


default search action
IT Professional, Volume 20
Volume 20, Number 1, February 2018
- Irena Bojanova:

IT Professional Enters its 20th Year with Confidence. 5-8 - Jeffrey M. Voas, Rick Kuhn, Celia Paulsen

, Kim Schaffer:
Computer Science Education in 2018. 9-14 - Phillip A. Laplante, Ben Amaba:

Introducing the Internet of Things Department. 15-18 - Sorel Reisman, Wushow Bill Chou, Frank E. Ferrante, Simon Y. Liu, San Murugesan:

Retrospectives and Reflections: 20 Years of IT Professional. 19-26 - Chintan Amrit

, Yoni Meijberg:
Effectiveness of Test-Driven Development and Continuous Integration: A Case Study. 27-35 - J. Kent Poots, Ebrahim Bagheri

:
Automatic Annotation of Text with Pictures. 36-44 - Yen-Tai Lin, Sun-Jen Huang:

The Design of a Software Engineering Lifecycle Process for Big Data Projects. 45-52 - Knut Haufe, Srdan Dzombeta, Knud Brandis, Vladimir Stantchev, Ricardo Colomo-Palacios

:
Improving Transparency and Efficiency in IT Security Management Resourcing. 53-62 - David W. Flater

:
Bad Security Metrics Part 1: Problems. 64-68 - Seth Earley:

The Role of a Customer Data Platform. 69-76 - Stephen J. Andriole:

Life in the C-Suite 2.0. 77-79 - Gustavo Rossi:

Introducing the Student Forum Column. 80-82 - Nir Kshetri:

Introducing the IT Economics Department. 83-87
Volume 20, Number 2, March / April 2018
- George F. Hurlburt

:
Thinking Critically about Algorithmic Thinking. 5-10 - Nir Kshetri, Jeffrey M. Voas:

Blockchain in Developing Countries. 11-14 - Florence D. Hudson

:
Enabling Trust and Security: TIPPSS for IoT. 15-18 - Nir Kshetri, Diana Rojas-Torres:

The 2018 Winter Olympics: A Showcase of Technological Advancement. 19-25 - Maria R. Lee, David C. Yen, George F. Hurlburt

:
Financial Technologies and Applications. 27-33 - Rua-Huan Tsaih, Biing-Shen Kuo, Tzu-Hsiang Lin, Che-Chuan Hsu

:
The Use of Big Data Analytics to Predict the Foreign Exchange Rate Based on Public Media: A Machine-Learning Experiment. 34-41 - Russell Newman, Victor Chang

, Robert John Walters, Gary B. Wills
:
How to Analyze Data from Unlisted but Rich Firms: From the Perspective of Data and Analysis. 42-52 - Filip Caron:

The Evolving Payments Landscape: Technological Innovation in Payment Systems. 53-61 - Valentina Gatteschi, Fabrizio Lamberti

, Claudio Giovanni Demartini, Chiara Pranteda, Victor Santamaria:
To Blockchain or Not to Blockchain: That Is the Question. 62-74 - David W. Flater

:
Bad Security Metrics Part 2: Solutions. 76-79 - Stephen J. Andriole:

What Executives Should Know About Technology Trends. 80-82 - Graham A. Wilson:

Could a Coding Bootcamp Experience Prepare You for Industry? 83-87 - Jinan Fiaidhi

:
Extreme Automation: A New Game-Changing Technology. 88-90 - Nir Kshetri:

Rural e-Commerce in Developing Countries. 91-95
Volume 20, Number 3, May / June 2018
- Jeffrey M. Voas, Rick Kuhn, Phillip A. Laplante:

IoT Metrology. 6-10 - Jeffrey M. Voas, William W. Agresti, Phillip A. Laplante:

A Closer Look at IoTs Things. 11-14 - Dennis Miller:

Blockchain and the Internet of Things in the Industrial Sector. 15-18 - J. Morris Chang, Rick Kuhn, Timothy R. Weil:

Cyberthreats and Security. 20-22 - Logan O. Mailloux, Michael R. Grimaila:

Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce. 23-30 - Krzysztof Cabaj

, Luca Caviglione, Wojciech Mazurczyk
, Steffen Wendzel
, Alan Woodward
, Sebastian Zander:
The New Threats of Information Hiding: The Road Ahead. 31-39 - Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig

, Andrew Woodward:
Internet of Things Forensics: The Need, Process Models, and Open Issues. 40-49 - Zahid Akhtar

, Gautam Kumar
, Sambit Bakshi
, Hugo Proença
:
Experiments with Ocular Biometric Datasets: A Practitioner's Guideline. 50-63 - A. J. Burns

, M. Eric Johnson
:
The Evolving Cyberthreat to Privacy. 64-72 - Jawwad A. Shamsi, Muhammad Ali Khojaye:

Understanding Privacy Violations in Big Data Systems. 73-81 - Stephen J. Andriole:

Governing and Piloting Emerging Technologies. 83-85 - Luigi De Russis

, Kenichi Yoshida:
Recognizing Student Research through Symposia and Competitions. 86-89 - Jinan Fiaidhi

, Sabah Mohammed
:
Digital Health in the Era of Extreme Automation. 90-95
Volume 20, Number 4, July / August 2018
- Sorel Reisman:

COMPSAC 2018: Staying Smarter in a Smartening World. 5-7 - Joanna F. DeFranco, Mohamad Kassab

, Jeffrey M. Voas:
How Do You Create an Internet of Things Workforce? 8-12 - Linda Wilbanks:

Whats Your IT Risk Approach? 13-17 - Rua-Huan Tsaih, David C. Yen, Yu-Chien Chang, Che-Chuan Hsu:

Challenges in Creating Hybrid Professionalism Knowledge. 19-27 - Mohamed El Kholy

, Ahmed Elfatatry:
Change Taxonomy: A Fine-Grained Classification of Software Change. 28-36 - Mohammad Hossein Jarrahi:

Social Media, Social Capital, and Knowledge Sharing in Enterprise. 37-45 - Alfredo J. Perez

, Sherali Zeadally:
Privacy Issues and Solutions for Consumer Wearables. 46-56 - Rhoda C. Joseph:

Data Breaches: Public Sector Perspectives. 57-64 - Jinan Fiaidhi

, Sabah Mohammed
, Sami Mohammed:
EDI with Blockchain as an Enabler for Extreme Automation. 66-72 - Nir Kshetri:

5G in E-Commerce Activities. 73-77 - George O. Strawn:

A New Capitalism? 78-80
Volume 20, Number 5, September / October 2018
- Sunil Mithas

, Thomas Kude, Jonathan Whitaker:
Artificial Intelligence and IT Professionals. 6-13 - George F. Hurlburt

:
Emoji: Lingua Franca or Passing Fancy? 14-19 - Mohamad Kassab

, Joanna F. DeFranco, Jeffrey M. Voas:
Smarter Education. 20-24 - George O. Strawn:

Vannevar Bush: Mastermind of Analog Computing and Science Administration and Information Age Visionary. 25-28 - Abbas Javed

, Hadi Larijani, Andrew Wixted:
Improving Energy Consumption of a Commercial Building with IoT and Machine Learning. 30-38 - Lisa N. Michaud:

Observations of a New Chatbot: Drawing Conclusions from Early Interactions with Users. 40-47 - Michael Haslgrübler

, Benedikt Gollan, Alois Ferscha:
A Cognitive Assistance Framework for Supporting Human Workers in Industrial Tasks. 48-56 - V. Dinesh Reddy

, Brian Setz
, G. Subrahmanya V. R. K. Rao, G. R. Gangadharan, Marco Aiello
:
Best Practices for Sustainable Datacenters. 57-67 - Bo-Han Wu, Sun-Jen Huang:

A New In-Car Navigation System Based on V2C2V and Data Science. 68-73 - Stephen J. Andriole:

Digital Success Brings Special Security Risks. 75-78 - José Gonzalez Enríquez

:
The Importance of Academic Mobility: The Erasmus+ Program. 79-82 - Jinan Fiaidhi

, Sabah Mohammed
:
Fab Labs: A Platform for Innovation and Extreme Automation. 83-90 - Ravi S. Sharma

:
Revisiting the Knowledge Gini Coefficient: Digital Literacies and Sustainable Development. 91-95
Volume 20, Number 6, November - December 2018
- Celia Paulsen

:
The Trouble With Terms. 5-8 - Nir Kshetri

:
The Economics of Cyber-Insurance. 9-14 - Jeff Daniels, Saman Sargolzaei, Arman Sargolzaei, Tareq Z. Ahram, Phillip A. Laplante, Ben Amaba:

The Internet of Things, Artificial Intelligence, Blockchain, and Professionalism. 15-19 - Tim Weil

:
Taking Compliance to the Cloud - Using ISO Standards (Tools and Techniques). 20-30 - Jilei Tian

, Alvin Chin, Halim Yanikomeroglu
:
Connected and Autonomous Driving. 31-34 - Quang Tran Minh

, Eiji Kamioka
, Shigeki Yamada:
CFC-ITS: Context-Aware Fog Computing for Intelligent Transportation Systems. 35-45 - Zheyu Chen, Chi Harold Liu

, Runan Wang:
Learning to Navigate Connected Autonomous Cars for Long-Term Communication Coverage. 46-53 - Ala Abu Alkheir

, Moayad Aloqaily
, Hussein T. Mouftah:
Connected and Autonomous Electric Vehicles (CAEVs). 54-61 - Wei Wang

, Feng Zhou
, Wayne Li, Jim Budd
:
Designing the Product-Service System for Autonomous Vehicles. 62-69 - Rasheed Hussain

, JooYoung Lee, Sherali Zeadally
:
Autonomous Cars: Social and Economic Implications. 70-77 - Stephen J. Andriole

:
Skills and Competencies for Digital Transformation. 78-81 - Eva-Maria Schön

:
How Do Agile Practices Support Organizing a Ph.D.? 82-86 - Jinan Fiaidhi

, Sabah Mohammed
, Sami Mohammed:
The Robotization of Extreme Automation: The Balance Between Fear and Courage. 87-93

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














