The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Project complexity has been extensively explored in the literature because of its major contribution towards the failure of major projects in terms of cost and time overruns. Researchers have identified important factors that contribute to the project complexity and validated their findings through case studies. Few studies have even focused on developing tools for evaluating the project complexity...
According to both the US Geological Survey and the World Bank, $280 billion dollars could have been saved if $40 billion dollars had been invested in disaster prevention. Natural and human-made disasters that have occurred over the last few years show that there is a gap in disaster prevention caused by the interconnected nature of risks, which cannot be foreseen with current risk management methods...
In this paper we aim to gain insight into the relationship between user participation modes and project risk factors, and then we construct a model that can be used to determine how user participation can be successfully applied in ISD projects with a given set of risk factors. We perform an in-depth literature review, which aims to clarify the concept of user participation as part of risk management...
With the increasingly security problems in networks and systems, the evolution of development models that underlie current tools and techniques is all that is required to produce a model of self-defense where all the components are self-protected. The great extension of current models recommends a reasonable transition fundamentally based on the family of standards ISO/IEC 31000, where the selection...
Focusing on alliances in high-tech industry, we apply theory of transaction cost and relational contract to explore the effect of uncertainty and experience on firms' choice of alliances governance. By using a sample of 99 strategic alliances in high-tech industry, we empirically examine the theoretical hypotheses proposed in this paper, and find some evidence supporting these hypotheses. Consistent...
A new method of software project risk assessment based on credal network is proposed. It can handle experts' imprecise beliefs as well as their disagreement when quantifying the influences of risk factors by using credal set. Risk prediction and risk diagnosis were carried out by the inference in credal network. An example is given to illustrate the process. Case results indicate that the principle...
Managing software projects is a great challenge to many project managers. Due to cost, time or flexibility for software projects, risk management has been adopted by organizations as an alternative managing software projects method. This paper will discuss on the design of software risk assessment visualization tool using probabilistic model. Though there are many approaches in assessing software...
Fuzzy cognitive maps are used as project management risk factors decision aids to better assess how change in one part of an IT agile project management organization affects other parts of it. FCM modeling is used to analyze the impact of the changes. It suggested that the initial decision would not yield the expected results so intervention measures were undertaken to reengineer existing relationships...
Requirements changes during software development pose a risk to cost, schedule and quality while at the same time providing an opportunity to add value. Provision of a generic change source taxonomy which makes the distinction between factors contributing to requirements uncertainty and events that trigger change will support requirements change risk visibility, and also facilitate richer recording...
Establishing "with enterprises as the mainstay, market-oriented and industry-university-collaborated technology innovation system" is an important issue in our national innovation system, while the cooperation between enterprises and university plays a critical part of it. Differences in the nature and targets of organizations, complexity of the industry-university cooperation process, as...
Most of us recognize that when society's collective trends expose us to disasters which may threaten our survival, some rather radical, i.e., fundamental, actions may be necessary to forestall such untoward events. Yet, what signals might trigger such action? Pronouncements that the ldquoend is nearrdquo have not proven to be very effective, and rightfully so. We suggest rather that the impetus for...
Traditionally, visibility and control are recognized as key elements of resilient supply chains. In a business environment of increasing complexity, firms must look beyond visibility and control to complementary competencies that enable rapid, collaborative response to supply chain disruptions. In this paper, an attempt has been made to analyze sources of supply chain risk and their managerial counterparts...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.