


default search action
IT Professional, Volume 24
Volume 24, Number 1, January - February 2022
- Irena Bojanova

, George F. Hurlburt
:
IT Professional - Retrospectives and Perspectives. 4-8 - Andrew Park

, Jan Kietzmann
, Leyland F. Pitt, Amir Dabirian
:
The Evolution of Nonfungible Tokens: Complexity and Novelty of NFT Use-Cases. 9-14 - Stephen J. Andriole

:
Automation is a 10-Step Competitive Necessity. 15-17 - Sachin Motwani

, Anubha Gupta
:
Makers' Studio: Enabling Education and Skill Development Through ICT. 18-26 - Muhammad Talha Ubaid

, Tanzila Saba
, Hafiz Umer Draz, Amjad Rehman
, Muhammad Usman Ghani Khan, Hoshang Kolivand
:
Intelligent Traffic Signal Automation Based on Computer Vision Techniques Using Deep Learning. 27-33 - Milad Taleby Ahvanooey

, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. 34-40 - Coral Calero

, María Ángeles Moraga
, Félix García
:
Software, Sustainability, and UN Sustainable Development Goals. 41-48 - Fernando Rodrigues de Sa

, Ricardo Godoi Vieira
, Adilson Marques da Cunha
:
Learning Lessons From the Scrum Adoption in the Brazilian Air Force. 49-55 - Waseeqa Ghazanfer

, Noman Nasir Minhas
, Muhammad Rauf
, Adeel Anjum
:
iTrace: When IOTA Meets COVID-19 Contact Tracing. 56-62 - Abdul Majeed

, Seong Oun Hwang
:
A Practical Anonymization Approach for Imbalanced Datasets. 63-69 - Mohamad Kassab

, Phil Laplante
:
Trust Considerations in Open Banking. 70-73 - Ivan Lanese

, Ulrik Pagh Schultz
, Irek Ulidowski
:
Reversible Computing in Debugging of Erlang Programs. 74-80 - Nir Kshetri

:
Economics of the Internet of Things in Sub-Saharan Africa. 81-85
Volume 24, Number 2, March - April 2022
- San Murugesan

:
A Periscopic IT Outlook. 4-8 - Irena Bojanova

:
On Computer Society Magazines. 9-10 - Nir Kshetri

:
Web 3.0 and the Metaverse Shaping Organizations' Brand and Product Strategies. 11-15 - George Loukas

, San Murugesan, Stephen J. Andriole:
Information Hygiene: The Fight Against the Misinformation "Infodemic". 16-18 - Kevin K. W. Ho

, Jeromy Y. Chan, Dickson K. W. Chiu
:
Fake News and Misinformation During the Pandemic: What We Know and What We Do Not Know. 19-24 - Michal Choras, Aleksandra Pawlicka

, Rafal Kozik, Michal Wozniak
:
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection. 25-31 - Abhinav Kumar

, Jyoti Prakash Singh
, Amit Kumar Singh
:
COVID-19 Fake News Detection Using Ensemble-Based Deep Learning Model. 32-37 - Shahela Saif

, Samabia Tehseen
, Syed Sohaib Ali
, Sumaira Kausar
, Amina Jameel:
Generalized Deepfake Video Detection Through Time-Distribution and Metric Learning. 38-44 - Alexander Hück

, Sebastian Kreutzer, Joachim Protze
, Jan-Patrick Lehr
, Christian H. Bischof, Christian Terboven
, Matthias S. Müller:
Compiler-Aided Type Correctness of Hybrid MPI-OpenMP Applications. 45-51 - Anissa Cheriguene, Taieb Kabache, Asma Adnane

, Chaker Abdelaziz Kerrache
, Farhan Ahmad
:
On the Use of Blockchain Technology for Education During Pandemics. 52-61 - Roberto García Alonso

, Ulf Thoene
, Diego Dávila Benavides
:
Digital Health and Artificial Intelligence: Advancing Healthcare Provision in Latin America. 62-68 - Antoni Lluís Mesquida Calafat

, Antònia Mas
, Marcos Pacheco:
Fake Agile: What Is It and How to Avoid It? 69-73 - Stephen J. Andriole

:
How Emotional is Your C-Suite? 74-77 - George F. Hurlburt

:
Predicting Social Behavior of Tribes and Misinformation. 78-82 - Nir Kshetri

, Jeffrey M. Voas
:
Ransomware as a Business (RaaB). 83-87
Volume 24, Number 3, May - June 2022
- Nir Kshetri

:
Policy, Ethical, Social, and Environmental Considerations of Web3 and the Metaverse. 4-8 - Stephen J. Andriole

:
"What" Versus "How" C-Suite Management Struggles. 9-12 - George O. Strawn:

Masterminds of Deep Learning. 13-15 - Charalampos Z. Patrikakis

, Kincho H. Law
:
Society 5.0: Human Centric, Decentralized, and Hyperautomated. 16-17 - Yanjiang Long

, Zaishang Li
, Shengjie Pan
, Huey Wen Lim
, Zeyu Zhao, Yuecheng Huang, DongPing Fang:
Assessing Prehospital Seismic Resilience: An Agent-Based Modeling Approach. 18-27 - Muhammad Zeeshan

, Muhammad Umar Farooq
, Kashif Shahzad
, Adnan Akhunzada
:
5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications. 28-34 - Wei Wang

, Fangli Song
, Taiping Zhu:
SAME: The Design Space for Seamless Automotive Multimodal Experience. 35-42 - Xi Zhang

, Xin Wei
, Carol X. J. Ou
, Emiel Caron, Hengshu Zhu
, Hui Xiong:
From Human-AI Confrontation to Human-AI Symbiosis in Society 5.0: Transformation Challenges and Mechanisms. 43-51 - Dimitrios Panagiotakopoulos

, Georgios N. Marentakis
, Rossetos Metzitakos, Ioannis Deliyannis
, Fanourios Dedes:
Digital Scent Technology: Toward the Internet of Senses and the Metaverse. 52-59 - Simon Bourdeau

, Thibaut Coulon
, Dragos Vieru
:
Coping With Technological Shifts: Organizational Actions to Adapt IT Infrastructures. 60-66 - Umair Bin Ahmad, Muhammad Arslan Akram

, Adnan Noor Mian
:
Low-Latency Intrusion Detection Using a Deep Neural Network. 67-72 - Akhtar Badshah

, Muhammad Waqas
, Fazal Muhammad
, Ghulam Abbas
, Ziaul Haq Abbas
:
A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things. 73-80 - Devki Nandan Jha

, Graham Lenton, James Asker, David Blundell
, David Wallom
:
Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective. 81-87 - Varun Gupta

, Elizabeth Bjarnason
, Chetna Gupta
:
Strategic Prototyping Technology Adoption in Startups: Framework, Challenges, and Opportunities. 88-95 - Nir Kshetri

:
Economics of Supply Chain Cyberattacks. 96-100
Volume 24, Number 4, July - August 2022
- Sorel Reisman

:
COMPSAC 2022: A Retrospective. 4-7 - Amir Dabirian, Hoda Diba:

Employer Branding: COVID Impact on IT Companies. 8-13 - Stephen J. Andriole

:
Questions CEOs Should Ask About Digital Technology Meeting #1: "Tell Me How Technology Works Around Here?". 14-16 - Mahesh S. Kavre

, Bhaskar B. Gardas, Vaibhav S. Narwane
, Nima Jafari Navimipour
, Senay Yalçin:
Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises. 17-26 - Akashdeep Bhardwaj

, Keshav Kaushik
:
Investigate Financial Crime Patterns Using Graph Databases. 27-36 - Kishor Datta Gupta

, Dipankar Dasgupta:
Adversarial Attacks and Defenses for Deployed AI Models. 37-41 - Varun Gupta

, Luis Rubalcaba
, Chetna Gupta
:
Global Requirement Engineering Through Secondary Market Research: Lessons From Real Consulting Projects. 42-48 - Coral Calero

, Mario Piattini
:
Smart Software: The Real Force of Smart Things. 49-57 - Nhu-Ngoc Dao

, Trong-Hop Do, Sungrae Cho
, Schahram Dustdar
:
Information Revealed by Vision: A Review on the Next-Generation OCC Standard for AIoV. 58-65 - Nir Kshetri

:
Metaverse and Developing Economies. 66-69 - Norita B. Ahmad

, Nash Milic, Mohammed Ibahrine
:
Considerations About Algorithmic Literacy. 70-73 - Tiziana Margaria

, Alexander Schieweck
:
Active Behavior Mining for Digital Twins Extraction. 74-80
Volume 24, Number 5, September - October 2022
- San Murugesan

:
The AI-Cybersecurity Nexus: The Good and the Evil. 4-8 - Stephen J. Andriole

:
Questions CEOs Should Ask About Digital Technology Meeting #2: "Tell Me How Good - Or Poorly - Technology Performs Here?". 9-11 - Nir Kshetri

:
Bitcoin's Adoption as Legal Tender: A Tale of Two Developing Countries. 12-15 - Stephen J. Andriole

, Saeid Abolfazli, Michalis Feidakis:
Responsible, Explainable, and Emotional AI. 16-17 - Alper Yayla

, Lida Haghnegahdar, Ersin Dincelli
:
Explainable Artificial Intelligence for Smart Grid Intrusion Detection Systems. 18-24 - V. Adarsh

, G. R. Gangadharan
:
Applying Explainable Artificial Intelligence Models for Understanding Depression Among IT Workers. 25-29 - Nicholas E. Protonotarios

, Athanassios S. Fokas
, George A. Kastis
, Nikolaos Dikaios
:
Sigmoid and Beyond: Algebraic Activation Functions for Artificial Neural Networks Based on Solutions of a Riccati Equation. 30-36 - Indu Valsaladevi

, Sabu M. Thampi
:
Cognitive AI for Mitigation of Misinformation in Online Social Networks. 37-45 - Deeraj Nagothu

, Ronghua Xu
, Yu Chen
, Erik Blasch
, Alexander J. Aved
:
DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication. 46-52 - Luca Piano

, Fabio Garcea
, Valentina Gatteschi
, Fabrizio Lamberti
, Lia Morra
:
Detecting Drift in Deep Learning: A Methodology Primer. 53-60 - António Trigo

, João Varajão
, Miguel Almeida:
Low-Code Versus Code-Based Software Development: Which Wins the Productivity Game? 61-68 - Panagiotis Karkazis, Dimitris Uzunidis

, Panagiotis Trakadas, Helen C. Leligou
:
Design Challenges on Machine-Learning Enabled Resource Optimization. 69-74 - George O. Strawn

:
IT and 21st Century Employment. 75-76 - George F. Hurlburt

:
Thinking and Feeling Cognitive Security? 77-80
Volume 24, Number 6, November - December 2022
- Nir Kshetri

:
Blockchain's Roles in Fighting Corruption and Improving Public Sector Efficiency in Developing Countries. 4-8 - Irena Bojanova:

IT Pro Updates & Looking Forward. 9-10 - Phil Laplante

:
The Metaverses of Yesteryear, Today, and Tomorrow. 11-13 - Stephen J. Andriole

:
Questions CEOs Should Ask About Digital Technology Meeting #3: "Tell Me About the Business - Technology Strategy". 14-17 - Roberto Minerva, Charalampos Z. Patrikakis, Tiziana Margaria:

Digitally Cloning the Physical. 18-19 - Muhammad Usman Ghani Khan, Abdullah Tariq

, Tanzila Saba
, Amjad Rehman
, Hoshang Kolivand
:
VCFN: Virtual Cloth Fitting Try-On Network. 20-26 - Hijab e Zainab

, Narmeen Zakaria Bawany, Jaweria Imran, Wajiha Rehman:
Virtual Dimension - A Primer to Metaverse. 27-33 - Senthil Kumar Jagatheesaperumal

, Mohamed Rahouti
:
Building Digital Twins of Cyber Physical Systems With Metaverse for Industry 5.0 and Beyond. 34-40 - Javier Conde

, Andres Munoz-Arcentales
, Álvaro Alonso
, Gabriel Huecas
, Joaquín Salvachúa
:
Collaboration of Digital Twins Through Linked Open Data: Architecture With FIWARE as Enabling Technology. 41-46 - Torgeir Dingsøyr

, Magne Jørgensen
, Frode Odde Carlsen, Lena Carlström, Jens Engelsrud, Kine Hansvold, Mari Heibø-Bagheri, Kjetil Røe, Karl Ove Vika Sørensen:
Enabling Autonomous Teams and Continuous Deployment at Scale. 47-53 - Michael Juntao Yuan, Nick Hynes, Ju Long

:
Confidential Ethereum Smart Contracts. 54-58 - Pratima Sharma

, Rajni Jindal
, Malaya Dutta Borah:
A Comparative Analysis of Consensus Algorithms for Decentralized Storage Systems. 59-65 - George O. Strawn

:
Doing for Data What the Internet Did for Networking. 66-68 - Nir Kshetri

, Diana Rojas-Torres, Mark Grambo:
The Metaverse and Higher Education Institutions. 69-73 - Yi-Wei Ma

, Jiann-Liang Chen
, Chi-Sheng Shih:
An Automatic and Intelligent Internet of Things for Future Agriculture. 74-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














