Orphaned pages
The following pages are not linked from or transcluded into other pages in CIO Wiki.
Showing below up to 500 results in range #501 to #1,000.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- Just-World Effect
- Key Global Indicator (KGI)
- Key Success Factors (KSF)
- Killer Bees
- Knowledge Organization Systems (KOS)
- Korey's Model
- Kraljic Matrix
- LAMP Software
- Ladder of Inference
- Laffer Curve
- Lap Dog Theory
- Large Group Capacitation
- Last-In First-Out
- Learning Cycle
- Level 5 Leadership
- Leveraged Buy-out
- Leveraged Recapitalization
- Levers of Control
- Lexical Hypothesis
- Likert Management Systems
- Line of Business (LOB)
- Linear Economy
- Linear Strategy
- Linked Data
- Lobster Trap
- Local Land and Property Gazetteer (LLPG)
- Logical Database Design
- Logical Incrementalism
- Loss Aversion Bias
- Loss Leader
- Low Ball Technique
- Loyalty Program
- MAGIC (Measuring and Accounting Intellectual Capital)
- MECE Principle
- MK II Method
- MLOps
- Macro Environment
- Main Page
- Managerial Development
- Managerial Value
- Managing Successful Programmes (MSP)
- Managing for Results Framework
- Mandatory Access Control (MAC)
- Marginal Costing
- Marginal Revenue
- Marginal Utility
- Market Perform
- Marketing Operations Management (MOM)
- Marketing Resource Management (MRM)
- Markus and Soh Process Model
- Material Resource Planning (MRP)
- Maturity Date
- Media Intelligence
- Medium-Scale Integration (MSI)
- Message Exchange Pattern (MEP)
- Messaging Patterns
- Meta Model
- Metadata Registry
- Metcalf's Law
- Metonymy
- MiL Model
- Microcredit
- Microfinance
- Microfinance Channel
- Microinsurance
- Mid-Point Differential
- Middle Management
- Milestone
- Mintzberg's 5Ps of Strategy
- Mirroring and Matching
- Mission Activities
- Mission Value
- Mixed System
- Model Driven Development (MDD)
- Model–View–ViewModel (MVVM)
- Modified Accrual Accounting
- Monetary Value
- Moore's Law
- Moral Purpose
- Morphological Analysis
- Multi-Attribute Utility Theory (MAUT)
- Multi Criteria Analysis (MCA)
- Multi Messaging Service (MMS)
- Multidimensional Expressions (MDX)
- Multiple Criteria Decision Analysis (MCDA)
- Multiple Sourcing
- Multipurpose Internet Mail Extensions (MIME)
- Multitasking Behavior
- Multitasking Consumer
- Multiway Data Analysis
- NATO Architecture Framework (NAF)
- NPVGO Model (Net Present Value Of Growth Opportunities)
- Nationalization
- NetBIOS (Network Basic Input/Output System)
- Net Revenue
- New Public Management (NPM)
- Niche Marketing
- Nielsen Ratings
- Nominal Value
- Non-Systemic Risk
- Non Fungible Token (NFT)
- Non Value-Added Work
- Normative Approach of Stakeholder Theory
- OBASHI
- OODA Loop
- OSS through Java™ (OSS/J™)
- Object-Role Modeling (ORM)
- Object Model
- Object Modeling Technique (OMT)
- Object Oriented Approach
- Objective Analysis Tree
- Off-Balance Sheet Financing
- Office of Strategy Management
- Offshore Development
- Offshore Development Model
- On-Demand Software
- One-to-one Marketing
- OneSource
- Online Corporate Reputation
- Online Transaction Processing (OLTP)
- Open Geospatial Consortium (OGC)
- Open Government Licence (OGL)
- Open Knowledge Initiative (OKI)
- Open Security Architecture (OSA) Framework
- Open Services for Lifecycle Collaboration (OSLC)
- Open Web Analytics (OWA)
- Operating Cash Flow
- Operating Income
- Operating Lease
- Operating Profit Percentage
- Operational Analytics
- Operational Business Intelligence (OBI)
- Operational Capacity
- Operational Data Store (ODS)
- Operational Design
- Operations Bridge
- Operations Development
- Operator Function Model
- Opinion Leader
- Orchestration
- Order Management
- Organizational Management
- Outcome-Driven Innovation (ODI)
- Outcome Management
- Outcome Measure
- Outplacement
- PAEI Management Model
- PARTS Model
- PEG Ratio
- POSDCORB
- PRIDE Methodology
- PRIMO-F Model
- PRINCE2®
- PROxy Based Estimating (PROBE)
- PURE Method
- Package Diagram
- Paper Prototyping
- Parallel Design
- Paralysis by Analysis
- Parametric Estimating
- Parent Company
- Parenting Advantage
- Pareto Chart
- Parkinson's Law
- Partner Interface Process (PIP)
- Path-Goal Theory
- Peak-End Rule
- Pearson Correlation Coefficient
- Peer-Appraisal
- Penetration Pricing
- Pension Parachute
- People, Process, Technology Framework
- People Analytics
- People Pill
- Perceived Value Pricing
- Percentage-of-Completion Method
- Performance Based Budgeting (PBB)
- Performance Indicator
- Peripheral Technology
- Perishability
- Permission Marketing
- Personal Belief Bias
- Persuasion Techniques
- Peter Principle
- Phantom Stock Plan
- Plug-in
- Point-To-Point Integration
- Point of Presence (POP)
- Poison Put
- Portable Network Graphics (PNG)
- Portfolio Agility
- Portfolio Insurance
- Positive Deviance
- Post Implementation Review
- Postmodern ERP
- Pre-Employment Screening
- Preboot Execution Environment (PXE)
- Precedence Diagram Method (PDM)
- Predictive Model Markup Language (PMML)
- Pressure Group
- Price Skimming
- Primary Customer
- Principal Component Analysis (PCA)
- Principles of Reinvention
- Prioritization Matrix
- Prisoner's Dilemma
- Private Equity
- Pro Forma Earnings
- Probabilistic Risk Assessment (PRA)
- Probability Distribution
- Procedure
- Procedure Manual
- Process Decision Program Chart
- Process Hierarchy Diagram
- Profile Diagram
- Profit Motive
- Profit Pools
- Profit and Loss Statement
- Profitability Ratios
- Project Planning Matrix
- Promotional Pricing
- Proof of Concept (POC)
- Proportional Voting
- Proprietary Software
- Protected Extensible Authentication Protocol (PEAP)
- Protected Health Information (PHI)
- Pseudocode
- Psychological Pricing
- Public Value
- Put Option
- Putnam Model
- Qualitative Investment Analysis
- Quantitative Investment Analysis
- QueryInterface
- Quick Response Manufacturing
- RAPID Approach
- RAP as a Service (RaaS)
- RFID Technology
- Rapid Application Development (RAD)
- Rapid Economic Justification (REJ™)
- Real-Time Business Intelligence (RTBI)
- Real-Time Enterprise (RTE)
- Real Business-Cycle Theory (RBC Theory)
- Real Options
- Rebalancing
- Recapitalization
- Recognition Heuristic (RH)
- Reconciliation
- Record Linkage
- Recruiting
- Recurrent Cascade-Correlation (RCC)
- Redemption Value
- Reference Data Management (RDM)
- Reflective Process
- Reflective Reasoning
- Relational Capital
- Relational Model/Tasmania (RM/T)
- Relative Value of Growth
- Remote Infrastructure Management
- Remote Monitoring and Management (RMM)
- Request for Information (RFI)
- Request for Tenders (RFT)
- Reservoir Approach
- Residual Income
- Residual Value
- Responsibility Assignment Matrix (RAM)
- Restricted Stock
- Result Oriented Management
- Results Based Management (RBM)
- Retainer
- Revans' Formula
- Reverse Auction
- Reverse Card Sorting
- Reverse Logistics
- Reverse Positioning
- Rightsourcing
- Ring Fencing
- RosettaNet Implementation Framework (RNIF)
- Round Robin Brainstorming
- Round Table Discussion
- Rule Induction
- Rule of 72
- Rule of Three
- Run time (Program Lifecycle Phase)
- Runbook
- Runbook Automation
- S-Curve
- SEER-SEM
- SG&A (Selling, General & Administrative Expense)
- SLIM Framework
- SOA Governance
- SOFT Model
- SOSTAC Model
- SOSTAC® Planning Model
- STRATPORT Model
- Safe Harbor
- Safe Harbor Statement
- Sale and Leaseback
- Sales Order
- Satisficing
- Say's Law
- Scareware
- Scenarios Forecasting
- Schematic Model
- Schools Interoperability Framework (SIF)
- Scientific Management
- Scientific Visualization
- Scorched Earth Defense
- Second-Mover Strategy
- Securitization
- Segment Architecture
- Self-Appraisal
- Self-Directed Team
- Sell-Side Analyst
- Semantic Business Process Management (SBPM)
- Semantic Data Modeling
- Semantic Integration
- Semantic Interoperability
- Semantic Spectrum
- Seven Habits of Highly Effective People
- Seven Signs Of Ethical Collapse
- Seven Stages of Action
- SharePoint
- Shared Service Center
- Shared Value
- Shareware
- Sherwood Applied Business Security Architecture (SABSA) Framework
- Shore's Classification
- Short Message Service (SMS)
- Short Selling
- Shotgun Surgery
- Simple Knowledge Organization System (SKOS)
- Single Sourcing
- Situational Leadership
- Six Forces Model
- Skandia Navigator
- Skeleton Staff
- Skills Framework for the Information Age (SFIA)
- Sleeper Effect
- Smart Machines
- Social Cost Benefit Analysis (SCBA)
- Social Intelligence
- Social Multi Criteria Analysis (SMCA)
- Societal Value
- Solutions Provider
- Source Lines of Code
- Spear Phishing
- Special Purpose Vehicle
- Spin-Off
- Spiral of Silence
- Splay Tree
- Spotify Model
- Spreadmart
- Staff Management
- Stages of Team Development
- Standard Cost Pricing
- Standstill Agreement
- Status Quo
- Status Quo Bias
- Stealth Positioning
- Stochastic Modeling
- Storage Device
- Storyboard
- Straight Through Processing (STP)
- Straw Man Concept
- Structure Chart
- Structure Follows Strategy
- Structured Analysis and Design Technique (SADT)
- Structured Data Analysis
- Sub Contractor
- Subliminal Advertizing
- Subscription Right
- Substitution Effect
- Sunk Cost
- Supervisoral Development
- Support Activities
- Switch Framework
- Synchromarketing
- Synectics
- System Integration Testing (SIT)
- T-Shaped Skills
- TDC Matrix
- Tableless Web Design
- Tactical Plan
- Target
- Target Pricing
- Task Dependencies
- Task Management
- Tax Haven
- Team Management Profile
- Technical Analysis
- Technical Bankruptcy
- Technical Standard
- Technological Forecasting
- Technology Appropriation
- Technology Enhanced Interaction Framework
- Techquisition
- Terms of Reference
- Terms of Service
- Tertiary Sector
- Test Marketing
- Test Method
- The Abridged Big Five-Dimensional Circumplex (AB5C)
- The Bullwhip Effect
- The Central Computer and Telecommunications Agency (CCTA)
- The DIKW Model
- The Disciplined Agile (DA) Framework
- The Eisenhower Method
- The Four Stages of Learning
- The Greiner Curve
- The Institute of Electrical and Electronics Engineers (IEEE)
- The Interaction Framework
- The KISS Principle
- The N7 and 7MP Tools
- The Nominal Group Technique (NGT)
- The Object-Oriented Hypermedia Design Model (OOHDM)
- The Open Information Systems Management Maturity Model (O-ISM3)
- The POSEC Method
- The Principle of Causality
- The Problem Definition Process
- The Relational Model (RM)
- The Shell Directional Policy Matrix
- The Star Model
- The Three Component Model of Organizational Commitment
- The Value Model™ (VM)
- The Value Net Model
- Theoretical Method
- Thinker's Keys
- Three Dimensional Business Definition
- Ticket Management
- Tie-in Marketing
- Time-Based Activity Based Costing
- Time-Triggered Architecture (TTA)
- Timing Diagram
- Top-Level Domain (TLD)
- Total Business Return (TBR)
- Total Shareholder Return (TSR)
- Towers Perrin Model
- Training Within Industry
- Trait Leadership Theory
- Trajectories of Industry Change
- Transaction Cost Theory
- Treasury Enterprise Architecture Framework (TEAF)
- Treasury Stock
- Trusted Computer System Evaluation Criteria (TCSEC)
- Twelve Principles of the Network Economy
- Two Factor Theory
- Ultra Vires
- Ultramobiles
- Unaided Recall
- Unbranding
- Undercapitalization
- Underwriters Laboratories (UL)
- Undifferentiated Marketing
- Unfreezing, Moving, Refreezing
- Unified Endpoint Management (UEM)
- Unified Profile for DoDAF/MODAF (UPDM)
- Unified Theory of Acceptance and Use of Technology (UTAUT)
- Uniform Resource Identifier (URI)
- Unissued Stock
- Unit Cost
- Universal Data Element Framework (UDEF)
- Universal Description, Discovery and Integration (UDDI)
- Universal Strategy Formulation Model (USFM)
- Unsolicited Commercial Email (UCE)
- Unstructured Information Management Architecture (UIMA)
- Use Case Points (UCP)
- VRIN Framework
- Validity Effect
- Variable Costing
- Vendor Rating
- Venn Diagram
- Venture Capital
- Venture Funding
- Vertical Agreement
- Vertical Merger
- Vesting of Stock or Options
- Viability Study
- Virtual Business
- Virtual Customer Premises Equipment (vCPE)
- Virtual Function
- Virtual Inheritance
- Virtual Method Table (VMT)
- Vital Business Function (VBF)
- Vocabulary of Interlinked Datasets (VoID)
- Voluntary Interindustry Commerce Standards (VICS) Association
- Von Neumann Architecture
- Voting Rights Plan
- Vulture Capitalist
- WIAL Model
- WORM (Write Once Read Many)
- WYSIWYG (What You See Is What You Get)
- Wage Drift
- Warrant
- Watchdog Model
- Website Wireframe
- Wf-XML
- Whisper Number
- White Paper
- Wideband Delphi