{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T23:13:53Z","timestamp":1751411633054,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905069","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Causes of Human Errors in Early Risk assesment in Software Project Management"],"prefix":"10.1145","author":[{"given":"Seema","family":"Sharma","sequence":"first","affiliation":[{"name":"Manav Rachna International University, Faridabad"}]},{"given":"Babu","family":"Ram","sequence":"additional","affiliation":[{"name":"Manav Rachna International Univ., Faridabad"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953496"},{"key":"e_1_3_2_1_2_1","volume-title":"February","author":"Bean M.","year":"2007","unstructured":"Bean , M. ( 2007 ), Human Error at the Center of IT Security Breaches. Newhorizons.com , February 2008. Online at http:\/\/www.newhorizons.com\/elevate\/network%20defense%20contributed%20article.pdf. Accessed on 23 January 2014. Bean, M. (2007), Human Error at the Center of IT Security Breaches. Newhorizons.com, February 2008. Online at http:\/\/www.newhorizons.com\/elevate\/network%20defense%20contributed%20article.pdf. Accessed on 23 January 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/hfm.v15:4"},{"key":"e_1_3_2_1_5_1","volume-title":"Information Security Governance: Toward a Framework for Action","author":"Business Software Alliance","year":"2002","unstructured":"Business Software Alliance ( 2002 ). Information Security Governance: Toward a Framework for Action . http:\/\/www.bsa.org\/country\/Research%20and%20Statistics\/~\/media\/BD05BC8FF0F04CBD9D76460B4BED0E67.ashx. Accessed 20 February 2013. Business Software Alliance (2002). Information Security Governance: Toward a Framework for Action. http:\/\/www.bsa.org\/country\/Research%20and%20Statistics\/~\/media\/BD05BC8FF0F04CBD9D76460B4BED0E67.ashx. Accessed 20 February 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"Cybersecurity Today or Tomorrow: Pay Now or Pay Later","author":"Computer Science and Telecommunications Board-National Research Council","year":"2002","unstructured":"Computer Science and Telecommunications Board-National Research Council ( 2002 ). Cybersecurity Today or Tomorrow: Pay Now or Pay Later . National Academy Press , Washington, DC . Computer Science and Telecommunications Board-National Research Council (2002). Cybersecurity Today or Tomorrow: Pay Now or Pay Later. National Academy Press, Washington, DC."},{"key":"e_1_3_2_1_7_1","volume-title":"Global Financial Services Industry (GFSI) Security Survey. Online at http:\/\/www.deloitte.com\/assets\/Dcom-Global\/Local%20Assets\/Documents\/Financial%20Services","author":"Deloitte","year":"2008","unstructured":"Deloitte ( 2008 ). Global Financial Services Industry (GFSI) Security Survey. Online at http:\/\/www.deloitte.com\/assets\/Dcom-Global\/Local%20Assets\/Documents\/Financial%20Services . Accessed on 15 December 2012. Deloitte (2008). Global Financial Services Industry (GFSI) Security Survey. Online at http:\/\/www.deloitte.com\/assets\/Dcom-Global\/Local%20Assets\/Documents\/Financial%20Services. Accessed on 15 December 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Bloomberg","author":"Edwards C.","year":"2011","unstructured":"Edwards , C. , Kharif , O. , & Riley , M. ( 2011 ). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy . Bloomberg , June 2011. Online at http:\/\/www.bloomberg.com\/news\/ 2011-06-27\/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.html. Accessed on 13 March 2014. Edwards, C., Kharif, O., & Riley, M. (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy. Bloomberg, June 2011. Online at http:\/\/www.bloomberg.com\/news\/2011-06-27\/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.html. Accessed on 13 March 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"Studies in ethnomethodology","author":"Garfinkel H.","year":"1967","unstructured":"Garfinkel , H. , ( 1967 ), Studies in ethnomethodology , Eaglewood Cliffs NJ : Prentice Hall . Garfinkel, H., (1967), Studies in ethnomethodology, Eaglewood Cliffs NJ: Prentice Hall."},{"key":"e_1_3_2_1_10_1","first-page":"337","volume-title":"H. F. Tipton & M","author":"Hansche S. D.","year":"2002","unstructured":"Hansche , S. D. ( 2002 ). Making Security Awareness Happen . In H. F. Tipton & M . Krause (Eds.), Information Security Management Handbook ( 4th ed., Vol. 3 , pp. 337 -- 351 ). New York : Auerbach Publications . Hansche, S. D. (2002). Making Security Awareness Happen. In H. F. Tipton & M. Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 3, pp. 337--351). New York: Auerbach Publications."},{"key":"e_1_3_2_1_11_1","first-page":"353","volume-title":"H. F. Tipton & M","author":"Hare C.","year":"2002","unstructured":"Hare , C. ( 2002 ). Policy Development . In H. F. Tipton & M . Krause (Eds.), Information Security Management Handbook ( 4th ed., Vol. 3 , pp. 353 -- 383 ). New York : Auerbach Publications Hare, C. (2002). Policy Development. In H. F. Tipton & M. Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 3, pp. 353--383). New York: Auerbach Publications"},{"key":"e_1_3_2_1_12_1","volume-title":"The Ethical Hacker's Handbook","author":"Harper A.","year":"2011","unstructured":"Harper , A. , Harris , S. , Ness , J. , Eagle , C. , Lenkey , G. , & Williams , T. , ( 2011 ) Gray Hat Hacking , The Ethical Hacker's Handbook , Third Edition, McGraw Hill . Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G., & Williams, T., (2011) Gray Hat Hacking, The Ethical Hacker's Handbook, Third Edition, McGraw Hill."},{"key":"e_1_3_2_1_13_1","volume-title":"H. F. Tipton & M","author":"Howard P. D.","year":"2003","unstructured":"Howard , P. D. ( 2003 ). The Security Policy Life Cycle: Functions and Responsibilities . In H. F. Tipton & M . Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 4 , pp. 999). Boca Raton : CRC Press, LLC. Howard, P. D. (2003). The Security Policy Life Cycle: Functions and Responsibilities. In H. F. Tipton & M. Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 4, pp. 999). Boca Raton: CRC Press, LLC."},{"key":"e_1_3_2_1_14_1","volume-title":"Network Security","author":"Maiwald E.","year":"2003","unstructured":"Maiwald , E. ( 2003 ). Network Security , 2 nd Edition. McGraw Hill . Maiwald, E. (2003). Network Security, 2nd Edition. McGraw Hill.","edition":"2"},{"key":"e_1_3_2_1_15_1","volume-title":"Predictive modeling to evaluate human impact on Internet security. Paper presented at the HFES99","author":"McCauley-Bell P.","year":"1999","unstructured":"McCauley-Bell , P. ( 1999 ). Predictive modeling to evaluate human impact on Internet security. Paper presented at the HFES99 , Houston, TX . McCauley-Bell, P. (1999). Predictive modeling to evaluate human impact on Internet security. Paper presented at the HFES99, Houston, TX."},{"key":"e_1_3_2_1_16_1","volume-title":"1991 Annual Report of the National Computer System Security and Privacy Advisory Board","author":"NIST","year":"1992","unstructured":"NIST ( 1992 ). 1991 Annual Report of the National Computer System Security and Privacy Advisory Board . National Institute of Standards and Technology . NIST (1992). 1991 Annual Report of the National Computer System Security and Privacy Advisory Board. National Institute of Standards and Technology."},{"key":"e_1_3_2_1_17_1","volume-title":"Brookfield.","author":"Reason J.","year":"1997","unstructured":"Reason , J. ( 1997 ). Managing the Risks of Organizational Accidents. Ashgate , Brookfield. Reason, J. (1997). Managing the Risks of Organizational Accidents. Ashgate, Brookfield."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139062367","volume-title":"Human Error","author":"Reason J.","year":"1990","unstructured":"Reason , J. ( 1990 ). Human Error . Cambridge, UK : Cambridge University Press . Reason, J. (1990). Human Error. Cambridge, UK: Cambridge University Press."},{"volume-title":"Human inquiry: a sourcebook of new paradigm research","author":"Reason P.","key":"e_1_3_2_1_19_1","unstructured":"Reason , P. and Rowan , J . (eds), (1981) , Human inquiry: a sourcebook of new paradigm research , Chichester : John Wiley . Reason, P. and Rowan, J. (eds), (1981), Human inquiry: a sourcebook of new paradigm research, Chichester: John Wiley."},{"key":"e_1_3_2_1_20_1","volume-title":"A Balance Introduction to Computer Science","author":"Reed D.","year":"2010","unstructured":"Reed , D. ( 2010 ). A Balance Introduction to Computer Science ( 3 rd edition), Pearson Prentice Hall . Reed, D. (2010). A Balance Introduction to Computer Science (3rd edition), Pearson Prentice Hall.","edition":"3"},{"key":"e_1_3_2_1_21_1","volume-title":"ComputerWeekly","author":"Roberts P.","year":"2004","unstructured":"Roberts , P. ( 2004 ), AOL survey finds home user ignorant to online threats . ComputerWeekly , April 2010. Online at http:\/\/www.computerweekly.com\/news\/2240058434\/AOL-survey-finds-home-user-ignorant-to-online-threats. Accessed on 10 March 2014. Roberts, P. (2004), AOL survey finds home user ignorant to online threats. ComputerWeekly, April 2010. Online at http:\/\/www.computerweekly.com\/news\/2240058434\/AOL-survey-finds-home-user-ignorant-to-online-threats. Accessed on 10 March 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00001-6"},{"key":"e_1_3_2_1_23_1","volume-title":"Generally Accepted Principles and Practices for Securing Information Technology Systems. Washington D. C.: U. S. Department of Commerce","author":"Swanson M.","year":"1996","unstructured":"Swanson , M. , & Guttman , B. ( 1996 ). Generally Accepted Principles and Practices for Securing Information Technology Systems. Washington D. C.: U. S. Department of Commerce , National Institute of Standards and Technology (NIST) . Swanson, M., & Guttman, B. (1996). Generally Accepted Principles and Practices for Securing Information Technology Systems. Washington D. C.: U. S. Department of Commerce, National Institute of Standards and Technology (NIST)."},{"key":"e_1_3_2_1_24_1","volume-title":"Information technology --- Guidelines for the management of IT Security-Part 1: Concepts and models for IT Security (BS ISO\/IEC TR 13335-1:1996)","author":"BSI.","year":"1996","unstructured":"BSI. ( 1996 ). Information technology --- Guidelines for the management of IT Security-Part 1: Concepts and models for IT Security (BS ISO\/IEC TR 13335-1:1996) . London : BSI. BSI. (1996). Information technology --- Guidelines for the management of IT Security-Part 1: Concepts and models for IT Security (BS ISO\/IEC TR 13335-1:1996). London: BSI."},{"key":"e_1_3_2_1_25_1","unstructured":"Whitten A. & Tygar J. D. (1999 August). Why Johnny can't encrypt: a usability evaluation of PGP 5.0. Paper presented at the 9th USENIX security symposiom Washington.   Whitten A. & Tygar J. D. (1999 August). Why Johnny can't encrypt: a usability evaluation of PGP 5.0. Paper presented at the 9th USENIX security symposiom Washington."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/001401398187125"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"e_1_3_2_1_29_1","volume-title":"Human Reliability Analysis: Context and Control","author":"Hollnagel E.","year":"1993","unstructured":"Hollnagel , E. ( 1993 ). Human Reliability Analysis: Context and Control . London : Academic Press . Hollnagel, E. (1993). Human Reliability Analysis: Context and Control. London: Academic Press."},{"key":"e_1_3_2_1_30_1","volume-title":"The Discovery of Grounded Theory: Strategies for qualitative research","author":"Glaser B. G.","year":"1967","unstructured":"Glaser , B. G. , & Strauss , A. L. ( 1967 ). The Discovery of Grounded Theory: Strategies for qualitative research . New York : Aldine . Glaser, B. G., & Strauss, A. L. (1967).The Discovery of Grounded Theory: Strategies for qualitative research. New York: Aldine."},{"issue":"1","key":"e_1_3_2_1_31_1","first-page":"1","article-title":"A Critique of Using Grounded Theory as a Research Method","volume":"2","author":"Allan G.","year":"2003","unstructured":"Allan , G. ( 2003 ). A Critique of Using Grounded Theory as a Research Method , Electronic Journal of Business Research Methods , 2 ( 1 ), 1 -- 10 . Allan, G. (2003). A Critique of Using Grounded Theory as a Research Method, Electronic Journal of Business Research Methods, 2(1), 1--10.","journal-title":"Electronic Journal of Business Research Methods"},{"key":"e_1_3_2_1_32_1","volume-title":"Qualitative Inquiry and Research Design: Choosing among five Tradations","author":"Crewell J. W.","year":"1998","unstructured":"Crewell , J. W. ( 1998 ). Qualitative Inquiry and Research Design: Choosing among five Tradations . London : Sage . Crewell, J. W. (1998). Qualitative Inquiry and Research Design: Choosing among five Tradations. London: Sage."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/002188638602200207"},{"key":"e_1_3_2_1_34_1","volume-title":"Research Methods in Social Relations","author":"Kidder L. H.","year":"1986","unstructured":"Kidder , L. H. & Judd , C. M. ( 1986 ). Research Methods in Social Relations ( 5 th edn.). New York : CBS College . Kidder, L. H. & Judd, C. M. (1986).Research Methods in Social Relations(5th edn.). New York: CBS College.","edition":"5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","DOI":"10.4135\/9781849208963","volume-title":"Doing Interviews.London: Sage","author":"Kvale S.","year":"2007","unstructured":"Kvale , S. ( 2007 ). Doing Interviews.London: Sage . Kvale, S. (2007). Doing Interviews.London: Sage."},{"key":"e_1_3_2_1_36_1","volume-title":"Interviewing as Qualitative Research: A guide For researchers In education and the social sciences","author":"Seidman I.","year":"2006","unstructured":"Seidman , I. ( 2006 ). Interviewing as Qualitative Research: A guide For researchers In education and the social sciences . New York : Teachers College . Seidman, I. (2006).Interviewing as Qualitative Research: A guide For researchers In education and the social sciences. New York: Teachers College."},{"key":"e_1_3_2_1_37_1","volume-title":"Surveys in Social Research","author":"De Vaus D.","year":"2001","unstructured":"De Vaus , D. ( 2001 ). Surveys in Social Research ( 5 th edn), London : Routledge . De Vaus, D. (2001).Surveys in Social Research (5th edn), London: Routledge.","edition":"5"},{"key":"e_1_3_2_1_38_1","volume-title":"Research Methods for Managers","author":"Gill J.","year":"2002","unstructured":"Gill , J. , & Johnson , P. ( 2002 ). Research Methods for Managers ( 3 rd edn), London : Sage . Gill, J., & Johnson, P. (2002).Research Methods for Managers (3rd edn), London: Sage.","edition":"3"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010301"},{"key":"e_1_3_2_1_40_1","first-page":"217","volume-title":"N","author":"Rombach","year":"1991","unstructured":"H. D. Rombach , \"Practical Benefits of Goal-Oriented Measurement,\" In : N . Fenton and B. Littlewood, Eds., Software Reliability and Metrics, Elsevier Science Publishing Co ., London, 1991 , pp. 217 -- 235 . H. D. Rombach, \"Practical Benefits of Goal-Oriented Measurement,\" In: N. Fenton and B. Littlewood, Eds., Software Reliability and Metrics, Elsevier Science Publishing Co., London, 1991, pp. 217--235."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.646887"},{"key":"e_1_3_2_1_42_1","unstructured":"GQM Method Application 2008. http:\/\/www-ivs.cs.uni-magdeburg.de\/sw-eng\/us\/java\/GQM\/link3  GQM Method Application 2008. http:\/\/www-ivs.cs.uni-magdeburg.de\/sw-eng\/us\/java\/GQM\/link3"},{"key":"e_1_3_2_1_43_1","first-page":"455","volume-title":"Long Beach","author":"Tumer","year":"2005","unstructured":"I. Tumer , \"Function Based Risk Assessment : Mapping Function to Likelihood,\" Proceedings of DETC'05, Vol. 5a , Long Beach , 24-28 September 2005 , pp. 455 -- 467 . doi:10.1115\/DETC2005-85053 10.1115\/DETC2005-85053 I. Tumer, \"Function Based Risk Assessment: Mapping Function to Likelihood,\" Proceedings of DETC'05, Vol. 5a, Long Beach, 24-28 September 2005, pp. 455--467. doi:10.1115\/DETC2005-85053"},{"key":"e_1_3_2_1_44_1","volume-title":"Office of the Under Secretary of Defense, \"DSMC Risk Management Guide for DoD Acquisition,\"","year":"1999","unstructured":"Office of the Under Secretary of Defense, \"DSMC Risk Management Guide for DoD Acquisition,\" 2 nd Edition, Defense Systems Management College Press , Fort Belvoir , 1999 . Office of the Under Secretary of Defense, \"DSMC Risk Management Guide for DoD Acquisition,\" 2nd Edition, Defense Systems Management College Press, Fort Belvoir, 1999.","edition":"2"},{"volume-title":"Organizational Assimilation of Innovations: A Multilevel Contextual Analysis,\" Academy of Management Journal","author":"Meyer J. B.","key":"e_1_3_2_1_45_1","unstructured":"A. D. Meyer and J. B. Goes , \" Organizational Assimilation of Innovations: A Multilevel Contextual Analysis,\" Academy of Management Journal , Vol. 31 , No. 4, 1988, pp. 897--923. doi:10.2307\/256344 10.2307\/256344 A. D. Meyer and J. B. Goes, \"Organizational Assimilation of Innovations: A Multilevel Contextual Analysis,\" Academy of Management Journal, Vol. 31, No. 4, 1988, pp. 897--923. doi:10.2307\/256344"},{"volume-title":"A Functional Basis for Engineering Design: Reconciling and Evolving Previous Efforts,\" Research in Engineering Design","author":"Hirtz R.","key":"e_1_3_2_1_46_1","unstructured":"J. Hirtz , R. Stone , D. McAdams , S. Szykman and K. Wood , \" A Functional Basis for Engineering Design: Reconciling and Evolving Previous Efforts,\" Research in Engineering Design , Vol. 13 , No. 2, 2002, pp. 65--82. J. Hirtz, R. Stone, D. McAdams, S. Szykman and K. Wood, \"A Functional Basis for Engineering Design: Reconciling and Evolving Previous Efforts,\" Research in Engineering Design, Vol. 13, No. 2, 2002, pp. 65--82."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":45,"alternative-id":["10.1145\/2905055.2905069","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905069","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}