About the Journal

Focus and Scope

The topics of articles accepted at JAISI include but are not limited to the following areas:
  1. Security and Privacy in Information Systems:

    • Risk analysis in information systems.
    • Development of stronger encryption techniques.
    • Intrusion detection and security response.
  2. Database Management:

    • Optimization of database performance.
    • Distributed database management systems.
    • Data security and privacy.
  3. Big Data Analytics:

    • Processing and analysis of Big Data for decision-making.
    • Algorithms for Big Data management.
    • Security considerations in Big Data.
  4. Internet of Things (IoT):

    • Data integration and management from IoT devices.
    • Security challenges in IoT environments.
    • Business management applications of IoT.
  5. Web Application Development:

    • Performance optimization of web applications.
    • Web application security.
    • Responsive user interface design.
  6. Decision Support Systems:

    • Development of intelligent decision support systems.
    • Analysis of user needs for decision support systems.
    • Performance evaluation of decision support systems.
  7. E-Government Systems:

    • Implementation and evaluation of e-government systems.
    • Security and privacy in e-government systems.
    • Improving public services through information technology.
  8. Software Project Management:

    • Evaluation of project management methods and tools.
    • Agile software development methodologies.
    • Analysis of errors and learning from previous projects.
  9. Business Process Analysis and Modeling:

    • Use of business process modeling techniques.
    • Performance evaluation of business processes.
    • Integration of business processes within information systems.
  10. Cloud Computing Technology:

    • Data security and privacy in cloud environments.
    • Cloud resource management.
    • Integration of information systems with cloud technology.
  11. Mobile Application Development:

    • Design and development of innovative mobile applications.
    • Mobile application security.
    • The use of mobile technology in business.
  12. Network Security Analysis:

    • Computer network security.
    • Detection and prevention of network attacks.
    • Post-incident recovery.
  13. Enterprise Resource Planning (ERP) Systems:

    • Implementation and evaluation of ERP systems.
    • Integration of ERP modules.
    • Change management in ERP system implementations.
  14. Blockchain Technology Development:

    • Applications of blockchain technology in information systems.
    • Security and privacy in blockchain transactions.
    • Performance evaluation of blockchain networks.
  15. Artificial Intelligence (AI) in Information Systems:

    • Implementation of artificial intelligence techniques in information systems.
    • Ethical and social impact analysis of AI in business.
    • Integration of chatbots and virtual assistants in customer service.
 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

 

Submissions

Online Submissions

Already have a Username/Password for International Journal of Applied Information Systems and Informatics (JAISI)?
Go to Login

Need a Username/Password?
Go to Registration

Registration and login are required to submit items online and to check the status of current submissions.

 

Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.

  1. The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  2. The submission file is in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.
  3. Where available, URLs for the references have been provided.
  4. The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  5. The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines, which is found in About the Journal.
  6. If submitting to a peer-reviewed section of the journal, the instructions in Ensuring a Blind Review have been followed.
 

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.