6 research outputs found

    Macroeconomic determinants of currency substitution in Turkey

    No full text
    Taşseven, Özlem (Dogus Author) -- Conference full title: Global Business Research Symposium, May 27-29, 2015Currency substitution exists in a country when a more stable foreign currency exists along with a domestic currency. Currency substitution effect exists when foreign currency in persistently held by domestic residents for transaction, speculative or precautionary purposes. Holding different currencies facilitates and reduces the costs of transactions and represents possible additional returns given by the rate of appreciation of the currency. Vegh (1989) stresses the transaction motive for holding foreign currency. It is argued that people find it more convenient to use dollars in their transactions due to the change in the exchange rate. Ortiz (1983) and Ramirez–Rojaz (1985) mention the precautionary motive for holding a foreign currency. People hold dollar-denominated financial assets in order to hedge themselves from the depreciation of domestic currency, which can be seen as precautionary motive for holding foreign currency.Beykent Üniversitesi -- St. John's University -- Unıversity of Economics in Katowice -- Southern New Hampshire Universit

    Encrypting databases for confidentiality

    No full text
    Taşseven, Özlem (Dogus Author) -- American Society of Business and Behavioral Sciences, Program of the 19th Annual Conference, February 23-26, Las Vegas, NV, USA.The concept of enterprise information security is related to who is allowed to access information and what they can do (such as, read, write and execute privileges) with that information in various forms. Whatever the form the data is in, such as data in use, data in transit and data at rest, the restrictions on access should be considered before anything else. Confidentiality means keeping the right person in, and wrong person out. Unfortunately, there is no fool-proof mechanism to control against an unauthorized access when it comes to internal users with powerful privileges (such as, a system administrator or a database administrator (DBA)). Access to enterprise information must be planned and limited for a variety of users, whether external and internal, for a variety of reasons. Among these groups, internal users with powerful privileges are the most difficult to manage from an access point of view. Because of their jobs, these type of users will always have an easy access to any type of data in the system. Since there is no such thing as a foolproof access control for these type of users, in this paper we recommend the consideration of the data encryption as the second line of defense. Unfortunately, the encryption of a database as a whole creates additional performance issues. To avoid the performance related issues, the possibility of encrypting selected components of a database, such as rows, columns or even cells should be considered to protect the data from unauthorized accesses

    The determinants of merger and acquisitions in Turkey

    No full text
    Taşseven, Özlem (Dogus Author) -- Conference full title: Proceedings of Peer-Reviewed Symposium 2010, Annual Symposium fo the Financial Services Institute, September 9-11, 2010, St John's University, New York, USA.This is a comparative study of the 14 Istanbul Stock Exchange registered mergers and acquisitions (M&As) that took place between 2000 and 2007. In our analysis, we have compared 30 different financial ratios to identify the impact of the M&As before and after the acquisition. Employing the factor analysis methodology, we grouped those financial ratios into four distinct groups. These groups were identified as liquidity, profitability, operational and financial ratios. During the second phase of our analysis, by looking at those factors before and after an M&A transaction, we tried to identify whether there were any significant changes in the financial structures after an M&A. The Wilcoxon tests indicated that there were no significant changes in the financial structure before and after an M&A for the firms in hand. During the next phase of our analysis, we tried to identify the firms that are significantly different from the industry average. In other words, in which aspects the firms that were the subject of an M&A differed from the rest of the industry. We found out some 9 firms differed with respect to profitability, six firms differed with respect to liquidity, six firms differed with respect to financial, and 7 firms differed with respect to operational aspects

    Internal control over financial reporting and the cloud

    No full text
    Taşseven, Özlem (Dogus Author) -- Conference full title: FSI – Global Business Research Symposium – Cracow/Katowice, Poland – May 28-30, 2014.By 2020, 40 percent of digital information is expected to be created in the Cloud, delivered to the Cloud, or stored and manipulated in the Cloud1. It is clear that the Cloud is here to stay. As a large scale version of outsourcing Cloud Computing will create new challenges and complications for management and auditors. After the replacement of SAS 70 with SSAE 16, (similar to the ISAE 3402), most Cloud Service Providers will provide assurances to the Cloud Service Users within the framework of attestation standards instead of auditing standards. Outsourcing presents some challenges in itself and cloud computing further complicates those challenges. The new framework allows three different deployment models in the form of SOC1, SOC2 and SOC3. It is crucial that cloud service providers and cloud service users and their auditors should carefully consider alternative Service Organization Controls (SOC) deployment models. Unfortunately, many cloud providers are opting out for SOC 12 leaving little room for the development of SOC 2 reports. The right SOC deployment model for the Cloud is SOC 2 or SOC 3

    Clustering effect on competetive advantage in SMEs: Does it really give an advantage?

    No full text
    Taşseven, Özlem (Dogus Author) -- Confeence full title: Sixth International Conference on Business, Management and Economics 07-09 October 2010, Çeşme, İzmir, Turkey.According to Michael Porıer's Diamond Mode, a business cluster is defined as geographic concentratian of inter-connected companies and institutions working in a common industry. In addition. clusters encompass an array of collaborating and competing services and providers that create a specialized infrastructure. which supports the cluster's industry. The economic cluster model. represents a synergy, a dynamic relationship and a network between not only the companies that comprise a cluster but also the successful partnering of the stakeholders. Today in all over the World. successful clusters have established a greater competitive advantage and wealth creation for their regions when compared to companies not in a duster. Given this success more policy makers and regions are considering fostering cluster development as building blocks of regional economies. Research is planned and performed for understanding the clustering in SMEs Industrial Estate in Istanbul if it gives a competitive advantage to the Cluster members or not. lt is performed to determine and satisfy the lack of knowledge about the smail and medium enterprises' issues, technologic systems. production quality standards. capacity usage ratios, interactions with other firms, habits of following the technologic improvements and clustering effects on the members

    CFSs in turkish construction projects

    No full text
    Taşseven, Özlem (Dogus Author) -- Conference full title: Sixth International Conference on Business, Management and Economics, 07-09 October 2010, Çeşme, İzmir, TurkeyIn this study, we have investigated the Critical Success Factors (CFSs) of the Turkish construction sector. The Turkish construction sector is one of the fastest growing sectors of the Turkish economy and it deserves a special attention to understand what determines success in this area. CFSs are few key factors that ensure the success in an organization. To determine these factors we have inverviewed 102 executives in the Turkish construction sector. The results are anlayzed with the help of statistical tools, such as Chi_Square tests. The analysis of the data indicates that demographic variables associated with a project leader (such as age, and the years of education and the degree in engineering) are some of the important factors in this area
    corecore