Editorial Policies

Focus and Scope

AJIS publishes high quality contributions to the global Information Systems (IS) discipline with an emphasis on theory and practice on the Australasian context. Topics cover core IS theory development and application (the nature of data, information and knowledge; formal representations of the world, the interaction of people, organisations and information technologies; the analysis, design and deployment of information systems; the impacts of information systems on individuals, organisations and society), IS domains (e-business, e-government, e-learning, e-law, etc) and IS research approaches. Research and conceptual development based in a very wide range of epistemological methods are welcomed. AJIS now also publishes Research Notes and Post Publication Reviews.

 

Section Policies

Research Articles

Full research articles, other than those solicited for special themes should be submitted in this section.

Checked Open Submissions Checked Indexed Checked Peer Reviewed

Research on Applied Ethics

Research on Applied Ethics involving Cybersecurity

Research theme: Applied and professional ethics for socio-technical systems in the domain of cybersecurity.

Overview
Cybersecurity is a growing and important area for researchers. People tend to underestimate the potential for a cyber-attack against their organisation and the costs associated with such attacks. But technology is only one component in achieving cyber-resilience: the ‘human factor’ is critical in building effective cyber-resilience for any organisation. Insufficiently secured systems and the rise of the Internet of Things (IoT) such as internet connected refrigerators, automation devices, and cameras are major sources for Distributed Denial of Service (DDoS) attacks. This affects not only businesses but households. For this special section we invite papers that examine the ethical importance of cybersecurity. The focus is on applied, not philosophical or theoretical ethics. A practical, professional ethics focus is desired for accepted papers.

Specific areas of interest for the special section

  • Targets such as autonomous cars, IoT devices, critical infrastructure, cryptocurrency. 
  • Attack tools such as botnets, ransomware, artificial intelligence (AI) driven attacks. 
  • The impact on healthcare in areas such as robotics, wearables and remote monitoring. 
  • Impacts on cloud, big data, mobile systems and assistive technologies. 
  • Privacy issues, such as privacy preserving biometrics. 
  • Ethical design. 
  • Ethical hacking. 
  • Cyber conflicts and cyber warfare; 
  • Other ethical issues relating to cybersecurity.

Timeline

  • Initial paper submission deadline: May 18th, 2018. 
  • Initial round of review to be completed by: July 30th, 2018. 
  • Revised paper submission deadline: August 31st, 2018. 
  • Second round of review to be completed by: October 29th, 2018. 
  • Submission of accepted papers for journal copyediting processes: November 30th, 2018. 
  • Publication of special section papers: December 2018.

Section Editors
Professor Matthew Warren, Deakin University.
A/Professor Oliver Burmeister, Charles Sturt University.

Papers are to follow the guidelines for submission as per the AJIS site. http://journal.acs.org.au/index.php/ajis/about/submissions

Editors
  • Oliver Burmeister
  • Matthew Warren
Checked Open Submissions Checked Indexed Checked Peer Reviewed

Research Note

A Research Note is an article giving a brief description of an exciting, innovative, new and groundbreaking IS topic or idea, including the modification of a methodology, method or associated tool. It should be timely and relevant to AJIS’s primary readership: the international Information Systems academic and professional community. Research notes provide an outlet for publication of information that is relevant and important, but may lack spatial or temporal replication. It should clearly state (& justify) the nature of any proposed contributions in terms of developing the IS community It should be no more than 2,500 words, and can include two figures or tables. It should have at least eight references. Research notes will be sent for peer review. Research notes are not designed to serve as an outlet for publication of research that lacks appropriate scope or is better suited for other outlets.

 

Checked Open Submissions Checked Indexed Checked Peer Reviewed

Post-Publication Reviews

The information systems discipline is dynamic, with developments which often outpace the normal publishing programme of a journal. AJIS is interested in developing the discipline and encouraging constructive discussion leading to the strengthening of ideas and argument. Accordingly, AJIS invites short reviews (no more than 1,000 words) of papers it has published, subject to the following guidelines:

  1. All reviews must be signed and will be attributed 
  2. All reviews should address a substantive issue on a recently published paper 
  3. All reviews should be be written in a positive tone, not as a listing of negative comments 
  4. A submitted review will be sent to the corresponding author of that paper for a response to the review, which will be published simultaneously 
  5. If the corresponding author declines to respond, a note to that effect will appear with the review

The AJIS Editor-in-Chief has the final decision on whether a Post-Publication Review will be accepted. 

Checked Open Submissions Checked Indexed Unchecked Peer Reviewed
 

Peer Review Process

All manuscripts are initially assessed for plagiarism using Turnitin. They are then assessed using double blind peer reviewing by at least two well qualified reviewers. Their task is to provide constructive, fair, and timely advice to authors and editor. Different types of research paper need to be judged by different criteria.

Here are some assessment criteria that may be applied:

  • Relevance - topic or focus is part of the IS discipline. 
  • Effectiveness - paper makes a significant contribution to the IS body of knowledge. 
  • Impact - paper will be used for further research and/or practice. 
  • Uniqueness - paper is innovative, original & unique; plagiarism checks are carried out as a matter of routine. 
  • Conceptual soundness - theory, model or framework made explicit. 
  • Argument - design of the research or investigation is sound; methods appropriate. 
  • Clarity - Topic is clearly stated; illustrations, charts & examples support content. 
  • Reliability - data available; replication possible. 
  • References - sound, used appropriately, and sufficient - appropriate AJIS articles referenced Style - appropriate language, manuscript flows.

Currently, the review process takes between 80 and 120 days.

 

Publication Frequency

Articles are published as soon as they have passed through the reviewing and editing stages.

Special Sections are published as soon as all its articles have passed through the reviewing and editing stages.

 

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge. This publication has no Author Processing Charges. General permission to republish is granted in accordance with the Creative Commons Attribution and Non-Commercial License.

 

National Library of Australia (NLA) Archiving

AJIS is archived at the NLA in accordance with Australia's Legal Deposit requirements and can be accessed via Trove.

 

Special Sections

Proposals for Special Sections of the journal may be submitted for consideration to the Editor-in-Chief. There is a FAQ on creating Special Sections that the Editor-in-Chief can supply to assist in understanding how this operates and the information required to propose a Special Section. Please read this first before suggesting a Special Section.

 

Publication Archiving

AJIS has taken advantage of the Public Knowledge Project's LOCKSS based system so that articles will remain preserved and accessible. This facility guarantees long term accessibility and use by current and future scholars.