The Journal of Information Technology and Cyber Security (JITCS) is a publication aimed at presenting research articles and review articles related to Information Technology and Cyber Security from researchers in various sectors such as industry, government, universities, research institutions, etc. The primary focus of this journal is to publish papers discussing the design, algorithms, methods, theories, literature reviews, development, testing, implementation, and/or management of Information Technology and Cyber Security. Additionally, it provides practical guidelines in the development and management of these systems. The journal will publish papers in the field of Information Technology and Cyber Security in various areas, including but not limited to:
- Enterprise Systems (ES)
- Enterprise Resource Planning
- Business Process Management
- Customer Relationship Management
- System Dynamics
- E-business and e-Commerce
- Marketing Analytics
- Supply Chain Management and Logistics
- Business Analytics and Knowledge Discovery
- Production Management
- Task Analysis
- Process Mining
- Discrete Event Simulation
- Service Science and Innovation
- Innovation in the Digital Economy
- Information Systems Management (ISM)
- Software Engineering
- Software Design Pattern
- System Analysis and Design
- Software Quality Assurance
- Green Technology Strategies
- Strategic Information Systems
- IT Governance and Audits
- E-Government
- IT Service Management
- IT Project Management
- Information System Development
- Research Methods of Information Systems
- Adoption and Diffusion of Information Technology
- Health Information Systems and Technology
- Accounting Information Systems
- Human Behavior in Information System
- Social Technical Issues and Social Inclusion
- Domestication of Information Technology
- ICTs and Sustainable Development
- Information System in developing countries
- Software metric and cost estimation
- IT/IS audit
- IT Risk and Management
- Data Acquisition and Information Dissemination (DAID)
- Open Data
- Social Media
- Knowledge Management
- Social Networks
- Big Data
- Web Services
- Database Management Systems
- Semantics Web and Linked Data
- Visualization Information
- Social Information Systems
- Social Informatics
- Spatial Informatics Systems
- Geographical Information Systems
- Data Engineering and Business Intelligence (DEBI)
- Business Intelligence
- Data Mining
- Intelligent Systems
- Artificial Intelligence
- Autonomous Agents
- Intelligent Agents
- Multi-Agent Systems
- Expert Systems
- Pattern Recognition
- Machine Learning
- Soft Computing
- Optimization
- Forecasting
- Meta-Heuristics
- Computational Intelligence
- Decision Support Systems
- IT Infrastructure and Security (ITIS)
- Information Security and Privacy
- Digital Forensics
- Network Security
- Cryptography
- Cloud and Virtualization
- Emerging Technologies
- Computer Vision and Image
- Ethics in Information Systems
- Human Computer Interaction
- Wireless Sensor Networks
- Medical Image Analysis
- Internet of Things
- Mobile and Pervasive Computing
- Real-time Systems and Embedded Systems
- Parallel and Distributed Systems
- Cyber attacks
- Machine learning mechanisms for cyber security
- Modern tools for improving cyber security
- Emerging trends in cyber security
- Cyber security in Internet of Things (IoT)
- Cyber security in Cloud