
Ozgur Turetken- PhD
- Professor (Full) at Toronto Metropolitan University
Ozgur Turetken
- PhD
- Professor (Full) at Toronto Metropolitan University
About
73
Publications
26,819
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,655
Citations
Introduction
Current institution
Additional affiliations
Education
August 1996 - June 2020
Publications
Publications (73)
Social media are widely used for online political discourse. Opinions shared on social media have different sentiments associated with them. Given the very high adoption rates of X (formerly known as Twitter) among adults, those who share their opinions on X not only represent a sizable segment of the society, but also influence (through emotion co...
Serious games developed for learning have gained popularity due to their promise for better learning outcomes. However, designing these games can be costly, take a long time, and may not lead to the desired outcomes if an adequate design process is not followed. Especially critical in this process is the creation of an effective game concept. Based...
Humans have often been written off as the weakest link in the cybersecurity industry. This paper looks at the human factor from a different perspective, seeking ways to leverage the human element to improve cybersecurity. The human element and its importance in cybersecurity defense and security incidents have been widely studied. The relationship...
Climate-related catastrophes leave people in dire need of aid. A major obstacle in providing help to people is the lack of trust in the aid process. Charity organizations want to ensure that funds and materials reach the intended destinations. Blockchain technology injects trust into business transactions through impeccable record keeping and can a...
The existing literature pays little attention to the onward and upward stage, the final stage of an ES life cycle where system enhancement and integration cause permanent changes in employees’ work and profoundly impact their well-being. Drawing from the Enterprise System Experience Cycle Framework and human resource management literature, we have...
Background
Relatively little is known about the role of educator in serious game design and development and their experiences with serious game implementation. We investigate educators’ perceived challenges deriving from their involvement as subject matter experts during the serious game development trajectory.
Methods
A secondary analysis of sur...
A major threat posed by quantum computers is that they will be able to crack current standardized cryptography. A scalable quantum computer is still challenging to build from an engineering perspective, but there is an imminent threat to digital security and privacy where encrypted information, such as personally identifiable information, will rema...
Blockchain technology presents significant potential along with risk. The blockchain technology transformation framework informs decision makers on how blockchain fits in their processes, what data will be in the transactions, and who the participants will be, allowing users to lower risks and increase their chances for a successful blockchain solu...
Electronic word of mouth (eWOM) is prominent and abundant in consumer domains. Both consumers and product/service providers need help in understanding and navigating the resulting information spaces, which are vast and dynamic. The general tone or polarity of reviews, blogs or tweets provides such help. In this paper, we explore the viability of au...
This report summarizes the discussion in a panel session on gamification designs at the 2019 European Conference on Information Systems in Stockholm, Sweden. The panel explores a research agenda for gamification design. The "what, why, and how" are considered to analyze the current state of the art of gamification research. An adapted definition of...
This report summarizes the discussion in a panel session on gamification designs at the 2019 European Conference on Information Systems in Stockholm, Sweden. The panel explores a research agenda for gamification design. The "what, why, and how" are considered to analyze the current state of the art of gamification research. An adapted definition of...
Consumers and corporate end users are regularly faced with the challenge of adapting to new technology tools and their user interfaces. Understanding the role of user experience in using these new interfaces is an important aspect of assessing and planning for how new innovations are received. Through a controlled laboratory experiment in the infor...
Google Trends, the service that illustrates the trends in Google search activity, has recently received attention form analytics researchers for the prediction of economic trends and consumer behavior. Previous studies used Google Trends to estimate consumption and sales for a particular business, or provide general trends for an economic sector or...
User-generated online content serves as a source of product- and service-related information that reduces the
uncertainty in consumer decision making, yet the abundance of such content makes it prohibitively costly to use all
relevant information. Dealing with this (big data) problem requires a consumer to decide what subset of information to
focus...
BACKGROUND: The FRAX and QFracture risk calculators have previously been validated but their relative performance with respect to cost-effectiveness has yet to be evaluated. METHODS: The relative costs of implementing these two fracture risk calculators were assessed in two scenarios, firstly in a case-control group of 584 post-menopausal women usi...
The objective of this study is to identify the impact of cultural differences on adoption of smartphones in Canada and Turkey and investigate the differences in patterns between the adoption behaviors of the two countries. Sequential explanatory design mixed-method research strategy, which incorporates quantitative and qualitative approaches, was u...
Organizational adoption of new technologies is a practically important research area. The present study aims to investigate the impact of perceived security on organizational adoption of mobile communication technologies, specifically smartphones. For this purpose, a research model is developed extending the Technology Acceptance Model (TAM). The r...
Organizational adoption of new technologies is a practically important research area. The present study aims to investigate the impact of perceived security on organizational adoption of mobile communication technologies, specifically smartphones. For this purpose, a research model is developed extending the Technology Acceptance Model (TAM). The r...
The objective of this study is to identify the impact of cultural differences on adoption of smartphones in Canada and Turkey and investigate the differences in patterns between the adoption behaviors of the two countries. Sequential explanatory design mixed-method research strategy, which incorporates quantitative and qualitative approaches, was u...
A typical trade-off in decision making is between the cost of acquiring information and the decline in decision quality caused by insufficient information. Consumers regularly face this trade-off in purchase decisions. Online product/service reviews serve as sources of product/service related information. Meanwhile, modern technology has led to an...
This study aims to investigate the effects of cultural differences on smartphone adoption by organizations in Canada and Turkey. Structural equation modeling was used to test the hypothesized relationships based on the data collected by a survey of 141 Canadian and 213 Turkish organizations. Results indicate that cultural differences have a signifi...
In December 2012, the AIS Special Interest Group on Decision Support, Knowledge and Data Management Systems (SIGDSS) and the Teradata University Network (TUN) cosponsored the Business Intelligence Congress 3 and conducted surveys to assess academia’s response to the growing market need for students with Business Intelligence (BI) and Business Analy...
Adoption of Information Technologies (ITs) is a crucial decision for the growth,
productivity, competitiveness, and even survival in a competitive market.
Organizations adopt IT innovations to sustain their competitive position as well as
to create competitive advantage. Tornatzky and Fleischer (1990) developed a
framework named TOE that compri...
─ Adoption of Information Technologies (ITs) is a crucial decision for the growth, productivity, competitiveness, and even survival in a competitive market. Organizations adopt IT innovations to sustain their competitive position as well as to create competitive advantage. Tornatzky and Fleischer (1990) developed a framework named TOE that comprise...
An easily understood data warehouse model enables users to better identify and retrieve its data. It also makes it easier for users to suggest changes to its structure and content. Through an exploratory, empirical study, we compared the understandability of the star and traditional relational schemas. The results of our experiment contradict previ...
Individual and work characteristics are used in telecommuting plans; however, their impact on telecommuting success is not well known. We studied how employee tenure, work experience, communication skills, task interdependence, work output measurability, and task variety impact telecommuter productivity, performance, and satisfaction after taking i...
For almost two decades, the Internet and related technologies have made more information available to information users than they can handle. The decentralization of content creation that is a feature of Web 2.0 has only exacerbated this problem. This state of overload, combined with our tendency toward hypothesis-confirming behavior, can result in...
Many artificial intelligence tasks, such as automated question answering, reasoning, or heterogeneous database integration, involve verification of a semantic category (e.g. “coffee” is a drink, “red” is a color, while “steak” is not a drink and “big” is not a color). In this research, we explore completely automated on-the-fly verification of a me...
Earned Value Method (EVM) is a popular project control technique. In this paper, we discuss the extended version of EVM (EVM/LC) that addresses the effect of learning on the performance of project teams. These effects have so far been ignored in most EVM applications. We present a spreadsheet-based decision support tool that automates the calculati...
Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business
continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities.
However; recently managers are becoming more aware of the fact that the very issues that make th...
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
Many artificial intelligence tasks, such as automated question answering, reasoning or heterogeneous database integration, involve verification of a semantic category (e.g. "coffee" is a drink, "red" is a color, while "steak" is not a drink and "big" is not a color). We present a novel algorithm to automatically validate a semantic category. Contra...
The World Wide Web is a dominant global communication medium and knowledge repository. It is used by a great number of people with a variety of computer skills hence its usability is critical. As with many large information collections, the challenge with web usability is understanding the structure of a collection of information objects (web pages...
Effective e-mail management tools must treat messages as useful information, not simply as data congesting the network, the hard disk, or a user's inbox. Solutions that economize on scarce cognitive resources at the expense of the relatively cheap additional CPU power, disk capacity, or network bandwidth will ultimately prevail over those that purs...
We investigated whether a “context-aware” fisheye view can more successfully communicate the information contained in a set of process models (data flow diagrams) than a traditional “context-free” presentation. We conducted two controlled experiments: the first included a simple set of DFDs and tasks that required a basic understanding of the syste...
The World Wide Web is a dominant global communication medium and knowledge repository. It is used by a great number of people with a variety of computer skills hence its usability is critical. As with many large information collections, the challenge with web usability is understanding the structure of a collection of information objects (web pages...
Search engines make vast amounts of information available to Internet users. Some of these engines have incorporated information visualization techniques to facilitate browsing through these results by reducing information overload. Drawing on information foraging theory, we study the effects of augmenting visualizations with animation to help user...
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
The increasing volume of electronic mail communication threatens to cause a state of “e-mail overload” where the volume of messages exceeds individuals' capacity to process them. To address this problem, this study extends the application of hierarchical clustering to the domain of e-mail. We report on the design and development of a system that ap...
The result of a typical web search is often overwhelming. It is very difficult to explore the textual listing of the resulting documents, which may be in the thousands. In order to improve the utility of the search experience, we explore presenting search results through clustering and a zoomable two-dimensional map (zoomable treemap). Furthermore,...
Testing of efficacy of the Fisheye-based DFD visualization using a preconfigured prototype, is discussed. The fisheye view technique is inspired by the nonlinear way in which people perceive their environments. From a managerial perspective, there are two important potential benefits of using fisheye views. First, the use of fisheye views can incre...
Information technologies have proliferated at an unprecedented rate to provide access to information across geographical boundaries. However, this proliferation has led to an information overload. Information overload has adverse impacts on information use and decision quality. This research focuses on the overload problem resulting from a web sear...
This study aims to predict the financial performance of publicly traded Turkish firms using their available financial data. Financial performance is measured by a firm's inclusion in an index of top performers, where the inclusion of firms is based on the value and sales volume of their stocks. Two alternative techniques, multiple discriminant anal...
Data flow diagrams (DFDs) are commonly used models for representing business processes. The traditional presentation of DFDs provides separate views of major system processes from views of their subprocesses. This separates the details of the low-level system activities from their context. Although this separation can reduce information overload, i...
This research focuses on the information overload problem on the Internet, and proposes a potential remedy to the overload encountered while searching the Web. We developed a system that makes use of clustering and visualization for browsing the results of a typical web search. We built two different (full and fisheye) zooming capabilities into our...
This study addresses the information overload problem that one faces while browsing the results of a web search query. The increasing indexing capabilities of the commercial web search engines makes it common for a broadly formulated search query to result in thousands of web documents. This causes a nontrivial overload problem. Our study proposes...
Recent strides in computing and telecommunications have provided managers with access to ever increasing amounts of data through higher speed computers and extensive connectivity. However, these advances have not solved the problems of getting the right information to the right person at the right time, and retaining that information in the organiz...