- Asmare Emerie Kassahun, Alemayehu Molla:
IT Reengineers Government Processes in Africa. IT Prof. 15(3): 10-13 (2013) - Shinji Kikuchi, Yasuhide Matsumoto:
Using Model Checking to Evaluate Live Migrations. IT Prof. 15(2): 36-41 (2013) - Richard Kissel:
Avoiding Accidental Data Loss. IT Prof. 15(5): 12-15 (2013) - Nir Kshetri:
IT in the Chinese Healthcare Industry. IT Prof. 15(1): 12-15 (2013) - Nir Kshetri:
Cloud Computing in Sub-Saharan Africa. IT Prof. 15(6): 64-67 (2013) - Geetika T. Lakshmanan, Rania Khalaf:
Leveraging Process-Mining Techniques. IT Prof. 15(5): 22-30 (2013) - Phillip A. Laplante:
Courses for the Masses? IT Prof. 15(2): 57-59 (2013) - Phillip A. Laplante:
Who's Afraid of Big Data? IT Prof. 15(5): 6-7 (2013) - Phillip A. Laplante:
Career Advice. IT Prof. 15(6): 7-9 (2013) - Phillip A. Laplante, Thomas C. Jepsen, Joseph Williams, Fulvio Corno:
Innovative and Disruptive Technologies [From the Editors]. IT Prof. 15(3): 4-5 (2013) - David K. Larson, Keith W. Miller:
Medical Records and Software Trust. IT Prof. 15(2): 8-11 (2013) - Yuan-Fa Lee:
Personal Medical Monitoring System: Addressing Interoperability. IT Prof. 15(5): 31-37 (2013) - Maria R. Lee, Tsung Teng Chen:
Understanding Social Computing Research. IT Prof. 15(6): 56-62 (2013) - Simon Liu:
Engineering the Success of Software Development. IT Prof. 15(5): 4-5 (2013) - Keith W. Miller:
A Secret Sociotechnical System. IT Prof. 15(4): 57-59 (2013) - Keith W. Miller:
Technology, Unemployment, and Power. IT Prof. 15(6): 10-11 (2013) - H. Gilbert Miller, Peter Mork:
From Data to Decisions: A Value Chain for Big Data. IT Prof. 15(1): 57-59 (2013) - Sunil Mithas, Maria R. Lee, Seth Earley, San Murugesan, G. Reza Djavanshir:
Leveraging Big Data and Business Analytics. IT Prof. 15(6): 18-20 (2013) - San Murugesan:
Mobile Apps in Africa. IT Prof. 15(5): 8-11 (2013) - Arto Ojala:
Software-as-a-Service Revenue Models. IT Prof. 15(3): 54-59 (2013) - Vishal M. Patel, Tom Yeh, Mohammed E. Fathy, Yangmuzi Zhang, Yan Chen, Rama Chellappa, Larry S. Davis:
Screen Fingerprints: A Novel Modality for Active Authentication. IT Prof. 15(4): 38-42 (2013) - Jeffery Payne:
Secure Mobile Application Development. IT Prof. 15(3): 6-9 (2013) - Jeffery Payne, Mark Fenner, Jonathan Kauffman:
System Event Monitoring for Active Authentication. IT Prof. 15(4): 34-37 (2013) - Stacie Petter, Kerry Ward:
Countdown to Y2Gray. IT Prof. 15(6): 49-55 (2013) - Carol Pollard:
The US Government's Evolving Role in IT Energy Management. IT Prof. 15(1): 36-43 (2013) - Harigopal K. B. Ponnapalli, Ashutosh Saxena:
A Digital Signature Architecture for Web Apps. IT Prof. 15(2): 42-49 (2013) - Anand Kishore Raju, Sven Lindmark, Simon Delaere, Pieter Ballon:
A Holistic Impact-Assessment Framework for Green ICT. IT Prof. 15(1): 50-56 (2013) - Manuj Sabharwal, Abhishek Agrawal, Grace Metri:
Enabling Green IT through Energy-Aware Software. IT Prof. 15(1): 19-27 (2013) - Char Sample, Kim Schaffer:
An Overview of Anomaly Detection. IT Prof. 15(1): 8-11 (2013) - Michael Seibold, Dean Jacobs, Alfons Kemper:
Operational Business Intelligence: Processing Mixed Workloads. IT Prof. 15(5): 16-21 (2013)