default search action
IT Professional, Volume 15
Volume 15, Number 1, January - February 2013
- George Sherwood:
Lessons Learned from Hurricane Sandy: Maintaining Service during a Disaster. 4-7 - Char Sample, Kim Schaffer:
An Overview of Anomaly Detection. 8-11 - Nir Kshetri:
IT in the Chinese Healthcare Industry. 12-15 - Manuj Sabharwal, Abhishek Agrawal, Grace Metri:
Enabling Green IT through Energy-Aware Software. 19-27 - Nitin Singh Chauhan, Ashutosh Saxena:
A Green Software Development Life Cycle for Cloud Computing. 28-34 - Carol Pollard:
The US Government's Evolving Role in IT Energy Management. 36-43 - Wai-Ming To, Andy W. L. Chung, Linda S. L. Lai:
Creating Green Awareness Using IT: The Case of Hong Kong. 44-49 - Anand Kishore Raju, Sven Lindmark, Simon Delaere, Pieter Ballon:
A Holistic Impact-Assessment Framework for Green ICT. 50-56 - H. Gilbert Miller, Peter Mork:
From Data to Decisions: A Value Chain for Big Data. 57-59 - Linda Wilbanks:
Ethical Dilemmas in the Workplace. 60-61
Volume 15, Number 2, March - April 2013
- George F. Hurlburt, Jeffrey M. Voas:
Beyond the Cloud: Cyberphysical Systems. 2-4 - Julie M. Anderson:
Government Risk Management Lags behind Vendor Practices. 5-7 - David K. Larson, Keith W. Miller:
Medical Records and Software Trust. 8-11 - Irena Bojanova, Jia Zhang, Jeffrey M. Voas:
Cloud Computing. 12-14 - Laura Hosman, Bruce Baikie:
Solar-Powered Cloud Computing Datacenters. 15-21 - Joseph Idziorek, Mark Tannian, Douglas Jacobson:
The Insecurity of Cloud Utility Models. 22-27 - Pablo Graubner, Matthias Schmidt, Bernd Freisleben:
Energy-Efficient Virtual Machine Consolidation. 28-34 - Shinji Kikuchi, Yasuhide Matsumoto:
Using Model Checking to Evaluate Live Migrations. 36-41 - Harigopal K. B. Ponnapalli, Ashutosh Saxena:
A Digital Signature Architecture for Web Apps. 42-49 - Russell Thackston, David A. Umphress:
Micropreneurs: The Rise of the MicroISV. 50-56 - Phillip A. Laplante:
Courses for the Masses? 57-59 - Linda Wilbanks:
Changing Jobs. 60-61 - Tom Costello, Beverly Prohaska:
Why Is IT Still Broken? 64
Volume 15, Number 3, May - June 2013
- Phillip A. Laplante, Thomas C. Jepsen, Joseph Williams, Fulvio Corno:
Innovative and Disruptive Technologies [From the Editors]. 4-5 - Jeffery Payne:
Secure Mobile Application Development. 6-9 - Asmare Emerie Kassahun, Alemayehu Molla:
IT Reengineers Government Processes in Africa. 10-13 - Ed Coyne, Timothy R. Weil:
ABAC and RBAC: Scalable, Flexible, and Auditable Access Management. 14-16 - Marcelo Nogueira Cortimiglia, Alejandro Germán Frank, Liziane Seben:
Tablets: The Next Disruptive Computing Technology? 18-25 - George F. Hurlburt:
Complexity Theory: A New Paradigm for Software Integration. 26-31 - Jan Kallberg, Bhavani Thuraisingham:
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks. 32-35 - Craig Franke, Samuel Morin, Artem Chebotko, John Abraham, Pearl Brazier:
Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster. 36-43 - Udo Richard Averweg:
Information Systems: Practitioner-Based Inquiry Research. 44-47 - Wai-Ming To, Linda S. L. Lai, Andy W. L. Chung:
Cloud Computing in China: Barriers and Potential. 48-53 - Arto Ojala:
Software-as-a-Service Revenue Models. 54-59 - Linda Wilbanks:
Changing Jobs, Part II: The Transition. 60-61 - Tom Costello, Beverly Prohaska:
Innovation. 64
Volume 15, Number 4, July - August 2013
- J. Morris Chang:
New Trends in Cybersecurity. 2-3 - Richard P. Guidorizzi:
Security: Active Authentication. 4-7 - Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:
Keyboard-Behavior-Based Authentication. 8-11 - Ingo Deutschmann, Peder Nordstrom, Linus Nilsson:
Continuous Authentication Using Behavioral Biometrics. 12-15 - Jenifer Wheeler, Denise Varner, John Carrola, Christopher Dahlberg, Thomas Thornton, Corey Bohil, Kelly Terry:
Covert Cognitive Games and User Response Patterns. 16-19 - Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. 20-23 - J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Ahmed E. Kamal, Sun-Yuan Kung:
Capturing Cognitive Fingerprints from Keystroke Dynamics. 24-28 - Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam:
Decision Fusion for Multimodal Active Authentication. 29-33 - Jeffery Payne, Mark Fenner, Jonathan Kauffman:
System Event Monitoring for Active Authentication. 34-37 - Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry S. Davis:
Screen Fingerprints: A Novel Modality for Active Authentication. 38-42 - Kelce S. Wilson:
Conflicts Among the Pillars of Information Assurance. 44-49 - Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu:
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs. 50-56 - Keith W. Miller:
A Secret Sociotechnical System. 57-59 - Linda Wilbanks:
Changing Jobs, Part III: Starting a New Job. 60-61 - Tom Costello:
Random Thoughts for CIOs. 64
Volume 15, Number 5, September - October 2013
- Simon Liu:
Engineering the Success of Software Development. 4-5 - Phillip A. Laplante:
Who's Afraid of Big Data? 6-7 - San Murugesan:
Mobile Apps in Africa. 8-11 - Richard Kissel:
Avoiding Accidental Data Loss. 12-15 - Michael Seibold, Dean Jacobs, Alfons Kemper:
Operational Business Intelligence: Processing Mixed Workloads. 16-21 - Geetika T. Lakshmanan, Rania Khalaf:
Leveraging Process-Mining Techniques. 22-30 - Yuan-Fa Lee:
Personal Medical Monitoring System: Addressing Interoperability. 31-37 - Haluk Demirkan:
A Smart Healthcare Systems Framework. 38-45 - Liguo Yu:
The Market-Driven Software Ecosystem. 46-50 - George F. Hurlburt, Jeffrey M. Voas:
STEM's Grand Challenge: Reviving Applied Mathematics. 51-55 - Tom Costello, Mark A. Langley, Kirk Botula, Eileen Forrester, Martin Curley, Jim Kenneally, Martin Delaney, Stephen McLaughlin:
IT Frameworks. 64
Volume 15, Number 6, November - December 2013
- Shirish C. Srivastava, Sunil Mithas, Bimlendra Jha:
What Is Your Global Innovation Strategy? 2-6 - Phillip A. Laplante:
Career Advice. 7-9 - Keith W. Miller:
Technology, Unemployment, and Power. 10-11 - Stijn Viaene:
Data Scientists Aren't Domain Experts. 12-17 - Sunil Mithas, Maria R. Lee, Seth Earley, San Murugesan, G. Reza Djavanshir:
Leveraging Big Data and Business Analytics. 18-20 - Uma Srinivasan, Bavani Arunasalam:
Leveraging Big Data Analytics to Reduce Healthcare Costs. 21-28 - Alejandro Vera Baquero, Ricardo Colomo Palacios, Owen Molloy:
Business Process Analytics Using a Big Data Approach. 29-35 - Jimei Li, Yuzhou Hu, Meijie Du:
XBRL in the Chinese Financial Ecosystem. 36-42 - Rhoda C. Joseph, Norman A. Johnson:
Big Data and Transformational Government. 43-48 - Stacie Petter, Kerry Ward:
Countdown to Y2Gray. 49-55 - Maria R. Lee, Tsung Teng Chen:
Understanding Social Computing Research. 56-62 - Nir Kshetri:
Cloud Computing in Sub-Saharan Africa. 64-67 - Linda Wilbanks:
Office Etiquette During the Holidays. 68-69 - Tom Costello:
Vendor Management. 72
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.