{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:32:23Z","timestamp":1740115943749,"version":"3.37.3"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010272","name":"Zarqa University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010272","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10877229","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["A Proposed Approach for Risk Planning and Management"],"prefix":"10.1109","author":[{"given":"Mohammed N.","family":"Al Refai","sequence":"first","affiliation":[{"name":"Zarqa University,Software Engineering Dep.,Zarqa,Jordan"}]},{"given":"Yazan","family":"Al-Smadi","sequence":"additional","affiliation":[{"name":"Zarqa University,Software Engineering Dep.,Zarqa,Jordan"}]},{"given":"Adai","family":"Al-Momani","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Zeyad M.","family":"Jamhawi","sequence":"additional","affiliation":[{"name":"Applied Science Private University,Department of Computer Science,Amman,Jordan"}]},{"given":"Ahmed Ali","family":"Otoom","sequence":"additional","affiliation":[{"name":"Applied Science Private University,Department of Cyber Security,Amman,Jordan"}]},{"given":"Issa","family":"Atoum","sequence":"additional","affiliation":[{"name":"Philadelphia University,Faculty of Information Technology,Software Engineering Department,Jordan"}]},{"given":"Ahid","family":"Yaseen","sequence":"additional","affiliation":[{"name":"Zarqa University,Software Engineering Dep.,Zarqa,Jordan"}]},{"given":"Jafar","family":"Ababneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Mohammad","family":"Kanan","sequence":"additional","affiliation":[{"name":"University of Business and Technelogy,Dep. of Industry Engineering,Jeddah,Saudi Arabia,21432"}]}],"member":"263","reference":[{"issue":"2020","key":"ref1","first-page":"182","article-title":"Software Project Risks Management: Applying Extended Fuzzy Cognitive Maps with Reinforcement Learning","volume":"12","author":"Tlili","year":"2020","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003116882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2011.45032"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805862"},{"volume-title":"Contingency planning as a necessity, Paper presented at Project Management Institute Annual Seminars & Symposium","author":"Heimann","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/17.62322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/875697280103200102"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2018.8747045"},{"key":"ref9","article-title":"Hybrid user acceptance test procedure to improve the software quality","author":"Hemamalini","year":"2022","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/itor.12401"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1993.11518006"},{"issue":"2","key":"ref12","article-title":"An Integrative Contingency Model of Software Project Risk Management","volume":"10","author":"Henri","year":"2001","journal-title":"Journal of Management Information Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2017.01.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21833\/ijaas.2017.06.001"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2024,12,10]]},"location":"Zarqa, Jordan","end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10877229.pdf?arnumber=10877229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:04Z","timestamp":1740081484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10877229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10877229","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}