default search action
IT Professional, Volume 13
Volume 13, Number 1, January - February 2011
- Simon Liu:
IT Professional in 2011. 4-5 - San Murugesan:
The Rise of Emerging Markets: Opportunities and Challenges for IT. 6-8 - Shirley Radack, Rick Kuhn:
Managing Security: The Security Content Automation Protocol. 9-11 - Michael J. Assante, David H. Tobey:
Enhancing the Cybersecurity Workforce. 12-15 - San Murugesan, Phillip A. Laplante:
IT for a Greener Planet [Guest editors' introduction]. 16-18 - Robert R. Harmon, Haluk Demirkan:
The Next Wave of Sustainable IT. 19-25 - Radhika Jain, Raquel Benbunan-Fich, Kannan Mohan:
Assessing Green IT Initiatives Using the Balanced Scorecard. 26-32 - Brian Donnellan, Charles Sheridan, Edward Curry:
A Capability Maturity Framework for Sustainable Information and Communication Technology. 33-40 - Indranil Bose, Shipeng Yan:
The Green Potential of RFID Projects: A Case-Based Analysis. 41-47 - Aruna Prem Bianzino, Anand Kishore Raju, Dario Rossi:
Greening the Internet: Measuring Web Power Consumption. 48-53 - Jonas Hedman, Stefan Henningsson:
Three Strategies for Green IT. 54-57 - Linda Wilbanks:
Performance Reviews. 58-60 - Tom Costello:
2011 IT Tech and Strategy Trends. 61-65
Volume 13, Number 2, March - April 2011
- Phillip A. Laplante:
Exciting Real-Time Location Applications. 4-5 - Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. 6-9 - Linda Wilbanks:
Other Duties as Assigned? 10-11 - J. Morris Chang, Yo-Ping Huang, Simon Liu:
Real-Time Location Systems and RFID. 12-13 - Shu-Hui Yang, Pao-Ann Hsiung:
Real-Time Services for Special Education. 14-19 - Chia-Hui Wei, Min-Shiang Hwang, A. Y. Chin:
A Mutual Authentication Protocol for RFID. 20-24 - Yo-Ping Huang, Shan-Shan Wang, Frode Eika Sandnes:
RFID-Based Guide Gives Museum Visitors More Freedom. 25-29 - Yue-Shan Chang, Chih-Tien Fan, Yu-Sheng Wu:
Agent-Based Intelligent Software Exploits Near-Field Communication. 30-36 - Ivor D'Souza, Wei Ma, Cindy Notobartolo:
Real-Time Location Systems for Hospital Emergency Response. 37-43 - Jay Liebowitz:
Interruption Management: A Review and Implications for IT Professionals. 44-48 - J. Y. Xu:
Web-Based Billing System Exploits Mature and Emerging Technology. 49-55 - Bhuvan Unhelkar:
Green IT: The Next Five Years. 56-59 - Max Froumentin, Stéphane Boyera:
Mobile Entrepreneurship in Africa. 60-62 - Thomas Costello:
IT without Hardware. 63-64
Volume 13, Number 3, May - June 2011
- George F. Hurlburt, Jeffrey M. Voas:
Timing Matters: Tackling Intractable Problems. 4-6 - A. Sharma:
IT in Governance in the 21st Century. 7-9 - J. Hogan:
The Leadership Lever. 10-13 - Bruce Potter:
Coming to Grips with Security. 14-17 - John Quan, Kara L. Nance, Brian Hay:
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments. 18-23 - Stefan Fenz, Simon Edward Parkin, Aad P. A. van Moorsel:
A Community Knowledge Base for IT Security. 24-30 - Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services Framework. 31-37 - P. Brown, J. Kelly, D. Querusio:
Toward a Healthcare Business-Process Reference Model. 38-47 - J. J. Teeter:
Flexible Medical-Grade Networks. 48-51 - Adam Marks, Yacine Rezgui:
IT Leadership in Higher Education: The CIO Candidate. 52-56 - Keith W. Miller:
Moral Responsibility for Computing Artifacts: "The Rules". 57-59 - Linda Wilbanks:
You Need a Vacation. 60-61 - Tom Costello:
Lean: More than a Shop-Floor Fad. 64-63
Volume 13, Number 4, July - August 2011
- Irena Bojanova:
Physical Presence through Virtual Worlds. 4-5 - Phillip A. Laplante:
Ender Wiggin Played Mafia Wars Too. 6-8 - Steve Quirolgico, Jeffrey M. Voas, Rick Kuhn:
Vetting Mobile Apps. 9-11 - Mile Corrigan, H. Gilbert Miller:
Toward a User-Centric Digital Ecosystem. 12-15 - Sunil Mithas, Thomas Costello, Ali Tafti:
Social Networking in the Enterprise. 16-17 - Vishal Sachdev:
Motivations for Social Computing. 18-23 - Stephen Anderson, Kannan Mohan:
Social Networking in Knowledge Management. 24-28 - Konstantinos Christidis, Gregoris Mentzas, Dimitris Apostolou:
Supercharging Enterprise 2.0. 29-35 - Henry C. Lucas Jr., Sunil Mithas:
Foreign-Born IT Workers in the US: Complements, not Substitutes. 36-40 - Chris Asakiewicz:
Business Investments in IT: Managing Integration Risks. 41-45 - Rita Noumeir:
Sharing Medical Records: The XDS Architecture and Communication Infrastructure. 46-52 - Ashok Jhunjhunwala, Janani Rangarajan:
Connecting the Next Billion: Empowering Rural India. 53-55 - George F. Hurlburt, Jeffrey M. Voas:
The Evolution of Ubiquitously Intelligent Computing. 56-60 - Beverly Prohaska:
Social Media for the Collaborative Enterprise. 64-63
Volume 13, Number 5, September - October 2011
- George F. Hurlburt, Jeffrey M. Voas:
Storytelling: From Cave Art to Digital Media. 4-7 - Ramesh C. Jain, David Sonnen:
Social Life Networks. 8-11 - San Murugesan, Gustavo Rossi, Linda Wilbanks, G. Reza Djavanshir:
The Future of Web Apps. 12-14 - Haluk Demirkan, Robert R. Harmon, Michael Goul:
A Service-Oriented Web Application Framework. 15-21 - Florian Daniel, Maristella Matera, Michael Weiss:
Next in Mashup Development: User-Created Apps on the Web. 22-29 - Markku Laine, Denis Shestakov, Evgenia Litvinova, Petri Vuorimaa:
Toward Unified Web Application Development. 30-36 - Laura Ferrari, Marco Mamei, Franco Zambonelli:
All-About Digital Diaries: Opportunities and Challenges. 37-43 - Stéphane Gagnon, Véronique Nabelsi, Katia Passerini, Kemal Cakici:
The Next Web Apps Architecture: Challenges for SaaS Vendors. 44-50 - Marcelo Nogueira Cortimiglia, Antonio Ghezzi, Filippo Renga:
Mobile Applications and Their Delivery Platforms. 51-56 - Chad Fulgham, Jeffrey Johnson, Mark Crandall, Leo Jackson, Nathan Burrows:
The FBI Gets Agile. 57-59 - Linda Wilbanks:
Conference Attendance. 60-61 - Tom Costello:
Better Budget Planning. 64-63
Volume 13, Number 6, November - December 2011
- Thomas Jepsen:
The Next Big Thing. 4-5 - San Murugesan:
What We Can Learn from Steve Jobs. 6-8 - George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile-App Addiction: Threat to Security? 9-11 - Keith W. Miller:
Courageous Computing. 12-13 - Jay Liebowitz, William W. Agresti:
IT Education for Practitioners. 14-15 - Alan D. Carswell, Irena Bojanova:
E-Learning for IT Professionals: The UMUC Experience. 16-21 - John Baker:
Challenging the Traditional Graduate Information Systems Program. 22-27 - Susan Camarena:
The Promise of IT: Educating the Federal Government. 28-33 - Michael Koval:
The Technologist's Tool Set: A CIO's Perspective. 34-39 - Lars Mathiassen, Tuure Tuunanen:
Managing Requirements Risks in IT Projects. 40-47 - Ciro D'Urso:
Information Integration for Facility Management. 48-53 - Edward J. Coyne, Timothy R. Weil, Rick Kuhn:
Role Engineering: Methods and Standards. 54-57 - Nuno Pereira, David Vera, H. Gilbert Miller:
Business Process Management and the Social Web. 58-59 - San Murugesan:
Cloud Computing Gives Emerging Markets a Lift. 60-62 - Tom Costello:
Specialists or Generalists? 64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.