Posts

Posts

typenameratingauthorhiveactivity
blog entryCompetency-based education is all the rage: What is it?9867Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entryEmerging Technologies in Distance Education -- Outstanding...10618868Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2353Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 12, 2018
blog entryCOSO Publishes Exposure Draft Updating 1992 Internal Control...133393Edith OrensteinEdith Orenstein's Member BlogpublicOctober 19, 2016
blog entryNominate an outstanding new researcher!0757Gia M ChevisThe Forum--The Blog of the International SectionpublicSeptember 2, 2016
blog entryJIS Conference 20160273JISC2016 Invitation.pdfRoger DebrecenyJIS Senior Editors' BlogpublicAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0836Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0182Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0221Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: The Effect of Frequency and Automation of...0371Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0223Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0181Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 6, 2016
blog entryHere's to a successful #iasmidyear20160903Gia M ChevisThe Forum--The Blog of the International SectionpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0153Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0134Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0282Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0156Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0149Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0182Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160441Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0386Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entryDark Side of the Internet: Students can find almost...1480Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0252Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015
announcement2015 Inaugural Event2903AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
announcementWebinar Series0766AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 25, 2015
resourcePre-conference resources for what are the Research...0501AAA HQAccounting IS Big Data (AiBD) > AiBD Research ResourcespublicSeptember 21, 2015
announcementPre-meeting Resources0600AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 21, 2015
blog entryThe "Book Trilogy" Becomes a "Quartet"0293Richard E LillieTeaching with Technology > TwTpublicSeptember 7, 2015
blog entryIf Content is King, It's Time to Overthrow the Monarchy!0359Richard E LillieTeaching with Technology > TwTpublicApril 24, 2015
blog entrySenior Editors' Update0169Roger S DebrecenyJIS Senior Editors' BlogpublicApril 16, 2015