Posts

Posts

typenameratingauthorhiveactivity
blog entryOverview of JIS paper: Applying Basic Gamification...0205Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0157Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0166Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0311Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0141Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0173Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160452Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0396Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entryDark Side of the Internet: Students can find almost...1518Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0269Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015
resourcePre-conference resources for what are the Research...0551AAA HQAccounting IS Big Data (AiBD) > AiBD Research ResourcespublicSeptember 21, 2015
announcementPre-meeting Resources0644AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 21, 2015
announcementWebinar Series0826AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 25, 2015
announcement2015 Inaugural Event21000AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
blog entryThe "Book Trilogy" Becomes a "Quartet"0317Richard E LillieTeaching with Technology > TwTpublicSeptember 7, 2015
blog entryIf Content is King, It's Time to Overthrow the Monarchy!0384Richard E LillieTeaching with Technology > TwTpublicApril 24, 2015
blog entrySenior Editors' Update0196Roger S DebrecenyJIS Senior Editors' BlogpublicApril 16, 2015
blog entryTeaching in a Digital Age by A.W. (Tony) Bates --...0358Richard E LillieTeaching with Technology > TwTpublicApril 8, 2015
blog entryPhotos from JISC 20150224Roger S DebrecenyJIS Senior Editors' BlogpublicApril 8, 2015
blog entryCompetency-based education is all the rage: What is it?9960Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019
blog entryChallenges From and To the Senior Editors of the Journal of...0570Roger S DebrecenyJIS Senior Editors' BlogpublicOctober 7, 2014
blog entryObserving IT Audit0234Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 9, 2014
blog entry2014 JIAR Best Paper Award0318Gia M ChevisThe Forum--The Blog of the International SectionpublicJuly 11, 2014
blog entryCall for Papers: BALAS 20150353Gia M ChevisThe Forum--The Blog of the International SectionpublicJune 26, 2014
blog entryAggravated Cybersecurity Risks Implications for Accounting...11550Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 9, 2014
blog entry360-Degree Post Decision Reviews0515Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 25, 2014
blog entrySalman Khan -- A Breath of Fresh Air in Instructional Design...11321Richard E LillieTeaching with Technology > TwTpublicApril 3, 2014
blog entryEditing the Journal of Information Systems0179Roger S DebrecenyJIS Senior Editors' BlogpublicDecember 30, 2013
blog entryNominate an Outstanding International Accounting...0294Gia M ChevisThe Forum--The Blog of the International SectionpublicJanuary 15, 2014
blog entryCall for papers: Special Issue on Information Security0253Gia M ChevisThe Forum--The Blog of the International SectionpublicDecember 17, 2013