Editorial Policies

Focus and Scope

Jurnal Teknologi dan Sistem Informasi (JTSI) is a periodical journal of scientific publication of the results of studies and original research in the science of Information Systems and Technology. JTSI Journal was built with the aim to expand and create innovative concepts, theories, paradigms, perspectives, and methodologies in the sciences of Information Systems and Technology. The articles published in the JTSI can be the result of conceptual thinking, ideas, innovation, creativity, best practices, book review, and research results that have been done.

Data and Information Management

  • Conceptual Data Model
  • Data and Database Administration
  • Database Management Systems
  • Database Systems
  • File Organizations Techniques
  • Information Management Concepts
  • Logical Data Model
  • Physical Data Model
  • Security Database
  • Physical Data Storage Concepts
  • Query Languages
  • Database Programming
  • Reporting Tools
  • Relational Databases
  • Transaction Processing
  • Decision Support System
  • Internal Controls System
  • Information Architecture
  • Data Warehouse
  • Data Mining
  • Business Intelligence
  • Presenting Data and Opportunities
  • Data Science
Strategic Information System
  • IS Strategy, Management, and Acquisition
  • Enterprise Architecture
  • Business Process Management
  • Social Informatics
  • Information System Security
  • Analytical Information System
IS Project Management
  • Project Management
  • Project Management Lifecycle
  • Managing Project Teams
  • Managing Project Communication
  • Project Initiation and Planning
  • Managing Project Scope
  • Managing Project Scheduling
  • Managing Project Resources
  • Managing Project Quality
  • Managing Project Risk
  • Managing Project Procurement
  • Project Execution, Control & Closure
Systems Analysis and Design
  • System Development Life Cycle
  • Business Process Management
  • Analysis of Business Requirements
  • Structuring of It-Based Opportunities Into Projects
  • Fundamentals of Is Project Management In The Global Context
  • Analysis and Specification of System Requirements
  • Approaches to Implementing Information Systems to Support Business Requirements
  • Methods for Comparing Systems Implementation Approaches
  • Organizational Implementation of a  New Information System
Application Development
  • Program design
  • Program development lifecycle
  • Requirements determinants and analysis
  • Techniques for modeling program structures
  • Programming concepts
  • Data structures
  • Application Integration
  • Programming Paradigm  (Functional Programming, Object-Oriented Programming, and Event-Driven Programming)
Business Intelligence
  • Business Intelligence
  • Data Warehouse
  • Data & Text Mining
  • Business Analytics
  • Data Visualization
  • Advance in Data & Information Management
Social and Professional Issues
  • IS/IT Ethics, crime, and Responsibility
  • Security Policies, Laws, and Computer Crimes
  • Research Methodology
  • Tata Tulis Karya Ilmiah
  • Bahasa Indonesia
  • Bahasa Inggris
  • Iman dan Ketaqwaan Kepada Tuhan Yang Maha Esa
  • History of Computer Technology
  • Social Context
  • Economies of Computing
  • Professional Ethics
  • Intellectual Property
  • Privacy and Civil LibertiesProfessional Communication

 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Peer Review Process

PEER REVIEW PROCESS

The submitted manuscript is first reviewed by an editor. It will be evaluated in the office whether it is suitable with our focus and scope or has a major methodological flaw. These manuscript will be sent to two reviewers anonymously (Single Blind Peer Review). Reviewers' comment are then sent to corresponding author to take the necessary actions and responses. The decision of the revised manuscript will be then evaluated in editorial board meeting, the final decision of whom are sent to the corresponding author.

 

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

 

Archiving

This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration. More...

 

Publication Frequency

This journal is published Quarter a year (March, June, September, and December)

 

Plagiarism Check

PLAGIARISM SCREENING POLICY

  • The authors should ensure that they have written entirely original works. If the author(s) use other's works and/or words then they must be cited or quoted appropriately.
  • An author should not, in general, publish manuscripts describing essentially the same research in more than one journal or primary publication. Submitting the same manuscript to more than one journal concurrently constitutes unethical publishing behavior and is unacceptable.
  • Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work.
  • All received manuscripts will go through a plagiarism screening process by the editorial board. Jurnal Teknologi dan Sistem Informasi (JTSI) Editors use Plagiarism Detector for submission.

Jurnal Teknologi dan Sistem Informasi (JTSI) editorial board recognizes that plagiarism is not acceptable and therefore establishes the following policy stating specific actions (penalties) upon identification of plagiarism/similarities in articles submitted for publication in Jurnal Teknologi dan Sistem Informasi (JTSI)Jurnal Teknologi dan Sistem Informasi (JTSI) will use Plagiarism Detector originality checking software as the tool for detecting similarities of texts in article manuscripts and the final version of articles ready for publication. A maximum of 30 % of similarities is allowed for the submitted papers. Should we find more than 30% of the similarity index, the article will be returned to the author for correction and resubmission.

Level of Plagiarism

Minor: A short section of another article is plagiarised without any significant data or idea taken from the other paper
Action: A warning is given to the authors and a request to change the text and properly cite the original article is made.

Intermediate: A significant portion of a paper is plagiarised without proper citation to the original paper
Action: The submitted article is rejected and the authors are forbidden to submit further articles for one year

Severe: A significant portion of a paper is plagiarised that involves reproducing original results or ideas presented in another publication
Action: The paper is rejected and the authors are forbidden to submit further articles for five years.

It is understood that all authors are responsible for the content of their submitted paper as they all read and understand Publication Ethics Jurnal Teknologi dan Sistem Informasi (JTSI). If a penalty is imposed for plagiarism, all authors will be subject to the same penalty.

 

 

RETRACTION

The papers published in the Jurnal Teknologi dan Sistem Informasi (JTSI) will be consider to retract in the publication if :

  1. They have clear evidence that the findings are unreliable, either as a result of misconduct (e.g. data fabri-cation) or honest error (e.g. miscalculation or experimental error)
  2. the findings have previously been published elsewhere without proper crossreferencing, permission orjustification (i.e. cases of redundant publication)
  3. it constitutes plagiarism
  4. it reports unethical research

The mechanism of retraction follow the Retraction Guidelines of Committee on Publication Ethics (COPE) which can be accessed at https://publicationethics.org/files/retraction%20guidelines.pdf.