default search action
George F. Hurlburt
Person information
- affiliation: STEM Corp
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]George F. Hurlburt, Sorel Reisman:
Experts Speak Out About Artificial Intelligence in Education: First of Two Roundtables. Computer 57(1): 21-26 (2024) - [j59]George F. Hurlburt, Sorel Reisman:
Experts Speak Out About Artificial Intelligence in Education: Second of Two Panel Roundtables. Computer 57(2): 14-20 (2024) - [j58]George F. Hurlburt:
Addressing the Perceived Skills Gap. Computer 57(5): 91-96 (2024) - [j57]Joanna F. DeFranco, Nir Kshetri, George K. Thiruvathukal, George F. Hurlburt:
Crowdsourcing: A Roundtable Discussion. Computer 57(8): 15-21 (2024) - [j56]George F. Hurlburt:
Artificial Intelligence, the Workforce and Educational Realities. Computer 57(10): 94-98 (2024) - [j55]George F. Hurlburt, Amir Dabirian:
Why IT Lessons Matter. IT Prof. 26(1): 19-25 (2024) - [j54]George F. Hurlburt:
An Ethical Trio - AI, Cybersecurity, and Coding at Scale. IT Prof. 26(2): 4-9 (2024) - 2023
- [j53]George F. Hurlburt:
The Importance of Educating Computational Educators. Computer 56(3): 131-134 (2023) - [j52]George F. Hurlburt:
Perception of Time and Its Representation in Technical Systems. IT Prof. 25(1): 89-91 (2023) - [j51]George F. Hurlburt:
What If Ethics Got in the Way of Generative AI? IT Prof. 25(2): 4-6 (2023) - [j50]Evangelos Katsadouros, Charalampos Z. Patrikakis, George F. Hurlburt:
Can Large Language Models Better Predict Software Vulnerability? IT Prof. 25(3): 4-8 (2023) - [j49]George F. Hurlburt:
The Edgy Nature of Green IT. IT Prof. 25(4): 17-20 (2023) - 2022
- [j48]Irena Bojanova, George F. Hurlburt:
IT Professional - Retrospectives and Perspectives. IT Prof. 24(1): 4-8 (2022) - [j47]George F. Hurlburt:
Predicting Social Behavior of Tribes and Misinformation. IT Prof. 24(2): 78-82 (2022) - [j46]George F. Hurlburt:
Thinking and Feeling Cognitive Security? IT Prof. 24(5): 77-80 (2022) - 2021
- [j45]George F. Hurlburt:
The Knowledge Graph as an Ontological Framework. IT Prof. 23(4): 14-18 (2021) - [j44]George F. Hurlburt:
A Disruptive Transformation in Digital Transformation. IT Prof. 23(5): 4-7 (2021) - [j43]George F. Hurlburt:
Low-Code, No-Code, What's Under the Hood? IT Prof. 23(6): 4-7 (2021)
2010 – 2019
- 2019
- [j42]George F. Hurlburt:
The Tyranny of Urgency. Computer 52(6): 68-72 (2019) - 2018
- [j41]George F. Hurlburt:
Toward Applied Cyberethics. Computer 51(9): 80-84 (2018) - [j40]George F. Hurlburt:
Thinking Critically about Algorithmic Thinking. IT Prof. 20(2): 5-10 (2018) - [j39]Maria R. Lee, David C. Yen, George F. Hurlburt:
Financial Technologies and Applications. IT Prof. 20(2): 27-33 (2018) - [j38]George F. Hurlburt:
Emoji: Lingua Franca or Passing Fancy? IT Prof. 20(5): 14-19 (2018) - 2017
- [j37]George F. Hurlburt:
Shining Light on the Dark Web. Computer 50(4): 100-105 (2017) - [j36]George F. Hurlburt:
Superintelligence: Myth or Pressing Reality? IT Prof. 19(1): 6-11 (2017) - [j35]George F. Hurlburt:
How Much to Trust Artificial Intelligence? IT Prof. 19(4): 7-11 (2017) - [j34]George F. Hurlburt, George K. Thiruvathukal, Maria R. Lee:
The Graph Database: Jack of All Trades or Just Not SQL? IT Prof. 19(6): 21-25 (2017) - 2016
- [j33]George F. Hurlburt:
"Good Enough" Security: The Best We'll Ever Have. Computer 49(7): 98-101 (2016) - [j32]George F. Hurlburt:
Might the Blockchain Outlive Bitcoin? IT Prof. 18(2): 12-16 (2016) - [j31]George F. Hurlburt, Jeffrey M. Voas:
Software is Driving Software Engineering? IEEE Softw. 33(1): 101-104 (2016) - 2015
- [j30]George F. Hurlburt:
Cyberhuman Security. Computer 48(5): 88-91 (2015) - [j29]Jeffrey M. Voas, George F. Hurlburt:
Third-Party Software's Trust Quagmire. Computer 48(12): 80-87 (2015) - [j28]George F. Hurlburt:
The internet of things... of all things. XRDS 22(2): 22-26 (2015) - [j27]George F. Hurlburt:
High Tech, High Sec.: Security Concerns in Graph Databases. IT Prof. 17(1): 58-61 (2015) - [j26]Irena Bojanova, Jeffrey M. Voas, George F. Hurlburt:
The Internet of Anything and Sustainability. IT Prof. 17(3): 14-16 (2015) - 2014
- [j25]George F. Hurlburt, Jeffrey M. Voas:
Big Data, Networked Worlds. Computer 47(4): 84-87 (2014) - [j24]Irena Bojanova, George F. Hurlburt, Jeffrey M. Voas:
Imagineering an Internet of Anything. Computer 47(6): 72-77 (2014) - [j23]George F. Hurlburt, Irena Bojanova, Ann E. Kelley Sobel, Keesha Crosby:
Security or Privacy? A Matter of Perspective. Computer 47(11): 94-98 (2014) - [j22]J. Morris Chang, Joseph Williams, George F. Hurlburt:
Mobile Commerce. IT Prof. 16(3): 4-5 (2014) - [j21]George F. Hurlburt, Irena Bojanova:
Bitcoin: Benefit or Curse? IT Prof. 16(3): 10-15 (2014) - [j20]George F. Hurlburt, Irena Bojanova, Robert Berezdivin:
Computational Networks: Challenging Traditional Program Management. IT Prof. 16(6): 66-69 (2014) - 2013
- [j19]George F. Hurlburt, Jeffrey M. Voas:
Beyond the Cloud: Cyberphysical Systems. IT Prof. 15(2): 2-4 (2013) - [j18]George F. Hurlburt:
Complexity Theory: A New Paradigm for Software Integration. IT Prof. 15(3): 26-31 (2013) - [j17]George F. Hurlburt, Jeffrey M. Voas:
STEM's Grand Challenge: Reviving Applied Mathematics. IT Prof. 15(5): 51-55 (2013) - 2012
- [j16]David F. Ferraiolo, Jeffrey M. Voas, George F. Hurlburt:
A Matter of Policy. IT Prof. 14(2): 4-7 (2012) - [j15]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
The Internet of Things: A Reality Check. IT Prof. 14(3): 56-59 (2012) - [j14]Keith W. Miller, Jeffrey M. Voas, George F. Hurlburt:
BYOD: Security and Privacy Considerations. IT Prof. 14(5): 53-55 (2012) - [j13]George F. Hurlburt:
Web 2.0 Social Media: A Commercialization Conundrum. IT Prof. 14(6): 6-8 (2012) - 2011
- [j12]Phillip A. Laplante, George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
Certainty through Uncertainty? Computer 44(2): 79-81 (2011) - [j11]Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. IT Prof. 13(2): 6-9 (2011) - [j10]George F. Hurlburt, Jeffrey M. Voas:
Timing Matters: Tackling Intractable Problems. IT Prof. 13(3): 4-6 (2011) - [j9]George F. Hurlburt, Jeffrey M. Voas:
The Evolution of Ubiquitously Intelligent Computing. IT Prof. 13(4): 56-60 (2011) - [j8]George F. Hurlburt, Jeffrey M. Voas:
Storytelling: From Cave Art to Digital Media. IT Prof. 13(5): 4-7 (2011) - [j7]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile-App Addiction: Threat to Security? IT Prof. 13(6): 9-11 (2011) - 2010
- [j6]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael:
A Nonlinear Perspective on Higher Education. Computer 43(12): 90-92 (2010) - [j5]George F. Hurlburt:
Systems Engineering as a Literate Behavior. IT Prof. 12(4): 12-17 (2010) - [j4]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile Applications: The Fifth Cycle. IT Prof. 12(6): 56-60 (2010)
2000 – 2009
- 2009
- [j3]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008. IT Prof. 11(1): 14-19 (2009) - [j2]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day:
Privacy and/or Security: Take Your Pick. IT Prof. 11(4): 52-55 (2009) - [j1]John Harauz, Jeffrey M. Voas, George F. Hurlburt:
Trustworthiness in Software Environments. IT Prof. 11(5): 35-40 (2009) - 2005
- [c1]George F. Hurlburt:
Development Of The Warfighting Architecture Requirements (War) Tool. WORDS 2005: 97-104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint