- Research Roadmap for Smart Fire Fighting
- Research Technology Protection Oversight Council
- Research and Development Degree of Difficulty
- Research and Innovative Technology Administration
- Research and Technology Protection
- Research and development
- Research data
- Research for Advanced Communications in Europe
- Research infrastructure
- Research intelligence
- Research virus
- Reseller
- Reservation of rights
- Reshipping initiative
- Resident virus
- Residual data
- Residual risk
- Residual value
- Resilience
- Resilience, Deterrence and Defence: Building strong cyber security for the EU
- Resilience of the Internet Interconnection Ecosystem
- Resiliency testing
- Resilient Military Systems and the Advanced Cyber Threat
- Resilient system
- Resistance
- Resolution
- Resolution 40a
- Resolution Directing Use of Compulsory Process to Collect Information Regarding Data Brokers
- Resolution Regarding Cybersecurity
- Resolution of 15 November 2011 on Online Gambling in the Internal Market
- Resolution on the promotion, protection and enjoyment of human rights on the Internet
- Resolve
- Resolver
- Resolver exploit
- Resolving Disputes Online: Best Practices for Online Dispute Resolution (ODR) in B2C and C2C Transactions
- Resource Abstraction and Control Layer
- Resource Description Framework
- Resource Guide for Cybersecurity During the COVID-19 Pandemic
- Resource Public Key Infrastructure
- Resource allocation
- Resource and Patient Management System
- Resource behavior
- Resource change
- Resource control
- Resource exhaustion attack
- Resource management
- Resource materials on technology-enabled crime
- Resource monitoring
- Resource negotiation
- Resource pooling
- Resource reservation protocol
- Resource sharing
- Resource starvation
- Resource utilization
- Resourcefulness
- Resources
- Respect for Context principle
- Respect for privacy
- Respectful and Responsible Relationships: There's No App for That
- Respond
- Responder
- Responding to the Greater Tohoku Disaster: The Role of the Internet and Cloud Computing in Economic Recovery and Renewal
- Response
- Response Federal Interagency Operational Plan
- Response time
- Responsibilities of Third-Party Service Providers under FERPA
- Responsibility
- Responsible individual
- Responsible source
- Responsive web design
- Responsiveness
- Restart
- Restitution
- Restoration
- Restore
- Restore Online Shoppers' Confidence Act
- Restoring Internet Freedom
- Restraining order
- Restricted TLD
- Restricted area
- Restricted data
- Restricted information
- Restricted portal
- Restricted rights
- Restricted use
- Restrictive covenant
- Results
- Results-based management
- Resurgence
- Retail Industry Leaders Association
- Retail Services v. Freebies Publishing
- Retail Systems v. CNA Insurance
- Retail payments
- Retail piracy
- Retailer
- Retained records
- Retaliation
- Retaliatory hacking
- Retention period
- Rethinking Communications Regulation
- Rethinking Personal Data: A New Lens for Strengthening Trust
- Rethinking Personal Data: Strengthening Trust
- Rethinking Spectrum Policy: A Fiber Intensive Wireless Architecture
- Rethinking the Dynamics of the RFP Process for Improved IT Procurement
- Retina recognition
- Retraction
- Retransmission
- Retrievable information
- Retroactive change
- Retrofit
- Retrospective Analysis of Existing Significant Regulations
- Return (ACH)
- Return information
- Return on assets
- Return on investment
- Return policy
- Returned check
- Returning bank
- Retweet
- Reuse
- Reveal
- Revealed: Operation Shady RAT
- Revenge porn
- Revenue
- Revenue and Customs Brief 9 (2014): Bitcoin and other Cryptocurrencies
- Reverse 911
- Reverse English auction
- Reverse auction
- Reverse charge
- Reverse confusion
- Reverse domain-name hijacking
- Reverse domain name hijacking
- Reverse engineering
- Reverse passing off
- Reverse showrooming
- Reverse video
- Reversibility
- Reversible
- Reversibly anonymized data
- Review of Alleged Transmission of Sensitive VA Data Over Internet Connections
- Review of Automated Vehicle Technology: Policy and Implementation Implications
- Review of Automatic Data Processing Developments in the Federal Government
- Review of Formal Information Technology Solicitations
- Review of ICT Infrastructure in the Public Sector in Scotland
- Review of Problems Relating to Management and Administration of Electronic Data Processing Systems in the Federal Government
- Review of Safeguarding Policies and Procedures for Personnel-Related Data
- Review of the Australian Government's Use of Information and Communication Technology
- Review of the Australian Government's Use of Information and Communications Technology
- Review of the Cybercrime Legislation Amendment Bill 2011
- Revised Critical Infrastructure Protection (CIP) Reliability Standards
- Revised Critical Infrastructure Protection Reliability Standards
- Revised Information Quality Bulletin on Peer Review
- Revised Supplemental Guidance on Implementation of the Privacy Act of 1974
- Revision
- Revision control
- Revocation
- Revocation management
- Revoke a certificate
- Revolution in the U.S. Information Infrastructure
- Revolutionizing Science and Engineering through Cyberinfrastructure
- Revolutionizing our Roadways: Cybersecurity Considerations and Automated Vehicle Policy
- Revolutions per minute
- Rewritable optical disk
- Rewriteable
- Rewriting Broadband Regulation
- Reynolds & Reynolds v. King Automobile
- Rich Communication Services
- Rich Text Format
- Richards v. Cable News Network
- Rickroll
- Ridge
- Ridge ending
- Riff
- Right-of-way
- Right-to-know
- Right justify
- Right of attribution
- Right of integrity
- Right of last refusal
- Right of privacy
- Right of publicity
- Right to Financial Privacy Act of 1978
- Right to Information Act 2005
- Right to be forgotten
- Right to petition
- Righthaven v. Hoehn
- Righthaven v. Jama
- Righthaven v. Realty One Group
- Rights clearance
- Rights holder
- Rights in technical data
- Rights management metadata
- Rights metadata
- Riley v. California
- Ring network
- Ringback
- Ringtone
- Rio Properties v. Rio International
- Ripping
- Ripping software
- Risdon Iron v. Medart
- Rise of Robots: The Military's Use of Autonomous Lethal Force
- Rise of the Machines: Artificial Intelligence and its Growing Impact on U.S. Policy
- Rising to the Challenge: U.S. Innovation Policy for Global Economy
- Risk
- Risk-Adaptable Access Control
- Risk-Related Premium System
- Risk-based authentication
- Risk-based cybersecurity
- Risk-based data management
- Risk-based decision making
- Risk-based management
- Risk-based pricing
- Risk-informed decision making
- Risk-informed decisionmaking
- Risk-transfer strategies
- Risk Analysis Process for Informed Decision-making
- Risk Analysis and Management for Critical Asset Protection
- Risk Management Assessment Tool
- Risk Management Framework Service Offerings
- Risk Management Reporting System
- Risk Management for Electronic Banking and Electronic Money Activities
- Risk Management for Replication Devices
- Risk Management of Technology Outsourcing
- Risk Steering Committee
- Risk acceptance
- Risk analysis
- Risk and Responsibility in a Hyperconnected World
- Risk and Vulnerability Assessment
- Risk appetite
- Risk assessment
- Risk assessment methodology
- Risk assessment tool
- Risk assumption
- Risk avoidance
- Risk communication
- Risk consequence
- Risk control
- Risk criteria
- Risk criticality
- Risk data
- Risk description
- Risk escalation
- Risk evaluation
- Risk event
- Risk executive
- Risk exposure
- Risk factor
- Risk governance
- Risk identification
- Risk impact
- Risk index
- Risk landscape
- Risk likelihood
- Risk management
- Risk management-based intelligence
- Risk management framework
- Risk management strategy
- Risk mitigation
- Risk modeling
- Risk monitoring
- Risk perception
- Risk probability
- Risk profile
- Risk ranking
- Risk reduction
- Risk response
- Risk severity
- Risk sharing
- Risk state
- Risk timeframe
- Risk tolerance
Advertisement
34,539
pages
Local Sitemap
Advertisement