Search by Keyword

Search returned 53 items for : R


KeywordConf YearArticleTitleAuthors
R & R-Shiny2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
R-CAST2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
radical innovation2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
random perturbation2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Ransomware attack2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Rape Case2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
rapid delivery2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Raspberry Pi2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Rationale2012ViewThe Adoption of Green IT/IS: Sharma
real time bidding2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Real-Time2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Real-time Data Streaming Architecture2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
reciprocal normalization2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
Recognition-primed Decision Making (RPD) Model2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
recruitment2013ViewWeb Recruitment: Parzinger, Ward, Langford
regression2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
regression2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Regression,2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Regulatory compliance2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Regulatory Environment2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Relational database2009ViewObject Reuse and Integration Wang
Relational Governance2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Relationship Management2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Reliability2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
Remote Deposit Capture (RDC)2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Reporting2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Reporting2021ViewTargeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations Painter
Representation2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
research administration2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
research and development2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
research and development2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
Research example2008ViewA Computing Research Example: Following a Question Frank
Residual data2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
REST2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
RESTful2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Results lag2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
Review Valence2021ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
RFID2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
RFID2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Rich Internet Applications2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
risk2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
risk2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Risk assessment2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Risk assessment2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Risk management2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Risk management2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Risk management2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Robotic2020ViewIntegration of Information Systems: Robotic Process Automation Money
Robotic Process Automation2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Robotics2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
RollRedRoll2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
RPA2020ViewIntegration of Information Systems: Robotic Process Automation Money
Rule-based Systems2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam