BİLGİ SİSTEMLERİNDE OLUMSUZLUK SENARYOLARININ YILLARA GÖRE DEĞİŞİMİ : ÇAYKUR ÖRNEĞİ

İşletmeler gün geçtikçe bilgisayar ve bilgi sistemlerinden daha çok yararlanmaktadırlar. Bu durum işletmeleri bilgi sistemlerine bağımlı olma gibi bir riski de beraberinde getirmektedir. Bunun yanında bilgi sistemlerinde meydana gelebilecek bir olumsuzluk da işletmeyi büyük ölçüde etkileyebilecektir. Bu bakımdan işletmeler muhtemel olumsuzluklara karşı önlemlerini almak için olumsuz durumlara karşı planlar geliştirmelidir. Kurumların sektörel farklılıklarına göre karşılaşabilecekleri olumsuzluklar da farklılık gösterecektir. Bu nedenle olumsuzluk senaryoları da her sektör ve işletme için farklı olabilecektir. Ayrıca belirli bir sektördeki işletmenin olumsuzluk değerlendirmesinin yıllara göre değişmesi de olasıdır. Bu nedenle belirli dönemler ile olumsuzluk değerlendirmelerinin yapılması yerinde olacaktır. Bu bağlamda Türkiye Çay İşletmeleri Genel Müdürlüğüne bağlı yaş çay işleme fabrikalarında çalışan, yönetici ve bilgisayar kullanıcıları üzerinde 2006 ve 2015 yıllarında iki ayrı anket çalışması yapılmıştır. Anket ile katılımcılara eğitim durumları, bilgisayar kullanım düzeyleri, bilgi sistemlerinde yaşanmasını hiç istemedikleri olumsuzluklar ve bunların yaşanma sıklıkları gibi değişik ölçeklerde sorular yöneltilmiştir. Çalışma ile işletme yöneticilerinin ve bilgi sistemi kullanıcılarının bilgi sistemleri ile ilgili yaşamak istemedikleri olumsuzluklar ayrı ayrı araştırılmış ve sıralanmıştır. 2006 yılı ile 2015 yılındaki anket sonuçları ayrı ayrı değerlendirilmiş ve olumsuzluk algılarının nasıl değiştiği gözlemlenmiş ve karşılaştırmalar yapılmıştır

NEGATIVITY SCENARIOS CHANGES BY YEAR IN INFORMATION SYSTEMS : THE CAYKUR CASE

Businesses much more benefit from computer and information systems every day. This situation brings a risk to the company such like dependency on information systems. A negativity that may occur in information systems can greatly affect the business. Therefore, businesses should develop contingency plans against the negative potential negatives to take measures. According to the business sector differences this negative situations may vary. Hence, the negative scenarios will be different for each sector and company. Also according to the years the changes of the particular sector companies' negative assessment is possible. Therefore, making negative assessment would be appropriate with in certain periods. In this context, two separate surveys have been made on working managers and computer users in the tea processing factory depending on the General Directorate of Tea Enterprises in 2006 and 2015. It was asked various questions to the participants such as their computer usage, education levels, the negativity they do not want to happen ever in information systems and their frequency. Survey results for the 2006 and 2015 are separately evaluated and observed how change the negative perceptions

___

  • Adikesavan, T. A. (2014). Management Information Systems Best Practices andApplications in Business (2nd. Edition), Delhi: Phi Learning PrivateLimited.
  • AFAD. (2016). afad.gov.tr. https://www.afad.gov.tr/tr/IcerikListele.aspx?ID=25(Erişim Tarihi: 06-2-2016)
  • Allison, M., & Kaye, J. (2005). Strategic Planning for Nonprofit Organization:A Practical Guide and Workbook (2nd Edition), New Jersey: JohnWiley & Sons.
  • Aplak, H. S., Köse, E., & Burmaoğlu, S. (2010). Geleceğe Yönelik ProjelerinSenaryo Planlama Tekniği ile Analizi, Savunma Bilimleri Dergisi, 9(2), 41-65.
  • Barker, C. (2007, 11 27). The top 10 IT disasters of all time. ZDNet: http://www.zdnet.com/article/the-top-10-it-disasters-of-all-time- 5000177729/ (Erişim Tarihi: 05-01-2016)
  • Bell, W. (2009). Foundations of Futures Studies: History, Purposes, and Knowledge (5 b.). New Jersey: Transaction Publishers. https://books.google.com.tr/books?id=ILJ_pfMgLqsC (Erişim Tarihi: 05-03-2016)
  • Bilici, M. (1999). 2000 Yılı Sendromu. Kurgu Dergisi (16), 359-368.
  • Bilinski, A. (1987). Information Systems: Failure Analysis. (J. A. Wise, & A.Debons, Dü) Berlin: Springer-Verlag.
  • Bradfield, R., Wright, G., Burt, G., Cairns, G., & Heijden, K. V. (2005). The Origins and Evolution of Scenario Techniques in Long Range Business Planning. Futures(37), 795-812. doi:10.1016/j.futures.2005.01.003
  • Bradford, C. (2016, 11 18). When IT Disaster Strikes: The 10 Biggest IT Mishaps in History. StorageCraft Technology Corporation: http://www.storagecraft.com/blog/top-ten-it-disasters/ (Erişim Tarihi: 05-01-2016)
  • Buhalis, D. (1998). Strategic Use of Information Technologies in the TourismIndustry. Tourism Management, 19 (5), 409-421.
  • Chermack, T. J. (2011). Scenario Planning in Organization: How To Create,Use, And Assess Scenarios. San Francisco: Berrett-Koehler Publishers.
  • Chermack, T. J., Lynham, S. A., & Ruona, W. E. (2001). A Review of ScenarioPlanning Literature. Futures Research Quarterly, 17 (2), 7-31.
  • ÇAYKUR. (2015). İstatistik Bülteni. Çay İşletmeleri Genel Müdürlüğü: http://www.caykur.gov.tr/Pages/Yayinlar/IstatistikBulteni.aspx
  • Çeşmeci, N. (2012). Stratejik Planlamanın Dayanağı Olarak Stratejik ÖngörüGereksinimi ve Geliştirme Yöntemleri. Güvenlik Stratejileri (15), 139-162.
  • Devarajan, R. (2015). Management Mussings. Gurgaon: Partridge Publishing.https://books.google.com.tr/books?id=LXdJCgAAQBAJ
  • Douglas, J., Burgess, A. W., Burgess, A. G., & Ressler, R. K. (2011). Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crimes. San Francisco: John Wiley & Sons. https://books.google.com.tr/books?id=DIc9F5ZzO7YC
  • Duman, V. (2011). Fukuşima Nükleer Santral Kazası: Kaza Hikayesi, GelinenSon Durum Özeti ve Kazanın Etkileri. Ankara: TMMOB: Fizik Mühendisleri Odası.
  • Durance, P., & Godet, M. (2010). Scenario Building: Uses and Abuses. Technological Forecasting & Social Change, 77 (9), 1488-1492. doi:10.1016/j.techfore.2010.06.007
  • Elliott, D., Swartz, E., & Herbane, B. (2002). Business Continuity Management: A Crisis Management Approach. London: Routledge. https://books.google.com.tr/books?id=0xMuBkUIoisC
  • Erdoğan, B., Abbott, C., Aouad, G., & Kazi, A. S. (2009). Construction it in2030: A Scenario Planning Approach. Journal of Information Technology in Construction, 14, 539-555.
  • FORBES. (2016). forbes.com. The World's Most Valuable Brands: http://www.forbes.com/powerful-brands/list/#tab:rank (Erişim Tarihi: 11-06-2015)
  • Frenzel, C. W., & Frenzel, J. (2003). Management of Information Technology (4b.). Boston, USA: Cengage Learning.
  • Funabashi, Y., & Kitazawa, K. (2012). Fukushima in Review: A Complex Disaster, A Disastrous Response. Bulletin of the Atomic Scientists, 68 (2), 9-21. doi:10.1177/0096340212440359
  • Gilser, R. (2001). PC Hardware: a Beginner's Guide. New York: Osborne/McGraw-Hill.
  • Grünig, R., & Kühn, R. (2006). Process-based Strategic Planning (4 b.). (A.Clark, Çev.) Berlin: Springer.
  • Gupta, V., Gollakota, K., & Srinivasan, R. (2009). Business Policy and Strategic Management: Concepts and Application (2 b.). New Delhi: Phi Learning. (Erişim Tarihi: 27-04-2015) https://books.google.com.tr/books?id=4teCrYH6y_8C
  • Güreşcier, A. (2015). Türkiye’nin kritik gerçeği deprem, veri merkezleri içinkritik konuların başında geliyor. webrazzi.com: http://webrazzi.com/2015/08/11/turkiyenin-kritik-gercegi-depremveri-merkezleri-icin-kritik-konularin-basinda-geliyor/ (Erişim Tarihi:26-07-2015)
  • Hack, K. (2015). Emergency Planning for the Solo Entrepreneur: Back Up YourBusiness Before Disaster Strikes. Santa Barbara: Abc-Clio. https://books.google.com.tr/books?id=TRt5CgAAQBAJ
  • Hamidovic, H. (2014). Fire Protection of Computer Rooms-Legal Obligationsand Best Practices. ISACA Journal(4), 1-3.
  • Harbison, C. (2014, 12 26). 10 Largest Data Breaches Of 2014; The Sony HackIs Not One Of Them! idigitaltimes.com: http://www.idigitaltimes.com/10-largest-data-breaches-2014-sonyhack-not-one-them-403219(Erişim Tarihi: 06-04-2016)
  • Harjani, A. (2014, 11 23). Forget hacking drama, Sony stock to rise 40%: analyst. cnbc.com: http://www.cnbc.com/2014/12/23/ing-drama-sonystock-to-rise-40-analyst.html (Erişim Tarihi: 19-9-2015)
  • Harrison, V., & Pagliery, J. (2015, 04 14). Nearly 1 Million New Malware Threats Released Every Day. CNN Money: http://money.cnn.com/2015/04/14/technology/security/cyber-attackhacks-security/(Erişim Tarihi: 06-04-2015)
  • Heijden, K. v. (2005). Scenarios: The Art of Strategic Conversation (2 b.). WestSussex: John Wiley & Sons.
  • Hill, C. W., & McShane, S. L. (2008). Principles of Management. Boston: McGraw-Hill/Irwin.
  • Himma, K. E. (2007). Internet Security: Hacking, Counterhacking, and Society.Ontario, Canada: Jones & Bartlett Learning. https://books.google.com.tr/books?id=M5d-yuCME0AC
  • Ishikawa, A., & Tsujimoto, A. (2009). Risk and Crisis Management: 101 Cases(Revised Edition b.). Singapore: World Scientific Publishing. https://books.google.com.tr/books?id=VzaSTIiTksAC
  • James, K. L. (2013). Computer Hardware: Installation, Interfacing, Troubleshooting And Maintenance. Delhi: PHI Learning Pvt. Ltd. https://books.google.com.tr/books?id=szKRxt0ctS0C
  • Kim, M., & Jim, C. (2011). Japan quake tests supply chain from chips to ships. Reuters.com: http://www.reuters.com/article/us-japan-quakesupplychain-idUSTRE72D1FQ20110314 (Erişim Tarihi: 06-1-2016)
  • Korte, R. F., & Chermack, T. J. (2007). Changing Organizational Culture withScenario Planning. Futures (39), 645-656. doi:10.1016/j.futures.2006.11.001
  • Kurose, J. F., & Ross, K. W. (2013). Computer Networking: A Top-Down Approach (6 b.). New Jersey: Pearson Education, Inc.
  • Laudon, K. C., & Laudon, J. P. (2016). Management Information Systems: Managing the Digital Firm (14 b.). Harlow: Pearson Education Limited.
  • Lewis, G. (2006). Organizational Crisis Management: The Human Factor. Boca Raton: Auerbach Publications. https://books.google.com.tr/books?id=fkLMBQAAQBAJ
  • Lindgren, M., & Bandhold, H. (2003). Scenario Planning: The Link BetweenFuture and Strategy. New York: Palgrave Macmillan.
  • Manion, M., & Evan, W. M. (2000). The Y2K Problem And Professional Responsibility: A Retrospective Analysis. Technology in Society, 22(3), 361-387. doi:10.1016/S0160-791X(00)00015-4
  • Mearian, L. (2011). Memory chip prices surge in aftermath of Japan's quake.Computerworld.com: http://www.computerworld.com/article/2506919/computerhardware/memory-chip-prices-surge-in-aftermath-of-japan-squake.html (Erişim Tarihi: 24-10-2016)
  • Mercer, D. (1995). Scenarios Made Easy. Long Range Planning, 28(4), 81-86.doi:10.1016/0024-6301(95)00015-B
  • Meyer, T., & Reniers, G. (2016). Engineering Risk Management. Berlin: Walterde Gruyter GmbH. https://books.google.com.tr/books?id=7R5BDAAAQBAJ
  • Millett, S. M. (2003). The Future of Scenarios: Challenges and Opportunities.Strategy & Leadership, 31(2), 16-24.
  • Minasi, M., Gibson, D., Finn, A., Henry, W., & Hynes, B. (2010). Matering Windows Server 2008 R2. Indianapolis: John Wiley & Sons.
  • Minerd, J. (1999). Y2K Scenarios & Strategies. Futurist, 33(4), 34-37.
  • Morley, D. (2015). Understanding Computers in a Changing Society (6 b.).Stamford: Cengage Learning.
  • Naralan, A. (2007). Bilgi Sistemlerinde Olumsuz Senaryolar ve Çaykur Uygulaması. Ege Akademik Bakış, 7(2), 595-611.
  • Niccolai, J. (2011). How Japan's data centers survived the earthquake. Computerworld.com: http://www.computerworld.com/article/2509799/data-center/howjapan-s-data-centers-survived-the-earthquake.html (Erişim Tarihi: 21-12-2016)
  • O'Brien, F. A. (2004). Scenario Planning – Lessons for Practice from Teachingand Learning. European Journal of Operational Research, 709-722.doi:10.1016/S0377-2217(03)00068-7
  • Özdemir, S. (2010). SQL Server 2008 R2: Veri Sistemlerinin En Hızlı ve EnEtkili Yolu! (3 b.). İstanbul: KODLAB Yayın Dağıtım.
  • Ramirez, R., Selsky, J. W., & Heijden, K. v. (2008). Business Planning for Turbulent Times: New Methods for Applying Scenarios. London: Earthscan.
  • Ringland, G. (1998). Scenario Planning: Managing for the Future. Chichester:John Wiley & Sons.
  • Schoemaker, P. J. (1995). Scenario Planning: A Tool for Strategic Thinking.Sloan Management Review, 36(2), 25-40.
  • Schwartz, P. (1991). The Art of the Long View (1 b.). New York: Doubleday.
  • Sevaguru, N., & Safa, M. S. (2009). Scenario Planning Approach to StrategicManagement of Small Travel Business in Malaysia. International Journal of Business and Management Science, 2(1), 61-77.
  • Sevencan, M. (2009). Bir Stratejik Öngörü Metodu Olarak Senaryo Planlama.KÖK Araştırmaları Journal(2), 133-167.
  • Silberschatz, A., Korth, H. F., & Sudarshan, S. (2011). Database System Concepts (6 b.). New York: McGraw-Hill.
  • Stewart, J. M. (2014). Network Security, Firewalls and VPNs (2 b.). Burlington,USA: Jones & Bartlett Publishers. https://books.google.com.tr/books?id=qZgtAAAAQBAJ
  • Taufer, J. (2006). Emergency Power Supply Systems: Codes, Standards, andCompliance Issues. ewh.ieee.org: https://ewh.ieee.org/r3/atlanta/ias/IEEE_PPT_2006.pdf (Erişim Tarihi: 10-07-2015)
  • Tekerek, M. (2008). Bilgi Güvenliği Yönetimi. KSÜ Fen ve Mühendislik Dergisi, 11(1), 132-137.
  • Wack, P. (1985). Scenarios: Uncharted Waters Ahead. Harvard Business Review, 63(5), 73-89.
  • Wade, J. W. (2014, 02 20). ICEF Monitor. Beyond Forecasting: How to UseScenario Planning to Map the Future: http://monitor.icef.com/2014/02/beyond-forecasting-how-to-usescenario-planning-to-map-the-future/ (Erişim Tarihi: 21-04-2016)
  • Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (3 b.). Boston: Cengage Learning.
  • Wheelen, T. L., & Hunger, J. D. (2012). Strategic Management And BusinessPolicy: Toward Global Sustainability (13 b.). Upper Saddle River: Pearson Prentice Hall.
  • Wilkinson, A., & Kupers, R. (2013, 05). Living in the Futures. Harvard Business Review: https://hbr.org/2013/05/living-in-the-futures (Erişim Tarihi: 04-11-2015)
  • Wulf, T., Brands, C., & Meissner, P. (2010). A Scenario-based Approach toStrategic Planning: Tool Description – Scenario Matrix. HHL, Leipzig Graduate School of Management. Leipzig: Roland Berger Research Unit.
  • Yavan, Ö. (2012). Örgüt Stratejileri, Kriz Yönetimi ve Senaryolar. Kamu-İş, 12 (2), 101-135.
  • Zeytinoglu, I. U., & Cooke, G. B. (2009). On-the-Job Training in Canada: Associations with Information Technology, Innovation and Competition. Journal of Industrial Relations, 51 (1), 95-112. doi:10.1177/0022185608099667.