Journal: IT Professional

Volume 19, Issue 6

4 -- 7San Murugesan. Stay Professionally Fit, Always
8 -- 12Nir Kshetri, Jeffrey M. Voas. The Economics of "Fake News"
13 -- 17Bernard Ijesunor Akhigbe, Oyinkansola Onyinyechi Akhigbe, Ishaya Peni Gambo, Babajide Samuel Afolabi. ICT: An Emerging Paradigm for Success in Nigeria
18 -- 20Timothy R. Weil. IEEE CS 28th Software Technology Conference
21 -- 25George F. Hurlburt, George K. Thiruvathukal, Maria R. Lee. The Graph Database: Jack of All Trades or Just Not SQL?
26 -- 32Zuopeng Justin Zhang. Graph Databases for Knowledge Management
34 -- 43Noa Roy-Hubara, Lior Rokach, Bracha Shapira, Peretz Shoval. Modeling Graph Database Schema
44 -- 51Jans Aasman. Transmuting Information to Knowledge with an Enterprise Knowledge Graph
52 -- 57Fidel Paniagua Diez, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda, Jose Maria Sierra Camara. Modeling XACML Security Policies Using Graph Databases
58 -- 64Shin Morishima, Hiroki Matsutani. High-Performance with an In-GPU Graph Database Cache
66 -- 70Rick Kuhn, Mohammad Raunak, Raghu Kacker. It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends
71 -- 73George Strawn. IT and 21st Century Employment
74 -- 80Seth Earley. The Problem of Personalization: AI-Driven Analytics at Scale

Volume 19, Issue 5

4 -- 10Sunil Mithas, Thomas Kude, Sorel Reisman. Digitization and Disciplined Autonomy / COMPSAC 2017: Highlights
11 -- 15Nir Kshetri, Jeffrey M. Voas. Do Crypto-Currencies Fuel Ransomware?
16 -- 19Irena Bojanova, Jeffrey M. Voas. Trusting the Internet of Things
20 -- 26Jason R. C. Nurse, Sadie Creese, David De Roure. Security Risk Assessment in Internet of Things Systems
27 -- 33Hokeun Kim, Edward A. Lee. Authentication and Authorization for the Internet of Things
34 -- 41Ted H. Szymanski. Security and Privacy for a Green Internet of Things
42 -- 49Kaoru Ota, Teerawat Kumrai, Mianxiong Dong, Jay Kishigami, Minyi Guo. Smart Infrastructure Design for Smart Cities
50 -- 57Simon Fong, Jinan Fiaidhi, Sabah Mohammed, Luiz Abel Moutinho. Managing Diabetes Therapy through Datastream Mining
58 -- 60George Strawn, Candace Strawn. Norbert Wiener: Mastermind of Cybernetics
61 -- 64César A. Collazos, Manuel Ortega, Antoni Granollers, Huizilopoztli Luna-García, Habib Fardoun. Usability Evaluation Trends in Ibero-American Countries

Volume 19, Issue 4

3 -- 6Sunil Mithas, F. Warren McFarlan. What Is Digital Intelligence?
7 -- 11George F. Hurlburt. How Much to Trust Artificial Intelligence?
12 -- 15Yousef Farhaoui. Teaching Computer Sciences in Morocco: An Overview
16 -- 20Haluk Demirkan, Seth Earley, Robert R. Harmon. Cognitive Computing
21 -- 27Monideepa Tarafdar, Cynthia Mathis Beath, Jeanne W. Ross. Enterprise Cognitive Computing Applications: Opportunities and Challenges
28 -- 35Arvind Agarwal, Balaji Ganesan, Ankush Gupta, Nitisha Jain, Hima Karanam, Arun Kumar, Nishtha Madaan, Vitobha Munigala, Srikanth Tamilselvam. Cognitive Compliance for Financial Regulations
36 -- 44Christopher Asakiewicz, Edward A. Stohr, Shrey Mahajan, Lalitkumar Pandey. Building a Cognitive Application Using Watson DeepQA
45 -- 54Cheng Wu, Yiming Wang. Cognitive Communication in Rail Transit: Awareness, Adaption, and Reasoning
55 -- 62Wei Cai, Yuanfang Chi, Victor C. M. Leung. Cognitive Gaming
63 -- 67Seth Earley. The Problem With AI
68 -- 72Nir Kshetri. Can Blockchain Strengthen the Internet of Things?

Volume 19, Issue 3

4 -- 7Claudio Demartini, Lorenzo Benussi. Do Web 4.0 and Industry 4.0 Imply Education X.0?
8 -- 10Jennifer Q. Trelewicz. Big Data and Big Money: The Role of Data in the Financial Sector
11 -- 13Maxim Bakaev. The Russian Reversal: From Developed to Emerging IT
14 -- 16Saeid Abolfazli, Maria R. Lee. Mobile Data Analytics
17 -- 23Panagiotis Kasnesis, Charalampos Z. Patrikakis, Iakovos S. Venieris. Changing Mobile Data Analysis through Deep Learning
24 -- 30Muhammad Habib Ur Rehman, Aisha Batool, Chee Sun Liew, Ying Wah Teh, Atta ur Rehman Khan. Execution Models for Mobile Data Analytics
31 -- 37Yunfei Feng, Carl K. Chang, Hua Ming. Recognizing Activities of Daily Living to Improve Well-Being
38 -- 44Chiung-I Chang, Jui-Chih Ho. A Two-Layer Clustering Model for Mobile Customer Analysis
45 -- 51Jonas Sjöström, Pär J. Ågerfalk, Alan R. Hevner. Scrutinizing Privacy and Accountability in Online Psychosocial Care
52 -- 60Edoardo Patti, Angelo Mollame, David Erba, Daniele Dalmasso, Anna Osello, Enrico Macii, Andrea Acquaviva. Information Modeling for Virtual and Augmented Reality
61 -- 65Alfredo J. Perez, Sherali Zeadally, Scott Griffith. Bystanders' Privacy
66 -- 69Seth Earley. The Role of the Chief Data Officer: Managing Expectations
70 -- 72George Strawn. IT, Unemployment, and Ideology

Volume 19, Issue 2

4 -- 9Rajiv Ranjan, Jedsada Phengsuwan, Philip James, Stuart L. Barr, Aad van Moorsel. Urban Risk Analytics in the Cloud
12 -- 15Ishaya Peni Gambo, Abimbola Hettie Soriyan. ICT Implementation in the Nigerian Healthcare System
16 -- 23Chamil Kulatunga, Laurence Shalloo, William Donnelly, Eric Robson, Stepan Ivanov. Opportunistic Wireless Networking for Smart Dairy Farming
24 -- 30Darren O'Neill, Cathryn Peoples. A Web-Based Portal for Assessing Citizen Well-Being
32 -- 40Fayaz Akhtar, Mubashir Husain Rehmani. Energy Harvesting for Self-Sustainable Wireless Body Area Networks
42 -- 49Sukhpal Singh, Inderveer Chana, Maninder Singh. The Journey of QoS-Aware Autonomic Cloud Computing
50 -- 56Jorge Pereira, Evaldo O. da Silva, Thaís Batista, Flávia Coimbra Delicato, Paulo F. Pires, Samee U. Khan. Cloud Adoption in Brazil
58 -- 64Akito Monden, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto. Examining Software Engineering Beliefs about System Testing Defects
66 -- 69Seth Earley. Getting Your Data House in Order: Zions Bancorporation Case Study
70 -- 72George Strawn, Candace Strawn. Erich Bloch: Mastermind of Computer Technology and Science Administration

Volume 19, Issue 1

3 -- 5San Murugesan. IT Pro 2017: A Look Ahead
6 -- 11George F. Hurlburt. Superintelligence: Myth or Pressing Reality?
12 -- 20Naser Al-Falahy, Omar Y. K. Alani. Technologies for 5G Networks: Challenges and Opportunities
21 -- 26Karthik Reddy Nalla, Hosam El-Ocla. Mobile DNUN: Danger Notification and User Navigation
27 -- 33Shu-Man Chang, Yan-Yuen Poon, Chun-Yi Lin, Yung-Hsiu Lin, Ping Pete Chong, Her-Kun Chang. IT-Enabled Support for Anesthesia Preoperative Evaluation Clinics
34 -- 41Sherif Sakr. Big Data Processing Stacks
42 -- 47Mario Silic, Andrea Back. Open Source Software Adoption: Lessons from Linux in Munich
48 -- 55Ariel I. La Paz. How to Become a Strategist CIO
56 -- 58Karim Touloum, Djilali Idoughi, Ahmed Seffah. User Experience in Service Design: A Case Study from Algeria
59 -- 63Timothy R. Weil. VPKI Hits the Highway: Secure Communication for the Connected Vehicle Program
64 -- 69Seth Earley. The Evolving Role of the CDO
70 -- 72George Strawn. IT and Future Unemployment: Part 2