Journal of Information Technology Theory and Application (JITTA)
About This Journal
In 2016, the AIS Council voted to create a family of journals with JAIS and CAIS and other AIS journals that were either regional journals or niche journals. After exploration of various options for repositioning JITTA to fit this policy or withdrawing the journal from the AIS family, the JITTA Board decided to become an AIS affiliated journal in May and subsequently has decided to stop publishing the journal. As a result, papers are no longer accepted for publication consideration and the current pipeline of papers is managed towards publication (or rejection) by the editors. The last issue of JITTA is scheduled to appear by the end of 2018.
The journal has 15 years of tradition. Individuals and institutions worldwide have online access to the journal via the AIS library. The acceptance rate is 25% and the typical turnaround between submission and initial decision is about two to three months.
JITTA is considered in a number of databases and rankings world-wide and it has been identified an A Journal in Australian Business Deans Council Journal Quality List 2013 (on a four-Tier scale of A*, A, B, and C). JITTA is also included in the Journal List of the Chartered Association of Business Schools (United Kingdom) and the VHB Journal List (German Academic Association for Business Research).
Selected Articles:
Lars Mathiassen and Nannette
Napier, “Exploring Win-Win Contracts: An Appreciative Inquiry into IT Project
Management,” Journal of Information Technology
Theory and Application (JITTA), 2013, 14: 3.
Sanghee Lim, Terence J.V. Saldanha, Suresh Malladi, and Nigel P. Melville, “Theories Used in
Information Systems Research: Insights from Complex Network Analysis,” Journal of Information Technology Theory and Application
(JITTA), 2013, 14:2.
Steven Alter, “Challenges for Service Science,” Journal of Information Technology Theory and Application
(JITTA), 2012, 13:2.
Jennifer E. Gerow, Varun Grover, Nicholas Roberts, and Jason Thatcher, “The
Diffusion of Second Generation Statistical Techniques in Information Systems
Research from 1990-2008,” Journal of Information
Technology Theory and Application (JITTA), 2010, 11:4.
Esko Penttinen, Matti Rossi, and Virpi
Tuunainen, “Mobile Games: Analyzing the Needs and Values of the Consumers,” Journal of Information Technology Theory and Application
(JITTA), 2010, 11:1.
Julie E. Kendall, Kenneth E. Kendall, and Muhammadou M.O. Kah, “Examining Virtual
Organizations Using Fantasy Theme Analysis: A Study of ICT Policy Advisors’
Discourse About Developing Countries,” Journal
of Information Technology Theory and Application (JITTA), 2006, 8:2.
Darren B. Nicholson, Saonee Sarker, Suprateek Sarker, and Joseph S. Valacich, “Determinants
of Effective Leadership in Information Systems Development Teams: An
Exploratory Study of Face-to-Face and Virtual Contexts,” Journal of Information Technology Theory and Application
(JITTA), 2007, 8:4.
Chih-Chien Wang, YaHui Hsu, and Wenchang Fang, “Acceptance of technology with network
externalities: an empirical study of internet instant messaging services,” Journal
of Information Technology Theory and Application (JITTA), 2004, 6:4.
Joseph G. Walls, George R. Widmeyer, and Omar A. El Sawy, “Assessing
information system design theory in perspective: How useful was our 1992
initial rendition,” Journal of Information Technology Theory and Application
(JITTA), 2004, 6:2.
Goldkuhl, Goran, "Design theories in
information systems-a need for multi-grounding," Journal of Information
Technology Theory and Application (JITTA), 2004, 6:2.
Starling D. Hunter III, “Information
technology, organizational learning, and the market value of the firm,” Journal
of Information Technology Theory and Application (JITTA), 2003, 5:1.
Ken Peffers and Tang Ya,
“Identifying and evaluating the universe of outlets for information systems
research: Ranking the journals,” Journal of Information Technology Theory
and Application (JITTA), 2003, 5:1.
Fion S.L.
Lee, Doug Vogel, and Moez Limayem,
“Virtual Community Informatics: A Review and Research Agenda,” Journal of Information Technology Theory and Application
(JITTA), 2003, 5:1.