslan, Barış; Cengiz, Çağdaş
KİTAP ADI : Teknoloji ve Uluslararası İlişkiler&#13;
&#13;
KİTAP İÇİ BÖLÜMÜN ADI: Teknoloji ve Yenilik Politikaları: Uluslararası Rekabet Açısından 2010 Sonrası Avrupa Birliği'nin Performansına Genel Bir Bakış &#13;
&#13;
KİTAP İÇİ BÖLÜMÜN YAZARLARI: Dr. Barış ALPASLAN, Dr. Çağdaş CENGİZ &#13;
&#13;
KİTAP EDİTÖRLERİ: Ömer Aydın, Çağdaş Cengiz &#13;
&#13;
KİTAP İÇİ SAYFA ARALIĞI: Syf.101-141
</summary>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device</title>
<link href="http://hdl.handle.net/20.500.12397/13930" rel="alternate"/>
<author>
<name>Çepik, Hilal</name>
</author>
<author>
<name>Aydın, Ömer</name>
</author>
<author>
<name>Dalkılıç, Gökhan</name>
</author>
<id>http://hdl.handle.net/20.500.12397/13930</id>
<updated>2022-05-20T04:44:50Z</updated>
<published>2021-03-02T00:00:00Z</published>
<summary type="text">Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device
Çepik, Hilal; Aydın, Ömer; Dalkılıç, Gökhan
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.
</summary>
<dc:date>2021-03-02T00:00:00Z</dc:date>
</entry>
<entry>
<title>Trends in eBusiness and eGovernment</title>
<link href="http://hdl.handle.net/20.500.12397/13924" rel="alternate"/>
<author>
<name>Sánchez-Bayón, Antonio</name>
</author>
<author>
<name>García-Ramos Lucero, Miguel Ángel</name>
</author>
<author>
<name>Cheng San, Annie Ng</name>
</author>
<author>
<name>Yee, Choy Johnn</name>
</author>
<author>
<name>Moorthy, Krishna</name>
</author>
<author>
<name>Lee, Alex Foo Tun</name>
</author>
<author>
<name>Kithatu-Kiwekete, Angelita</name>
</author>
<author>
<name>Vyas-Doorgapersad, Shikha</name>
</author>
<author>
<name>Isabirye, Anthony Kiryagana</name>
</author>
<author>
<name>Dlodlo, Nobukhosi</name>
</author>
<author>
<name>Mbati, Lydia</name>
</author>
<author>
<name>Tarambiwa, Edmore</name>
</author>
<author>
<name>Mafini, Chengedzai</name>
</author>
<author>
<name>DJUROVSKI, Anastas</name>
</author>
<author>
<name>Redda, Ephrem Habtemichael</name>
</author>
<author>
<name>Surujlal, Jhalukpreya</name>
</author>
<id>http://hdl.handle.net/20.500.12397/13924</id>
<updated>2020-12-24T06:19:07Z</updated>
<published>2020-12-15T00:00:00Z</published>
<summary type="text">Trends in eBusiness and eGovernment
Sánchez-Bayón, Antonio; García-Ramos Lucero, Miguel Ángel; Cheng San, Annie Ng; Yee, Choy Johnn; Moorthy, Krishna; Lee, Alex Foo Tun; Kithatu-Kiwekete, Angelita; Vyas-Doorgapersad, Shikha; Isabirye, Anthony Kiryagana; Dlodlo, Nobukhosi; Mbati, Lydia; Tarambiwa, Edmore; Mafini, Chengedzai; DJUROVSKI, Anastas; Redda, Ephrem Habtemichael; Surujlal, Jhalukpreya
Technology affects all areas. Business and government processes are changing with the use of the internet, mobile devices, internet of things, blockchain, machine learning, artificial intelligence and many other new technologies. In this book, it is aimed to focus the use of technology, new trends in business life and government covering the studies in all sub-areas of Information Systems, Knowledge Management, eBusiness, eCommerce, eMarketing, mCommerce, eGovernment, ePublic Services, eGovernance etc. The book consists of 7 chapters. Book chapter authors are reputable scientists from different countries of the world. The first chapter is a critical review and a case study in e-Business, with special attention to the digital currencies resource and its possibilities. The second chapter attempts to incorporate the Unified Theory of Acceptance and Use of Technology (UTAUT) model with perceived risk theory (security risk and privacy risk) to explore its impact towards the intention to use m-government services. The third chapter aims to assess the level of gender inclusivity in the municipal e-procurement processes in the City of Johannesburg as a case study. The fourth chapter examines the impediments that derail the intensive uptake of eLearning programmes in a particular higher education institution. The fifth chapter investigated the role of Knowledge Management Systems (KMS) in enhancing the export performance of firms operating within the manufacturing sector in Zimbabwe. In the sixth chapter, a survey was undertaken on 131 small and medium-sized enterprises (SMEs) from Pelagonija region in order to determine the current level of SME digitalization within the region. It is aimed to compare with European Union (EU) average and to make conclusions on the impact of the SME digitalization to region gross domestic product (GDP) growth as well as revenues collection. The last chapter's purpose was to develop a measuring and modelling framework/instrument of Internet banking service quality (IBSQ) for the South African banking sector.
</summary>
<dc:date>2020-12-15T00:00:00Z</dc:date>
</entry>
<entry>
<title>The Impacts of Digital Transformation</title>
<link href="http://hdl.handle.net/20.500.12397/13923" rel="alternate"/>
<author>
<name>Özen, Ahmet</name>
</author>
<author>
<name>GÜREL, Fatma Nur</name>
</author>
<author>
<name>Mhlanga, David</name>
</author>
<author>
<name>Savić, Dobrica</name>
</author>
<author>
<name>Tosheva, Elizabeta</name>
</author>
<author>
<name>Mehmedović, Emir</name>
</author>
<author>
<name>Godinjak, Faris</name>
</author>
<author>
<name>Horić, Selma</name>
</author>
<author>
<name>Hadjitchoneva, Juliana</name>
</author>
<author>
<name>Lobejko, Stanislaw</name>
</author>
<author>
<name>Jordan, Frank</name>
</author>
<id>http://hdl.handle.net/20.500.12397/13923</id>
<updated>2020-12-24T06:19:26Z</updated>
<published>2020-08-15T00:00:00Z</published>
<summary type="text">The Impacts of Digital Transformation
Özen, Ahmet; GÜREL, Fatma Nur; Mhlanga, David; Savić, Dobrica; Tosheva, Elizabeta; Mehmedović, Emir; Godinjak, Faris; Horić, Selma; Hadjitchoneva, Juliana; Lobejko, Stanislaw; Jordan, Frank
Science is like a wall that rises above the bricks below. For this reason, I would like to&#13;
thank the authors of the resources used in this book and all the contributors to the&#13;
development of the science.&#13;
The development of technology and its use in all areas of human life cause&#13;
transformation. This transformation is effective in many areas such as human life,&#13;
business processes, ways of doing business, distribution channels, social and cultural&#13;
values, government processes and etc. This transformation brings both advantages and&#13;
disadvantages so these affect so many areas. The main purpose in the publication of this&#13;
book is to draw attention to the effects of the irresistible changes of Digital&#13;
Transformation.&#13;
In this book, there are 9 chapters that cover the different aspects of Digital&#13;
Transformation written by authors from different countries. I think the chapters will&#13;
contribute to science and humanity.&#13;
With this book, which we have created as a result of a detailed and meticulous study,&#13;
academics, employees, students and anyone who is interested in digital transformation in&#13;
the international arena will learn useful information about the changes and the impacts&#13;
facing the world.
</summary>
<dc:date>2020-08-15T00:00:00Z</dc:date>
</entry>
</feed>
