Bilgilendirme: Kurulum ve veri kapsamındaki çalışmalar devam etmektedir. Göstereceğiniz anlayış için teşekkür ederiz.
 

Pusatlı, Özgür Tolga

Loading...
Profile Picture
Name Variants
Pusatlı, O. Tolga
Pusatli, Tolga
Pusatli, T.
Pusatli, O.T.
Pusatli, Ozgur Tolga
Pusatlı, T.
Tolga Pusatli, O.
Job Title
Doç. Dr.
Email Address
pusatli@cankaya.edu.tr
Main Affiliation
03.07. Yönetim Bilişim Sistemleri
03. İktisadi ve İdari Birimler Fakültesi
01. Çankaya Üniversitesi
03.07. Yönetim Bilişim Sistemleri
Yönetim Bilişim Sistemleri
03. İktisadi ve İdari Birimler Fakültesi
01. Çankaya Üniversitesi
Status
Current Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

13

CLIMATE ACTION
CLIMATE ACTION Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

1

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

0

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

2

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

0

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

0

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

0

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

1

Research Products
Documents

23

Citations

282

h-index

9

Documents

14

Citations

226

Scholarly Output

24

Articles

12

Views / Downloads

1700/151

Supervised MSc Theses

1

Supervised PhD Theses

0

WoS Citation Count

189

Scopus Citation Count

230

WoS h-index

7

Scopus h-index

7

Patents

0

Projects

0

WoS Citations per Publication

7.88

Scopus Citations per Publication

9.58

Open Access Source

3

Supervised Theses

1

Google Analytics Visitor Traffic

JournalCount
22nd International Conference on Neural Information Processing (ICONIP) -- NOV 09-12, 2015 -- Istanbul, TURKEY1
ACM International Conference Proceeding Series -- 6th International Conference on Computer and Technology Applications, ICCTA 2020 -- 14 April 2020 through 16 April 2020 -- Antalya -- 1604901
ACM International Conference Proceeding Series -- 9th International Conference on Software and Information Engineering, ICSIE 2020 -- 11 November 2020 through 13 November 2020 -- Virtual, Online -- 1662851
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications1
Cybersecurity Policies and Strategies for Cyberwarfare Prevention1
Current Page: 1 / 4

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 24
  • Conference Object
    Security Requirements in Iot Environments
    (Springer Science and Business Media Deutschland GmbH, 2022) Koyuncu, M.; Pusatlı, T.; Binglaw, F.
    The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
  • Article
    Citation - WoS: 1
    Exploring Supportive and Deterrent Factors on Online Shopping in a Developing Country
    (Igi Global, 2020) Pusatli, Tolga; Akman, Ibrahim
    This study explores the influence of the reasons of individuals' supportive and deterrent behaviors against commercial usage of online media in the emerging market of Turkey. The supportive and deterrent factors are grouped in empirical categories as discouragement and encouragement, respectively. The impact of these factors on actual behavior were assessed via intermediary empirical category including the variables inefficiency, efficiency, intention, and subjective norm. A survey was conducted using a sample of 251 observations obtained from the visitors of three large/busy malls using purposive sampling. The multiple least-square regression was utilized to test the nature of the relationships between variables. Results indicated a significant discouraging impact of warranty, finance, habits, security on inefficiency perceptions, an encouraging impact of geography and convenience on efficiency perceptions. Significant behavioral impact of perceptions regarding inefficiency, efficiency, subjective norms, and intention on actual usage of online shopping was also observed.
  • Article
    A Discussion On the Role of People in Global Software Development [Rasprava O Ulozi Ljudi U Globalnom Razvoju Softvera]
    (2013) Misra, Sanjay; Colomo-Palacios, Ricardo; Pusatlı, Özgür Tolga; Soto-Acosta, Pedro
    Literature is producing a considerable amount of papers which focus on the risks, challenges and solutions of global software development (GSD). However, the influence of human factors on the success of GSD projects requires further study. The aim of our paper is twofold. First, to identify the challenges related to the human factors in GSD and, second, to propose the solution(s), which could help in solving or reducing the overall impact of these challenges. The main conclusions of this research can be valuable to organizations that are willing to achieve the quality objectives regarding GSD projects.
  • Conference Object
    Citation - WoS: 13
    Citation - Scopus: 15
    A Survey of Applying Machine Learning Techniques for Credit Rating: Existing Models and Open Issues
    (Springer international Publishing Ag, 2015) Xu, Min; Pusatli, Ozgur Tolga; Wang, Xiang
    In recent years, machine learning techniques have been widely applied for credit rating. To make a rational comparison of performance of different learning-based credit rating models, we focused on those models that are constructed and validated on the two mostly used Australian and German credit approval data sets. Based on a systematic review of literatures, we further compare and discuss about the performance of existing models. In addition, we identified and illustrated the limitations of existing works and discuss about some open issues that could benefit future research in this area.
  • Book Part
    Maintaining Cybersecurity Awareness in Large-Scale Organizations: a Pilot Study in a Public Institution
    (IGI Global, 2023) Aslan, M.; Pusatli, T.
    Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users' cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. © 2023, IGI Global. All rights reserved.
  • Conference Object
    Citation - Scopus: 5
    Investigating End User Errors in Oil and Gas Critical Control Systems
    (Association for Computing Machinery, 2020) Alrawi, L.N.; Pusatli, T.
    System availability and efficiency are critical in the petroleum sector as any fault affecting those systems may negatively impact operations resources, such as money, human resources and time. Therefore, it has become important to investigate the reasons for such errors. In this study, human error has been targeted since a number of these errors is projected to increase in the sector. The factors that affect end user behavior are investigated in addition to an evaluation of the relation between system availability and human behavior. An investigation has been performed following the descriptive methodology in order to gain insights into human error factors. Questionnaires related to software/hardware errors and errors due to the end user were collected from 81 site workers. The findings indicate a potential relation between end user behavior and system availability. Training, experience, education, work shifts, system interface, usage of memory sticks and I/O devices were identified as factors affecting end user behavior, hence system availability and efficiency. © 2020 ACM.
  • Article
    Citation - WoS: 18
    Citation - Scopus: 17
    Innovative Stability Analysis of Complex Secondary Toppling Failures in Rock Slopes Using the Block Theory
    (Springer Heidelberg, 2025) Mao, Yimin; Azarafza, Mohammad; Bonab, Masoud Hajialilue; Pusatli, Tolga; Nanehkaran, Yaser A.
    We present the block theory-based secondary toppling stability analysis method (BTSTSA), an advanced and novel method specifically designed to assess secondary toppling failures in slopes. This innovative method comprehensively accounts for various failure mechanisms and computes the factor of safety (F.S) for rock slopes. Grounded in Block theory principles, particularly the key-block method, and supplemented by limit equilibrium techniques, BTSTSA offers a practical and reliable analytical framework. Our investigation focused on five discontinuous rock slopes in the South Pars region, southwest Iran, which are affected by composite toppling failure mechanisms. The stability analysis results were meticulously verified using the Aydan-Kawamoto method, a recognized benchmark in the field. Comparative analysis consistently demonstrated that the BTSTSA approach generates more conservative estimates of the F.S compared to the Aydan-Kawamoto method. This conservatism underscores the robustness and reliability of the BTSTSA framework and highlights its implications for practical engineering applications. The integration of this innovative analytical method with data from these investigations offers crucial insights for geotechnical engineers, equipping them to manage the complexities of secondary toppling failures in discontinuous rock slopes. These findings emphasize the importance of considering conservatism in engineering applications and provide a more accurate and reliable assessment of slope stability, particularly concerning secondary toppling failures, thereby benefiting geotechnical engineering practices.
  • Master Thesis
    Yönetim Bilişim Sistemlerinin Örgütsel Karar Alma Üzerindeki Etkisinin İncelenmesi: Teknolojik ve Yönetsel Faktörlerin Rolü
    (2025) Al-Bazirgan, Batol İhsan Ali; Şener, İrge; Pusatlı, Özgür Tolga
    Günümüz örgütsel ortamında, karar alma süreçleri stratejik ve operasyonel başarının sağlanmasında kritik bir rol oynamaktadır. Bu çalışma, teknolojik faktörler, üst yönetim desteği ve bilgisayar özyeterliliğinin örgütsel karar alma yaklaşımları ve kültürü üzerindeki bütünleşik etkisini araştırmaktadır. Irak'ın petrol ve gaz sektöründe faaliyet gösteren devlet şirketi Basra Petrol Şirketi'nden (BOC) 379 katılımcıdan elde edilen veriler doğrultusunda, bu araştırma nicel bir tasarım kullanarak değişkenler arasındaki ilişkileri incelemektedir. Bulgular, üst yönetim desteği ve bilgisayar özyeterliliğinin örgütsel karar alma yaklaşımlarını ve kültürünü önemli ölçüde güçlendirdiğini, ancak sistem kalitesi ve bilgi kalitesi gibi teknolojik faktörlerin doğrudan etkisinin sınırlı olduğunu ortaya koymaktadır. Bu sonuçlar, teknolojik kaynakların etkili bir şekilde kullanılabilmesi için yönetsel ve bireysel faktörlerin kritik önemini vurgulamaktadır. Çalışma, örgüt liderleri, politika yapıcılar, bilişim sistemleri geliştiricileri ve araştırmacılar için değerli içgörüler sunmaktadır. Teknoloji, yönetim ve bireysel yetkinliklerin birbirini tamamlayıcı rolünü öne çıkararak, karar alma dinamiklerine yönelik teorik anlayışı genişletmekte ve karar alma süreçlerini iyileştirmek için pratik öneriler sunmaktadır. Bulgular, bilgi sistemlerinin etkili bir şekilde entegre edilmesi ve kullanılabilmesi için liderlik katılımının ve kullanıcı güveninin gerekliliğini vurgulayarak, karmaşık örgütsel bağlamlarda uyarlanabilir ve verimli karar alma uygulamalarının sağlanmasına katkıda bulunmaktadır.
  • Article
    Citation - WoS: 83
    Citation - Scopus: 94
    Application of Machine Learning Techniques for the Estimation of the Safety Factor in Slope Stability Analysis
    (Mdpi, 2022) Nanehkaran, Yaser Ahangari; Pusatli, Tolga; Jin Chengyong; Chen, Junde; Cemiloglu, Ahmed; Azarafza, Mohammad; Derakhshani, Reza
    Slope stability is the most important stage in the stabilization process for different scale slopes, and it is dictated by the factor of safety (FS). The FS is a relationship between the geotechnical characteristics and the slope behavior under various loading conditions. Thus, the application of an accurate procedure to estimate the FS can lead to a fast and precise decision during the stabilization process. In this regard, using computational models that can be operated accurately is strongly needed. The performance of five different machine learning models to predict the slope safety factors was investigated in this study, which included multilayer perceptron (MLP), support vector machines (SVM), k-nearest neighbors (k-NN), decision tree (DT), and random forest (RF). The main objective of this article is to evaluate and optimize the various machine learning-based predictive models regarding FS calculations, which play a key role in conducting appropriate stabilization methods and stabilizing the slopes. As input to the predictive models, geo-engineering index parameters, such as slope height (H), total slope angle (beta), dry density (gamma(d)), cohesion (c), and internal friction angle (phi), which were estimated for 70 slopes in the South Pars region (southwest of Iran), were considered to predict the FS properly. To prepare the training and testing data sets from the main database, the primary set was randomly divided and applied to all predictive models. The predicted FS results were obtained for testing (30% of the primary data set) and training (70% of the primary data set) for all MLP, SVM, k-NN, DT, and RF models. The models were verified by using a confusion matrix and errors table to conclude the accuracy evaluation indexes (i.e., accuracy, precision, recall, and f1-score), mean squared error (MSE), mean absolute error (MAE), and root mean square error (RMSE). According to the results of this study, the MLP model had the highest evaluation with a precision of 0.938 and an accuracy of 0.90. In addition, the estimated error rate for the MLP model was MAE = 0.103367, MSE = 0.102566, and RMSE = 0.098470.
  • Article
    A Prelımınary Work On Investıgatıng Unıted Natıons’s Egovernment Crıterıa In Mıddle East Countrıes
    (2017) Hussein, Mohammed; Pusatlı, O. Tolga
    The benefits of e-government initiatives empowered by the information and communication technologies, are acknowledged widely with assessment criteria published by the United Nations regularly over the last 15 years. One of the reasons that United Nations has taken such assessment into agenda is the apparent advantages of such initiatives over the citizen, society and government. In parallel literature review and current status of Middle East countries, these issues are investigated with examples: Internet users, awareness and training, culture, intention to use e-government applications of the citizens, portal and interoperability. It is noted that assessment of human capital indices for these countries should be read carefully while considering these topics. The findings reveal the impact of human capital index on evaluating egovernment performance; geographical area and population also affect the adoption of e-government. For this, follow-up work is suggested to investigate the level of information and communication technology and computer literacy along with these factors in the region. This research has limitations which include the sources of information, exclusive economic and legal issues and a number of measurement methods.