{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:59:42Z","timestamp":1648997982961},"reference-count":25,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1016\/s0065-2458(05)66004-4","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T05:56:21Z","timestamp":1295416581000},"page":"143-171","source":"Crossref","is-referenced-by-count":0,"title":["Mechanics of Managing Software Risk"],"prefix":"10.1016","author":[{"given":"William G.","family":"Bail","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/S0065-2458(05)66004-4_bb0010","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.59","article-title":"A spiral model for software development and enhancement","volume":"21","author":"Boehm","year":"1988","journal-title":"IEEE Computer"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0015","series-title":"IEEE Software","article-title":"Software risk management: Principles and practices","author":"Boehm","year":"1991"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0020","series-title":"IEEE Software","article-title":"Software risk management","author":"Boehm","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0025","series-title":"Risk management and systems engineering discipline\u201d","author":"Brekka","year":"1996"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0030","series-title":"Modeling and managing risk early in software development\u201d","author":"Briand","year":"1993"},{"issue":"2","key":"10.1016\/S0065-2458(05)66004-4_bb0035","doi-asserted-by":"crossref","DOI":"10.1109\/21.281419","article-title":"Assessment and management of software technical risk\u201d","volume":"24","author":"Chittister","year":"1994","journal-title":"IEEE Trans. Systems, Man, Cybernetics"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0040","series-title":"IEEE Software","article-title":"\u201cRisk management during requirements","author":"DeMarco","year":"2003"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0045","series-title":"Risk management guide for DoD acquisition\u201d","article-title":"Department of Defense, Defense Acquisition University","year":"2001"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0050","unstructured":"Doernemann H., \u201cTool-based risk management made practical\u201d, in: Proceedings of the IEEE Joint International Conference on Requirements Engineering (RE\u201902)"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0055","series-title":"IEEE Software","article-title":"Risk management for software projects","author":"Fairley","year":"1994"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0060","unstructured":"Feather M.S., \u201cTowards a unified approach to the representation of, and reasoning with probabilistic risk information about software and its system interface\u201d, in: Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE\u201904)"},{"key":"10.1016\/S0065-2458(05)66004-4_rf0055","series-title":"Software metrics and risk\u201d","author":"Fenton","year":"1999"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0070","series-title":"IEEE Computer","article-title":"Risk management: Moving beyond process","author":"Gemmer","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0075","unstructured":"IEEE Std. 1540-2001, IEEE Standard for Software Life Cycle Processes\u2014Risk Management"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0080","series-title":"Assessment and Control of Software Risk","author":"Jones","year":"1994"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0085","series-title":"IEEE Software","article-title":"Estimates, uncertainty, and risk","author":"Kitchenham","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0090","series-title":"IEEE Software","article-title":"\u201cRisk management is project management for adults","author":"Lister","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0095","series-title":"IEEE Software","article-title":"How experienced project managers assess risk","author":"Moynihan","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0100","unstructured":"NASA Software Policy, Directive NPD 2820.1C."},{"key":"10.1016\/S0065-2458(05)66004-4_bb0105","series-title":"Software Engineering Institute, CMU\/SEI-93-TR-25","article-title":"Key practices of the capability maturity model, version 1.1","author":"Paulk","year":"1993"},{"issue":"2","key":"10.1016\/S0065-2458(05)66004-4_bb0110","doi-asserted-by":"crossref","DOI":"10.1109\/32.841112","article-title":"Components of software development risk: How to address them? A project manager survey\u201d","volume":"26","author":"Ropponen","year":"2000","journal-title":"IEEE Trans. Software Engrg"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0115","doi-asserted-by":"crossref","unstructured":"Roy G.G., \u201cA risk management framework for software engineering practice\u201d, in: IEEE Proceedings of the 2004 Australian Software Engineering Conference (ASWEC\u201904).","DOI":"10.1109\/ASWEC.2004.1290458"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0120","series-title":"The three dimensions of software risk: Technical, organizational, and environmental\u201d","author":"Sherer","year":"1995"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0125","series-title":"IEEE Software","article-title":"Putting risk management into practice","author":"Williams","year":"1997"},{"key":"10.1016\/S0065-2458(05)66004-4_bb0130","series-title":"A quantitative methodology for software risk control\u201d","author":"Yau","year":"1994"}],"container-title":["Advances in Computers","Quality Software Development"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245805660044?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245805660044?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T23:43:08Z","timestamp":1559950988000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245805660044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(05)66004-4","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2006]]}}}