Actions

Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in CIO Wiki.

Showing below up to 500 results in range #501 to #1,000.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Just-World Effect
  2. Key Global Indicator (KGI)
  3. Key Success Factors (KSF)
  4. Killer Bees
  5. Knowledge Organization Systems (KOS)
  6. Korey's Model
  7. Kraljic Matrix
  8. LAMP Software
  9. Ladder of Inference
  10. Laffer Curve
  11. Lap Dog Theory
  12. Large Group Capacitation
  13. Last-In First-Out
  14. Learning Cycle
  15. Level 5 Leadership
  16. Leveraged Buy-out
  17. Leveraged Recapitalization
  18. Levers of Control
  19. Lexical Hypothesis
  20. Likert Management Systems
  21. Line of Business (LOB)
  22. Linear Economy
  23. Linear Strategy
  24. Linked Data
  25. Lobster Trap
  26. Local Land and Property Gazetteer (LLPG)
  27. Logical Database Design
  28. Logical Incrementalism
  29. Loss Aversion Bias
  30. Loss Leader
  31. Low Ball Technique
  32. Loyalty Program
  33. MAGIC (Measuring and Accounting Intellectual Capital)
  34. MECE Principle
  35. MK II Method
  36. MLOps
  37. Macro Environment
  38. Main Page
  39. Managerial Development
  40. Managerial Value
  41. Managing Successful Programmes (MSP)
  42. Managing for Results Framework
  43. Mandatory Access Control (MAC)
  44. Marginal Costing
  45. Marginal Revenue
  46. Marginal Utility
  47. Market Perform
  48. Marketing Operations Management (MOM)
  49. Marketing Resource Management (MRM)
  50. Markus and Soh Process Model
  51. Material Resource Planning (MRP)
  52. Maturity Date
  53. Media Intelligence
  54. Medium-Scale Integration (MSI)
  55. Message Exchange Pattern (MEP)
  56. Messaging Patterns
  57. Meta Model
  58. Metadata Registry
  59. Metcalf's Law
  60. Metonymy
  61. MiL Model
  62. Microcredit
  63. Microfinance
  64. Microfinance Channel
  65. Microinsurance
  66. Mid-Point Differential
  67. Middle Management
  68. Milestone
  69. Mintzberg's 5Ps of Strategy
  70. Mirroring and Matching
  71. Mission Activities
  72. Mission Value
  73. Mixed System
  74. Model Driven Development (MDD)
  75. Model–View–ViewModel (MVVM)
  76. Modified Accrual Accounting
  77. Monetary Value
  78. Moore's Law
  79. Moral Purpose
  80. Morphological Analysis
  81. Multi-Attribute Utility Theory (MAUT)
  82. Multi Criteria Analysis (MCA)
  83. Multi Messaging Service (MMS)
  84. Multidimensional Expressions (MDX)
  85. Multiple Criteria Decision Analysis (MCDA)
  86. Multiple Sourcing
  87. Multipurpose Internet Mail Extensions (MIME)
  88. Multitasking Behavior
  89. Multitasking Consumer
  90. Multiway Data Analysis
  91. NATO Architecture Framework (NAF)
  92. NPVGO Model (Net Present Value Of Growth Opportunities)
  93. Nationalization
  94. NetBIOS (Network Basic Input/Output System)
  95. Net Revenue
  96. New Public Management (NPM)
  97. Niche Marketing
  98. Nielsen Ratings
  99. Nominal Value
  100. Non-Systemic Risk
  101. Non Fungible Token (NFT)
  102. Non Value-Added Work
  103. Normative Approach of Stakeholder Theory
  104. OBASHI
  105. OODA Loop
  106. OSS through Java™ (OSS/J™)
  107. Object-Role Modeling (ORM)
  108. Object Model
  109. Object Modeling Technique (OMT)
  110. Object Oriented Approach
  111. Objective Analysis Tree
  112. Off-Balance Sheet Financing
  113. Office of Strategy Management
  114. Offshore Development
  115. Offshore Development Model
  116. On-Demand Software
  117. One-to-one Marketing
  118. OneSource
  119. Online Corporate Reputation
  120. Online Transaction Processing (OLTP)
  121. Open Geospatial Consortium (OGC)
  122. Open Government Licence (OGL)
  123. Open Knowledge Initiative (OKI)
  124. Open Security Architecture (OSA) Framework
  125. Open Services for Lifecycle Collaboration (OSLC)
  126. Open Web Analytics (OWA)
  127. Operating Cash Flow
  128. Operating Income
  129. Operating Lease
  130. Operating Profit Percentage
  131. Operational Analytics
  132. Operational Business Intelligence (OBI)
  133. Operational Capacity
  134. Operational Data Store (ODS)
  135. Operational Design
  136. Operations Bridge
  137. Operations Development
  138. Operator Function Model
  139. Opinion Leader
  140. Orchestration
  141. Order Management
  142. Organizational Management
  143. Outcome-Driven Innovation (ODI)
  144. Outcome Management
  145. Outcome Measure
  146. Outplacement
  147. PAEI Management Model
  148. PARTS Model
  149. PEG Ratio
  150. POSDCORB
  151. PRIDE Methodology
  152. PRIMO-F Model
  153. PRINCE2®
  154. PROxy Based Estimating (PROBE)
  155. PURE Method
  156. Package Diagram
  157. Paper Prototyping
  158. Parallel Design
  159. Paralysis by Analysis
  160. Parametric Estimating
  161. Parent Company
  162. Parenting Advantage
  163. Pareto Chart
  164. Parkinson's Law
  165. Partner Interface Process (PIP)
  166. Path-Goal Theory
  167. Peak-End Rule
  168. Pearson Correlation Coefficient
  169. Peer-Appraisal
  170. Penetration Pricing
  171. Pension Parachute
  172. People, Process, Technology Framework
  173. People Analytics
  174. People Pill
  175. Perceived Value Pricing
  176. Percentage-of-Completion Method
  177. Performance Based Budgeting (PBB)
  178. Performance Indicator
  179. Peripheral Technology
  180. Perishability
  181. Permission Marketing
  182. Personal Belief Bias
  183. Persuasion Techniques
  184. Peter Principle
  185. Phantom Stock Plan
  186. Plug-in
  187. Point-To-Point Integration
  188. Point of Presence (POP)
  189. Poison Put
  190. Portable Network Graphics (PNG)
  191. Portfolio Agility
  192. Portfolio Insurance
  193. Positive Deviance
  194. Post Implementation Review
  195. Postmodern ERP
  196. Pre-Employment Screening
  197. Preboot Execution Environment (PXE)
  198. Precedence Diagram Method (PDM)
  199. Predictive Model Markup Language (PMML)
  200. Pressure Group
  201. Price Skimming
  202. Primary Customer
  203. Principal Component Analysis (PCA)
  204. Principles of Reinvention
  205. Prioritization Matrix
  206. Prisoner's Dilemma
  207. Private Equity
  208. Pro Forma Earnings
  209. Probabilistic Risk Assessment (PRA)
  210. Probability Distribution
  211. Procedure
  212. Procedure Manual
  213. Process Decision Program Chart
  214. Process Hierarchy Diagram
  215. Profile Diagram
  216. Profit Motive
  217. Profit Pools
  218. Profit and Loss Statement
  219. Profitability Ratios
  220. Project Planning Matrix
  221. Promotional Pricing
  222. Proof of Concept (POC)
  223. Proportional Voting
  224. Proprietary Software
  225. Protected Extensible Authentication Protocol (PEAP)
  226. Protected Health Information (PHI)
  227. Pseudocode
  228. Psychological Pricing
  229. Public Value
  230. Put Option
  231. Putnam Model
  232. Qualitative Investment Analysis
  233. Quantitative Investment Analysis
  234. QueryInterface
  235. Quick Response Manufacturing
  236. RAPID Approach
  237. RAP as a Service (RaaS)
  238. RFID Technology
  239. Rapid Application Development (RAD)
  240. Rapid Economic Justification (REJ™)
  241. Real-Time Business Intelligence (RTBI)
  242. Real-Time Enterprise (RTE)
  243. Real Business-Cycle Theory (RBC Theory)
  244. Real Options
  245. Rebalancing
  246. Recapitalization
  247. Recognition Heuristic (RH)
  248. Reconciliation
  249. Record Linkage
  250. Recruiting
  251. Recurrent Cascade-Correlation (RCC)
  252. Redemption Value
  253. Reference Data Management (RDM)
  254. Reflective Process
  255. Reflective Reasoning
  256. Relational Capital
  257. Relational Model/Tasmania (RM/T)
  258. Relative Value of Growth
  259. Remote Infrastructure Management
  260. Remote Monitoring and Management (RMM)
  261. Request for Information (RFI)
  262. Request for Tenders (RFT)
  263. Reservoir Approach
  264. Residual Income
  265. Residual Value
  266. Responsibility Assignment Matrix (RAM)
  267. Restricted Stock
  268. Result Oriented Management
  269. Results Based Management (RBM)
  270. Retainer
  271. Revans' Formula
  272. Reverse Auction
  273. Reverse Card Sorting
  274. Reverse Logistics
  275. Reverse Positioning
  276. Rightsourcing
  277. Ring Fencing
  278. RosettaNet Implementation Framework (RNIF)
  279. Round Robin Brainstorming
  280. Round Table Discussion
  281. Rule Induction
  282. Rule of 72
  283. Rule of Three
  284. Run time (Program Lifecycle Phase)
  285. Runbook
  286. Runbook Automation
  287. S-Curve
  288. SEER-SEM
  289. SG&A (Selling, General & Administrative Expense)
  290. SLIM Framework
  291. SOA Governance
  292. SOFT Model
  293. SOSTAC Model
  294. SOSTAC® Planning Model
  295. STRATPORT Model
  296. Safe Harbor
  297. Safe Harbor Statement
  298. Sale and Leaseback
  299. Sales Order
  300. Satisficing
  301. Say's Law
  302. Scareware
  303. Scenarios Forecasting
  304. Schematic Model
  305. Schools Interoperability Framework (SIF)
  306. Scientific Management
  307. Scientific Visualization
  308. Scorched Earth Defense
  309. Second-Mover Strategy
  310. Securitization
  311. Segment Architecture
  312. Self-Appraisal
  313. Self-Directed Team
  314. Sell-Side Analyst
  315. Semantic Business Process Management (SBPM)
  316. Semantic Data Modeling
  317. Semantic Integration
  318. Semantic Interoperability
  319. Semantic Spectrum
  320. Seven Habits of Highly Effective People
  321. Seven Signs Of Ethical Collapse
  322. Seven Stages of Action
  323. SharePoint
  324. Shared Service Center
  325. Shared Value
  326. Shareware
  327. Sherwood Applied Business Security Architecture (SABSA) Framework
  328. Shore's Classification
  329. Short Message Service (SMS)
  330. Short Selling
  331. Shotgun Surgery
  332. Simple Knowledge Organization System (SKOS)
  333. Single Sourcing
  334. Situational Leadership
  335. Six Forces Model
  336. Skandia Navigator
  337. Skeleton Staff
  338. Skills Framework for the Information Age (SFIA)
  339. Sleeper Effect
  340. Smart Machines
  341. Social Cost Benefit Analysis (SCBA)
  342. Social Intelligence
  343. Social Multi Criteria Analysis (SMCA)
  344. Societal Value
  345. Solutions Provider
  346. Source Lines of Code
  347. Spear Phishing
  348. Special Purpose Vehicle
  349. Spin-Off
  350. Spiral of Silence
  351. Splay Tree
  352. Spotify Model
  353. Spreadmart
  354. Staff Management
  355. Stages of Team Development
  356. Standard Cost Pricing
  357. Standstill Agreement
  358. Status Quo
  359. Status Quo Bias
  360. Stealth Positioning
  361. Stochastic Modeling
  362. Storage Device
  363. Storyboard
  364. Straight Through Processing (STP)
  365. Straw Man Concept
  366. Structure Chart
  367. Structure Follows Strategy
  368. Structured Analysis and Design Technique (SADT)
  369. Structured Data Analysis
  370. Sub Contractor
  371. Subliminal Advertizing
  372. Subscription Right
  373. Substitution Effect
  374. Sunk Cost
  375. Supervisoral Development
  376. Support Activities
  377. Switch Framework
  378. Synchromarketing
  379. Synectics
  380. System Integration Testing (SIT)
  381. T-Shaped Skills
  382. TDC Matrix
  383. Tableless Web Design
  384. Tactical Plan
  385. Target
  386. Target Pricing
  387. Task Dependencies
  388. Task Management
  389. Tax Haven
  390. Team Management Profile
  391. Technical Analysis
  392. Technical Bankruptcy
  393. Technical Standard
  394. Technological Forecasting
  395. Technology Appropriation
  396. Technology Enhanced Interaction Framework
  397. Techquisition
  398. Terms of Reference
  399. Terms of Service
  400. Tertiary Sector
  401. Test Marketing
  402. Test Method
  403. The Abridged Big Five-Dimensional Circumplex (AB5C)
  404. The Bullwhip Effect
  405. The Central Computer and Telecommunications Agency (CCTA)
  406. The DIKW Model
  407. The Disciplined Agile (DA) Framework
  408. The Eisenhower Method
  409. The Four Stages of Learning
  410. The Greiner Curve
  411. The Institute of Electrical and Electronics Engineers (IEEE)
  412. The Interaction Framework
  413. The KISS Principle
  414. The N7 and 7MP Tools
  415. The Nominal Group Technique (NGT)
  416. The Object-Oriented Hypermedia Design Model (OOHDM)
  417. The Open Information Systems Management Maturity Model (O-ISM3)
  418. The POSEC Method
  419. The Principle of Causality
  420. The Problem Definition Process
  421. The Relational Model (RM)
  422. The Shell Directional Policy Matrix
  423. The Star Model
  424. The Three Component Model of Organizational Commitment
  425. The Value Model™ (VM)
  426. The Value Net Model
  427. Theoretical Method
  428. Thinker's Keys
  429. Three Dimensional Business Definition
  430. Ticket Management
  431. Tie-in Marketing
  432. Time-Based Activity Based Costing
  433. Time-Triggered Architecture (TTA)
  434. Timing Diagram
  435. Top-Level Domain (TLD)
  436. Total Business Return (TBR)
  437. Total Shareholder Return (TSR)
  438. Towers Perrin Model
  439. Training Within Industry
  440. Trait Leadership Theory
  441. Trajectories of Industry Change
  442. Transaction Cost Theory
  443. Treasury Enterprise Architecture Framework (TEAF)
  444. Treasury Stock
  445. Trusted Computer System Evaluation Criteria (TCSEC)
  446. Twelve Principles of the Network Economy
  447. Two Factor Theory
  448. Ultra Vires
  449. Ultramobiles
  450. Unaided Recall
  451. Unbranding
  452. Undercapitalization
  453. Underwriters Laboratories (UL)
  454. Undifferentiated Marketing
  455. Unfreezing, Moving, Refreezing
  456. Unified Endpoint Management (UEM)
  457. Unified Profile for DoDAF/MODAF (UPDM)
  458. Unified Theory of Acceptance and Use of Technology (UTAUT)
  459. Uniform Resource Identifier (URI)
  460. Unissued Stock
  461. Unit Cost
  462. Universal Data Element Framework (UDEF)
  463. Universal Description, Discovery and Integration (UDDI)
  464. Universal Strategy Formulation Model (USFM)
  465. Unsolicited Commercial Email (UCE)
  466. Unstructured Information Management Architecture (UIMA)
  467. Use Case Points (UCP)
  468. VRIN Framework
  469. Validity Effect
  470. Variable Costing
  471. Vendor Rating
  472. Venn Diagram
  473. Venture Capital
  474. Venture Funding
  475. Vertical Agreement
  476. Vertical Merger
  477. Vesting of Stock or Options
  478. Viability Study
  479. Virtual Business
  480. Virtual Customer Premises Equipment (vCPE)
  481. Virtual Function
  482. Virtual Inheritance
  483. Virtual Method Table (VMT)
  484. Vital Business Function (VBF)
  485. Vocabulary of Interlinked Datasets (VoID)
  486. Voluntary Interindustry Commerce Standards (VICS) Association
  487. Von Neumann Architecture
  488. Voting Rights Plan
  489. Vulture Capitalist
  490. WIAL Model
  491. WORM (Write Once Read Many)
  492. WYSIWYG (What You See Is What You Get)
  493. Wage Drift
  494. Warrant
  495. Watchdog Model
  496. Website Wireframe
  497. Wf-XML
  498. Whisper Number
  499. White Paper
  500. Wideband Delphi

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)