By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2009

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2612 KB)
    Freely Available from IEEE
  • IT Professional Call for Papers

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • IT Professional [Masthead]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2159 KB)
    Freely Available from IEEE
  • The Second Immutable Law of Security Administration

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (2680 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction: Strategic Planning in Today's IT Environment

    Publication Year: 2009, Page(s):6 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    This introduction to the special issue dedicated to strategic planning presents the complexity and dynamics of global enterprise IT management in today's tight and unstable economic environment. IT managers and enterprise executives can achieve their overall business success by opening channels of communications among their normally independent organizational silos and by creating an enterprise-sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Technology Strategic Planning

    Publication Year: 2009, Page(s):8 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Understanding an enterprise's IT requirements and providing innovative IT solutions are essential to keeping a business flourishing. An IT strategic plan based on a shared vision with stakeholders is critical to any successful enterprise and requires continual updating. The three building blocks for constructing an IT strategic plan are performing an IT assessment to understand the issues, problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Innovations: Evaluate, Strategize, and Invest

    Publication Year: 2009, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (967 KB) | HTML iconHTML

    Technology innovations have shaped the IT Industry since its inception. Adoption of a particular innovation is often a key survival factor: "fast followers" learn from others, monetize an innovation, and almost always make abnormal profits. Thus, the important question for IT professionals is, "How can I evaluate an emerging trend for its investment worthiness?" To answer this question, the author... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Professional and Interpersonal Skills for ICT Specialists

    Publication Year: 2009, Page(s):23 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    The main objective of this paper is to define and evaluate the professional abilities of an engineer who works as an IT professional in Spain, primarily telecommunications engineers and computer scientists. Their occupational profiles will provide us with a useful tool for defining and conceptualizing curriculum plans for new qualifications, which the EU Higher Education Area project will require ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT and Business Alignment: The Effect on Productivity and Profitability

    Publication Year: 2009, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (757 KB) | HTML iconHTML

    Surveying business and IT executives from the pharmaceutical industry provides empirical data that offers new insight into how IT and business strategic-alignment maturity affects firm-level productivity and profitability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Your True IT Transformation

    Publication Year: 2009, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    Three core competencies-strategy, solution, and implementation-should be put into practice as concurrent activities: organizations can't achieve true IT transformation and thereby enterprise success without mastery of all three. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright Infringement and Protection in the Internet Age

    Publication Year: 2009, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In this age of increasingly complex, Internet-based technologies, it's very difficult to protect original works of authorship. This article examines the problem of copyright infringement and the copyright law's desire to balance the interests of creators with the interests of the public. The author also offers some insight in how to reduce the problem of copyright infringement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Teams and the Importance of Building Trust

    Publication Year: 2009, Page(s):46 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB) | HTML iconHTML

    Trust in the workplace is both an ethical and a management issue. Virtual teams have become common in IT, but the importance of building trust in such teams is often under-appreciated. In this installment of IT Ethics, the authors look at several definitions and theories of trust and their application in virtual IT teams. The human dimensions of virtual teams are a crucial factor in their chances ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Electronic Medical Record Systems

    Publication Year: 2009, Page(s):50 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    The US healthcare industry is a massive information enterprise, yet it's surprisingly inefficient when it comes to information management. Some estimates put it decades behind other industries with respect to information technology (IT) adoption and utilization. In fact, an article in the Journal of Healthcare Management described the industry as a knowledge-based enterprise that doesn't consider ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Interdomain Routing Security

    Publication Year: 2009, Page(s):54 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing: Will Commodity Services Benefit Users Long Term?

    Publication Year: 2009, Page(s):57 - 59
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1797 KB) | HTML iconHTML

    The attention the IT community has given cloud computing recently rivals that given to American Idol judges by the public. This magazine alone dedicated its March/April 2009 issue and significant other space throughout the year to the topic. Cloud computing's potential lies not only in the evolution of technology but also in a sourcing strategy that uses resources shared by increasingly larger vol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boss Smart

    Publication Year: 2009, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    This article addresses the soft skills specifically required to build good rapport with and to gain trust from our bosses. The mantras imparted include the following: our bosses expect our loyalty to them; we should share credit with our bosses for accomplishments and shoulder the blame for failures, even if our bosses contributed to the failure; we should be able to read nuances from our bosses; ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Productivity = ??

    Publication Year: 2009, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    This paper discusses what IT managers can realistically do to encourage employees to maximize their productivity. It managers must also decide what they can do to optimize the work environment. Demanding productivity and efficiency without the appropriate management support and resources can translate into resentful and unproductive employees. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (2043 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services