{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:35:31Z","timestamp":1751376931457,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T00:00:00Z","timestamp":1687305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T00:00:00Z","timestamp":1687305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,21]]},"DOI":"10.1109\/cbi58679.2023.10187481","type":"proceedings-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T13:22:17Z","timestamp":1690291337000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Relationships between IT Project Portfolio risk and IT Project Portfolio health"],"prefix":"10.1109","author":[{"given":"Wissenburg","family":"R.","sequence":"first","affiliation":[{"name":"Open Universit,Information Science Department,Heerlen,the Netherlands"}]},{"given":"Kusters","family":"R.","sequence":"additional","affiliation":[{"name":"Open Universit,Information Science Department,Heerlen,the Netherlands"}]},{"given":"Martin","family":"H.","sequence":"additional","affiliation":[{"name":"Open Universit,Information Science Department,Heerlen,the Netherlands"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12821\/ijispm060403"},{"journal-title":"Case study research and applications Design and methods","year":"2018","author":"yin","key":"ref35"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su10051609"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8"},{"key":"ref15","first-page":"41","article-title":"Best Practices in IT Portfolio Management","volume":"45","author":"jeffery","year":"2004","journal-title":"MIT Sloan Management Review"},{"journal-title":"General guidelines for conducting research interviews","year":"2006","author":"mc namara","key":"ref37"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.12821\/ijispm080304"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"journal-title":"Handboek ontwerpgericht wetenschappelijk onderzoek","year":"2011","author":"van aken","key":"ref30"},{"journal-title":"Leveraging the New Infrastructure - How Market Leaders Capitalize on Information Technology","year":"1998","author":"weill","key":"ref11"},{"key":"ref33","first-page":"108","article-title":"Applying Design Science Research For Enterprise Architecture Business Value Assessments in Design Science Research","author":"meyer","year":"2012","journal-title":"Information Systems (Ed ) Advances in Theory and Practice"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/su9101798"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"ref2","first-page":"1","article-title":"The influence of risk management on the project portfolio success-proposal of a risk intensit matrix","volume":"28","author":"zanfelicce","year":"2021","journal-title":"Gest&#x00E3;o & Produ&#x00E7;&#x00E3;o"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/875697280603700105"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2012.11.012"},{"key":"ref39","first-page":"39","article-title":"Thematic Analysis: A critical review of its process and evaluation","volume":"1","author":"alholjailan","year":"2012","journal-title":"West East Journal of Social Sciences"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2005.02.003"},{"journal-title":"Trans","year":"2011","author":"saunders","key":"ref38"},{"key":"ref19","first-page":"1","article-title":"Risk in information technology project portfolio management","volume":"8","author":"drake","year":"2006","journal-title":"Journal of Information Technology Theory and Application"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CBI54897.2022.00022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/pmj.20072"},{"journal-title":"Known and Unknown A Memoir","year":"2011","author":"rumsfeld","key":"ref46"},{"journal-title":"PMI A Guide to the Project Management Body of Knowledge","year":"2017","key":"ref23"},{"journal-title":"Risk Uncertainty and Profit","year":"1921","author":"knight","key":"ref45"},{"journal-title":"Governance Arrangements for IT Project Portfolio Management Qualityative Insights and a Quantitative Modeling Approach","year":"2014","author":"frey","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2010.06.007"},{"journal-title":"IT Project Portfolio Risks development and validation of a reference model","year":"0","author":"wissenburg","key":"ref20"},{"journal-title":"Social Science Research Principles Methods and Practices","year":"2012","author":"bhattacherjee","key":"ref42"},{"key":"ref41","first-page":"1281","article-title":"Designing a case study protocol for application in IS research","author":"maimbo","year":"0","journal-title":"Proceedings of the Ninth Pacific Asia Conference on Information Systems (PACIS 2005)"},{"journal-title":"Application strategies for risk analysis","year":"1990","author":"charette","key":"ref22"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5465\/AMJ.2007.24160888"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/026839629601100407"},{"key":"ref43","first-page":"94","article-title":"The experience trap","volume":"86","author":"sengupta","year":"2008","journal-title":"Harvard Business Review"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0472"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/249491"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00414"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0737-6782(99)00005-3"},{"journal-title":"CHAOS Report Decision Latenc Theor It Is All About the Interval","year":"2018","author":"johnson","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(02)00097-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.096"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/radm.12423"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2020.01.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/IJMPB-04-2020-0110"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF02766777"}],"event":{"name":"2023 IEEE 25th Conference on Business Informatics (CBI)","start":{"date-parts":[[2023,6,21]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 IEEE 25th Conference on Business Informatics (CBI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10187193\/10187203\/10187481.pdf?arnumber=10187481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T16:55:17Z","timestamp":1693241717000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10187481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,21]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/cbi58679.2023.10187481","relation":{},"subject":[],"published":{"date-parts":[[2023,6,21]]}}}