Arif Sari

Arif Sari
Girne American University · Department of Management Information Systems

PhD

About

91
Publications
79,838
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
705
Citations
Additional affiliations
February 2010 - July 2015
European University of Lefke
Position
  • Coordinator

Publications

Publications (91)
Chapter
Full-text available
The purpose of this chapter is to investigate methods and techniques to provide security in wireless ad hoc networks. The varieties of studies in the literature have been addressed by the researchers to solve security problems of Mobile Ad-Hoc Networks (MANET) against Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. Due to...
Article
Full-text available
In recent years, many Small Island Developing State (SIDS) governments have worked to increase openness and transparency of their transactions as a means to enhance efficiency and reduce corruption in their economies. In order to achieve a cost-effective and efficient strategy to implement a transparent government, Information Communication Technol...
Article
Full-text available
Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scala-bility, and decreased costs have captivated businesses an...
Conference Paper
Full-text available
In high-speed data links, serial communications are replacing parallel communications rapidly. High-speed serial data links include backplane links such as PCI express and computer networking including Ethernet interfaces. This study tries to propose new solution for interconnection switches which use specially in HPC systems using a new jitter fre...
Article
Full-text available
The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear...
Chapter
In recent years, scholarly work on cybersecurity in smart health has gained substantial attention from both practitioners and scholars. This is primarily due to the rapid growth in the field of information, communications and technology, protocols, an important aspect of smart health communication infrastructure. The smart health communication infr...
Article
The Fourth Industrial Revolution is characterized by technological transformations, artificial intelligence, and the digital revolution. The technological innovation in the Fourth Industrial Revolution is expected to be a supply-side miracle, with long term gains in the efficiency, as well as production. The widespread variability in the innovation...
Article
Natural resource-based income or wealth should be a blessing and catalyst for growth in any country. However, paradoxically it has been suggested by many researchers that the countries rich in natural resources tend to transfer resource-based income to the non-productive sectors, resulting in slower investment and sluggish economic growth and finan...
Article
Most of the member countries of COP21 have been struggling to devise relevant policies in order to control carbon dioxide (CO2) emissions since the Paris agreement in 2015. In our view, without analyzing the role of two extremely important variables i.e., ecological innovation and export diversification, in the whole chain of carbon emissions, expe...
Article
The purpose of this study is to determine the direction of causality between the quality of education and technological development for the selected Northern European countries over the period 2006-2017. To this end, we employ the bootstrap panel causality test. The findings of our study indicate that the quality of education leads to changes in te...
Article
Full-text available
This article examines the nexus between Big data governance, dynamic capability and decision-making. Survey data was garnered from firms in Jordan and fuzzy sets (fsQCA) approach was applied. Fuzzy set configural modeling revealed two causal models for high decision-making effectiveness conditions. First, Big data governance, number of employees an...
Chapter
Cyber-Threat Intelligence (CTI) is an acknowledged concept both by professionals and academia. This well-known notion was synthesized through interdisciplinary and multidisciplinary subspecialties of Cyber-Intelligence (CI). The CI concept focuses on extracting pure intelligence reports and cyber-perspectives through available information sources,...
Chapter
Volumetric cyberattacks powered by the Internet of Things (IoT) cause critical damage and lead to a significant negative impact on critical infrastructures, such as electricity, telecommunication and water supply. We saw recent evidence of volumetric attacks on the power grid in Ukraine, which left consumers without power for a period of 1–6 h. The...
Article
Full-text available
In this article we experimented the rumor spreading algorithm of data propagation in a blockchain system with specific focus on the block omission rate. The algorithm introduced here was modeled and simulated by a new class of extended Petri nets called “Elementary nets”. This type of nets is suitable for the representation of the functions of an i...
Chapter
This chapter is a literature review of intermediate system to intermediate system (IS-IS) routing protocol to provide basic security mechanisms against cyber-attacks and enhance network security. IS-IS was originally developed by the International Organization for Standardization (ISO) as a link state routing protocol. It was first built with the a...
Chapter
Cyber security is the newest internal concern of this century where different technologies developed through telecommunication, computers, and internet are used in the international arena as cyber-weapons. This chapter provides in-depth information about up-to-date cyber-attack methods and mechanisms used in the cyber war, and it focuses on the cyb...
Article
There was no need in money for the primitive man-all he could did himself could be exchanged with a neighbor. Lately instead of this tradition the payment by noble metals appeared. Afterwards they started to mint coins, and then the banknotes appeared. Nowadays credit cards joined our usual way of paper money payment that gives us an opportunity to...
Article
The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today's IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates...
Article
This research introduces “Seddulbahir,” the first Turkish national cyber-firewall system. Proposed as the first of its kind, Seddulbahir resists possible cyber-attack threats against Turkey's internet infrastructure. Seddulbahir uses the artificial neural network radial basis function (RBF-NN) approach to generate rules that can detect 21 different...
Article
The adoption of Web 2.0 technologies, Internet of Things, etc. by individuals and organization has led to an explosion of data. As it stands, existing Relational Database Management Systems (RDBMSs) are incapable of handling this deluge of data. The term Big Data was coined to represent these vast, fast and complex datasets that regular RDBMSs coul...
Article
In this paper, we discuss the main determinants of innovation in OECD countries using annual data covering the period 2006-2015. Panel techniques, including Kao co-integration, fully modified ordinary least squares (FMOLS) and panel Granger causality tests, are implemented to investigate the causal and long-term linkages. Our empirical findings rev...
Chapter
The capture and deployment of intelligence to build strong defense is more holistic and a more focused approach to security for private and government organizations, due to diversified activities of threat actors and malicious users. It is essential for the private sector and government organizations to use technologies such as Cloud, Fog and Edge...
Article
This research details a country-wide cyber-attack and proposes a cyber-firewall called ‘Seddulbahir’ to defend against future attacks. The country-wide dual-phased cyber-attack scenario includes two separate phases. First, the attack spreads the malicious malware and second it creates botnets to generate malicious traffic from local subnets against...
Chapter
This chapter presents a systematic review of prior research work that is closely aligned to the subject of interest related with internet of things (IoT) and smart city initiatives in Middle Eastern countries. Since internet of things technology (IoT) is the new revolution in the existing services provision environment due to increased contact with...
Chapter
Cryptocurrency concepts are mostly known with Bitcoin (BTC), Ethereum (ETH) and Ripple (XRP) concepts, but there are lots of varieties in exchange market like Bitcoin Cash (BCH/BCC), Bitcoin Gold (BTG), Litecoin (LTC), Tezos (XTZ) and other currencies along with ICO’s. Cryptocurrency concept raised from bottom to top in several years in terms of pr...
Conference Paper
Internet services and applications are one of the vital needs of the computer world, since the World Wide Web (WWW) is invented in 1990’s, these products and services kept evolving in terms of capability, flexibility, productivity and availability in order to have their current shape. Early on the cyberspace, computers were the key of the computing...
Chapter
Load balancing becomes one of the most important issues due to increased operations of a huge number of nodes on the networks in a Wireless Sensor Network (WSN) that cause performance drawbacks and low service quality. Load balancing techniques are divided into two subsections since this technology can be deployed in protocol layers as well as an a...
Chapter
This chapter presents a systematic review of existing literature related with proposed path loss algorithms for data centric critical system protection and data resilience in Wireless Body Area Networks (WBAN) for healthcare framework through elaborating varieties of articles, journal papers, international and national conferences, and theses relat...
Conference Paper
Escalation of problems in the education system and failure to achieve desired level of success in education has led to the emergence of the need for a new educational approach. The up to date curricula and programs for photonic education has many negative and positive consequences of program outcomes on economic indicators. The sustainable educatio...
Conference Paper
Increasing problems in the education system in Turkey and the inability to reach the desired success levels in education have caused the need for a new understanding of education to rise in education market. It has aimed to eliminate existing problems through targeted changes made in the education system to expose new qualification standards in edu...
Conference Paper
Full-text available
The expansion of public and private institutions with modernization of technology exposes inevitable security assurance policies. The penetration tests is an special type of an attack on corresponding computer-network-application system by using special penetration tools to expose security weaknesses, potentially gaining access to systems’s feature...
Conference Paper
The importance of tourism activities is widely discussed concept for Small Island Developing States (SIDS). SIDS have several characteristics such as lying on coastal, small but growing population, limited resources and being dependent on international trade. In order to create sustainable economy and environment, developing countries use several d...
Conference Paper
Evolving of technology and telecommunication infrastructure increased the online service quantity along with fame. Intelligent electronic devices are evolved and expanded to the every single member of the community, so the online member scope is increased in a global area and people started to satisfy their needs easily through the Internet. Thus b...
Article
Full-text available
This study provides information about pursuit of quality education in higher education institutions. Higher education structures and systems of developed and developing countries will be examined and information about recent studies are also provided in this study. Studies of many international institutions about quality education are being investi...
Article
Full-text available
In this study, types of renewable energy resources and usage level of these types based on countries were investigated. Usage of renewable energy systems and various countries using these systems are discussed in the study. Various information are also provided about the problems arise from energy needs of developing countries and preference of ren...
Article
Due to the increase in the popularity of renewable energy resources based on their low cost, efficiency and environmentally friendly nature; many developing countries has begun to take precautions in order to facilitate the best possible utilisation of these resources. Many research showed that energy consumption and re-use of energy generated by b...
Conference Paper
Many countries have begun to meet their energy needs with renewable energy resources due to a significant decrease in the reserves of fossil fuels used for energy production in the world. The rapid increase in country’s populations, internal migration and various socio-economic problems caused by these migrations, lack of resources in the energy, e...
Conference Paper
Full-text available
Bu araştırma siber dünyadaki çalışmalara ışık tutarken, dünya ülkelerinin siber güvenlik ortamı adına yapılan çalışmaları içermektedir. Siber dünyada bulunan tehdit ortamları, yıllar içerinde yapılan savaşlar bu araştırma aracılığı ile anlatılmaktadır. Dünya üzerindeki siber dünyadaki son durum, internet ortamının güvenilirlik dereceleri, devletler...
Conference Paper
The portion of importance of 21st Century’s Information Communication Technologies (ICT) cannot be ignored due the variety of flexibility and advantages provided to human life. In addition to this, the use of this technology play serious role in formation of government services which led countries to focus on these investments for this sector. In t...
Conference Paper
There are significant investments and developments raised on cyber-security education sector due to 21st centuries’ developing cyber-technologies and country’s cyber-security policies in developed and developing countries. These inevitable changes lead a significant reflection to country’s sustainable employment policy by providing technical and ac...
Conference Paper
Full-text available
Nowadays information size on the web is getting huge, so storage unit’s importance is increased. Related storage units are mostly covers magnetic, optic, magneto-optic and solid devices. “Cloud Computing” is a modern popular data sharing environment, since the technology getting better and powerful to store data. The cloud storage gives lots of gre...
Conference Paper
Full-text available
The Open Source Intelligence (OSINT) is one of the most popular data transfer and intelligence technique used by intelligence services to gather information in cyber-world for variety of reasons including security issues. It is well-known that OSINT is used by variety of organizations and governmental bodies for gathering detailed information and i...
Article
Full-text available
Cryptography is a very powerful tool for Business-to-Business (B2B) data transaction security. The overall volume of B2B transactions is much higher than the volume of Business-to-Consumer (B2C) transactions and data security is very important due to volume and value of data in B2B transactions. Organizations that use cryptographic data security mo...
Article
Full-text available
The wide range of security mechanism proposals in wireless networks provide variety of impractical solutions for different security gaps due to the nature of the network infrastructure. Proposed mechanisms deployed in different layers classified as link, end-to-end and message segments in the proposed mechanisms stated in the literature. Security m...
Article
Full-text available
Security is a never ending challenge. The security researchers must be steps ahead to avoid attacks and threats, thereby keeping businesses running and avoiding calamities. The Advanced Encryption Standard (AES) is to this rescue after its official acceptance and recommendation by National Institute of Standards and Technology (NIST) in 2001. Howev...
Article
Full-text available
Smart devices have greatly transformed our lives; smart devices have affected the way we think, interact, and process information. As technology continues to grow, we expect more transformation caused by improved technologies. Videos, Images, sounds etc. are exchanged easily from one end of a smart device to a receiving end. However, the transfer o...
Chapter
Full-text available
Security is utilized to keep the information safe. Online resources, e-commerce, internet banking and a lot of similar services are protected by use of well-known protocols such as Secure Socket Layer (SSL). This protocol makes use of the RSA key exchange protocol for authentication. New innovations and boost ups in the computational power of super...
Chapter
Full-text available
The varieties of studies in literature have been addressed by the researchers to solve security problems of Mobile Wireless Ad Hoc Networks (MANET) against denial of service (DoS) and distributed denial of service (DDoS) attacks. Attackers have proposed variety of methods and techniques by considering weaknesses of the wireless nature of the channe...
Article
Full-text available
Cloud computing, the new paradigm, is well utilized in business and education but not in healthcare. In healthcare realm, cloud computing offers the chance to provide patient-oriented care. This study aims to investigate factors affecting the adoption of cloud computing based medical imaging solutions by health care professionals. Multiple regressi...
Article
Full-text available
Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy and increase in data centers performance brought about Green Computing into the energy consumption of data centers. Information techn...
Article
Full-text available
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about c...
Article
Full-text available
Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is always a possibility for an intruder to launch a jamming attack in order to intercept communication among communication nodes. In this st...
Article
Full-text available
Information Communication Technologies (ICT) has offered m-government applications as an intermediate technology to provide effective and efficient government services to the public. Due to high rate of corruptions in developing states, government policies diversified governmental services from offline to virtualized perspective to expose accessibi...
Article
This study discusses the components influencing the successful selections of big data decision support application in decision support system user organisations. Conceptual framework depicts the model for successful selections of big data application in DSS user organisations. The paper presents a theoretical framework for usage of decision support...
Article
Full-text available
There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has e...
Article
Full-text available
The Mobile Commerce (m-commerce) becomes very powerful tool in the competitive business markets. Companies started to use this technology to attract their customers and catch their attention. Usage of Mobile commerce applications spread around different countries and became very popular. Different communication protocols and security techniques des...
Article
Full-text available
The relation between the HRM and the firm performance are analyzed statistically by many researchers in the literature. However there are very few nonlinear approaches in literature for finding the relation between Human Resource Management (FIRM) and firm performance. This paper exposes the relationship between human resource management and organi...
Article
Full-text available
Data security in wireless network has posed as a threat that has stuck to the core of data communication from point A to point B. There have been a variety of security issues raised in wired and wireless networks and security specialists proposed a variety of solutions. The proposed security solutions in wired networks could not be successfully imp...
Article
Full-text available
The use of technology has increased vastly and today computer systems are interconnected via different communication medium. The use of distributed systems in our day to day activities has solely improved with data distributions. This is because distributed systems enable nodes to organize and allow their resources to be used among the connected sy...
Article
Full-text available
This research aims to expose deployment challenges of offshore renewable energy systems in developing countries. The investigation of the deployment model covers climate conditions, economic conditions, necessary infrastructure services and wind power by considering the case of Cyprus Island which is one of the Small Island Developing States (SIDS)...
Article
Full-text available
The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc On Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network. Request to Send / Clear to Send (RTS/CTS) mechanis...
Article
Full-text available
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtuali-zation of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;...
Chapter
The purpose of this chapter is to study AES and its security countermeasures in order to identify the vulnerabilities that exist in AES and then finding other ways to solve these vulnerabilities and improve AES to make it more reliable algorithm. The proposed AES algorithm updated with playfair square which is first professional diagraph substituti...
Conference Paper
Full-text available
This research study investigates and highlights the developments of education sector and developments that exposed due to education sector’s sustainable impacts on development of country’s economy. Additionally, the impact of education and development of this sectors’ leaded variety of changes in small island developing states. North Cyprus, which...
Article
Full-text available
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at...
Chapter
The purpose of this chapter is to investigate and expose methods and techniques developed to provide security in wireless ad hoc networks. Researchers have proposed variety of solutions for security problems of Wireless Mobile Ad-Hoc Networks (MANET) against Distributed Denial of Service (DDoS) attacks. Due to the wireless nature of the channels an...
Conference Paper
Full-text available
The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc On Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network. Request to Send / Clear to Send (RTS/CTS) mechanis...
Article
The Turkish Republic of Northern Cyprus’s (TRNC) economy is mainly dependent on service sectors, among which tourism and higher education play considerably important roles. Thus, the study focuses on the prevailing conditions of one of these sectors, which is Higher Education, with the secondary and descriptive data obtained from the previous studi...
Conference Paper
Full-text available
Ransomeware (veri fidyeciliği) son günlerde normal bilgisayar kullanıcılarını ciddi bir şekilde tehdit etmekte olan, çok sayıda kullanıcının bilgisayarına bulaşıp, kullanıcılara ait verileri Gpcode ile 1024 bit formatında şifreleyen ve bilgisayardaki farklı formatlarda bulunan (.doc,.xls,.jpeg,.avi) verilere ulaşımın sağlanmasını engelleyip ulaşımı...
Article
Recently, Radio Frequency Identification (RFID) technology becomes very popular. Especially low-cost RFID tags are widely used in supply chain management. Due to lack of security considerations in simple RFID technology, performance optimization becomes quite important rather than securing the data transmitted over RFID media. Since security holes...
Article
Full-text available
This research presents design and implementation of the ultra-fast parallel lithium charging architecture with an embedded algorithm using an active PWM charge pump supported by a hybrid control mechanism consisting of Temperature, humidity and current sensors. The new architecture guaranties the ultra-fast parallel charging cycles of lithium cells...
Article
Full-text available
Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. Variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming...
Article
Full-text available
Education is the great investment for the future. When investing in education, predicting future parameters and moving according to predictions is an essential part in the education process. In such an important subject, the use of technology cannot be avoided at all. ICT-based educations serves the purpose of both attended and non-attended (distan...
Conference Paper
Full-text available
The primary motivation for this research is to focus on issues of WiMAX security problems and analyzes of vulnerabilities on IEEE 802.16, which is a new and promised topic in telecommunication and wireless networks. Mobile WiMAX system based on the IEEE 802.16e-2005 amendment has more improved security features than previous IEEE 802.16d-based WiMA...
Article
Full-text available
Education is the great investment for the future. When investing in education, predicting future parameters and moving according to predictions is an essential part in the education process. In such an important subject, the use of technology cannot be avoided at all. By the birth of ICT-based education, a lot of innovation and change have occurred...
Conference Paper
Full-text available
Researchers have focused on security aspects of different Mobile Ad Hoc Network (MANET) protocols to prevent Physical Layer attacks through different complex mechanisms. DoS attacks are one of the most harmful attacks against functionality and stability of network systems. MANETs are more vulnerable to Physical Layer attacks due to limited resource...
Article
In today’s globalized world, information is one of the most important assets of the companies. Information has become very important both as input and output. Hence, it provides valuable input into managing IT systems and their development, enabling risk identification, planning and mitigation. By this way, companies gain competitive advantage in w...
Article
Full-text available
The varieties of studies in the literature have been addressed by the researchers to solve security dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific characteristics of MANETs, the radio interference attacks cannot be defeated through conventional security mechanisms. An adversary can easily override...
Article
New teaching and learning techniques are developing day by day with the support of information technology and the Internet. Many universities take the advantage of support of information technologies on teaching and learning environments. Each individual’s physical, mental and emotional skills are different. It is emphasized that, more importance a...
Article
The request-to-send (RTS) mechanism is a handshaking procedure used by the IEEE 802.11 wireless network to reduce the possibility of collusions. RTS threshold specifies a threshold to determine whether RTS frames are required for a particular data frame. In such situations where the MAC Service Data Unit (MSDU) received from higher layer has a size...
Article
The learner who comes together in the same learning environment does not mean that they have the same ability to learn. It is emphasized that, more importance are given to individual performances while they are in groups in those places where the traditional teaching approach is dominated. At this point, individual performance of individuals and th...
Conference Paper
Recently, the RFID (Radio Frequency Identification) technology becomes very popular. Companies, especially those related with high security issues combined their systems with RFID technology for to provide faster and reliable services. Because of lack of security considerations in simple RFID technology and models, the security enhanced RFID system...