By Topic

IT Professional

Issue 3 • Date May-June 2011

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Request Permissions | PDF file iconPDF (4448 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2011 , Page(s): c2
    Request Permissions | PDF file iconPDF (1645 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2011 , Page(s): 1
    Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2011 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (3475 KB)  
    Freely Available from IEEE
  • Timing Matters: Tackling Intractable Problems

    Publication Year: 2011 , Page(s): 4 - 6
    Request Permissions | PDF file iconPDF (687 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IT in Governance in the 21st Century

    Publication Year: 2011 , Page(s): 7 - 9
    Request Permissions | PDF file iconPDF (694 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The Leadership Lever

    Publication Year: 2011 , Page(s): 10 - 13
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1146 KB) |  | HTML iconHTML  

    In today's project-based organization, management is everywhere. Yet projects continue to fail and organizations often don't meet their goals. Management is a "lever" comprising processes, a monitor-and-control system, an organizational reward system, and company values. Leadership, on the other hand, can extend the management lever to better align teams with project goals, leading to organization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coming to Grips with Security

    Publication Year: 2011 , Page(s): 14 - 17
    Request Permissions | PDF file iconPDF (3348 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments

    Publication Year: 2011 , Page(s): 18 - 23
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3295 KB) |  | HTML iconHTML  

    Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Community Knowledge Base for IT Security

    Publication Year: 2011 , Page(s): 24 - 30
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2998 KB) |  | HTML iconHTML  

    Does every organization need to reinvent the wheel when it comes to IT security? Not if the IT community can develop a formal knowledge base for sharing and applying IT security management knowledge. Corporate IT security managers have a difficult time staying on top of the endless tide of new technologies and security threats sweeping into their organizations and information systems. The effectiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forensic Web Services Framework

    Publication Year: 2011 , Page(s): 31 - 37
    Request Permissions | Click to expandAbstract | PDF file iconPDF (4266 KB) |  | HTML iconHTML  

    When Web services are misused, investigators must navigate through a collection of logs to recreate an attack. The proposed Forensic Web Services could help by securely maintaining transactional records between Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Healthcare Business-Process Reference Model

    Publication Year: 2011 , Page(s): 38 - 47
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3045 KB) |  | HTML iconHTML  

    Standardizing processes in an effort to develop a full-scale healthcare business-process reference model could enable flexible business models without requiring custom interfaces and help track transactions to improve response times and quality of care. The structure of the healthcare industry is in flux. In seeking more cost-effective solutions, enterprises are constantly experimenting with diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Medical-Grade Networks

    Publication Year: 2011 , Page(s): 48 - 51
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1937 KB) |  | HTML iconHTML  

    Healthcare organizations must test their network infrastructures for disaster recovery and emergency mode operations, yet most can't afford to operate the complicated protocols needed for safe testing. The Rapid Adjustable Network architecture offers a solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Leadership in Higher Education: The CIO Candidate

    Publication Year: 2011 , Page(s): 52 - 56
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2542 KB) |  | HTML iconHTML  

    What key qualifications do universities seek when hiring chief information officers, and do the responsibilities differ from ClOs in other industries? A shortage of ClOs in higher education warrants a closer look at this position. This paper explored what universities seek in and expect from a CIO candidate. We reviewed CIO advertisements to determine the key qualifications sought, the expected ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moral Responsibility for Computing Artifacts: "The Rules"

    Publication Year: 2011 , Page(s): 57 - 59
    Request Permissions | PDF file iconPDF (421 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • You Need a Vacation

    Publication Year: 2011 , Page(s): 60 - 61
    Request Permissions | PDF file iconPDF (590 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Lean: More than a Shop-Floor Fad

    Publication Year: 2011 , Page(s): 64 - 63
    Request Permissions | PDF file iconPDF (1394 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011 , Page(s): c3
    Request Permissions | PDF file iconPDF (212 KB)  
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011 , Page(s): c4
    Request Permissions | PDF file iconPDF (793 KB)  
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services