Posts

Posts

typenameratingauthorhiveactivity
blog entryEmerging Technologies in Distance Education -- Outstanding...10618498Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entryCOSO Publishes Exposure Draft Updating 1992 Internal Control...133347Edith OrensteinEdith Orenstein's Member BlogpublicOctober 19, 2016
blog entryCompetency-based education is all the rage: What is it?9836Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entry12 Tech Innovators -- Who are Transforming Campuses61527Richard E LillieTeaching with Technology > TwTpublicOctober 31, 2012
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2335Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 12, 2018
announcement2015 Inaugural Event2860AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
blog entryDark Side of the Internet: Students can find almost...1468Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entryAggravated Cybersecurity Risks Implications for Accounting...11420Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 9, 2014
blog entrySalman Khan -- A Breath of Fresh Air in Instructional Design...11267Richard E LillieTeaching with Technology > TwTpublicApril 3, 2014
blog entryCHANGING HIGHER EDUCATION1295Richard E LillieTeaching with Technology > TwTpublicMay 22, 2014
blog entryMTV Meets Accounting (FEI Blog's "Hey There Bob...1631Edith OrensteinEdith Orenstein's Member BlogpublicSeptember 12, 2011
blog entryPodcast: The Google Generation -- Myth or Reality?1769Richard E LillieTeaching with Technology > TwTpublicSeptember 2, 2012
blog entryNominate an outstanding new researcher!0740Gia M ChevisThe Forum--The Blog of the International SectionpublicSeptember 2, 2016
blog entryJIS Conference 20160266JISC2016 Invitation.pdfRoger DebrecenyJIS Senior Editors' BlogpublicAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0820Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0176Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0213Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: The Effect of Frequency and Automation of...0357Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0214Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0177Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 6, 2016
blog entryHere's to a successful #iasmidyear20160885Gia M ChevisThe Forum--The Blog of the International SectionpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0151Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0130Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0278Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0153Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0146Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0179Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160435Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0378Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0248Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015