![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IT Professional, Volume 13
Volume 13, Number 1, January - February 2011
- Simon Liu:
IT Professional in 2011. 4-5 - San Murugesan
:
The Rise of Emerging Markets: Opportunities and Challenges for IT. 6-8 - Shirley Radack, Rick Kuhn:
Managing Security: The Security Content Automation Protocol. 9-11 - Michael J. Assante, David H. Tobey:
Enhancing the Cybersecurity Workforce. 12-15 - San Murugesan
, Phillip A. Laplante:
IT for a Greener Planet [Guest editors' introduction]. 16-18 - Robert R. Harmon, Haluk Demirkan:
The Next Wave of Sustainable IT. 19-25 - Radhika Jain, Raquel Benbunan-Fich, Kannan Mohan:
Assessing Green IT Initiatives Using the Balanced Scorecard. 26-32 - Brian Donnellan
, Charles Sheridan, Edward Curry
:
A Capability Maturity Framework for Sustainable Information and Communication Technology. 33-40 - Indranil Bose, Shipeng Yan
:
The Green Potential of RFID Projects: A Case-Based Analysis. 41-47 - Aruna Prem Bianzino, Anand Kishore Raju, Dario Rossi:
Greening the Internet: Measuring Web Power Consumption. 48-53 - Jonas Hedman, Stefan Henningsson:
Three Strategies for Green IT. 54-57 - Linda Wilbanks:
Performance Reviews. 58-60 - Tom Costello:
2011 IT Tech and Strategy Trends. 61-65
Volume 13, Number 2, March - April 2011
- Phillip A. Laplante:
Exciting Real-Time Location Applications. 4-5 - Jeffrey M. Voas, George F. Hurlburt
, Keith W. Miller
, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. 6-9 - Linda Wilbanks:
Other Duties as Assigned? 10-11 - J. Morris Chang, Yo-Ping Huang, Simon Liu:
Real-Time Location Systems and RFID. 12-13 - Shu-Hui Yang, Pao-Ann Hsiung:
Real-Time Services for Special Education. 14-19 - Chia-Hui Wei, Min-Shiang Hwang, A. Y. Chin:
A Mutual Authentication Protocol for RFID. 20-24 - Yo-Ping Huang, Shan-Shan Wang, Frode Eika Sandnes
:
RFID-Based Guide Gives Museum Visitors More Freedom. 25-29 - Yue-Shan Chang, Chih-Tien Fan, Yu-Sheng Wu:
Agent-Based Intelligent Software Exploits Near-Field Communication. 30-36 - Ivor D'Souza, Wei Ma, Cindy Notobartolo:
Real-Time Location Systems for Hospital Emergency Response. 37-43 - Jay Liebowitz:
Interruption Management: A Review and Implications for IT Professionals. 44-48 - J. Y. Xu:
Web-Based Billing System Exploits Mature and Emerging Technology. 49-55 - Bhuvan Unhelkar:
Green IT: The Next Five Years. 56-59 - Max Froumentin, Stéphane Boyera:
Mobile Entrepreneurship in Africa. 60-62 - Thomas Costello:
IT without Hardware. 63-64
Volume 13, Number 3, May - June 2011
- George F. Hurlburt
, Jeffrey M. Voas:
Timing Matters: Tackling Intractable Problems. 4-6 - A. Sharma:
IT in Governance in the 21st Century. 7-9 - J. Hogan:
The Leadership Lever. 10-13 - Bruce Potter:
Coming to Grips with Security. 14-17 - John Quan, Kara L. Nance, Brian Hay:
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments. 18-23 - Stefan Fenz
, Simon Edward Parkin, Aad P. A. van Moorsel:
A Community Knowledge Base for IT Security. 24-30 - Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services Framework. 31-37 - P. Brown, J. Kelly, D. Querusio:
Toward a Healthcare Business-Process Reference Model. 38-47 - J. J. Teeter:
Flexible Medical-Grade Networks. 48-51 - Adam Marks, Yacine Rezgui
:
IT Leadership in Higher Education: The CIO Candidate. 52-56 - Keith W. Miller:
Moral Responsibility for Computing Artifacts: "The Rules". 57-59 - Linda Wilbanks:
You Need a Vacation. 60-61 - Tom Costello:
Lean: More than a Shop-Floor Fad. 64-63
Volume 13, Number 4, July - August 2011
- Irena Bojanova:
Physical Presence through Virtual Worlds. 4-5 - Phillip A. Laplante:
Ender Wiggin Played Mafia Wars Too. 6-8 - Steve Quirolgico, Jeffrey M. Voas, Rick Kuhn:
Vetting Mobile Apps. 9-11 - Mile Corrigan, H. Gilbert Miller:
Toward a User-Centric Digital Ecosystem. 12-15 - Sunil Mithas
, Thomas Costello, Ali Tafti:
Social Networking in the Enterprise. 16-17 - Vishal Sachdev:
Motivations for Social Computing. 18-23 - Stephen Anderson, Kannan Mohan:
Social Networking in Knowledge Management. 24-28 - Konstantinos Christidis
, Gregoris Mentzas
, Dimitris Apostolou:
Supercharging Enterprise 2.0. 29-35 - Henry C. Lucas Jr., Sunil Mithas
:
Foreign-Born IT Workers in the US: Complements, not Substitutes. 36-40 - Chris Asakiewicz:
Business Investments in IT: Managing Integration Risks. 41-45 - Rita Noumeir:
Sharing Medical Records: The XDS Architecture and Communication Infrastructure. 46-52 - Ashok Jhunjhunwala, Janani Rangarajan:
Connecting the Next Billion: Empowering Rural India. 53-55 - George F. Hurlburt
, Jeffrey M. Voas:
The Evolution of Ubiquitously Intelligent Computing. 56-60 - Beverly Prohaska:
Social Media for the Collaborative Enterprise. 64-63
Volume 13, Number 5, September - October 2011
- George F. Hurlburt
, Jeffrey M. Voas:
Storytelling: From Cave Art to Digital Media. 4-7 - Ramesh C. Jain, David Sonnen:
Social Life Networks. 8-11 - San Murugesan
, Gustavo Rossi
, Linda Wilbanks, G. Reza Djavanshir:
The Future of Web Apps. 12-14 - Haluk Demirkan, Robert R. Harmon, Michael Goul:
A Service-Oriented Web Application Framework. 15-21 - Florian Daniel
, Maristella Matera
, Michael Weiss:
Next in Mashup Development: User-Created Apps on the Web. 22-29 - Markku Laine, Denis Shestakov, Evgenia Litvinova, Petri Vuorimaa:
Toward Unified Web Application Development. 30-36 - Laura Ferrari, Marco Mamei
, Franco Zambonelli
:
All-About Digital Diaries: Opportunities and Challenges. 37-43 - Stéphane Gagnon
, Véronique Nabelsi, Katia Passerini
, Kemal Cakici:
The Next Web Apps Architecture: Challenges for SaaS Vendors. 44-50 - Marcelo Nogueira Cortimiglia
, Antonio Ghezzi
, Filippo Renga:
Mobile Applications and Their Delivery Platforms. 51-56 - Chad Fulgham, Jeffrey Johnson, Mark Crandall, Leo Jackson, Nathan Burrows:
The FBI Gets Agile. 57-59 - Linda Wilbanks:
Conference Attendance. 60-61 - Tom Costello:
Better Budget Planning. 64-63
Volume 13, Number 6, November - December 2011
- Thomas Jepsen:
The Next Big Thing. 4-5 - San Murugesan
:
What We Can Learn from Steve Jobs. 6-8 - George F. Hurlburt
, Jeffrey M. Voas, Keith W. Miller
:
Mobile-App Addiction: Threat to Security? 9-11 - Keith W. Miller
:
Courageous Computing. 12-13 - Jay Liebowitz, William W. Agresti:
IT Education for Practitioners. 14-15 - Alan D. Carswell, Irena Bojanova:
E-Learning for IT Professionals: The UMUC Experience. 16-21 - John Baker:
Challenging the Traditional Graduate Information Systems Program. 22-27 - Susan Camarena:
The Promise of IT: Educating the Federal Government. 28-33 - Michael Koval:
The Technologist's Tool Set: A CIO's Perspective. 34-39 - Lars Mathiassen, Tuure Tuunanen:
Managing Requirements Risks in IT Projects. 40-47 - Ciro D'Urso
:
Information Integration for Facility Management. 48-53 - Edward J. Coyne, Timothy R. Weil, Rick Kuhn:
Role Engineering: Methods and Standards. 54-57 - Nuno Pereira, David Vera, H. Gilbert Miller:
Business Process Management and the Social Web. 58-59 - San Murugesan
:
Cloud Computing Gives Emerging Markets a Lift. 60-62 - Tom Costello:
Specialists or Generalists? 64
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.