


default search action
IT Professional, Volume 27
Volume 27, Number 1, January - February 2025
- Charalampos Z. Patrikakis

, George F. Hurlburt
:
Could Artificial Intelligence Write, Review, Edit, and Produce This Column? 4-10 - Stephen J. Andriole

:
Artificial Intelligence Adoption Is Easy for Gigs, Start-Ups and Small Companies - But Not Mid-Sized and Large Enterprises. 11-13 - Nir Kshetri

:
Economics of Agentic AI in the Health-Care Industry. 14-19 - Piyush Vyas

, Gitika Vyas
:
Generative Artificial Intelligence: Current Trends, Issues, and Challenges. 20-26 - Stijn Viaene

:
Harnessing AI Augmentation for Effective Digital Transformation Leadership. 27-33 - Lukasz Górski

, Shashishekar Ramakrishna
:
Right to Explanation in Large Language Models: Lessons from the European Union AI Act and General Data Protection Regulation. 34-40 - Yuya Sasaki

, Hironori Washizaki
, Jialong Li
, Nobukazu Yoshioka
, Naoyasu Ubayashi
, Yoshiaki Fukazawa
:
Landscape and Taxonomy of Prompt Engineering Patterns in Software Engineering. 41-49 - Martin Higgins

, Devki Nandan Jha
, David Blundell
, David Wallom
:
Security-by-Design Issues in Autonomous Vehicles. 50-56 - Sonali Ajankar

, Tanima Dutta
:
Unveiling the Priorities and Challenges Involved With Artificial-Intelligence-Powered Fake News Detection: A Comprehensive Analysis. 57-64 - Anirban Sengupta

, Aditya Anshul
, Vishal Chourasia
, Nabendu Bhui
:
Security Vulnerability (Backdoor Trojan) During Machine Learning Accelerator Design Phases. 65-72 - Sasa Sudar

, Zdravko Ivankovic
, Milos Rackovic
, Danijela Boberic Krsticev
:
Improving Traceability and Efficiency: Industry 4.0 and Blockchain's Transformation of Production Processes. 73-80 - Jeandri Robertson

, Alexander Hedlund
, Jan Kietzmann
, Christine Pitt
, Amir Dabirian
:
The Blockchain for Personalized Medicine. 81-88 - George O. Strawn

:
Mastermind of Systems Dynamics, the Whirlwind Computer, and Core Memory: Jay Forrester. 89-91
Volume 27, Number 2, March - April 2025
- George F. Hurlburt

:
Prudence and Generative Artificial Intelligence. 4-8 - Stephen J. Andriole

:
Teams Versus Individual Contributors - Something Executives Should Always Think About. 9-11 - Nir Kshetri

:
Revolutionizing Higher Education: The Impact of Artificial Intelligence Agents and Agentic Artificial Intelligence on Teaching and Operations. 12-16 - Nir Kshetri

, Ravi Sharma
, Aijaz A. Shaikh
:
Economic and Social Impacts of Generative Artificial Intelligence. 17-20 - Xudong Zhuang

, Yu Wu
:
Large Language Models in Corporate Investment: An Analysis of ChatGPT's Transformative Applications, Strategic Impacts, and Future Opportunities. 21-27 - In Lee

:
Generative Artificial Intelligence for Enterprises: Ecosystem, Typology of Applications, and Challenges. 28-34 - Kannan S. Thuraisamy

, Zubair A. Baig
, Sherali Zeadally
:
Generative Artificial Intelligence in Financial Services: Opportunities, Challenges, and Cyberthreats. 35-41 - In Lee

:
Generative Artificial Intelligence: Project Valuation. 42-47 - Priyam Ganguly

, Isha Mukherjee
:
Bridging the Gap: The Rise of Neurosymbolic Artificial Intelligence in Advanced Computing. 48-53 - Zhenyu Li

, Jianing Chen
, Zongfeng Zou
:
Bringing Personalization Back to E-Commerce via Virtual Live Streaming. 54-63 - Praveer Dubey

, Mohit Kumar
:
Understanding Loss Landscape Symmetry in Federated Learning: Implications for Model Fusion and Optimization. 64-68 - Yanyi Wu

, Weijia Zhang, Chenghua Lin
:
Generative Artificial Intelligence in University Education. 69-74 - Chun Yuen Cheung, Lap Man Chiu, Ying Su, Dickson K. W. Chiu

, Kevin K. W. Ho
:
Effectiveness of Online Higher Education Programming Education During COVID-19 Under the Lens on the 5E Instructional Model. 75-83 - Yi-Wei Ma

, Chun-Yao Chang, Kazuya Tsukamoto
:
Intra- and Intercluster Energy Saving Management for Self-Organizing Networks. 84-89 - Jun Wang

, Nai-Ru Xu
, Yaning Xiao
:
Network Relationship Embeddedness, Ambidexterity Innovation, and Enterprise Performance: Empirical Evidences From Big Private Firms. 90-97
Volume 27, Number 3, May - June 2025
- George O. Strawn

:
Revisiting IT and 21st Century Employment++. 4-7 - Stephen J. Andriole

:
The Hard Truth About Executive Paralysis. 8-11 - Nir Kshetri

:
From Challenges to Opportunities: Agentic Artificial Intelligence for Low-Resource Languages. 12-20 - Javad Abed

, Anton Dahbura, Xiangyang Li:
Strengthening Cybersecurity Readiness in the Age of AI: A Strategic Guide for Executives. 21-24 - Nir Kshetri

:
Security for Insecure Times. 25-28 - Sri Harsha Mekala

, Zubair A. Baig
, Adnan Anwar
, Naeem Syed
, Sherali Zeadally
:
Securing the Industrial Internet of Things: A Comprehensive Digital Forensic Readiness Framework and Cybersecurity Approach. 29-37 - Vidhu Kiran Sharma

, Chinmay Chakraborty
, Srikanta Kumar Mohapatra
, Subhendu Kumar Pani, Santi P. Maity
:
An Intelligent Cryptographic Technique for Protecting Internet of Things Data in 5G Networks. 38-44 - Yi-Hsueh Tsai

, Shiang-Jiun Chen
:
Exposing and Addressing Fake Base Station Vulnerabilities in 5G Through User Device Exploits. 45-51 - Man-Ling Liao

, Jiann-Liang Chen
, Candra Ahmadi
:
Detecting AI-Generated Images Using Facial Similarity and Feature Extraction for Digital Security. 52-56 - Aleksandra Pawlicka

, Marek Pawlicki
, Rafal Kozik
, Michal Choras
:
White Hats in Blue? The Ethical Issues of Employing Hackers in Law Enforcement Agencies. 57-61 - Nicolas Trezza

, Georgios Michail Makrakis
, Dakota Roberson
:
Syslog in IEC 62351-Compliant Systems: Maximizing Effect and Expanding Utilization in Operational Technology. 62-68 - Mohd Anuaruddin Bin Ahmadon

, Nicholas Napp
, Sreedhar Rao, Catarina Silva
, Mark Lizar, Christopher Gorog
, Guang Lu
, Sin-Kuen Hawkins, Stefano Zanero
:
Digital Privacy: Trends, Challenges, and the Future. 69-77 - Hussam Hussein Abu Munshar

, Farah Jemili
, Ouajdi Korbaa
, Mohammad Alauthman
:
Intelligent Control Agent For IoT Network Attack Detection: A Machine Learning Approach. 78-86 - Chris To, Dickson K. W. Chiu

, Cheuk Hang Au
, Kevin K. W. Ho
:
Online News Source Selection, Acceptance, and Sharing Behavior: A Study on Demographic Effects and Political Spectrum. 87-94 - Leonidas Boutsikaris

, Spyros E. Polykalas
:
From Disagreement to Discord: How Social Media Platforms Fuel Conflict Instead of Bridging Divides. 95-100
Volume 27, Number 4, July - August 2025
- Javad Abed

, Varun Awasthi
, Rakesh Singh:
Quantum Shift in Cybersecurity: Strategic Insights for Executives and Practitioners. 4-12 - Amir Dabirian

, Christopher Swarat
, Su Swarat
:
Necessary but Not Perfect: Changes in AI Perception at a Large University. 13-18 - Nir Kshetri

:
The Rise of Agentic AI in Finance: Opportunities, Risks, and Human-Centric Integration. 19-24 - Dario Bottazzi

, Luca Foschini
, Renato Talamo
:
Digital Twins in Industry 4.0: A Practitioner's Perspective. 25-32 - Atul Mahajan

, Ali Shahidinejad
, Keshav Sood
, Mohammad Reza Nosouhi
, Jaswinder Singh
:
A Scheme to Enhance Dense Internet of Things Networks Performance: An Early Evaluation. 33-39 - Carlos Eduardo Ramos Nunes

, Afshin Ashofteh
:
The Feature Stores in Streamlining MLOps Workflows. 40-47 - Sudhir K. Routray

:
Cloud and Edge Computing for Industry 4.0. 48-53 - Jaideep Kaur Mudhar

, Jyoteesh Malhotra
, Sandeep Sharma
, Shalli Rani
:
A Smart Contract Based Efficient and Scalable Delegated Access Authorization Framework for Internet of Medical Things. 54-60 - Wahyu Rahmaniar

, Qazi Mazhar ul Haq
, Muchammad Edo Iskandar, Alfian Ma'arif
:
Practical Applications of Artificial Intelligence: A Sector-Wise Review of Challenges and Future Directions. 61-68 - Eric S. Enos

, Daniel R. Herber
:
Should IT Systems Engineers Adopt Systems Engineering Tools and Methods? 69-75 - Zakaria Maamar

, Amel Benna
, Belkacem Chikhaoui
:
Data-as-an-Asset: Challenges and Futures Directions. 76-81 - Paula Fraga-Lamas

, Sérgio Ivan Lopes
, Tiago M. Fernández-Caramés
:
Towards a Blockchain and Opportunistic Edge Driven Metaverse of Everything. 82-90 - Fahad Salim Dalwai

, S. P. Raja
:
Enhanced Private Blockchain Security: Merging Proof of Authority and Proof of Work in a Hybrid Framework. 91-97 - Stephen J. Andriole

:
AI Strategy, Now. 98-100
Volume 27, Number 5, September - October 2025
- George F. Hurlburt

:
Between the Lines: International IT Initiatives. 4-10 - Sorel Reisman

:
COMPSAC 2025: A Personal Milestone in Toronto: Welcome and Farewell. 11-14 - Stephen J. Andriole

:
Everyone Wants to Give C-Suites Advice: But What Happens When Everything Changes? 15-17 - Nir Kshetri

:
Artificial Intelligence in China's Education: Policy Agendas, Innovation Drivers, and Global Consequences. 18-23 - Ravi S. Sharma

, Nir Kshetri
, Galal H. Galal-Edeen, Sarah Kohail
:
Special Issue on Transformational Artificial Intelligence in the Middle East and Africa. 24-30 - Montassar Ben Messaoud

, Ahmed Nour
, Ilyes Ben Khalifa
, Mohamed Tounsi
, Mohamed Wiem Mkaouer
:
Detecting Software Defects With Hierarchical Multilabel Classification: Insights From an Industrial Case Study. 31-37 - Sean Kruger

:
From Resistance to Readiness: Driving Blue-Collar Workers' Artificial Intelligence Adoption. 38-45 - Sudhir K. Routray

, Sasmita Mohanty
:
Artificial Intelligence in the Middle East and Africa: Needs and Requirements. 46-51 - Senem Kumova Metin

, Hande Aka Uymaz
:
Exploring the Effectiveness of LLM-Generated Context on Emotion Lexicon Word Vectorization: A Comparative Study on Turkish and English. 52-58 - Juan Ramón Santana

, Luis Sánchez
, Martin Bauer
, Benjamin Hebgen
, Ernö Kovacs
, Satsuki Hamaguchi
, Yuriko Nomura
:
On the Need of International Cross-Data Space Interworking: An EU-Japan Case Study. 59-65 - Anirban Sengupta

, Vishal Chourasia
, Nabendu Bhui
:
HLS Trojan Classification and Its Detection Techniques for CAD-Based IP Designs. 66-74 - Irem Karakaya

, Aykut Karakaya
:
The Synergy Between Serverless Computing and Artificial Intelligence: A Complementary Approach. 75-81 - Deepankur Singh

, Mohit Kumar
, Mahesh Patel
, Udaybhan Singh
:
Interoperable Cloud Services for Multi-Cloud Architectures: A Review of Approaches, Challenges and Solutions. 82-89 - Nicholas Svizzero

, Yulu Du
, Pierre Berthon
:
From Soundscape to Strategy: What IT Professionals Need to Know About Spatial Audio Technologies. 90-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














