default search action
Roger S. Debreceny
Person information
- affiliation: University of Hawaii at Manoa, Honolulu, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j28]Roger S. Debreceny, Asheq Razaur Rahman, Tawei Wang:
Is User-Generated Twittersphere Activity Associated with Stock Market Reactions to 8-K Filings? J. Inf. Syst. 35(2): 195-217 (2021) - 2020
- [j27]Roger S. Debreceny, Stephanie M. Farewell, Audrey N. Scarlata, Dan N. Stone:
Knowledge and Skills in Complex Assurance Engagements: The Case of XBRL. J. Inf. Syst. 34(1): 21-45 (2020)
2010 – 2019
- 2019
- [j26]Roger S. Debreceny, Tawei Wang, Mi (Jamie) Zhou:
Research in Social Media: Data Sources and Methodologies. J. Inf. Syst. 33(1): 1-28 (2019) - 2018
- [j25]Chi-Chun Chou, Nen-Chen Richard Hwang, Tawei Wang, Roger Debreceny:
The topical link model-integrating topic-centric information in XBRL-formatted reports. Int. J. Account. Inf. Syst. 29: 16-36 (2018) - 2017
- [j24]Roger S. Debreceny, Asheq Razaur Rahman, Tawei Wang:
Corporate Network Centrality Score: Methodologies and Informativeness. J. Inf. Syst. 31(3): 23-43 (2017) - 2016
- [j23]Mary B. Curtis, Roger S. Debreceny:
The Journal of Information Systems at Thirty. J. Inf. Syst. 30(1): 1-2 (2016) - 2015
- [j22]Roger S. Debreceny, Mary B. Curtis:
Challenges From and To the Senior Editors of the Journal of Information Systems. J. Inf. Syst. 29(1): 1-8 (2015) - [j21]Roger S. Debreceny:
Social Media, Social Networks, and Accounting. J. Inf. Syst. 29(2): 1-4 (2015) - 2014
- [j20]Samir Trabelsi, Roger Debreceny, Andrew Lymer:
An empirical examination of corporate websites as a voluntary disclosure medium. Int. J. Appl. Decis. Sci. 7(1): 1-32 (2014) - [j19]Glen L. Gray, Roger S. Debreceny:
A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits. Int. J. Account. Inf. Syst. 15(4): 357-380 (2014) - [j18]Eric E. Cohen, Roger Debreceny, Stephanie M. Farewell, Saeed Roohani:
Issues with the communication and integrity of audit reports when financial reporting shifts to an information-centric paradigm. Int. J. Account. Inf. Syst. 15(4): 400-422 (2014) - [j17]Asheq Razaur Rahman, Roger S. Debreceny:
Institutionalized Online Access to Corporate Information and Cost of Equity Capital: A Cross-Country Analysis. J. Inf. Syst. 28(1): 43-74 (2014) - 2013
- [j16]Roger S. Debreceny:
Research on IT Governance, Risk, and Value: Challenges and Opportunities. J. Inf. Syst. 27(1): 129-135 (2013) - [j15]Roger S. Debreceny, Glen L. Gray:
IT Governance and Process Maturity: A Multinational Field Study. J. Inf. Syst. 27(1): 157-188 (2013) - [j14]Steven De Haes, Wim Van Grembergen, Roger S. Debreceny:
COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities. J. Inf. Syst. 27(1): 307-324 (2013) - 2012
- [j13]Michael G. Alles, Roger Debreceny:
The evolution and future of XBRL research. Int. J. Account. Inf. Syst. 13(2): 83-90 (2012) - 2011
- [j12]Roger S. Debreceny:
Betwixt and Between? Bringing Information Systems and Accounting Systems Research Together. J. Inf. Syst. 25(2): 1-9 (2011) - [j11]Roger S. Debreceny, Glen L. Gray:
Data Mining of Electronic Mail and Auditing: A Research Agenda. J. Inf. Syst. 25(2): 195-226 (2011) - 2010
- [j10]Roger S. Debreceny, Glen L. Gray:
Data mining journal entries for fraud detection: An exploratory study. Int. J. Account. Inf. Syst. 11(3): 157-181 (2010)
2000 – 2009
- 2009
- [c2]Roger Debreceny, Glen L. Gray:
IT Governance and Process Maturity: A Field Study. HICSS 2009: 1-10 - 2006
- [j9]Paul L. Bowen, Roger Debreceny, Fiona H. Rohde, Jay Basford:
Selecting optimal instantiations of data models - Theory and validation of an ex ante approach. Decis. Support Syst. 42(2): 1170-1186 (2006) - [c1]Roger Debreceny:
Re-Engineering IT Internal Controls: Applying Capability Maturity Models to the Evaluation of IT Controls. HICSS 2006 - 2005
- [j8]Roger S. Debreceny, Paul L. Bowen:
The Effects on End-User Query Performance of Incorporating Object-Oriented Abstractions in Database Accounting Systems. J. Inf. Syst. 19(1): 43-74 (2005) - [j7]Roger S. Debreceny, Glen L. Gray, Joeson Jun-Jin Ng, Kevin Siow-Ping Lee, Woon-Foong Yau:
Embedded Audit Modules in Enterprise Resource Planning Systems: Implementation and Functionality. J. Inf. Syst. 19(2): 7-27 (2005) - [j6]Roger S. Debreceny, Akhilesh Chandra, John J. Cheh, Denise Guithues-Amrhein, Neal J. Hannon, Paul D. Hutchison, Diane Janvrin, Roberta Ann Jones, Barbara Lamberton, Andy Lymer, Maureen Francis Mascha, Robert A. Nehmer, Saeed Roohani, Rajendra P. Srivastava, Samir Trabelsi, Thomas Tribunella, Gerald Trites, Miklos A. Vasarhelyi:
Financial Reporting in XBRL on the SEC's EDGAR System: A Critique and Evaluation. J. Inf. Syst. 19(2): 191-210 (2005) - 2003
- [j5]Roger Debreceny, Martin Putterill, Lai Lai Tung, A. Lee Gilbert:
New tools for the determination of e-commerce inhibitors. Decis. Support Syst. 34(2): 177-195 (2003) - [j4]Lai Lai Tung, Roger Debreceny, Ying-Git Chan, Aaron Tuck-Loon Chan, Stephen Ee-Boon Le:
Interacting with hypertext: an experimental investigation of navigation tools. Electron. Commer. Res. Appl. 2(1): 61-72 (2003) - 2001
- [j3]Roger Debreceny, Glen L. Gray:
The production and use of semantically rich accounting reports on the Internet: XML and XBRL. Int. J. Account. Inf. Syst. 2(1): 47-74 (2001) - 2000
- [j2]Roger Debreceny, Allan Ellis:
The Production of World Wide Web Multimedia Resources by Australian Universities - An Institutional Analysis. Educ. Inf. Technol. 5(1): 7-18 (2000)
1990 – 1999
- 1996
- [j1]Allan Ellis, Roger Debreceny, Robert Crago:
Audiographics in transition: changing technologies and patterns of usage. Educ. Inf. Technol. 1(1): 21-41 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint