Search by Keyword

Search returned 36 items for : R

KeywordYear PubArticleTitleAuthors
R & R-Shiny2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
R-CAST2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
radical innovation2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
rapid delivery2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Raspberry Pi2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
real time bidding2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Real-time Data Streaming Architecture2023ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
Recognition-primed Decision Making (RPD) Model2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
regression2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Regression,2019ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Regulatory compliance2020ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Regulatory Environment2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Relational Governance2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Relationship Management2016ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
religiosity2024ViewInformation Adoption of User-Generated Content: An Applied Model for COVID Pandemic Case Xie, Dhillon
Remote Deposit Capture (RDC)2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
research administration2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
research and development2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
Residual data2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Resilience2024ViewResilience During Times of Disruption: The Role of Data Analytics in a Healthcare System Pohana, Ariyachandra
REST2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
RESTful2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Review Valence2022ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
RFID2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
RFID2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Rich Internet Applications2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
risk2017ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
risk2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Risk assessment2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Risk assessment2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Risk management2020ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Risk management2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Risk management2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Robotic2021ViewIntegration of Information Systems: Robotic Process Automation Money
Robotics2023ViewImpact of Emergent Technologies on US Workforce: Exploratory Analysis Toskin
RPA2021ViewIntegration of Information Systems: Robotic Process Automation Money