Keyword | Conf Year | Article | Title | Authors |
R & R-Shiny | 2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
R-CAST | 2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
radical innovation | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
random perturbation | 2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
Ransomware attack | 2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
Rape Case | 2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
rapid delivery | 2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Raspberry Pi | 2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
Rationale | 2012 | View | The Adoption of Green IT/IS: |
Sharma
|
real time bidding | 2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Real-Time | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
Real-time Data Streaming Architecture | 2022 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
reciprocal normalization | 2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
Recognition-primed Decision Making (RPD) Model | 2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
recruitment | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
regression | 2015 | View | Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles |
Auten, Hammell II
|
regression | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Regression, | 2018 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Regulatory compliance | 2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
Regulatory Environment | 2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
Relational database | 2009 | View | Object Reuse and Integration |
Wang
|
Relational Governance | 2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
Relationship Management | 2015 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
Reliability | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
Remote Deposit Capture (RDC) | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Reporting | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
Reporting | 2021 | View | Targeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations |
Painter
|
Representation | 2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
research administration | 2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
research and development | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
research and development | 2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
Research example | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
Residual data | 2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
REST | 2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
RESTful | 2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
Results lag | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
Review Valence | 2021 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
RFID | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
RFID | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
Rich Internet Applications | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
risk | 2016 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
risk | 2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
Risk assessment | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Risk assessment | 2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Risk management | 2019 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
Risk management | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Risk management | 2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Robotic | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Robotic Process Automation | 2021 | View | Resolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies |
Money
|
Robotics | 2022 | View | Impact of New Technology Use on Workforce: Exploratory Analysis |
Toskin
|
RollRedRoll | 2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
RPA | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Rule-based Systems | 2019 | View | A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems |
Dennis, Sambasivam
|