Yazar "Karayel, Tuğçe" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe AI Threats in Cyber Security: Empowering Employee Awareness and Training for Cyber Security Culture(IGI Global, 2025) Karayel, TuğçeWith the emergence of artificial intelligence, cyber threats have become increasingly complex. Traditional cyber security measures are insufficient to cope with new cyber threats. In order to defend against advanced threats, businesses are now obliged to adopt proactive defense strategies. One of the proactive defense strategies is the integration of Cyber Security Culture into security frameworks. The inclusion of artificial intelligence technologies in defense programs and the creation of a cyber security culture will provide strategic advantages to organizations. Although the creation of a strong security culture has been researched and discussed for a long time, many businesses still avoid this topic. A well-d eveloped cyber security culture will make it easier for organizations to take precautions against advanced cyber attacks. © 2025 Elsevier B.V., All rights reserved.Öğe BIBLIOMETRIC ANALYSIS OF PUBLICATIONS RELATED TO ARTIFICIAL INTELLIGENCE AND ITS COMPONENTS IN THE COVID-19 PERIOD(Dünya Kongre, 2022) Karayel, Tuğçe; Kurutkan, Mehmet NurullahPurpose: The main purpose of this study is to conduct a bibliometric analysis of publications in the field of Covid-19 and artificial intelligence. The performance of the field, its conceptual and social structure, the thematic development map and the identification of its main clusters serve this purpose. Method: In this article, R-based Bibliometrix, VOSviwer, SciMAT and Citespace software were used. Web of Science articles dec dec 2020-2021 have been downloaded as raw data from the Core collection with the search staretit. In total, 1367 articles were studied. Conceptual and social structure analyses were carried out from information structures with performance analyses. The process has been completed with the analysis of engine themes and main clusters. Finding: From the point of view of conceptual structure analyses, it was determined that the studies were analyzed under the headings classification, diagnosis and treatment. According to the results of the social structure, the USA, China, India, Italy and the UK are both the most broadcasting countries and the countries that are most open to dec-country cooperation. According to thematic diagram analysis, themes based on artificial intelligence tools and algorithms used in “Transfer- Learning and Support Vector Machines”, covid 19 disease diagnosis, social media, mental health and covid process have come to the fore. Result: The results of the bibliometric analysis provided information about the quality of published studies on COVID-19 and artificial intelligence, as well as research areas. In particular, artificial intelligence applications based on “Transfer- Learning” and “Support Vector Machines”, forecasting and social media data have the potential to become popular research topics.Öğe Managing Cyber Security Risks and Cyber Hygiene in Organizations: Improving Cyber Resilience(IGI Global, 2024) Karayel, Tuğçe; Akbıyık, AdemThe rate and volume of cyber attacks increases every year, causing additional costs to organizations. Especially in recent years, new generation cyber attacks against government organizations, private companies and service providers have become increasingly complex with the use of artificial intelligence tools. Since the new generation of cyber attacks are much more complex than the previous ones, corporate managers and employees lack expertise and awareness in taking countermeasures. Studies are needed to support organizations in order to increase cyber resilience in this area. This chapter focuses on cybersecurity risk management and individual cyber hygiene practices as a solution to cyber attacks. Well-developed cybersecurity risk management and strong cyber hygiene behaviors will make it easier for organizations to take measures against advanced cyber attacks. It will also increase the cyber resilience of organizations and provide a line of defense against potential threats. © 2025 Elsevier B.V., All rights reserved.












