SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Information Technology in Industry
(Emerging Sources Citation Index)
ISSN (Online): 2203-1731; ISSN (Print): 2204-0595
http://airccse.org/journal/ITII/index.html
Current Issue: November 2018, Volume
06, Number 3 --- Table of Contents
http://airccse.org/journal/ITII/itii2018.html
Paper -01
A Centralized Network Management Application
for Academia and Small Business Networks
Dewang Gedia1
and Levi Perigo2
Interdisciplinary Telecom Program, University of Colorado Boulder 530 UCB,
Boulder, Colorado, USA 80309
ABSTRACT
Software-defined networking (SDN) is reshaping the networking paradigm. Previous
research shows that SDN has advantages over traditional networks because it separates
the control and data plane, leading to greater flexibility through network automation and
programmability. Small business and academia networks require flexibility, like service
provider networks, to scale, deploy, and self-heal network infrastructure that comprises of
cloud operating systems, virtual machines, containers, vendor networking equipment, and
virtual network functions (VNFs); however, as SDN evolves in industry, there has been
limited research to develop an SDN architecture to fulfil the requirements of small
business and academia networks. This research proposes a network architecture that can
abstract, orchestrate, and scale configurations based on academia and small business
network requirements. Our results show that the proposed architecture provides enhanced
network management and operations when combined with the network orchestration
application (NetO-App) developed in this research. The NetO-App orchestrates network
policies, automates configuration changes, secures container infrastructure, and manages
internal and external communication between the campus networking infrastructure.
KEYWORDS
Ansible, Automation, Clair, Flask, Kubernetes, Magnum, Network Management System,
Network Programmability, NetO-App, OpenStack, OpenContrail, OpenFlow,
Orchestration, Python, SDN
For More Details: http://it-in-industry.com/itii_papers/2018/6318itii01.pdf
Volume Link: http://airccse.org/journal/ITII/itii2018.html
REFERENCES
[1] R. Cziva et al, “SDN- based Virtual Machine Management for Cloud Data Centers” in
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet). IEEE, 2014, pp.
388 - 394.
[2] A. Risdianto et al, “Leveraging Open-Source Software for Federated Multisite
SDN_Cloud Playground” in NetSoft Conference and Workshops, 2016 IEEE. IEEE, 2016,
pp. 423 - 427.
[3] Software Defined Networking Definition [Online]. Available:
https://www.opennetworking.org/sdn-definition/. [Accessed: Oct. 15, 2017].
[4] ONF [Online]. Available: https://www.opennetworking.org/projects/cord/.
[5] S. Spadaro et al, “Orchestrated SDN based VDC Provisioning over MultiTechnology
Optical Data Center Networks” in 2017 19th International Conference on Transparent
Optical Networks. IEEE, 2017, pp. 1 - 4.
[6] L. Chen et al, “An SDN-Based Fabric For Flexible Data-Center Networks” in 2015 IEEE
2nd International Conference on Cyber Security and Cloud Computing. IEEE, 2015, pp. 121
- 126.
[7] S. Chen, and R. Hwang, “A scalable Integrated SDN and OpenStack Management
System” in 2016 IEEE International Conference on Computer and Information Technology
(CIT). IEEE, 2016, pp. 532 – 537.
[8] W. Wang, W. He, and J. Su, “Boosting the Benefits Of Hybrid SDN” in 2017 IEEE 37th
International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp.
2165 - 2170.
[9] L. Wang et al, “Combining Neutron and OpenDaylight for Management and Networking” in
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
IEEE, 2017, pp. 457 - 462.
[10] S. Huang, and J. Griffioen, “Network Hypervisors: Managing the Emerging SDN
Chaos” in 2013 22nd International Conference on Computer Communication and Networks
(ICCCN). IEEE, 2013, pp. 1 – 7.
[11] H. Shimonishi, Y. Shinohara, and Y. Chiba, “Vitalizing data-center networks using
OpenFlow” in 2013 IEEE Photonics Society Summer Topical Meeting Series. IEEE, 2013,
pp. 250 - 251.
[12] O. Tkachova, M. Salim, and A. Yahya, “An Analysis of SDNOpenStack Integration” in
2015 International Scientific-Practical Conference Problems of infocommunications Science
and Technology (PIC S&T). IEEE, 2015, pp. 60 -62.
[13] T. Huang, et. al., “A survey on Large-Scale Software Defined Networking (SDN)
Testbeds: Approaches and Challenges” in IEEE Communications Survey & Tutorials. vol.
19 issue: 2, 2016, pp. 891 - 917.
[14] A. Rangola, “Applications of Python in Real World”[Online]. Available:
https://www.invensis.net/blog/it/applications-of-python-in-
realworld/?utm_source=invensis-
blog&utm_campaign=blogpost&utm_medium=content-link&utm_term=benefits-of-
python-over-otherprogramming-languages . [Accessed: Oct. 10, 2017].
[15] OpenStack Kolla [Online]. Available: https://wiki.openstack.org/wiki/Kolla.
[16] OpenContrail Networking [Online]. Available: http://www.opencontrail.org/why-
contrail-is-using-bgpmpls/.
[17] T. Bakhshi, “State of the Art and Recent Research Advances in Software Defined
Networking” in Wireless Communications and Mobile Computing. vol. 2017, 2017.
[18] P. Venezia, “Puppet vs. Ceph vs. Salt vs. Ansible” [Online].
Available:https://www.networkworld.com/article/2172097/virtualization/puppet-vs--
chef-vs--ansible-vs--salt.html [Accessed: 15th Dec. 2016].
[19] Ansible [Online]. Available: [Accessed: 30th Jan., 2017].
https://www.ansible.com/blog/2016-community-year-in-review.
[20] ONAP [Online]. Available: https://www.onap.org.
[21] L. Lwakatare, P. Kuvaja and M. Oivo, “An Exploratory study of DevOps extending the
dimensions of DevOps with practices”, in The Eleventh International Conference on
Software Engineering Advances.
[22] S. Sezer et al., "Are we ready for SDN? Implementation challenges for software -
defined networks," in IEEE Communications Magazine, vol. 51, no. 7, pp. 36 - 43, July
2013. doi: 10.1109/MCOM.2013.6553676.
[23] O. Salman, I. H. Elhajj, A. Kayssi and A. Chehab, "SDN controllers: A comparative study,"
in 2016 18th Mediterranean Electrotechnical Conference (MELECON), Lemesos, 2016, pp.
1 - 6.
[24] OpenContrail SDN [Online]. Available: http://www.opencontrail.org/theimportance-of-
abstraction-the-concept-of-sdn-as-a-compiler/.
[25] E. Borjesson, and R. Feldt, “Automated System Testing using Visual GUI Testing Tools:
A Comparative Study in Industry” in 2012 IEEE Fifth International Conference on
Software Testing, Verification and Validation. IEEE, 2012, pp. 350 - 359.
[26] L. He, et. al., “Design and Implementation of SDN/IP hybrid space Information Network
Prototype” in 2016 IEEE/CIC International Conference on Communications in China. IEEE,
2016, pp. 1- 6. [27] Cisco Automation Benefits [Online]. Available:
https://www.cisco.com/c/dam/en/us/products/collateral/cloud-
systemsmanagement/network-services-orchestrator/white-paper-c11-738289.pdf.
[28] Grafana [Online]. Available: https://grafana.com.
[29] PNDA [Online]. Available: http://pnda.io.
[30] TensorFlow [Online]. Available: https://www.tensorflow.org.
[31] Small Business Network Basics, Cisco Systems. Available [online]:
https://www.cisco.com/c/en/us/solutions/small-business/resourcecenter/connect-
employees-offices/primer-networking.html.
[32] V. Ngugi, and C. Yoshida, “Digital Media Platform to Connect Small and Medium
Enterprises In Nairobi” in 2016 IEEE/ACIS 15th International Conference on Computer and
Information Science (ICIS). IEEE, 2016.
[33] Network Computing [Online]. Available:
https://www.networkcomputing.com/networking/sdn-good-matchcampus/677974592.
[34] OpenStack Magnum [Online]. Available: https://wiki.openstack.org/wiki/Magnum.
[35] CoreOS Clair GitHub repository [Online]. Available:
https://github.com/coreos/clair#kubernetes.
[36] Kubernetes advantages for businesses [Online]. Available: https://supergiant.io/blog/top-
reasons-businesses-should-move-tokubernetes-now.
[37] M. Capuccino et al., “KubeNow: an On-Demand Cloud-Agnostic Platform for
Microservices-Based Research Environments” in arXiv, May 2018.
AUTHORS
Dewang Gedia is a Ph.D. student at the University of Colorado Boulder
having primary research focus in Network Functions Virtualization and
Software Defined Networks domain. He achieved his Master’s degree from
Interdisciplinary Telecom Program (ITP) at the University of Colorado
Boulder in 2017.
Paper -02
The D-basis Algorithm for Association Rules of
High Confidence
Oren Segal, Justin Cabot-Miller, Kira Adaricheva and J.B.Nation
ABSTRACT
We develop a new approach for distributed computing of the association rules of high
confidence on the attributes/columns of a binary table. It is derived from the D-basis
algorithm developed by K.Adaricheva and J.B.Nation (Theoretical Computer Science,
2017), which runs multiple times on sub-tables of a given binary table, obtained by
removing one or more rows. The sets of rules retrieved at these runs are then aggregated.
This allows us to obtain a basis of association rules of high confidence, which can be
used for ranking all attributes of the table with respect to a given fixed attribute. This
paper focuses on some algorithmic details and the technical implementation of the new
algorithm. Results are given for tests performed on random, synthetic and real data.
KEYWORDS
Binary table, association rules, implications, the Dbasis algorithm, parallel computing,
the relevance.
For More Details: http://it-in-industry.com/itii_papers/2018/6318itii02.pdf
Volume Link: http://airccse.org/journal/ITII/itii2018.html
REFERENCES
[1] K. Adaricheva, and J.B. Nation, Discovery of the D-basis in binary tables based on
hypergraph dualization, v.658 (2017), Theoretical Computer Science, Part B, 307–315.
[2] K. Adaricheva, J.B. Nation, G. Okimoto, V. Adarichev, A. Amanbekkyzy, S. Sarkar, A.
Sailanbayev, N. Seidalin, and K. Alibek, Measuring the Implications of the D-basis in
Analysis of Data in Biomedical Studies, Proceedings of ICFCA-15, Nerja, Spain; Springer,
2015, 39–57.
[3] K. Adaricheva, J.B. Nation and R. Rand, Ordered direct implicational basis of a finite
closure system, Disc. Appl. Math. 161 (2013), 707–723.
[4] K.Adaricheva and T. Ninesling, Direct and binary-direct bases for oneset updates of a
closure system, manuscript; presented in poster session of ICFCA-2018
http://icfca2017.irisa.fr/program/accepted-papers/
[5] Adaricheva K., Turan G., Sloan R. and Szorenyi B., Horn belief contraction: remainders,
envelopes and computational aspect, in Proceedings of KR-2012, Italy, 107–115.
[6] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen and A.I. Verkamo, Fast discovery of
association rules, Advances in Knowledge discovery and data mining, AAAI Press, Menlo
Park, California (1996), 307–328.
[7] Guillaume Bosc, Marc Plantevit, Jean-Franois Boulicaut, Moustafa Bensafi, and Mehdi
Kaytoue, h(odor): Interactive discovery of hypotheses on the structure-odor relationship in
neuroscience, in ECML/PKDD 2016 (Demo), 2016.
[8] J.L. Balcazar, ´ Redundancy, deduction schemes, and minimum-size bases for association
rules, Log. Meth. Comput. Sci. 6 (2010), 2:3, 1–33.
[9] Gordon Bell, Jim Gray, and Alex Szalay. Petascale computational systems.Computer,
39(1):110–112, 2006.
[10] Raffaele Bolla, Roberto Bruschi, Franco Davoli, and Flavio Cucchietti. Energy efficiency in
the future internet: A survey of existing approaches and trends in energy-aware fixed
network infrastructures. IEEE Communications Surveys & Tutorials, 13(2):223–244, 2011.
[11] George Bosilca, Thomas Herault, Ala Rezmerita, and Jack Dongarra. On scalability for mpi
runtime systems. In 2011 IEEE International Conference on Cluster Computing, pages 187–
195. IEEE, 2011.
[12] M. Fredman and L. Khachiyan, On the complexity of dualization of monotone disjunctive
normal forms, J. Algorithms 21 (1996), 618–628.
[13] Edgar Gabriel, Graham E Fagg, George Bosilca, Thara Angskun, Jack J Dongarra, Jeffrey M
Squyres, Vishal Sahay, Prabhanjan Kambadur, Brian Barrett, Andrew Lumsdaine, et al.
Open mpi: Goals, concept, and design of a next generation mpi implementation. In European
Parallel Virtual Machine/Message Passing Interface Users Group Meeting, pages 97–104.
Springer, 2004.
[14] B. Ganter, and R.Wille, Formal concept Analysis: Mathematical Foundations, Springer,
1999.
[15] E.L. Kaplan and P. Meier, Nonparametric estimation from incomplete observations, J.
Amer. Statist. Assn. 53 N282 (1958), 457–481.
[16] Jonathan Koomey, Stephen Berard, Marla Sanchez, and Henry Wong. Implications of
historical trends in the electrical efficiency of computing. IEEE Annals of the History of
Computing, 33(3):46–54, 2011.
[17] M. Kryszkiewicz, Concise representation of association rules, Proceedings of the ESF
Exploratory Workshop on Pattern Detection and Discovery, Springer-Verlag, London, UK,
92–109.
[18] K. Murakami and T. Uno, Efficient algorithms for dualizing large scale hypergraphs, Disc.
Appl. Math. 170 (2014), 83–94.
[19] J. B. Nation, G. Okimoto, T. Wenska, A. Achari, J. Maligro, T. Yoshioka, and E. Zitello, A
Comparative analysis of MRNA expression for sixteen different cancers, preprint,
http://www.math.hawaii.edu jb/lust2017615.pdf
[20] D. Prajapati, S. Garg and N.C.Chanhan Interesting association rule mining with consistent
and inconsistent rule detection from big sales data in distributed environment, Future
Computing and Informatics Journal 2 (2017), 19–30.
[21] O. Segal, J. Cabot-Miller, K. Adaricheva, J.B. Nation, A. Sharafudinov, The Bases of
Association Rules of High Confidence, Proceedings of SIGPRO - 2018, Sydney, David
C.Wyld et al. (Eds) pp. 39-51, 2018.
[22] Arnaud Soulet and Bruno Crmilleux, Mining constraint-based patterns using automatic
relaxation, Intell. Data Anal., 13(1):109–133, 2009.
[23] Arnaud Soulet, Chedy Rassi, Marc Plantevit, and Bruno Cremilleux,Mining dominant
patterns in the sky In IEEE 11th Int. Conf on Data Mining (ICDM 2011), pages 655–664.
IEEE, 2011.
[24] T. Rauber and G. Runger. ¨ Parallel Programming: for Multicore and Cluster Systems.
Springer Berlin Heidelberg, 2013.
[25] The Cancer Genome Atlas Research Network, The Cancer Genome Atlas Pan-Cancer
analysis project, Nature Genetics 45 (2013), 1113–1120.
[26] Frequent Itemset Mining Dataset Repository, publicly available at
http://fimi.ua.ac.be/data/retail.dat
Paper -03
Key Factors Influencing Job Satisfaction of Non-
Tenured IT Faculty in the USA
Sharon Nesbitt Bazil and Shawon S. M. Rahman
ABSTRACT
This study increased the overall knowledge of job satisfaction among non-tenured IT faculty by
way of contributing to the body of management knowledge in the IT environment. The study
results provided higher education institution IT leaders and management the vision and
understanding to handle job satisfaction issues within the IT environment. This information is
also crucial in helping higher education institutions perform at high levels of employee retention,
flexibility, and employee job satisfaction by focusing on autonomy and the opportunity for
advancement. This quantitative research examined the relationship between (a) the extrinsic
motivators (predictor/independent variables), operationalized as autonomy; (b) the intrinsic
motivators, operationalized as advancement opportunities; and (c) the job satisfaction level of IT
faculty in higher educational institutions (dependent variable). This research has added to the
body of knowledge regarding what is needed for IT educators to have job satisfaction by
examining how much the independent variables affect job satisfaction of IT faculty in higher
educational institutions. We have defined and analyzed methods and practices that companies
could apply as they formulate the essential skills and resources for predicting job satisfaction
among IT faculty. In this area of job satisfaction, additional understanding could support higher
education institutions learning how to keep experienced IT faculty. To examine the extent to
which autonomy and opportunity for advancement predict job satisfaction, a multiple linear
regression was conducted. This study added to the existing body of knowledge regarding what is
needed for IT educators to have job satisfaction by examining how much the independent
variables of opportunity for advancement and autonomy affect job satisfaction of IT faculty in
higher educational institutions. Additional knowledge in this area of job satisfaction may support
higher educational institutions in learning how to retain experienced IT faculty. By addressing
these factors related to job satisfaction, employers can better understand what motivates and
keeps IT workers satisfied in their jobs. Keeping IT employees satisfied will help retain them and
prevent them from job-hopping
KEYWORDS
USA IT Faculty, IT Job Satisfaction, IT Professionals in Education, Non-tenured Position, Higher
Educational Institute, IT Faculty Motivation, IT Job in Academia
For More Details: http://it-in-industry.com/itii_papers/2018/6318itii03.pdf
Volume Link: http://airccse.org/journal/ITII/itii2018.html
REFERENCES
[1] Jiang, J. J., & Klein, G. (1999). Supervisor support and career anchor impact on the career
satisfaction of the entry-level information systems professional. Journal of Management
Information Systems, 16, 219–240. Retrieved from http://www.jstor.org/stable/40398450
[2] Kooser, A. C. (2015). How does technology improve a business? Chron. Retrieved from
http://www.chron.com/
[3] Reichheld, F. F. (1996). Learning from customer defections. Harvard Business
Review,74,56–67.
[4] Hamlett, C. (2015). How stress affects your work performance. Chron. Retrieved from
http://www.chron.com/
[5] Wright, T. A., &Staw, B. M. (1999). Affect and favorable work outcomes: Two longitudinal
tests of the happy-productive worker thesis. Journal of Organizational Behavior, 20, 1–23.
doi:10.1002/(SICI)1099- 1379(199901)20:13.0.CO;2-W
[6] Adams, C. G. (2014). Faculty perception of autonomous motivation in higher education: An
exploratory qualitative inquiry (Doctoral dissertation, Capella University).
[7] Oswald, A. J. (1997). Happiness and economic performance. Economics Journal, 107,
1815–1831. doi:10.1111/j.1468-0297.1997.tb00085.x
[8] Adams, C., Clark, L. M., Goldman, M., Jester, R., Lee, M., Hubbard, D., Soejarto, A.,
Cantara, M., & Thompson, E. (2006). Skills shortages are emerging in the CSI service
market. Retrieved from https://www.gartner.com/doc/492837/skill-shortages-emerging-
csiservice
[9] Joseph, D., Kok-Yee, N., Koh, C., & Soon, A. (2007). Turnover of information technology
professionals: A narrative review meta-analytic structural equation modeling and model
development. MIS Quarterly, 31, 547–577. Retrieved from https://www.jstor.org/
journal/misquarterly
[10] Cropanzano, R., Howes, J. C., Grandey, A. A., &Toth, P. (1997). The relationship of
organizational politics and support to work behaviors, attitudes and stress. Journal of
Organization Behavior, 18(2), 159–180. http://dx.doi.org/10.1002/(sici)1099-
1379(199703)18:23.0.co;2-d
[11] Agarwal, R., De, P., &Ferratt, T. W. (2001, April). How long will they stay? Predicting an
IT professional's preferred employment duration. In Proceedings of the 2001 ACM SIGCPR
Conference on Computer personnel research (pp. 132–138).
http://dx.doi.org/10.1145/371209.371226
[12] Imran, H., Arif, I., Cheema, S. &Azeem, M. 2014. Relationship between Job Satisfaction,
Job Performance, Attitude towards Work, and Organizational Commitment.
Entrepreneurship and Innovation Management Journal, 2(2): 135144
[13] Aggarwal, N., &Medury, Y. (2012). Job satisfaction among faculty: An approach to study
the intention to leave or stay in the university (No. 2012-4-9). Retrieved from
http://econpapers.repec.org/paper/vorissues/2012-4-9.html
[14] Allen, D. G., Shore, L. M., &Griffeth, R. W. (2003). The role of perceived organizational
support and supportive human resource practices in the turnover process. Journal of
Management, 29(1), 99– 118. http://dx.doi.org/10.1177/014920630302900107
[15] Altbach, P. G. (1977). In search of Saraswati: The ambivalence of the Indian academic.
Higher Education, 6(2), 255–275. http://dx.doi.org/10.1007/bf00141881
[16] Amos, E. A., &Weathington, B. L. (2008). An analysis of the relation between employee—
Organization value congruence and employee attitudes. Journal of Psychology, 142(6), 615–
632.
[17] Armstrong-Strassen, M., &Ursel, N. D. (2009). Perceived organizational support, career
satisfaction, and the retention of older workers. Journal of Occupational and Organizational
Psychology, 82(1), 201. doi:10.1348/096317908X288838
[18] Waltman, J., Bergom, I., Hollenshead, C., Miller, J., & August, L. (2012). Factors
contributing to job satisfaction and dissatisfaction among non-tenure-track faculty. The
Journal of Higher Education, 83(3), 411- 434.
[19] Arnett, D. B., Laverie, D. A., & McLane, C. (2002). Using job satisfaction and pride as
internal marketing tools. Cornell Hotel and Restaurant Administration Quarterly, 43(2), 87–
96. doi:10.1016/S0010- 8804(02)80035-0
[20] Baard, P. P., Deci, E. L., & Ryan, R. M. (2004). The relation of intrinsic need satisfaction to
performance and wellbeing in two work settings. Journal of Applied Social Psychology, 34,
2045–2068.
[21] Violino, B. (2009, April). Finding your happy (work) place. CIO Insight, 38–40. Retrieved
from http://www.cioinsight.com/c/a/ITManagement/Finding-Your-Happy-IT-
WorkPlace-254569
[22] Bassi, L., &McMurrer, D. (2007). Maximizing your return on people. Harvard Business
Review, 85(3), 115–123. Retrieved from https://hbr.org/
[23] Prasad, J., Enns, H. G., &Ferratt, T. W. (2007). One size does not fit all: Managing IT
employees’ employment arrangements. Human Resource Management, 46, 349.
doi:10.1002/hrm.20168
[24] Bolliger, D. U., &Wasilik, O. (2009, May). Factors influencing faculty satisfaction with
online teaching and learning in higher education. Distance Education, 30(1), 103-116.
[25] Doty J. (2014, September 6). Mindfulness and compassion are good for business bottom line.
Australian Broadcasting System. Retrieved from http://www.abc.net.au/
[26] Cohen, J. (1992). A power primer. Psychological bulletin, 112(1), 155.
[27] Brace, N., Kemp, R., &Snelgar, R. (2012). SPSS for psychologists (5th ed.). Mahwah, NJ:
Lawrence Erlbaum Associates. [28] Coombs, W. T. (2009). Conceptualizing crisis
communication. In R. L. Health, & H. D. O’Hair (Eds.), Handbook of risk and crisis
communication (pp. 99–118). New York: Taylor & Francis.
[29] Torvalds, L. (2002). Just for fun: The story of an accidental revolutionary. New York, NY:
Collins Press.
[30] Curran, M. J. (2013). Institution-related, instructor-related, and studentrelated factors that
influence satisfaction for online faculty at a for-profit institution. Robert Morris University.
[31] DeLong, R. S. (2015). Key strategies for retaining information technology professionals
(Doctoral dissertation). Available from ProQuest Dissertations and Theses database. (UMI
No. 3739367)
[32] Eichar, D.M., Brady, E.M., &Fortinsky, R.H. (1991). The job satisfaction of older workers.
Journal of Organizational Behavior, 12(7), 609-620.
[33] Grady, T. L., &Figueira, E. A. C. (1987). Vocational teacher turnover/retention behavior: A
four stage process. Journal of Vocational and Technical Education, 4(1), 25–38.Retrieved
from http://eric.ed.gov/
[34] Ghazzawi, I. (2008) Job satisfaction among information technology professionals in the US:
An empirical study. Journal of American Academy of Business, 13(1), 1–15. Retrieved from
http://www.jaabc.com/journal.htm
[35] Trevino, J. O. (2014). Emotional and social intelligence: A study of interpersonal,
intrapersonal, social awareness, and social facility skills of information technology
professionals in higher education (Doctoral dissertation, Texas A&M University-Corpus
Christi). Retrieved from https://tamucc-ir.tdl.org/tamucc-ir/handle/1969.6/616
[36] Ford, V. F., Swayze, S., & Burley, D. L. (2013). An exploratory investigation of the
relationship between disengagement, exhaustion and turnover intention among IT
professionals employed at a university. Information Resources Management Journal (IRMJ),
26(3), 55-68.
[37] Johnsrud, L. K., & Rosser, V. J. (2002). Faculty members' morale and their intention to
leave. The Journal of Higher Education, 73(4), 518- 543.
[38] Freeman, P. &Aspray, W. (1999). The Supply of Information Technology Workers in the
United States. Washington, DC: Computing Research Association.
[39] Gahlan, V. S., & Singh, K. (2014). The effect of role overload and role ambiguity on job
performance of IT professionals in India. IUP Journal of Management Research, 13(3), 37.
[40] George, J. M., & Jones, G. R. (2005). Understanding and managing organizational behavior
(4th ed.). Upper Saddle River, NJ: Prentice Hall.
[41] Ghazzawi, I. (2011). Does age matter in job satisfaction? The case of US information
technology professionals. Journal of Organizational Culture, Communications and Conflict,
15(1), 25.
[42] Greenberg, J., & Baron, R. A. (2008). Behavior in organizations (9th ed.). Upper Saddle
River, NJ: Pearson Prentice.
[43] Hayes, F. (1998). Don’t underestimate the labor shortage; It's real, despite the hoopla
surrounding it. Computerworld-Marion, 32(5), 8–11.
[44] Diedericks, E., &Rothmann, S. (2013). Flourishing of information technology professionals:
the role of work engagement and job satisfaction. Journal of Psychology in Africa, 23(2),
225-233.
[45] Herzberg, F., Mausner, B., & Snyderman, B. B. (1959). The motivation to work. New York,
NY: Chapman & Hall.
[46] George, D., &Mallery, P. (2016). SPSS for Windows step by step: A simple guide and
reference, 11.0 update. Boston, MA: Allyn and Bacon.
[47] Kim, S., & Wright, B. E. (2007). IT employee work exhaustion: Toward an integrated model
of antecedents and consequences. Review of Public Personnel Administration, 27(2), 147–
170. doi:10.1177/0734371X06290775
[48] Lounsbury, J. W., Moffit, L. Gibson, L. W., Drost, A. W., & Stevens, M. (2007). An
investigation of personality traits in relation to job and career satisfaction of information
technology professionals. Journal of Information Technology, 22(2), 174–184.
doi:10.1057/palgrave.jit.2000094
[49] Gainey, T. W., &Clenney, B. F. (2006). Flextime and telecommuting: Examining individual
perceptions. Southern Business Review, 32(1), 13–22. Retrieved from
https://www.questia.com/library/p61306/southern-business-review
[50] Korunka, C., Hoonakker, P. L. T., &Carayon, P. (Eds.). (2005). Towards a universal
turnover model for the IT workforce – A replication study. Santa Monica, CA: IEA Press.
[51] Scott, K. D., & Taylor, G. S. (1985). An examination of conflicting findings on the
relationship between job satisfaction and absenteeism: A meta-analysis. Academy of
Management Journal, 28, 599–612. doi:10.2307/256116
[52] Herzberg, F. (1968). One more time: How do you motivate employees? Boston, MA:
Harvard Business Press.
[53] Khoury, S. Y. (2009). Perceived recognition among full-time computer instructors in
community colleges.
[54] Robson, C. (2002). Real world research: A resource for social scientists and practitioner -
researchers (2nd ed.). Malden, England: Blackwell.
[55] Lim, S. (2007) Library informational technology workers: Their sense of belonging, role, job
autonomy, and job satisfaction. Journal of Academic Librarianship, 33(4), 492–500.
doi:10.1016/j.acalib.2007.03.007
[56] Lounsbury, J. W., Sundstrom, E., Levy, J. J., & Gibson, L. W. (2014). Distinctive
personality traits of information technology professionals. Computer and Information
Science, 7(3). http://dx.doi.org/10.5539/cis.v7n3p38
[57] McCredie, J. (2003). Does IT matter to higher education? EDUCAUSE Review, 38(6), 14–
22. Retrieved from http://er.educause.edu/
[58] Moore, J. E. (2000a). One road to turnover: An examination of work exhaustion in
technology professionals. MIS Quarterly 24(1), 141–168. doi:10.2307/3250982
[59] Nagar, K. (2012). Organizational commitment and job satisfaction among teachers during
times of burnout. Vikalpa, 37(2), 43–60. Retrieved from
http://www.vikalpa.com/pdf/articles/2012/Pages-fromVikalpa37.2-43-60.pdf
[60] Tabachnick, B. G., &Fidell, L. S. (2013). Using multivariate statistics (6th ed.). Boston, MA:
Allyn and Bacon.
[61] Payne, W. L. (2013). Motivating factors of florida community and state college information
technology faculty (Order No. 3560625). Available from ProQuest Dissertations & Theses
Full Text. (1357125247).
[62] Porter, L.W., & Steers, R. M. (1973). Organizational, work and personal factors in employee
turnover and absenteeism. Psychological Bulletin, 80, 151–176.
http://dx.doi.org/10.1037/h0034829
[63] Ramirez, R., Kraemer K. L., Lawler, E. (2001). The contribution of information technology
investments to firm performance: Influence of management practices. Working paper.
Center for Research on Information Technology and Organizations, University of California,
Irvine, CA.
[64] Hecker, D. E. (2005). Occupational employment projections to 2014. Monthly Labor
Review, 128(11), 70–101. Retrieved from http://www.bls.gov/mlr/
[65] Robbins, S. P., & Judge, T. A. (2007). Organizational behavior (12th ed.). Upper Saddle
River: NJ, Pearson Prentice Hall.
[66] Tschopp, C., Grote, G., & Gerber, M. (2014). How career orientation shapes the job
satisfaction–turnover intention link. Journal of Organizational Behavior, 35(2), 151–171.
http://dx.doi.org/10.1002/job.1857
[67] St. Charles, N. D. (2002). Human resource management practices, faculty morale and the
impact on teaching performance and university effectiveness. D.B.A. Dissertation, Argosy
University/Sarasota, Publication No. AAT 3056962.
[68] Ruhland, S. (2001). Factors that influence the turnover and retention of Minnesota's
technical college teachers. Journal of Vocational Education Research, 26(1), 56–76.
Retrieved from http://eric.ed.gov/
[69] Sharma, R. D., &Jyoti, J. (2010). Job satisfaction of university teachers: An empirical study.
Journal of Services Research, 9(2), 51–80. Retrieved from http://jsr.sagepub.com/
[70] Wright, M. D. (1985). Relationships among esteem, autonomy, job satisfaction and the
intention to quit of downstate Illinois industrial education teachers. Available from ProQuest
Dissertations & Theses database. (UMI No. 303379385). Retrieved from
[71] Spector, P. E. (1985). Measurement of human service staff satisfaction: Development of the
job satisfaction survey. American Journal of Community Psychology, 13, 693–713.
http://dx.doi.org/10.1007/bf00929796
[72] Tabachnick, B. G., &Fidell, L. S. (2012). Using multivariate statistics (6th ed.). Boston, MA:
Pearson
[73] Temple, J. C. (2013). A quantitative study of factors contributing to perceived job
satisfaction of information technology professionals working in California community
colleges (Doctoral dissertation). Available from ProQuest Dissertations & Theses database.
(UMI No. 3573694)
[74] Van Dyk, J., Coetzee, M., &Takawira, N. (2014). Satisfaction with retention factors as
predictors of the job embeddedness of medical and information technology services staff.
Southern African Business Review, 17(1), 57–75. Retrieved from
http://www.ajol.info/index.php/sabr/article/view/110880
[75] Stevens, J.P. (2009). Applied multivariate statistics for the social sciences (5th ed.). New
York: Routledge.
[76] Wright M., Custer R. (1998). Why they enjoy teaching: The motivation of outstanding
technology teachers. Journal of Technology Education, 9, 60–77.
[77] Twombly, S. & Townsend, B. K. (2008). Community college faculty: What we know and
need to know. Community College Review, 36(1), 5-24.

Contenu connexe

Tendances

A Collaborative Approach for Metadata Management for Internet of Things
A Collaborative Approach for Metadata Management for Internet of ThingsA Collaborative Approach for Metadata Management for Internet of Things
A Collaborative Approach for Metadata Management for Internet of ThingsUmair ul Hassan
 
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
 
Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...CARLOS III UNIVERSITY OF MADRID
 
Searching in a Web-based Infrastructure for Smart Things
Searching in a Web-based Infrastructure for Smart ThingsSearching in a Web-based Infrastructure for Smart Things
Searching in a Web-based Infrastructure for Smart ThingsSimon Mayer
 
Referensi Penelitian Rekayasa Perangkat Lunak berbasis Ontologi
Referensi Penelitian Rekayasa Perangkat Lunak berbasis OntologiReferensi Penelitian Rekayasa Perangkat Lunak berbasis Ontologi
Referensi Penelitian Rekayasa Perangkat Lunak berbasis OntologiRolly Maulana Awangga
 
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]Awais Shibli
 
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...Ghislain ATEMEZING
 
Engineering 4.0: Digitization through task automation and reuse
Engineering 4.0:  Digitization through task automation and reuseEngineering 4.0:  Digitization through task automation and reuse
Engineering 4.0: Digitization through task automation and reuseCARLOS III UNIVERSITY OF MADRID
 
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...CARLOS III UNIVERSITY OF MADRID
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...nexgentechnology
 
OSLC KM: Elevating the meaning of data and operations within the toolchain
OSLC KM: Elevating the meaning of data and operations within the toolchainOSLC KM: Elevating the meaning of data and operations within the toolchain
OSLC KM: Elevating the meaning of data and operations within the toolchainCARLOS III UNIVERSITY OF MADRID
 
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...Vagner Santana
 
Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...CARLOS III UNIVERSITY OF MADRID
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 

Tendances (20)

A Collaborative Approach for Metadata Management for Internet of Things
A Collaborative Approach for Metadata Management for Internet of ThingsA Collaborative Approach for Metadata Management for Internet of Things
A Collaborative Approach for Metadata Management for Internet of Things
 
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...
 
Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...
 
Searching in a Web-based Infrastructure for Smart Things
Searching in a Web-based Infrastructure for Smart ThingsSearching in a Web-based Infrastructure for Smart Things
Searching in a Web-based Infrastructure for Smart Things
 
Referensi Penelitian Rekayasa Perangkat Lunak berbasis Ontologi
Referensi Penelitian Rekayasa Perangkat Lunak berbasis OntologiReferensi Penelitian Rekayasa Perangkat Lunak berbasis Ontologi
Referensi Penelitian Rekayasa Perangkat Lunak berbasis Ontologi
 
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
 
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...
Semantic Web Methodologies, Best Practices and Ontology Engineering Applied t...
 
Engineering 4.0: Digitization through task automation and reuse
Engineering 4.0:  Digitization through task automation and reuseEngineering 4.0:  Digitization through task automation and reuse
Engineering 4.0: Digitization through task automation and reuse
 
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
 
INCOSE IS 2019: AI and Systems Engineering
INCOSE IS 2019: AI and Systems EngineeringINCOSE IS 2019: AI and Systems Engineering
INCOSE IS 2019: AI and Systems Engineering
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
OSLC KM: Elevating the meaning of data and operations within the toolchain
OSLC KM: Elevating the meaning of data and operations within the toolchainOSLC KM: Elevating the meaning of data and operations within the toolchain
OSLC KM: Elevating the meaning of data and operations within the toolchain
 
MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...MCPL2013 - Social network analyses in organizations: challenges and approache...
MCPL2013 - Social network analyses in organizations: challenges and approache...
 
Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
A PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGSA PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGS
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 

Similaire à Information Technology in Industry(ITII) - November Issue 2018

TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technologydannyijwest
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingJames Heller
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similaire à Information Technology in Industry(ITII) - November Issue 2018 (20)

TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technology
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 

Plus de ITIIIndustries

Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
 
Image Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningImage Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningITIIIndustries
 
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...ITIIIndustries
 
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...ITIIIndustries
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
 
Programmatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelProgrammatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionITIIIndustries
 
Core Bank Transformation in Practice
Core Bank Transformation in PracticeCore Bank Transformation in Practice
Core Bank Transformation in PracticeITIIIndustries
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataITIIIndustries
 
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
 
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...ITIIIndustries
 
Speech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationSpeech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationITIIIndustries
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...ITIIIndustries
 
Instance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksInstance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksITIIIndustries
 
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...ITIIIndustries
 
Stability of Individuals in a Fingerprint System across Force Levels
Stability of Individuals in a Fingerprint System across Force LevelsStability of Individuals in a Fingerprint System across Force Levels
Stability of Individuals in a Fingerprint System across Force LevelsITIIIndustries
 

Plus de ITIIIndustries (20)

Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT Governance
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
Image Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold LearningImage Matting via LLE/iLLE Manifold Learning
Image Matting via LLE/iLLE Manifold Learning
 
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...
 
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
 
Programmatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based modelProgrammatic detection of spatial behaviour in an agent-based model
Programmatic detection of spatial behaviour in an agent-based model
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
A Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow DetectionA Smart Fuzzing Approach for Integer Overflow Detection
A Smart Fuzzing Approach for Integer Overflow Detection
 
Core Bank Transformation in Practice
Core Bank Transformation in PracticeCore Bank Transformation in Practice
Core Bank Transformation in Practice
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...
 
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...
 
Speech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data VisualisationSpeech Feature Extraction and Data Visualisation
Speech Feature Extraction and Data Visualisation
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
 
Instance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural NetworksInstance Selection and Optimization of Neural Networks
Instance Selection and Optimization of Neural Networks
 
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...
 
Stability of Individuals in a Fingerprint System across Force Levels
Stability of Individuals in a Fingerprint System across Force LevelsStability of Individuals in a Fingerprint System across Force Levels
Stability of Individuals in a Fingerprint System across Force Levels
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Information Technology in Industry(ITII) - November Issue 2018

  • 1. Information Technology in Industry (Emerging Sources Citation Index) ISSN (Online): 2203-1731; ISSN (Print): 2204-0595 http://airccse.org/journal/ITII/index.html Current Issue: November 2018, Volume 06, Number 3 --- Table of Contents http://airccse.org/journal/ITII/itii2018.html
  • 2. Paper -01 A Centralized Network Management Application for Academia and Small Business Networks Dewang Gedia1 and Levi Perigo2 Interdisciplinary Telecom Program, University of Colorado Boulder 530 UCB, Boulder, Colorado, USA 80309 ABSTRACT Software-defined networking (SDN) is reshaping the networking paradigm. Previous research shows that SDN has advantages over traditional networks because it separates the control and data plane, leading to greater flexibility through network automation and programmability. Small business and academia networks require flexibility, like service provider networks, to scale, deploy, and self-heal network infrastructure that comprises of cloud operating systems, virtual machines, containers, vendor networking equipment, and virtual network functions (VNFs); however, as SDN evolves in industry, there has been limited research to develop an SDN architecture to fulfil the requirements of small business and academia networks. This research proposes a network architecture that can abstract, orchestrate, and scale configurations based on academia and small business network requirements. Our results show that the proposed architecture provides enhanced network management and operations when combined with the network orchestration application (NetO-App) developed in this research. The NetO-App orchestrates network policies, automates configuration changes, secures container infrastructure, and manages internal and external communication between the campus networking infrastructure. KEYWORDS Ansible, Automation, Clair, Flask, Kubernetes, Magnum, Network Management System, Network Programmability, NetO-App, OpenStack, OpenContrail, OpenFlow, Orchestration, Python, SDN For More Details: http://it-in-industry.com/itii_papers/2018/6318itii01.pdf Volume Link: http://airccse.org/journal/ITII/itii2018.html
  • 3. REFERENCES [1] R. Cziva et al, “SDN- based Virtual Machine Management for Cloud Data Centers” in 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet). IEEE, 2014, pp. 388 - 394. [2] A. Risdianto et al, “Leveraging Open-Source Software for Federated Multisite SDN_Cloud Playground” in NetSoft Conference and Workshops, 2016 IEEE. IEEE, 2016, pp. 423 - 427. [3] Software Defined Networking Definition [Online]. Available: https://www.opennetworking.org/sdn-definition/. [Accessed: Oct. 15, 2017]. [4] ONF [Online]. Available: https://www.opennetworking.org/projects/cord/. [5] S. Spadaro et al, “Orchestrated SDN based VDC Provisioning over MultiTechnology Optical Data Center Networks” in 2017 19th International Conference on Transparent Optical Networks. IEEE, 2017, pp. 1 - 4. [6] L. Chen et al, “An SDN-Based Fabric For Flexible Data-Center Networks” in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing. IEEE, 2015, pp. 121 - 126. [7] S. Chen, and R. Hwang, “A scalable Integrated SDN and OpenStack Management System” in 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 2016, pp. 532 – 537. [8] W. Wang, W. He, and J. Su, “Boosting the Benefits Of Hybrid SDN” in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp. 2165 - 2170. [9] L. Wang et al, “Combining Neutron and OpenDaylight for Management and Networking” in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017, pp. 457 - 462. [10] S. Huang, and J. Griffioen, “Network Hypervisors: Managing the Emerging SDN Chaos” in 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2013, pp. 1 – 7. [11] H. Shimonishi, Y. Shinohara, and Y. Chiba, “Vitalizing data-center networks using OpenFlow” in 2013 IEEE Photonics Society Summer Topical Meeting Series. IEEE, 2013, pp. 250 - 251. [12] O. Tkachova, M. Salim, and A. Yahya, “An Analysis of SDNOpenStack Integration” in 2015 International Scientific-Practical Conference Problems of infocommunications Science and Technology (PIC S&T). IEEE, 2015, pp. 60 -62.
  • 4. [13] T. Huang, et. al., “A survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges” in IEEE Communications Survey & Tutorials. vol. 19 issue: 2, 2016, pp. 891 - 917. [14] A. Rangola, “Applications of Python in Real World”[Online]. Available: https://www.invensis.net/blog/it/applications-of-python-in- realworld/?utm_source=invensis- blog&utm_campaign=blogpost&utm_medium=content-link&utm_term=benefits-of- python-over-otherprogramming-languages . [Accessed: Oct. 10, 2017]. [15] OpenStack Kolla [Online]. Available: https://wiki.openstack.org/wiki/Kolla. [16] OpenContrail Networking [Online]. Available: http://www.opencontrail.org/why- contrail-is-using-bgpmpls/. [17] T. Bakhshi, “State of the Art and Recent Research Advances in Software Defined Networking” in Wireless Communications and Mobile Computing. vol. 2017, 2017. [18] P. Venezia, “Puppet vs. Ceph vs. Salt vs. Ansible” [Online]. Available:https://www.networkworld.com/article/2172097/virtualization/puppet-vs-- chef-vs--ansible-vs--salt.html [Accessed: 15th Dec. 2016]. [19] Ansible [Online]. Available: [Accessed: 30th Jan., 2017]. https://www.ansible.com/blog/2016-community-year-in-review. [20] ONAP [Online]. Available: https://www.onap.org. [21] L. Lwakatare, P. Kuvaja and M. Oivo, “An Exploratory study of DevOps extending the dimensions of DevOps with practices”, in The Eleventh International Conference on Software Engineering Advances. [22] S. Sezer et al., "Are we ready for SDN? Implementation challenges for software - defined networks," in IEEE Communications Magazine, vol. 51, no. 7, pp. 36 - 43, July 2013. doi: 10.1109/MCOM.2013.6553676. [23] O. Salman, I. H. Elhajj, A. Kayssi and A. Chehab, "SDN controllers: A comparative study," in 2016 18th Mediterranean Electrotechnical Conference (MELECON), Lemesos, 2016, pp. 1 - 6. [24] OpenContrail SDN [Online]. Available: http://www.opencontrail.org/theimportance-of- abstraction-the-concept-of-sdn-as-a-compiler/. [25] E. Borjesson, and R. Feldt, “Automated System Testing using Visual GUI Testing Tools: A Comparative Study in Industry” in 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. IEEE, 2012, pp. 350 - 359. [26] L. He, et. al., “Design and Implementation of SDN/IP hybrid space Information Network Prototype” in 2016 IEEE/CIC International Conference on Communications in China. IEEE, 2016, pp. 1- 6. [27] Cisco Automation Benefits [Online]. Available: https://www.cisco.com/c/dam/en/us/products/collateral/cloud- systemsmanagement/network-services-orchestrator/white-paper-c11-738289.pdf.
  • 5. [28] Grafana [Online]. Available: https://grafana.com. [29] PNDA [Online]. Available: http://pnda.io. [30] TensorFlow [Online]. Available: https://www.tensorflow.org. [31] Small Business Network Basics, Cisco Systems. Available [online]: https://www.cisco.com/c/en/us/solutions/small-business/resourcecenter/connect- employees-offices/primer-networking.html. [32] V. Ngugi, and C. Yoshida, “Digital Media Platform to Connect Small and Medium Enterprises In Nairobi” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). IEEE, 2016. [33] Network Computing [Online]. Available: https://www.networkcomputing.com/networking/sdn-good-matchcampus/677974592. [34] OpenStack Magnum [Online]. Available: https://wiki.openstack.org/wiki/Magnum. [35] CoreOS Clair GitHub repository [Online]. Available: https://github.com/coreos/clair#kubernetes. [36] Kubernetes advantages for businesses [Online]. Available: https://supergiant.io/blog/top- reasons-businesses-should-move-tokubernetes-now. [37] M. Capuccino et al., “KubeNow: an On-Demand Cloud-Agnostic Platform for Microservices-Based Research Environments” in arXiv, May 2018. AUTHORS Dewang Gedia is a Ph.D. student at the University of Colorado Boulder having primary research focus in Network Functions Virtualization and Software Defined Networks domain. He achieved his Master’s degree from Interdisciplinary Telecom Program (ITP) at the University of Colorado Boulder in 2017.
  • 6. Paper -02 The D-basis Algorithm for Association Rules of High Confidence Oren Segal, Justin Cabot-Miller, Kira Adaricheva and J.B.Nation ABSTRACT We develop a new approach for distributed computing of the association rules of high confidence on the attributes/columns of a binary table. It is derived from the D-basis algorithm developed by K.Adaricheva and J.B.Nation (Theoretical Computer Science, 2017), which runs multiple times on sub-tables of a given binary table, obtained by removing one or more rows. The sets of rules retrieved at these runs are then aggregated. This allows us to obtain a basis of association rules of high confidence, which can be used for ranking all attributes of the table with respect to a given fixed attribute. This paper focuses on some algorithmic details and the technical implementation of the new algorithm. Results are given for tests performed on random, synthetic and real data. KEYWORDS Binary table, association rules, implications, the Dbasis algorithm, parallel computing, the relevance. For More Details: http://it-in-industry.com/itii_papers/2018/6318itii02.pdf Volume Link: http://airccse.org/journal/ITII/itii2018.html
  • 7. REFERENCES [1] K. Adaricheva, and J.B. Nation, Discovery of the D-basis in binary tables based on hypergraph dualization, v.658 (2017), Theoretical Computer Science, Part B, 307–315. [2] K. Adaricheva, J.B. Nation, G. Okimoto, V. Adarichev, A. Amanbekkyzy, S. Sarkar, A. Sailanbayev, N. Seidalin, and K. Alibek, Measuring the Implications of the D-basis in Analysis of Data in Biomedical Studies, Proceedings of ICFCA-15, Nerja, Spain; Springer, 2015, 39–57. [3] K. Adaricheva, J.B. Nation and R. Rand, Ordered direct implicational basis of a finite closure system, Disc. Appl. Math. 161 (2013), 707–723. [4] K.Adaricheva and T. Ninesling, Direct and binary-direct bases for oneset updates of a closure system, manuscript; presented in poster session of ICFCA-2018 http://icfca2017.irisa.fr/program/accepted-papers/ [5] Adaricheva K., Turan G., Sloan R. and Szorenyi B., Horn belief contraction: remainders, envelopes and computational aspect, in Proceedings of KR-2012, Italy, 107–115. [6] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen and A.I. Verkamo, Fast discovery of association rules, Advances in Knowledge discovery and data mining, AAAI Press, Menlo Park, California (1996), 307–328. [7] Guillaume Bosc, Marc Plantevit, Jean-Franois Boulicaut, Moustafa Bensafi, and Mehdi Kaytoue, h(odor): Interactive discovery of hypotheses on the structure-odor relationship in neuroscience, in ECML/PKDD 2016 (Demo), 2016. [8] J.L. Balcazar, ´ Redundancy, deduction schemes, and minimum-size bases for association rules, Log. Meth. Comput. Sci. 6 (2010), 2:3, 1–33. [9] Gordon Bell, Jim Gray, and Alex Szalay. Petascale computational systems.Computer, 39(1):110–112, 2006. [10] Raffaele Bolla, Roberto Bruschi, Franco Davoli, and Flavio Cucchietti. Energy efficiency in the future internet: A survey of existing approaches and trends in energy-aware fixed network infrastructures. IEEE Communications Surveys & Tutorials, 13(2):223–244, 2011. [11] George Bosilca, Thomas Herault, Ala Rezmerita, and Jack Dongarra. On scalability for mpi runtime systems. In 2011 IEEE International Conference on Cluster Computing, pages 187– 195. IEEE, 2011. [12] M. Fredman and L. Khachiyan, On the complexity of dualization of monotone disjunctive normal forms, J. Algorithms 21 (1996), 618–628. [13] Edgar Gabriel, Graham E Fagg, George Bosilca, Thara Angskun, Jack J Dongarra, Jeffrey M Squyres, Vishal Sahay, Prabhanjan Kambadur, Brian Barrett, Andrew Lumsdaine, et al.
  • 8. Open mpi: Goals, concept, and design of a next generation mpi implementation. In European Parallel Virtual Machine/Message Passing Interface Users Group Meeting, pages 97–104. Springer, 2004. [14] B. Ganter, and R.Wille, Formal concept Analysis: Mathematical Foundations, Springer, 1999. [15] E.L. Kaplan and P. Meier, Nonparametric estimation from incomplete observations, J. Amer. Statist. Assn. 53 N282 (1958), 457–481. [16] Jonathan Koomey, Stephen Berard, Marla Sanchez, and Henry Wong. Implications of historical trends in the electrical efficiency of computing. IEEE Annals of the History of Computing, 33(3):46–54, 2011. [17] M. Kryszkiewicz, Concise representation of association rules, Proceedings of the ESF Exploratory Workshop on Pattern Detection and Discovery, Springer-Verlag, London, UK, 92–109. [18] K. Murakami and T. Uno, Efficient algorithms for dualizing large scale hypergraphs, Disc. Appl. Math. 170 (2014), 83–94. [19] J. B. Nation, G. Okimoto, T. Wenska, A. Achari, J. Maligro, T. Yoshioka, and E. Zitello, A Comparative analysis of MRNA expression for sixteen different cancers, preprint, http://www.math.hawaii.edu jb/lust2017615.pdf [20] D. Prajapati, S. Garg and N.C.Chanhan Interesting association rule mining with consistent and inconsistent rule detection from big sales data in distributed environment, Future Computing and Informatics Journal 2 (2017), 19–30. [21] O. Segal, J. Cabot-Miller, K. Adaricheva, J.B. Nation, A. Sharafudinov, The Bases of Association Rules of High Confidence, Proceedings of SIGPRO - 2018, Sydney, David C.Wyld et al. (Eds) pp. 39-51, 2018. [22] Arnaud Soulet and Bruno Crmilleux, Mining constraint-based patterns using automatic relaxation, Intell. Data Anal., 13(1):109–133, 2009. [23] Arnaud Soulet, Chedy Rassi, Marc Plantevit, and Bruno Cremilleux,Mining dominant patterns in the sky In IEEE 11th Int. Conf on Data Mining (ICDM 2011), pages 655–664. IEEE, 2011. [24] T. Rauber and G. Runger. ¨ Parallel Programming: for Multicore and Cluster Systems. Springer Berlin Heidelberg, 2013. [25] The Cancer Genome Atlas Research Network, The Cancer Genome Atlas Pan-Cancer analysis project, Nature Genetics 45 (2013), 1113–1120. [26] Frequent Itemset Mining Dataset Repository, publicly available at http://fimi.ua.ac.be/data/retail.dat
  • 9. Paper -03 Key Factors Influencing Job Satisfaction of Non- Tenured IT Faculty in the USA Sharon Nesbitt Bazil and Shawon S. M. Rahman ABSTRACT This study increased the overall knowledge of job satisfaction among non-tenured IT faculty by way of contributing to the body of management knowledge in the IT environment. The study results provided higher education institution IT leaders and management the vision and understanding to handle job satisfaction issues within the IT environment. This information is also crucial in helping higher education institutions perform at high levels of employee retention, flexibility, and employee job satisfaction by focusing on autonomy and the opportunity for advancement. This quantitative research examined the relationship between (a) the extrinsic motivators (predictor/independent variables), operationalized as autonomy; (b) the intrinsic motivators, operationalized as advancement opportunities; and (c) the job satisfaction level of IT faculty in higher educational institutions (dependent variable). This research has added to the body of knowledge regarding what is needed for IT educators to have job satisfaction by examining how much the independent variables affect job satisfaction of IT faculty in higher educational institutions. We have defined and analyzed methods and practices that companies could apply as they formulate the essential skills and resources for predicting job satisfaction among IT faculty. In this area of job satisfaction, additional understanding could support higher education institutions learning how to keep experienced IT faculty. To examine the extent to which autonomy and opportunity for advancement predict job satisfaction, a multiple linear regression was conducted. This study added to the existing body of knowledge regarding what is needed for IT educators to have job satisfaction by examining how much the independent variables of opportunity for advancement and autonomy affect job satisfaction of IT faculty in higher educational institutions. Additional knowledge in this area of job satisfaction may support higher educational institutions in learning how to retain experienced IT faculty. By addressing these factors related to job satisfaction, employers can better understand what motivates and keeps IT workers satisfied in their jobs. Keeping IT employees satisfied will help retain them and prevent them from job-hopping KEYWORDS USA IT Faculty, IT Job Satisfaction, IT Professionals in Education, Non-tenured Position, Higher Educational Institute, IT Faculty Motivation, IT Job in Academia For More Details: http://it-in-industry.com/itii_papers/2018/6318itii03.pdf Volume Link: http://airccse.org/journal/ITII/itii2018.html
  • 10. REFERENCES [1] Jiang, J. J., & Klein, G. (1999). Supervisor support and career anchor impact on the career satisfaction of the entry-level information systems professional. Journal of Management Information Systems, 16, 219–240. Retrieved from http://www.jstor.org/stable/40398450 [2] Kooser, A. C. (2015). How does technology improve a business? Chron. Retrieved from http://www.chron.com/ [3] Reichheld, F. F. (1996). Learning from customer defections. Harvard Business Review,74,56–67. [4] Hamlett, C. (2015). How stress affects your work performance. Chron. Retrieved from http://www.chron.com/ [5] Wright, T. A., &Staw, B. M. (1999). Affect and favorable work outcomes: Two longitudinal tests of the happy-productive worker thesis. Journal of Organizational Behavior, 20, 1–23. doi:10.1002/(SICI)1099- 1379(199901)20:13.0.CO;2-W [6] Adams, C. G. (2014). Faculty perception of autonomous motivation in higher education: An exploratory qualitative inquiry (Doctoral dissertation, Capella University). [7] Oswald, A. J. (1997). Happiness and economic performance. Economics Journal, 107, 1815–1831. doi:10.1111/j.1468-0297.1997.tb00085.x [8] Adams, C., Clark, L. M., Goldman, M., Jester, R., Lee, M., Hubbard, D., Soejarto, A., Cantara, M., & Thompson, E. (2006). Skills shortages are emerging in the CSI service market. Retrieved from https://www.gartner.com/doc/492837/skill-shortages-emerging- csiservice [9] Joseph, D., Kok-Yee, N., Koh, C., & Soon, A. (2007). Turnover of information technology professionals: A narrative review meta-analytic structural equation modeling and model development. MIS Quarterly, 31, 547–577. Retrieved from https://www.jstor.org/ journal/misquarterly [10] Cropanzano, R., Howes, J. C., Grandey, A. A., &Toth, P. (1997). The relationship of organizational politics and support to work behaviors, attitudes and stress. Journal of Organization Behavior, 18(2), 159–180. http://dx.doi.org/10.1002/(sici)1099- 1379(199703)18:23.0.co;2-d [11] Agarwal, R., De, P., &Ferratt, T. W. (2001, April). How long will they stay? Predicting an IT professional's preferred employment duration. In Proceedings of the 2001 ACM SIGCPR
  • 11. Conference on Computer personnel research (pp. 132–138). http://dx.doi.org/10.1145/371209.371226 [12] Imran, H., Arif, I., Cheema, S. &Azeem, M. 2014. Relationship between Job Satisfaction, Job Performance, Attitude towards Work, and Organizational Commitment. Entrepreneurship and Innovation Management Journal, 2(2): 135144 [13] Aggarwal, N., &Medury, Y. (2012). Job satisfaction among faculty: An approach to study the intention to leave or stay in the university (No. 2012-4-9). Retrieved from http://econpapers.repec.org/paper/vorissues/2012-4-9.html [14] Allen, D. G., Shore, L. M., &Griffeth, R. W. (2003). The role of perceived organizational support and supportive human resource practices in the turnover process. Journal of Management, 29(1), 99– 118. http://dx.doi.org/10.1177/014920630302900107 [15] Altbach, P. G. (1977). In search of Saraswati: The ambivalence of the Indian academic. Higher Education, 6(2), 255–275. http://dx.doi.org/10.1007/bf00141881 [16] Amos, E. A., &Weathington, B. L. (2008). An analysis of the relation between employee— Organization value congruence and employee attitudes. Journal of Psychology, 142(6), 615– 632. [17] Armstrong-Strassen, M., &Ursel, N. D. (2009). Perceived organizational support, career satisfaction, and the retention of older workers. Journal of Occupational and Organizational Psychology, 82(1), 201. doi:10.1348/096317908X288838 [18] Waltman, J., Bergom, I., Hollenshead, C., Miller, J., & August, L. (2012). Factors contributing to job satisfaction and dissatisfaction among non-tenure-track faculty. The Journal of Higher Education, 83(3), 411- 434. [19] Arnett, D. B., Laverie, D. A., & McLane, C. (2002). Using job satisfaction and pride as internal marketing tools. Cornell Hotel and Restaurant Administration Quarterly, 43(2), 87– 96. doi:10.1016/S0010- 8804(02)80035-0 [20] Baard, P. P., Deci, E. L., & Ryan, R. M. (2004). The relation of intrinsic need satisfaction to performance and wellbeing in two work settings. Journal of Applied Social Psychology, 34, 2045–2068. [21] Violino, B. (2009, April). Finding your happy (work) place. CIO Insight, 38–40. Retrieved from http://www.cioinsight.com/c/a/ITManagement/Finding-Your-Happy-IT- WorkPlace-254569 [22] Bassi, L., &McMurrer, D. (2007). Maximizing your return on people. Harvard Business Review, 85(3), 115–123. Retrieved from https://hbr.org/ [23] Prasad, J., Enns, H. G., &Ferratt, T. W. (2007). One size does not fit all: Managing IT employees’ employment arrangements. Human Resource Management, 46, 349. doi:10.1002/hrm.20168
  • 12. [24] Bolliger, D. U., &Wasilik, O. (2009, May). Factors influencing faculty satisfaction with online teaching and learning in higher education. Distance Education, 30(1), 103-116. [25] Doty J. (2014, September 6). Mindfulness and compassion are good for business bottom line. Australian Broadcasting System. Retrieved from http://www.abc.net.au/ [26] Cohen, J. (1992). A power primer. Psychological bulletin, 112(1), 155. [27] Brace, N., Kemp, R., &Snelgar, R. (2012). SPSS for psychologists (5th ed.). Mahwah, NJ: Lawrence Erlbaum Associates. [28] Coombs, W. T. (2009). Conceptualizing crisis communication. In R. L. Health, & H. D. O’Hair (Eds.), Handbook of risk and crisis communication (pp. 99–118). New York: Taylor & Francis. [29] Torvalds, L. (2002). Just for fun: The story of an accidental revolutionary. New York, NY: Collins Press. [30] Curran, M. J. (2013). Institution-related, instructor-related, and studentrelated factors that influence satisfaction for online faculty at a for-profit institution. Robert Morris University. [31] DeLong, R. S. (2015). Key strategies for retaining information technology professionals (Doctoral dissertation). Available from ProQuest Dissertations and Theses database. (UMI No. 3739367) [32] Eichar, D.M., Brady, E.M., &Fortinsky, R.H. (1991). The job satisfaction of older workers. Journal of Organizational Behavior, 12(7), 609-620. [33] Grady, T. L., &Figueira, E. A. C. (1987). Vocational teacher turnover/retention behavior: A four stage process. Journal of Vocational and Technical Education, 4(1), 25–38.Retrieved from http://eric.ed.gov/ [34] Ghazzawi, I. (2008) Job satisfaction among information technology professionals in the US: An empirical study. Journal of American Academy of Business, 13(1), 1–15. Retrieved from http://www.jaabc.com/journal.htm [35] Trevino, J. O. (2014). Emotional and social intelligence: A study of interpersonal, intrapersonal, social awareness, and social facility skills of information technology professionals in higher education (Doctoral dissertation, Texas A&M University-Corpus Christi). Retrieved from https://tamucc-ir.tdl.org/tamucc-ir/handle/1969.6/616 [36] Ford, V. F., Swayze, S., & Burley, D. L. (2013). An exploratory investigation of the relationship between disengagement, exhaustion and turnover intention among IT professionals employed at a university. Information Resources Management Journal (IRMJ), 26(3), 55-68. [37] Johnsrud, L. K., & Rosser, V. J. (2002). Faculty members' morale and their intention to leave. The Journal of Higher Education, 73(4), 518- 543. [38] Freeman, P. &Aspray, W. (1999). The Supply of Information Technology Workers in the United States. Washington, DC: Computing Research Association.
  • 13. [39] Gahlan, V. S., & Singh, K. (2014). The effect of role overload and role ambiguity on job performance of IT professionals in India. IUP Journal of Management Research, 13(3), 37. [40] George, J. M., & Jones, G. R. (2005). Understanding and managing organizational behavior (4th ed.). Upper Saddle River, NJ: Prentice Hall. [41] Ghazzawi, I. (2011). Does age matter in job satisfaction? The case of US information technology professionals. Journal of Organizational Culture, Communications and Conflict, 15(1), 25. [42] Greenberg, J., & Baron, R. A. (2008). Behavior in organizations (9th ed.). Upper Saddle River, NJ: Pearson Prentice. [43] Hayes, F. (1998). Don’t underestimate the labor shortage; It's real, despite the hoopla surrounding it. Computerworld-Marion, 32(5), 8–11. [44] Diedericks, E., &Rothmann, S. (2013). Flourishing of information technology professionals: the role of work engagement and job satisfaction. Journal of Psychology in Africa, 23(2), 225-233. [45] Herzberg, F., Mausner, B., & Snyderman, B. B. (1959). The motivation to work. New York, NY: Chapman & Hall. [46] George, D., &Mallery, P. (2016). SPSS for Windows step by step: A simple guide and reference, 11.0 update. Boston, MA: Allyn and Bacon. [47] Kim, S., & Wright, B. E. (2007). IT employee work exhaustion: Toward an integrated model of antecedents and consequences. Review of Public Personnel Administration, 27(2), 147– 170. doi:10.1177/0734371X06290775 [48] Lounsbury, J. W., Moffit, L. Gibson, L. W., Drost, A. W., & Stevens, M. (2007). An investigation of personality traits in relation to job and career satisfaction of information technology professionals. Journal of Information Technology, 22(2), 174–184. doi:10.1057/palgrave.jit.2000094 [49] Gainey, T. W., &Clenney, B. F. (2006). Flextime and telecommuting: Examining individual perceptions. Southern Business Review, 32(1), 13–22. Retrieved from https://www.questia.com/library/p61306/southern-business-review [50] Korunka, C., Hoonakker, P. L. T., &Carayon, P. (Eds.). (2005). Towards a universal turnover model for the IT workforce – A replication study. Santa Monica, CA: IEA Press. [51] Scott, K. D., & Taylor, G. S. (1985). An examination of conflicting findings on the relationship between job satisfaction and absenteeism: A meta-analysis. Academy of Management Journal, 28, 599–612. doi:10.2307/256116 [52] Herzberg, F. (1968). One more time: How do you motivate employees? Boston, MA: Harvard Business Press.
  • 14. [53] Khoury, S. Y. (2009). Perceived recognition among full-time computer instructors in community colleges. [54] Robson, C. (2002). Real world research: A resource for social scientists and practitioner - researchers (2nd ed.). Malden, England: Blackwell. [55] Lim, S. (2007) Library informational technology workers: Their sense of belonging, role, job autonomy, and job satisfaction. Journal of Academic Librarianship, 33(4), 492–500. doi:10.1016/j.acalib.2007.03.007 [56] Lounsbury, J. W., Sundstrom, E., Levy, J. J., & Gibson, L. W. (2014). Distinctive personality traits of information technology professionals. Computer and Information Science, 7(3). http://dx.doi.org/10.5539/cis.v7n3p38 [57] McCredie, J. (2003). Does IT matter to higher education? EDUCAUSE Review, 38(6), 14– 22. Retrieved from http://er.educause.edu/ [58] Moore, J. E. (2000a). One road to turnover: An examination of work exhaustion in technology professionals. MIS Quarterly 24(1), 141–168. doi:10.2307/3250982 [59] Nagar, K. (2012). Organizational commitment and job satisfaction among teachers during times of burnout. Vikalpa, 37(2), 43–60. Retrieved from http://www.vikalpa.com/pdf/articles/2012/Pages-fromVikalpa37.2-43-60.pdf [60] Tabachnick, B. G., &Fidell, L. S. (2013). Using multivariate statistics (6th ed.). Boston, MA: Allyn and Bacon. [61] Payne, W. L. (2013). Motivating factors of florida community and state college information technology faculty (Order No. 3560625). Available from ProQuest Dissertations & Theses Full Text. (1357125247). [62] Porter, L.W., & Steers, R. M. (1973). Organizational, work and personal factors in employee turnover and absenteeism. Psychological Bulletin, 80, 151–176. http://dx.doi.org/10.1037/h0034829 [63] Ramirez, R., Kraemer K. L., Lawler, E. (2001). The contribution of information technology investments to firm performance: Influence of management practices. Working paper. Center for Research on Information Technology and Organizations, University of California, Irvine, CA. [64] Hecker, D. E. (2005). Occupational employment projections to 2014. Monthly Labor Review, 128(11), 70–101. Retrieved from http://www.bls.gov/mlr/ [65] Robbins, S. P., & Judge, T. A. (2007). Organizational behavior (12th ed.). Upper Saddle River: NJ, Pearson Prentice Hall.
  • 15. [66] Tschopp, C., Grote, G., & Gerber, M. (2014). How career orientation shapes the job satisfaction–turnover intention link. Journal of Organizational Behavior, 35(2), 151–171. http://dx.doi.org/10.1002/job.1857 [67] St. Charles, N. D. (2002). Human resource management practices, faculty morale and the impact on teaching performance and university effectiveness. D.B.A. Dissertation, Argosy University/Sarasota, Publication No. AAT 3056962. [68] Ruhland, S. (2001). Factors that influence the turnover and retention of Minnesota's technical college teachers. Journal of Vocational Education Research, 26(1), 56–76. Retrieved from http://eric.ed.gov/ [69] Sharma, R. D., &Jyoti, J. (2010). Job satisfaction of university teachers: An empirical study. Journal of Services Research, 9(2), 51–80. Retrieved from http://jsr.sagepub.com/ [70] Wright, M. D. (1985). Relationships among esteem, autonomy, job satisfaction and the intention to quit of downstate Illinois industrial education teachers. Available from ProQuest Dissertations & Theses database. (UMI No. 303379385). Retrieved from [71] Spector, P. E. (1985). Measurement of human service staff satisfaction: Development of the job satisfaction survey. American Journal of Community Psychology, 13, 693–713. http://dx.doi.org/10.1007/bf00929796 [72] Tabachnick, B. G., &Fidell, L. S. (2012). Using multivariate statistics (6th ed.). Boston, MA: Pearson [73] Temple, J. C. (2013). A quantitative study of factors contributing to perceived job satisfaction of information technology professionals working in California community colleges (Doctoral dissertation). Available from ProQuest Dissertations & Theses database. (UMI No. 3573694) [74] Van Dyk, J., Coetzee, M., &Takawira, N. (2014). Satisfaction with retention factors as predictors of the job embeddedness of medical and information technology services staff. Southern African Business Review, 17(1), 57–75. Retrieved from http://www.ajol.info/index.php/sabr/article/view/110880 [75] Stevens, J.P. (2009). Applied multivariate statistics for the social sciences (5th ed.). New York: Routledge. [76] Wright M., Custer R. (1998). Why they enjoy teaching: The motivation of outstanding technology teachers. Journal of Technology Education, 9, 60–77. [77] Twombly, S. & Townsend, B. K. (2008). Community college faculty: What we know and need to know. Community College Review, 36(1), 5-24.