Editorial Policies

Focus and Scope

The topics of articles accepted at JAISI include but are not limited to the following areas:
  1. Security and Privacy in Information Systems:

    • Risk analysis in information systems.
    • Development of stronger encryption techniques.
    • Intrusion detection and security response.
  2. Database Management:

    • Optimization of database performance.
    • Distributed database management systems.
    • Data security and privacy.
  3. Big Data Analytics:

    • Processing and analysis of Big Data for decision-making.
    • Algorithms for Big Data management.
    • Security considerations in Big Data.
  4. Internet of Things (IoT):

    • Data integration and management from IoT devices.
    • Security challenges in IoT environments.
    • Business management applications of IoT.
  5. Web Application Development:

    • Performance optimization of web applications.
    • Web application security.
    • Responsive user interface design.
  6. Decision Support Systems:

    • Development of intelligent decision support systems.
    • Analysis of user needs for decision support systems.
    • Performance evaluation of decision support systems.
  7. E-Government Systems:

    • Implementation and evaluation of e-government systems.
    • Security and privacy in e-government systems.
    • Improving public services through information technology.
  8. Software Project Management:

    • Evaluation of project management methods and tools.
    • Agile software development methodologies.
    • Analysis of errors and learning from previous projects.
  9. Business Process Analysis and Modeling:

    • Use of business process modeling techniques.
    • Performance evaluation of business processes.
    • Integration of business processes within information systems.
  10. Cloud Computing Technology:

    • Data security and privacy in cloud environments.
    • Cloud resource management.
    • Integration of information systems with cloud technology.
  11. Mobile Application Development:

    • Design and development of innovative mobile applications.
    • Mobile application security.
    • The use of mobile technology in business.
  12. Network Security Analysis:

    • Computer network security.
    • Detection and prevention of network attacks.
    • Post-incident recovery.
  13. Enterprise Resource Planning (ERP) Systems:

    • Implementation and evaluation of ERP systems.
    • Integration of ERP modules.
    • Change management in ERP system implementations.
  14. Blockchain Technology Development:

    • Applications of blockchain technology in information systems.
    • Security and privacy in blockchain transactions.
    • Performance evaluation of blockchain networks.
  15. Artificial Intelligence (AI) in Information Systems:

    • Implementation of artificial intelligence techniques in information systems.
    • Ethical and social impact analysis of AI in business.
    • Integration of chatbots and virtual assistants in customer service.

 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.