You are on page 1of 4

Journal of Contemporary Information Technology,

Management, and Accounting


Vol. 1 No. 1, Jan xxxx
ISSN: 2715-677X (online)
pp.

Template for Preparing Article for Journal of Contemporary


Information Technology, Management, and Accounting ← 16pt,
Times New Roman, Bold
Author1, Author2 ← 12pt, Times New Roman, Bold
1)
Author Institution, Name of Street, Village/District/Regency, City, ZIP/Postal Code, Province/State, Country
←10pt, Times New Roman, Italic
Email:
2)
Author Institution, Name of Street, Village/District/Regency, City, ZIP/Postal Code, Province/State, Country
Email:

ARTICLE INFO ABSTRACT

Article history: Abstract should include the research topic or problem, purpose of the
Received: research, meth-od of the research, results, and implication. In one
Revised: paragraph between 150 – 200 word. Above the article, justify, Times
Accepted: New Roman 10. Abstract should include the research topic or
problem, purpose of the research, meth-od of the research, results,
and implication. In one paragraph between 150 – 200 word. Above
the article, justify, Times New Roman 10. Abstract should include
the research topic or problem, purpose of the research, meth-od of
Key words:
the research, results, and implication. In one paragraph between 150
– 200 word. Above the article, justify, Times New Roman 10.
Abstract should include the research topic or problem, purpose of the
research, meth-od of the research, results, and implication. In one
paragraph between 150 – 200 word. Above the article, justify, Times
New Roman 10.

1. INTRODUCTION outset of articles substance containing topics,


gap phenomena/ research gap/ theoretical gap,
Introduction is written without subtitles/ sub problems, objectives, originality, grand theory/
chapters and stating the outset of articles theory used in the study, and hypothesis
substance containing topics, gap phenomena/ formulation. Introduction offers theoretical
research gap/ theoretical gap, problems, concepts, ideas, and presents the findings of
objectives, originality, grand theory/ theory used previous research as comparators, as well as the
in the study, and hypothesis formulation (Ball et strengthening, enrichment and refinement of
al. 2012). Introduction offers theoretical discussion, analysis and interpretation. The
concepts, ideas, and presents the findings of presentation should be coherent chronologically
previous research as comparators, as well as the and the logical relationship between one
strengthening, enrichment and refinement of paragraph and the following paragraph should be
discussion, analysis and interpretation. The clear (Watkins et al. 2004; Gul et al. 2003).
presentation should be coherent chronologically Introduction is written without subtitles/
and the logical relationship between one sub chapters and stating the outset of articles
paragraph and the following paragraph should be substance containing topics, gap phenomena/
clear. research gap/ theoretical gap, problems,
Blay et al. (2011) introduction is written objectives, originality, grand theory/ theory used
without subtitles/ sub chapters and stating the in the study, and hypothesis formulation.
Journal of Contemporary Information Technology,
Management, and Accounting
Vol. 1 No. 1, Jan xxxx
ISSN: 2715-677X (online)
pp.

Introduction offers theoretical concepts, ideas, Method is the sufficient information for
and presents the findings of previous research as the reader to follow the research flow well, so
comparators, as well as the strengthening, that the reader who will examine or develop
enrichment and refinement of discussion, similar research obtains the description of the
analysis and interpretation (Ravichandran et al. research steps. This section describes the types
2009; Chen et al. 2014). The presentation should of research and data types, population and
be coherent chronologically and the logical sample, operational research variables, the data
relationship between one paragraph and the used (types and sources), data collection
following paragraph should be clear. technique, and data analysis technique (model
analysis).
2. THEORETICAL FRAMEWORK AND Method is the sufficient information for
HYPOTHESES the reader to follow the research flow well, so
that the reader who will examine or develop
It describes the previously related similar research obtains the description of the
studies as the primary sources. The use of research steps. This section describes the types
secondary sources of references should not of research and data types, population and
dominate the total references. Quotation should sample, operational research variables, the data
be maximally one paragraph and/ or the gist of used (types and sources), data collection
the quoted sources. It describes the previously technique, and data analysis technique (model
related studies as the primary sources. Dehning analysis).
et al. (2003) the use of secondary sources of
references should not dominate the total 4. RESULT AND DISCUSSION
references. Quotation should be maximally one
paragraph and/ or the gist of the quoted sources. The results are presented systematically,
It describes the previously related studies as the written without sub-chapters and written out
primary sources. The use of secondary sources completely in advance, then the author writes
of references should not dominate the total result discussion. Leuz and Wysocki (2016)
references (Bharadwaj et al. 1999). Quotation result narration contains the information, which
should be maximally one paragraph and/ or the is taken from the data, does not tell the data as it
gist of the quoted sources. is, but tell the meaning of the data or
It describes the previously related information. For the information clarification
studies as the primary sources (Venkatesh and purposes, author can add tables, images, etc. In
Davis 2000). The use of secondary sources of addition, the results also present the items listed
references should not dominate the total in the research objectives or the results of
references. Venkatesh et al. (2003) quotation hypothesis examination which is proposed along
should be maximally one paragraph and/ or the with each step taken to the examination as
gist of the quoted sources. It describes the written in the method section (Dechow et al.
previously related studies as the primary sources. 2010; Kothari 2001).
The use of secondary sources of references Venkatesh and Bala (2008) discussion
should not dominate the total references (Davis suggests results interpretation, argument
1989; Davis et al. 1989; Davis and Venkatesh development by linking the results, theories, and
1996). Quotation should be maximally one opinions, including the comparison with
paragraph and/ or the gist of the quoted sources. previous research results. It is also important to
It describes the previously related studies as the raise the possibility of their research results
primary sources. The use of secondary sources contribution to the development of science. This
of references should not dominate the total section does not rewrite the data on the research
references. Quotation should be maximally one results (Barney et al. 2011; Wade and Hulland
paragraph and/ or the gist of the quoted sources. 2004).

3. RESEARCH METHOD
Journal of Contemporary Information Technology,
Management, and Accounting
Vol. 1 No. 1, Jan xxxx
ISSN: 2715-677X (online)
pp.

5. CONCLUSION, IMPLICATION, SUGGESTION, biases in the technology acceptance


AND LIMITATIONS model: three experiments. International
Journal of Human-Computer Studies 45
It is the closing of the article which (1):19-45.
reflects the essence and reasoning of the research Dechow, P., W. Ge, and C. Schrand. 2010.
by the writer. It is also logically based on the Understanding earnings quality: A
evidence taken from, and presented by the writer review of the proxies, their determinants
in paragraphs. Implication, limitations, and and their consequences. Journal of
suggestions are also presented in paragraphs accounting and economics 50 (2–
without numbering. 3):344-401.
Dehning, B., V. J. Richardson, and R. W. Zmud.
2003. The value relevance of
REFERENCES announcements of transformational
information technology investments.
Ball, R., S. Jayaraman, and L. Shivakumar. MIS Quarterly 27 (4): 637–656.
2012. Audited financial reporting and Gul, F. A., C. J. Chen, and J. S. Tsui. 2003.
voluntary disclosure as complements: A Discretionary accounting accruals,
test of the Confirmation Hypothesis. managers' incentives, and audit fees.
Journal of accounting and economics Contemporary Accounting Research 20
53:136–166. (3):441-464.
Barney, J. B., D. J. Ketchen Jr, and M. Wright. Kothari, S. 2001. Capital markets research in
2011. The future of resource-based accounting. Journal of accounting and
theory: revitalization or decline? economics 31 (1):105-231.
Journal of management 37 (5):1299- Leuz, C., and P. D. Wysocki. 2016. The
1315. Economics of Disclosure and Financial
Bharadwaj, A. S., S. G. Bharadwaj, and B. R. Reporting Regulation: Evidence and
Konsynski. 1999. Information Suggestions for Future Research.
technology effects on firm performance Journal of accounting research 54
as measured by Tobin's q. Management (2):525-622.
Science 45 (7):1008-1024. Ravichandran, T., Y. Liu, S. Han, and I. Hasan.
Blay, A. D., M. A. Geiger, and D. S. North. 2009. Diversification and firm
2011. The auditor's going-concern performance: Exploring the moderating
opinion as a communication of risk. effects of information technology
Auditing: A Journal of Practice & spending. Journal of Management
Theory 30 (2):77-102. Information Systems 25 (4):205–240.
Chen, Y., A. L. Smith, J. Cao, and W. Xia. 2014. Venkatesh, V., and H. Bala. 2008. Technology
Information technology capability, acceptance model 3 and a research
internal control effectiveness, and audit agenda on interventions. Decision
fees and delays. Journal of Information sciences 39 (2):273-315.
Systems 28 (2):149-180. Venkatesh, V., and F. D. Davis. 2000. A
Davis, F. D. 1989. Perceived Usefulness, theoretical extension of the technology
Perceived Ease of Use, and User acceptance model: Four longitudinal
Acceptance of Information Technology. field studies. Management Science 46
MIS Quarterly 13 (3):319-340. (2):186-204.
Davis, F. D., R. P. Bagozzi, and P. R. Warshaw. Venkatesh, V., M. G. Morris, G. B. Davis, and
1989. User Acceptance of Computer F. D. Davis. 2003. User Acceptance of
Technology: A Comparison of Two Information Technology: Toward a
Theoretical Models. Management Unified View. MIS Quarterly 27
Science 35 (8):982-1003. (3):425-478.
Davis, F. D., and V. Venkatesh. 1996. A critical Wade, M., and J. Hulland. 2004. Review: The
assessment of potential measurement resource-based view and information
Journal of Contemporary Information Technology,
Management, and Accounting
Vol. 1 No. 1, Jan xxxx
ISSN: 2715-677X (online)
pp.

systems research: Review, extension,


and suggestions for future research. MIS
Quarterly 28 (1):107-142.
Watkins, A. L., W. Hillison, and S. E.
Morecroft. 2004. Audit quality: A
synthesis of theory and empirical
evidence. Journal of Accounting
Literature 23:153-193.

You might also like