


default search action
IT Professional, Volume 15
Volume 15, Number 1, January - February 2013
- George Sherwood:

Lessons Learned from Hurricane Sandy: Maintaining Service during a Disaster. 4-7 - Char Sample, Kim Schaffer

:
An Overview of Anomaly Detection. 8-11 - Nir Kshetri:

IT in the Chinese Healthcare Industry. 12-15 - Manuj Sabharwal, Abhishek Agrawal, Grace Metri:

Enabling Green IT through Energy-Aware Software. 19-27 - Nitin Singh Chauhan, Ashutosh Saxena

:
A Green Software Development Life Cycle for Cloud Computing. 28-34 - Carol Pollard:

The US Government's Evolving Role in IT Energy Management. 36-43 - Wai-Ming To

, Andy W. L. Chung, Linda S. L. Lai:
Creating Green Awareness Using IT: The Case of Hong Kong. 44-49 - Anand Kishore Raju, Sven Lindmark

, Simon Delaere, Pieter Ballon:
A Holistic Impact-Assessment Framework for Green ICT. 50-56 - H. Gilbert Miller, Peter Mork:

From Data to Decisions: A Value Chain for Big Data. 57-59 - Linda Wilbanks:

Ethical Dilemmas in the Workplace. 60-61
Volume 15, Number 2, March - April 2013
- George F. Hurlburt

, Jeffrey M. Voas:
Beyond the Cloud: Cyberphysical Systems. 2-4 - Julie M. Anderson:

Government Risk Management Lags behind Vendor Practices. 5-7 - David K. Larson, Keith W. Miller

:
Medical Records and Software Trust. 8-11 - Irena Bojanova, Jia Zhang, Jeffrey M. Voas:

Cloud Computing. 12-14 - Laura Hosman

, Bruce Baikie:
Solar-Powered Cloud Computing Datacenters. 15-21 - Joseph Idziorek, Mark Tannian, Douglas Jacobson

:
The Insecurity of Cloud Utility Models. 22-27 - Pablo Graubner, Matthias Schmidt, Bernd Freisleben

:
Energy-Efficient Virtual Machine Consolidation. 28-34 - Shinji Kikuchi, Yasuhide Matsumoto:

Using Model Checking to Evaluate Live Migrations. 36-41 - Harigopal K. B. Ponnapalli, Ashutosh Saxena

:
A Digital Signature Architecture for Web Apps. 42-49 - Russell Thackston

, David A. Umphress:
Micropreneurs: The Rise of the MicroISV. 50-56 - Phillip A. Laplante:

Courses for the Masses? 57-59 - Linda Wilbanks:

Changing Jobs. 60-61 - Tom Costello, Beverly Prohaska:

Why Is IT Still Broken? 64
Volume 15, Number 3, May - June 2013
- Phillip A. Laplante, Thomas C. Jepsen, Joseph Williams, Fulvio Corno

:
Innovative and Disruptive Technologies [From the Editors]. 4-5 - Jeffery Payne:

Secure Mobile Application Development. 6-9 - Asmare Emerie Kassahun, Alemayehu Molla

:
IT Reengineers Government Processes in Africa. 10-13 - Ed Coyne, Timothy R. Weil:

ABAC and RBAC: Scalable, Flexible, and Auditable Access Management. 14-16 - Marcelo Nogueira Cortimiglia

, Alejandro Germán Frank
, Liziane Seben:
Tablets: The Next Disruptive Computing Technology? 18-25 - George F. Hurlburt

:
Complexity Theory: A New Paradigm for Software Integration. 26-31 - Jan Kallberg

, Bhavani Thuraisingham:
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks. 32-35 - Craig Franke, Samuel Morin, Artem Chebotko, John Abraham, Pearl Brazier:

Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster. 36-43 - Udo Richard Averweg:

Information Systems: Practitioner-Based Inquiry Research. 44-47 - Wai-Ming To

, Linda S. L. Lai, Andy W. L. Chung:
Cloud Computing in China: Barriers and Potential. 48-53 - Arto Ojala:

Software-as-a-Service Revenue Models. 54-59 - Linda Wilbanks:

Changing Jobs, Part II: The Transition. 60-61 - Tom Costello, Beverly Prohaska:

Innovation. 64
Volume 15, Number 4, July - August 2013
- J. Morris Chang:

New Trends in Cybersecurity. 2-3 - Richard P. Guidorizzi:

Security: Active Authentication. 4-7 - Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:

Keyboard-Behavior-Based Authentication. 8-11 - Ingo Deutschmann, Peder Nordstrom, Linus Nilsson:

Continuous Authentication Using Behavioral Biometrics. 12-15 - Jenifer Wheeler, Denise Varner, John Carrola, Christopher Dahlberg, Thomas Thornton, Corey Bohil

, Kelly Terry:
Covert Cognitive Games and User Response Patterns. 16-19 - Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan

, Andrew Rosenberg, Vir V. Phoha
, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. 20-23 - J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei Yuan Wu

, Yixiao Ding, Chris Chu, Stephen B. Gilbert
, Ahmed E. Kamal, Sun-Yuan Kung:
Capturing Cognitive Fingerprints from Keystroke Dynamics. 24-28 - Alex Fridman, Ariel Stolerman, Sayandeep Acharya

, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam:
Decision Fusion for Multimodal Active Authentication. 29-33 - Jeffery Payne, Mark Fenner, Jonathan Kauffman:

System Event Monitoring for Active Authentication. 34-37 - Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry S. Davis:

Screen Fingerprints: A Novel Modality for Active Authentication. 38-42 - Kelce S. Wilson:

Conflicts Among the Pillars of Information Assurance. 44-49 - Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:

Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. 50-56 - Keith W. Miller

:
A Secret Sociotechnical System. 57-59 - Linda Wilbanks:

Changing Jobs, Part III: Starting a New Job. 60-61 - Tom Costello:

Random Thoughts for CIOs. 64
Volume 15, Number 5, September - October 2013
- Simon Liu:

Engineering the Success of Software Development. 4-5 - Phillip A. Laplante:

Who's Afraid of Big Data? 6-7 - San Murugesan

:
Mobile Apps in Africa. 8-11 - Richard Kissel:

Avoiding Accidental Data Loss. 12-15 - Michael Seibold, Dean Jacobs, Alfons Kemper:

Operational Business Intelligence: Processing Mixed Workloads. 16-21 - Geetika T. Lakshmanan, Rania Khalaf:

Leveraging Process-Mining Techniques. 22-30 - Yuan-Fa Lee:

Personal Medical Monitoring System: Addressing Interoperability. 31-37 - Haluk Demirkan

:
A Smart Healthcare Systems Framework. 38-45 - Liguo Yu:

The Market-Driven Software Ecosystem. 46-50 - George F. Hurlburt

, Jeffrey M. Voas:
STEM's Grand Challenge: Reviving Applied Mathematics. 51-55 - Tom Costello, Mark A. Langley, Kirk Botula, Eileen Forrester, Martin Curley, Jim Kenneally, Martin Delaney, Stephen McLaughlin:

IT Frameworks. 64
Volume 15, Number 6, November - December 2013
- Shirish C. Srivastava, Sunil Mithas

, Bimlendra Jha:
What Is Your Global Innovation Strategy? 2-6 - Phillip A. Laplante:

Career Advice. 7-9 - Keith W. Miller

:
Technology, Unemployment, and Power. 10-11 - Stijn Viaene

:
Data Scientists Aren't Domain Experts. 12-17 - Sunil Mithas

, Maria R. Lee, Seth Earley, San Murugesan
, G. Reza Djavanshir:
Leveraging Big Data and Business Analytics. 18-20 - Uma Srinivasan, Bavani Arunasalam:

Leveraging Big Data Analytics to Reduce Healthcare Costs. 21-28 - Alejandro Vera Baquero

, Ricardo Colomo-Palacios
, Owen Molloy
:
Business Process Analytics Using a Big Data Approach. 29-35 - Jimei Li, Yuzhou Hu, Meijie Du:

XBRL in the Chinese Financial Ecosystem. 36-42 - Rhoda C. Joseph, Norman A. Johnson:

Big Data and Transformational Government. 43-48 - Stacie Petter

, Kerry Ward:
Countdown to Y2Gray. 49-55 - Maria R. Lee, Tsung Teng Chen:

Understanding Social Computing Research. 56-62 - Nir Kshetri:

Cloud Computing in Sub-Saharan Africa. 64-67 - Linda Wilbanks:

Office Etiquette During the Holidays. 68-69 - Tom Costello:

Vendor Management. 72

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














