Journal: IT Professional

Volume 25, Issue 6

4 -- 7Charalampos Z. Patrikakis. First Responder Superheroes Are Wearing Smart Wearables, Not Capes
8 -- 12Nir Kshetri. The Future of Education: Generative Artificial Intelligence's Collaborative Role With Teachers
13 -- 20Andrew Park, Jan Kietzmann, Jayson Andrew Killoran, Yuanyuan Gina Cui, Patrick van Esch, Amir Dabirian. Nothing Is Harder to Resist Than the Temptation of AI
21 -- 25Stephen J. Andriole. An Executive Guide to AI, Machine Learning, and Generative AI - With Some Help From ChatGPT and Bard
26 -- 28Stephen J. Andriole. IT Empowering Rescuers and First Responders in Saving Lives
29 -- 37Philip Wright, Ilmija Asani, Nelson Pimenta, Paulo Chaves Ferreira, William Oliff, Georgia Sakellari. Infrastructure-Less Prioritized Communication Platform for First Responders
38 -- 44Susanna Kaiser, Stephan Sand, Magdalena M. Linkiewicz, Henry Meißner, Dirk Baumbach, Ralf Berger. An Overall First Responder Tracking and Coordination Framework
45 -- 53Anaida Fernández-García, Xabier Oregui Biain, Konstantinos Lingos, Konstantinos Konstantoudakis, Alberto Belmonte-Hernández, Izar Azpiroz Iragorri, Dimitrios Zarpalas. Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders' Situational Awareness
54 -- 61Priyanka Ganesan, Senthil Kumar Jagatheesaperumal. Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services
62 -- 70Abdul Majeed, Seong Oun Hwang. Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence
71 -- 81Mohamed Rahouti, Damian M. Lyons, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong. A Decentralized Cooperative Navigation Approach for Visual Homing Networks
82 -- 89Jae-Hun Kim, Han Woo Park. Identifying Networked Patterns in Memecoin Twitter Accounts Using Exponential Random Graph Modeling
90 -- 93George O. Strawn. Masterminds of Punched Card Data Processing: Herman Hollerith and John Billings
94 -- 99Giuseppe De Palma, Saverio Giallorenzo, Jacopo Mauro, Matteo Trentin, Gianluigi Zavattaro. Formally Verifying Function Scheduling Properties in Serverless Applications

Volume 25, Issue 5

4 -- 9Hoda Diba. Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies
10 -- 13Axel Legay. Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities
14 -- 16Stephen J. Andriole. How Competitive Are You?
17 -- 19José Luis Hernández Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R. C. Nurse, J. Morris Chang. IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond
20 -- 28Geetanjali Rathee, Chaker Abdelaziz Kerrache, Anissa Cheriguene. Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic
29 -- 36Chen Zhong, J. B. Joo Baek Kim, Ali Alper Yayla. Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces
37 -- 44Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally. Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors
45 -- 56Mohamed Saied Essa, Shawkat Kamal Guirguis. Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things
57 -- 63Michail Tsikerdekis, Sherali Zeadally. Misinformation Detection Using Deep Learning
64 -- 70Irena Bojanova, John J. Guerrerio. Labeling Software Security Vulnerabilities
71 -- 75Nir Kshetri. Generative Artificial Intelligence in Marketing

Volume 25, Issue 4

4 -- 6Sorel Reisman. COMPSAC Returns In-Person - A Remarkable Post-Covid Success
7 -- 10George O. Strawn. Masterminds of Computer Design: Charles Babbage and Ada Lovelace
11 -- 16Assane Gueye, Carlos Eduardo Galhardo, Irena Bojanova. Critical Software Security Weaknesses
17 -- 20George F. Hurlburt. The Edgy Nature of Green IT
21 -- 28Noman Nasir Minhas, Maida Naveed. Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks
29 -- 35Stelios Prekas, Panagiotis Karkazis, Panagiotis Trakadas. An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework
36 -- 44Anirban Sengupta, Mahendra Rathor, Rahul Chaurasia. Biometrics for Hardware Security and Trust: Discussion and Analysis
45 -- 51Ghazanfar Ali Safdar, Ali Mansour. Security and Trust Issues in BYOD Networks
52 -- 60Abdul Majeed, Seong Oun Hwang. The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic
61 -- 66Ángel F. Alcaide, Carlos Núñez-Gómez, Francisco M. Delicado Martínez, Carmen Carrión 0001, María Blanca Caminero. A Blockchain-Based e-Government Service for Quantity Surveyors
67 -- 73Hande Aka Uymaz, Senem Kumova Metin. Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish
74 -- 84Nalinee Sophatsathit. Bridging the Gap From Concrete Building Construction to Flexible Software Process - Way of Working
85 -- 90Wenda Wei, Chenyang Wang, Xinyang Zheng, Hengshan Yue. An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator
91 -- 93Stephen J. Andriole. C-Suite Dysfunction
94 -- 97Nir Kshetri. Can China Catch Up to the United States in Generative Artificial Intelligence?

Volume 25, Issue 3

4 -- 8Evangelos Katsadouros, Charalampos Z. Patrikakis, George F. Hurlburt. Can Large Language Models Better Predict Software Vulnerability?
9 -- 13Nir Kshetri. Cybercrime and Privacy Threats of Large Language Models
14 -- 16Stephen J. Andriole. Truth Talking in the C-Suite
17 -- 18Bhuvan Unhelkar, Timothy R. Weil, Jason W. Rupe, Reza Djavanshi. The x in xG
19 -- 23Osama AlQahtani. Effects of User Equipment and Integrated Access and Backhaul Schedulers on the Throughput of 5G Millimeter-Wave Networks
24 -- 29Uthpala Premarathne, S. Rajasingham. Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks
30 -- 35Lila Rajabion, Bhuvan Unhelkar. Impact of xG on Cybersecurity
36 -- 42Anmol Kumar, Gaurav Somani 0001. DDoS at a Glance: Attack Launch to Solutions
43 -- 53Hsiang-Yu Chuang, Jiann-Liang Chen, Yi-Wei Ma. Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs
54 -- 60Akashdeep Bhardwaj, Keshav Kaushik. Metaverse or Metaworst with Cybersecurity Attacks
61 -- 67Luís Enrique Sanchez, Antonio Santos-Olmo Parra, Haralambos Mouratidis, Eduardo Fernández-Medina. New Frontiers in Security Risk Management
68 -- 73Suraj G. Jadhav, Surendra Sarnikar. Digital Twin of a Digital World: Process, Data, and Experience Perspectives
74 -- 77Clayton S. Ferner. Card Game to Demonstrate Quantum Key Exchange

Volume 25, Issue 2

4 -- 6George F. Hurlburt. What If Ethics Got in the Way of Generative AI?
7 -- 15Harshitha Menon, James Diffenderfer, Giorgis Georgakoudis, Ignacio Laguna, Michael O. Lam, Daniel Osei-Kuffuor, Konstantinos Parasyris, Jackson Vanover. Approximate High-Performance Computing: A Fast and Energy-Efficient Computing Paradigm in the Post-Moore Era
16 -- 19Nir Kshetri. ChatGPT in Developing Economies
20 -- 22Julián Grigera, Jordán Pascual Espada, Gustavo Rossi. AI in User Interface Design and Evaluation
23 -- 29Maxim Bakaev, Sebastian Heil, Vladimir Khvorostov, Martin Gaedke. How Many Data Does Machine Learning in Human-Computer Interaction Need?: Re-Estimating the Dataset Size for Convolutional Neural Network-Based Models of Visual Perception
30 -- 35He Yu, Simon Harper, Markel Vigo. Modeling Search Behavior Evolution on a Specialist Search Engine
36 -- 40Chen-Hao Huang 0002, Tzu-Chuan Chou. Examining the Dilemma Between Artificial Intelligence Techniques and Professional Medical Service: A Hybrid Balancing Perspective
41 -- 51Mohamed Saied Essa, Ahmed Mohamed Elfatatry, Shawkat K. Guirguis. Deeper Understanding of Software Change
52 -- 63Aos Mulahuwaish, Matthew Loucks, Basheer Qolomany, Ala I. Al-Fuqaha. Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin
64 -- 70Zerong Xie, Gary K. W. Wong, Dickson K. W. Chiu, Junru Lei. Bridging K-12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context
71 -- 76Valeria Henríquez, Ana María Moreno 0001, José Antonio Calvo-Manzano Villalón, Tomás San Feliu, Eliana Scheihing. Organizational Type Mismatch in Agile SMEs
77 -- 80Stephen J. Andriole, Noah P. Barsky. How Accountants Stay in the C-Suite (or Disappear Into the Digital Back Office)
81 -- 82George O. Strawn. st Century Employment, and Demography
83 -- 89Irena Bojanova, Carlos Eduardo Galhardo. Heartbleed Revisited: Is it Just a Buffer Over-Read?

Volume 25, Issue 1

4 -- 6Charalampos Z. Patrikakis. IT Professional Enters its 25th Year: Ready to Face the Challenges Ahead
7 -- 12Irena Bojanova, Carlos Eduardo Galhardo. Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities
13 -- 16Jayson Killoran, Yuanyuan Gina Cui, Andrew Park, Patrick van Esch, Amir Dabirian, Jan Kietzmann. Implementing Behavioral Biometrics With TRUST
17 -- 23Adnan Akhunzada, Sherali Zeadally, Saif ul Islam. Toward Performance and Energy-Efficient Edge-of-Things
24 -- 39Arash Heidari, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour, Shahin Akbarpour. A QoS-Aware Technique for Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and Markov Decision Process
40 -- 51Cheng You, Yanjia Qin, Qi Chen, Chang Chen, Jiahui Huang. HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation
52 -- 59Sonia Salman, Jawwad Ahmed Shamsi, Rizwan Qureshi. Deep Fake Generation and Detection: Issues, Challenges, and Solutions
60 -- 67Elio San Cristóbal Ruiz, Rafael Pastor Vargas, Rosario Gil Ortego, Russ Meier 0001, Hamadou Saliah-Hassane, Manuel Castro. Vulnerability Assessment of Learning Management Systems
68 -- 80Varun Gupta 0001, Luis Rubalcaba, Chetna Gupta. Connecting Dots Between Entrepreneurs, Research Publishers, and Software Engineering Researchers: An Outcome of Mixed Methods Empirical Research
81 -- 83Stephen J. Andriole. New Ways of Working Are Already Old
84 -- 88Nir Kshetri. The Economics of the Industrial Metaverse
89 -- 91George F. Hurlburt. Perception of Time and Its Representation in Technical Systems