Journal: IT Professional

Volume 11, Issue 6

4 -- 5Arnold W. Bragg. The Second Immutable Law of Security Administration
6 -- 7Frank E. Ferrante, G. Reza Djavanshir, Tom Costello. Guest Editors Introduction: Strategic Planning in Today s IT Environment
8 -- 15Edward K. Hong. Information Technology Strategic Planning
23 -- 30Ariadna Llorens-Garcia, Xavier Llinas-Audet, Ferran Sabate. Professional and Interpersonal Skills for ICT Specialists
31 -- 36Elby M. Nash. IT and Business Alignment: The Effect on Productivity and Profitability
37 -- 41Peter Kraynak. Finding Your True IT Transformation
42 -- 45John Berti. Copyright Infringement and Protection in the Internet Age
46 -- 49Georgina Harell, Tugrul U. Daim. Virtual Teams and the Importance of Building Trust
50 -- 53William MacKinnon, Michael Wasserman. Implementing Electronic Medical Record Systems
54 -- 56Rick Kuhn, Simon Liu, Hart Rossman. Practical Interdomain Routing Security
57 -- 59H. Gilbert Miller, John Veiga. Cloud Computing: Will Commodity Services Benefit Users Long Term?
60 -- 62Wushow Chou. Boss Smart
64 -- 63Linda Wilbanks. IT Productivity = ??

Volume 11, Issue 5

4 -- 5Henry E. Schaffer. X as a Service, Cloud Computing, and the Need for Good Judgment
6 -- 7Thomas C. Jepsen. Guest Editor s Introduction: Ontologies, OWL, and the Semantic Web
8 -- 16Valentina Janev, Sanja Vranes. Semantic Web Technologies: Ready for Adoption?
17 -- 21Dean Keith. Equal Format Databases and Semantic-Relational Encoding
22 -- 27Thomas C. Jepsen. Just What Is an Ontology, Anyway?
28 -- 33Liang-Jie Zhang, Jia Zhang. An Integrated Service Model Approach for Enabling SOA
35 -- 40John Harauz, Jeffrey M. Voas, George F. Hurlburt. Trustworthiness in Software Environments
42 -- 43Karen Evans, Robert J. Carey. Success in National Cyberdefense
44 -- 47Wushow Chou. Self-Smart, Part II: Career Smart
48 -- 50Keith W. Miller. Joining the Conversation about IT Ethics
51 -- 53Simon Liu. Surviving Distributed Denial-of-Service Attacks
54 -- 58Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman. IT Compliance: Aligning Legal and Product Requirements
60 -- 62Sorel Reisman. Changing the Publishing Model
64 -- 63Tom Costello. Certification: Does the Emperor Have Any Clothes?

Volume 11, Issue 4

4 -- 5Phillip A. Laplante. Paranoid? Who Says I m Paranoid?
6 -- 9Fedor Bakalov, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. Automating Mashups for Next-Generation Enterprise Portals
10 -- 11Wesley Chou, J. Morris Chang, Ken Christensen. Guest Editors Introduction: Data Center Design
12 -- 16Michael McShea. Return on Infrastructure, the New ROI
17 -- 23Reuven R. Levary. A Multiple-Criteria Approach to Ranking Computer Operating Systems
24 -- 27Wesley Chou. Optimizing the WAN between Branch Offices and the Data Center
28 -- 37Bruce Nordman, Kenneth J. Christensen. Greener PCs for the Enterprise
38 -- 44Ofer Arazy, Nanda Kumar, Bracha Shapira. Improving Social Recommender Systems
45 -- 51Phillip A. Laplante, Norita Ahmad. Pavlov s Bugs: Matching Repair Policies with Rewards
52 -- 55George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day. Privacy and/or Security: Take Your Pick
56 -- 59David K. Larson, Keith W. Miller. When Sensitive IT Information Crosses Borders
60 -- 62Wushow Chou. Self-Smart, Part I: Work Smart
64 -- 0Karen Evans. A Business Case for IT Investments

Volume 11, Issue 3

4 -- 5Wes Chou. Is IT for Geeks Only?
7 -- 11Enrique Castro-Leon, Jackson He. Virtual Service Grids: Integrating IT with Business Processes
12 -- 13Simon Liu. Guest Editor s Introduction: Cybersecurity in a Falling Economy
14 -- 21Simon Liu, Bruce Cheng. Cyberattacks: Why, What, Who, and How
22 -- 29Simon Liu, Jerry Ormaner. From Ancient Fortress to Modern Cyberdefense
30 -- 36Peter Thermos. Evaluating the Security of Enterprise VoIP Networks
38 -- 45Shari Lawrence Pfleeger. Useful Cybersecurity Metrics
46 -- 49G. Reza Djavanshir, Reza Khorramshahgol, James Novitzki. Critical Characteristics of Metasystems: Toward Defining Metasystems Governance Mechanism
57 -- 59Simon Liu, Rick Kuhn, Hart Rossman. Understanding Insecure IT: Practical Risk Assessment
60 -- 63H. Gilbert Miller, Richard H. Murphy. Secure Cyberspace: Answering the Call for Intelligent Action
64 -- 70Wushow Chou. People Smart
72 -- 71Tom Costello, Phillip A. Laplante. Never Let a Serious Crisis Go to Waste

Volume 11, Issue 2

4 -- 5George Kraft. Healthcare IT Standardization: Will the New Stimulus Package Help?
6 -- 9Brandi Ortega. News Briefs
10 -- 13Geng Lin, David Fu, Jinzy Zhu, Glenn Dasmalchi. Cloud Computing: IT as a Service
15 -- 17Jeffrey M. Voas, Jia Zhang. Cloud Computing: New Wine or Just a New Bottle?
18 -- 22Chuck Hutchinson, Jeff Ward, Karen Castilon. Navigating the Next-Generation Application Architecture
23 -- 27Robert L. Grossman. The Case for Cloud Computing
28 -- 33Christof Weinhardt, Arun Anandasivam, Benjamin Blau, Jochen Stößer. Business Models in the Service World
34 -- 41Dawn Owens, Alanah J. Davis, John D. Murphy, Deepak Khazanchi, Ilze Zigurs. Real-World Opportunities for Virtual- World Project Management
42 -- 43Todd W. Kolb. IT Is Here to Serve
44 -- 48Wushow Chou. Communication Smart
49 -- 51Simon Liu, Rick Kuhn, Hart Rossman. Surviving Insecure IT: Effective Patch Management
52 -- 55Keith W. Miller, Jeffrey M. Voas. The Metaphysics of Software Trust
56 -- 59Wushow Chou. Smart Staff Recruiting
60 -- 62Liang-Jie Zhang. A Services University
64 -- 63Linda Wilbanks. Summer Interns: Our Responsibility

Volume 11, Issue 1

4 -- 5Thomas Jepsen. IT Challenges for 2009: Fixing the IT Infrastructure
6 -- 9Brandi Ortega. News Briefs
14 -- 19George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas. An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008
20 -- 23Wushow Chou. Build a Smarter Government, Build a Smarter Federal IT Operation
24 -- 26Rick Kuhn, Hart Rossman, Simon Liu. Introducing Insecure IT
36 -- 41Michael Chau, Jennifer Jie Xu, Jinwei Cao, Porsche Lam, Boby Shiu. A Blog Mining Framework
42 -- 49Philip I. S. Lei, Angus K. Y. Wong. The Multiple-Touch User Interface Revolution
50 -- 58C. Derrick Huang, Jahyun Goo. Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements
59 -- 63Bill Karakostas. Restructuring the IS Curriculum around the Theme of Service Orientation
64 -- 0Linda Wilbanks. Pushing IT up a Notch: Embracing Technology for the Public and Corporate Good