JIS Senior Editors' Blog

Journal of Information Systems

This is a public blog  publicRSS

Posts

  • 1-30 of 30
typenameratingauthoractivity
blog entryJIS Conference 20160296JISC2016 Invitation.pdfRoger DebrecenyAugust 26, 2016
blog entryRecent publication - Exception Prioritization in the...0217Roger DebrecenyAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0883Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0200Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0251Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2451Roger S DebrecenySeptember 12, 2018
blog entryForthcoming paper: The Effect of Frequency and Automation of...0396Roger S DebrecenyMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0253Roger S DebrecenyMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0202Roger S DebrecenyMarch 6, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0205Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0157Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0166Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0311Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0141Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: The Association between Information...0135Roger S DebrecenyFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0173Roger S DebrecenyFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160452Roger S DebrecenyFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0396Roger S DebrecenyJanuary 27, 2016
blog entrySenior Editors' Update0196Roger S DebrecenyApril 16, 2015
blog entryPhotos from JISC 20150145Roger S DebrecenyApril 8, 2015
blog entryPhotos from JISC 20150224Roger S DebrecenyApril 8, 2015
blog entryJournal of Information Systems Conference 2015 (JISC...0204JISC 2015 Program.pdfRoger S DebrecenyApril 1, 2015
blog entryJIS publishes information packet0329Roger S DebrecenyMarch 31, 2015
blog entryChallenges From and To the Senior Editors of the Journal of...0570Roger S DebrecenyOctober 7, 2014
blog entryObserving IT Audit0234Roger S DebrecenySeptember 9, 2014
blog entryAggravated Cybersecurity Risks Implications for Accounting...11550Roger S DebrecenySeptember 9, 2014
blog entry360-Degree Post Decision Reviews0515Roger S DebrecenyFebruary 25, 2014
blog entryFrom the Senior Editors - is 2014 the year of Privacy or of...0247Mary B CurtisFebruary 7, 2014
blog entryEditing the Journal of Information Systems0179Roger S DebrecenyDecember 30, 2013
blog entryOur vision for the Journal of Information Systems0184Roger S DebrecenyDecember 27, 2013