By Topic

IT Professional

Issue 6 • Nov.-Dec. 2013

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2665 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (1265 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • What Is Your Global Innovation Strategy?

    Publication Year: 2013, Page(s):2 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (1698 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career Advice

    Publication Year: 2013, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB) | HTML iconHTML

    In this difficult job environment, you need to have an edge over your competitors. This department provides several recommendations, along with real-world examples, related to finding a job and advancing your career. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology, Unemployment, and Power

    Publication Year: 2013, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1405 KB) | HTML iconHTML

    Business organizations and people are making predictions and investments based on a recognition that smart machines are starting to make dramatic changes in the world of work and will likely make even more dramatic changes in the near future. Some people see this as an opportunity, while others see it as vulnerability, but many people see it as inevitable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Scientists Aren't Domain Experts

    Publication Year: 2013, Page(s):12 - 17
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB) | HTML iconHTML

    It will take a lot of conversation to make data science work. Data scientists can't do it on their own. Success in data science requires a multiskilled project team with data scientists and domain experts working closely together. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Big Data and Business Analytics [Guest editors' introduction]

    Publication Year: 2013, Page(s):18 - 20
    Cited by:  Papers (7)
    Request permission for commercial reuse | PDF file iconPDF (2385 KB) | HTML iconHTML
    Freely Available from IEEE
  • Leveraging Big Data Analytics to Reduce Healthcare Costs

    Publication Year: 2013, Page(s):21 - 28
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4823 KB) | HTML iconHTML

    The healthcare sector deals with large volumes of electronic data related to patient services. This article describes two novel applications that leverage big data to detect fraud, abuse, waste, and errors in health insurance claims, thus reducing recurrent losses and facilitating enhanced patient care. The results indicate that claim anomalies detected using these applications help private health... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Analytics Using a Big Data Approach

    Publication Year: 2013, Page(s):29 - 35
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4423 KB) | HTML iconHTML

    Continuous improvement of business processes is a challenging task that requires complex and robust supporting systems. Using advanced analytics methods and emerging technologies--such as business intelligence systems, business activity monitoring, predictive analytics, behavioral pattern recognition, and "type simulations"--can help business users continuously improve their processes. However, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XBRL in the Chinese Financial Ecosystem

    Publication Year: 2013, Page(s):36 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2466 KB) | HTML iconHTML

    The eXtensible Business Reporting Language (XBRL) is one of the most popular formats of business reports. It has been adopted by many countries and regions across the world, including China. This article examines XBRL in China and answers the following questions: What is XBRL technology? How has it been implemented in the financial ecosystem of Mainland China? What are the differences between thre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data and Transformational Government

    Publication Year: 2013, Page(s):43 - 48
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3367 KB) | HTML iconHTML

    The big data phenomenon is growing throughout private and public sector domains. Profit motives make it urgent for companies in the private sector to learn how to leverage big data. However, in the public sector, government services could also be greatly improved through the use of big data. Here, the authors describe some drivers, barriers, and best practices affecting the use of big data and ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Countdown to Y2Gray

    Publication Year: 2013, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2312 KB) | HTML iconHTML

    A large number of IT employees will soon be leaving the workforce due to retirement, which presents a serious problem for many IT departments. This problem is of greater concern in organizations and industries with complex business practices, legacy systems, or greater proportions of older workers. These organizations are vulnerable to a phenomenon called Y2Gray. This article explores Y2Gray by ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Social Computing Research

    Publication Year: 2013, Page(s):56 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2717 KB) | HTML iconHTML

    Social computing is an emerging field, encompassing a wide range of topics. A broad understanding of the major topics involved in social computing is important for both scholars and practitioners. The authors present and analyze the voluminous social computing related studies to date, applying document co-citation analysis, pathfinder networks, core-document analysis, and the Herfindahl-Hirschman ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2014 Editorial Calendar

    Publication Year: 2013, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Cloud Computing in Sub-Saharan Africa

    Publication Year: 2013, Page(s):64 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1133 KB) | HTML iconHTML

    Cloud-related innovations and services are becoming fundamental sources of economic and societal changes in Sub-Saharan African economies, which are embracing cloud computing. This analysis of the cloud market examines both driving and constraining factors in these economies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Office Etiquette During the Holidays

    Publication Year: 2013, Page(s):68 - 69
    Request permission for commercial reuse | PDF file iconPDF (2389 KB) | HTML iconHTML
    Freely Available from IEEE
  • Vendor Management

    Publication Year: 2013, Page(s): 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1732 KB) | HTML iconHTML

    This article briefly outlines the four significant stages of a vendor management program (strategic fit, selection and contract, execution, and renewal), along with useful components and recommended actions for each stage. In addition to tactical steps, critical strategic theory and best practices are outlined. Organizations can use this article for assessing the state of their existing vendor pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services