INFORMATION TECHNOLOGY IN INDUSTRY http://www.it-in-industry.org/index.php/itii <div class="row"> <h2><img class="img-responsive" src="http://it-in-industry.org/public/site/images/admin_itin_industry/iti-banner.png" alt="" width="1903" height="273" /></h2> <h3 class="page-header"><strong>Journal of Information Technology in Industry</strong></h3> <div id="content"> <div id="journalDescription" style="text-align: justify;"><strong>Introduction</strong><br />Journal of Information Technology in Industry is a peer-reviewed journal aimed at providing a platform for researchers to showcase and disseminate high-quality research in the domain of next-generation computing and information Technology. With the introduction of new computing paradigms such as cloud computing, Journal of Information Technology in Industry promises to be a high-quality dissemination forum for new ideas, technology focus, research results and discussions on the evolution of computing.</div> <div> <div class="jumbotron" style="padding: 20px; margin-bottom: 5px;"> <ul class="list-group"> <li class="list-group-item">Edited by: <strong>Production Department </strong> Journal of Information Technology in Industry <strong>(ITII)</strong> Review: Blind Peer Review Process</li> <li class="list-group-item">ISSN Online: 2203-1731</li> <li class="list-group-item">Published by: Science Research Society (SRS)</li> <li class="list-group-item">Editors &amp; Editorial Board | Scientific Committee | Reviewers last year</li> <li class="list-group-item">Periodicity: Semi-annual | First semester: January, 01 (January-June) | Second semester: July, 1 (July-December)</li> <li class="list-group-item"><strong> Scopus </strong> Under Evaluation Process | <strong> Emerging Sources Citation Index (ESCI) </strong> of Clarivate Analytics: h-index: 21 | <strong> Recyt </strong> (FECYT Quality Seal): Seal 2020 R2019: 9/16 C3 | <strong> Dialnet Metrics </strong> 2019: 0.521. Q3 in Communication: 5/59 | <strong> REDIB </strong> (CSIC-Universia) 2019: 9/36 in Communication. Overall classification: 218/921. Percentile of the Normalized Impact Factor: 45,327. Global qualifier: 11,026 | <strong> Google Scholar Metrics </strong> 2019: (H index: 33. i10: 117 | <strong> CIRC </strong>: level B in Information Technology | <strong> ECRH + </strong>: indexed since 15/08/2014 | <strong> MIAR </strong>: ICDS 9.7 over 11 (2019) | <strong> DICE </strong> (CSIC / ANECA): C (Val. CL: 34 IC: 9.26) (2012 update ) | <strong> CARHUS Plus + </strong>: Level D Information and Communication | <strong> DIALNET </strong>: Impact 2018: 0.417. Communication position: 8/51. | <strong> Index Copernicus </strong>: ICV 2019: 100.00 | <strong> Latindex </strong>: Selective Catalog: 38/38 criteria | <strong> RESH </strong>: Qualification: C. Impact factor (2004-2008): 0.043 | <strong> Indexed in </strong>: Academic Search Ultimate, Communication Source and Academic Source Plus (EBSCO), REDALYC, Ulrich's Sociological Abstract, Psicodoc, Quality Open Access Market, Cabells.</li> </ul> </div> </div> <div> <div><strong>Coverage Areas</strong><br />Although the list is not prescriptive, JIITI intends to focus on advances in the following sub-domains:</div> <ul> <li>System Development andIimplementation</li> <li>Communications</li> <li>Software Engineering</li> <li>Formal methods of Innovation</li> <li>Software Engineering</li> <li>Technology Developments</li> <li>Technology Future</li> <li>Strategy</li> <li>Software Technology Change</li> <li>Infrastructure</li> <li>human resources</li> <li>business process management</li> </ul> <br /><strong>Types of Papers</strong> The Journal accepts the following categories of papers: <ul> <li style="list-style-type: lower-alpha;">Original research</li> <li style="list-style-type: lower-alpha;">Position papers/review papers</li> <li style="list-style-type: lower-alpha;">Short-papers (with well-defined ideas, but lacking research results or having preliminary results)</li> <li style="list-style-type: lower-alpha;">Technology Discussion/Overview Papers</li> </ul> <br /> <p style="text-align: justify;"><strong>Peer Review Process</strong><br />All submitted papers are subjected to a comprehensive blind review process by at least 2 subject area experts, who judge the paper on its relevance, originality, clarity of presentation and significance. The review process is expected to take 8-12 weeks at the end of which the final review decision is communicated to the author. In case of rejection authors will get helpful comments to improve the paper for resubmission to other journals. The journal may accept revised papers as new papers which will go through a new review cycle.</p> </div> </div> </div> en-US editor@it-in-industry.org (Editor) editor@it-in-industry.org (Support Team) Tue, 26 Jul 2022 06:32:49 +0000 OJS 3.2.1.3 http://blogs.law.harvard.edu/tech/rss 60 Threats and Security Issues in Cloud Computing http://www.it-in-industry.org/index.php/itii/article/view/797 <p>In this paper, we have tried to categorize the key concerns and discuss the related technical implications and research issues, including some advanced security issues specific to cloud. We have also discussed some issues regarding security-related regulatory compliance in cloud. In this paper, we take a holistic view of cloud computing security - spanning across the possible issues and vulnerabilities connected with virtualization infrastructure; software platform; identity management and access control; data integrity; confidentiality and privacy; physical and process security aspects; and legal compliance in cloud. We present our findings from the points of view of a cloud service provider, cloud consumer, and third-party authorities such as Govt.</p> Dr. Gurpreet Singh Copyright (c) 2022 http://www.it-in-industry.org/index.php/itii/article/view/797 Tue, 26 Jul 2022 00:00:00 +0000 Strengthening/Retrofitting Strategy of Externally Bonded GFRP Composites http://www.it-in-industry.org/index.php/itii/article/view/799 <p>The primary goal of the planned experimental inquiry is to determine if externally bonded GFRP composites may be used to refit slightly damaged R.C.C. frames and reinforce seismically weak R.C.C. frames. The efficacy of GFRP composites wrapped around R.C.C. columns and R.C.C. beams in flexure and shear zones will also be examined. To compare the flexure behavior of the beams wrapped in GFRP composites to the unwrapped beams, twenty-one flexure beams intended to fail in flexure were cast and tested in group II beams. The remaining three beams acted as reference beams for this category of beams, while nine of the twenty one flexure beams were strengthened and nine more were retrofitted utilizing GFRP composites in three distinct wrapping patterns. In order to compare the shear behavior of the beams with GFRP composites to that of the unwrapped beams, nine shear beams intended to fail in shear were cast and evaluated for group III beams. The remaining three beams acted as reference beams for this category of beams while three of the nine shear beams were strengthened and another three refitted utilizing GFRP composites.<br />To compare the load carrying capability of these columns to that of the other nine, three of the nine columns were strengthened, while another three were retrofitted with GFRP composites. The remaining three columns acted as this category's control columns and were unwrapped columns. In order to evaluate the efficiency of GFRP composites in load carrying capacity, three of the nine frame specimens were strengthened, and another three were retrofitted using GFRP composites. The remaining three frames acted as control frames for this category. In order to model the behavior of R.C.C. beams and R.C.C. frames with and without GFRP composites wrapping, numerical analysis was also carried out using the finite element tool ABAQUS. The findings were then compared with experimental data.</p> Anshul Sharma, Vishnu Sharma Copyright (c) 2022 http://www.it-in-industry.org/index.php/itii/article/view/799 Thu, 30 Jun 2022 00:00:00 +0000 Protecting Data in the 21st Century: Challenges, Strategies and Future Prospects http://www.it-in-industry.org/index.php/itii/article/view/854 <p>Protecting data has become a critical imperative in the 21st century due to the rapid increase in digitalization, which generates, collects, and shares an enormous amount of information. This information is highly valuable to individuals and organizations alike and often includes personal and sensitive data such as financial records, medical information, and personal identifiers. Unfortunately, cybercriminals also recognize the value of such data, and the exponential growth in digital data has made it an attractive target for data breaches, cyber-attacks, and identity theft. With the proliferation of cloud storage and remote access, the threat of data breaches has become even more pronounced, with hackers gaining unauthorized access to sensitive information.</p> Anil Kumar Saraswat, Vijendra Meel Copyright (c) 2023 http://www.it-in-industry.org/index.php/itii/article/view/854 Tue, 26 Jul 2022 00:00:00 +0000