Keyword | Year Pub | Article | Title | Authors |
R & R-Shiny | 2017 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
R-CAST | 2009 | View | Determining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
radical innovation | 2017 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
rapid delivery | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Raspberry Pi | 2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
real time bidding | 2017 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Real-time Data Streaming Architecture | 2023 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
Recognition-primed Decision Making (RPD) Model | 2009 | View | Determining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
regression | 2015 | View | On Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Regression, | 2019 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Regulatory compliance | 2020 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
Regulatory Environment | 2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
Relational Governance | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
Relationship Management | 2016 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
religiosity | 2024 | View | Information Adoption of User-Generated Content: An Applied Model for COVID Pandemic Case |
Xie, Dhillon
|
Remote Deposit Capture (RDC) | 2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
research administration | 2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
research and development | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
Residual data | 2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
Resilience | 2024 | View | Resilience During Times of Disruption: The Role of Data Analytics in a Healthcare System |
Pohana, Ariyachandra
|
REST | 2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
RESTful | 2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
Review Valence | 2022 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
RFID | 2017 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
RFID | 2014 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
Rich Internet Applications | 2010 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
risk | 2017 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
risk | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
Risk assessment | 2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Risk assessment | 2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Risk management | 2020 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
Risk management | 2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Risk management | 2013 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Robotic | 2021 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Robotics | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
RPA | 2021 | View | Integration of Information Systems: Robotic Process Automation |
Money
|