Ozgur Turetken

Ozgur Turetken
Verified
Ozgur verified their affiliation via an institutional email.
Verified
Ozgur verified their affiliation via an institutional email.
  • PhD
  • Professor (Full) at Toronto Metropolitan University

About

73
Publications
26,819
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,655
Citations
Current institution
Toronto Metropolitan University
Current position
  • Professor (Full)
Additional affiliations
July 2019 - present
Toronto Metropolitan University
Position
  • Head of Faculty
Description
  • Responsible for TRSM research portfolio
June 2012 - present
Toronto Metropolitan University
Position
  • Professor (Full)
August 2006 - June 2012
Toronto Metropolitan University
Position
  • Professor (Associate)
Education
August 1996 - June 2020
Oklahoma State University
Field of study
  • Management Science and Information Systems

Publications

Publications (73)
Article
Social media are widely used for online political discourse. Opinions shared on social media have different sentiments associated with them. Given the very high adoption rates of X (formerly known as Twitter) among adults, those who share their opinions on X not only represent a sizable segment of the society, but also influence (through emotion co...
Article
Serious games developed for learning have gained popularity due to their promise for better learning outcomes. However, designing these games can be costly, take a long time, and may not lead to the desired outcomes if an adequate design process is not followed. Especially critical in this process is the creation of an effective game concept. Based...
Chapter
Humans have often been written off as the weakest link in the cybersecurity industry. This paper looks at the human factor from a different perspective, seeking ways to leverage the human element to improve cybersecurity. The human element and its importance in cybersecurity defense and security incidents have been widely studied. The relationship...
Article
Full-text available
Climate-related catastrophes leave people in dire need of aid. A major obstacle in providing help to people is the lack of trust in the aid process. Charity organizations want to ensure that funds and materials reach the intended destinations. Blockchain technology injects trust into business transactions through impeccable record keeping and can a...
Article
The existing literature pays little attention to the onward and upward stage, the final stage of an ES life cycle where system enhancement and integration cause permanent changes in employees’ work and profoundly impact their well-being. Drawing from the Enterprise System Experience Cycle Framework and human resource management literature, we have...
Article
Background Relatively little is known about the role of educator in serious game design and development and their experiences with serious game implementation. We investigate educators’ perceived challenges deriving from their involvement as subject matter experts during the serious game development trajectory. Methods A secondary analysis of sur...
Article
A major threat posed by quantum computers is that they will be able to crack current standardized cryptography. A scalable quantum computer is still challenging to build from an engineering perspective, but there is an imminent threat to digital security and privacy where encrypted information, such as personally identifiable information, will rema...
Article
Blockchain technology presents significant potential along with risk. The blockchain technology transformation framework informs decision makers on how blockchain fits in their processes, what data will be in the transactions, and who the participants will be, allowing users to lower risks and increase their chances for a successful blockchain solu...
Article
Electronic word of mouth (eWOM) is prominent and abundant in consumer domains. Both consumers and product/service providers need help in understanding and navigating the resulting information spaces, which are vast and dynamic. The general tone or polarity of reviews, blogs or tweets provides such help. In this paper, we explore the viability of au...
Preprint
Full-text available
This report summarizes the discussion in a panel session on gamification designs at the 2019 European Conference on Information Systems in Stockholm, Sweden. The panel explores a research agenda for gamification design. The "what, why, and how" are considered to analyze the current state of the art of gamification research. An adapted definition of...
Article
Full-text available
This report summarizes the discussion in a panel session on gamification designs at the 2019 European Conference on Information Systems in Stockholm, Sweden. The panel explores a research agenda for gamification design. The "what, why, and how" are considered to analyze the current state of the art of gamification research. An adapted definition of...
Article
Full-text available
Consumers and corporate end users are regularly faced with the challenge of adapting to new technology tools and their user interfaces. Understanding the role of user experience in using these new interfaces is an important aspect of assessing and planning for how new innovations are received. Through a controlled laboratory experiment in the infor...
Chapter
Google Trends, the service that illustrates the trends in Google search activity, has recently received attention form analytics researchers for the prediction of economic trends and consumer behavior. Previous studies used Google Trends to estimate consumption and sales for a particular business, or provide general trends for an economic sector or...
Article
Full-text available
User-generated online content serves as a source of product- and service-related information that reduces the uncertainty in consumer decision making, yet the abundance of such content makes it prohibitively costly to use all relevant information. Dealing with this (big data) problem requires a consumer to decide what subset of information to focus...
Article
BACKGROUND: The FRAX and QFracture risk calculators have previously been validated but their relative performance with respect to cost-effectiveness has yet to be evaluated. METHODS: The relative costs of implementing these two fracture risk calculators were assessed in two scenarios, firstly in a case-control group of 584 post-menopausal women usi...
Article
The objective of this study is to identify the impact of cultural differences on adoption of smartphones in Canada and Turkey and investigate the differences in patterns between the adoption behaviors of the two countries. Sequential explanatory design mixed-method research strategy, which incorporates quantitative and qualitative approaches, was u...
Article
Organizational adoption of new technologies is a practically important research area. The present study aims to investigate the impact of perceived security on organizational adoption of mobile communication technologies, specifically smartphones. For this purpose, a research model is developed extending the Technology Acceptance Model (TAM). The r...
Article
Full-text available
Organizational adoption of new technologies is a practically important research area. The present study aims to investigate the impact of perceived security on organizational adoption of mobile communication technologies, specifically smartphones. For this purpose, a research model is developed extending the Technology Acceptance Model (TAM). The r...
Article
Full-text available
The objective of this study is to identify the impact of cultural differences on adoption of smartphones in Canada and Turkey and investigate the differences in patterns between the adoption behaviors of the two countries. Sequential explanatory design mixed-method research strategy, which incorporates quantitative and qualitative approaches, was u...
Conference Paper
Full-text available
A typical trade-off in decision making is between the cost of acquiring information and the decline in decision quality caused by insufficient information. Consumers regularly face this trade-off in purchase decisions. Online product/service reviews serve as sources of product/service related information. Meanwhile, modern technology has led to an...
Conference Paper
This study aims to investigate the effects of cultural differences on smartphone adoption by organizations in Canada and Turkey. Structural equation modeling was used to test the hypothesized relationships based on the data collected by a survey of 141 Canadian and 213 Turkish organizations. Results indicate that cultural differences have a signifi...
Article
In December 2012, the AIS Special Interest Group on Decision Support, Knowledge and Data Management Systems (SIGDSS) and the Teradata University Network (TUN) cosponsored the Business Intelligence Congress 3 and conducted surveys to assess academia’s response to the growing market need for students with Business Intelligence (BI) and Business Analy...
Article
Adoption of Information Technologies (ITs) is a crucial decision for the growth, productivity, competitiveness, and even survival in a competitive market. Organizations adopt IT innovations to sustain their competitive position as well as to create competitive advantage. Tornatzky and Fleischer (1990) developed a framework named TOE that compri...
Article
Full-text available
─ Adoption of Information Technologies (ITs) is a crucial decision for the growth, productivity, competitiveness, and even survival in a competitive market. Organizations adopt IT innovations to sustain their competitive position as well as to create competitive advantage. Tornatzky and Fleischer (1990) developed a framework named TOE that comprise...
Article
An easily understood data warehouse model enables users to better identify and retrieve its data. It also makes it easier for users to suggest changes to its structure and content. Through an exploratory, empirical study, we compared the understandability of the star and traditional relational schemas. The results of our experiment contradict previ...
Article
Full-text available
Individual and work characteristics are used in telecommuting plans; however, their impact on telecommuting success is not well known. We studied how employee tenure, work experience, communication skills, task interdependence, work output measurability, and task variety impact telecommuter productivity, performance, and satisfaction after taking i...
Conference Paper
For almost two decades, the Internet and related technologies have made more information available to information users than they can handle. The decentralization of content creation that is a feature of Web 2.0 has only exacerbated this problem. This state of overload, combined with our tendency toward hypothesis-confirming behavior, can result in...
Article
Many artificial intelligence tasks, such as automated question answering, reasoning, or heterogeneous database integration, involve verification of a semantic category (e.g. “coffee” is a drink, “red” is a color, while “steak” is not a drink and “big” is not a color). In this research, we explore completely automated on-the-fly verification of a me...
Article
Earned Value Method (EVM) is a popular project control technique. In this paper, we discuss the extended version of EVM (EVM/LC) that addresses the effect of learning on the performance of project teams. These effects have so far been ignored in most EVM applications. We present a spreadsheet-based decision support tool that automates the calculati...
Article
Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make th...
Chapter
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
Chapter
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
Conference Paper
Full-text available
Many artificial intelligence tasks, such as automated question answering, reasoning or heterogeneous database integration, involve verification of a semantic category (e.g. "coffee" is a drink, "red" is a color, while "steak" is not a drink and "big" is not a color). We present a novel algorithm to automatically validate a semantic category. Contra...
Article
The World Wide Web is a dominant global communication medium and knowledge repository. It is used by a great number of people with a variety of computer skills hence its usability is critical. As with many large information collections, the challenge with web usability is understanding the structure of a collection of information objects (web pages...
Article
Full-text available
Effective e-mail management tools must treat messages as useful information, not simply as data congesting the network, the hard disk, or a user's inbox. Solutions that economize on scarce cognitive resources at the expense of the relatively cheap additional CPU power, disk capacity, or network bandwidth will ultimately prevail over those that purs...
Article
We investigated whether a “context-aware” fisheye view can more successfully communicate the information contained in a set of process models (data flow diagrams) than a traditional “context-free” presentation. We conducted two controlled experiments: the first included a simple set of DFDs and tasks that required a basic understanding of the syste...
Article
The World Wide Web is a dominant global communication medium and knowledge repository. It is used by a great number of people with a variety of computer skills hence its usability is critical. As with many large information collections, the challenge with web usability is understanding the structure of a collection of information objects (web pages...
Conference Paper
Search engines make vast amounts of information available to Internet users. Some of these engines have incorporated information visualization techniques to facilitate browsing through these results by reducing information overload. Drawing on information foraging theory, we study the effects of augmenting visualizations with animation to help user...
Conference Paper
Inefficient and ineffective search is widely recognized as a problem for businesses. The shortcomings of keyword searches have been elaborated upon by many authors, and many enhancements to keyword searches have been proposed. To date, however, no one has provided a quantitative model or systematic process for evaluating the savings that accrue fro...
Article
The increasing volume of electronic mail communication threatens to cause a state of “e-mail overload” where the volume of messages exceeds individuals' capacity to process them. To address this problem, this study extends the application of hierarchical clustering to the domain of e-mail. We report on the design and development of a system that ap...
Article
The result of a typical web search is often overwhelming. It is very difficult to explore the textual listing of the resulting documents, which may be in the thousands. In order to improve the utility of the search experience, we explore presenting search results through clustering and a zoomable two-dimensional map (zoomable treemap). Furthermore,...
Article
Testing of efficacy of the Fisheye-based DFD visualization using a preconfigured prototype, is discussed. The fisheye view technique is inspired by the nonlinear way in which people perceive their environments. From a managerial perspective, there are two important potential benefits of using fisheye views. First, the use of fisheye views can incre...
Article
Information technologies have proliferated at an unprecedented rate to provide access to information across geographical boundaries. However, this proliferation has led to an information overload. Information overload has adverse impacts on information use and decision quality. This research focuses on the overload problem resulting from a web sear...
Article
Full-text available
This study aims to predict the financial performance of publicly traded Turkish firms using their available financial data. Financial performance is measured by a firm's inclusion in an index of top performers, where the inclusion of firms is based on the value and sales volume of their stocks. Two alternative techniques, multiple discriminant anal...
Conference Paper
Full-text available
Data flow diagrams (DFDs) are commonly used models for representing business processes. The traditional presentation of DFDs provides separate views of major system processes from views of their subprocesses. This separates the details of the low-level system activities from their context. Although this separation can reduce information overload, i...
Conference Paper
Full-text available
This research focuses on the information overload problem on the Internet, and proposes a potential remedy to the overload encountered while searching the Web. We developed a system that makes use of clustering and visualization for browsing the results of a typical web search. We built two different (full and fisheye) zooming capabilities into our...
Article
This study addresses the information overload problem that one faces while browsing the results of a web search query. The increasing indexing capabilities of the commercial web search engines makes it common for a broadly formulated search query to result in thousands of web documents. This causes a nontrivial overload problem. Our study proposes...
Article
Full-text available
Recent strides in computing and telecommunications have provided managers with access to ever increasing amounts of data through higher speed computers and extensive connectivity. However, these advances have not solved the problems of getting the right information to the right person at the right time, and retaining that information in the organiz...

Network

Cited By