P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
932 INDEXRegional mobile commerce,V2:622–624
Registration symbol (©R), defined,V3: 450
Regular expressions, in Perl,V3:40 – 42
Regulation.See alsoRegulations
digital economy and,V1:488– 489
of e-finance,V3: 280
of electronic signatures,V1: 532
of public accounting firms,V3:152–154
telecommuting and,V3:445– 446
webcasting,V3:684 –685
Regulations.See alsoGlobal Internet
regulations; Regulation
encryption exportation,V2: 226
public relations,V2:780 –781
Web accessibility,V3:491– 492
Reichart, Bill,V1: 96
“Reid” test,V1:304 –305
Reinforcement learning,V2: 529
“Reinventing government” movement,
V1: 591
Relational algebra,V3:354 –355
Relational Database Management Systems
(RDBMSs),V3: 355
XML and,V1:749–751
multiuser environments in,
V3:361–362
Relational databases,V1:374, 382, 709
Relational OLAP (ROLAP),V2:688, 689
Relationship development, via Internet
relay chat,V2: 316
Relationship monitoring, in supply
networks,V3:405– 406
Relationship programs,V1:321–322
Relationships.See alsoOnline
relationships
in databases,V1:375–376
supply network,V3:402– 406
Relative guarantees,V3: 717
Reliability:
ASP.NET,V1: 9
system,V1: 116
Reliable multicast protocols,V3: 681
Religion.SeeOnline religion
Religious cyberspace, structures of,
V2:802–805
Religious feelings, expressing,V2: 807
Religious orthodoxy, challenges to,
V2:807–808
Relocation services,V3: 197
Remote access,V1:52;V2: 67
Remote Access Servers (RAS),V2: 323
Remote access standard,V2: 330
Remote Access Trojans (RATs),V1:250,
252
Remote Authentication Dial-In User
Service (RADIUS) server,V3: 586
Remote Data Objects (RDOs),V1:26, 34
Remote disk mirroring,V1: 543
Remote kiosks, public relations,
V2:774 –775.See alsoKiosks
Remote login,V1: 52
Remote Method Invocation (RMI),
V1:198–199
Remote Method Invocation Java.SeeJava
RMI
Remote mirroring,V1:544 –545
Remote Procedure Calls (RPCs),V1:112,
118, 198;V2:606 –607
Remote scripting,V3:630 –631
Remote vendors, taxation of,V3: 415Replenishment methodologies, in
inventory management,V2:369–372
Replication,V2: 67
Report formatting, OLAP,V2: 691
Representations, CSS,V1: 159
Reprisal attacks,V1:246, 247
Repudiation,V1: 533
management,V2: 716
Reputation service,V1: 500
Request for Comments (RFC),V1: 184
Request redirection:
DNS-based,V2: 510
mechanisms for,V2:508–509
Request rejection cost, Web quality of
service and,V3:718–719
Requests for Proposals (RFPs),V1:121,
122, 124
Requests for Quotes (RFQs),V1:121, 128,
619, 685.See alsoRFQ/RFP
matchmaking
automated,V1: 123
Requirements analysis,V3: 137
Research,V3:201–210
communication of,V2: 339
directories and,V3:202–203
electronic journals and,V3:207–208
GIS applications for,V2: 28
Internet and,V3:205–206
legal,V2:457– 460
on online auctions,V2:704 –705
on online communities,V2:741–742
search engines and,V3:203–205
Research In Motion mobile devices,
V2: 631
Research Libraries Information Network
(RLIN),V2: 479
R ́eseaux IP Europ ́eens (RIPE),V1: 67
Resellers,V3: 704
Reservation Protocol (RSVP),V3: 681
Resilient Packet Ring (RPR),V3: 785
Resource Discovery Network,V1: 516
Resource Management Suite,V1: 149
Resource Reservation Protocol (RSVP),
V2:260;V3: 658
Resources.See alsoEnterprise Resource
Planning (ERP)
legal,V2:461– 463
misappropriation of,V3:69–70
mission-critical,V1: 657
online,V1:828–829
planning,V1: 141
sharing among libraries,V2: 480
supply network,V3: 407
tangible and intangible,V1: 730
Respond auction site,V1: 131
Response time,V1: 142
of e-manufacturing,V1: 724
Responsibility, organizational,V2: 839
Responsibility Assignment Matrix (RAM),
V3:115–116
Result extractor, in Web searching,
V3: 745
Result merger,V3: 750
in Web searching,V3: 745
Resume.com,V1: 134
Retail companies, online presence of,
V1: 102
Retailing business model,V1:129,
130 –131
RetailLink,V1: 110Retail payments, via electronic funds
transfer,V1:630 –631
Retrieval,V1: 236
Return on Investment (ROI),V1: 100
calculating,V3:216 –221
for extranets,V1: 797
Monte Carlo analysis and,V3:223–224
from network environment management,
V2:537–538
Return-on-investment analysis,
V3:211–228
executive insights and,V3:224 –227
finance and,V3:214 –216
future trends in,V3:226 –227
information paradox and,V3:212–214
Return-on-investment simulations,
V1:577–589
approaches to,V1:580 –581
cost/benefit estimates and,V1:583–586
standardization of,V1:582–583
Reusable Learning Objects (RLOs),
V3: 670
Revenue model,V1:678–679
Revenue protection, e-commerce taxation
and,V3:415– 416
Reverse auction business model,V1:124,
131
Reverse engineering,V1: 310
Reverse online auctions,V2: 700
Review systems,V2:370 –371
“Revolution in Military Affairs” (RMA),
V1: 358
RFQ/RFP matchmaking,V1: 681
RGB color model,V2: 644
.rhosts file,V1:52, 53
with RSA,V1: 53
Rhythmic sound textures,V2: 660
Richness, competitive advantage through,
V1:135–136
Rich Text Format (RTF) books,V2: 789
Rings,V3: 203
Ring topology,V1:262;V2: 517
Risk,V3:221–224
analysis,V1: 540
checklist,V3: 233
classifying,V3: 234
countermeasures against,
V3:233–235
in credit-card-transactions,V1: 638
decision theory and,V3:229–230
defined,V3: 229
Internet-based,V3:230 –232
mitigating,V1: 540
negative effects of,V2: 78
recognizing,V3:232–233
sources of,V3:231–232
strategies for,V3:234 –235
technology,V3:222–223
transferring,V1:540 –541
Risk management:
denial-of-service attacks and,V1: 430
in Internet-based software projects,
V3:229–236
strategies for,V3:232–235
Ritchie, Dennis,V1:164;V2: 491
rlogin protocol,V3: 433
RM files,V1: 823
Roaming,V3: 837
Roberts, Lawrence G.,V2: 244
RocketNetwork,V2: 209