Skip to main content

    Nihat Kasap

    Bu çalışma, büyük veri analizini sosyal medya araştırmalarında kullanımı için yöntem önerisinde bulunmaktadır. Büyük veri araştırmalarında, tümdengelim ya da tümevarım yerine alternatif olarak “tümleşim (abduction)”... more
    Bu çalışma, büyük veri analizini sosyal medya araştırmalarında kullanımı için yöntem önerisinde bulunmaktadır. Büyük veri araştırmalarında, tümdengelim ya da tümevarım yerine alternatif olarak “tümleşim (abduction)” yaklaşımı kullanılabilir (Kitchin, 2014). Tümleşim, elde edilen veriden yola çıkarak veriyi en iyi açıklayacak hipotezlere ulaşılmasını amaçlayan bir anlam çıkarma biçimidir (Peirce, 1958; Magnani, 2001, sf 26). Tümleşim yaklaşımında, incelenecek olguya ilişkin veri elde edildikten sonra, veriye ait bulguları en iyi açıklayacak hipotezler oluşturulur; ve veri farklı açılardan da analiz edilerek oluşturulan hipotezler sınanır. Böyle bir çalışmayı çok büyük hacimli ve detaylı bir veri seti ile yapmak araştırmanın bilimsel niteliği açısından önemli bir unsurdur. Sosyal medya araştırmalarında veri hacmi büyüklüğü ve verinin oluşum hızının yüksekliği sebebiyle, büyük veri analizi benimsenen yöntemler arasında öne çıkmaktadır (Jacob, 2009). Bu bağlamda, sosyal medya araştırmalarında analitik ve yapısal bir yöntemin takip edilmesi, araştırmaların ve çıktılarının bilimsel niteliğinin korunması açısından önem taşımaktadır. Çalışmamızın amacı, sosyal medya analitiğine örnek oluşturmak ve özellikle Twitter analizi için büyük veri analizine dayanan bir araştırma yöntemi önerisinde bulunmaktır.
    Research Interests:
    Purpose Twitter usage during Gezi Park Protests, a significant large-scale connective action, is analyzed to reveal meaningful findings on individual and group tweeting characteristics. Subsequent to the Arab Spring in terms of its... more
    Purpose
    Twitter usage during Gezi Park Protests, a significant large-scale connective action, is analyzed to reveal meaningful findings on individual and group tweeting characteristics. Subsequent to the Arab Spring in terms of its timing, the Gezi Park Protests began by the spread of news on construction plans to build a shopping mall at a public park in Taksim Square in Istanbul in May 26, 2013. Though started as a small-scale local protest, it emerged into a series of multi-regional social protests, also known as the Gezi Park demonstrations.

    Design/methodology/approach
    We sought answers to three important research questions: (1) whether Twitter usage is reflective of real life events, (2) what Twitter is actually used for, and (3) is Twitter usage contagious? We have collected streamed data from Twitter. As a research methodology, we followed social media analytics framework proposed by Fan and Gordon (2014), which included three consecutive processes; capturing, understanding and presenting. An analysis of 54 million publicly available tweets and 3.5 million foursquare check-ins, which account to randomly selected 1% of all tweets and check-ins posted from Istanbul, Turkey between March – September 2013 are presented.

    Findings
    A perceived lack of sufficient media coverage on events taking place on the streets is believed to result in Turkish protestors’ use of Twitter as a medium to share and get information on ongoing and planned demonstrations, to learn the recent news, to participate in the debate, and to create local and global awareness.

    Research limitations/implications
    Data collection via streamed tweets comes with certain limitations. Twitter restricts data collection on publicly available tweets and only allows randomly selected 1% of all tweets posted from a specific region. Therefore, our data includes only tweets of publicly available Twitter profiles. The generalizability of our findings should be regarded with concerning this limitation.

    Practical implications
    We conclude that Twitter was used mainly as a platform to exchange information to organize street demonstrations.

    Originality/value
    We conclude that Twitter usage reflected Street movements on a chronological level. Finally, we present that Twitter usage is contagious whereas tweeting is not necessarily.
    This paper aims to augment current Enterprise Architecture (EA) frameworks to become pattern-based and also reveal the value of alternative managerial strategies across different industries and business functions in Turkey. Value... more
    This paper aims to augment current Enterprise Architecture (EA) frameworks to become pattern-based and also reveal the value of alternative managerial strategies across different industries and business functions in Turkey. Value perceptions for alternative managerial strategies were collected via survey, and the values for strategies were analyzed through the rigorous application of statistical techniques. Then, evidence was searched and obtained from business literature that support or refute the statistically-supported hypothesis.
    ABSTRACT Paper is in Turkish, SSRN doesn't allow uploading for Turkish characters. Please see the attached pdf file for its content.
    ... Doktora Üstü Araştırma Görevlisi, Sabancı Üniversitesi, selcenaykac@sabanciuniv.edu † Y.Doç.Dr., Sabancı Üniversitesi, enes@sabanciuniv.edu ... özelliği gösteren teknolojiyi takip ederek, en verimli ve uygun yöntemler kümesini... more
    ... Doktora Üstü Araştırma Görevlisi, Sabancı Üniversitesi, selcenaykac@sabanciuniv.edu † Y.Doç.Dr., Sabancı Üniversitesi, enes@sabanciuniv.edu ... özelliği gösteren teknolojiyi takip ederek, en verimli ve uygun yöntemler kümesini kullanarak sürdürülebilir uzun vadeli planlamayı ...
    ABSTRACT M-devlet, e-devletin ardından henüz gelişim safhasındadır. E-devlet hizmetlerinden faydalanmak için vatandaşların bilgisayara ve İnternet erişimine sahip olmaları gerekmektedir. Vatandaşların bilgisayar okur-yazarlık... more
    ABSTRACT M-devlet, e-devletin ardından henüz gelişim safhasındadır. E-devlet hizmetlerinden faydalanmak için vatandaşların bilgisayara ve İnternet erişimine sahip olmaları gerekmektedir. Vatandaşların bilgisayar okur-yazarlık seviyelerinin henüz istenen seviyelere gelmemiş olması e-devlet kullanımının yaygınlaşmasını sınırlamaktadır. Öte yandan, ülkemizdeki cep telefonu cihaz parkına ve kapsama alanlarına bakıldığında, cihaz parkının yeni nesil telefonlardan oluştuğu, erişkin nüfusun önemli kısmının en az bir cep telefonu sahibi olduğu, ülkemizin hızlı ve uygun ücretli 3G Internet hizmetleri ile kapsandığı görülmektedir. Tüm bu bilgiler ışığında, m-devlet yaklaşımının Türkiye için benimsenmesinin önemli avantajları beraberinde getirebileceği düşünülebilir. Bu çalışma, m-devletin Türkiye'de geliştirilmesine yönelik kullanıcı kabulünü inceleyerek, ulusal yazına m-devlet çalışmaları alanında katkı yapmayı amaçlamaktadır. M-government, a precedent of e-government, has been pursuing its emergence. Citizens need to possess a computer and access to an Internet service to benefit from the e-government services. Penetration of e-government usage is hindered by the citizens’ computer literacy, which has not yet reached the desired levels. On the other hand, a closer look at the Turkey’s cellular phone device park and mobile service coverage reveals that the device park mainly consists of new generation phones, a significant portion of the adult population owns at least one mobile phone, the majority of the landscape is covered by fast and affordable 3G Internet services. Hence, adoption of m-government approach in Turkey may bring several important advantages. This paper aims to contribute to the m-government literature by examining the user acceptance model of m-government in Turkey.
    ... Dr. Nihat Kasap Sabanci University/Ass. Prof. ... 1 http://www.zdnet.co.uk/tsearch/western+ european+spending.htm 2 http://www.eu-forum.org/article.php3?id_article= 126&debut_article=485 3 http://go.worldbank.org/M1JHE0Z280... more
    ... Dr. Nihat Kasap Sabanci University/Ass. Prof. ... 1 http://www.zdnet.co.uk/tsearch/western+ european+spending.htm 2 http://www.eu-forum.org/article.php3?id_article= 126&debut_article=485 3 http://go.worldbank.org/M1JHE0Z280 Page 3. 3 ...
    M-devlet, e-devletin ardından henüz gelişim safhasındadır. E-devlet hizmetlerinden faydalanmak için vatandaşların bilgisayara ve İnternet erişimine sahip olmaları gerekmektedir. Vatandaşların bilgisayar okur-yazarlık seviyelerinin henüz... more
    M-devlet, e-devletin ardından henüz gelişim safhasındadır. E-devlet hizmetlerinden faydalanmak için vatandaşların bilgisayara ve İnternet erişimine sahip olmaları gerekmektedir. Vatandaşların bilgisayar okur-yazarlık seviyelerinin henüz istenen seviyelere gelmemiş olması e-devlet kullanımının yaygınlaşmasını sınırlamaktadır. Öte yandan, ülkemizdeki cep telefonu cihaz parkına ve kapsama alanlarına bakıldığında, cihaz parkının yeni nesil telefonlardan oluştuğu, erişkin nüfusun önemli kısmının en az bir cep telefonu sahibi olduğu, ülkemizin hızlı ve uygun ücretli 3G Internet hizmetleri ile kapsandığı görülmektedir. Tüm bu bilgiler ışığında, m-devlet yaklaşımının Türkiye için benimsenmesinin önemli avantajları beraberinde getirebileceği düşünülebilir. Bu çalışma, m-devletin Türkiye'de geliştirilmesine yönelik kullanıcı kabulünü inceleyerek, ulusal yazına m-devlet çalışmaları alanında katkı yapmayı amaçlamaktadır. M-government, a precedent of e-government, has been pursuing its emerg...
    ABSTRACT Paper is in Turkish, SSRN doesn't allow uploading for Turkish characters. Please see the attached pdf file for its content.
    ... Doktora Üstü Araştırma Görevlisi, Sabancı Üniversitesi, selcenaykac@sabanciuniv.edu † Y.Doç.Dr., Sabancı Üniversitesi, enes@sabanciuniv.edu ... özelliği gösteren teknolojiyi takip ederek, en verimli ve uygun yöntemler kümesini... more
    ... Doktora Üstü Araştırma Görevlisi, Sabancı Üniversitesi, selcenaykac@sabanciuniv.edu † Y.Doç.Dr., Sabancı Üniversitesi, enes@sabanciuniv.edu ... özelliği gösteren teknolojiyi takip ederek, en verimli ve uygun yöntemler kümesini kullanarak sürdürülebilir uzun vadeli planlamayı ...
    ... with different price discount policies (volume discount pricing) that are offered by network providers in order to ... can extend the use of fuzzy logic in this area and particularly in task allocation. ... They present a fuzzy-based... more
    ... with different price discount policies (volume discount pricing) that are offered by network providers in order to ... can extend the use of fuzzy logic in this area and particularly in task allocation. ... They present a fuzzy-based method for path selection under additive quality of service ...
    ABSTRACT In this study, we model bandwidth provider selection and task allocation problem as an expected cost minimization problem with stochastic constraints. Two important parameters of quality of service (QoS), namely delay and jitter... more
    ABSTRACT In this study, we model bandwidth provider selection and task allocation problem as an expected cost minimization problem with stochastic constraints. Two important parameters of quality of service (QoS), namely delay and jitter are considered as random variables to capture stochastic nature of telecom network environment. As solution methodology, stochastic model is converted into its deterministic equivalent and then a novel heuristic algorithm is proposed to solve resulting non-linear mixed integer programming model. We analyze how different prices, quality and task distribution affect the optimal behavior of the firm. Finally, performance of solution procedure is tested by several randomly generated scenarios and by a relaxation of this problem as tight lower bound.
    ABSTRACT Nowadays, every firm uses telecommunication networks in different amounts and ways in order to complete their daily operations. In this article, we investigate an optimisation problem that a firm faces when acquiring network... more
    ABSTRACT Nowadays, every firm uses telecommunication networks in different amounts and ways in order to complete their daily operations. In this article, we investigate an optimisation problem that a firm faces when acquiring network capacity from a market in which there exist several network providers offering different pricing and quality of service (QoS) schemes. The QoS level guaranteed by network providers and the minimum quality level of service, which is needed for accomplishing the operations are denoted as fuzzy numbers in order to handle the non-deterministic nature of the telecommunication network environment. Interestingly, the mathematical formulation of the aforementioned problem leads to the special case of a well-known two-dimensional bin packing problem, which is famous for its computational complexity. We propose two different heuristic solution procedures that have the capability of solving the resulting nonlinear mixed integer programming model with fuzzy constraints. In conclusion, the efficiency of each algorithm is tested in several test instances to demonstrate the applicability of the methodology.
    ABSTRACT
    Research Interests:
    We investigated public RFID companies traded on the stock exchange markets, summarized their financial performances, described their RF products, services, and applications. We performed a sector analysis for RFID technologies for... more
    We investigated public RFID companies traded on the stock exchange markets, summarized their financial performances, described their RF products, services, and applications. We performed a sector analysis for RFID technologies for researchers and analysts. When
    In the recent past, there have been several initiatives by major network providers such as Turk Telekom lead the industry towards network capacity distribution in Turkey. In this study, we use a monopoly pricing model to examine the... more
    In the recent past, there have been several initiatives by major network providers such as Turk Telekom lead the industry towards network capacity distribution in Turkey. In this study, we use a monopoly pricing model to examine the optimal pricing strategies for “pay-per-...
    ... Geniş bant paketleri genelde ücretsizdir. Birey-ler, maksimum hacimde bilgiyi bir ay içinde is-tedikleri kadar internetten indirebilir ya da in-ternete yükleyebilirler (Masuda ve Whang, 2006; Levy vd., 2006; Stiller ve Reichl, 2001).... more
    ... Geniş bant paketleri genelde ücretsizdir. Birey-ler, maksimum hacimde bilgiyi bir ay içinde is-tedikleri kadar internetten indirebilir ya da in-ternete yükleyebilirler (Masuda ve Whang, 2006; Levy vd., 2006; Stiller ve Reichl, 2001). ...
    Information Technologies (IT) and business processes should be considered together to get the best results in business life. Therefore their integration and reflections on each other are very important in managing institutional changes... more
    Information Technologies (IT) and business processes should be considered together to get the best results in business life. Therefore their integration and reflections on each other are very important in managing institutional changes due to changes in the IT world. Change is a very sensitive concept that must be managed very carefully. In this article, a framework for managing IT based changes by protecting the business leverage and through all levels of hierarchy in the company is proposed.
    Research Interests:
    ABSTRACT In this study, we model bandwidth provider selection and task allocation problem as an expected cost minimization problem with stochastic constraints. Two important parameters of quality of service (QoS), namely delay and jitter... more
    ABSTRACT In this study, we model bandwidth provider selection and task allocation problem as an expected cost minimization problem with stochastic constraints. Two important parameters of quality of service (QoS), namely delay and jitter are considered as random variables to capture stochastic nature of telecom network environment. As solution methodology, stochastic model is converted into its deterministic equivalent and then a novel heuristic algorithm is proposed to solve resulting non-linear mixed integer programming model. We analyze how different prices, quality and task distribution affect the optimal behavior of the firm. Finally, performance of solution procedure is tested by several randomly generated scenarios and by a relaxation of this problem as tight lower bound.
    We define two types of tasks a firm performs using data networks. We show that the demands each type of task imposes on the network and a provider's ability to meet these demands can be quite different. We formulate the associated... more
    We define two types of tasks a firm performs using data networks. We show that the demands each type of task imposes on the network and a provider's ability to meet these demands can be quite different. We formulate the associated problem as a cost minimization problem subject to quality and capacity requirements and offer multiple solutions. We also discuss
    In this study, we investigate the general parameters to evaluate the performance of soccer players and develop a database for performance evaluation of soccer players and a relevant decision support system (DSS) to help people such as... more
    In this study, we investigate the general parameters to evaluate the performance of soccer players and develop a database for performance evaluation of soccer players and a relevant decision support system (DSS) to help people such as technical director. In the proposed DSS, the data is collected by Data Collectors by using a proposed database. It helps the technical director to realize the performances of soccer players quickly with real-time during games.
    Research Interests:

    And 10 more