•  
  •  
 

About This Journal

In 2016, the AIS Council voted to create a family of journals with JAIS and CAIS and other AIS journals that were either regional journals or niche journals. After exploration of various options for repositioning JITTA to fit this policy or withdrawing the journal from the AIS family, the JITTA Board decided to become an AIS affiliated journal in May and subsequently has decided to stop publishing the journal. As a result, papers are no longer accepted for publication consideration and the current pipeline of papers is managed towards publication (or rejection) by the editors. The last issue of JITTA is scheduled to appear by the end of 2018.

The journal has 15 years of tradition. Individuals and institutions worldwide have online access to the journal via the AIS library. The acceptance rate is 25% and the typical turnaround between submission and initial decision is about two to three months.

JITTA is considered in a number of databases and rankings world-wide and it has been identified an A Journal in Australian Business Deans Council Journal Quality List 2013 (on a four-Tier scale of A*, A, B, and C). JITTA is also included in the Journal List of the Chartered Association of Business Schools (United Kingdom) and the VHB Journal List (German Academic Association for Business Research).

Selected Articles:

Lars Mathiassen and Nannette Napier, “Exploring Win-Win Contracts: An Appreciative Inquiry into IT Project Management,” Journal of Information Technology Theory and Application (JITTA), 2013, 14: 3.

Sanghee Lim, Terence J.V. Saldanha, Suresh Malladi, and Nigel P. Melville, “Theories Used in Information Systems Research: Insights from Complex Network Analysis,” Journal of Information Technology Theory and Application (JITTA), 2013, 14:2.

Steven Alter, “Challenges for Service Science,” Journal of Information Technology Theory and Application (JITTA), 2012, 13:2.

Jennifer E. Gerow, Varun Grover, Nicholas Roberts, and Jason Thatcher, “The Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-2008,” Journal of Information Technology Theory and Application (JITTA), 2010, 11:4.

Esko Penttinen, Matti Rossi, and Virpi Tuunainen, “Mobile Games: Analyzing the Needs and Values of the Consumers,” Journal of Information Technology Theory and Application (JITTA), 2010, 11:1.

Julie E. Kendall, Kenneth E. Kendall, and Muhammadou M.O. Kah, “Examining Virtual Organizations Using Fantasy Theme Analysis: A Study of ICT Policy Advisors’ Discourse About Developing Countries,” Journal of Information Technology Theory and Application (JITTA), 2006, 8:2.

Darren B. Nicholson, Saonee Sarker, Suprateek Sarker, and Joseph S. Valacich, “Determinants of Effective Leadership in Information Systems Development Teams: An Exploratory Study of Face-to-Face and Virtual Contexts,” Journal of Information Technology Theory and Application (JITTA), 2007, 8:4.

Chih-Chien Wang, YaHui Hsu, and Wenchang Fang, “Acceptance of technology with network externalities: an empirical study of internet instant messaging services,” Journal of Information Technology Theory and Application (JITTA), 2004, 6:4.

Joseph G. Walls, George R. Widmeyer, and Omar A. El Sawy, “Assessing information system design theory in perspective: How useful was our 1992 initial rendition,” Journal of Information Technology Theory and Application (JITTA), 2004, 6:2.

Goldkuhl, Goran, "Design theories in information systems-a need for multi-grounding," Journal of Information Technology Theory and Application (JITTA), 2004, 6:2.

Starling D. Hunter III, “Information technology, organizational learning, and the market value of the firm,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.

Ken Peffers and Tang Ya, “Identifying and evaluating the universe of outlets for information systems research: Ranking the journals,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.

Fion S.L. Lee, Doug Vogel, and Moez Limayem, “Virtual Community Informatics: A Review and Research Agenda,” Journal of Information Technology Theory and Application (JITTA), 2003, 5:1.