default search action
IT Professional, Volume 11
Volume 11, Number 1, January-February 2009
- Thomas Jepsen:
IT Challenges for 2009: Fixing the IT Infrastructure. 4-5 - Brandi Ortega:
News Briefs. 6-9 - George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008. 14-19 - Wushow Chou:
Build a Smarter Government, Build a Smarter Federal IT Operation. 20-23 - Rick Kuhn, Hart Rossman, Simon Liu:
Introducing "Insecure IT". 24-26 - Melissa C. Zoepfl, Harold J. Korves:
Improving Identity Discovery through Fusion. 27-35 - Michael Chau, Jennifer Jie Xu, Jinwei Cao, Porsche Lam, Boby Shiu:
A Blog Mining Framework. 36-41 - Philip Lei Iat Seng, Angus K. Y. Wong:
The Multiple-Touch User Interface Revolution. 42-49 - C. Derrick Huang, Jahyun Goo:
Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements. 50-58 - Bill Karakostas:
Restructuring the IS Curriculum around the Theme of Service Orientation. 59-63 - Linda Wilbanks:
Pushing IT up a Notch: Embracing Technology for the Public and Corporate Good. 64
Volume 11, Number 2, March-April 2009
- George Kraft:
Healthcare IT Standardization: Will the New Stimulus Package Help? 4-5 - Brandi Ortega:
News Briefs. 6-9 - Geng Lin, David Fu, Jinzy Zhu, Glenn Dasmalchi:
Cloud Computing: IT as a Service. 10-13 - Jeffrey M. Voas, Jia Zhang:
Cloud Computing: New Wine or Just a New Bottle? 15-17 - Chuck Hutchinson, Jeff Ward, Karen Castilon:
Navigating the Next-Generation Application Architecture. 18-22 - Robert L. Grossman:
The Case for Cloud Computing. 23-27 - Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Jochen Stößer:
Business Models in the Service World. 28-33 - Dawn Owens, Alanah J. Davis, John D. Murphy, Deepak Khazanchi, Ilze Zigurs:
Real-World Opportunities for Virtual- World Project Management. 34-41 - Todd W. Kolb:
IT Is Here to Serve. 42-43 - Wushow Chou:
Communication Smart. 44-48 - Simon Liu, Rick Kuhn, Hart Rossman:
Surviving Insecure IT: Effective Patch Management. 49-51 - Keith W. Miller, Jeffrey M. Voas:
The Metaphysics of Software Trust. 52-55 - Wushow Chou:
Smart Staff Recruiting. 56-59 - Liang-Jie Zhang:
A Services University. 60-62 - Linda Wilbanks:
Summer Interns: Our Responsibility. 64-63
Volume 11, Number 3, May-June 2009
- Wes Chou:
Is IT for Geeks Only? 4-5 - Enrique Castro-Leon, Jackson He:
Virtual Service Grids: Integrating IT with Business Processes. 7-11 - Simon Liu:
Guest Editor's Introduction: Cybersecurity in a Falling Economy. 12-13 - Simon Liu, Bruce Cheng:
Cyberattacks: Why, What, Who, and How. 14-21 - Simon Liu, Jerry Ormaner:
From Ancient Fortress to Modern Cyberdefense. 22-29 - Peter Thermos:
Evaluating the Security of Enterprise VoIP Networks. 30-36 - Shari Lawrence Pfleeger:
Useful Cybersecurity Metrics. 38-45 - G. Reza Djavanshir, Reza Khorramshahgol, James Novitzki:
Critical Characteristics of Metasystems: Toward Defining Metasystems' Governance Mechanism. 46-49 - Gerard Coes, Karel Schotanus:
Certification: Who Dares? 50-52 - Robert Fabian:
Professional Essence. 54-56 - Simon Liu, Rick Kuhn, Hart Rossman:
Understanding Insecure IT: Practical Risk Assessment. 57-59 - H. Gilbert Miller, Richard H. Murphy:
Secure Cyberspace: Answering the Call for Intelligent Action. 60-63 - Wushow Chou:
People Smart. 64-70 - Tom Costello, Phillip A. Laplante:
Never Let a Serious Crisis Go to Waste. 72-71
Volume 11, Number 4, July-August 2009
- Phillip A. Laplante:
Paranoid? Who Says I'm Paranoid? 4-5 - Fedor Bakalov, Birgitta König-Ries, Andreas Nauerz, Martin Welsch:
Automating Mashups for Next-Generation Enterprise Portals. 6-9 - Wesley Chou, J. Morris Chang, Ken Christensen:
Guest Editors' Introduction: Data Center Design. 10-11 - Michael McShea:
Return on Infrastructure, the New ROI. 12-16 - Reuven R. Levary:
A Multiple-Criteria Approach to Ranking Computer Operating Systems. 17-23 - Wesley Chou:
Optimizing the WAN between Branch Offices and the Data Center. 24-27 - Bruce Nordman, Kenneth J. Christensen:
Greener PCs for the Enterprise. 28-37 - Ofer Arazy, Nanda Kumar, Bracha Shapira:
Improving Social Recommender Systems. 38-44 - Phillip A. Laplante, Norita B. Ahmad:
Pavlov's Bugs: Matching Repair Policies with Rewards. 45-51 - George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day:
Privacy and/or Security: Take Your Pick. 52-55 - David K. Larson, Keith W. Miller:
When Sensitive IT Information Crosses Borders. 56-59 - Wushow Chou:
Self-Smart, Part I: Work Smart. 60-62 - Karen Evans:
A Business Case for IT Investments. 64
Volume 11, Number 5, September-October 2009
- Henry E. Schaffer:
X as a Service, Cloud Computing, and the Need for Good Judgment. 4-5 - Thomas C. Jepsen:
Guest Editor's Introduction: Ontologies, OWL, and the Semantic Web. 6-7 - Valentina Janev, Sanja Vranes:
Semantic Web Technologies: Ready for Adoption? 8-16 - Dean Keith:
Equal Format Databases and Semantic-Relational Encoding. 17-21 - Thomas C. Jepsen:
Just What Is an Ontology, Anyway? 22-27 - Liang-Jie Zhang, Jia Zhang:
An Integrated Service Model Approach for Enabling SOA. 28-33 - John Harauz, Jeffrey M. Voas, George F. Hurlburt:
Trustworthiness in Software Environments. 35-40 - Karen Evans, Robert J. Carey:
Success in National Cyberdefense. 42-43 - Wushow Chou:
Self-Smart, Part II: Career Smart. 44-47 - Keith W. Miller:
Joining the Conversation about IT Ethics. 48-50 - Simon Liu:
Surviving Distributed Denial-of-Service Attacks. 51-53 - Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman:
IT Compliance: Aligning Legal and Product Requirements. 54-58 - Sorel Reisman:
Changing the Publishing Model. 60-62 - Tom Costello:
Certification: Does the Emperor Have Any Clothes? 64-63
Volume 11, Number 6, November-December 2009
- Arnold W. Bragg:
The Second Immutable Law of Security Administration. 4-5 - Frank E. Ferrante, G. Reza Djavanshir, Tom Costello:
Guest Editors' Introduction: Strategic Planning in Today's IT Environment. 6-7 - Edward K. Hong:
Information Technology Strategic Planning. 8-15 - Manas Sahoo:
IT Innovations: Evaluate, Strategize, and Invest. 16-22 - Ariadna Llorens-Garcia, Xavier Llinas-Audet, Ferran Sabate:
Professional and Interpersonal Skills for ICT Specialists. 23-30 - Elby M. Nash:
IT and Business Alignment: The Effect on Productivity and Profitability. 31-36 - Peter Kraynak:
Finding Your True IT Transformation. 37-41 - John Berti:
Copyright Infringement and Protection in the Internet Age. 42-45 - Georgina Harell, Tugrul U. Daim:
Virtual Teams and the Importance of Building Trust. 46-49 - William MacKinnon, Michael Wasserman:
Implementing Electronic Medical Record Systems. 50-53 - Rick Kuhn, Simon Liu, Hart Rossman:
Practical Interdomain Routing Security. 54-56 - H. Gilbert Miller, John Veiga:
Cloud Computing: Will Commodity Services Benefit Users Long Term? 57-59 - Wushow Chou:
Boss Smart. 60-62 - Linda Wilbanks:
IT Productivity = ?? 64-63
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.