{"id":118,"date":"2024-03-12T13:30:37","date_gmt":"2024-03-12T13:30:37","guid":{"rendered":"https:\/\/jita-au.com\/?page_id=118"},"modified":"2024-03-28T09:46:56","modified_gmt":"2024-03-28T09:46:56","slug":"aims-and-scope","status":"publish","type":"page","link":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/","title":{"rendered":"Aims and Scope"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"118\" class=\"elementor elementor-118\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-710d4ad elementor-section-height-min-height elementor-section-full_width elementor-hidden-tablet elementor-hidden-mobile elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"710d4ad\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-577e653\" data-id=\"577e653\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca1c89d elementor-widget elementor-widget-heading\" data-id=\"ca1c89d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AIMS and SCOPE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd0214 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3fd0214\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4297bd6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4297bd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge.\nThe JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry.\n\n<br><br>\n&nbsp;\n\nThe aims of JITA are:\n<ul>\n \t<li>To provide international exchange and dissemination of research efforts, knowledge and experiences<\/li>\n \t<li>To promote and facilitate the exchange of information and knowledge in research<\/li>\n \t<li>To explore the new developments and innovations towards the structuring of a knowledge-based information society<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe manuscripts can be of different content:\n<ul>\n \t<li>Research work leading the progress in selected knowledge fields and domains<\/li>\n \t<li>Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products<\/li>\n \t<li>Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting<\/li>\n \t<li>Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc.<\/li>\n \t<li>Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society.\n\n&nbsp;\n\nThe research topics of interest are the following but not limited to:\n<br><br>\n&nbsp;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb6b1f2 elementor-widget__width-initial wpr-advanced-accordion-icon-side-box elementor-widget elementor-widget-wpr-advanced-accordion\" data-id=\"eb6b1f2\" data-element_type=\"widget\" data-settings=\"{&quot;active_item&quot;:1}\" data-widget_type=\"wpr-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n            <div class=\"wpr-advanced-accordion\" data-accordion-type=\"accordion\" data-active-index=\"1\" data-accordion-trigger=\"click\" data-interaction-speed=\"0.4\">\n\n\t\t\t\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network1\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Information Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul>\n \t<li>Information systems, technologies and applications <\/li>\n \t<li>Information systems interoperability<\/li>\n \t<li>System design and analysis <\/li>\n \t<li>Smart systems design<\/li>\n \t<li>Next generation computing systems<\/li>\n \t<li>Information systems audit<\/li>\n \t<li>Quantum computers<\/li>\n \t<li>Ethics of computing <\/li>\n \t<li>Internet systems standards and applications<\/li>\n \t<li>Computing professional issues<\/li>\n \t<li>Energy management and Green Computing<\/li>\n \t<li>Josephson devices and Q-bits<\/li>\n \t<li>Architecture and organisation<\/li>\n \t<li>Operating systems <\/li>\n \t<li>Distributed OS & Middleware<\/li>\n \t<li>Parallel and distributed computing<\/li>\n \t<li>Databases<\/li>\n \t<li>File and Storage Systems<\/li>\n \t<li>Hardware Technology <\/li>\n<\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network2\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Networks<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Sensor networks &amp; systems<\/li><\/ul><ul><li>Networking and communications<\/li><li>Telecommunications<\/li><\/ul><ul><li>Network management<\/li><\/ul><ul><li>Web application development methods and processes<\/li><li>Web application development tools and environments<\/li><li>Web application quality, metrics and measurement<\/li><li>Web application evaluation, verification and validation<\/li><li>Service-oriented Web application approaches<\/li><li>Semantic Web technology in Web applications<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-android\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Artificial Intelligence<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Artificial Intelligence (AI)<\/li><\/ul><ul><li>Internet of Things (IoT)<\/li><li>Sensors and smart electronic circuits<\/li><\/ul><ul><li>Natural Language Processing<\/li><li>Machine Learning<\/li><li>Robotics<\/li><\/ul><ul><li>Intelligent systems<\/li><li>Large Language Models \u2013 LLM<\/li><li>Deep Learning systems and algorithms<\/li><li>Blockchains<\/li><li>Neural networks<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-code\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Software Engineering<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Software engineering and development<\/li><\/ul><ul><li>Testing automation, methods and tools<\/li><li>Performance modeling, monitoring and evaluation<\/li><li>Implementation Architectures<\/li><li>Modeling and model-based design and development<\/li><li>Human-computer interaction and user modeling<\/li><\/ul><ul><li>Virtual Engineering Applications<\/li><\/ul><ul><li>Algorithms and Theory<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-advanced-data-table\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Data Science<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Big Data, Data Management and Data Analytics<\/li><\/ul><ul><li>Data and information science<\/li><li>Data governance and planning<\/li><li>Data architecture and modeling<\/li><li>Data acqusition and preprocessing methods<\/li><li>Data visualisation and presentation<\/li><\/ul><ul><li>Prediction algorithms<\/li><\/ul><ul><li>Recommender system<\/li><li>Algorithms and complexity<\/li><\/ul><ul><li>Local Algorithms and Congestion Aware Algorithms<\/li><\/ul><ul><li>Data science ecosystem's issues<\/li><li>Business intelligence<\/li><li>Data warehousing<\/li><li>Data quality and qualitative analysis<\/li><li>Text mining<\/li><\/ul><ul><li>Information Retrieval<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-cloud-up\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cloud Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Cloud computing and data center systems<\/li><li>Cloud computing service models issues<\/li><li>Cloud computing architecture deployment models<\/li><li>Cloud computing in e-Commerce scenarios<\/li><li>Security issues in cloud computing<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-monitor\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Applied Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Industrial systems and robotics<\/li><li>Embeded systems<\/li><li>Enterprise management systems<\/li><li>Enterprise information systems<\/li><li>E-commerce<\/li><li>Internet marketing<\/li><li>E-government<\/li><li>E-health<\/li><li>E-learning<\/li><\/ul><ul><li>E-Business Systems Integration and Standardization<\/li><li>Electronic Business Model and Method<\/li><li>E-Commerce Risk Management<\/li><li>Ontology Engineering for E-Commerce<\/li><li>Semantic Web Service Architecture for E-Commerce<\/li><li>Financial Tech<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-finger-hover-touch\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Multimedia Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Image and Multidimensional Signal Processing<\/li><\/ul><ul><li>Multimedia and multimedia systems<\/li><li>Video games<\/li><li>Sound and Music production<\/li><li>Internet and multimedia<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Security and Privacy<\/li><li>Cryptography and Applied Mathematics<\/li><\/ul><ul><li>Artificial intelligence in all forms<\/li><li>Security in computing and cybersecurity<\/li><li>VPNs and proxies<\/li><li>Tokenisation<\/li><\/ul><ul><li>Steganography<\/li><li>IT Forensics<\/li><li>Ethical hacking and pen testing issues<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                            <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-920f98b elementor-section-height-min-height elementor-section-full_width elementor-hidden-mobile elementor-hidden-desktop elementor-hidden-laptop elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"920f98b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7905bd3\" data-id=\"7905bd3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb11000 elementor-widget elementor-widget-heading\" data-id=\"eb11000\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AIMS and SCOPE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70a505c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"70a505c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46f1c9b elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"46f1c9b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge.\nThe JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry.\n\n<br><br>\n&nbsp;\n\nThe aims of JITA are:\n<ul>\n \t<li>To provide international exchange and dissemination of research efforts, knowledge and experiences<\/li>\n \t<li>To promote and facilitate the exchange of information and knowledge in research<\/li>\n \t<li>To explore the new developments and innovations towards the structuring of a knowledge-based information society<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe manuscripts can be of different content:\n<ul>\n \t<li>Research work leading the progress in selected knowledge fields and domains<\/li>\n \t<li>Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products<\/li>\n \t<li>Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting<\/li>\n \t<li>Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc.<\/li>\n \t<li>Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society.\n\n&nbsp;\n\nThe research topics of interest are the following but not limited to:\n<br><br>\n&nbsp;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b604cf0 elementor-widget__width-initial elementor-widget-tablet__width-inherit wpr-advanced-accordion-icon-side-box elementor-widget elementor-widget-wpr-advanced-accordion\" data-id=\"b604cf0\" data-element_type=\"widget\" data-widget_type=\"wpr-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n            <div class=\"wpr-advanced-accordion\" data-accordion-type=\"accordion\" data-active-index=\"0\" data-accordion-trigger=\"click\" data-interaction-speed=\"0.4\">\n\n\t\t\t\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network1\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Information Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul>\n \t<li>Information systems, technologies and applications <\/li>\n \t<li>Information systems interoperability<\/li>\n \t<li>System design and analysis <\/li>\n \t<li>Smart systems design<\/li>\n \t<li>Next generation computing systems<\/li>\n \t<li>Information systems audit<\/li>\n \t<li>Quantum computers<\/li>\n \t<li>Ethics of computing <\/li>\n \t<li>Internet systems standards and applications<\/li>\n \t<li>Computing professional issues<\/li>\n \t<li>Energy management and Green Computing<\/li>\n \t<li>Josephson devices and Q-bits<\/li>\n \t<li>Architecture and organisation<\/li>\n \t<li>Operating systems <\/li>\n \t<li>Distributed OS & Middleware<\/li>\n \t<li>Parallel and distributed computing<\/li>\n \t<li>Databases<\/li>\n \t<li>File and Storage Systems<\/li>\n \t<li>Hardware Technology <\/li>\n<\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network2\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Networks<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Sensor networks &amp; systems<\/li><\/ul><ul><li>Networking and communications<\/li><li>Telecommunications<\/li><\/ul><ul><li>Network management<\/li><\/ul><ul><li>Web application development methods and processes<\/li><li>Web application development tools and environments<\/li><li>Web application quality, metrics and measurement<\/li><li>Web application evaluation, verification and validation<\/li><li>Service-oriented Web application approaches<\/li><li>Semantic Web technology in Web applications<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-android\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Artificial Intelligence<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Artificial Intelligence (AI)<\/li><\/ul><ul><li>Internet of Things (IoT)<\/li><li>Sensors and smart electronic circuits<\/li><\/ul><ul><li>Natural Language Processing<\/li><li>Machine Learning<\/li><li>Robotics<\/li><\/ul><ul><li>Intelligent systems<\/li><li>Large Language Models \u2013 LLM<\/li><li>Deep Learning systems and algorithms<\/li><li>Blockchains<\/li><li>Neural networks<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-code\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Software Engineering<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Software engineering and development<\/li><\/ul><ul><li>Testing automation, methods and tools<\/li><li>Performance modeling, monitoring and evaluation<\/li><li>Implementation Architectures<\/li><li>Modeling and model-based design and development<\/li><li>Human-computer interaction and user modeling<\/li><\/ul><ul><li>Virtual Engineering Applications<\/li><\/ul><ul><li>Algorithms and Theory<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-advanced-data-table\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Data Science<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Big Data, Data Management and Data Analytics<\/li><\/ul><ul><li>Data and information science<\/li><li>Data governance and planning<\/li><li>Data architecture and modeling<\/li><li>Data acqusition and preprocessing methods<\/li><li>Data visualisation and presentation<\/li><\/ul><ul><li>Prediction algorithms<\/li><\/ul><ul><li>Recommender system<\/li><li>Algorithms and complexity<\/li><\/ul><ul><li>Local Algorithms and Congestion Aware Algorithms<\/li><\/ul><ul><li>Data science ecosystem's issues<\/li><li>Business intelligence<\/li><li>Data warehousing<\/li><li>Data quality and qualitative analysis<\/li><li>Text mining<\/li><\/ul><ul><li>Information Retrieval<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-cloud-up\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cloud Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Cloud computing and data center systems<\/li><li>Cloud computing service models issues<\/li><li>Cloud computing architecture deployment models<\/li><li>Cloud computing in e-Commerce scenarios<\/li><li>Security issues in cloud computing<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-monitor\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Applied Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Industrial systems and robotics<\/li><li>Embeded systems<\/li><li>Enterprise management systems<\/li><li>Enterprise information systems<\/li><li>E-commerce<\/li><li>Internet marketing<\/li><li>E-government<\/li><li>E-health<\/li><li>E-learning<\/li><\/ul><ul><li>E-Business Systems Integration and Standardization<\/li><li>Electronic Business Model and Method<\/li><li>E-Commerce Risk Management<\/li><li>Ontology Engineering for E-Commerce<\/li><li>Semantic Web Service Architecture for E-Commerce<\/li><li>Financial Tech<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-finger-hover-touch\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Multimedia Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Image and Multidimensional Signal Processing<\/li><\/ul><ul><li>Multimedia and multimedia systems<\/li><li>Video games<\/li><li>Sound and Music production<\/li><li>Internet and multimedia<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Security and Privacy<\/li><li>Cryptography and Applied Mathematics<\/li><\/ul><ul><li>Artificial intelligence in all forms<\/li><li>Security in computing and cybersecurity<\/li><li>VPNs and proxies<\/li><li>Tokenisation<\/li><\/ul><ul><li>Steganography<\/li><li>IT Forensics<\/li><li>Ethical hacking and pen testing issues<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                            <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a3283e elementor-section-height-min-height elementor-section-full_width elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2a3283e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96864c6\" data-id=\"96864c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03f80b7 elementor-widget elementor-widget-heading\" data-id=\"03f80b7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AIMS and SCOPE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89a5963 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"89a5963\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3410f97 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3410f97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge.\nThe JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry.\n\n<br><br>\n&nbsp;\n\nThe aims of JITA are:\n<ul>\n \t<li>To provide international exchange and dissemination of research efforts, knowledge and experiences<\/li>\n \t<li>To promote and facilitate the exchange of information and knowledge in research<\/li>\n \t<li>To explore the new developments and innovations towards the structuring of a knowledge-based information society<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe manuscripts can be of different content:\n<ul>\n \t<li>Research work leading the progress in selected knowledge fields and domains<\/li>\n \t<li>Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products<\/li>\n \t<li>Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting<\/li>\n \t<li>Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc.<\/li>\n \t<li>Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields<\/li>\n<\/ul>\n&nbsp;\n<br><br>\nThe JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society.\n\n&nbsp;\n\nThe research topics of interest are the following but not limited to:\n<br><br>\n&nbsp;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a2b0b elementor-widget__width-initial elementor-widget-mobile__width-inherit wpr-advanced-accordion-icon-side-box elementor-widget elementor-widget-wpr-advanced-accordion\" data-id=\"e5a2b0b\" data-element_type=\"widget\" data-widget_type=\"wpr-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n            <div class=\"wpr-advanced-accordion\" data-accordion-type=\"accordion\" data-active-index=\"0\" data-accordion-trigger=\"click\" data-interaction-speed=\"0.4\">\n\n\t\t\t\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network1\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Information Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul>\n \t<li>Information systems, technologies and applications <\/li>\n \t<li>Information systems interoperability<\/li>\n \t<li>System design and analysis <\/li>\n \t<li>Smart systems design<\/li>\n \t<li>Next generation computing systems<\/li>\n \t<li>Information systems audit<\/li>\n \t<li>Quantum computers<\/li>\n \t<li>Ethics of computing <\/li>\n \t<li>Internet systems standards and applications<\/li>\n \t<li>Computing professional issues<\/li>\n \t<li>Energy management and Green Computing<\/li>\n \t<li>Josephson devices and Q-bits<\/li>\n \t<li>Architecture and organisation<\/li>\n \t<li>Operating systems <\/li>\n \t<li>Distributed OS & Middleware<\/li>\n \t<li>Parallel and distributed computing<\/li>\n \t<li>Databases<\/li>\n \t<li>File and Storage Systems<\/li>\n \t<li>Hardware Technology <\/li>\n<\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-network2\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Networks<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Sensor networks &amp; systems<\/li><\/ul><ul><li>Networking and communications<\/li><li>Telecommunications<\/li><\/ul><ul><li>Network management<\/li><\/ul><ul><li>Web application development methods and processes<\/li><li>Web application development tools and environments<\/li><li>Web application quality, metrics and measurement<\/li><li>Web application evaluation, verification and validation<\/li><li>Service-oriented Web application approaches<\/li><li>Semantic Web technology in Web applications<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-android\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Artificial Intelligence<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Artificial Intelligence (AI)<\/li><\/ul><ul><li>Internet of Things (IoT)<\/li><li>Sensors and smart electronic circuits<\/li><\/ul><ul><li>Natural Language Processing<\/li><li>Machine Learning<\/li><li>Robotics<\/li><\/ul><ul><li>Intelligent systems<\/li><li>Large Language Models \u2013 LLM<\/li><li>Deep Learning systems and algorithms<\/li><li>Blockchains<\/li><li>Neural networks<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-code\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Software Engineering<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Software engineering and development<\/li><\/ul><ul><li>Testing automation, methods and tools<\/li><li>Performance modeling, monitoring and evaluation<\/li><li>Implementation Architectures<\/li><li>Modeling and model-based design and development<\/li><li>Human-computer interaction and user modeling<\/li><\/ul><ul><li>Virtual Engineering Applications<\/li><\/ul><ul><li>Algorithms and Theory<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-advanced-data-table\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Data Science<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Big Data, Data Management and Data Analytics<\/li><\/ul><ul><li>Data and information science<\/li><li>Data governance and planning<\/li><li>Data architecture and modeling<\/li><li>Data acqusition and preprocessing methods<\/li><li>Data visualisation and presentation<\/li><\/ul><ul><li>Prediction algorithms<\/li><\/ul><ul><li>Recommender system<\/li><li>Algorithms and complexity<\/li><\/ul><ul><li>Local Algorithms and Congestion Aware Algorithms<\/li><\/ul><ul><li>Data science ecosystem's issues<\/li><li>Business intelligence<\/li><li>Data warehousing<\/li><li>Data quality and qualitative analysis<\/li><li>Text mining<\/li><\/ul><ul><li>Information Retrieval<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-cloud-up\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cloud Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Cloud computing and data center systems<\/li><li>Cloud computing service models issues<\/li><li>Cloud computing architecture deployment models<\/li><li>Cloud computing in e-Commerce scenarios<\/li><li>Security issues in cloud computing<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-monitor\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Applied Computing<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Industrial systems and robotics<\/li><li>Embeded systems<\/li><li>Enterprise management systems<\/li><li>Enterprise information systems<\/li><li>E-commerce<\/li><li>Internet marketing<\/li><li>E-government<\/li><li>E-health<\/li><li>E-learning<\/li><\/ul><ul><li>E-Business Systems Integration and Standardization<\/li><li>Electronic Business Model and Method<\/li><li>E-Commerce Risk Management<\/li><li>Ontology Engineering for E-Commerce<\/li><li>Semantic Web Service Architecture for E-Commerce<\/li><li>Financial Tech<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-finger-hover-touch\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Multimedia Systems<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Image and Multidimensional Signal Processing<\/li><\/ul><ul><li>Multimedia and multimedia systems<\/li><li>Video games<\/li><li>Sound and Music production<\/li><li>Internet and multimedia<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                \n\t\t\t\t\t<div class=\"wpr-accordion-item-wrap\">\n\t\t\t\t\t\t<button class=\"wpr-acc-button\">\n\t\t\t\t\t\t\t<span class=\"wpr-acc-item-title\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-icon-box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-title-icon\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"hm hm-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"wpr-acc-title-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-close\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t<span class=\"wpr-toggle-icon wpr-ti-open\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"wpr-acc-panel\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-acc-panel-content\"><ul><li>Security and Privacy<\/li><li>Cryptography and Applied Mathematics<\/li><\/ul><ul><li>Artificial intelligence in all forms<\/li><li>Security in computing and cybersecurity<\/li><li>VPNs and proxies<\/li><li>Tokenisation<\/li><\/ul><ul><li>Steganography<\/li><li>IT Forensics<\/li><li>Ethical hacking and pen testing issues<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                    <\/div>\n\n                            <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and processes Web application development tools and environments Web application quality, metrics and measurement Web application evaluation, verification and validation Service-oriented Web application approaches Semantic Web technology in Web applications Artificial Intelligence Artificial Intelligence (AI) Internet of Things (IoT) Sensors and smart electronic circuits Natural Language Processing Machine Learning Robotics Intelligent systems Large Language Models \u2013 LLM Deep Learning systems and algorithms Blockchains Neural networks Software Engineering Software engineering and development Testing automation, methods and tools Performance modeling, monitoring and evaluation Implementation Architectures Modeling and model-based design and development Human-computer interaction and user modeling Virtual Engineering Applications Algorithms and Theory Data Science Big Data, Data Management and Data Analytics Data and information science Data governance and planning Data architecture and modeling Data acqusition and preprocessing methods Data visualisation and presentation Prediction algorithms Recommender system Algorithms and complexity Local Algorithms and Congestion Aware Algorithms Data science ecosystem&#8217;s issues Business intelligence Data warehousing Data quality and qualitative analysis Text mining Information Retrieval Cloud Computing Cloud computing and data center systems Cloud computing service models issues Cloud computing architecture deployment models Cloud computing in e-Commerce scenarios Security issues in cloud computing Applied Computing Industrial systems and robotics Embeded systems Enterprise management systems Enterprise information systems E-commerce Internet marketing E-government E-health E-learning E-Business Systems Integration and Standardization Electronic Business Model and Method E-Commerce Risk Management Ontology Engineering for E-Commerce Semantic Web Service Architecture for E-Commerce Financial Tech Multimedia Systems Image and Multidimensional Signal Processing Multimedia and multimedia systems Video games Sound and Music production Internet and multimedia Cybersecurity Security and Privacy Cryptography and Applied Mathematics Artificial intelligence in all forms Security in computing and cybersecurity VPNs and proxies Tokenisation Steganography IT Forensics Ethical hacking and pen testing issues AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-118","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aims and Scope - JITA -Journal of Information Technology and Application<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aims and Scope - JITA -Journal of Information Technology and Application\" \/>\n<meta property=\"og:description\" content=\"AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and processes Web application development tools and environments Web application quality, metrics and measurement Web application evaluation, verification and validation Service-oriented Web application approaches Semantic Web technology in Web applications Artificial Intelligence Artificial Intelligence (AI) Internet of Things (IoT) Sensors and smart electronic circuits Natural Language Processing Machine Learning Robotics Intelligent systems Large Language Models \u2013 LLM Deep Learning systems and algorithms Blockchains Neural networks Software Engineering Software engineering and development Testing automation, methods and tools Performance modeling, monitoring and evaluation Implementation Architectures Modeling and model-based design and development Human-computer interaction and user modeling Virtual Engineering Applications Algorithms and Theory Data Science Big Data, Data Management and Data Analytics Data and information science Data governance and planning Data architecture and modeling Data acqusition and preprocessing methods Data visualisation and presentation Prediction algorithms Recommender system Algorithms and complexity Local Algorithms and Congestion Aware Algorithms Data science ecosystem&#8217;s issues Business intelligence Data warehousing Data quality and qualitative analysis Text mining Information Retrieval Cloud Computing Cloud computing and data center systems Cloud computing service models issues Cloud computing architecture deployment models Cloud computing in e-Commerce scenarios Security issues in cloud computing Applied Computing Industrial systems and robotics Embeded systems Enterprise management systems Enterprise information systems E-commerce Internet marketing E-government E-health E-learning E-Business Systems Integration and Standardization Electronic Business Model and Method E-Commerce Risk Management Ontology Engineering for E-Commerce Semantic Web Service Architecture for E-Commerce Financial Tech Multimedia Systems Image and Multidimensional Signal Processing Multimedia and multimedia systems Video games Sound and Music production Internet and multimedia Cybersecurity Security and Privacy Cryptography and Applied Mathematics Artificial intelligence in all forms Security in computing and cybersecurity VPNs and proxies Tokenisation Steganography IT Forensics Ethical hacking and pen testing issues AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/\" \/>\n<meta property=\"og:site_name\" content=\"JITA -Journal of Information Technology and Application\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-28T09:46:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/\",\"url\":\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/\",\"name\":\"Aims and Scope - JITA -Journal of Information Technology and Application\",\"isPartOf\":{\"@id\":\"https:\/\/jita-au.com\/#website\"},\"datePublished\":\"2024-03-12T13:30:37+00:00\",\"dateModified\":\"2024-03-28T09:46:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jita-au.com\/index.php\/aims-and-scope\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jita-au.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aims and Scope\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jita-au.com\/#website\",\"url\":\"https:\/\/jita-au.com\/\",\"name\":\"JITA -Journal of Information Technology and Application\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/jita-au.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jita-au.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jita-au.com\/#organization\",\"name\":\"JITA -Journal of Information Technology and Application\",\"url\":\"https:\/\/jita-au.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jita-au.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg\",\"contentUrl\":\"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg\",\"width\":300,\"height\":164,\"caption\":\"JITA -Journal of Information Technology and Application\"},\"image\":{\"@id\":\"https:\/\/jita-au.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aims and Scope - JITA -Journal of Information Technology and Application","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/","og_locale":"en_US","og_type":"article","og_title":"Aims and Scope - JITA -Journal of Information Technology and Application","og_description":"AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and processes Web application development tools and environments Web application quality, metrics and measurement Web application evaluation, verification and validation Service-oriented Web application approaches Semantic Web technology in Web applications Artificial Intelligence Artificial Intelligence (AI) Internet of Things (IoT) Sensors and smart electronic circuits Natural Language Processing Machine Learning Robotics Intelligent systems Large Language Models \u2013 LLM Deep Learning systems and algorithms Blockchains Neural networks Software Engineering Software engineering and development Testing automation, methods and tools Performance modeling, monitoring and evaluation Implementation Architectures Modeling and model-based design and development Human-computer interaction and user modeling Virtual Engineering Applications Algorithms and Theory Data Science Big Data, Data Management and Data Analytics Data and information science Data governance and planning Data architecture and modeling Data acqusition and preprocessing methods Data visualisation and presentation Prediction algorithms Recommender system Algorithms and complexity Local Algorithms and Congestion Aware Algorithms Data science ecosystem&#8217;s issues Business intelligence Data warehousing Data quality and qualitative analysis Text mining Information Retrieval Cloud Computing Cloud computing and data center systems Cloud computing service models issues Cloud computing architecture deployment models Cloud computing in e-Commerce scenarios Security issues in cloud computing Applied Computing Industrial systems and robotics Embeded systems Enterprise management systems Enterprise information systems E-commerce Internet marketing E-government E-health E-learning E-Business Systems Integration and Standardization Electronic Business Model and Method E-Commerce Risk Management Ontology Engineering for E-Commerce Semantic Web Service Architecture for E-Commerce Financial Tech Multimedia Systems Image and Multidimensional Signal Processing Multimedia and multimedia systems Video games Sound and Music production Internet and multimedia Cybersecurity Security and Privacy Cryptography and Applied Mathematics Artificial intelligence in all forms Security in computing and cybersecurity VPNs and proxies Tokenisation Steganography IT Forensics Ethical hacking and pen testing issues AIMS and SCOPE The Journal of Informational Technology and Applications (JITA) is an international scientific journal aiming to improve and disseminate innovations, knowledge and experiences on methods, policies and technologies relevant to the development of information society based on knowledge. The JITA provides a medium for exchanging research results and achievements accomplished by the scientific community from academia and industry. &nbsp; The aims of JITA are: To provide international exchange and dissemination of research efforts, knowledge and experiences To promote and facilitate the exchange of information and knowledge in research To explore the new developments and innovations towards the structuring of a knowledge-based information society &nbsp; The manuscripts can be of different content: Research work leading the progress in selected knowledge fields and domains Theoretical discussions, development designs and practical applications of novel technologies, services, processes and products Relevant discussions and advances such as standards, legislation and policies in an organisational, national and\/or international setting Relevant discussions and advnces on societal and economic issues of computing, e-commerce etc, in particular concerning improvements in employability, health, sustainability, equality etc. Other contributions and considerations (holistic approach to problems) that may be of importance for the development of the knowledge fields &nbsp; The JITA journal accepts full-scale research manuscripts that make a significant contribution to the field of computer science (CS), information technologies (IT) and information systems (IS). It aims to enhance and communicate the knowledge concerning the development of IT services, and their use, societal impact, and economics considering different possible implications, including other professional issues and supporting the development of knowledge-based information society. &nbsp; The research topics of interest are the following but not limited to: &nbsp; Information Systems Information systems, technologies and applications Information systems interoperability System design and analysis Smart systems design Next generation computing systems Information systems audit Quantum computers Ethics of computing Internet systems standards and applications Computing professional issues Energy management and Green Computing Josephson devices and Q-bits Architecture and organisation Operating systems Distributed OS &#038; Middleware Parallel and distributed computing Databases File and Storage Systems Hardware Technology Networks Sensor networks &amp; systems Networking and communications Telecommunications Network management Web application development methods and","og_url":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/","og_site_name":"JITA -Journal of Information Technology and Application","article_modified_time":"2024-03-28T09:46:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/","url":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/","name":"Aims and Scope - JITA -Journal of Information Technology and Application","isPartOf":{"@id":"https:\/\/jita-au.com\/#website"},"datePublished":"2024-03-12T13:30:37+00:00","dateModified":"2024-03-28T09:46:56+00:00","breadcrumb":{"@id":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jita-au.com\/index.php\/aims-and-scope\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jita-au.com\/index.php\/aims-and-scope\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jita-au.com\/"},{"@type":"ListItem","position":2,"name":"Aims and Scope"}]},{"@type":"WebSite","@id":"https:\/\/jita-au.com\/#website","url":"https:\/\/jita-au.com\/","name":"JITA -Journal of Information Technology and Application","description":"","publisher":{"@id":"https:\/\/jita-au.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jita-au.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jita-au.com\/#organization","name":"JITA -Journal of Information Technology and Application","url":"https:\/\/jita-au.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jita-au.com\/#\/schema\/logo\/image\/","url":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg","contentUrl":"https:\/\/jita-au.com\/wp-content\/uploads\/2024\/03\/cropped-JITA-logo-300px-1-1.jpg","width":300,"height":164,"caption":"JITA -Journal of Information Technology and Application"},"image":{"@id":"https:\/\/jita-au.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/pages\/118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/comments?post=118"}],"version-history":[{"count":28,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/pages\/118\/revisions"}],"predecessor-version":[{"id":1092,"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/pages\/118\/revisions\/1092"}],"wp:attachment":[{"href":"https:\/\/jita-au.com\/index.php\/wp-json\/wp\/v2\/media?parent=118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}