By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2012

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2012 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (380 KB)  
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012 , Page(s): c2 - 1
    Save to Project icon | Request Permissions | PDF file iconPDF (875 KB)  
    Freely Available from IEEE
  • Diverse IT Metrics

    Publication Year: 2012 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1283 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Who Owns What? The Social Media Quagmire

    Publication Year: 2012 , Page(s): 4 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (664 KB) |  | HTML iconHTML  

    The assumption that participating in social media means abandoning privacy and security is an example of a somewhat false dichotomy "no security and privacy" on the one hand and "no information sharing" on the other. In reality, social media presents an opportunity to share information in many ways, including being selective about with whom that information is shared. This department is part of a special issue on social computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web 2.0 Social Media: A Commercialization Conundrum

    Publication Year: 2012 , Page(s): 6 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (740 KB)  

    Web 2.0, the Social Web, offers unparalleled opportunities for people to network and collaborate. The advent of Web 2.0 as a commerce engine, however, brings unique challenges to the lofty purposes upon which social networks were created. Facebook's disastrous IPO might turn out to be a fluke, but it sends a strong signal that big-brand advertising might not be entirely suitable in the social context. Moreover, existing technology might not be sufficiently optimized or scaled to deliver the kinds of data necessary to support near real-time commercial opportunities. Thoughtful Web 2.0 critics express grave concerns over the loss of privacy and the need to exercise "individual liberty." The promise of Web 3.0, based on the notion of trust, might put some of these concerns to rest, but at the end of the day, the social Web is about community, not universality. This department is part of a special issue on social media. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Government Meets Social Media: Realities and Risks

    Publication Year: 2012 , Page(s): 9 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (12306 KB) |  | HTML iconHTML  

    This study uses a content-analysis methodology to examine 100 e-government websites in the US and relevant social media accounts, assessing how state government portals and state governors use social media. After comparing these two environments, the author discusses the inherent risks involved in using social media. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Diffusion in China: Economic and Social Implications

    Publication Year: 2012 , Page(s): 16 - 21
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4716 KB) |  | HTML iconHTML  

    This article explores the economic and social implications of Internet diffusion in China. With the penetration rate and application of e-commerce technologies expected to surge in the next three years, IT professionals will have ample opportunities to engage customers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Disruptive and Sustaining Innovations in Green IT

    Publication Year: 2012 , Page(s): 22 - 29
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2071 KB) |  | HTML iconHTML  

    Green IT has gained significant attention, but specific guidance on how to implement and manage various green IT initiatives is largely underdeveloped. A new framework helps by classifying green IT used in organizations as sustaining or disrupting innovations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending Against User-Level Information Exfiltration

    Publication Year: 2012 , Page(s): 30 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2746 KB)  

    Users routinely mix security contexts, and modern commercial operating systems don't provide strong barriers against user-level compromise and data exfiltration. Additional defensive measures are needed in environments where the potential for data exfiltration or account misuse poses unacceptable risks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Schools of Thought on Enterprise Architecture

    Publication Year: 2012 , Page(s): 37 - 43
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3279 KB) |  | HTML iconHTML  

    Three schools of thought on enterprise architecture exist, each with its own belief system (definitions, concerns, assumptions, and limitations). A novel taxonomy of these schools creates a starting point for resolving terminological challenges to help establish enterprise architecture as a discipline. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shared Objectives and IT Achievements: CIO and Business Manager Perspectives

    Publication Year: 2012 , Page(s): 44 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3672 KB) |  | HTML iconHTML  

    A survey of 128 CIOs and 103 other top business managers explores whether these management roles share the same views of IT objectives and achievements. The authors then consider whether a shared vision helps organizations achieve those objectives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe and Secure Software Systems: The Role of Professional Licensure

    Publication Year: 2012 , Page(s): 51 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (825 KB) |  | HTML iconHTML  

    Licensure of certain software engineers in the US will be required in at least 10 states by 2013 and, likely, by all US states and jurisdictions within a few years. States license engineers to ensure that those who offer services directly to the public are minimally competent. But what kinds of kinds of software systems affect public health, safety, and welfare? Which software engineers will need to be licensed? The answers to these questions are a matter of both law and science. This department introduces some of the scientific aspects of these two questions from the perspective of reliability engineering and suggests new research directions to help answer these questions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taiwan's Journey to the Cloud: Progress and Challenges

    Publication Year: 2012 , Page(s): 54 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2787 KB) |  | HTML iconHTML  

    Taiwan is making massive investments in cloud computing, transforming itself into an advanced developer of cloud technology. Despite its reputation in hardware manufacturing, Taiwan isnow gearing up to develop and offer new products and services to the global market. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Wireless Local Area Networks

    Publication Year: 2012 , Page(s): 59 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1831 KB) |  | HTML iconHTML  

    To help organizations improve their WLAN security, the National Institute of Standards and Technology recently published Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. Here, the authors summarize some of the recommendations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Media for the Enterprise: What's Next?

    Publication Year: 2012 , Page(s): 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1182 KB) |  | HTML iconHTML  

    Social media gives companies an opportunity to protect their reputation andenhance their brand, but it requires them to do more than just monitor social buzz about their products. This department explores how CIOs must work with their organizations and the key leaders to better exploit social media. This department is part of a special issue on social computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masthead

    Publication Year: 2012 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (428 KB)  
    Freely Available from IEEE

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services