Actions

Special

Oldest pages

Showing below up to 50 results in range #1,051 to #1,100.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Data Portability‏‎ (18:06, 12 January 2023)
  2. Data Reference Model (DRM)‏‎ (18:08, 12 January 2023)
  3. Social Media Governance‏‎ (15:44, 13 January 2023)
  4. E-Business Model‏‎ (15:49, 13 January 2023)
  5. E-Marketing‏‎ (15:58, 13 January 2023)
  6. E-Business‏‎ (16:00, 13 January 2023)
  7. Market Research‏‎ (22:03, 15 January 2023)
  8. Gartner‏‎ (22:06, 15 January 2023)
  9. Run-Grow-Transform (RGT) Model‏‎ (22:06, 15 January 2023)
  10. Securities and Exchange Commission (SEC)‏‎ (12:01, 16 January 2023)
  11. Basel Committee on Banking Supervision‏‎ (12:03, 16 January 2023)
  12. Chief Information Governance Officer (CIGO)‏‎ (13:44, 16 January 2023)
  13. Information Governance Initiative (IGI)‏‎ (13:46, 16 January 2023)
  14. Information Governance Reference Model (IGRM)‏‎ (13:54, 16 January 2023)
  15. Data Protection Act‏‎ (14:02, 16 January 2023)
  16. Foreign Account Tax Compliance Act (FATCA)‏‎ (14:07, 16 January 2023)
  17. Health Insurance Portability and Accountability Act (HIPAA)‏‎ (14:07, 16 January 2023)
  18. The Gramm–Leach–Bliley Act (GLBA)‏‎ (14:08, 16 January 2023)
  19. Glass–Steagall Act‏‎ (14:08, 16 January 2023)
  20. Federal Rules of Civil Procedure (FRCP)‏‎ (14:09, 16 January 2023)
  21. Information Governance Professional (IGP) Certification‏‎ (14:10, 16 January 2023)
  22. Technology Appropriation‏‎ (14:50, 16 January 2023)
  23. 8 Hidden Needs‏‎ (15:25, 16 January 2023)
  24. ABAP Memory‏‎ (15:35, 16 January 2023)
  25. ITIL Service Strategy‏‎ (15:42, 16 January 2023)
  26. VUCA (Volatility, Uncertainty, Complexity, Ambiguity)‏‎ (15:46, 16 January 2023)
  27. IT Vision‏‎ (15:57, 16 January 2023)
  28. Strategic Information Systems Planning (SISP)‏‎ (16:04, 16 January 2023)
  29. Return on Investment (ROI)‏‎ (16:07, 16 January 2023)
  30. Access Control List (ACL)‏‎ (16:58, 16 January 2023)
  31. Distributed Component Object Model (DCOM)‏‎ (17:14, 16 January 2023)
  32. Dynamic Data Exchange (DDE)‏‎ (17:24, 16 January 2023)
  33. Object Linking and Embedding (OLE)‏‎ (17:25, 16 January 2023)
  34. External Environment‏‎ (17:34, 16 January 2023)
  35. Boil the Ocean‏‎ (17:35, 16 January 2023)
  36. Bond Insurance‏‎ (17:35, 16 January 2023)
  37. Bottom-up Approach‏‎ (17:36, 16 January 2023)
  38. Break-even Point‏‎ (17:37, 16 January 2023)
  39. Bridging Epistemologies‏‎ (17:38, 16 January 2023)
  40. Broad Network Access‏‎ (17:40, 16 January 2023)
  41. Browser Isolation‏‎ (17:41, 16 January 2023)
  42. Cyber Attack‏‎ (17:41, 16 January 2023)
  43. Browser Hijacking‏‎ (17:42, 16 January 2023)
  44. Component Object Model (COM)‏‎ (17:56, 16 January 2023)
  45. Phishing‏‎ (18:29, 16 January 2023)
  46. Identity Theft‏‎ (18:30, 16 January 2023)
  47. Value Proposition‏‎ (18:31, 16 January 2023)
  48. Cannibalization‏‎ (18:33, 16 January 2023)
  49. Microblogging‏‎ (18:33, 16 January 2023)
  50. Business Process Architecture‏‎ (18:37, 16 January 2023)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)