•  
  •  
 

About This Journal

JITTA is an AIS Journal that welcomes submissions of high impact that seek a fast peer-review and publication process. It is open to articles from a broad spectrum of topics and research approaches, and it features special sections for full research papers, opinion pieces, review articles, and case descriptions. Please go to the Aims & Scope page for a detailed description of all encouraged submission types.

The journal has 15 years of tradition. Individuals and institutions worldwide have online access to the journal via the AIS library. The acceptance rate is 25% and the typical turnaround between submission and initial decision is about two to three months.

JITTA is considered in a number of databases and rankings world-wide and it has been identified an A Journal in Australian Business Deans Council Journal Quality List 2013 (on a four-Tier scale of A*, A, B, and C). JITTA is also included in the Journal List of the Chartered Association of Business Schools (United Kingdom) and the VHB Journal List (German Academic Association for Business Research).

New Manuscripts should be submitted using the Submit Article link on the sidebar. Revisions need to be submitted by logging into the JITTA Review System. Instructions for Authors are on the Policies page.

 

Selected Articles:

Lars Mathiassen and Nannette Napier, “Exploring Win-Win Contracts: An Appreciative Inquiry into IT Project Management,” Journal of Information Technology Theory and Application (JITTA), 2013, 14: 3.

Sanghee Lim, Terence J.V. Saldanha, Suresh Malladi, and Nigel P. Melville, “Theories Used in Information Systems Research: Insights from Complex Network Analysis,” Journal of Information Technology Theory and Application (JITTA), 2013, 14:2.

Steven Alter, “Challenges for Service Science,” Journal of Information Technology Theory and Application (JITTA), 2012, 13:2.

Jennifer E. Gerow, Varun Grover, Nicholas Roberts, and Jason Thatcher, “The Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-2008,” Journal of Information Technology Theory and Application (JITTA), 2010, 11:4.

Esko Penttinen, Matti Rossi, and Virpi Tuunainen, “Mobile Games: Analyzing the Needs and Values of the Consumers,” Journal of Information Technology Theory and Application (JITTA), 2010, 11:1.

Julie E. Kendall, Kenneth E. Kendall, and Muhammadou M.O. Kah, “Examining Virtual Organizations Using Fantasy Theme Analysis: A Study of ICT Policy Advisors’ Discourse About Developing Countries,” Journal of Information Technology Theory and Application (JITTA), 2006, 8:2.

Darren B. Nicholson, Saonee Sarker, Suprateek Sarker, and Joseph S. Valacich, “Determinants of Effective Leadership in Information Systems Development Teams: An Exploratory Study of Face-to-Face and Virtual Contexts,” Journal of Information Technology Theory and Application (JITTA), 2007, 8:4.

Chih-Chien Wang, YaHui Hsu, and Wenchang Fang, “Acceptance of technology with network externalities: an empirical study of internet instant messaging services,” Journal of Information Technology Theory and Application (JITTA), 2004, 6:4.

Joseph G. Walls, George R. Widmeyer, and Omar A. El Sawy, “Assessing information system design theory in perspective: How useful was our 1992 initial rendition,” Journal of Information Technology Theory and Application (JITTA), 2004, 6:2.

Goldkuhl, Goran, "Design theories in information systems-a need for multi-grounding," Journal of Information Technology Theory and Application (JITTA), 2004, 6:2.

Starling D. Hunter III, “Information technology, organizational learning, and the market value of the firm,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.

Ken Peffers and Tang Ya, “Identifying and evaluating the universe of outlets for information systems research: Ranking the journals,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.

Fion S.L. Lee, Doug Vogel, and Moez Limayem, “Virtual Community Informatics: A Review and Research Agenda,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.