scispace - formally typeset
Search or ask a question
Author

Tuncay Ercan

Other affiliations: Siemens
Bio: Tuncay Ercan is an academic researcher from Yaşar University. The author has contributed to research in topics: Cloud computing & Wireless sensor network. The author has an hindex of 7, co-authored 40 publications receiving 707 citations. Previous affiliations of Tuncay Ercan include Siemens.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article , a cost estimation technique for agile software development is proposed, which is predictions-based and has different categorizations of projects based on user stories complexities and the developer's expertise.
Abstract: • `Agile cost estimation in scrum development. • Cost estimation methods in scrum and limitations. • Suggested a cost estimation model. Agile has been invented to improve and overcome the deficiencies of efficient software development. At present, the agile model is used in software development vastly due to its support to both developers and clients resourcefully. Agile methodology increases the interaction between the developer and client to make the software product defect-free. The agile model is getting to be a well-known life cycle model because of its particular features and most owing is to allow changes at any level of the project from the product owner. However, on other hand, this novel feature is a disadvantage of the agile model due to frequent change requests from the client has increased the cost and time. To overcome cost and time estimation issues different cost estimation techniques are being used in agile development but no one is pertinent for accurate estimation. Therefore, this study has proposed a cost estimation technique. The proposed estimation technique is predictions-based and has different categorizations of projects based on user stories complexities and the developer's expertise. We have applied the suggested technique to ongoing projects to find the results and effectiveness. We have used two projects with different sizes and user stories. Both projects have different modules and developers with different expertise. We have used the proposed estimation technique on projects and done a survey session with the teams. This survey session's main objective is to reveal the statistical findings of the proposed solution. We have designed the 12 hypotheses for statistical analysis.

2 citations

Journal ArticleDOI
TL;DR: The descriptive analysis results show that increasing productivity in business processes and working collaboratively from remote are the most important perceived benefits of adopting cloud computing in the production sector and service sector, respectively.
Abstract: Purpose of the study: This research aims to understand the benefits and challenges of cloud and non-cloud adopter companies of production and service sectors on cloud computing and making recommendations based on companies’ perceptions of the issue in Izmir, Turkey. Methodology: This is a descriptive survey of businesses, forming a questionnaire for 99 companies in the service sector and 66 companies in the production sector to non-cloud or cloud user businesses in the city of Izmir in Turkey. SPSS 26.0 software is used to analyze the perceived benefits and challenges of cloud computing. Main Findings: The descriptive analysis results show that increasing productivity in business processes and working collaboratively from remote are the most important perceived benefits of adopting cloud computing in the production sector and service sector, respectively. On the other hand, business processes adoption issues and concerns about security are the significant perceived challenges and barriers of cloud computing adoption, respectively. Applications of this study: The study is useful for governments to understand the critical points of cloud computing and is believed to give governments the ability to prepare an appropriate environment for businesses. Cloud providers and companies also take a position to contribute to this environment by creating new I.T. products and purchasing these I.T. products conforming to their I.T. needs, respectively. Novelty/Originality of this study: This research provides companies in Izmir with a guide for the adoption considering the appropriate cloud computing deployment models such as public cloud, private cloud, community cloud and hybrid cloud for certain types of applications such as software as a service (SaaS), platform as a service(PaaS) and Infrastructure as a service (IaaS) for developing countries.

2 citations

Journal Article
TL;DR: The overall benefits of the mobile systems in the business are reviewed since it has a critical value for the diversity of ISs and how mobility works and how organizations can extract maximum value from the mobile services in a secure way are explained.
Abstract: Mobile Information Systems (ISs) have an important effect in organizations. They are not limited to the office, people can use mobile devices that they carry with them and access the network resources. They do not replace traditional information systems, but they are planned and designed with the unique features of wireless communication. With the increasing level of different information technologies, corporate level systems have the potential to change how business people efficiently work together. The need for a mobile user to have uninterrupted and secure access to information on the network should be considered and the necessary policies should be established for regular information flow in the organization. Our paper reviews the overall benefits of the mobile systems in the business since it has a critical value for the diversity of ISs. It also explains how mobility works and how organizations can extract maximum value from the mobile services in a secure way.

2 citations

Book ChapterDOI
21 May 2010
TL;DR: A more secure access control mechanism for mobile corporate devices is presented that can be used as an additional security framework that enforces access control mechanisms in the organizations.
Abstract: Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.

2 citations

01 Jan 2011
TL;DR: This study presents a semantic hashing mechanism formulating an effective search query and assists users with an easier query builder interface, which extends the features of the “user preferences sub-ontology” and provides an effective performance against well-known weaknesses of mobile devices.
Abstract: Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services have integrated them far more in end-users’ lives. Organizations need an effective way of handling their information system for their employees and customers. Mobile devices such as notebook computers, Personal Digital Assistants (PDAs), smart phones owned by the corporate and individual users should be adaptable into the existing business environment. In this paper, we present a hash-based framework, namely SCDE (Shared Corporate Data Extraction) using the current ontological architectures of the corporate domains. This study presents a semantic hashing mechanism formulating an effective search query and assists users with an easier query builder interface. It also extends the features of the “user preferences sub-ontology” and provides an effective performance against well-known weaknesses of mobile devices. Our model also supports future plans of users’ interaction with semantic structures, knowledge sharing and new business opportunities for Corporate Information Management Systems.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The research revealed that relative advantage, top management support, firm size, competitive pressure, and trading partner pressure characteristics have a significant effect on the adoption of cloud computing.
Abstract: – The purpose of this paper is to investigate the factors that affect the adoption of cloud computing by firms belonging to the high‐tech industry. The eight factors examined in this study are relative advantage, complexity, compatibility, top management support, firm size, technology readiness, competitive pressure, and trading partner pressure., – A questionnaire‐based survey was used to collect data from 111 firms belonging to the high‐tech industry in Taiwan. Relevant hypotheses were derived and tested by logistic regression analysis., – The findings revealed that relative advantage, top management support, firm size, competitive pressure, and trading partner pressure characteristics have a significant effect on the adoption of cloud computing., – The research was conducted in the high‐tech industry, which may limit the generalisability of the findings., – The findings offer cloud computing service providers with a better understanding of what affects cloud computing adoption characteristics, with relevant insight on current promotions., – The research contributes to the application of new technology cloud computing adoption in the high‐tech industry through the use of a wide range of variables. The findings also help firms consider their information technologies investments when implementing cloud computing.

995 citations

Journal ArticleDOI
TL;DR: An extensive review on cloud computing with the main focus on gaps and security concerns is presented, which identifies the top security threats and their existing solutions and investigates the challenges/obstacles in implementing threat remediation.

288 citations

Journal ArticleDOI
TL;DR: This survey presents a comprehensive and organized review of the progress of outlier detection methods from 2000 to 2019 and categorizes them into different techniques from diverse outlier Detection techniques, such as distance-, clustering-, density-, ensemble-, and learning-based methods.
Abstract: Detecting outliers is a significant problem that has been studied in various research and application areas. Researchers continue to design robust schemes to provide solutions to detect outliers efficiently. In this survey, we present a comprehensive and organized review of the progress of outlier detection methods from 2000 to 2019. First, we offer the fundamental concepts of outlier detection and then categorize them into different techniques from diverse outlier detection techniques, such as distance-, clustering-, density-, ensemble-, and learning-based methods. In each category, we introduce some state-of-the-art outlier detection methods and further discuss them in detail in terms of their performance. Second, we delineate their pros, cons, and challenges to provide researchers with a concise overview of each technique and recommend solutions and possible research directions. This paper gives current progress of outlier detection techniques and provides a better understanding of the different outlier detection methods. The open research issues and challenges at the end will provide researchers with a clear path for the future of outlier detection methods.

263 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a descriptive literature review and classification scheme for cloud computing research, which includes 205 refereed journal articles published since the inception of cloud computing and classify them into four main categories: technological issues, business issues, domains and applications, and conceptualizing cloud computing.
Abstract: We present a descriptive literature review and classification scheme for cloud computing research. This includes 205 refereed journal articles published since the inception of cloud computing research. The articles are classified based on a scheme that consists of four main categories: technological issues, business issues, domains and applications, and conceptualising cloud computing. The results show that although current research is still skewed towards technological issues, new research themes regarding social and organisational implications are emerging. This review provides a reference source and classification scheme for IS researchers interested in cloud computing, and to indicate under-researched areas as well as future directions.

240 citations

Journal ArticleDOI
TL;DR: In this article, a review of the applications of molecularly imprinted polymer (MIP) materials in the area of electrochemical sensors has been explored, where the designs of the MIPs containing different polymers, their preparation and their immobilization on the transducer surface have been discussed.
Abstract: In this review, the applications of molecularly imprinted polymer (MIP) materials in the area of electrochemical sensors have been explored. The designs of the MIPs containing different polymers, their preparation and their immobilization on the transducer surface have been discussed. Further, the employment of various transducers containing the MIPs based on different electrochemical techniques for determining analytes has been assessed. In addition, the general protocols for getting the electrochemical signal based on the binding ability of analyte with the MIPs have been given. The review ends with describing scope and limitations of the above electrochemical based MIP sensors.

211 citations