Journal of Research and Practice in Information Technology
- Vol 47 No. 01 - 2015 pg. 47
- Vol 47 No. 01 - 2015 pg. 23
- Vol 47 No. 01 - 2015 pg. 3
- Vol 47 No. 01 - 2015 pg. 1
- Vol 46 No. 04 - 2014 pg. 309
- Vol 46 No. 04 - 2014 pg. 287
- Vol 46 No. 04 - 2014 pg. 263
- Vol 46 No. 04 - 2014 pg. 235
- Vol 46 No. 04 - 2014 pg. 215
- Vol 46 No. 04 - 2014 pg. 197
- Vol 46 No. 04 - 2014 pg. 171
- Vol 46 No. 04 - 2014 pg. 167
- Vol 46 No. 02-03 - 2014 pg. 145
- Vol 46 No. 02-03 - 2014 pg. 133
- Vol 46 No. 02-03 - 2014 pg. 119
- Vol 46 No. 02-03 - 2014 pg. 107
- Vol 46 No. 02-03 - 2014 pg. 93
- Vol 46 No. 02-03 - 2014 pg. 77
- Vol 46 No. 02-03 - 2014 pg. 63
- Vol 46 No. 01 - 2014 pg. 47
- Vol 46 No. 01 - 2014 pg. 31
- Vol 46 No. 01 - 2014 pg. 19
- Vol 46 No. 01 - 2014 pg. 3
- Vol 46 No. 01 - 2014 pg. 1
- Vol 45 No. 03-04 - 2013 pg. 285
- Vol 45 No. 03-04 - 2013 pg. 267
- Vol 45 No. 03-04 - 2013 pg. 251
- Vol 45 No. 03-04 - 2013 pg. 237
- Vol 45 No. 03-04 - 2013 pg. 219
- Vol 45 No. 03-04 - 2013 pg. 203
- Vol 45 No. 03-04 - 2013 pg. 193
- Vol 45 No. 03-04 - 2013 pg. 171
- Vol 45 No. 02 - 2013 pg. 151
- Vol 45 No. 02 - 2013 pg. 133
- Vol 45 No. 02 - 2013 pg. 117
- Vol 45 No. 02 - 2013 pg. 99
- Vol 45 No. 02 - 2013 pg. 79
- Vol 45 No. 02 - 2013 pg. 73
- Vol 44 No. 04 - 2012 pg. 457
- Vol 44 No. 04 - 2012 pg. 441
- Vol 44 No. 04 - 2012 pg. 423
- Vol 44 No. 04 - 2012 pg. 401
- Vol 44 No. 04 - 2012 pg. 387
- Vol 44 No. 04 - 2012 pg. 365
- Vol 44 No. 02 - 2012 pg. 223
- Vol 44 No. 02 - 2012 pg. 203
- Vol 44 No. 02 - 2012 pg. 183
- Vol 44 No. 02 - 2012 pg. 167
- Vol 44 No. 02 - 2012 pg. 151
- Vol 44 No. 02 - 2012 pg. 129