


default search action
IT Professional, Volume 11
Volume 11, Number 1, January-February 2009
- Thomas Jepsen:

IT Challenges for 2009: Fixing the IT Infrastructure. 4-5 - Brandi Ortega:

News Briefs. 6-9 - George F. Hurlburt, Keith W. Miller

, Jeffrey M. Voas:
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008. 14-19 - Wushow Chou:

Build a Smarter Government, Build a Smarter Federal IT Operation. 20-23 - Rick Kuhn, Hart Rossman, Simon Liu:

Introducing "Insecure IT". 24-26 - Melissa C. Zoepfl, Harold J. Korves:

Improving Identity Discovery through Fusion. 27-35 - Michael Chau

, Jennifer Jie Xu, Jinwei Cao, Porsche Lam, Boby Shiu:
A Blog Mining Framework. 36-41 - Philip Lei

, Angus K. Y. Wong:
The Multiple-Touch User Interface Revolution. 42-49 - C. Derrick Huang, Jahyun Goo:

Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements. 50-58 - Bill Karakostas:

Restructuring the IS Curriculum around the Theme of Service Orientation. 59-63 - Linda Wilbanks:

Pushing IT up a Notch: Embracing Technology for the Public and Corporate Good. 64
Volume 11, Number 2, March-April 2009
- George Kraft:

Healthcare IT Standardization: Will the New Stimulus Package Help? 4-5 - Brandi Ortega:

News Briefs. 6-9 - Geng Lin, David Fu, Jinzy Zhu, Glenn Dasmalchi:

Cloud Computing: IT as a Service. 10-13 - Jeffrey M. Voas, Jia Zhang:

Cloud Computing: New Wine or Just a New Bottle? 15-17 - Chuck Hutchinson, Jeff Ward, Karen Castilon:

Navigating the Next-Generation Application Architecture. 18-22 - Robert L. Grossman:

The Case for Cloud Computing. 23-27 - Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Jochen Stößer:

Business Models in the Service World. 28-33 - Dawn Owens, Alanah J. Davis

, John D. Murphy, Deepak Khazanchi
, Ilze Zigurs:
Real-World Opportunities for Virtual- World Project Management. 34-41 - Todd W. Kolb:

IT Is Here to Serve. 42-43 - Wushow Chou:

Communication Smart. 44-48 - Simon Liu, Rick Kuhn, Hart Rossman:

Surviving Insecure IT: Effective Patch Management. 49-51 - Keith W. Miller

, Jeffrey M. Voas:
The Metaphysics of Software Trust. 52-55 - Wushow Chou:

Smart Staff Recruiting. 56-59 - Liang-Jie Zhang

:
A Services University. 60-62 - Linda Wilbanks:

Summer Interns: Our Responsibility. 64-63
Volume 11, Number 3, May-June 2009
- Wes Chou:

Is IT for Geeks Only? 4-5 - Enrique Castro-Leon, Jackson He:

Virtual Service Grids: Integrating IT with Business Processes. 7-11 - Simon Liu:

Guest Editor's Introduction: Cybersecurity in a Falling Economy. 12-13 - Simon Liu, Bruce Cheng:

Cyberattacks: Why, What, Who, and How. 14-21 - Simon Liu, Jerry Ormaner:

From Ancient Fortress to Modern Cyberdefense. 22-29 - Peter Thermos:

Evaluating the Security of Enterprise VoIP Networks. 30-36 - Shari Lawrence Pfleeger:

Useful Cybersecurity Metrics. 38-45 - G. Reza Djavanshir, Reza Khorramshahgol, James Novitzki:

Critical Characteristics of Metasystems: Toward Defining Metasystems' Governance Mechanism. 46-49 - Gerard Coes, Karel Schotanus:

Certification: Who Dares? 50-52 - Robert Fabian:

Professional Essence. 54-56 - Simon Liu, Rick Kuhn, Hart Rossman:

Understanding Insecure IT: Practical Risk Assessment. 57-59 - H. Gilbert Miller, Richard H. Murphy:

Secure Cyberspace: Answering the Call for Intelligent Action. 60-63 - Wushow Chou:

People Smart. 64-70 - Tom Costello, Phillip A. Laplante:

Never Let a Serious Crisis Go to Waste. 72-71
Volume 11, Number 4, July-August 2009
- Phillip A. Laplante:

Paranoid? Who Says I'm Paranoid? 4-5 - Fedor Bakalov, Birgitta König-Ries

, Andreas Nauerz, Martin Welsch:
Automating Mashups for Next-Generation Enterprise Portals. 6-9 - Wesley Chou, J. Morris Chang, Ken Christensen:

Guest Editors' Introduction: Data Center Design. 10-11 - Michael McShea:

Return on Infrastructure, the New ROI. 12-16 - Reuven R. Levary:

A Multiple-Criteria Approach to Ranking Computer Operating Systems. 17-23 - Wesley Chou:

Optimizing the WAN between Branch Offices and the Data Center. 24-27 - Bruce Nordman, Kenneth J. Christensen:

Greener PCs for the Enterprise. 28-37 - Ofer Arazy, Nanda Kumar, Bracha Shapira

:
Improving Social Recommender Systems. 38-44 - Phillip A. Laplante, Norita B. Ahmad

:
Pavlov's Bugs: Matching Repair Policies with Rewards. 45-51 - George F. Hurlburt, Keith W. Miller

, Jeffrey M. Voas, Jamison M. Day:
Privacy and/or Security: Take Your Pick. 52-55 - David K. Larson, Keith W. Miller

:
When Sensitive IT Information Crosses Borders. 56-59 - Wushow Chou:

Self-Smart, Part I: Work Smart. 60-62 - Karen Evans:

A Business Case for IT Investments. 64
Volume 11, Number 5, September-October 2009
- Henry E. Schaffer:

X as a Service, Cloud Computing, and the Need for Good Judgment. 4-5 - Thomas C. Jepsen:

Guest Editor's Introduction: Ontologies, OWL, and the Semantic Web. 6-7 - Valentina Janev

, Sanja Vranes
:
Semantic Web Technologies: Ready for Adoption? 8-16 - Dean Keith:

Equal Format Databases and Semantic-Relational Encoding. 17-21 - Thomas C. Jepsen:

Just What Is an Ontology, Anyway? 22-27 - Liang-Jie Zhang

, Jia Zhang:
An Integrated Service Model Approach for Enabling SOA. 28-33 - John Harauz, Jeffrey M. Voas, George F. Hurlburt:

Trustworthiness in Software Environments. 35-40 - Karen Evans, Robert J. Carey:

Success in National Cyberdefense. 42-43 - Wushow Chou:

Self-Smart, Part II: Career Smart. 44-47 - Keith W. Miller

:
Joining the Conversation about IT Ethics. 48-50 - Simon Liu:

Surviving Distributed Denial-of-Service Attacks. 51-53 - Travis D. Breaux

, Annie I. Antón, Kent Boucher, Merlin Dorfman:
IT Compliance: Aligning Legal and Product Requirements. 54-58 - Sorel Reisman

:
Changing the Publishing Model. 60-62 - Tom Costello:

Certification: Does the Emperor Have Any Clothes? 64-63
Volume 11, Number 6, November-December 2009
- Arnold W. Bragg:

The Second Immutable Law of Security Administration. 4-5 - Frank E. Ferrante, G. Reza Djavanshir, Tom Costello:

Guest Editors' Introduction: Strategic Planning in Today's IT Environment. 6-7 - Edward K. Hong:

Information Technology Strategic Planning. 8-15 - Manas Sahoo:

IT Innovations: Evaluate, Strategize, and Invest. 16-22 - Ariadna Llorens-Garcia

, Xavier Llinas-Audet, Ferran Sabate
:
Professional and Interpersonal Skills for ICT Specialists. 23-30 - Elby M. Nash:

IT and Business Alignment: The Effect on Productivity and Profitability. 31-36 - Peter Kraynak:

Finding Your True IT Transformation. 37-41 - John Berti:

Copyright Infringement and Protection in the Internet Age. 42-45 - Georgina Harell, Tugrul U. Daim:

Virtual Teams and the Importance of Building Trust. 46-49 - William MacKinnon, Michael Wasserman:

Implementing Electronic Medical Record Systems. 50-53 - Rick Kuhn, Simon Liu, Hart Rossman:

Practical Interdomain Routing Security. 54-56 - H. Gilbert Miller, John Veiga:

Cloud Computing: Will Commodity Services Benefit Users Long Term? 57-59 - Wushow Chou:

Boss Smart. 60-62 - Linda Wilbanks:

IT Productivity = ?? 64-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














