


default search action
IT Professional, Volume 17
Volume 17, Number 1, January - February 2015
- San Murugesan

:
IT Pro 2015: A Look Ahead. 2-4 - César A. Collazos

, Luis Merchán
:
Human-Computer Interaction in Colombia: Bridging the Gap between Education and Industry. 5-9 - Seth Earley:

Analytics, Machine Learning, and the Internet of Things. 10-13 - J. Morris Chang, Rick Kuhn, Timothy R. Weil:

IT Security [Guest editors' introduction]. 14-15 - Wojciech Mazurczyk

, Elzbieta Rzeszutko:
Security-A Perpetual War: Lessons from Nature. 16-22 - A. J. Burns

, M. Eric Johnson
:
Securing Health Information. 23-29 - Jan Kallberg

:
A Right to Cybercounter Strikes: The Risks of Legalizing Hack Backs. 30-35 - Philippe De Ryck, Nick Nikiforakis, Lieven Desmet

, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. 36-43 - Luca Ardito

, Giuseppe Procaccianti
, Marco Torchiano
, Antonio Vetrò
:
Understanding Green Software Development: A Conceptual Framework. 44-50 - Yuan-Fa Lee:

An Interoperability Solution for Legacy Healthcare Devices. 51-57 - George F. Hurlburt

:
High Tech, High Sec.: Security Concerns in Graph Databases. 58-61 - George O. Strawn, Candace Strawn:

Grace Hopper: Compilers and Cobol. 62-64
Volume 17, Number 2, March - April 2015
- Sunil Mithas

, Ravi Arora:
Lessons from Tata's Corporate Innovation Strategy. 2-6 - Seth Earley:

The Promise of Healthcare Analytics. 7-9 - Lucio Dinoto:

The LATAM Financial Software Market. 10-13 - Robert R. Harmon, Haluk Demirkan

:
IT-Enabled Business Innovation. 14-18 - Bongsug (Kevin) Chae:

Big Data and IT-Enabled Services: Ecosystem and Coevolution. 20-25 - Chie-Hyeon Lim, Kwang-Jae Kim:

IT-Enabled Information-Intensive Services. 26-32 - Oscar Rodriguez Rocha

, Iacopo Vagliano
, Cristhian Figueroa
, Federico Cairo, Giuseppe Futia, Carlo Alberto Licciardi, Marco Marengo, Federico Morando:
Semantic Annotation and Classification in Practice. 33-39 - Shitalkumar Halale, G. R. Gangadharan

, Lorna Uden:
Enhancing Cocreation Using Social Media. 40-45 - Marian Carcary

, Eileen Doherty
, Clare Thornley
:
Business Innovation and Differentiation: Maturing the IT Capability. 46-53 - Walter Houser:

Could What Happened to Sony Happen to Us? 54-57 - George O. Strawn, Candace Strawn:

The Father of Supercomputing: Seymour Cray. 58-60 - Joseph Williams:

NiSoft CEO Doug Deardorf. 64
Volume 17, Number 3, May - June 2015
- Arpan Pal

:
Internet of Things: Making the Hype a Reality. 2-4 - Saeid Abolfazli, Zohreh Sanaei, Irena Bojanova:

Internet of Cores. 5-9 - Onur Demirörs

, Ahmet Coskunçay
:
Software Development in Turkey. 10-13 - Irena Bojanova, Jeffrey M. Voas, George F. Hurlburt

:
The Internet of Anything and Sustainability. 14-16 - Patricia Robison, Manjusri Sengupta, David Rauch:

Intelligent Energy Industrial Systems 4.0. 17-24 - Hugh Boyes

:
Security, Privacy, and the Built Environment. 25-31 - Charith Perera, Rajiv Ranjan

, Lizhe Wang, Samee Ullah Khan
, Albert Y. Zomaya
:
Big Data Privacy in the Internet of Things Era. 32-39 - Eric Simmon, Sulayman K. Sowe, Koji Zettsu:

Designing a Cyber-Physical Cloud Computing Architecture. 40-45 - Bin Guo

, Chao Chen, Zhiwen Yu
, Daqing Zhang, Xingshe Zhou:
Building Human-Machine Intelligence in Mobile Crowd Sensing. 46-52 - Wai-Ming To

, Linda S. L. Lai:
Crowdsourcing in China: Opportunities and Concerns. 53-59 - Ram D. Sriram, Amit P. Sheth:

Internet of Things Perspectives. 60-63 - Mohammad Soleimani, Timothy R. Weil, Ed Coyne:

Behind Closed Doors: Let's PLAI. 64-67 - Jay Liebowitz:

Steve Jobs: IT Creative Genius. 68-69 - Joseph Williams:

Paula Rice: The C-Suite via the Rabbit Hole. 70-72
Volume 17, Number 4, July - August 2015
- Gaston Mousques, Eduardo Mangarelli:

Uruguay's IT Industry: Fundamentals and Growth Opportunities. 8-11 - Seth Earley:

Cognitive Computing, Analytics, and Personalization. 12-18 - Rajni Jindal

, Dutta Borah Malaya:
Predictive Analytics in a Higher Education Context. 24-33 - Simon Fong, Suzy Zhou, Luiz Abel Moutinho:

Text Analytics for Predicting Question Acceptance Rates. 34-41 - Phillip Kemelor:

Digital Data Grows into Big Data. 42-48 - Wai-Ming To

, Linda S. L. Lai:
Data Analytics in China: Trends, Issues, and Challenges. 49-55 - Seth Earley:

Executive Roundtable Series: Machine Learning and Cognitive Computing. 56-60 - Douglas Maughan, David M. Balenson

, Ulf Lindqvist
, Zachary Tudor
:
Government-Funded R&D to Drive Cybersecurity Technologies. 62-65 - Daniel M. Best, B. Ann Cox:

Clique: Situational Awareness through Behavior. 66-68
Volume 17, Number 5, September - October 2015
- Maria R. Lee, San Murugesan

:
The IT in Practice Symposium. 4-7 - Ivan Jelínek:

Digital Education Strategy for the Czech Republic. 8-11 - Chris Oehmen

, Elena S. Peterson, B. Ann Cox:
Behavior Models to Express and Share Threat Information. 12-14 - Maria R. Lee, Irena Bojanova, Tom Suder:

The New Wearable Computing Frontier. 16-19 - Despina T. Meridou, Maria-Eleftheria Ch. Papadopoulou, Panagiotis Kasnesis

, Charalampos Z. Patrikakis
, Georgios Lamprinakos, Andreas P. Kapsalis, Iakovos S. Venieris, Dimitra-Theodora I. Kaklamani:
The Health Avatar: Privacy-Aware Monitoring and Management. 20-27 - Timothy M. Simon, Bruce H. Thomas

, Ross T. Smith
:
Low-Profile Jamming Technology for Medical Rehabilitation. 28-34 - Simone Cirani, Marco Picone

:
Wearable Computing for the Internet of Things. 35-41 - Sanjib Kumar Saha, Abhijit Kumar Nag, Dipankar Dasgupta:

Human-Cognition-Based CAPTCHAs. 42-48 - Paolo Montuschi, Fabrizio Lamberti

, Valentina Gatteschi
, Claudio Giovanni Demartini:
A Semantic Recommender System for Adaptive Learning. 50-58 - Matthew Lee, Maria R. Lee:

Beyond the Wearable Hype. 59-61 - Seth Earley:

Executive Roundtable Series. 62-69 - Jay Liebowitz, Robert Schaller:

Biological Warfare: Tampering with Implantable Medical Devices. 70-72
Volume 17, Number 6, November - December 2015
- Bin Guo

, Zhiwen Yu
, Xingshe Zhou:
A Data-Centric Framework for Cyber-Physical-Social Systems. 4-7 - Jay Liebowitz:

IT Project Failures: What Management Can Learn. 8-9 - Philip Lew:

China's IT Challenges and Opportunities: A Personal View. 10-12 - Robert R. Harmon, Fulvio Corno

, Enrique Castro-Leon:
Smart Systems. 14-17 - Fanjuan Shi, Chirine Ghedira

, Jean-Luc Marini:
Context Adaptation for Smart Recommender Systems. 18-26 - Edoardo Patti, Amos Ronzino, Anna Osello, Vittorio Verda, Andrea Acquaviva, Enrico Macii:

District Information Modeling and Energy Management. 28-34 - Despina T. Meridou, Andreas P. Kapsalis, Maria-Eleftheria Ch. Papadopoulou, Emmanouil G. Karamanis, Charalampos Z. Patrikakis

, Iakovos S. Venieris, Dimitra-Theodora I. Kaklamani:
An Ontology-Based Smart Production Management System. 36-46 - Karamjit Kaur

, Rinkle Rani:
A Smart Polyglot Solution for Big Data in Healthcare. 48-55 - Joseph Webster, Max Romanik, Christopher Webster:

Protecting Digital Assets: Legal Protections Do "Not Equal Practical Security. 56-59 - Seth Earley:

Executive Roundtable Series: Driving Higher ROI and Organizational Change. 60-64 - Kristopher Carver, Vincent Sritapan, Cherita Corbett:

Establishing and Maintaining Trust in a Mobile Device. 66-68 - George O. Strawn, Candace Strawn:

Moore's Law at Fifty. 69-72

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














