International Journal of Technology Intelligence and Planning
- Editor in Chief
- Prof. Nazrul Islam
- ISSN online
- ISSN print
- 4 issues per year
IJTIP is an international research and practice-based journal which encompasses all aspects of technology analysis, dealing with quantitative, qualitative or hybrid features of technology research and their impacts. It provides an authoritative source of information, answering the needs of academics and practitioners in the fields of technology intelligence, technology planning and roadmapping, technological change, technology controlling and technology decision-making processes.
Topics covered include
- Organising technology intelligence, planning, resource allocation, controlling, decision-making processes
- Choosing/using such processes, e.g. core competence analysis, roadmapping, bibliometrics
- Phenomenon of emergent strategies, implications for these processes
- Different management levels (lower/middle/top management), relevance to these processes
- Strategy implementation and these processes
- Entrepreneurial behaviour (promoters, gatekeepers, etc.), implications for these processes
- Strategy development:
- Technology selection, make-or-buy, keep-or-sell decision making
- Technological change and technology decision-making processes
- Impact of technology intelligence/planning/controlling processes on decision making, organisational learning
- Politics, bounded rationality, etc. in technology decision making
- Linking technology strategy to company strategy and functional strategies
- Technological decision making in high-velocity environments
IJTIP aims to further the development of the field of technology analysis, intelligence, planning and roadmapping. A specific goal is to connect the research done by academics and professionals in the field and to link it to research streams on organisational decision making and learning.
IJTIP disseminates knowledge and establishes channels of communication between policy makers, professionals and experts working in universities, research institutions and industry.
IJTIP publishes original papers, theory-based empirical papers, bibliometrics, review papers, case studies with profound implications for theory, relevant technology intelligence and planning reports, book reviews and research notes. Commentaries on papers and reports published in the journal are encouraged.
IJTIP is indexed in:
- Scopus (Elsevier)
- Compendex [formerly Ei] (Elsevier)
- Academic OneFile (Gale)
- cnpLINKer (CNPIEC)
- Computer Database (Gale)
- Expanded Academic ASAP (Gale)
- Business Collection (Gale)
- General OneFile (Gale)
- Google Scholar
- Info Trac (Gale)
- Inspec (Institution of Engineering and Technology)
- ProQuest Advanced Technologies Database with Aerospace
IJTIP is listed in:
- Australian Business Deans Council Journal Rankings List
- Cabell's Directory of Publishing Opportunities
- The BFI lists
- Chartered Association of Business Schools (CABS) Academic Journal Guide
- UGC (University Grants Commission)
- Excellence in Research for Australia (ERA)
- Norwegian Register for Scientific Journals, Series and Publishers
- University of Queensland Business School Journal List
- VHB-JOURQUAL (Germany)
Editor in Chief
- Islam, Nazrul, University of Exeter, UK
- Lichtenthaler, Eckhard, , Germany
- Miyazaki, Kumiko, Tokyo Institute of Technology, Japan
Editorial Board Members
- Alberti, Fernando G., LIUC Università Cattaneo, Italy
- Antal, Ariane Berthoin, Wissenschaftszentrum Berlin, Germany
- Ashton, W. Bradford, Concurrent Technologies Corporation (CTC), USA
- Caldwell, Barrett S., Purdue University, USA
- Chiesa, Vittorio, Politecnico di Milano, Italy
- Cohen, Susan K., University of Pittsburgh, USA
- De Meyer, Arnoud, Singapore Management University, Singapore
- Dodgson, Mark, University of Queensland, Australia
- Dou, Henri, L’Ecole Supérieure de Commerce et de Management de Tours-Poitiers, France
- Fleisher, Craig S., Aurora WDC, USA
- Gemünden, Hans Georg, Technical University of Berlin, Germany
- Gerybadze, Alexander, Universität Hohenheim, Germany
- Guild, Paul, University of Waterloo, Canada
- Herstatt, Cornelius, Technische Universität Hamburg-Harburg (TUHH), Germany
- Kappel, Thomas A., Danfoss Power Electronics, USA
- Klavans, Richard A., SciTech Strategies, Inc., USA
- Lichtenthaler, Ulrich, Otto Beisheim Graduate School of Management, Germany
- Macdonald, Stuart, University of Leicester, UK
- Moehrle, Martin G., Universität Bremen, Germany
- Nobeoka, Kentaro, Hitotsubashi University, Japan
- Pizzurno, Emanuele, LIUC Università Cattaneo, Italy
- Prescott, John E., University of Pittsburgh, USA
- Probert, David, University of Cambridge, UK
- Reinmöller, Patrick, Cranfield University, UK
- Savioz, Pascal, Mageba (Shanghai) Bridge Products Co., Ltd., China
- Tschirky, Hugo, Swiss Federal Institute of Technology Zurich (ETHZ), Switzerland
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (more details available here) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- Briefs and research notes are not published in this journal.
- All our articles go through a double-blind review process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.
- There are no charges for publishing with Inderscience, unless you require your article to be Open Access (OA). You can find more information on OA here.
- All articles for this journal must be submitted using our online submissions system.
- Submit here.
Predator and prey in cyber stasis
2 May, 2019
In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking cat and mouse or hacker and computer system. Writing in the International Journal of Technology Intelligence and Planning, a team from the USA suggests that the waxing and waning, the ebb and flow of cyber attack on the Internet of Things and other systems reflects the natural rise and fall of predator and prey numbers. When predators attack more frequently and with more sophisticated weaponry, the prey ultimately adapts to cope and so the predator must also evolve to have sharper teeth and longer claws to persist in the next round of attack and so on [...]More details...
Internet of Power
3 May, 2019
Researchers in India are developing an "intelligent" system that can monitor energy usage of Internet of Things devices in the home and connect or disconnect them appropriately as needed. The system uses a Hall effect sensor to monitor the current flowing to a device. In work described in the International Journal of Technology Intelligence and Planning, the team presents a new approach to IoT control with software and hardware. An IoT device can monitor energy levels while the intelligent system is connected via Wi-Fi to allow control from a remote site, specifically using an internet-connected smartphone. Such a system would be a boon to those with various forms of disability who might thus take back control of their home and its appliances, such as lights, fans, heaters, and other enabled devices, where before many gadgets were wholly inaccessible or required another person to be present to help [...]More details...