Posts

Posts

typenameratingauthorhiveactivity
blog entryEmerging Technologies in Distance Education -- Outstanding...10618868Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entryCOSO Publishes Exposure Draft Updating 1992 Internal Control...133393Edith OrensteinEdith Orenstein's Member BlogpublicOctober 19, 2016
blog entryCompetency-based education is all the rage: What is it?9867Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entry12 Tech Innovators -- Who are Transforming Campuses61548Richard E LillieTeaching with Technology > TwTpublicOctober 31, 2012
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2353Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 12, 2018
announcement2015 Inaugural Event2903AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
blog entryDark Side of the Internet: Students can find almost...1480Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entryAggravated Cybersecurity Risks Implications for Accounting...11438Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 9, 2014
blog entrySalman Khan -- A Breath of Fresh Air in Instructional Design...11275Richard E LillieTeaching with Technology > TwTpublicApril 3, 2014
blog entryCHANGING HIGHER EDUCATION1298Richard E LillieTeaching with Technology > TwTpublicMay 22, 2014
blog entryMTV Meets Accounting (FEI Blog's "Hey There Bob...1634Edith OrensteinEdith Orenstein's Member BlogpublicSeptember 12, 2011
blog entryPodcast: The Google Generation -- Myth or Reality?1774Richard E LillieTeaching with Technology > TwTpublicSeptember 2, 2012
blog entryNominate an outstanding new researcher!0757Gia M ChevisThe Forum--The Blog of the International SectionpublicSeptember 2, 2016
blog entryJIS Conference 20160273JISC2016 Invitation.pdfRoger DebrecenyJIS Senior Editors' BlogpublicAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0837Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0183Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0222Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: The Effect of Frequency and Automation of...0372Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0224Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0182Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 6, 2016
blog entryHere's to a successful #iasmidyear20160903Gia M ChevisThe Forum--The Blog of the International SectionpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0153Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0134Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0282Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0156Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0150Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0183Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160441Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0386Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0252Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015