The Advances in Applied Intelligence Research (AAIRJ) stands as an international, peer-reviewed, open-access journal committed to facilitating the exchange of high-quality research outcomes across all facets of Computer Science, Computer Engineering, and Information Technology. The determination of whether a paper is complete, and novel ultimately lies with the reviewers and editors on a case-by-case basis. In general, a paper is expected to encompass a compelling motivational discussion, clearly articulate the relevance of the research, elucidate what is novel and forecast the scientific impact of the work, present all pertinent proofs and/or experimental data, and engage in a thorough discussion of connections with the existing literature.

AAIRJ aspires to serve as a leading resource, facilitating researchers and professionals worldwide to foster, disseminate, and engage in discussions on key research issues and advancements in the realm of information processing systems and related fields.

First decision is provided to authors approximately 21 days after submission; acceptance to publication is undertaken in 2-3 days.

Latest Publication   (Vol. 3, No. 1, Feb.  2026)

Streamlining Ubuntu Remote Server Management Through a System Administration Chatbot 
Herbert Kabwela Kalonji  Cherubin Tshienda  Michée Kalonda Mbo  Nkuba K. Carlos
Managing IT servers has become an increasingly complex task in a context where information systems form the backbone of enterprises, universities, and public institutions. System administra-tors are required not only to maintain the continuous operation of essential services, such as web servers, email platforms, and file-sharing systems, but also to respond rapidly to failures, perfor-mance degradation, or service overloads. Traditionally, these operations rely on remote com-mand-line interfaces, a method that, while powerful, can be cumbersome and less accessible for routine or urgent tasks. This work presents the design and implementation of a system admin-istration chatbot deployed on an Ubuntu server and integrated with the Telegram messaging platform. Developed in Python, the chatbot enables administrators to interact with the server through a natural and intuitive conversational interface, allowing tasks such as service status in-spection, service restarts, and real-time monitoring of memory, CPU usage, and disk capacity. The contribution of this project is twofold: it reduces the operational burden on administrators and enhances their responsiveness to incidents, while also making server management more accessible by leveraging a widely used communication tool instead of complex administrative interfaces. The results demonstrate that the proposed chatbot constitutes a practical, efficient, and promising so-lution, opening new pathways for the automation and modernization of IT administration and monitoring.
Cracking The Code: Understanding Employee Vulnerability to Social Engineering -- A Systematic Literature Review 
Esdras Diffouo Fopa
This systematic literature review synthesizes existing research on employee susceptibility to social engineering, analyzing psychological, organizational, and professional factors through structured database searches and multi-stage screening. The findings suggest that, within the literature re-viewed, individuals with higher levels of agreeableness, neuroticism, and openness may demon-strate increased vulnerability to phishing. Professionally, employees who lack technical expertise, such as administrative staff and newly hired personnel, appear to be more likely to fall victim to social engineering attacks such as spear phishing. Organizational conditions, including remote work and high workloads, are also associated with reduced social engineering threat awareness, potentially elevating risk. Collectively, these factors indicate that risk may be amplified for indi-viduals in roles like newly hired remote administrative staff who also exhibit traits such as low conscientiousness. The reviewed literature identified remote work, workload, and newcomer status as potential risk amplifiers that interact with personality-based vulnerabilities. In response, we propose a framework for integrating vulnerability assessment into employee onboarding to enable more tailored cybersecurity awareness training aligned with individual and situational risk factors.