- KSÜ Avşar Kampusu
Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü
46050 Onikişubat
Kahramanmaraş - +90(344)2801310
- Kahramanmaras Sutcu Imam Univ., Computer Education and Instructional Technology, Faculty MemberKyrgyzstan-Turkey Manas University, Computer Engineering, Faculty MemberUtah State University, Technology and Engineering Education, Department Memberadd
- Industrial Technology, Human-Robot Interaction, Distance Education, Robotics, Human Computer Interaction, Internet Attitude, and 18 moreInformation Security, Engineering Education, Computer Education and Instructional Technology, Educational Robotics, Computer Science, Image Processing, Algorithms, Computer Science Education, Course Management Systems, Engineering Graduate Attributes, Online student portfolios, Teaching and Learning Programming, Computer Ethics, ICT in Education, Emotional intelligence, Computer Vision, Cryptography, and STEM Educationedit
- Mehmet Tekerek is a Professor in the Department of Computer Education and Instructional Technology at Kahramanmaraş S... moreMehmet Tekerek is a Professor in the Department of Computer Education and Instructional Technology at Kahramanmaraş Sütçüimam University in Kahramanmaraş, Turkey and Guest Faculty Member of Computer Engineering Department in Kyrgyzstan-Turkey Manas University in Bishkek, Kyrgyzstan. He is currently studying on Engineering Education and Instructional Technologies.edit
Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play... more
Within FATİH Project, it's aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers' computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it's indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers ...
Research Interests:
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet... more
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers ’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates ’ at-titude towards Internet use; however studies on appointed teachers ’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different vari-ables, we used the Internet use att...
Research Interests:
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of... more
Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of communication. A knowledge network represents a large number of people, resources and relationships between them, to create the highest value, primarily to accumulate and use knowledge through the process of generating and transmitting knowledge. General structure of knowledge networks; it consists of three basic stages: gathering, organizing and disseminating knowledge. The first step, knowledge collection, institutions and organizations to enter the network structure of the knowledge that is present. The organizing phase is the structuring of irregular and unstructured knowledge in the network structure according to certain standards and recording them regularly in the structure. Knowledge dissemination can be expressed as the transfer of organized k...
Research Interests:
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla... more
Gunumuzde verimliligin artirilmasi, is akislarinin hizlandirilmasi, calisanlar ve diger kurumlarla daha hizli iletisim kurulabilmesi, gunluk yasantimizi kolaylastirmasi gibi bircok sebepten dolayi bilisim sistemleri hizla yayginlasmaktadir. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapilar yerlerini, dagitik mimarilere, internet ve aglar uzerinden erisilebilen elektronik uygulamalara birakmistir. Web uygulamalari, uzaktan erisimler, cevrimici sistemler, bilgisayar aglari, internet gibi elektronik bilgi altyapilarinin kullaniminin artmasi sonucunda ekavramlar (e-ticaret, e-ogrenme, e-rezervasyon, e-sinav, e-okul, e-banka, e-devlet vb.) gunluk yasantimizin bir parcasi haline gelmistir. Bilisim ortamlarinin kullaniminin artmasi ve yayginlasmasina paralel olarak guvenlik tehditleri ve riskleri ayni oranda artmistir. Teknik guvenlik onlemlerinin gelismesine ragmen bilisim sistemlerine karsi yapilan saldirilarin sayisinin artmasi ve bilgi sistemleri uzerinde yuksek derecede...
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much... more
Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a central control mechanism and the individual attitude of each node. In this study, the security threats and the routing protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome security treats aiming for confidentiality, integrity and accessibility....
Research Interests:
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and... more
This paper describes efforts underway to construct a Scientific Publication Content Management System (SPCMS) with Peer Review Tools (PRT) for Academic Institutions. Firstly, known Scientific Publication processes have been reviewed and online publication process was chosen as a model for developing a scientific content publication and management system. Next, the developed system is implemented as a case study to Kyrgyzstan-Turkey Manas University scientific journals. Since it is aimed to construct an online only journals, the system is supposed to be fast-tracking, fully manageable and, on the other hand, it should be highly secure since all the manuscripts are to be stored on the system. To undertake such problems as fast tracking, data processing and security was decided to implement self- developed system by using PHP and AJAX programming on Apache server with MySQL database application. The result of this research is an automated publishing system for scholar manuscript public...
Research Interests:
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde... more
63 Sınıf Öğretmenlerinin Öğretme-Öğrenme Sürecinde Bilgisayar Kullanımına ĠliĢkin Tutumları Mehmet TEKEREK Dr, KSÜ, Bilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü GülĢen SERT BiliĢim Teknolojileri Öğretmeni Öz: Teknoloji günümüzde günlük yaĢamın her alanına ...
Research Interests:
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This... more
In this study, it was aimed to determine ethical reasoning of lecturers in STEM disciplines in terms of several independent variables (gender, working another institution, age, academic title, academic discipline, service period). This study was designed as a survey research. Lecturers in STEM disciplines in Kahramanmaras Sutcuimam University were selected as participants of the study. ‘‘Ethical Reasoning Instrument (ERI)’ which was developed by Titus, Zoltowski, Huyck, and Oakes (2011) was used in order to collect data by adapting into Turkish. Data were analyzed by the help of independent sample t-test, one-way ANOVA and Kruskal-Wallis tests. The findings indicated that for all independent variables there were no statistically significant difference (p>.05) in ethical reasoning of lecturers. As an interesting result, it was determined that lecturers in engineering discipline have less ethical awareness than lecturers in medicine and science disciplines. Keywords: STEM, STEM Dis...
Research Interests:
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group,... more
800x600 In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using Scratch and control group studied with traditional methods. The data was analyzed using independent-samples t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups. Keywords: distributed learning e...
Research Interests:
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes... more
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards int...
Research Interests:
Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the... more
Software development processes, in general, focus on organizing the order of the phases to develop the intended software product within time and cost constraints. However, the vulnerabilities of the software projects released to the market indicate the need of a security oriented software development process along with providing the time and cost criteria. Moreover, to our best knowledge, there exist some studies stating that the security activities in conventional software development contribute to the effectiveness in providing the security. However, if the agile software development processes are reviewed, it can be seen that principles of agile and security do not match at some points. At this point, the model of Trustworthy Scrum (TS) comes to prominence by enabling the security activities to cooperate with the agile methods and to work in Scrum framework. In this study, a statistical analysis related to the feasibility of the Trustworthy Scrum model was conducted in order to a...
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447... more
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work... more
It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work independent of operator and communicate each other. Sensors, embedded systems, communication technologies and data storage systems like clouds create wide area networks that can communicate and share data. In this study, the application of the IoT on a low speed mechanical benchmark driven by a direct current motor has been designed. It is aimed to keep the motor speed fixed at desired value according to the changings occurs depending on varying the pressure acting on the actuators. In presented study, a speed control is performed by establishing a modeling and simulation mechanism that will give the closest results to the real system.
Web yayinlarinda verilerin %65’i goruntulerden olusmaktadir. Bundan dolayi goruntu verilerinin boyutu, kalitesi, erisilirlik gibi unsurlari onem kazanmaktadir. Goruntu bicimleri hakkinda yapilan bircok arastirma gezer aglar gibi sinirli... more
Web yayinlarinda verilerin %65’i goruntulerden olusmaktadir. Bundan dolayi goruntu verilerinin boyutu, kalitesi, erisilirlik gibi unsurlari onem kazanmaktadir. Goruntu bicimleri hakkinda yapilan bircok arastirma gezer aglar gibi sinirli aglarda yukleme hizinin artmasini saglamaya yoneliktir. Web yayinlarinda kullanilmakta olan goruntu bicimlerinin cogu yillar onceki teknolojileri kullanarak gerceklestirilmektedir. Boylece kayipli ve kayipsiz goruntu sikistirma algoritmalarinin sikistirma derecesini goruntu kalitesini bozmadan yukseltme yontemleri gelistirilmektedir. Bu calismada web yayinlarinda goruntu verisinin sayisal bicimde saklama ve raster goruntuleri sikistirma ozellikleri uzerinde durulmustur. JPEG ve PNG sayisal goruntu bicimlerinin sikistirma algoritmalari ile Google tarafindan gelistirilmis WebP algoritmasi, SSIM kalite olcusu ve boyut acisindan karsilastirilmistir. Karsilastirma donusturulmus goruntuler kullanilarak gerceklestirilmis ve sonuclari sunulmustur. Sonuc olar...
Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in... more
Machine translation is a computational linguistics sub-field that studies translation methods and the use of software to translate text between natural languages. Although machine translation is not as accurate as human translation in terms of syntactic, semantic accuracy criteria, the usage of improved methods has lead to obtaininig comparatively acceptable results. In recent years, self-learning methods with statistical analysis of big data are being developed. The current development in machine translation among Turkish languages has moved towards rule-based methods. However, one of today’s leading methods, Statistical Machine Translation, is being poorly applied. For this purpose, in this work N-GRAM based and Phrase based Statistical Machine Translation methods were applied between Kyrgyz and Turkish languages, using limited training data. For both methods, the translation quality was evaluated with BLEU scoring algorithm. According to test results, both applied methods, provid...
Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a... more
Within FATIH Project, it’s aimed to use information technology more effectively in learning environments and targeted to make technological infrastructure improvements in schools. For this process information technology teachers play a key role. Thus, Information Technologies (IT) pre-service teachers’ computer self-efficiency perceptions were examined. In the study, a survey model was used and the sample included 200 Computer Education and Instructional Technologies (CEIT) students in two different universities. Relationships between the perceptions of computer self-efficacy of CEIT students and variables such as gender, graduated high school type, place of department preference, grade level and university type were examined by using computer self-efficacy scale that was developed by Orhan ve Akkoyunlu (2003). As a result, it’s indicated that; Male pre-service teachers have higher computer self-efficacy perceptions than female pre-service teachers, Pre-service teachers that were gr...
Research Interests:
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme... more
Bilgi insanin var oldugu gunden surekli bircok iletisim yontemi ve bilimsel alanla etkilesim icerisine girmistir. Insanlarin bilgiyi paylasma ihtiyacinin artmasiyla, bilgi iceriginin daha iyi anlasilmasi icin cok cesitli gorsellestirme yontemleri uygulanmaya baslanmistir. Bilgi aktariminin teknoloji, bilim, sanat ve kultur alaninin genislemesine paralel olarak gelismesi sonucu uygulanmaya baslanan bu yontemler bundan sonra ki surecte de gelismeye devam edecektir. Gunumuzde bilgi, bilgilendirme tasariminin onemli bir kolu olan veri gorsellestirmesiyle kendini ifade edebilmekte ve icerigin iletilebilmesine onemli olcude olanak saglamaktadir. Bu calismada “Veri Gorsellestirmesi ve Bilgilendirme Grafikleri”nin, bilgilendirme amacina yonelik bilimsel katkisi ele alinmaktadir. Bu kapsamda bir veri gorsellestirme araci olarak yazinin tanimi ve tarihsel olusum sureci incelenmis olup insanlarin gecmisten gunumuze bilgi aktarmada kullandiklari veri gorsellestirme yontemlerinin tanimi, tarihsel surec icerisindeki rolu, gunumuze kadar degisen ve gelisen gorsellestirme konulari ele alinmistir. Bu konunun onculeri ve ustalari ornek calismalariyla birlikte incelenmistir.Bununla birlikte, konunun temel ilke ve esaslarina yer verilerek ve konu bir tasarim disiplini icerisinde ele alinarak bilgilendirme tasarimiyla olan iliskisi degerlendirilmistir. Ayrica, tasarimcinin icerik ve estetik arasindaki dengeyi koruyarak anlasilir bir gorsellestirme olusturma cabasi icine girilmistir. Son olarak, veri gorsellestirmesinin guncel konumuna gore tasarim surecindeki yontem ve uygulamalari incelenerek uygulama alanlari, gunumuzdeki farkli ortamlarla olan bagi uzerinden degerlendirilerek orneklerle pekistirilmistir.
Research Interests:
Research Interests:
Sigara Icme Aliskanligi Ile Bilgisayar Kullanma Aliskanligi Arasindaki Iliskinin Incelenmesi: Betimsel Bir Arastirma
Research Interests:
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to... more
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the natural language, many words disappear in time, on the other hand new words are derived. Therefore, while the process of natural language processing (NLP) is complex even for human, it is difficult to process in computer system. The area of linguistics examines how people use language. NLP, which requires the collaboration of linguists and computer scientists, plays an important role in human computer interaction. Studies in NLP have increased with the use of artificial intelligence technologies in the field of linguistics. With the deep learning methods which are one of the artificial intelligence study areas, platforms close to natural lang...
An initial design for a power circuit of a new plasma system is proposed and implemented in MatLab code. The plasma device is a torus and requires an excitement of wires, which are wrapped around the torus for a toroidal field and a... more
An initial design for a power circuit of a new plasma system is proposed and implemented in MatLab code. The plasma device is a torus and requires an excitement of wires, which are wrapped around the torus for a toroidal field and a poloidal field coil placed at the outer part of the device. This poloidal coil structure ignites an electrical field inside the chamber and that yields to a circular magnetic field inside the plasma. The proposed electrical design for this poloidal field equipment has some components including the alternating current unit and the direct current one. The circuit first uses an ac-dc converter, in order to transfer the ac grid to the dc one. Then it uses a switching scheme and a discharge circuit. The operation voltages for the poloidal field are estimated to be 1 kV, respectively. It has been proven that the designed system can produce an almost dc current with 66 V fluctuation, which is under the limit of 6%, considering the high voltage of 1kV.
Research Interests:
Instructional models form based on the needs. To satisfy the needs specific targeted instructions are presented. Teaching how a vehicle is used, is an example for specific targeted courses. This study suggests and defines a new concept... more
Instructional models form based on the needs. To satisfy the needs specific targeted instructions are presented. Teaching how a vehicle is used, is an example for specific targeted courses. This study suggests and defines a new concept namely “integrated instructional material”. Integrated structures are applications and structures which contain integration for a specific purpose in a system approach. Accordingly, integrated instructional material is an assistant system for instruction. In other words, it is a supportive tool for teaching subjects of different disciplines as a whole by integrating them. 33 Preservice teachers, enrolled engineering class of Pedagogical Formation Education at a Faculty of Education of a state university in the Mediterranean Region of Turkey, performed the development process of integrated instructional material in the context of Instructional Technology and Material Design course. Data were collected through observation notes, open ended questionnaires, and clinical interviews. Content analysis was used in order to analyze data.
Research Interests:
The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method,... more
The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method, jobs are processed by dividing into small pieces and distributing over nodes. Parameters such as distributing method over nodes, the number of jobs held in a parallel fashion, and the number of nodes in the cluster affect the execution time of jobs. The aim of this paper is to determine how the numbers of nodes, maps, and reduces affect the performance of the Hadoop framework in a cloud environment. For this purpose, tests were carried out on a Hadoop cluster with 10 nodes hosted in a cloud environment by running PiEstimator, Grep, Teragen, and Terasort benchmarking tools on it. These benchmarking tools available under the Hadoop framework are classified as CPU-intensive and CPU-light applications as a result of tests. In CPU-light applications, increasing the numbers of nodes, maps, and reduces does not improve the efficiency of these applications; they even cause an increase in time spent on jobs by using system resources unnecessarily. Therefore, in CPU-light applications, selecting the numbers of nodes, maps, and reduces as minimum is found as the optimization of time spent on a process. In CPU-intensive applications, according to the phase that small job pieces is processed, it is found that selecting the number of maps or reduces equal to total number of CPUs on a cluster is the optimization of time spent on a process.
Research Interests:
— Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc networks are much... more
— Ad-hoc networks are temporary networks, which use wireless media that consists of interconnected nodes
without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc
networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a
central control mechanism and the individual attitude of each node. In this study, the security threats and the routing
protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a
generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and
disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc
networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome
security treats aiming for confidentiality, integrity and accessibility. The balance between resistance to threats, high
energy efficiency and robustness should be carefully considered and implemented in an autonomous way by weighting
each of them for a specific task.
Tasarsız ağlar, paylaşılan kablosuz bir kanal üzerinde acil veya özel ağ çözümleri için alt yapısı olmadan
hareketli düğümlerin bir araya gelmesiyle oluşan geçici ağlardır. Merkezi bir denetim mekanizmasının olmaması,
kablosuz ortamların doğası, düğümlerin hareketliliği, ağa katılan her bir düğümün yönlendirici olarak görev yapması
gibi nedenlerden dolayı tasarsız ağlar geleneksel ağlara göre daha savunmasızdır. Ancak tasarsız ağların bu topolojisi
kişisel alan ağlarından kurtarma operasyonlarına kadar birçok uygulama içinde ideal bir ortam sunmaktadır. Çalışma
kapsamında; tasarsız ağlarda tanımlanmış, güvenlik tehditleri veyönlendirme protokolleri incelenerek tespitler ve
değerlendirmeler yapılmıştır. Çalışma ile tasarsız ağlarda mevcut yönlendirme protokollerinin güçlü ve zayıf yönleri
tehditler farkındalığıyla incelenerek yapılan tespit ve değerlendirmelerin gelecekte ortaya konulacak yaklaşımlara katkı
sağlaması hedeflenmiştir. Sonuç olarak yeni yapılacak olan çalışmalarda,güvenliğin temel unsurları olan gizlilik,
bütünlük ve erişilebilirlik odaklı saldırılara karşı dirençli, enerji verimliliği yüksek, güvenlik-performans-enerji
üçlüsünün ağırlıklarını ilgili probleme göre otonom olarak ayarlayabilecek yeni protokoller üzerinde durulması
gerekmektedir.
without a common network infrastructure using wireless media for immediate and dedicated network solutions. Ad-hoc
networks are much vulnerable against the threats compared to the traditional networks due to its nature of lacking of a
central control mechanism and the individual attitude of each node. In this study, the security threats and the routing
protocols defined for ad hoc networks are investigated and the findings are evaluated. The aim of the study is to reach a
generalized conclusion on the existing routing protocols in ad-hoc networks by evaluating the advantages and
disadvantages of these protocols. In this paper, it is shown that the routing and security protocols to be used in ad-hoc
networks should be designed by providing a resistance, robustness and high energy efficiency in order to overcome
security treats aiming for confidentiality, integrity and accessibility. The balance between resistance to threats, high
energy efficiency and robustness should be carefully considered and implemented in an autonomous way by weighting
each of them for a specific task.
Tasarsız ağlar, paylaşılan kablosuz bir kanal üzerinde acil veya özel ağ çözümleri için alt yapısı olmadan
hareketli düğümlerin bir araya gelmesiyle oluşan geçici ağlardır. Merkezi bir denetim mekanizmasının olmaması,
kablosuz ortamların doğası, düğümlerin hareketliliği, ağa katılan her bir düğümün yönlendirici olarak görev yapması
gibi nedenlerden dolayı tasarsız ağlar geleneksel ağlara göre daha savunmasızdır. Ancak tasarsız ağların bu topolojisi
kişisel alan ağlarından kurtarma operasyonlarına kadar birçok uygulama içinde ideal bir ortam sunmaktadır. Çalışma
kapsamında; tasarsız ağlarda tanımlanmış, güvenlik tehditleri veyönlendirme protokolleri incelenerek tespitler ve
değerlendirmeler yapılmıştır. Çalışma ile tasarsız ağlarda mevcut yönlendirme protokollerinin güçlü ve zayıf yönleri
tehditler farkındalığıyla incelenerek yapılan tespit ve değerlendirmelerin gelecekte ortaya konulacak yaklaşımlara katkı
sağlaması hedeflenmiştir. Sonuç olarak yeni yapılacak olan çalışmalarda,güvenliğin temel unsurları olan gizlilik,
bütünlük ve erişilebilirlik odaklı saldırılara karşı dirençli, enerji verimliliği yüksek, güvenlik-performans-enerji
üçlüsünün ağırlıklarını ilgili probleme göre otonom olarak ayarlayabilecek yeni protokoller üzerinde durulması
gerekmektedir.
Research Interests:
Research Interests:
The aim of the robotic education is to make the students know the elements of robot and to enhance their abilities on planning applications by using the robot applications and more for experiencing the existing mechanic construction.... more
The aim of the robotic education is to make the students know the elements of robot and to enhance their abilities on planning applications by using the robot applications and more for experiencing the existing mechanic construction.
In order to studying according to a certain curriculum, they need laboratories which they can enhance them befitting to their future settings.
It's certain that practices of the computer take place as a collateral factor in every field of education. Practices of computer hold a place as an access and control factors.
In this study, the current structure of the robotic education is accentuated, and XR3 is prepared according to experimental robot as an educational material. 2D simulation is improved which has the capacity of visualization the movement with robot synchronously and provides observing the movements of robot in advance or the opportunity of watching it visually without the need of robot's move.
Rhino XR3 Robot and Mark 3 Controller which is in the constitution of Flexible Manufacturing Systems’ laboratory of Gazi University Engineering and Architecture Faculty were used for this application. Delphi 6 Personal Edition Compiler was also used for the development period of software.
In order to studying according to a certain curriculum, they need laboratories which they can enhance them befitting to their future settings.
It's certain that practices of the computer take place as a collateral factor in every field of education. Practices of computer hold a place as an access and control factors.
In this study, the current structure of the robotic education is accentuated, and XR3 is prepared according to experimental robot as an educational material. 2D simulation is improved which has the capacity of visualization the movement with robot synchronously and provides observing the movements of robot in advance or the opportunity of watching it visually without the need of robot's move.
Rhino XR3 Robot and Mark 3 Controller which is in the constitution of Flexible Manufacturing Systems’ laboratory of Gazi University Engineering and Architecture Faculty were used for this application. Delphi 6 Personal Edition Compiler was also used for the development period of software.
Research Interests:
In this study, 9th grade students' attitudes about usage of tablet PCs in FATIH Project were examined. The research method was survey and a convenience sample consisting of 220 students was used. The data were gathered via a revised form... more
In this study, 9th grade students' attitudes about usage of tablet PCs in FATIH Project were examined. The research method was survey and a convenience sample consisting of 220 students was used. The data were gathered via a revised form of "Tablet PC Attitude Scale" developed by Beeland (2002) and adapted to Turkish by Sünkür, Şanlı ve Arabacı (2011). Frequency, percentage and mean statistics were used to analyze the data. Additionally independent- samples t-test and one-way ANOVA statistics were used to determine whether attitudes towards tablet PC usage differ from in terms of gender, kind of school and having a PC. According to findings tablet PC appeals to students and presents an enjoyable learning environment for them. Students like to use tablet PC and consider that it will affect to have a good job in future. Students' attitudes towards the tablet PC do not differ in terms of gender and students' attitudes who have their own PC are more positive than others.
Research Interests:
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group,... more
In this study, the effect of Scratch environment in teaching algorithm in elementary school 6th grade Information and Communication Technologies course was examined. The research method was experimental method. Control group, pretest-posttest design of experimental research method and a convenience sample consisting of 60 6th grade students were used. The research instrument was achievement test to determine the effect of Scratch on learning algorithm. During the implementation process experiment group studied using
Scratch and control group studied with traditional methods. The data was analyzed using independent-samples
t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups.
Scratch and control group studied with traditional methods. The data was analyzed using independent-samples
t-test, paired-samples t-test and ANCOVA statistics. According to findings there is no statically significant difference between posttest achievement scores of experiment and control groups. Similarly, In terms of gender there isn’t a statically significant difference between posttest scores of experiment and control groups.
Research Interests:
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447... more
In this study, elementary and high school students’ information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaraş City, towns, small towns and villages of Kahramanmaraş province. For data analysis the statistical analysis program was used. Consequently it was found that students have sufficient awareness level in terms of ethical issues. However, they have low awareness levels in terms of issues that require knowledge about rules. It can be deduced that information and computer security awareness education and related activities are insufficient. If these courses’ hours can be increased, students’ information and computer security awareness can be enhanced and negative effects of internet can be controlled.
Research Interests:
This study aimed to determine whether there are differences in terms of sex and department among the continuous anger and anger expression styles of teacher candidates at Kahramanmaras Sutcuimam University. The 278 students participated... more
This study aimed to determine whether there are differences in terms of sex and department among the continuous anger and anger expression styles of teacher candidates at Kahramanmaras Sutcuimam University. The 278 students participated in the study from three departments of the University. The data obtained using the State Trait Anger scale in the study. As a result of the study there was no significant statistical difference found in terms of sex (p>0.05) and there were significant statistical differences in continuous anger and anger control dimension between the departments (p<0.05).
Research Interests:
Günümüzde verimliliğin artırılması, is akıslarının hızlandırılması, çalısanlar ve diğer kurumlarla daha hızlı iletisim kurulabilmesi, günlük yasantımızı kolaylastırması gibi birçok sebepten dolayı bilisim sistemleri hızla... more
Günümüzde verimliliğin artırılması, is akıslarının hızlandırılması, çalısanlar ve diğer kurumlarla daha hızlı iletisim kurulabilmesi, günlük yasantımızı kolaylastırması gibi birçok sebepten dolayı bilisim sistemleri hızla yaygınlasmaktadır. Bilisim teknolojilerindeki gelismeler sonucunda, merkezi yapılar yerlerini, dağıtık mimarilere, internet ve ağlar üzerinden erisilebilen elektronik uygulamalara bırakmıstır. Web uygulamaları, uzaktan erisimler, çevrimiçi sistemler, bilgisayar ağları, internet gibi elektronik bilgi altyapılarının kullanımının artması sonucunda ekavramlar (e-ticaret, e-öğrenme, e-rezervasyon, e-sınav, e-okul, e-banka, e-devlet vb.) günlük yasantımızın bir parçası haline gelmistir. Bilisim ortamlarının kullanımının artması ve yaygınlasmasına paralel olarak güvenlik tehditleri ve riskleri aynı oranda artmıstır. Teknik güvenlik önlemlerinin gelismesine rağmen bilisim sistemlerine karsı yapılan saldırıların sayısının artması ve bilgi sistemleri üzerinde yüksek derecede etki yapan hasarlar olusturması, teknik yöntemlerin bilgi güvenliğinin sağlanmasında yetersiz olduğunu göstermektedir. Bilgi güvenliğinin sağlanabilmesi için teknik önlemlerin yanında, idari önlemler (kurallar, cezalar, yaptırımlar vb), standartlar (ISO 27001,Ortak Kriterler vb) ve insan faktörü göz önüne alındığında bilgi güvenliği karmasık çözümler içeren ve yönetilmesi zorunlu hale gelen bir süreç halini almıstır. Bu çalısmada bilgi güvenliği yasayan bir süreç olarak ele alınmıs ve yönetilebilirlik gerekliliği ortaya konarak, bir bilgi güvenliği yönetim modeli gelistirilmistir.
Research Interests:
Fatih Projesi kapsamında Bilişim Teknolojilerinin, öğrenme ortamlarında daha etkin kullanımı amaçlanmaktadır. Ayrıca tüm okullarda teknolojik altyapı iyileştirmelerinin yapılması hedeflenmektedir. Söz konusu sürecin işletilebilmesi için... more
Fatih Projesi kapsamında Bilişim Teknolojilerinin, öğrenme ortamlarında daha etkin kullanımı amaçlanmaktadır. Ayrıca tüm okullarda teknolojik altyapı iyileştirmelerinin yapılması hedeflenmektedir. Söz konusu sürecin işletilebilmesi için Bilişim teknolojileri öğretmenleri kilit rol oynayacaktır. Bu nedenle, araştırmada Fatih projesini sürdürecek olan Bilişim teknolojileri öğretmenliği adaylarının bilgisayar öz yeterlik algıları tarama modeli kullanılarak incelenmiştir. Çalışma grubunu iki farklı üniversitenin Bilgisayar ve Öğretim Teknolojileri Eğitimi bölümünde (BÖTE) öğrenim gören 200 öğrenci oluşturmuştur. Araştırmada Akkoyunlu ve Orhan (2003) tarafından geliştirilen “Bilgisayar öz yeterlik ölçeği” kullanılarak, öğrencilerin bilgisayar öz yeterlik algıları ile cinsiyet, mezun olunan ortaöğretim türü, bölüm tercih sırası, devam edilen sınıf ve okuduğu üniversite değişkenleri arasındaki ilişkiler incelenmiştir. Araştırma sonucunda, erkek öğrencilerin kız öğrencilere göre, meslek lisesi mezunu öğrencilerin, genel lise mezunu öğrencilere göre, 3 ve 4. sınıfa devam eden öğrencilerin 1. sınıf öğrencilerine göre daha yüksek bilgisayar öz yeterlik algısına sahip olduğu görülmüştür. Bölüm tercih sırasının bilgisayar öz yeterlik algısını etkilemediği bulgularına ulaşılmıştır.
Research Interests:
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet... more
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet using is also important. In the literature although it is possible to see many studies on pre-service teachers’ attitude towards internet use, studies identifying the attitude regarding in-service teachers’ internet using are not very common. In our study, which aims to determine the attitude of in-service teachers according to various variables, the Internet Usage Attitude Scale developed by Tavşancıl and Keser (2002) was used. The participant teachers’ attitudes towards internet using was analyzed and interpreted according to the variables of gender and duration of their weekly internet using. It was seen that a vast majority of the teachers have personal computers, connect to internet at home and have positive attitude concerning internet use. In addition to this it was concluded that female teachers have more positive attitude than male teachers regarding internet use in social interaction and communication.
Research Interests:
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes... more
The widespread use of internet implies the idea that it can also be more widely used for educational purposes. In this respect, since physics teachers have a very important function in education, to determine physics teachers’ attitudes towards internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards internet use; “however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed teachers according to different variables, we used the Internet Use Attitude Scale. For the teachers that took part in the study the attitude towards internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly internet use. It was seen that a vast majority of the teachers have personal computers, they connect to internet at home and have positive attitude towards internet use. It was also seen that female teachers have more positive attitude than male teachers in use of internet for social interaction and communication.
Research Interests:
Teknoloji günümüzde günlük yaşamın her alanına girmiş durumdadır. Teknolojik uygulamaların en yaygın kullanıldığı alanlardan biri de eğitimdir. Araştırmalara göre öğretimde bilgisayar kullanımı eğitim durumlarını olumlu yönde... more
Teknoloji günümüzde günlük yaşamın her alanına girmiş durumdadır. Teknolojik uygulamaların en yaygın kullanıldığı alanlardan biri de eğitimdir. Araştırmalara göre öğretimde bilgisayar kullanımı eğitim durumlarını olumlu yönde etkilemektedir. Bu araştırmada sınıf öğretmenlerinin bilgisayar kullanma durumları, bilgisayarın rolü ve bilgisayarın öğretimde kullanımı ile ilgili görüşleri belirlenmeye çalışılmıştır. Çalışma öğretmenlerin bilgisayarları öğretme-öğrenme sürecinde kullanımıyla ilgili görüşlerini ortaya koymaya yönelik betimsel bir araştırmadır. Araştırmanın çalışma grubu 141 öğretmenden oluşmaktadır. Veri toplama aracı olarak Seferoğlu (2008) tarafından geliştirilen “Bilgisayar Kullanımına Yönelik Öğretmen Davranışları”, tutum ölçeği kullanılmıştır. Araştırma sonucunda öğretmenlerin cinsiyet, yaş ve mesleki kıdemlerine göre bilgisayarı öğretme-öğrenme sürecinde kullanım düzeyleri arasında anlamlı bir ilişki görülmemiştir. Öğretmenlerin okuttukları sınıflara göre bilgisayarı öğretme-öğrenme sürecinde kullanım düzeyleri dördüncü sınıfı okutan öğretmenler ve üçüncü sınıfı okutan öğretmenler arasında anlamlı bir ilişkiye rastlanmıştır ve bu ilişkinin dördüncü sınıfı okutan öğretmenler lehine olduğu bulunmuştur.
Research Interests:
İlköğretim okullarının ikinci kademesinde okutulan bilgisayar dersinin öğrencilerin bilgi teknolojilerini (BT) kullanmaları açısından verimliliğinin ele alındığı bu çalışmada, Ankara ili sınırları içindeki üç farklı sosyoekonomik düzeyi... more
İlköğretim okullarının ikinci kademesinde okutulan bilgisayar dersinin öğrencilerin bilgi teknolojilerini (BT) kullanmaları açısından verimliliğinin ele alındığı bu çalışmada, Ankara ili sınırları içindeki üç farklı sosyoekonomik düzeyi yansıtan 3 ayrı ilçede ilköğretim öğrencileri üzerinde bir anket çalışması yapılmıştır. Çalışmada, mevcut bilgisayar dersinin uygulamasının köy ilköğretim okulları ve düşük gelişmişlik düzeyindeki kasaba okulları için yeterli olduğu saptanmıştır.
Ancak orta gelişmişlik düzeyinde bulunan kasabalar ve iller ile yüksek gelişmişlik düzeyindeki il ve ilçe merkezleri için mevcut bilgisayar dersi uygulamasının yetersiz olduğu ortaya konmuştur.
Araştırma sonucuna göre, modüler uygulamaların BT için uygunluğu tartışılmıştır.
Ancak orta gelişmişlik düzeyinde bulunan kasabalar ve iller ile yüksek gelişmişlik düzeyindeki il ve ilçe merkezleri için mevcut bilgisayar dersi uygulamasının yetersiz olduğu ortaya konmuştur.
Araştırma sonucuna göre, modüler uygulamaların BT için uygunluğu tartışılmıştır.
Research Interests:
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet... more
Web technology is changing rapidly every day and the Internet has become a lifestyle for people all over the world. It is obvious that the life style of societies is in a process of change, as new habits are acquired. Even though Internet use is one of the new social habits, it is one of the most important factors that induce this change as regards the convenience it brings to communication and other areas. The widespread use of Internet implies the idea that it can also be more widely used for educational purpose. Since chemistry teachers have a very important function in education, the determination of teachers’ attitude towards Internet use is also important. In the literature it is possible to see many studies on teacher candidates’ attitude towards Internet use; however studies on appointed teachers’ attitude are not very common. In our study, which aims to determine the attitude of appointed chemistry teachers according to different variables, we used the Internet use attitude scale. Participant teacher’s attitude towards Internet use was analyzed and interpreted according to the variables of gender, years on the job, type of school at which they are teaching, and duration of their weekly Internet use. It was seen that a vast majority of the teachers have personal computers, they connect to Internet at home and have positive attitude towards Internet use. It was also seen that female teachers have more positive attitude than male teachers in use of Internet for social interaction and communication.
Research Interests:
Proje kavramının yapısının yönetim, tasarım ve üretim yönünden incelendiği bu arastırmada, Teknoloji Projesinin küresel anlamda kullanılan proje kavramı içerisindeki yeri de incelenmistir. Ayrıca Teknoloji Projesinde tasarım ve üretim... more
Proje kavramının yapısının yönetim, tasarım ve üretim yönünden incelendiği bu arastırmada, Teknoloji Projesinin küresel anlamda kullanılan proje kavramı içerisindeki yeri de incelenmistir. Ayrıca Teknoloji Projesinde tasarım ve üretim asamasında ne gibi safhalardan geçilmesi gerektiği üzerinde durulmustur. Bu bağlamda bir Teknoloji Eğitimi Projesi olusturulmustur. Proje, iki eksenli PC kontrollü robot sistemden olusmaktadır. Proje, mekanik sistemlerin elektronik donanımla desteklendiği ve Turbo Pascal’da hazırlanan bir yazılımla kontrolünün sağlanması seklindedir.
Research Interests:
Research Interests:
Nowadays, it is necessary individuals to have several skillls, information, and competencies namely 21th centry skills. These skills are; learning and innovation skills, information, media and technology skills, life and career skills. To... more
Nowadays, it is necessary individuals to have several skillls, information, and competencies namely 21th centry skills. These skills are; learning and innovation skills, information, media and technology skills, life and career skills. To prepare training programs that provide individuals to obtain these skills and to form teacher competencies have become important issue. The purpose of this study was to reveal to what extent Undergraduate Programs of Teacher Training in Elementary Mathematics and Science departments revised by Council of Higher Education (YÖK) in 2018 reflect the 21th century skills. For this, course contents give by YÖK were examined. The methodology of the study was determined as document analysis. Findings of the study showed that, critical thinking and problem solving skills are used more in elementary mathematics program. On the other hand, creatively thinking and implementing innovations skills are used more in science programs.
Research Interests:
Smart power grids have an important role in protecting power transmission and distribution grids which are locomotive of critical infrastructures against to sabotage and neglect, efficient cost administration, leakage determination. It is... more
Smart power grids have an important role
in protecting power transmission and distribution grids
which are locomotive of critical infrastructures against to
sabotage and neglect, efficient cost administration, leakage
determination. It is necessary to describe, classify certain
threats and to take precautions to these threats in spreading
use of smart power grids process. In this context, first
threats to security and privacy come to the forefront during
distributing and sharing of data produced by smart power
grids. It is expected to include sensitive and non-sensitive
data when data produced by smart power grids are examined
and classified. It is necessary to distribute and share these
sensitive data in the protection of privacy and data benefit in
order to use for different purposes. In this study, smart power
grids are described, the threats to sensitive data privacy
are explained and solution suggestions are presented by
evaluations.
(Günümüzde kritik altyapı tehditlerinin başında siber
saldırılar gelmektedir. Kritik altyapıların lokomotifi olan
elektrik enerjisi iletim ve dağıtım şebekelerinin saldırı, sabotaj
ve ihmallere karşı korunmasında, kaçakların tespitinde,
maliyet etkin yönetiminde, akıllı şebekelerin önemli bir rolü
vardır. Oldukça yeni bir çalışma alanı olan akıllı şebekelerin
geliştirilerek kullanımının yaygınlaştırılması sürecinde
tehditlerin tanımlanması, sınıflandırılması ve önlemlerin
alınmasına yönelik çalışmalara ihtiyaç duyulmaktadır.
Akıllı şebekelerin siber saldırılara maruz kalmaması için
verilerin toplanmasında, paylaşılmasında güvenlik ve
mahremiyet korumasının sağlanması gerekmektedir. Çeşitli
sebeplerle verilerin işlenebilmesi amacıyla veri faydasının
da mahremiyet önlemleri sırasında dikkate alınması
gerekmektedir. Bu çalışmada akıllı şebekeler tanımlanmış,
ürettiği hassas verilerin mahremiyetine yönelik tehditler
sıralanmış ve değerlendirmeler yapılarak çözüm önerileri
sunulmuştur.)
in protecting power transmission and distribution grids
which are locomotive of critical infrastructures against to
sabotage and neglect, efficient cost administration, leakage
determination. It is necessary to describe, classify certain
threats and to take precautions to these threats in spreading
use of smart power grids process. In this context, first
threats to security and privacy come to the forefront during
distributing and sharing of data produced by smart power
grids. It is expected to include sensitive and non-sensitive
data when data produced by smart power grids are examined
and classified. It is necessary to distribute and share these
sensitive data in the protection of privacy and data benefit in
order to use for different purposes. In this study, smart power
grids are described, the threats to sensitive data privacy
are explained and solution suggestions are presented by
evaluations.
(Günümüzde kritik altyapı tehditlerinin başında siber
saldırılar gelmektedir. Kritik altyapıların lokomotifi olan
elektrik enerjisi iletim ve dağıtım şebekelerinin saldırı, sabotaj
ve ihmallere karşı korunmasında, kaçakların tespitinde,
maliyet etkin yönetiminde, akıllı şebekelerin önemli bir rolü
vardır. Oldukça yeni bir çalışma alanı olan akıllı şebekelerin
geliştirilerek kullanımının yaygınlaştırılması sürecinde
tehditlerin tanımlanması, sınıflandırılması ve önlemlerin
alınmasına yönelik çalışmalara ihtiyaç duyulmaktadır.
Akıllı şebekelerin siber saldırılara maruz kalmaması için
verilerin toplanmasında, paylaşılmasında güvenlik ve
mahremiyet korumasının sağlanması gerekmektedir. Çeşitli
sebeplerle verilerin işlenebilmesi amacıyla veri faydasının
da mahremiyet önlemleri sırasında dikkate alınması
gerekmektedir. Bu çalışmada akıllı şebekeler tanımlanmış,
ürettiği hassas verilerin mahremiyetine yönelik tehditler
sıralanmış ve değerlendirmeler yapılarak çözüm önerileri
sunulmuştur.)
Research Interests:
Research Interests:
Research Interests:
In this study, the awareness levels of elementary and high school students’ information and computer security were tried to reveal. A developed information and computer security scale was conducted to 2447 students from the center of... more
In this study, the awareness levels of elementary and high school students’ information and computer security were tried to reveal. A developed information and computer security scale was conducted to 2447 students from the center of Kahramanmaraş City, towns, small towns and villages of Kahramanmaraş. The data were assessed by using statistical analysis program.
About awareness of information and computer security both positive and negative findings were obtained. Basely, it was found that while students have sufficient awareness level in terms of ethical issues, they have low awareness level in terms of issues that required rules and knowledge. This situation reveals the idea that education and activities of awareness of information and computer security seem insufficient.
About awareness of information and computer security both positive and negative findings were obtained. Basely, it was found that while students have sufficient awareness level in terms of ethical issues, they have low awareness level in terms of issues that required rules and knowledge. This situation reveals the idea that education and activities of awareness of information and computer security seem insufficient.
Research Interests:
Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrika ülkelerine yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere karşı... more
Tunus’ta 2010 Aralık ayında başlayıp, 2011’in başlarında yükselen, hızla Orta Doğu ve Kuzey Afrika ülkelerine
yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere
karşı özgürlük ve demokrasi talepleriyle ortaya çıkan harekette, bilgi ve iletişim teknolojilerinin etkin rol oynadığı
yaygın olarak kabul edilmektedir. Bu teknolojilerin kullanımının oynadığı rolün abartıldığını iddia eden görüşler de
vardır.
Bu çalışmada Arap Baharı’nda yaşanan sosyal aktivizmin, yerel sosyokültürel değişim ve küresel ağ toplumunun
etkileri olmak üzere iki temel dinamiğe sahip olduğu öne sürülmektedir. Bu iki dinamiğin izi sürülürken, konunun
bileşenleri, “sokak siyaseti” ve “ağ toplumu” kavramları eşliğinde ve birbiriyle ilişkisi üzerinden tartışılmaktadır. Bu
ilişki yeni aktivizmi yaratmıştır. Çalışmada yeni aktivizm, bölgedeki yeni sosyal aktörlerin, kültürel olarak devralmış
oldukları eski “sokak siyaseti” geleneğini yeni çağın yeni araçlarını kullanarak icra etmeleri/sürdürmeleri sonucunda
ortaya çıkan hareket biçimi olarak değerlendirilmektedir.
yayılan ve etkileri hala devam etmekte olan halk hareketlerine Arap Baharı adı verilmektedir. Otoriter yönetimlere
karşı özgürlük ve demokrasi talepleriyle ortaya çıkan harekette, bilgi ve iletişim teknolojilerinin etkin rol oynadığı
yaygın olarak kabul edilmektedir. Bu teknolojilerin kullanımının oynadığı rolün abartıldığını iddia eden görüşler de
vardır.
Bu çalışmada Arap Baharı’nda yaşanan sosyal aktivizmin, yerel sosyokültürel değişim ve küresel ağ toplumunun
etkileri olmak üzere iki temel dinamiğe sahip olduğu öne sürülmektedir. Bu iki dinamiğin izi sürülürken, konunun
bileşenleri, “sokak siyaseti” ve “ağ toplumu” kavramları eşliğinde ve birbiriyle ilişkisi üzerinden tartışılmaktadır. Bu
ilişki yeni aktivizmi yaratmıştır. Çalışmada yeni aktivizm, bölgedeki yeni sosyal aktörlerin, kültürel olarak devralmış
oldukları eski “sokak siyaseti” geleneğini yeni çağın yeni araçlarını kullanarak icra etmeleri/sürdürmeleri sonucunda
ortaya çıkan hareket biçimi olarak değerlendirilmektedir.
Research Interests: Human Computer Interaction, Social Networks, Usability, Data Mining, Social Networking, and 14 moreEgypt, Social Network Analysis (SNA), Online social networks, Activism, Youtube, Middle East, Youth, Mobile Communications, Revolution, User interfaces, Politica, Sociología, Ciberactivismo, New Media, Social Network Analysis, e-research, Link analysis, Social Network Sites, Twitter, Facebook, Political Communication, Arab Spring (Arab Revolts), and Cyberactivim
Research Interests:
Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm işler sanal ortama taşınmıştır. Bu gelişim çerçevesinde eğitim alanında da çeşitli uygulamalar yapılmaktadır. Eğitimde bilgisayardan çok... more
Gelişen teknoloji ve Internet kullanımının yaygınlaşmasıyla günlük hayatımızdaki hemen hemen tüm işler sanal ortama taşınmıştır. Bu gelişim çerçevesinde eğitim alanında da çeşitli uygulamalar yapılmaktadır. Eğitimde bilgisayardan çok farklı amaçlar için yararlanılabilir. Öğretim, üretim, iletişim amaçlı kullanmak bunlardan bazılarıdır.
www.okulumuzungazetesi.com sitesi ile öğrencilere yazma, okuma, okuduğunu anlama becerilerini geliştirmeye yönelik kazanımlar verilmeye çalışılmıştır. Bunun yanında öğrencilerin
İnternet’i kullanırken kendilerini geliştirmelerini sağlamak amaçlanmıştır. Çalışmada ders dışı etkinliklerin öğretimde kullanılması sürecinde yer alan okul gazetelerinin, farklı bir bakış açısıyla öğrenci ve öğretmene sunulması amaçlanmıştır. Sistem Asp tabanlı olarak dinamik web sayfası şeklinde oluşturulmuştur. Veriler veritabanında saklanmaktadır.
www.okulumuzungazetesi.com sitesi ile öğrencilere yazma, okuma, okuduğunu anlama becerilerini geliştirmeye yönelik kazanımlar verilmeye çalışılmıştır. Bunun yanında öğrencilerin
İnternet’i kullanırken kendilerini geliştirmelerini sağlamak amaçlanmıştır. Çalışmada ders dışı etkinliklerin öğretimde kullanılması sürecinde yer alan okul gazetelerinin, farklı bir bakış açısıyla öğrenci ve öğretmene sunulması amaçlanmıştır. Sistem Asp tabanlı olarak dinamik web sayfası şeklinde oluşturulmuştur. Veriler veritabanında saklanmaktadır.
Research Interests:
Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin korunması, sürdürülmesi ve yeni değerlerin kazandırılmasında öğretmen en önemli öğedir. Eğitim fakültelerinde okuyan ve geleceğin öğretmenleri... more
Eğitimde verimliliği etkileyen en önemli etkenlerden birisi öğretmendir. Toplumun değerlerinin korunması, sürdürülmesi ve yeni değerlerin kazandırılmasında öğretmen en önemli öğedir. Eğitim fakültelerinde okuyan ve geleceğin öğretmenleri olacak olan öğrencilerin öğretmenlik mesleğini sevmeleri, mesleklerini başarıyla yürütebilmeleri için bir ön koşuldur (Tanel, Şengören ve Tanel). Bu çalışmada bilişim teknolojileri ve ilköğretim matematik öğretmeni adaylarının öğretmenlik mesleğine yönelik tutumlarının ne düzeyde olduğu araştırılmıştır. Tarama yönteminin kullanıldığı araştırmada veri toplama aracı olarak Tanel, Şengören ve Tanel (2007) tarafından geliştirilen “Öğretmenlik Mesleğine Bakış Açısı Tutum Ölçeği” kullanılmıştır. Araştırma ile öğrencilerin öğretmenlik mesleğine yönelik tutumlarına bakıldığında cinsiyet değişkenine göre kız öğrenciler lehine anlamlı bir ilişki tespit edilmiştir. Üniversite değişkenine göre Kahramanmaraş Sütçüimam Üniversitesi ile İnönü Üniversitesi öğrencileri arasında Kahramanmaraş Sütçüimam Üniversitesi öğrencileri lehine anlamlı bir ilişki olduğu görülmüştür. Anne öğrenim durumu değişkenine göre annesi ilkokul ve ortaokul mezunu olanlar arasında ilkokul lehine; ortaokul ve lise mezunu olanlar arasında lise lehine bir ilişki bulunmuştur. Öğrenim gördükleri bölümü isteyerek seçen öğrencilerle isteyerek seçmeyen öğrenciler arasında bölümü isteyerek seçenler lehine anlamlı bir ilişki bulunmuştur. Mezun olunca öğretmenlik yapmak isteyip istemeyen öğrenciler arasında mezun olunca öğretmenlik mesleği yapmak isteyen öğrenciler lehine bir ilişki bulunmuştur.