{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:29Z","timestamp":1740099149027,"version":"3.37.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009397"},{"type":"electronic","value":"9783030009403"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00940-3_10","type":"book-chapter","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T10:05:33Z","timestamp":1538388333000},"page":"124-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revenue Assurance Model for Project Management Organizations Using Outlier Mining"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9050-8550","authenticated-orcid":false,"given":"Gilberto F.","family":"Castro","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1387-7472","authenticated-orcid":false,"given":"Ani\u00e9","family":"Bermudez-Pe\u00f1a","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco G.","family":"Palacios","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8157-8549","authenticated-orcid":false,"given":"Mitchell","family":"V\u00e1squez-Berm\u00fadez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Diana J.","family":"Espinoza","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fausto R.","family":"Orozco","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Inelda A.","family":"Martillo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,10,2]]},"reference":[{"key":"10_CR1","unstructured":"PMI: A Guide to the Project Management Body of Knowledge, PMBOK\u00ae Guide, 6th edn. Project Management Institute, Pennsylvania, EE.UU (2017)"},{"key":"10_CR2","unstructured":"The Standish Group International: Standish Group 2015 Chaos Report. The Standish Group International, Inc., New York (2015)"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.hbrcj.2014.12.008","volume":"12","author":"Amr Mossalam","year":"2016","unstructured":"Mossalam, A., Arafa, M.: The role of project manager in benefits realization management as a project constraint\/driver. Housing and Building National Research Center, HBRC J. 56\u201367 (2014). \nhttps:\/\/doi.org\/10.1016\/j.hbrcj.2014.12.008","journal-title":"HBRC Journal"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Aggarwal, Ch.C.: Outlier Analysis. IBM T.J. Watson Research Center Yorktown Heights, New York, Springer Science, Business Media, Heidelberg, Dordrecht, London (2013). \nhttps:\/\/doi.org\/10.1007\/978-4614-6396-2","DOI":"10.1007\/978-4614-6396-2"},{"key":"10_CR5","unstructured":"Mattison, R.: The Telco Revenue Assurance Handbook. XiT Press, Oakwood Hills, Illinois (2005). \nhttp:\/\/www.grapatel.com\/A-GRAPA\/07-Library\/RABook.asp#top"},{"key":"10_CR6","unstructured":"TM Forum: Revenue Assurance a survey pre-result blog: lack of cross-functional mandate holds back change, say Revenue Assurance professionals (2015)"},{"issue":"2","key":"10_CR7","first-page":"1","volume":"29","author":"K Acosta","year":"2008","unstructured":"Acosta, K.: Aseguramiento de ingresos: una actividad fundamental en las empresas de telecomunicaciones. Revista de Ingenier\u00eda Industrial 29(2), 1\u20136 (2008)","journal-title":"Revista de Ingenier\u00eda Industrial"},{"key":"10_CR8","volume-title":"Project Management: Planning and Control Techniques","author":"R Burke","year":"2013","unstructured":"Burke, R.: Project Management: Planning and Control Techniques, 5th edn. Wiley, Hoboken (2013). 428 pages","edition":"5"},{"key":"10_CR9","volume-title":"Information Technology Project Management","author":"K Schwalbe","year":"2015","unstructured":"Schwalbe, K.: Information Technology Project Management, 7th edn. Cengage Learning, Boston (2015). 656 pages","edition":"7"},{"key":"10_CR10","unstructured":"Phillips, J.: PMP, Project Management Professional (Certification Study Guides), Sybex 7th edn. McGraw-Hill Osborne Media (2013). 696 pages"},{"key":"10_CR11","unstructured":"Leach, L.P.: Critical Chain Project Management, 1st edn. The North River Press, Artech House (2014). 246 pages"},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9781119176350","volume-title":"The Fast Forward MBA in Project Management","author":"E Verzuh","year":"2015","unstructured":"Verzuh, E.: The Fast Forward MBA in Project Management, 5th edn. Wiley, New York (2015)","edition":"5"},{"key":"10_CR13","unstructured":"Wojnar, K.: Comparison between ISO 21500 and PMBOK\u00ae Guide, 5th edn. Theoretical background and practical usage of ISO 21500 in IT projects (2013)"},{"key":"10_CR14","unstructured":"Khan, N.: Internship Report on Revenue Assurance and Fraud Management. ID: 10104009. BRAC Business School (2014)"},{"key":"10_CR15","unstructured":"Mattison, R.: The Revenue Assurance Standards. Release 2009, GRAPA. XiT Press, Oakwood Hills, Illinois (2009)"},{"key":"10_CR16","unstructured":"GRAPA: The Global Revenue Assurance Professional Association (GRAPA) Professionalizing the Information, Communications and Technology Industry (2016)"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Bansal, R., Gaur, N., Singh, S. N.: Outlier detection: applications and techniques in data mining. In: 6th International Conference\u2014Cloud System and Big Data Engineering (Confluence), Noida, pp. 373\u2013377 (2016). \nhttps:\/\/doi.org\/10.1109\/confluence.2016.7508146","DOI":"10.1109\/confluence.2016.7508146"},{"key":"10_CR18","unstructured":"CMMI Product Team: CMMI for Development, Version 1.3. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Report CMU\/SEI-2010-TR-033 (2010). \nhttp:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?AssetID=9661"},{"key":"10_CR19","unstructured":"ISO: ISO 21500:2012 Guidance on Project Management. International Organization for Standardization (2012)"},{"key":"10_CR20","unstructured":"Castro, G.F.: Modelo para el aseguramiento de ingresos en organizaciones orientadas a proyectos basado en miner\u00eda de datos an\u00f3malos. Tesis de Doctorado en Ciencias T\u00e9cnicas, Universidad de las Ciencias Inform\u00e1ticas, La Habana, Cuba (2017)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","volume-title":"Data Warehousing and Knowledge Discovery","author":"S Hawkins","year":"2002","unstructured":"Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 170\u2013180. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-46145-0_17"},{"key":"10_CR22","first-page":"296","volume":"14","author":"EN Sathishkumar","year":"2015","unstructured":"Sathishkumar, E.N., Thangavel, K.: A novel approach for outlier detection using rough entropy. WSEAS Trans. Comput. 14, 296\u2013306 (2015)","journal-title":"WSEAS Trans. Comput."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1016\/j.procs.2015.05.095","volume":"52","author":"AM Souza","year":"2015","unstructured":"Souza, A.M., Amazonas, J.R.: An outlier detect algorithm using big data processing and Internet of Things architecture. Procedia Comput. Sci. 52, 1010\u20131015 (2015). \nhttps:\/\/doi.org\/10.1016\/j.procs.2015.05.095","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.ijproman.2015.02.006","volume":"34","author":"J Whyte","year":"2016","unstructured":"Whyte, J., Stasis, A., Lindkvist, C.: Managing change in the delivery of complex projects: configuration management, asset information and \u2018big data\u2019. Int. J. Proj. Manag. 34(2), 339\u2013351 (2016). \nhttps:\/\/doi.org\/10.1016\/j.ijproman.2015.02.006","journal-title":"Int. J. Proj. Manag."},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/175247.175255","volume":"37","author":"LA Zadeh","year":"1994","unstructured":"Zadeh, L.A.: Fuzzy logic, neural networks and soft computing. Commun. ACM 37(3), 77\u201384 (1994). \nhttps:\/\/doi.org\/10.1145\/175247.175255","journal-title":"Commun. ACM"},{"issue":"6","key":"10_CR26","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/91.890332","volume":"8","author":"F Herrera","year":"2000","unstructured":"Herrera, F., Martinez, L.: A 2-tuple fuzzy linguistic representation model for computing with words. IEEE Trans. Fuzzy Syst. 8(6), 746\u2013752 (2000). \nhttps:\/\/doi.org\/10.1109\/91.890332","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10_CR27","unstructured":"Kriegel, H.-P., Schubert, M. et al.: Angle-based outlier detection in highdimensional data. In: KDD 2008, Las Vegas, Nevada (2008). 978-1-60558-193-4\/08\/08"},{"issue":"3","key":"10_CR28","doi-asserted-by":"publisher","first-page":"e0152333","DOI":"10.1371\/journal.pone.0152333","volume":"11","author":"P Tellaroli","year":"2016","unstructured":"Tellaroli, P., et al.: Cross-clustering: a partial clustering algorithm with automatic estimation of the number of clusters. PLoS ONE 11(3), e0152333 (2016). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0152333","journal-title":"PLoS ONE"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1137\/1.9781611972832.21","volume-title":"Proceedings of the 2013 SIAM International Conference on Data Mining","author":"Sanjay Chawla","year":"2013","unstructured":"Chawla, S., Gionis, A.: k-means: a unified approach to clustering and outlier detection. In: Proceedings of the 2013 SIAM International Conference on Data Mining, Texas, pp. 189\u2013197 (2013). \nhttps:\/\/doi.org\/10.1137\/1.9781611972832.21"},{"key":"10_CR30","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-39165-1_17","volume-title":"Aggregation Functions in Theory and in Practise","author":"JM Merig\u00f3","year":"2013","unstructured":"Merig\u00f3, J.M., Yager, R.R.: Norm aggregations and OWA operators. In: Bustince, H., Fernandez, J., Mesiar, R., Calvo, T. (eds.) Aggregation Functions in Theory and in Practise. AISC, vol. 228, pp. 141\u2013151. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39165-1_17"},{"key":"10_CR31","unstructured":"Wilcoxon, F., Katti, S.K., Wilcox, R.A.: Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Institute of Mathematical Statistics, Selected Tables in Mathematical Statistics, vol. 1, pp. 171\u2013259 (1973)"},{"key":"10_CR32","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-319-48024-4_18","volume-title":"Technologies and Innovation","author":"GF Castro","year":"2016","unstructured":"Castro, G.F., et al.: Platform for project evaluation based on soft-computing techniques. In: Valencia-Garc\u00eda, R., Lagos-Ortiz, K., Alcaraz-M\u00e1rmol, G., del Cioppo, J., Vera-Lucio, N. (eds.) CITI 2016. CCIS, vol. 658, pp. 226\u2013240. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-48024-4_18"},{"key":"10_CR33","unstructured":"Pi\u00f1ero, P., Lugo, J.A., Men\u00e9ndez, J., et al.: Soluci\u00f3n de software Xedro-GESPRO v13.05. Centro Nacional de Registro de Derecho de Autor de Cuba, No Registro CENDA: 2336-06-2015, La Habana, Cuba. DCN-002\/2016 (2015)"},{"key":"10_CR34","unstructured":"QuitusServices, Portal corporativo compa\u00f1\u00eda de servicios inform\u00e1ticos. Guayaquil-Ecuador (2018). \nhttps:\/\/businessredmine.herokuapp.com\/portal\/quitusservices"}],"container-title":["Communications in Computer and Information Science","Technologies and Innovation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00940-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T10:13:28Z","timestamp":1538388808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00940-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009397","9783030009403"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00940-3_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CITI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Technologies and Innovation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guayaquil","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ecuador","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"citi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/congresociti.uagraria.edu.ec\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}