Journal: IT Professional

Volume 15, Issue 6

2 -- 6Shirish C. Srivastava, Sunil Mithas, Bimlendra Jha. What Is Your Global Innovation Strategy?
7 -- 9Phillip A. Laplante. Career Advice
10 -- 11Keith W. Miller. Technology, Unemployment, and Power
12 -- 17Stijn Viaene. Data Scientists Aren't Domain Experts
18 -- 20Sunil Mithas, Maria R. Lee, Seth Earley, San Murugesan, G. Reza Djavanshir. Leveraging Big Data and Business Analytics
21 -- 28Uma Srinivasan, Bavani Arunasalam. Leveraging Big Data Analytics to Reduce Healthcare Costs
29 -- 35Alejandro Vera Baquero, Ricardo Colomo Palacios, Owen Molloy. Business Process Analytics Using a Big Data Approach
36 -- 42Li Jimei, Hu Yuzhou, Du Meijie. XBRL in the Chinese Financial Ecosystem
43 -- 48Rhoda C. Joseph, Norman A. Johnson. Big Data and Transformational Government
49 -- 55Stacie Petter, Kerry Ward. Countdown to Y2Gray
56 -- 62Maria R. Lee, Tsung Teng Chen. Understanding Social Computing Research
64 -- 67Nir Kshetri. Cloud Computing in Sub-Saharan Africa
68 -- 69Linda Wilbanks. Office Etiquette During the Holidays
72 -- 0Tom Costello. Vendor Management

Volume 15, Issue 5

4 -- 5Simon Liu. Engineering the Success of Software Development
6 -- 7Phillip A. Laplante. Who's Afraid of Big Data?
8 -- 11San Murugesan. Mobile Apps in Africa
12 -- 15Richard Kissel. Avoiding Accidental Data Loss
16 -- 21Michael Seibold, Dean Jacobs, Alfons Kemper. Operational Business Intelligence: Processing Mixed Workloads
22 -- 30Geetika T. Lakshmanan, Rania Khalaf. Leveraging Process-Mining Techniques
31 -- 37Yuan-Fa Lee. Personal Medical Monitoring System: Addressing Interoperability
38 -- 45Haluk Demirkan. A Smart Healthcare Systems Framework
46 -- 50Liguo Yu. The Market-Driven Software Ecosystem
51 -- 55George F. Hurlburt, Jeffrey M. Voas. STEM's Grand Challenge: Reviving Applied Mathematics
64 -- 0Tom Costello, Mark A. Langley, Kirk Botula, Eileen Forrester, Martin Curley, Jim Kenneally, Martin Delaney, Stephen McLaughlin. IT Frameworks

Volume 15, Issue 4

2 -- 3J. Morris Chang. New Trends in Cybersecurity
4 -- 7Richard P. Guidorizzi. Security: Active Authentication
8 -- 11Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt. Keyboard-Behavior-Based Authentication
12 -- 15Ingo Deutschmann, Peder Nordstrom, Linus Nilsson. Continuous Authentication Using Behavioral Biometrics
16 -- 19Jenifer Wheeler, Denise Varner, John Carrola, Christopher Dahlberg, Thomas Thornton, Corey Bohil, Kelly Terry. Covert Cognitive Games and User Response Patterns
20 -- 23Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David-Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani. Scan-Based Evaluation of Continuous Keystroke Authentication Systems
24 -- 28J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Ahmed E. Kamal, Sun-Yuan Kung. Capturing Cognitive Fingerprints from Keystroke Dynamics
29 -- 33Alex Fridman, Ariel Stolerman, Sayandeep Acharya, Patrick Brennan, Patrick Juola, Rachel Greenstadt, Moshe Kam. Decision Fusion for Multimodal Active Authentication
34 -- 37Jeffery Payne, Mark Fenner, Jonathan Kauffman. System Event Monitoring for Active Authentication
38 -- 42Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry S. Davis. Screen Fingerprints: A Novel Modality for Active Authentication
44 -- 49Kelce S. Wilson. Conflicts Among the Pillars of Information Assurance
50 -- 56Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu. Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs
57 -- 59Keith W. Miller. A Secret Sociotechnical System
60 -- 61Linda Wilbanks. Changing Jobs, Part III: Starting a New Job
64 -- 0Tom Costello. Random Thoughts for CIOs

Volume 15, Issue 3

4 -- 5Phillip A. Laplante, Thomas C. Jepsen, Joseph Williams, Fulvio Corno. Innovative and Disruptive Technologies [From the Editors]
6 -- 9Jeffery Payne. Secure Mobile Application Development
10 -- 13Asmare Emerie Kassahun, Alemayehu Molla. IT Reengineers Government Processes in Africa
14 -- 16Ed Coyne, Timothy R. Weil. ABAC and RBAC: Scalable, Flexible, and Auditable Access Management
18 -- 25Marcelo Nogueira Cortimiglia, Alejandro Germán Frank, Liziane Seben. Tablets: The Next Disruptive Computing Technology?
26 -- 31George F. Hurlburt. Complexity Theory: A New Paradigm for Software Integration
32 -- 35Jan Kallberg, Bhavani M. Thuraisingham. State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks
36 -- 43Craig Franke, Samuel Morin, Artem Chebotko, John Abraham, Pearl Brazier. Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster
44 -- 47Udo Richard Averweg. Information Systems: Practitioner-Based Inquiry Research
48 -- 53Wai-Ming To, Linda S. L. Lai, Andy W. L. Chung. Cloud Computing in China: Barriers and Potential
54 -- 59Arto Ojala. Software-as-a-Service Revenue Models
60 -- 61Linda Wilbanks. Changing Jobs, Part II: The Transition
64 -- 0Tom Costello, Beverly Prohaska. Innovation

Volume 15, Issue 2

2 -- 4George F. Hurlburt, Jeffrey M. Voas. Beyond the Cloud: Cyberphysical Systems
5 -- 7Julie M. Anderson. Government Risk Management Lags behind Vendor Practices
8 -- 11David K. Larson, Keith W. Miller. Medical Records and Software Trust
12 -- 14Irena Bojanova, Jia Zhang, Jeffrey M. Voas. Cloud Computing
15 -- 21Laura Hosman, Bruce Baikie. Solar-Powered Cloud Computing Datacenters
22 -- 27Joseph Idziorek, Mark Tannian, Douglas Jacobson. The Insecurity of Cloud Utility Models
28 -- 34Pablo Graubner, Matthias Schmidt, Bernd Freisleben. Energy-Efficient Virtual Machine Consolidation
36 -- 41Shinji Kikuchi, Yasuhide Matsumoto. Using Model Checking to Evaluate Live Migrations
42 -- 49Harigopal K. B. Ponnapalli, Ashutosh Saxena. A Digital Signature Architecture for Web Apps
50 -- 56Russell Thackston, David Umphress. Micropreneurs: The Rise of the MicroISV
57 -- 59Phillip A. Laplante. Courses for the Masses?
60 -- 61Linda Wilbanks. Changing Jobs
64 -- 0Tom Costello, Beverly Prohaska. Why Is IT Still Broken?

Volume 15, Issue 1

4 -- 7George Sherwood. Lessons Learned from Hurricane Sandy: Maintaining Service during a Disaster
8 -- 11Char Sample, Kim Schaffer. An Overview of Anomaly Detection
12 -- 15Nir Kshetri. IT in the Chinese Healthcare Industry
19 -- 27Manuj Sabharwal, Abhishek Agrawal, Grace Metri. Enabling Green IT through Energy-Aware Software
28 -- 34Nitin Singh Chauhan, Ashutosh Saxena. A Green Software Development Life Cycle for Cloud Computing
36 -- 43Carol Pollard. The US Government's Evolving Role in IT Energy Management
44 -- 49Wai-Ming To, Andy W. L. Chung, Linda S. L. Lai. Creating Green Awareness Using IT: The Case of Hong Kong
50 -- 56Anand Kishore Raju, Sven Lindmark, Simon Delaere, Pieter Ballon. A Holistic Impact-Assessment Framework for Green ICT
57 -- 59H. Gilbert Miller, Peter Mork. From Data to Decisions: A Value Chain for Big Data
60 -- 61Linda Wilbanks. Ethical Dilemmas in the Workplace