Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3321926
Hoda Diba
High turnover rates in the IT industry pose a significant challenge for technology companies in maintaining a talented workforce. Fierce competition, rapid technological advancements, and employees seeking new challenges contribute to this issue. Remote work during the COVID-19 era has added complexity to retaining IT professionals who value flexible working conditions. As a result, IT firms are constantly seeking effective strategies to attract and retain talent. This study focuses on assessing the values that matter most to new IT employees with recommendations on how companies can leverage employer brand value propositions to attract and retain talent in the post-COVID-19 landscape.
{"title":"Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies","authors":"Hoda Diba","doi":"10.1109/mitp.2023.3321926","DOIUrl":"https://doi.org/10.1109/mitp.2023.3321926","url":null,"abstract":"High turnover rates in the IT industry pose a significant challenge for technology companies in maintaining a talented workforce. Fierce competition, rapid technological advancements, and employees seeking new challenges contribute to this issue. Remote work during the COVID-19 era has added complexity to retaining IT professionals who value flexible working conditions. As a result, IT firms are constantly seeking effective strategies to attract and retain talent. This study focuses on assessing the values that matter most to new IT employees with recommendations on how companies can leverage employer brand value propositions to attract and retain talent in the post-COVID-19 landscape.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The COVID-19 pandemic has highlighted the significance and importance of introducing intelligent devices to improve living standards. Technological advancements and inventions have proven particularly beneficial during times when face-to-face contact is limited. Machine vision, as a cutting-edge paradigm, has emerged as a significant tool in handling various COVID-19 and post-COVID-19 situations. Intelligent devices aim to automate processes and enhance society’s quality of life by reducing reliance on human intervention. However, security concerns and technological advancements necessitate organizations and businesses to adopt robust security and privacy mechanisms instead of solely relying on intelligent and smart measurement methods. This article aims to present a comprehensive overview of security and privacy mechanisms for facilitating efficient communication, decision making, planning, information recording, and management using smart devices in postpandemic scenarios. Additionally, the article offers a summary of potential techniques and basic solutions for secure communication in the future.
{"title":"Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic","authors":"Geetanjali Rathee, Chaker Abdelaziz Kerrache, Anissa Cheriguene","doi":"10.1109/mitp.2023.3310650","DOIUrl":"https://doi.org/10.1109/mitp.2023.3310650","url":null,"abstract":"The COVID-19 pandemic has highlighted the significance and importance of introducing intelligent devices to improve living standards. Technological advancements and inventions have proven particularly beneficial during times when face-to-face contact is limited. Machine vision, as a cutting-edge paradigm, has emerged as a significant tool in handling various COVID-19 and post-COVID-19 situations. Intelligent devices aim to automate processes and enhance society’s quality of life by reducing reliance on human intervention. However, security concerns and technological advancements necessitate organizations and businesses to adopt robust security and privacy mechanisms instead of solely relying on intelligent and smart measurement methods. This article aims to present a comprehensive overview of security and privacy mechanisms for facilitating efficient communication, decision making, planning, information recording, and management using smart devices in postpandemic scenarios. Additionally, the article offers a summary of potential techniques and basic solutions for secure communication in the future.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3323612
{"title":"IEEE Computer Society has you Covered","authors":"","doi":"10.1109/mitp.2023.3323612","DOIUrl":"https://doi.org/10.1109/mitp.2023.3323612","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3322609
José L. Hernández-Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R.C. Nurse, J. Morris Chang
The global landscape has been reshaped by the COVID-19 pandemic, causing unprecedented health, economic, and societal disruptions. In this transformative period, technology emerged as a vital lifeline, serving as both a shield against the virus and a catalyst for adapting to new challenges. Digital contact tracing frameworks rapidly emerged and became popular worldwide, thus enabling swift identification of potential exposure and containment of infections. In addition, the subsequent development of digital COVID certificates for vaccinations, immunity, and testing facilitated the safe resumption of daily activities and cross-border travel.
{"title":"<i>IT Professional</i> Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond","authors":"José L. Hernández-Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R.C. Nurse, J. Morris Chang","doi":"10.1109/mitp.2023.3322609","DOIUrl":"https://doi.org/10.1109/mitp.2023.3322609","url":null,"abstract":"The global landscape has been reshaped by the COVID-19 pandemic, causing unprecedented health, economic, and societal disruptions. In this transformative period, technology emerged as a vital lifeline, serving as both a shield against the virus and a catalyst for adapting to new challenges. Digital contact tracing frameworks rapidly emerged and became popular worldwide, thus enabling swift identification of potential exposure and containment of infections. In addition, the subsequent development of digital COVID certificates for vaccinations, immunity, and testing facilitated the safe resumption of daily activities and cross-border travel.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3314325
Nir Kshetri
Generative artificial intelligence tools have found a wide range of uses in marketing. This article delves into how these tools are transforming three key areas of marketing: personalization, insight generation, and content creation.
{"title":"Generative Artificial Intelligence in Marketing","authors":"Nir Kshetri","doi":"10.1109/mitp.2023.3314325","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314325","url":null,"abstract":"Generative artificial intelligence tools have found a wide range of uses in marketing. This article delves into how these tools are transforming three key areas of marketing: personalization, insight generation, and content creation.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3314326
Stephen J. Andriole
C-suites should formalize the competitive intelligence function with a well-funded, full-time, dedicated team, which should be invited into whatever strategic planning processes exist at their companies. Tactical intelligence should impact the immediate go-to-market processes, while strategic intelligence should shape products and services to be offered over the next 2-3 years. Competitive intelligence is a profession with methods, tools, techniques, technologies, certifications, associations, publications, conferences, and podcasts—all necessary to effectively compete in the marketplace.
{"title":"How Competitive Are You?","authors":"Stephen J. Andriole","doi":"10.1109/mitp.2023.3314326","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314326","url":null,"abstract":"C-suites should formalize the competitive intelligence function with a well-funded, full-time, dedicated team, which should be invited into whatever strategic planning processes exist at their companies. Tactical intelligence should impact the immediate go-to-market processes, while strategic intelligence should shape products and services to be offered over the next 2-3 years. Competitive intelligence is a profession with methods, tools, techniques, technologies, certifications, associations, publications, conferences, and podcasts—all necessary to effectively compete in the marketplace.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3303919
Mohamed Saied Essa, Shawkat Kamal Guirguis
The Internet of Things (IoT) is receiving increasing attention from academia and industry. However, improving the security of the IoT environment is critical for fostering trust in it and contributing to its growth in the manufacturing market. This study comparatively analyzes current methods for detecting intruders and malicious activities in IoT networks by introducing tree-based machine learning algorithms. It presents a research gap analysis of the current literature. Furthermore, an empirical evaluation study is presented to explore the potential of tree-based approaches to detect intruders in IoT networks. It compares the performance of bagging and boosting techniques in botnet detection by conducting an extensive experimental benchmarking.
{"title":"Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things","authors":"Mohamed Saied Essa, Shawkat Kamal Guirguis","doi":"10.1109/mitp.2023.3303919","DOIUrl":"https://doi.org/10.1109/mitp.2023.3303919","url":null,"abstract":"The Internet of Things (IoT) is receiving increasing attention from academia and industry. However, improving the security of the IoT environment is critical for fostering trust in it and contributing to its growth in the manufacturing market. This study comparatively analyzes current methods for detecting intruders and malicious activities in IoT networks by introducing tree-based machine learning algorithms. It presents a research gap analysis of the current literature. Furthermore, an empirical evaluation study is presented to explore the potential of tree-based approaches to detect intruders in IoT networks. It compares the performance of bagging and boosting techniques in botnet detection by conducting an extensive experimental benchmarking.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3314327
Axel Legay
This article introduces the concept of statistical model checking (SMC). This approach elegantly combines the concepts of formal verification and formal models with those of simulation. The article also illustrates the potential of the approach in various applications, ranging from validating complex requirements to secure goal planning.
{"title":"Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities","authors":"Axel Legay","doi":"10.1109/mitp.2023.3314327","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314327","url":null,"abstract":"This article introduces the concept of statistical model checking (SMC). This approach elegantly combines the concepts of formal verification and formal models with those of simulation. The article also illustrates the potential of the approach in various applications, ranging from validating complex requirements to secure goal planning.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135736772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3314752
Michail Tsikerdekis, Sherali Zeadally
In recent years, we have witnessed growing interest in using deep learning to detect misinformation. This increased attention is being driven by deep learning technologies’ ability to accurately detect this misinformation. However, there is a diverse array of content that can be considered misinformation, such as fake news and satire. Similarly, in the field of deep learning, there are several architectures with variable efficacy depending on the context and data involved. This study aims to highlight the various types of misinformation attacks and deep learning architectures that are used to detect them. Based on our selection of the recent literature, we present a classification of deep learning approaches and their relative effectiveness in detecting misinformation, along with their limitations in terms of accuracy as well as computational overhead. Finally, we discuss some challenges and limitations that arise FROM the use of deep learning architectures in misinformation detection.
{"title":"Misinformation Detection Using Deep Learning","authors":"Michail Tsikerdekis, Sherali Zeadally","doi":"10.1109/mitp.2023.3314752","DOIUrl":"https://doi.org/10.1109/mitp.2023.3314752","url":null,"abstract":"In recent years, we have witnessed growing interest in using deep learning to detect misinformation. This increased attention is being driven by deep learning technologies’ ability to accurately detect this misinformation. However, there is a diverse array of content that can be considered misinformation, such as fake news and satire. Similarly, in the field of deep learning, there are several architectures with variable efficacy depending on the context and data involved. This study aims to highlight the various types of misinformation attacks and deep learning architectures that are used to detect them. Based on our selection of the recent literature, we present a classification of deep learning approaches and their relative effectiveness in detecting misinformation, along with their limitations in terms of accuracy as well as computational overhead. Finally, we discuss some challenges and limitations that arise FROM the use of deep learning architectures in misinformation detection.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1109/mitp.2023.3322237
{"title":"Drive Diversity & Inclusion in Computing","authors":"","doi":"10.1109/mitp.2023.3322237","DOIUrl":"https://doi.org/10.1109/mitp.2023.3322237","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}