{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:44:03Z","timestamp":1743140643099,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319952031"},{"type":"electronic","value":"9783319952048"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95204-8_30","type":"book-chapter","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T17:31:42Z","timestamp":1531243902000},"page":"353-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of Risk Interdependencies on Information System Development Projects"],"prefix":"10.1007","author":[{"given":"Wenli","family":"Hwang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Houn-Gee","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/07421222.1993.11518006","volume":"10","author":"H Barki","year":"1993","unstructured":"Barki, H., Rivard, S., Talbot, J.: Toward an assessment of software development risk. J. Manag. Inf. Syst. 10(2), 203\u2013225 (1993)","journal-title":"J. Manag. Inf. Syst."},{"issue":"5","key":"30_CR2","first-page":"142","volume":"59","author":"FW McFarlan","year":"1981","unstructured":"McFarlan, F.W.: Portfolio approach to information systems. Harv. Bus. Rev. 59(5), 142\u2013150 (1981)","journal-title":"Harv. Bus. Rev."},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.00117315.2004.02059.x","volume":"35","author":"L Wallace","year":"2004","unstructured":"Wallace, L., Keil, M., Rai, A.: How software project risk affects project performance: an investigation of the dimensions of risk and an exploratory model. Decis. Sci. 35(2), 289\u2013322 (2004)","journal-title":"Decis. Sci."},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.is.2011.10.001","volume":"37","author":"D Aloini","year":"2012","unstructured":"Aloini, D., Dulmin, R., Mininno, V.: Risk assessment in ERP projects. Inf. Syst. 37, 183\u2013199 (2012)","journal-title":"Inf. Syst."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"3832","DOI":"10.1016\/j.eswa.2011.09.092","volume":"39","author":"ZP Fan","year":"2012","unstructured":"Fan, Z.P., Suo, W.L., Feng, B.: Identifying risk factors of IT outsourcing using interdependent information: an extended DEMATEL method. Expert Syst. Appl. 39, 3832\u20133840 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"30_CR6","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.eswa.2006.02.004","volume":"32","author":"GH Tzeng","year":"2007","unstructured":"Tzeng, G.H., Chiang, C.H., Li, C.W.: Evaluating intertwined effects in e-learning programs: a novel hybrid MCDM model based on factor analysis and DEMATEL. Expert Syst. Appl. 32(4), 1028\u20131044 (2007)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"30_CR7","first-page":"877","volume":"43","author":"R Bolanos","year":"2005","unstructured":"Bolanos, R., Fontela, E., Nenclares, A., Pastor, P.: Using interpretive structural modeling in strategic decision-making groups. Manag. Sci. 43(6), 877\u2013895 (2005)","journal-title":"Manag. Sci."},{"key":"30_CR8","volume-title":"Societal Systems, Planning, Policy and Complexity","author":"JN Warfield","year":"1976","unstructured":"Warfield, J.N.: Societal Systems, Planning, Policy and Complexity. Wiley, New York (1976)"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"6262","DOI":"10.1016\/j.eswa.2010.11.092","volume":"38","author":"Y Lin","year":"2011","unstructured":"Lin, Y., Yang, Y., Kang, J., Yu, H.: Using DEMATEL method to explore the core competences and causal effect of the IC design service company: an empirical case study. Expert Syst. Appl. 38, 6262\u20136268 (2011)","journal-title":"Expert Syst. Appl."},{"key":"30_CR10","volume-title":"A Guide to the Project Management Body of Knowledge","author":"PMBOK Guide","year":"2008","unstructured":"PMBOK Guide: A Guide to the Project Management Body of Knowledge. Project Management Institute, Newtown Square (2008)"},{"issue":"1","key":"30_CR11","first-page":"23","volume":"20","author":"S Alter","year":"1978","unstructured":"Alter, S., Ginzberg, M.: Managing uncertainty in MIS implementation. Sloan Manag. Rev. 20(1), 23\u201331 (1978)","journal-title":"Sloan Manag. Rev."},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1147\/sj.211.0004","volume":"21","author":"GB Davis","year":"1982","unstructured":"Davis, G.B.: Strategies for information requirements determination. IBM Syst. J. 21(1), 4\u201330 (1982)","journal-title":"IBM Syst. J."},{"issue":"1","key":"30_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/52.62930","volume":"8","author":"BW Boehm","year":"1991","unstructured":"Boehm, B.W.: Software risk management: principles and practices. IEEE Softw. 8(1), 2\u201341 (1991)","journal-title":"IEEE Softw."},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.2001.11045662","volume":"17","author":"R Schmidt","year":"2001","unstructured":"Schmidt, R., Lyytinen, K., Keil, M., Cule, P.: Identifying software project risks: and international Delphi study. J. Manag. Inf. Syst. 17(4), 5\u201336 (2001)","journal-title":"J. Manag. Inf. Syst."},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1111\/j.1365-2575.2009.00333.x","volume":"20","author":"S Liu","year":"2010","unstructured":"Liu, S., Zhang, J., Keil, M., Chen, T.: Comparing senior executive and project manager perceptions of IT project risk: a Chinese Delphi study. Inf. Syst. J. 20, 319\u2013356 (2010)","journal-title":"Inf. Syst. J."},{"key":"30_CR16","first-page":"64","volume":"3","author":"H Tamura","year":"2005","unstructured":"Tamura, H., Akazawa, K.: Structural modeling and systems analysis of uneasy factors for realizing safe, secure and reliable society. J. Telecommun. Inf. Technol. 3, 64\u201372 (2005)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.eswa.2006.08.012","volume":"34","author":"CJ Lin","year":"2008","unstructured":"Lin, C.J., Wu, W.W.: A causal analytical method for group decision-making under fuzzy environment. Expert Syst. Appl. 34, 205\u2013213 (2008)","journal-title":"Expert Syst. Appl."}],"container-title":["Communications in Computer and Information Science","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95204-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T04:08:11Z","timestamp":1729397291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95204-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319952031","9783319952048"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95204-8_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}