{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:38Z","timestamp":1750220918574,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":15,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369718","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"377-384","source":"Crossref","is-referenced-by-count":3,"title":["Risk Management for Agile Projects in Offshore Vietnam"],"prefix":"10.1145","author":[{"given":"Le Gia","family":"Cuong","sequence":"first","affiliation":[{"name":"FPT Software, Hanoi, Vietnam"}]},{"given":"Phan Duy","family":"Hung","sequence":"additional","affiliation":[{"name":"FPT University, Hanoi, Vietnam"}]},{"given":"Nguyen Luu","family":"Bach","sequence":"additional","affiliation":[{"name":"FPT Software Hanoi, Vietnam"}]},{"given":"Ta Duc","family":"Tung","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Japan"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369718-1","unstructured":"Project Management Institute. 2017. Project Management Body Of Knowledge PMBOK Guide."},{"key":"key-10.1145\/3368926.3369718-2","unstructured":"Project Management Institute. 2015. Pulse of the Profession Report."},{"key":"key-10.1145\/3368926.3369718-3","unstructured":"Survey shows Agile is now the Norm. https:\/\/techbeacon.com\/app-dev-testing\/survey-agile-new-norm. Accessed: 2019 - 08 - 15."},{"key":"key-10.1145\/3368926.3369718-4","doi-asserted-by":"crossref","unstructured":"Sundararajan S., Bhasi M., Vijayaraghavan P. K. 2014. Case study on risk management practice in large offshore-outsourced Agile software projects. IET Software 8, 6 (Dec 2014), 245--257. DOI: https:\/\/doi.org\/10.1049\/iet-sen.2013.0190.","DOI":"10.1049\/iet-sen.2013.0190"},{"key":"key-10.1145\/3368926.3369718-5","doi-asserted-by":"crossref","unstructured":"Shrivastava S. Rathod U. 2013. Risks in Distributed Agile Development: A Review. DOI: https:\/\/doi.org\/10.1016\/j.sbspro.2014.04.208","DOI":"10.1016\/j.sbspro.2014.04.208"},{"key":"key-10.1145\/3368926.3369718-6","doi-asserted-by":"crossref","unstructured":"Hammad M. 2018. Integrating Risk Management in Scrum Framework. DOI: 10.1109\/FIT.2018.00035","DOI":"10.1109\/FIT.2018.00035"},{"key":"key-10.1145\/3368926.3369718-7","unstructured":"CHAOS REPORT: 2015. https:\/\/www.infoq.com\/articles\/standish-chaos-2015. Accessed: 2019 - 08 - 15."},{"key":"key-10.1145\/3368926.3369718-8","unstructured":"Schwaber K., Sutherland J. 2017. The Scrum Guide. https:\/\/www.scrumguides.org\/scrum-guide.html. Accessed: 2019 - 09 - 10."},{"key":"key-10.1145\/3368926.3369718-9","doi-asserted-by":"crossref","unstructured":"Beck K., Andres C. 2000. Extreme Programming Explained.","DOI":"10.1109\/TOOLS.1999.779100"},{"key":"key-10.1145\/3368926.3369718-10","unstructured":"What Is Kanban? An Introduction to Kanban Methodology: 2019. https:\/\/resources.collab.net\/agile-101\/what-is-kanban. Accessed: 2019 - 08 - 15."},{"key":"key-10.1145\/3368926.3369718-11","doi-asserted-by":"crossref","unstructured":"Linh N. D., Hung P. D., Diep V. T., Tung T. D. 2019. Risk Management in Projects Based on Open-Source Software. In Proceeding of the 8th International Conference on Software and Computer Applications (ICSCA '19). ACM, New York, NY, USA, 178--183. DOI: https:\/\/doi.org\/10.1145\/3316615.3316648.","DOI":"10.1145\/3316615.3316648"},{"key":"key-10.1145\/3368926.3369718-12","doi-asserted-by":"crossref","unstructured":"Cuong L. G., Hung P. D., Vinh B. T. 2018. Migrating Vietnam Offshore into Agile. In Proceedings of the Ninth International Symposium on Information and Communication Technology (SoICT 2018). ACM, New York, NY, USA, 329--336. DOI: https:\/\/doi.org\/10.1145\/3287921.3287924.","DOI":"10.1145\/3287921.3287924"},{"key":"key-10.1145\/3368926.3369718-13","doi-asserted-by":"crossref","unstructured":"Huy A. Q., Hung P. D. 2019. Security and Cost Optimization Auditing for Amazon Web Services. In Proceedings of the 2nd International Conference on Software Engineering and Information Management (ICSIM 2019). ACM, New York, NY, USA, 44--48. DOI: https:\/\/doi.org\/10.1145\/3305160.3305181.","DOI":"10.1145\/3305160.3305181"},{"key":"key-10.1145\/3368926.3369718-14","doi-asserted-by":"crossref","unstructured":"Nam N. T., Hung P. D. 2019. Padding Methods in Convolutional Sequence Model: An Application in Japanese Handwriting Recognition. In Proceedings of the 3rd International Conference on Machine Learning and Soft Computing (ICMLSC 2019). ACM, New York, NY, USA, 138--142. DOI: https:\/\/doi.org\/10.1145\/3310986.3310998.","DOI":"10.1145\/3310986.3310998"},{"key":"key-10.1145\/3368926.3369718-15","doi-asserted-by":"crossref","unstructured":"Hung P. D., Giang D. T. 2019. Continuous Integration for Android Application Development and Training. In Proceedings of the 2019 3rd International Conference on Education and Multimedia Technology (ICEMT 2019). ACM, New York, NY, USA, 145--149. DOI: https:\/\/doi.org\/10.1145\/3345120.3345158.","DOI":"10.1145\/3345120.3345158"}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369718&ftid=2101279&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:05Z","timestamp":1750204385000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369718"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369718","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}