Search dblp for Publications

export results for "toc:db/journals/itpro/itpro15.bht:"

 download as .bib file

@article{DBLP:journals/itpro/AkiyamaYH13,
  author       = {Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Takeo Hariu},
  title        = {Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious
                  URLs},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {50--56},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.118},
  doi          = {10.1109/MITP.2012.118},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/AkiyamaYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Anderson13,
  author       = {Julie M. Anderson},
  title        = {Government Risk Management Lags behind Vendor Practices},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {5--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.29},
  doi          = {10.1109/MITP.2013.29},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Anderson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Averweg13,
  author       = {Udo Richard Averweg},
  title        = {Information Systems: Practitioner-Based Inquiry Research},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {44--47},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.27},
  doi          = {10.1109/MITP.2012.27},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Averweg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/BaqueroPM13,
  author       = {Alejandro Vera Baquero and
                  Ricardo Colomo Palacios and
                  Owen Molloy},
  title        = {Business Process Analytics Using a Big Data Approach},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {29--35},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.60},
  doi          = {10.1109/MITP.2013.60},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/BaqueroPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/BojanovaZV13,
  author       = {Irena Bojanova and
                  Jia Zhang and
                  Jeffrey M. Voas},
  title        = {Cloud Computing},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {12--14},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.26},
  doi          = {10.1109/MITP.2013.26},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/BojanovaZV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Chang13,
  author       = {J. Morris Chang},
  title        = {New Trends in Cybersecurity},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {2--3},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.70},
  doi          = {10.1109/MITP.2013.70},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Chang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ChangFHKWDCGKK13,
  author       = {J. Morris Chang and
                  Chi{-}Chen Fang and
                  Kuan{-}Hsing Ho and
                  Norene Kelly and
                  Pei Yuan Wu and
                  Yixiao Ding and
                  Chris Chu and
                  Stephen B. Gilbert and
                  Ahmed E. Kamal and
                  Sun{-}Yuan Kung},
  title        = {Capturing Cognitive Fingerprints from Keystroke Dynamics},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {24--28},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.52},
  doi          = {10.1109/MITP.2013.52},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/ChangFHKWDCGKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ChauhanS13,
  author       = {Nitin Singh Chauhan and
                  Ashutosh Saxena},
  title        = {A Green Software Development Life Cycle for Cloud Computing},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {28--34},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.6},
  doi          = {10.1109/MITP.2013.6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/ChauhanS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CortimigliaFS13,
  author       = {Marcelo Nogueira Cortimiglia and
                  Alejandro Germ{\'{a}}n Frank and
                  Liziane Seben},
  title        = {Tablets: The Next Disruptive Computing Technology?},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {18--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.117},
  doi          = {10.1109/MITP.2012.117},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/CortimigliaFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Costello13,
  author       = {Tom Costello},
  title        = {Random Thoughts for CIOs},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.71},
  doi          = {10.1109/MITP.2013.71},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Costello13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Costello13a,
  author       = {Tom Costello},
  title        = {Vendor Management},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.101},
  doi          = {10.1109/MITP.2013.101},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Costello13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CostelloLBFCKDM13,
  author       = {Tom Costello and
                  Mark A. Langley and
                  Kirk Botula and
                  Eileen Forrester and
                  Martin Curley and
                  Jim Kenneally and
                  Martin Delaney and
                  Stephen McLaughlin},
  title        = {{IT} Frameworks},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.79},
  doi          = {10.1109/MITP.2013.79},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/CostelloLBFCKDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CostelloP13,
  author       = {Tom Costello and
                  Beverly Prohaska},
  title        = {Why Is {IT} Still Broken?},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.34},
  doi          = {10.1109/MITP.2013.34},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/CostelloP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CostelloP13a,
  author       = {Tom Costello and
                  Beverly Prohaska},
  title        = {Innovation},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.42},
  doi          = {10.1109/MITP.2013.42},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/CostelloP13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CoyneW13,
  author       = {Ed Coyne and
                  Timothy R. Weil},
  title        = {{ABAC} and {RBAC:} Scalable, Flexible, and Auditable Access Management},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {14--16},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.37},
  doi          = {10.1109/MITP.2013.37},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/CoyneW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Demirkan13,
  author       = {Haluk Demirkan},
  title        = {A Smart Healthcare Systems Framework},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {38--45},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.35},
  doi          = {10.1109/MITP.2013.35},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Demirkan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/DeutschmannNN13,
  author       = {Ingo Deutschmann and
                  Peder Nordstrom and
                  Linus Nilsson},
  title        = {Continuous Authentication Using Behavioral Biometrics},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {12--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.50},
  doi          = {10.1109/MITP.2013.50},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/DeutschmannNN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/FrankeMCAB13,
  author       = {Craig Franke and
                  Samuel Morin and
                  Artem Chebotko and
                  John Abraham and
                  Pearl Brazier},
  title        = {Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {36--43},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.42},
  doi          = {10.1109/MITP.2012.42},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/FrankeMCAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/FridmanSABJGK13,
  author       = {Alex Fridman and
                  Ariel Stolerman and
                  Sayandeep Acharya and
                  Patrick Brennan and
                  Patrick Juola and
                  Rachel Greenstadt and
                  Moshe Kam},
  title        = {Decision Fusion for Multimodal Active Authentication},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {29--33},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.53},
  doi          = {10.1109/MITP.2013.53},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/FridmanSABJGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/GraubnerSF13,
  author       = {Pablo Graubner and
                  Matthias Schmidt and
                  Bernd Freisleben},
  title        = {Energy-Efficient Virtual Machine Consolidation},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {28--34},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.48},
  doi          = {10.1109/MITP.2012.48},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/GraubnerSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Guidorizzi13,
  author       = {Richard P. Guidorizzi},
  title        = {Security: Active Authentication},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {4--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.73},
  doi          = {10.1109/MITP.2013.73},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Guidorizzi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/HosmanB13,
  author       = {Laura Hosman and
                  Bruce Baikie},
  title        = {Solar-Powered Cloud Computing Datacenters},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {15--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2011.116},
  doi          = {10.1109/MITP.2011.116},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/HosmanB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Hurlburt13,
  author       = {George F. Hurlburt},
  title        = {Complexity Theory: {A} New Paradigm for Software Integration},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {26--31},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.87},
  doi          = {10.1109/MITP.2012.87},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Hurlburt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/HurlburtV13,
  author       = {George F. Hurlburt and
                  Jeffrey M. Voas},
  title        = {Beyond the Cloud: Cyberphysical Systems},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {2--4},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.24},
  doi          = {10.1109/MITP.2013.24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/HurlburtV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/HurlburtV13a,
  author       = {George F. Hurlburt and
                  Jeffrey M. Voas},
  title        = {STEM's Grand Challenge: Reviving Applied Mathematics},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {51--55},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.84},
  doi          = {10.1109/MITP.2013.84},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/HurlburtV13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/IdziorekTJ13,
  author       = {Joseph Idziorek and
                  Mark Tannian and
                  Douglas Jacobson},
  title        = {The Insecurity of Cloud Utility Models},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {22--27},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.43},
  doi          = {10.1109/MITP.2012.43},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/IdziorekTJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/JimeiYM13,
  author       = {Li Jimei and
                  Hu Yuzhou and
                  Du Meijie},
  title        = {{XBRL} in the Chinese Financial Ecosystem},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {36--42},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.59},
  doi          = {10.1109/MITP.2013.59},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/JimeiYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/JosephJ13,
  author       = {Rhoda C. Joseph and
                  Norman A. Johnson},
  title        = {Big Data and Transformational Government},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {43--48},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.61},
  doi          = {10.1109/MITP.2013.61},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/JosephJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/JuolaNSRBG13,
  author       = {Patrick Juola and
                  John Noecker Jr. and
                  Ariel Stolerman and
                  Michael Ryan and
                  Patrick Brennan and
                  Rachel Greenstadt},
  title        = {Keyboard-Behavior-Based Authentication},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {8--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.49},
  doi          = {10.1109/MITP.2013.49},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/JuolaNSRBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/KallbergT13,
  author       = {Jan Kallberg and
                  Bhavani Thuraisingham},
  title        = {State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic
                  Cyberattacks},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {32--35},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.20},
  doi          = {10.1109/MITP.2013.20},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/KallbergT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/KassahunM13,
  author       = {Asmare Emerie Kassahun and
                  Alemayehu Molla},
  title        = {{IT} Reengineers Government Processes in Africa},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {10--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.44},
  doi          = {10.1109/MITP.2013.44},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/KassahunM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/KikuchiM13,
  author       = {Shinji Kikuchi and
                  Yasuhide Matsumoto},
  title        = {Using Model Checking to Evaluate Live Migrations},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {36--41},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.45},
  doi          = {10.1109/MITP.2012.45},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/KikuchiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Kissel13,
  author       = {Richard Kissel},
  title        = {Avoiding Accidental Data Loss},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {12--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.75},
  doi          = {10.1109/MITP.2013.75},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Kissel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Kshetri13,
  author       = {Nir Kshetri},
  title        = {{IT} in the Chinese Healthcare Industry},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {12--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.14},
  doi          = {10.1109/MITP.2013.14},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Kshetri13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Kshetri13a,
  author       = {Nir Kshetri},
  title        = {Cloud Computing in Sub-Saharan Africa},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {64--67},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.92},
  doi          = {10.1109/MITP.2013.92},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Kshetri13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/LakshmananK13,
  author       = {Geetika T. Lakshmanan and
                  Rania Khalaf},
  title        = {Leveraging Process-Mining Techniques},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {22--30},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.88},
  doi          = {10.1109/MITP.2012.88},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/LakshmananK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Laplante13,
  author       = {Phillip A. Laplante},
  title        = {Courses for the Masses?},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {57--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.27},
  doi          = {10.1109/MITP.2013.27},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Laplante13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Laplante13a,
  author       = {Phillip A. Laplante},
  title        = {Who's Afraid of Big Data?},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {6--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.86},
  doi          = {10.1109/MITP.2013.86},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Laplante13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Laplante13b,
  author       = {Phillip A. Laplante},
  title        = {Career Advice},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {7--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.91},
  doi          = {10.1109/MITP.2013.91},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Laplante13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/LaplanteJWC13,
  author       = {Phillip A. Laplante and
                  Thomas C. Jepsen and
                  Joseph Williams and
                  Fulvio Corno},
  title        = {Innovative and Disruptive Technologies [From the Editors]},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {4--5},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.43},
  doi          = {10.1109/MITP.2013.43},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/LaplanteJWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/LarsonM13,
  author       = {David K. Larson and
                  Keith W. Miller},
  title        = {Medical Records and Software Trust},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {8--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.32},
  doi          = {10.1109/MITP.2013.32},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/LarsonM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Lee13,
  author       = {Yuan{-}Fa Lee},
  title        = {Personal Medical Monitoring System: Addressing Interoperability},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {31--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.90},
  doi          = {10.1109/MITP.2012.90},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Lee13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/LeeC13,
  author       = {Maria R. Lee and
                  Tsung Teng Chen},
  title        = {Understanding Social Computing Research},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {56--62},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.121},
  doi          = {10.1109/MITP.2012.121},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/LeeC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Liu13,
  author       = {Simon Liu},
  title        = {Engineering the Success of Software Development},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {4--5},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.76},
  doi          = {10.1109/MITP.2013.76},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Liu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Miller13,
  author       = {Keith W. Miller},
  title        = {A Secret Sociotechnical System},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {57--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.65},
  doi          = {10.1109/MITP.2013.65},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Miller13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Miller13a,
  author       = {Keith W. Miller},
  title        = {Technology, Unemployment, and Power},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {10--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.99},
  doi          = {10.1109/MITP.2013.99},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Miller13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/MillerM13,
  author       = {H. Gilbert Miller and
                  Peter Mork},
  title        = {From Data to Decisions: {A} Value Chain for Big Data},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {57--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.11},
  doi          = {10.1109/MITP.2013.11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/MillerM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/MithasLEMD13,
  author       = {Sunil Mithas and
                  Maria R. Lee and
                  Seth Earley and
                  San Murugesan and
                  G. Reza Djavanshir},
  title        = {Leveraging Big Data and Business Analytics},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {18--20},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.95},
  doi          = {10.1109/MITP.2013.95},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/MithasLEMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Murugesan13,
  author       = {San Murugesan},
  title        = {Mobile Apps in Africa},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {8--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.83},
  doi          = {10.1109/MITP.2013.83},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/Murugesan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Ojala13,
  author       = {Arto Ojala},
  title        = {Software-as-a-Service Revenue Models},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {54--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.73},
  doi          = {10.1109/MITP.2012.73},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Ojala13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/PatelYFZCCD13,
  author       = {Vishal M. Patel and
                  Tom Yeh and
                  Mohammed E. Fathy and
                  Yangmuzi Zhang and
                  Yan Chen and
                  Rama Chellappa and
                  Larry S. Davis},
  title        = {Screen Fingerprints: {A} Novel Modality for Active Authentication},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {38--42},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.56},
  doi          = {10.1109/MITP.2013.56},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/PatelYFZCCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Payne13,
  author       = {Jeffery Payne},
  title        = {Secure Mobile Application Development},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {6--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.46},
  doi          = {10.1109/MITP.2013.46},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Payne13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/PayneFK13,
  author       = {Jeffery Payne and
                  Mark Fenner and
                  Jonathan Kauffman},
  title        = {System Event Monitoring for Active Authentication},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {34--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.57},
  doi          = {10.1109/MITP.2013.57},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/PayneFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/PetterW13,
  author       = {Stacie Petter and
                  Kerry Ward},
  title        = {Countdown to Y2Gray},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {49--55},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.86},
  doi          = {10.1109/MITP.2012.86},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/PetterW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Pollard13,
  author       = {Carol Pollard},
  title        = {The {US} Government's Evolving Role in {IT} Energy Management},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {36--43},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.18},
  doi          = {10.1109/MITP.2013.18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Pollard13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/PonnapalliS13,
  author       = {Harigopal K. B. Ponnapalli and
                  Ashutosh Saxena},
  title        = {A Digital Signature Architecture for Web Apps},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {42--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.23},
  doi          = {10.1109/MITP.2012.23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/PonnapalliS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/RajuLDB13,
  author       = {Anand Kishore Raju and
                  Sven Lindmark and
                  Simon Delaere and
                  Pieter Ballon},
  title        = {A Holistic Impact-Assessment Framework for Green {ICT}},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {50--56},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.119},
  doi          = {10.1109/MITP.2012.119},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/RajuLDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SabharwalAM13,
  author       = {Manuj Sabharwal and
                  Abhishek Agrawal and
                  Grace Metri},
  title        = {Enabling Green {IT} through Energy-Aware Software},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {19--27},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.104},
  doi          = {10.1109/MITP.2012.104},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/SabharwalAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SampleS13,
  author       = {Char Sample and
                  Kim Schaffer},
  title        = {An Overview of Anomaly Detection},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {8--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.7},
  doi          = {10.1109/MITP.2013.7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/SampleS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SeiboldJK13,
  author       = {Michael Seibold and
                  Dean Jacobs and
                  Alfons Kemper},
  title        = {Operational Business Intelligence: Processing Mixed Workloads},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {16--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.68},
  doi          = {10.1109/MITP.2012.68},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/SeiboldJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13,
  author       = {Abdul Serwadda and
                  Zibo Wang and
                  Patrick Koch and
                  Sathya Govindarajan and
                  Raviteja Pokala and
                  Adam Goodkind and
                  David Guy Brizan and
                  Andrew Rosenberg and
                  Vir V. Phoha and
                  Kiran S. Balagani},
  title        = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {20--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.51},
  doi          = {10.1109/MITP.2013.51},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Sherwood13,
  author       = {George Sherwood},
  title        = {Lessons Learned from Hurricane Sandy: Maintaining Service during a
                  Disaster},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {4--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.15},
  doi          = {10.1109/MITP.2013.15},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/Sherwood13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SrinivasanA13,
  author       = {Uma Srinivasan and
                  Bavani Arunasalam},
  title        = {Leveraging Big Data Analytics to Reduce Healthcare Costs},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {21--28},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.55},
  doi          = {10.1109/MITP.2013.55},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/SrinivasanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SrivastavaMJ13,
  author       = {Shirish C. Srivastava and
                  Sunil Mithas and
                  Bimlendra Jha},
  title        = {What Is Your Global Innovation Strategy?},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {2--6},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.102},
  doi          = {10.1109/MITP.2013.102},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/SrivastavaMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ThackstonU13,
  author       = {Russell Thackston and
                  David A. Umphress},
  title        = {Micropreneurs: The Rise of the MicroISV},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {50--56},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.28},
  doi          = {10.1109/MITP.2012.28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/ThackstonU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ToCL13,
  author       = {Wai{-}Ming To and
                  Andy W. L. Chung and
                  Linda S. L. Lai},
  title        = {Creating Green Awareness Using {IT:} The Case of Hong Kong},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {44--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.105},
  doi          = {10.1109/MITP.2012.105},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/ToCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ToLC13,
  author       = {Wai{-}Ming To and
                  Linda S. L. Lai and
                  Andy W. L. Chung},
  title        = {Cloud Computing in China: Barriers and Potential},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {48--53},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.64},
  doi          = {10.1109/MITP.2012.64},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/ToLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Viaene13,
  author       = {Stijn Viaene},
  title        = {Data Scientists Aren't Domain Experts},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {12--17},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.93},
  doi          = {10.1109/MITP.2013.93},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Viaene13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/WheelerVCDTBT13,
  author       = {Jenifer Wheeler and
                  Denise Varner and
                  John Carrola and
                  Christopher Dahlberg and
                  Thomas Thornton and
                  Corey Bohil and
                  Kelly Terry},
  title        = {Covert Cognitive Games and User Response Patterns},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {16--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.58},
  doi          = {10.1109/MITP.2013.58},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/WheelerVCDTBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilbanks13,
  author       = {Linda Wilbanks},
  title        = {Ethical Dilemmas in the Workplace},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {1},
  pages        = {60--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.9},
  doi          = {10.1109/MITP.2013.9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilbanks13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilbanks13a,
  author       = {Linda Wilbanks},
  title        = {Changing Jobs},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {2},
  pages        = {60--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.25},
  doi          = {10.1109/MITP.2013.25},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilbanks13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilbanks13b,
  author       = {Linda Wilbanks},
  title        = {Changing Jobs, Part {II:} The Transition},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {3},
  pages        = {60--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.39},
  doi          = {10.1109/MITP.2013.39},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilbanks13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilbanks13c,
  author       = {Linda Wilbanks},
  title        = {Changing Jobs, Part {III:} Starting a New Job},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {60--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.66},
  doi          = {10.1109/MITP.2013.66},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilbanks13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilbanks13d,
  author       = {Linda Wilbanks},
  title        = {Office Etiquette During the Holidays},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {6},
  pages        = {68--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.97},
  doi          = {10.1109/MITP.2013.97},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilbanks13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Wilson13,
  author       = {Kelce S. Wilson},
  title        = {Conflicts Among the Pillars of Information Assurance},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {44--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.24},
  doi          = {10.1109/MITP.2012.24},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Wilson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Yu13,
  author       = {Liguo Yu},
  title        = {The Market-Driven Software Ecosystem},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {5},
  pages        = {46--50},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2012.102},
  doi          = {10.1109/MITP.2012.102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/Yu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics