IT Professional最新文献

筛选
英文 中文
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies 雇主品牌:COVID-19对IT公司新员工招聘的影响
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3321926
Hoda Diba
{"title":"Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies","authors":"Hoda Diba","doi":"10.1109/mitp.2023.3321926","DOIUrl":"https://doi.org/10.1109/mitp.2023.3321926","url":null,"abstract":"High turnover rates in the IT industry pose a significant challenge for technology companies in maintaining a talented workforce. Fierce competition, rapid technological advancements, and employees seeking new challenges contribute to this issue. Remote work during the COVID-19 era has added complexity to retaining IT professionals who value flexible working conditions. As a result, IT firms are constantly seeking effective strategies to attract and retain talent. This study focuses on assessing the values that matter most to new IT employees with recommendations on how companies can leverage employer brand value propositions to attract and retain talent in the post-COVID-19 landscape.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic 基于区块链的COVID-19大流行期间和之后的智能记录监控机制
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3310650
Geetanjali Rathee, Chaker Abdelaziz Kerrache, Anissa Cheriguene
{"title":"Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic","authors":"Geetanjali Rathee, Chaker Abdelaziz Kerrache, Anissa Cheriguene","doi":"10.1109/mitp.2023.3310650","DOIUrl":"https://doi.org/10.1109/mitp.2023.3310650","url":null,"abstract":"The COVID-19 pandemic has highlighted the significance and importance of introducing intelligent devices to improve living standards. Technological advancements and inventions have proven particularly beneficial during times when face-to-face contact is limited. Machine vision, as a cutting-edge paradigm, has emerged as a significant tool in handling various COVID-19 and post-COVID-19 situations. Intelligent devices aim to automate processes and enhance society’s quality of life by reducing reliance on human intervention. However, security concerns and technological advancements necessitate organizations and businesses to adopt robust security and privacy mechanisms instead of solely relying on intelligent and smart measurement methods. This article aims to present a comprehensive overview of security and privacy mechanisms for facilitating efficient communication, decision making, planning, information recording, and management using smart devices in postpandemic scenarios. Additionally, the article offers a summary of potential techniques and basic solutions for secure communication in the future.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society has you Covered IEEE计算机协会为您提供服务
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3323612
{"title":"IEEE Computer Society has you Covered","authors":"","doi":"10.1109/mitp.2023.3323612","DOIUrl":"https://doi.org/10.1109/mitp.2023.3323612","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Artificial Intelligence in Marketing 市场营销中的生成式人工智能
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3314325
Nir Kshetri
{"title":"Generative Artificial Intelligence in Marketing","authors":"Nir Kshetri","doi":"10.1109/mitp.2023.3314325","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314325","url":null,"abstract":"Generative artificial intelligence tools have found a wide range of uses in marketing. This article delves into how these tools are transforming three key areas of marketing: personalization, insight generation, and content creation.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond IT专业特刊:2019冠状病毒病大流行期间及以后的安全和数据保护
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3322609
José L. Hernández-Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R.C. Nurse, J. Morris Chang
{"title":"<i>IT Professional</i> Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond","authors":"José L. Hernández-Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R.C. Nurse, J. Morris Chang","doi":"10.1109/mitp.2023.3322609","DOIUrl":"https://doi.org/10.1109/mitp.2023.3322609","url":null,"abstract":"The global landscape has been reshaped by the COVID-19 pandemic, causing unprecedented health, economic, and societal disruptions. In this transformative period, technology emerged as a vital lifeline, serving as both a shield against the virus and a catalyst for adapting to new challenges. Digital contact tracing frameworks rapidly emerged and became popular worldwide, thus enabling swift identification of potential exposure and containment of infections. In addition, the subsequent development of digital COVID certificates for vaccinations, immunity, and testing facilitated the safe resumption of daily activities and cross-border travel.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Competitive Are You? 你的竞争力如何?
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3314326
Stephen J. Andriole
{"title":"How Competitive Are You?","authors":"Stephen J. Andriole","doi":"10.1109/mitp.2023.3314326","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314326","url":null,"abstract":"C-suites should formalize the competitive intelligence function with a well-funded, full-time, dedicated team, which should be invited into whatever strategic planning processes exist at their companies. Tactical intelligence should impact the immediate go-to-market processes, while strategic intelligence should shape products and services to be offered over the next 2-3 years. Competitive intelligence is a profession with methods, tools, techniques, technologies, certifications, associations, publications, conferences, and podcasts—all necessary to effectively compete in the marketplace.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things 基于树的机器学习算法在物联网网络入侵检测中的评价
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3303919
Mohamed Saied Essa, Shawkat Kamal Guirguis
{"title":"Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things","authors":"Mohamed Saied Essa, Shawkat Kamal Guirguis","doi":"10.1109/mitp.2023.3303919","DOIUrl":"https://doi.org/10.1109/mitp.2023.3303919","url":null,"abstract":"The Internet of Things (IoT) is receiving increasing attention from academia and industry. However, improving the security of the IoT environment is critical for fostering trust in it and contributing to its growth in the manufacturing market. This study comparatively analyzes current methods for detecting intruders and malicious activities in IoT networks by introducing tree-based machine learning algorithms. It presents a research gap analysis of the current literature. Furthermore, an empirical evaluation study is presented to explore the potential of tree-based approaches to detect intruders in IoT networks. It compares the performance of bagging and boosting techniques in botnet detection by conducting an extensive experimental benchmarking.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities 设计、验证、实施和验证:从梦想到现实
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3314327
Axel Legay
{"title":"Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities","authors":"Axel Legay","doi":"10.1109/mitp.2023.3314327","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314327","url":null,"abstract":"This article introduces the concept of statistical model checking (SMC). This approach elegantly combines the concepts of formal verification and formal models with those of simulation. The article also illustrates the potential of the approach in various applications, ranging from validating complex requirements to secure goal planning.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Misinformation Detection Using Deep Learning 使用深度学习的错误信息检测
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3314752
Michail Tsikerdekis, Sherali Zeadally
{"title":"Misinformation Detection Using Deep Learning","authors":"Michail Tsikerdekis, Sherali Zeadally","doi":"10.1109/mitp.2023.3314752","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314752","url":null,"abstract":"In recent years, we have witnessed growing interest in using deep learning to detect misinformation. This increased attention is being driven by deep learning technologies’ ability to accurately detect this misinformation. However, there is a diverse array of content that can be considered misinformation, such as fake news and satire. Similarly, in the field of deep learning, there are several architectures with variable efficacy depending on the context and data involved. This study aims to highlight the various types of misinformation attacks and deep learning architectures that are used to detect them. Based on our selection of the recent literature, we present a classification of deep learning approaches and their relative effectiveness in detecting misinformation, along with their limitations in terms of accuracy as well as computational overhead. Finally, we discuss some challenges and limitations that arise FROM the use of deep learning architectures in misinformation detection.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drive Diversity & Inclusion in Computing 推动多样性融入计算机
4区 计算机科学
IT Professional Pub Date : 2023-09-01 DOI: 10.1109/mitp.2023.3322237
{"title":"Drive Diversity &amp; Inclusion in Computing","authors":"","doi":"10.1109/mitp.2023.3322237","DOIUrl":"https://doi.org/10.1109/mitp.2023.3322237","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信