{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T19:29:25Z","timestamp":1777922965880,"version":"3.51.4"},"reference-count":65,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1994,5,1]],"date-time":"1994-05-01T00:00:00Z","timestamp":767750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Operations Research"],"published-print":{"date-parts":[[1994,5]]},"DOI":"10.1016\/0305-0548(94)90101-5","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T12:15:45Z","timestamp":1056975345000},"page":"521-533","source":"Crossref","is-referenced-by-count":14,"title":["Integration of technical, cost, and schedule risks in project management"],"prefix":"10.1016","volume":"21","author":[{"given":"Jeffrey L.","family":"Riggs","sequence":"first","affiliation":[]},{"given":"Sheila B.","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Robert P.","family":"Trueblood","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0305-0548(94)90101-5_BIB1","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/21.35339","article-title":"Reasoning with imprecise knowledge to enhance intelligent decision support","volume":"19","author":"Basu","year":"1989","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/0167-6687(87)90007-2","article-title":"A collective study","volume":"6","author":"Beekman","year":"1987","journal-title":"Insurance Math. Econ. (Netherlands)"},{"key":"10.1016\/0305-0548(94)90101-5_BIB3","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1111\/j.1540-5915.1990.tb00321.x","article-title":"Some extensions of domain criteria in decision making under uncertainty","volume":"21","author":"Eiselt","year":"1990","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB4","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1287\/mnsc.32.9.1065","article-title":"Risk preferences for gains and losses in multiple objective decision making","volume":"32","author":"Fischer","year":"1986","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB5","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/21.52546","article-title":"Using predicate logic to integrate qualitative reasoning and classical decision theory","volume":"30","author":"Fox","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB6","series-title":"Proc. of the INTERNET International Expert Seminar, PMI\/INTERNET Joint Symposium","first-page":"207","article-title":"Workshop C: software support in risk management","author":"Franke","year":"1989"},{"key":"10.1016\/0305-0548(94)90101-5_BIB7","series-title":"Intelligent Decision Systems","author":"Holtzman","year":"1989"},{"key":"10.1016\/0305-0548(94)90101-5_BIB8","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1111\/j.1540-5915.1990.tb01256.x","article-title":"A note on consistency in utility assessment","volume":"21","author":"Hughes","year":"1990","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB9","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1287\/mnsc.29.5.595","article-title":"Three-point approximations for continuous random variables","volume":"29","author":"Keefer","year":"1983","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB10","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1111\/j.1540-5915.1988.tb00309.x","article-title":"An experimental evaluation of articulation of preferences in multiple criterion decision-making (MCDM) methods","volume":"19","author":"Narasimhan","year":"1988","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB11","series-title":"Proceedings of the INTERNET International Expert Seminar, PMI\/INTERNET Joint Symposium","year":"1989"},{"key":"10.1016\/0305-0548(94)90101-5_BIB12","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/21.52542","article-title":"Description and prescriptive models of decision making: implications for the development of decision aids","volume":"20","author":"Weber","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB13","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/21.52547","article-title":"A survey on the integration of decision analysis and expert systems for decision support","volume":"20","author":"White","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB14","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0043158","article-title":"The magical number seven, plus or minus two: some limits on our capacity for processing information","volume":"63","author":"Miller","year":"1957","journal-title":"Psychol. Rev."},{"key":"10.1016\/0305-0548(94)90101-5_BIB15","first-page":"56","article-title":"Influence diagramming for analysis of project risks","volume":"15","author":"Ashley","year":"1984","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB16","first-page":"53","article-title":"A new method for risk analysis","volume":"20","author":"Cozzolino","year":"1979","journal-title":"Sloan Mgmt Rev."},{"key":"10.1016\/0305-0548(94)90101-5_BIB17","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1111\/j.1540-5915.1974.tb00630.x","article-title":"Methods for quantifying subjective probabilities and multi-attribute utilities","volume":"5","author":"Huber","year":"1974","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB18","series-title":"Proc. of the INTERNET International Expert Seminar, PMI\/INTERNET Joint Sumposium","first-page":"55","article-title":"The management of rish behavior of construction organizations","author":"McKim","year":"1989"},{"key":"10.1016\/0305-0548(94)90101-5_BIB19","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1111\/j.1540-5915.1991.tb00352.x","article-title":"Use and abuse of weights in multiple objective decision support models","volume":"22","author":"Schenkerman","year":"1991","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB20","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1109\/21.44024","article-title":"Representational effects on the solving of an unstructured decision problem","volume":"19","author":"Smith","year":"1989","journal-title":"IEEE Trans. Systems Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB21","first-page":"90","article-title":"Handling risk in defense contracting","volume":"47","author":"Anderson","year":"1969","journal-title":"Harvard Bus. Rev."},{"key":"10.1016\/0305-0548(94)90101-5_BIB22","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1287\/inte.17.2.91","article-title":"Managing business risk","volume":"17","author":"Boodman","year":"1987","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB23","first-page":"14","article-title":"Programme planning with logic trees","volume":"6","author":"Bott","year":"1989","journal-title":"Int. J. Quality Reliability Mgmt (UK)"},{"key":"10.1016\/0305-0548(94)90101-5_BIB24","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TEM.1979.6447349","article-title":"Large engineering project risk analysis","volume":"EM-26","author":"Chapman","year":"1979","journal-title":"IEEE Trans. Engng Mgmt"},{"key":"10.1016\/0305-0548(94)90101-5_BIB25","series-title":"Risk Analysis for Large projects\u2014Models, Methods and Cases","author":"Cooper","year":"1987"},{"key":"10.1016\/0305-0548(94)90101-5_BIB26","first-page":"40","article-title":"Risk management by expert systems","volume":"20","author":"Kangari","year":"1989","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB27","first-page":"13","article-title":"Tradeoffs on projects: they may not be what you think","volume":"21","author":"Kloppenborg","year":"1990","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB28","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/smj.4250100205","article-title":"Selecting tactics to implenent strategic plans","volume":"10","author":"Nutt","year":"1989","journal-title":"Strategic Mgmt J. (UK)"},{"key":"10.1016\/0305-0548(94)90101-5_BIB29","first-page":"58","article-title":"Estimating project costs with regression and risk analysis","volume":"16","author":"Pentico","year":"1985","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB30","series-title":"Risk Management Plan for the Phase I Army Elements of the Strategic Defense System","year":"1990"},{"key":"10.1016\/0305-0548(94)90101-5_BIB31","volume":"Vol. 1","year":"1991","journal-title":"SDS DEMVAL Program Plan"},{"key":"10.1016\/0305-0548(94)90101-5_BIB32","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/21.52564","article-title":"Another look at design theory","volume":"20","author":"Spillers","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB33","series-title":"Technical Risk Assessment","year":"1986"},{"key":"10.1016\/0305-0548(94)90101-5_BIB34","first-page":"20","article-title":"Risk management","volume":"17","author":"Wideman","year":"1986","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB35","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/21.23099","article-title":"Shafer-Dempster and Bayesian reasoning: a response to Shafer-Dempster and Bayesian reasoning with applications to multisensor target identification systems","volume":"18","author":"Buede","year":"1988","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB36","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1287\/mnsc.24.15.1557","article-title":"Forecasting political risk","volume":"24","author":"Bunn","year":"1978","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB37","first-page":"67","article-title":"How multi-nationals analyze political risk","volume":"56","author":"Rummel","year":"1978","journal-title":"Harvard Bus. Rev."},{"key":"10.1016\/0305-0548(94)90101-5_BIB38","first-page":"95","article-title":"Risk analysis in capital investment","volume":"42","author":"Hertz","year":"1964","journal-title":"Harvard Bus. Rev."},{"key":"10.1016\/0305-0548(94)90101-5_BIB39","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1287\/mnsc.32.10.1259","article-title":"An analysis of risk and return in the defense market: its impact on weapon system competition","volume":"32","author":"Greer","year":"1986","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB40","first-page":"7","article-title":"Washington watchword","volume":"70","author":"Houston","year":"1991","journal-title":"Welding J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB41","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1287\/inte.16.2.75","article-title":"Decision analysis and its application in the choice between two wildcat oil ventures","volume":"16","author":"Hosseini","year":"1986","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB42","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1111\/j.1539-6924.1989.tb01222.x","article-title":"Applying decision analysis to determine the effect of smoke detector laws on fire loss in the United States","volume":"9","author":"Jenson","year":"1989","journal-title":"Risk Anal."},{"key":"10.1016\/0305-0548(94)90101-5_BIB43","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1111\/j.1540-5915.1990.tb01688.x","article-title":"Multiple attribute decision making with inexact value-function assessment","volume":"21","author":"Badinelli","year":"1990","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB44","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1287\/inte.16.2.52","article-title":"Structure value attributes","volume":"16","author":"Buede","year":"1986","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB45","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1111\/j.1540-5915.1991.tb01263.x","article-title":"Pearson-Tukey three-point approximations versus Monte Carlo simulation","volume":"22","author":"Pfeifer","year":"1991","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB46","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1111\/j.1540-5915.1978.tb01365.x","article-title":"Elicitation of subjective probabilities in the context of decision-making","volume":"9","author":"Sarin","year":"1978","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB47","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/21.52543","article-title":"Two perspectives on consensus for (Bayesian) inference and decisions","volume":"20","author":"Seidenfeld","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB48","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1111\/j.1539-6924.1987.tb00980.x","article-title":"Risk\u2014its priority and probability: the analytic hierarchy process","volume":"7","author":"Saaty","year":"1987","journal-title":"Risk Anal."},{"key":"10.1016\/0305-0548(94)90101-5_BIB49","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1111\/j.1540-5915.1989.tb01887.x","article-title":"Decision making, scaling, and number crunching","volume":"20","author":"Saaty","year":"1989","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB50","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0270-0255(87)90483-0","article-title":"International investment risk analysis: extensions for multi-national corporation capital budgeting models","volume":"9","author":"Jensen","year":"1989","journal-title":"Math., Modeling"},{"key":"10.1016\/0305-0548(94)90101-5_BIB51","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0270-0255(87)90562-8","article-title":"Hierarchical determination of risk forced divestment to foreign owned enterprises in LDC","volume":"8","author":"Hachadorian","year":"1987","journal-title":"Mathl. Modeling"},{"key":"10.1016\/0305-0548(94)90101-5_BIB52","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0270-0255(87)90475-1","article-title":"Some applications of the analytic hierarchy process","volume":"9","author":"Vachnadze","year":"1987","journal-title":"Mathl. Modeling"},{"key":"10.1016\/0305-0548(94)90101-5_BIB53","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1287\/mnsc.33.6.807","article-title":"Does rolling back decision trees really require the independence axiom?","volume":"33","author":"Hazen","year":"1987","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB54","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1287\/inte.16.4.96","article-title":"The analytic hierarchy process\u2014a survey of the method and its applications","volume":"16","author":"Zahedi","year":"1986","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB55","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1111\/j.1540-5915.1989.tb01568.x","article-title":"A consistency test for AHP decision makers","volume":"20","author":"Lane","year":"1989","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB56","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1111\/j.1540-5915.1990.tb00343.x","article-title":"AHP is intended for more than expected value calculations","volume":"21","author":"Forman","year":"1990","journal-title":"Decis. Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB57","doi-asserted-by":"crossref","DOI":"10.1287\/inte.19.2.20","article-title":"Restricting patients' choices of physicians: a decision analytic evaluation of costs","volume":"19","author":"Alemi","year":"1989","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB58","series-title":"TIMS\/ORSA Conf.","first-page":"14","article-title":"Risk analysis in Du Pont","author":"Krumim","year":"1991"},{"key":"10.1016\/0305-0548(94)90101-5_BIB59","series-title":"TIMS\/ORSA Conf.","first-page":"14","article-title":"Implementing risk analysis at General Motors","author":"Kusnic","year":"1991"},{"key":"10.1016\/0305-0548(94)90101-5_BIB60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/inte.17.2.1","article-title":"Postal automation (Zip + 4) technology: a decision analysis","volume":"17","author":"Ulvila","year":"1987","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB61","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1287\/inte.17.2.27","article-title":"The application of decision analysis to clinical medicine","volume":"17","author":"Clarke","year":"1987","journal-title":"Interfaces"},{"key":"10.1016\/0305-0548(94)90101-5_BIB62","first-page":"43","article-title":"The project manager: risk taker and contingency planner","volume":"21","author":"Hamburger","year":"1990","journal-title":"Project Mgmt J."},{"key":"10.1016\/0305-0548(94)90101-5_BIB63","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1287\/mnsc.32.3.382","article-title":"Rolling back decision trees requires the independence axiom!","volume":"32","author":"LaValle","year":"1986","journal-title":"Mgmt Sci."},{"key":"10.1016\/0305-0548(94)90101-5_BIB64","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/21.3466","article-title":"A decision support system and a heuristic interactive approach for solving discrete multiple criteria problems","volume":"18","author":"Malakooti","year":"1988","journal-title":"IEEE Trans. Systems Man Cybernetics"},{"key":"10.1016\/0305-0548(94)90101-5_BIB65","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/21.52545","article-title":"Decision trees and decision making","volume":"20","author":"Quinlan","year":"1990","journal-title":"IEEE Trans. Systems Man Cybernetics"}],"container-title":["Computers &amp; Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0305054894901015?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0305054894901015?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T13:26:54Z","timestamp":1552915614000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0305054894901015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,5]]},"references-count":65,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1994,5]]}},"alternative-id":["0305054894901015"],"URL":"https:\/\/doi.org\/10.1016\/0305-0548(94)90101-5","relation":{},"ISSN":["0305-0548"],"issn-type":[{"value":"0305-0548","type":"print"}],"subject":[],"published":{"date-parts":[[1994,5]]}}}