WoS İndeksli Yayınlar Koleksiyonu
Permanent URI for this collectionhttps://gcris.yasar.edu.tr/handle/123456789/11289
Browse
Browsing WoS İndeksli Yayınlar Koleksiyonu by Publisher "ACAD CONFERENCES LTD"
Now showing 1 - 20 of 20
- Results Per Page
- Sort Options
Conference Object A Novel Approach to e-Learning: Yasar University e-Learning System (YES)(ACAD CONFERENCES LTD, 2013) Ibrahim Zincir; Melih Zeytinoglu; Ahmed Rana; Samsun Basarici; M Ciussi; M AugierSince 2009 every student who attends Yasar University (Izmir Turkey) regardless of their department has to take part in seven courses (Human Sciences Research Culture Design Culture Aesthetic Culture Ethic Culture Project Culture and a Social Responsibilities Project) defined as University Foundation Courses (UFND). These courses are part of the university's effort to graduate students who are not only hard-working and respectable but also who are responsible and beneficent to society and the environment that they are living in. Approximately 4000 students attend these courses every term which in return results in certain challenges. One of the more pressing challenges is shortage of lecturers and classrooms which is the root of a more visible problem, the complexity and difficulty of the timetable for the whole university. Hence in January 2012 it was decided that a new approach was needed. At the start of the 2012-2013 academic year a novel E-learning system was introduced to offer these seven courses online. Yasar University E-Learning System (YES) differs from its peers in one important aspect: YES assesses the students continuously. YES does this by not only monitoring but also by encouraging them to get involved in the courses much more actively than any other system. In addition to the assessment of the students continuously the new system evaluates the effectiveness of the users of the system by requiring them to attend the offered forums and live discussions with lecturers at least two times a week. This paper discusses the structure and the implementation of YES and the experiences so far. Furthermore the paper draws some comparisons between YES and other popular E-learning systems.Conference Object A Programmable Threat Intelligence Framework for Containerized Clouds(ACAD CONFERENCES LTD, 2018) Cagatay Yucel; Ahmet Koltuksuz; Murat Odemis; Anas Mu'aza Kademi; Gokhan Ozbilgin; Yücel, Çağatay; Özbilgin, Gökhan; Ödemiş, Murat; Kademi, Anas Muazu; Koltuksuz, Ahmet; JS Hurley; JQ ChenContemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.Conference Object Citation - WoS: 2Citation - Scopus: 2A Proposal for a Novel e-Learning System for the Visually Impaired(ACAD CONFERENCES LTD, 2014) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; R Orngreen; KT LevinsenAccording to World Health Organization (WHO) 285 million people are estimated to be visually impaired worldwide: 39 million are blind and 246 million have low vision. It is a well-known fact that for the visually impaired it is not possible to access the information via drawings and figures as there is no interpretation. In addition it is not easy to search through a passage for the relevant information as Braille takes much more time to read and finally a lot of memorization is necessary in order to achieve success in life. As standard procedures and systems for education are not sufficient for these people a novel approach is necessary. The recent advances in information and communication technologies (ICTs) have placed e-learning at the front row of education methodologies for the disabled. E-learning applications and websites specifically designed for accessibility help to improve the quality of the education without undermining the functionality and the usability. This paper first outlines the challenges and the shortcomings of e-learning schemas for the visually impaired and then proposes a novel touch screen application implemented via an effective and interactive user-friendly e-learning system.Conference Object Citation - WoS: 1A Proposal for Turkish/German Cross-Language Q&A System(ACAD CONFERENCES LTD, 2012) Samsun Basarici; Ibrahim Zincir; Sabah Balta; Tohid Ahmed Rana; Basarici, Samsun; Zincir, Ibrahim; Balta, Sabah; Rana, Tohid Ahmed; M GascoOver the last decade many approaches have been introduced about Q&A (Question & Answer) Systems. The problem with many of these works is that they mainly implement English as the underlying language. With the tremendous growth of computer usage in daily life and implementation ofe-government systems the need for cross-language Q&A Systems increased enormously especially for immigration countries such as Germany. Beside of Turkey and Turkish speaking countries the biggest Turkish population in Europe is living in Germany. Over the last decade the communication between the administration and this minority has not always been easy. The main approach of the German administration is enforcing this minority to gain the same language skills like the native speakers (which is not a feasible solution aspast experiences showed). This paper introduces an onlineconcept for cross-language Q&A System which accepts both Turkish and German as the underlying languages to guide the community members to the appropriate person inside the e-government systems.Conference Object Citation - WoS: 1Citation - Scopus: 1An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers(ACAD CONFERENCES LTD, 2014) Cagatay Yucel; Ahmet Koltuksuz; Yucel, Cagatay; Koltuksuz, Ahmet; A Liaropoulos; G TsihrintzisSince 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs).Conference Object Analysis of e-Learning Outcomes at Higher Education: A Case Study(ACAD CONFERENCES LTD, 2014) Ibrahim Zincir; Tohid Ahmed Rana; Samsun Basarici; Sabah Balta; R Orngreen; KT LevinsenAs explained in our paper A Novel Approach To E-Learning: Yasar University E-Learning System (YES) (Zincir et al. 2013) since 2009 every student who attends Yasar University (Izmir Turkey) regardless of their department has to take part in seven courses defined as University Foundation Courses (UFND). These courses are part of the university's effort to graduate students who are not only hard-working and respectable but also who are responsible and beneficent to society and the environment that they are living in. Since approximately 4000 students attend these courses every term in academic year 2012-2013 an E-learning system called Yasar University E-Learning System (YES) was introduced to take these courses online. It was a novel approach that encourages the students to get involved in the courses much more actively since it grades them according to their learning behaviors. Basically YES monitors all the activities of the students all the time once they are connected to the system. These activities include how and when they access the information supplied materials forums and chat rooms. This paper discusses the outcomes & the outputs of YES by presenting a brief insight into the behavior of the students inside an e-learning environment and by analyzing the correlation between the success of the students and the way they interact with YES.Conference Object Challenges in Analyzing Unstructured Learner Generated Qualitative Big Data(ACAD CONFERENCES LTD, 2015) Ozlem Ozan; A Jefferies; M CubricAs the amount of educational data grows a necessity is occurring to define characteristics of Unstructured Learner Generated Qualitative Big Data (ULGQBD) and develop a conceptual framework to analyze these data sets. According to the author there are three main challenges in analyzing ULGQBD. First one is related to qualitative big data itself. There is an ambiguity of definition and methodology of analyzing ULGQBD. The answer of the question How much amount of qualitative data is big? is blurry. Therefore there is no a simple straightforward specific methodology to overcome the struggles originated from seeking the meaning within such a big amount of unstructured data. Second problem is absence of conceptual frameworks for analyzing ULGQBD. Third problem is related to Qualitative Data Analysis (QDA) software. Traditional QDA software is not ready to big amount of data and cloud based text analytics tools do not have enough language support for stemming for agglutinative languages such as Turkish. In this paper author shares her experience of analyzing ULGQBD. The data set which she worked on contained 13000 responses to an open ended survey whose main purpose to get feedback about the courses from the customers to improve educational effectiveness. She provides a framework for structural coding of ULGQBD and brief road map for researchers who deals with ULGQBD.Conference Object Clandestine Cell Based Honeypot Networks(ACAD CONFERENCES LTD, 2016) Cagatay Yucel; Ahmet Koltuksuz; Huseyin Yagci; R Koch; G RodosekA Clandestine Cell is a type of an intelligence organization where a cell only knows the immediate superior and the associated members of itself. This kind of organizational structure is used by intelligence agencies throughout the world to provide security against a breach thus ensuring the safety of the members. This well-known intelligence organization is applied to solve an advanced cyber security issue. A relatively new kind of a cyber threat known as an Advanced Persistent Threat (APTs) has been around for some time now Stuxnet being the very first identified. There are several points to consider when identifying the characteristics of an APT such as the aim its interactions with Internet way of collecting information operations they do disrupt and concealment mechanisms utilized. An important aspect is whether it is statistically analyzable or dynamically identifiable that its communication patterns need to be inspected to identify the characteristics. The traces of an APT might be identified this way. In this research a honeypot network with a communication policy based on a clandestine cell is introduced. Each honeypot only knows a hub. And a hub only knows the main malware analysis server. By utilizing this approach the communications are hidden from possible attackers without compromising the main server. In each honeypot server dead-ends are created and implemented in the honeypot servers. Advantages and ramifications are discussed regarding the types of malware. It is aimed to create yet another taxonomy of malware regarding the network activities as they are being trapped by our introduced honeypot network. A clandestine cell format is one of its kind within organizations. This is the very first time that such kind of format is being applied to honeypot design for APT hunting. This is the paper in which an intelligence organizational structure meets with a network architecture in order to solve a very hard to crack cyber security problem. The idea itself is a new and untried one.Conference Object Citation - WoS: 2Does Really Innovative Work Behaviors of Emloyees Mediate the Innovative Performance Impacts of Intrapreneurship?(ACAD CONFERENCES LTD, 2011) Cagri Bulut; Seray Begum Samur; Duygu Seckin Halac; Samur, Seray Begum; Halac, Duygu Seckin; Bulut, Cagri; H FulfordIn today's highly dynamic and innovation based competitive environments force corporations to develop distinctive employee skills and competencies which were difficult to replicate or to imitate by the competitors. Resource based view suggests that developing deploying and protecting intangible assets are crucial to gain and sustain competitive advantage. Internal corporate entrepreneurship (intrapreneurship) plays the key role for sustainable rejuvenation of ultimate organizational performance. The literature on intrapreneurship and organizational innovativeness has focused on the managerial competencies and managerial tools to achieve effective intrapreneurship rather than the role of employees who are the essence of organizations. In the literature there are five managerial tools that are needed to support an innovation oriented entrepreneurial climate within the large organizations to orient employees to be more entrepreneurial and thereby innovative, namely (1) management support (2) time availability (3) individual freedom and autonomy (4) reward availability/reinforcement (5) management's and employees' absorption capacity of risk. Innovation is the process of discovery diffusion action. In this multi stage process ideas are captured, filtered funded developed modified clarified and eventually commercialized. Therefore this study complements the literature by taking into account the innovative work behavior of employee as a mediator factor with a multi-dimensional structure between intrapreneurial climatic factors and innovative performance. Management support reward system autonomy tolerance for failure and allocation of free time have been employed as the compounds of innovative work behavior where idea generation idea promotion and idea realization have been employed as innovative work behavior. Survey method was used to conduct the data of this study. All scales have been adopted from existing literature. 65 manufacturing firms without any industrial limitations were chosen randomly for the field study. The final sample includes 199 respondents from 45 different firms mostly located in Izmir Ataturk Organized Industrial Zone and ITOB Organized Industrial Zone. The respondents of this study were the employees' of manufacturing firms from all hierarchical levels. After collecting the surveys and processing survey data into SPSS 17.0 statistical software Exploratory Factor Analysis was used to test the validity of the scales. Reliability tests of each factor structure and their Pearson correlations scores were calculated and presented with descriptive statistics. Finally multiple regression analysis was utilized to test the hypotheses of the study. The results indicate that intrapreneurial climate dimensions of management support and reward availability together with civic virtue are strong drivers of Innovative Work Behaviors (IWBs) these types of behaviors are also effective instruments for the Innovative Performance of the firms which lead to effective functioning of the organization in terms of manufacturing new product and financial performance.Conference Object ELCARE: A Novel Approach for Educating Caretakers of Elderly(ACAD CONFERENCES LTD, 2015) Ibrahim Zincir; Samsun Basarici; Ahmed Rana; Fisun Senuzun; Basarici, Samsun; Zincir, Ibrahim; Senuzun, Fisun; Rana, Ahmed; A Jefferies; M CubricElderly care or simply eldercare is the fulfillment of the special needs and requirements that are unique to senior citizens. Elderly care emphasizes the social and personal requirements of senior citizens who need some assistance for daily activities and health care but who desire to age with dignity. With the improvements made in health technologies the life expectancy in EU is increasing and more than 80 million people are aged over 60 in Europe today. Experts believe that the increasing number of elderly people who need help with basic tasks but have been left to struggle by an unprecedented withdrawal of state-funded social care create a huge problem, lack of nurses/caretakers for the elderly. This paper discusses an e-learning system for elderly care that simply educates/trains the people who want to take care of the elderly, either those who want to become professional caretakers or those who are volunteers or social workers. The novel system inherits web and mobile apps and will be deployed multilingual. The main goal of the system is to increase the social intellectual and cognitive abilities of the target group like increasing the patience devotion physical endurance etc. The system is buildup of modules that have a linear character i.e. user has to pass a module successfully in order to proceed to the next one.Conference Object Exploring Content Moderation Research: Insights from a Bibliometric Analysis(ACAD CONFERENCES LTD, 2024) Ozlem Ozan; Ali Riza Sadikzade; Ozan, Ozlem; Sadikzade, Ali Riza; P FotarisRapid technological advances have intensified user-content interactions leading to real-world consequences and the implementation of complex regulation mechanisms such as AI filtering and industrial and user moderation. This study aims to introduce the contemporary topics surrounding the subject by comprehensively examining the content moderation research by conducting a bibliometric analysis of 202 publications between 2016 and 2023 from the Web of Science and Scopus databases. This study aims to identify the influential authors universities countries journals funding agencies network maps of keywords and co-authorship. The findings of this study demonstrate that the Queensland University of Technology is the most influential in the field. The United States of America England and Australia are the most productive countries. The National Science Foundation and the European Research Council are the most supporting funding institutions. New Media & Society Social Media + Society and Big Data & Society are the most influential journals. Ysabel Gerrard is the most productive author. Seven clusters occur in author collaboration networks. The network map of the keywords suggests that researchers mainly focus on social media, Facebook Instagram YouTube and Twitter are the most investigated platforms. There is a shift from transparency to hate speech and misinformation among the research themes. The academic research has exhibited a consistent upward trajectory since 2016. Given the demonstrable momentum of interest in this field it is reasonable to anticipate a further increase in research with a diverse array of academic disciplines.Conference Object Citation - WoS: 1Improving Employee Performance Using Web-Based Application for Public Services(ACAD CONFERENCES LTD, 2012) Tohid Ahmed Rana; Sabah Balta; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Zincir, Ibrahim; Balta, Sabah; Rana, Tohid Ahmed; M GascoOne of the vital problems of public services is the deficiency of well-educated and highly motivated employees. The attitudes and performance of public servants have a crucial importance on the satisfaction of the customer relationships where in this context customers are the citizens. Thus well-trained and highly motivated employees are indispensable elements of governmental services as a priority. Therefore controlling public servants' professional improvements performances and their vocational capacities are the key factors to provide high quality services. Consequently a good training and tracking system for employees can provide useful data about current level of employee performance to the state and the data produced by the system can be used to promote employees. Current online training systems do not monitor their members continuously but only evaluate them for that specific instance which in return does not help much in improving employee performance. In this paper we propose an eLearning system to improve performance of public servants. The system combines exterior website and interior management systems to provide complete and effective information and service.Conference Object Citation - WoS: 1Innovation and Entrepreneurship Assessment Initiatives: A Critical View(ACAD CONFERENCES LTD, 2013) Cagri Bulut; Eda Evla Mutlu; Murat Nazli; Mutlu, Eda Evla; Bulut, Cagri; Nazli, Murat; P Teirlinck; S Kelchtermans; F DeBeuleEntrepreneurship and Innovation related regional and national development has become a phenomenon for the last decades, however the outcomes of these endeavors have attracted many researchers agencies and international organisations such as European Commission Global Entrepreneurship Monitor etc. through their projects programs departments or initiatives. Therefore this study examines the worldwide known six Innovation and Entrepreneurship Initiatives (here after IEIs) assessing of entrepreneurship and innovation. The main IEIs are (IUS) Innovation Union Scoreboard GEM (Global Entrepreneurship Monitor) GII (Global Innovation Index) and ICI (Innovation Capacity Index) GEINDEX (Global Entrepreneurship Index) and WCY (World Competitiveness Yearbook). This research includes the observation of some commonly used IEIs in terms of sample size the quality (research and development technology creative output expenditure on research and development level of research whether it is firm country or employer entrepreneur level etc.) and the quantity of indices measurement method survey frequency and some other specifications. Indices are compared with each other to expose both the similarities and the differences, however there is still a big gap on the comparison of state and degree of entrepreneurship and innovation in nations. Although there are some obstacles in the measurement of IEIs they present a broader point of view to the researchers and practitioners. As a result of the diversity in measurement methods sampling sizes indicators etc. there is not a single method for evaluating these indicators which makes it difficult to make a comparison. As a result for the proper establishment of IEIs standardization of the initiatives should be considered. This research sheds a light for further scientific debates in this field of study.Conference Object Spymasters Tools: A Comparative Approach to Side Channel Attacks(ACAD CONFERENCES LTD, 2014) Tugce Kalkavan; Kalkavan, Tugce; A Liaropoulos; G TsihrintzisIn many security protocols implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. In public cryptography research on side channel attacks started with works of (Kocher et al. 2004 Kocher 1996 Kocher et al. 1999). Side channel attacks is a passive attack which basically depend on collecting information through physically observable phenomenon's created by the execution of computing tasks in microelectronic devices and logical gates in order to break cryptographic algorithms such as timing information proposed in (Kocher 1996 Jean-Fran et al. 2000) power consumption studied in (Kocher et al. 1999) and electromagnetic radiation in (Agrawal et al. 2003). This paper serves as an introduction to basic level of side channel attacks method and techniques used in these attacks and many other countermeasures such as Simple Power Analysis Differential Power Analysis, Data bit Differential Power Analysis against such attacks.Conference Object Strengthening Strategic Approach to Counter Cyberspace Threats in Nigeria(ACAD CONFERENCES LTD, 2018) Anas Mu'azu Kademi; JS Hurley; JQ ChenMost cyber threats and attacks on a system an organisation or a nation have significant consequences especially on missions and can affect even an unintended target. Nigeria is vulnerable to such threats the most pressing of which is cybercrime that sabotage economic prosperity and damage reputation. This cybercrime is a result of (mostly internal) cybercriminal threats exploiting weaknesses in high population lacking security consciousness inadequate low-level security controls poor governmental sustainable commitment poverty and lack of capacity. Nigerian National Cyber Security Strategy (NNCSS) needs to be optimized to consider Nigerian peculiarity and concepts critical to strategy development. For instance Nigerian electronic fraud forum (NEFF) is the only partnership scheme cutting across different sectors and is tailored towards monetary transaction. We therefore identified critical control issues in NNCSS give suggestions to strengthen NNCSS-an algorithmic step for risk based strategy development and an adjustment to the institutional setting. Considered all together a framework of a model to enhance the strategy is given. Nigeria is a strategic country-known for some cyber threats and an enhancement of its existing cyber security strategic approaches will not only ensure adequate security to the country but also others. For example cooperation a significant element of strategy fostered at various levels (international through local) strengthens the course of nations efforts to cyber security.Conference Object Citation - WoS: 3Suggesting a Honeypot Design to Capture Hacker Psychology- Personality and Sophistication(ACAD CONFERENCES LTD, 2018) Murat Odemis; Cagatay Yucel; Ahmet Koltuksuz; Gokhan Ozbilgin; Yucel, Cagatay; Ozbilgin, Gokhan; Odemis, Murat; Koltuksuz, Ahmet; JS Hurley; JQ ChenThe benefits of collaborating across disciplines such as social sciences applied statistics and computer science primarily affect the security arena regarding the fields of open source intelligence information warfare and strategic studies of security. Computer science and psychology are becoming more and more involved with the advancements in big data analytics. Contemporary studies in this intersection show that personality traits such as neuroticism extroversion openness agreeableness and conscientiousness can be predicted through sensors logs and active user behaviors. In the security systems it is now a need for psychoanalysis to become more proactive as it plays an important role in the understanding of a cyber threat. The research question that leads the suggestions in this paper is How much can be learned from logs honeypots and collected security-related data about a hacker's psychology personality and sophistication? Hackers' traits have been investigated in the following dimensions: persistence skill greed motivation confidence and stealth. Honeypots have been designed to create a passive trap for the adversaries. This unlocks and reveals actionable information about the adversaries regarding their identities locations types of attacks they choose to use and their motivations. When a standard private honeypot server is online it will fill out its logs with many attacks from botnets and other automated malicious activities within a short time. In this mass production of logs and activities the quantity within the collection of useful information becomes unfeasible to have gathered without such a program. So far honeypots have been categorized according to their interaction levels and service types. A low-interaction honeypot emulates a few steps and replies of the vulnerable network protocol and the network stack is imitated while a high-interaction honeypot provides a full experience of the service for which it is designed. The amount of transferred data number of failed logins CPU and memory usage and the search sophistication levels are the characteristics which can be derived from a honeypot. This work-in-progress study will detail the specifications of a special type of honeypot that is designed to capture the aforementioned characteristics and sophistication of a hacker.Conference Object The Linkages Among Intellectual Capital Corporate Governance and Corporate Social Responsibility(ACAD CONFERENCES LTD, 2013) Dogan Altuner; Saban Celik; Tuna Can Gulec; Gulec, Tuna Can; Celik, Saban; Altuner, Dogan; A GreenThe purpose of present study is to explore the linkages among Intellectual Capital (IC) Corporate Governance (CG) and Corporate Social Responsibility (CSR) through direct and indirect empirical inquiry. In related literature IC has been conceptualized within different perspective of assessments. Empirical studies conducted on IC have previously analyzed IC in terms of its measurability and linkage with firm performance. On the other hand CG and CSR have been evaluated by using their rating value such as CG and/ or CSR Index. Since their importance for all stakeholders became more and more necessary for preventing organization from any types of chaotic environment there is a need to comprehend their interrelated dynamics. Empirical investigation is conducted on manufacturing firms listed in Istanbul Stock Exchange from 2007 to 2011. Empirical results do support a positive relationship among these important constructs.Conference Object Citation - WoS: 1Citation - Scopus: 2The Role of Leadership in Digital Transformation: A Review and Suggestions for Future Research(ACAD CONFERENCES LTD, 2021) Ozge Can; Can, Ozge; F BezzinaDigital transformation (DT) through the advance and use of diverse digital technologies (e.g. big data business analytics mobile applications internet of things digital platforms) has assumed great importance for organizations. Digitalization efforts by organizations in different industries have become even more prominent by recent crises and disruptions such as the Covid-19 pandemic. Simultaneously digitalization also increase complexity for managers regarding the initiation of multiple changes in and around organizations including work processes working arrangements and stakeholder alignment. Despite these developments we have only limited knowledge about what role leaders play in these processes in generating positive impact including sustainable organizational performance enhanced innovation and creativity or industrial and social improvements. Although certain leadership concepts and approaches have been associated with DT so far no research has discussed these leadership orientations in a comprehensive manner or argued how they can be adopted by managers to connect digital capabilities to organizational value creation and strategic outcomes. Furthermore only a small number of studies have attempted to assess the leadership challenges relevant in DT processes and how these challenges can be managed or eliminated. To address these gaps through a review of the existing literature this study seeks to build an overall understanding of the impact of leadership on the success of complex digital transformations. A set of suggestions are made as possible avenues for future research clarifying the emergence of multiple and nuanced roles leaders play in DT and what new skills and responsibilities managers should assume in guiding the organization towards desired digitalization goals.Conference Object Citation - WoS: 5Citation - Scopus: 5The Security and the Credibility Challenges in e-Voting Systems(ACAD CONFERENCES LTD, 2015) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; N AbouzakharE-voting is one of the most emerging social innovations of the 21st century which is being adopted by many countries since it represents the peak of e-government solutions and also enables an easier way to vote for their citizens and expatriates. In addition e-voting systems will not only increase the amount of voters' participation but also will decrease the total cost of electoral process. The main concern with the e-voting system is security. Unlike any other offence it is first difficult to observe ambiguities in voting and also it is much more difficult to locate the lost or to detect the rigged votes. Challenges such as how to authenticate the voter how to securely cast his/her vote and then how to store and to count these votes without outside influence generate whole scrutiny over the e-voting systems. This paper first discusses these challenges and then proposes a unique approach to ensure public confidence and credibility over the electoral systems. This proposal inherits 2 independent modules, first module to verify authentication by implementing an e-government application and smartphone to identify a registered voter. After the completion of successful validation the second module that provides anonymity to the voter similar to TOR (The Onion Router) will be activated to cast the e-ballot.Conference Object Workplace Related Determinants on Innovation Success and Characteristics(ACAD CONFERENCES LTD, 2011) Cagri Bulut; Selin Gencturk; Duygu Seckin Halac; Halac, Duygu Seckin; Bulut, Cagri; Gencturk, Selin; H FulfordDespite the fact that innovation is at the heart of the competitive advantage and it is critically important for corporations to survive in today's dynamic competition we still know little about the determinants of its characteristics and success. Building on social information processing theory and resource-based view this study proposes that competitive advantage can be gained and sustained through committed and satisfied employees. Considering employees as the key determinants of innovation success and characteristics we identify the employees' satisfaction and commitment to both their jobs and organizations. This study proposes to the literature by integrating the perspectives of strategic management and organizational behavior. Literature on characteristics and success of innovation is cultivated by the studies of strategic management while literature on job and workplace related attitudes of employees' (JWA) is cultivated by the studies of organizational psychology and organizational behavior.

