By Topic

IT Professional

Issue 3 • May-June 2013

Filter Results

Displaying Results 1 - 19 of 19
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (5497 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2013, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (384 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1304 KB)
    Freely Available from IEEE
  • Innovative and Disruptive Technologies [From the Editors]

    Publication Year: 2013, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Secure Mobile Application Development

    Publication Year: 2013, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Reengineers Government Processes in Africa

    Publication Year: 2013, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1593 KB) | HTML iconHTML

    Governments in various developing economies are deriving significant value by redesigning their service-delivery and administrative processes using IT. The authors discuss how Ethiopia, Tanzania, and Kenya are exploiting IT to redesign their government processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ABAC and RBAC: Scalable, Flexible, and Auditable Access Management

    Publication Year: 2013, Page(s):14 - 16
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    Is it possible to obtain the flexibility and advantages of attribute-based access control while maintaining role-based access control's advantages for analysis and risk control? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Focus on Your Job Search [Advertisement]

    Publication Year: 2013, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (1461 KB)
    Freely Available from IEEE
  • Tablets: The Next Disruptive Computing Technology?

    Publication Year: 2013, Page(s):18 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4938 KB)

    Disruptive technology has a long history in the computing industry. The usual path of innovation in this industry is toward delivering increased computing power on smaller devices. Both architectural and component innovation play an important role in this evolution. Nowadays, it seems that the computing device paradigm is experiencing a transition from notebooks and laptops toward touchscreen tabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity Theory: A New Paradigm for Software Integration

    Publication Year: 2013, Page(s):26 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4883 KB) | HTML iconHTML

    Software integration testing has always been problematic, and current methods are becoming even less practical given today's networked software components. As the need for a more holistic approach grows, complexity theory presents opportunities for better understanding and testing of software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks

    Publication Year: 2013, Page(s):32 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5404 KB) | HTML iconHTML

    During the last few years, several nation states have entered cyberspace in an attempt to use the Internet for policy, geopolitical, and state gains. Using development of the battle tank as an analogy, the authors explore the militarization of the Internet and how the ability to think beyond the existing cybersecurity paradigm has led to new cyberweapons and the need for new defensive strategies. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster

    Publication Year: 2013, Page(s):36 - 43
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3329 KB) | HTML iconHTML

    With rapid growth of the Semantic Web, the authors' research focuses on designing a scalable resource description framework (RDF) database system that can efficiently process SPARQL queries over large RDF datasets. In this article, they present their design, architecture, storage schemes, and performance evaluation of two efficient RDF data management approaches that use state-of-the-art cloud and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Systems: Practitioner-Based Inquiry Research

    Publication Year: 2013, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1965 KB) | HTML iconHTML

    As the field of information systems (IS) has developed, IS practitioners have somewhat disconnected themselves from academic scholars. Fortunately, practitioner-based inquiry research can bridge the gap, bringing both practical relevance and theoretical and methodological rigor to IS research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing in China: Barriers and Potential

    Publication Year: 2013, Page(s):48 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3077 KB) | HTML iconHTML

    Many cities in China are seeking to establish cloud computing facilities for public and business services. However, despite large investments in the cloud, there are still several barriers to strategic cloud deployment in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-as-a-Service Revenue Models

    Publication Year: 2013, Page(s):54 - 59
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2396 KB) | HTML iconHTML

    This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing Jobs, Part II: The Transition

    Publication Year: 2013, Page(s):60 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB)

    You've decided to change jobs—how should you proceed? This is the second in a series of three articles to help you on the path to a new job. This installment discusses how to leave your current position. Part I is available here: http://doi.ieeecomputersociety.org/10.1109/MITP.2013.25 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovation

    Publication Year: 2013, Page(s): 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2257 KB) | HTML iconHTML

    What exactly constitutes innovation, and how do you know if you're doing it? This article briefly outlines some key definitions and attributes of a successful innovation program. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Experts [Advertisement]

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (5035 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services