Search by Keyword

Search returned 24 items for : R

KeywordYear PubArticleTitleAuthors
R & R-Shiny2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
R-CAST2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
radical innovation2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
real time bidding2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Recognition-primed Decision Making (RPD) Model2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
regression2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Regulatory Environment2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Relational Governance2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Relationship Management2016ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Remote Deposit Capture (RDC)2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
research administration2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
research and development2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
Residual data2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
REST2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
RESTful2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
RFID2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
RFID2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Rich Internet Applications2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
risk2017ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
risk2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
risk assessment2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
risk assessment2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Risk Management2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Risk Management2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer