Arama Sonuçları

Listeleniyor 1 - 3 / 3
  • Yayın
    An auxiliary tool for landscape evaluation: Ecological risk analysis based on analytic hierarchy process
    (Parlar Scientific Publications (P S P), 2017) Aksu, Gül Aslı; Musaoğlu, Nebiye; Uzun, Adnan
    Ecological Risk Analysis may be used as an auxiliary method in making landscape planning and management decisions. However, both choosing the subject criteria of the analysis, and assigning values to such criteria are all left to the discretion of the decision-maker. Ecological Risk Analysis is therefore ranked as a qualitative mode of assessment. What was intended herein was to rule the Ecological Risk Analysis, which may significantly contribute to the assessment of a landscape, out of being a qualitative mode, and to turn it into a semi quantitative means of assessment. In order to turn the Ecological Risk Analysis into a semi-quantitative mode of assessment, Analytic Hierarchy Process was resorted. Main criteria (vegetation, soil, water, and bioclimatic comfort) to determine the "Ecological Value", and the sub-criteria to set forth these criteria were decided upon. These criteria were then overlaid by means of matrices within the scope of the Analytical Hierarchy Method, weight ratios thereof were determined, and the consistency ratios thereof were calculated. Risk maps of the main criteria further superimposed according to the weight ratios, which had been calculated to be consistent, the Ecological Risk Map was thereby attained. Areas with high ecological risk value are located at the west and northeast part of the research area. Regions were discussed in the frame of landscape planning and sustainability depending on risk levels.
  • Yayın
    A multi-criteria evaluation of cybersecurity incident management frameworks: integrating AHP, CMMI and SWOT
    (Karyay Karadeniz Yayımcılık Ve Organizasyon Ticaret Limited Şirketi, 2026-01-15) Ağar, Hasan Çağlar; Çeliktaş, Barış
    With the growing complexity and frequency of cybersecurity incidents, the selection of an appropriate incident management framework has emerged as a strategic imperative and a nontrivial decision-making problem for organizations operating across diverse sectors. This study presents a multi-dimensional evaluation of four globally recognized frameworks and standards—ISO 27035, NIST 800-61, ITIL v4, and PCI DSS—to determine their effectiveness across 10 rigorously selected key performance parameters. The initial stage of the study involved the identification of 20 preliminary parameters through expert input and literature synthesis. These were then evaluated by 70 cybersecurity professionals using a hybrid decision-making model combining Likert scale scoring, standard deviation filtering, CV score, Z-score normalization and the Analytic Hierarchy Process (AHP) for pairwise comparisons. The top 10 key parameters were derived based on calculated priority weights. To assess each framework, we applied the Capability Maturity Model Integration (CMMI) and visualized results via radar charts and heatmaps, offering comparative insights into operational maturity. Additionally, SWOT analysis was conducted to examine strategic positioning and identify opportunities for improvement. The outcomes not only provide a practical benchmarking guide for practitioners but also introduce a replicable, evidence-based methodology for academic and industry adoption. This work offers a novel and structured lens to evaluate incident management maturity, addressing the pressing need for strategic alignment, automation integration, and adaptive resilience in cybersecurity operations.
  • Yayın
    From policy to practice: a sector-agnostic operational framework for post-quantum cryptography transition
    (Institute of Electrical and Electronics Engineers Inc., 2026-03-02) Birgin, Berat; Çeliktaş, Barış
    The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process. Although guidance documents published by the National Institute of Standards and Technology (NIST) and roadmaps proposed by the Post-Quantum Cryptography Coalition (PQCC) articulate strategic objectives, they largely remain procedural constructs lacking a concrete operational execution model. This paper presents an industry-neutral operational framework that translates policy-level post-quantum cryptography (PQC) guidance into deterministic, proof-producing process flows encompassing cryptographic asset discovery, classification, risk modeling, algorithm selection, deployment, monitoring, and governance enforcement. Central to the framework is a deterministic Quantum Risk Scoring (QRS) function, calibrated using the Analytical Hierarchy Process (AHP), which enables reproducible asset prioritization and policy-driven enforcement decisions. Framework executability is further strengthened through cryptography-aware continuous integration/continuous deployment (CI/CD) validation gates and downgrade protection mechanisms, ensuring the generation of verifiable and immutable audit artifacts. A scenario-based operational validation, implemented using open-source toolchains, demonstrates the framework’s operability, auditability, and governance alignment without relying on empirical cryptographic performance benchmarks, confirming that PQC transition can be operationalized as a verifiable lifecycle process bridging policy guidance with enforceable technical actions. Rather than introducing new cryptographic primitives, this work formalizes PQC transition as an operational systems-engineering problem centered on governance-enforced execution and lifecycle verifiability.