JIS Senior Editors' Blog

Journal of Information Systems

This is a public blog  publicRSS

Posts

  • 1-30 of 30
typenameratingauthoractivity
blog entryJIS Conference 20160273JISC2016 Invitation.pdfRoger DebrecenyAugust 26, 2016
blog entryRecent publication - Exception Prioritization in the...0197Roger DebrecenyAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0837Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0183Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0222Roger S DebrecenyMarch 23, 2016
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2355Roger S DebrecenySeptember 12, 2018
blog entryForthcoming paper: The Effect of Frequency and Automation of...0372Roger S DebrecenyMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0224Roger S DebrecenyMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0182Roger S DebrecenyMarch 6, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0183Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0150Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0156Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0282Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0134Roger S DebrecenyFebruary 26, 2016
blog entryOverview of JIS paper: The Association between Information...0131Roger S DebrecenyFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0153Roger S DebrecenyFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160442Roger S DebrecenyFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0386Roger S DebrecenyJanuary 27, 2016
blog entrySenior Editors' Update0169Roger S DebrecenyApril 16, 2015
blog entryPhotos from JISC 20150136Roger S DebrecenyApril 8, 2015
blog entryPhotos from JISC 20150207Roger S DebrecenyApril 8, 2015
blog entryJournal of Information Systems Conference 2015 (JISC...0199JISC 2015 Program.pdfRoger S DebrecenyApril 1, 2015
blog entryJIS publishes information packet0325Roger S DebrecenyMarch 31, 2015
blog entryChallenges From and To the Senior Editors of the Journal of...0562Roger S DebrecenyOctober 7, 2014
blog entryObserving IT Audit0228Roger S DebrecenySeptember 9, 2014
blog entryAggravated Cybersecurity Risks Implications for Accounting...11438Roger S DebrecenySeptember 9, 2014
blog entry360-Degree Post Decision Reviews0509Roger S DebrecenyFebruary 25, 2014
blog entryFrom the Senior Editors - is 2014 the year of Privacy or of...0238Mary B CurtisFebruary 7, 2014
blog entryEditing the Journal of Information Systems0176Roger S DebrecenyDecember 30, 2013
blog entryOur vision for the Journal of Information Systems0181Roger S DebrecenyDecember 27, 2013