


default search action
IT Professional, Volume 22
Volume 22, Number 1, January - February 2020
- Irena Bojanova:

IT Professional - Accomplishments and Future Plans. 4-8 - Tiziana Margaria, Joseph Kiniry:

Welcome to Formal Methods in Industry. 9-12 - Stephen J. Andriole:

Blockchain, Cryptocurrency, and Cybersecurity. 13-16 - San Murugesan

, Charalampos Z. Patrikakis:
Envisioning Our Future Digital World. 17-19 - Bertalan Meskó:

Digital Health Technologies and Well-Being in the Future. 20-23 - Spyros Fountas, Borja Espejo-García

, Aikaterini Kasimati
, Nikolaos Mylonas, Nicoleta Darra:
The Future of Digital Agriculture: Technologies and Opportunities. 24-28 - Tom Butler:

What's Next in the Digital Transformation of Financial Industry? 29-33 - Ioannis Tomkos

, Dimitrios Klonidis
, Evangelos Pikasis
, Sergios Theodoridis:
Toward the 6G Network Era: Opportunities and Challenges. 34-38 - Laura Specker Sullivan, Peter B. Reiner:

Ethics in the Digital Era: Nothing New? 39-42 - Charalampos Z. Patrikakis

, San Murugesan
:
The New Needs of Professions. 43-46 - Svyatoslav Kotusev

:
The Hard Side of Business and IT Alignment. 47-55 - Chao Chen, Zhu Wang

, Daqing Zhang:
Sending More With Less: Crowdsourcing Integrated Transportation as a New Form of Citywide Passenger-Package Delivery System. 56-62 - Timothy R. Weil:

Risk Assessment Methods for Cloud Computing Platforms. 63-66 - George O. Strawn:

A History of US Employment In the 21st Century. 67-70
Volume 22, Number 2, March - April 2020
- Sunil Mithas

, San Murugesan
, Priya Seetharaman
:
What is Your Artificial Intelligence Strategy? 4-9 - Markus Schordan:

Introduction of the Software Technology Department. 10-13 - Nir Kshetri:

China's Social Credit System: Data, Algorithms and Implications. 14-18 - George Loukas

, Charalampos Z. Patrikakis, Linda Wilbanks:
Digital Deception: Cyber Fraud and Online Misinformation. 19-20 - Pranshu Bajpai

, Richard J. Enbody:
Attacking Key Management in Ransomware. 21-27 - Konstantinos P. Demestichas

, Konstantina Remoundou, Evgenia F. Adamopoulou
:
Food for Thought: Fighting Fake News and Online Disinformation. 28-34 - Michail Tsikerdekis, Sherali Zeadally:

Detecting Online Content Deception. 35-44 - Amit Kumar Singh

, Chandan Kumar
:
Encryption-Then-Compression-Based Copyright Protection Scheme for E-Governance. 45-52 - Paula Fraga-Lamas

, Tiago M. Fernández-Caramés:
Fake News, Disinformation, and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality. 53-59 - Zhiyong Yu

, Wenzhong Guo
, Daqing Zhang, Leye Wang
, Bin Guo
:
Cyber-Physical-Social-Mediated Communication. 60-66 - Karthik Mohanarangam

:
Transitioning to Agile - In a Large Organization. 67-72
Volume 22, Number 3, May - June 2020
- Tim Weil, San Murugesan

:
IT Risk and Resilience - Cybersecurity Response to COVID-19. 4-10 - James Bret Michael:

Practical Aspects of Employing Antireverse Engineering. 11-13 - Simon Y. Liu:

Artificial Intelligence (AI) in Agriculture. 14-15 - Debra P. C. Peters

, Adam R. Rivers
, Jerry L. Hatfield, Danielle G. Lemay, Simon Liu, Bruno Basso:
Harnessing AI to Transform Agriculture and Inform Agricultural Research. 16-21 - Kenneth A. Sudduth, M. Jennifer Woodward-Greene

, Bryan W. Penning
, Martin A. Locke, Adam R. Rivers
, Kristen S. Veum:
AI Down on the Farm. 22-26 - Paula Jimena Ramos Giraldo, Chris Reberg-Horton

, Anna M. Locke
, Steven B. Mirsky, Edgar J. Lobaton
:
Drought Stress Detection Using Low-Cost Computer Vision Systems and Machine Learning Techniques. 27-29 - Debra P. C. Peters

, Heather M. Savoy
, Geovany A. Ramírez, Haitao Huang:
AI Recommender System With ML for Agricultural Research. 30-32 - Brandon T. Bestelmeyer

, Guillermo Marcillo
, Sarah E. McCord, Steven B. Mirsky, Glenn E. Moglen
, Lisa G. Neven, Debra P. C. Peters
, Clement Sohoulande
, Tewodros T. Wakie:
Scaling Up Agricultural Research With Artificial Intelligence. 33-38 - Bryan W. Penning

, Warren M. Snelling, M. Jennifer Woodward-Greene
:
Machine Learning in the Assessment of Meat Quality. 39-41 - Jerry L. Hatfield, Michelle Cryder, Bruno Basso:

Remote Sensing: Advancing the Science and the Applications to Transform Agriculture. 42-45 - Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik

, Naveed Ahmad:
Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. 46-54 - Bin Guo

, Ziqi Wang, Pei Wang, Tong Xin, Daqing Zhang, Zhiwen Yu
:
DeepStore: Understanding Customer Behaviors in Unmanned Stores. 55-63 - Reinhard Wilhelm:

Determining Reliable and Precise Execution Time Bounds of Real-Time Software. 64-69 - George O. Strawn:

IT and 21st Century Employment in Pandemic Times. 70-72
Volume 22, Number 4, July - August 2020
- Sorel Reisman:

Conference Recovery During a Time of Disaster. 4-7 - Frederik Gossen, Tiziana Margaria, Bernhard Steffen:

Towards Explainability in Machine Learning: The Formal Methods Way. 8-12 - Chan Naseeb, Phillip A. Laplante, Ben Amaba:

"Future" Children - Can IoT Devices Help Save the World? 13-17 - G. Reza Djavanshir, Maria R. Lee, Jim Kyung-Soo Liew:

Spotlight on AI! - Why Everyone Should Pay Attention Now! 18-20 - Nivedita Bharti

, Nisheeth Joshi
, Iti Mathur, Pragya Katyayan
:
Quality-Based Ranking of Translation Outputs. 21-27 - Victor Chang

, Pin Ni
, Yuming Li
:
K-Clustering Methods for Investigating Social-Environmental and Natural-Environmental Features Based on Air Quality Index. 28-34 - Shuwei Gao, Jun Tai, Wentong Ge, Xiaodan Li, Qing Wang, Yi Lei, Yunxiao Wu, Li Zheng, Yongli Guo, Zhifei Xu:

Facial Feature as Predictor for Early-Persistence OSAS After Adenotonsillectomy in Children With Moderate to Severe OSAS. 35-42 - Elizabeth B. Varghese, Sabu M. Thampi

:
Application of Cognitive Computing for Smart Crowd Management. 43-50 - Cornelio Yáñez-Márquez:

Toward the Bleaching of the Black Boxes: Minimalist Machine Learning. 51-56 - Qing Zhao, Jianqiang Li, Chun Xu, Ji-Jiang Yang, Liang Zhao:

Knowledge-Enhanced Relation Extraction for Chinese EMRs. 57-62 - Nir Kshetri

:
Artificial Intelligence in Developing Countries. 63-68 - Stephen J. Andriole:

Innovation, Emerging Technology, and Digital Transformation. 69-72
Volume 22, Number 5, September - October 2020
- Nir Kshetri, Joanna F. DeFranco:

Is Privacy Dead? 4-12 - Stephen J. Andriole

:
The Hard Truth About Soft Digital Transformation. 13-16 - Phil Laplante:

It Is Time to Seriously Consider Personal Blockchains. 17-23 - John R. Michener:

Security Issues With Functions as a Service. 24-31 - Riccardo Coppola, Luca Ardito

, Maurizio Morisio, Marco Torchiano
:
Mobile Testing: New Challenges and Perceived Difficulties From Developers of the Italian Industry. 32-39 - Zaharah Allah Bukhsh

, Irina Stipanovic
:
Predictive Maintenance for Infrastructure Asset Management. 40-45 - Debajyoti Pal

, Chonlameth Arpnikanondt, Mohammad Abdur Razzaque, Suree Funilkul:
To Trust or Not-Trust: Privacy Issues With Voice Assistants. 46-53 - Michael R. Fox:

IT Governance in a DevOps World. 54-61 - Dimitar Minovski, Christer Åhlund, Karan Mitra, Roman Zhohov:

Defining Quality of Experience for the Internet of Things. 62-70 - Amy Van Looy

:
Innovating Organizational Processes With New Technologies: Problems and Solutions. 71-80 - Fatima Hussain, Rasheed Hussain

, Brett Noye, Salah Sharieh:
Enterprise API Security and GDPR Compliance: Design and Implementation Perspective. 81-89 - Lucas Whittaker

, Tim C. Kietzmann, Jan Kietzmann, Amir Dabirian:
"All Around Me Are Synthetic Faces": The Mad World of AI-Generated Media. 90-99
Volume 22, Number 6, November - December 2020
- Norita B. Ahmad, Phil Laplante, Joanna F. DeFranco:

Life, IoT, and the Pursuit of Happiness. 4-7 - Nura Jabagi

, Andrew Park, Jan Kietzmann:
The 5G Revolution: Expectations Versus Reality. 8-15 - Timothy R. Weil:

Standards for Cloud Risk Assessments - What's Missing? 16-23 - Tim Weil, Bhuvan Unhelkar, John Callahan, Jason W. Rupe, Keith Sherringham

:
IT Pro Special Issue on Communications Recovery and Resilience - Editor's Column. 24-25 - Uthpala Subodhani Premarathne:

Preference Biased Edge Weight Assignment for Connectivity-Based Resilience Computation in Telecommunication Networks. 26-32 - Alan H. Karp, Paul L. Borrill:

A Design for Resilient Datacenter Networks. 33-38 - Bohao Feng

, Zhewei Cui
, Yunxue Huang, Huachun Zhou, Shui Yu
:
Elastic Resilience for Software-Defined Satellite Networking: Challenges, Solutions, and Open Issues. 39-45 - Jan Kallberg

, Stephen S. Hamilton:
Resiliency by Retrograded Communication-the Revival of Shortwave as a Military Communication Channel. 46-51 - Yun Wan

, Qi Zhu:
The IT Challenges in Disaster Relief: What We Learned From Hurricane Harvey. 52-58 - Bhuvan Unhelkar, Tad Gonsalves

:
Enhancing Artificial Intelligence Decision Making Frameworks to Support Leadership During Business Disruptions. 59-66 - Alaa A. R. Alsaeedy

, Edwin K. P. Chong:
Post-Hazard Cellular Network Recovery by Unmanned Aerial Vehicles and User Equipment Cooperation. 67-73 - Jawwad A. Shamsi:

Resilience in Smart City Applications: Faults, Failures, and Solutions. 74-81 - Monideepa Tarafdar

, Henri Pirkkalainen
, Markus Salo, Markus Makkonen
:
Taking on the "Dark Side"-Coping With Technostress. 82-89 - Edoardo Giusto

, Mohammad Ghazi Vakili, Filippo Gandino, Claudio Demartini, Bartolomeo Montrucchio:
Quantum Pliers Cutting the Blockchain. 90-96 - Vyacheslav Lemberg, Michael S. Irizarry, Claudio Taglienti:

A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network. 97-103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














