Publisher
Now showing items 1-18 of 18
-
A Novel Approach to e-Learning: Yasar University e-Learning System (YES)
(ACAD CONFERENCES LTD, 2013)Since 2009, every student who attends Yasar University (Izmir, Turkey), regardless of their department, has to take part in seven courses (Human Sciences, Research Culture, Design Culture, Aesthetic Culture, Ethic Culture, ... -
A Programmable Threat Intelligence Framework for Containerized Clouds
(ACAD CONFERENCES LTD, 2018)Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems ... -
A Proposal for a Novel e-Learning System for the Visually Impaired
(ACAD CONFERENCES LTD, 2014)According to World Health Organization (WHO), 285 million people are estimated to be visually impaired worldwide: 39 million are blind and 246 million have low vision. It is a well-known fact that for the visually impaired ... -
A Proposal for Turkish/German Cross-Language Q&A System
(ACAD CONFERENCES LTD, 2012)Over the last decade, many approaches have been introduced about Q&A (Question & Answer) Systems. The problem with many of these works is that they mainly implement English as the underlying language. With the tremendous ... -
An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers
(ACAD CONFERENCES LTD, 2014)Since 2008, Cyberspace is officially regarded as a distinct military domain, along with land, sea and air for many countries (Goel, 2011). Several nations are developing defensive and offensive cyber capabilities for this ... -
Analysis of e-Learning Outcomes at Higher Education: A Case Study
(ACAD CONFERENCES LTD, 2014)As explained in our paper A Novel Approach To E-Learning: Yasar University E-Learning System (YES) (Zincir et al. 2013), since 2009, every student who attends Yasar University (Izmir, Turkey), regardless of their department, ... -
Challenges in Analyzing Unstructured Learner Generated Qualitative Big Data
(ACAD CONFERENCES LTD, 2015)As the amount of educational data grows, a necessity is occurring to define characteristics of Unstructured Learner Generated Qualitative Big Data (ULGQBD), and develop a conceptual framework to analyze these data sets. ... -
Clandestine Cell Based Honeypot Networks
(ACAD CONFERENCES LTD, 2016)A Clandestine Cell is a type of an intelligence organization where a cell only knows the immediate superior and the associated members of itself. This kind of organizational structure is used by intelligence agencies ... -
Does Really Innovative Work Behaviors of Emloyees Mediate the Innovative Performance Impacts of Intrapreneurship?
(ACAD CONFERENCES LTD, 2011)In today's highly dynamic and innovation based competitive environments force corporations to develop distinctive employee skills and competencies which were difficult to replicate or to imitate by the competitors. Resource ... -
ELCARE: A Novel Approach for Educating Caretakers of Elderly
(ACAD CONFERENCES LTD, 2015)Elderly care, or simply eldercare, is the fulfillment of the special needs and requirements that are unique to senior citizens. Elderly care emphasizes the social and personal requirements of senior citizens who need some ... -
Improving Employee Performance Using Web-Based Application for Public Services
(ACAD CONFERENCES LTD, 2012)One of the vital problems of public services is the deficiency of well-educated and highly motivated employees. The attitudes and performance of public servants have a crucial importance on the satisfaction of the customer ... -
Innovation and Entrepreneurship Assessment Initiatives: A Critical View
(ACAD CONFERENCES LTD, 2013)Entrepreneurship and Innovation related regional and national development has become a phenomenon for the last decades; however the outcomes of these endeavors have attracted many researchers, agencies and international ... -
Spymasters Tools: A Comparative Approach to Side Channel Attacks
(ACAD CONFERENCES LTD, 2014)In many security protocols, implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. ... -
Strengthening Strategic Approach to Counter Cyberspace Threats in Nigeria
(ACAD CONFERENCES LTD, 2018)Most cyber threats and attacks on a system, an organisation or a nation have significant consequences, especially on missions, and can affect even an unintended target. Nigeria is vulnerable to such threats, the most ... -
Suggesting a Honeypot Design to Capture Hacker Psychology, Personality and Sophistication
(ACAD CONFERENCES LTD, 2018)The benefits of collaborating across disciplines, such as social sciences, applied statistics and computer science, primarily affect the security arena regarding the fields of open source intelligence, information warfare, ... -
The Linkages Among Intellectual Capital, Corporate Governance and Corporate Social Responsibility
(ACAD CONFERENCES LTD, 2013)The purpose of present study is to explore the linkages among Intellectual Capital (IC), Corporate Governance (CG) and Corporate Social Responsibility (CSR) through direct and indirect empirical inquiry. In related literature, ... -
The Security and the Credibility Challenges in e-Voting Systems
(ACAD CONFERENCES LTD, 2015)E-voting is one of the most emerging social innovations of the 21st century which is being adopted by many countries, since it represents the peak of e-government solutions and also enables an easier way to vote for their ... -
Workplace Related Determinants on Innovation Success and Characteristics
(ACAD CONFERENCES LTD, 2011)Despite the fact that innovation is at the heart of the competitive advantage and it is critically important for corporations to survive in today's dynamic competition, we still know little about the determinants of its ...