Cem AksakalOnline Anonymity — A Double-Edged Sword?The act of engaging in online activities while keeping one’s true identity and personal details hidden is known as online anonymity. With…Nov 28, 2023Nov 28, 2023
Cem AksakalEthical Behavior on Social Media PlatformsIn social media, moral conduct is essential to a positive online community. These extensive guidelines cover a wide range of ethical…Nov 24, 2023Nov 24, 2023
Cem AksakalCase Overview: Colonial Pipeline Ransomware AttackContext: As one of the biggest pipeline operators in the US, Colonial Pipeline is in charge of moving almost half of the fuel used on the…Nov 3, 2023Nov 3, 2023
Cem AksakalNSA Case: Edward SnowdenThe 2013 case involving Edward Snowden, a former contractor for the National Security Agency (NSA) in the United States, is one noteworthy…Oct 30, 2023Oct 30, 2023
Cem AksakalIT Code of EthicsInformation Technology (IT) is becoming more and more essential to many facets of human existence and society in an era of rapid technical…Oct 19, 2023Oct 19, 2023
Cem AksakalReport on Ethical Compass in IT: A Personal PerspectiveEthics in the field of Information Technology (IT) is a critical aspect that shapes the way professionals engage with technology, data, and…Oct 13, 2023Oct 13, 2023
Cem AksakalSecurity Implications of Embedded and Specialized SystemsComputing systems that are embedded within bigger goods or systems are those that are optimized for certain tasks with constrained…Sep 4, 2023Sep 4, 2023