{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:41:32Z","timestamp":1742960492029,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789814585170"},{"type":"electronic","value":"9789814585187"}],"license":[{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-981-4585-18-7_50","type":"book-chapter","created":{"date-parts":[[2013,12,14]],"date-time":"2013-12-14T06:28:37Z","timestamp":1387002517000},"page":"445-452","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Effective Risk Management of Software Projects (ERM): An Exploratory Literature Review of IEEE and Scopus Online Databases"],"prefix":"10.1007","author":[{"given":"Uzair Iqbal","family":"Janjua","sequence":"first","affiliation":[]},{"given":"Alan","family":"Oxley","sequence":"additional","affiliation":[]},{"given":"Jafreezal Bin","family":"Jaffer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,15]]},"reference":[{"key":"50_CR1","unstructured":"Standish Group International.: Chaos Summary 2009: 10 Laws of CHAOS. Technical Report (2009)"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"John Dhlamini, Isaac Nhamu, and Admire Kachepa.: Intelligent Risk management Tools for Software development. SACLA, Mpekweni Beach Resort, South Africa (2009)","DOI":"10.1145\/1562741.1562745"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Shikha, Dr. R. Selvarani.: An Efficient Method of Risk Assessment using Intelligent Agents. Second International Conference on Advanced Computing & Communication Technologies (2012)","DOI":"10.1109\/ACCT.2012.19"},{"key":"50_CR4","unstructured":"Robert Stern, Jos\u00e9 Carlos Arias.: Review of Risk Management Methods. Business Intelligence Journal - Vol.4 No.1 (2011)"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Mira Kajko-Mattsson, Jan Lundholm, Jonas Norrby.: Industrial Opinion on the Effectiveness of Risk management Methods. 33rd Annual IEEE International Computer Software and Applications Conference (2009)","DOI":"10.1109\/COMPSAC.2009.96"},{"key":"50_CR6","unstructured":"George Holt.: Software Risk management From a System Perspective. Crosstalk, The Journal of Defense Software Engineering (2005)"},{"key":"50_CR7","unstructured":"Sven Roeleven, Michiel Jorna.: How to implement effective Enterprise Risk Management Building a sustainable Governance Risk & Compliance solution. Business White Paper, June (2011)"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Daniel D. Galorath, Michael W. Evans.: Software Sizing, Estimation, and Risk Management. Auerbach Publications (2006)","DOI":"10.1201\/9781420013122"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Stephen. Ward.: Requirements for an Effective Project Risk Management Process. Project Management Journal, Vol. 30, No. 3, pp. 37-43 (1999)","DOI":"10.1177\/875697289903000306"},{"key":"50_CR10","doi-asserted-by":"publisher","unstructured":"Y.H. Kwak J. Stoddard.: Project risk management: lessons learned from software development environment. doi:10.1016\/S0166-4972(03)00033-6, Elsevier Science (2003)","DOI":"10.1016\/S0166-4972(03)00033-6"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-4585-18-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T16:23:03Z","timestamp":1674145383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-4585-18-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,15]]},"ISBN":["9789814585170","9789814585187"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-4585-18-7_50","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,12,15]]},"assertion":[{"value":"15 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}