{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T15:56:06Z","timestamp":1692546966925},"reference-count":99,"publisher":"Elsevier","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1016\/s0065-2458(08)60336-8","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T05:56:15Z","timestamp":1295416575000},"page":"1-58","source":"Crossref","is-referenced-by-count":5,"title":["Managing the Risks in Information Systems and Technology"],"prefix":"10.1016","author":[{"given":"Robert N.","family":"Charette","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0065-2458(08)60336-8_bb0005","series-title":"Wright-Patterson AFB","article-title":"Management quality insight. AFSC Pamphlet 80-43","author":"Air Force System Command (AFSC)","year":"1987"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0010","series-title":"AFSC Pamphlet 800-45, Wright-Patterson AFB","first-page":"1988","article-title":"Software risk abatement","author":"Air Force System Command (AFSC)","year":"1988"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0015","series-title":"Probability, Statistics and Queuing Theory","author":"Allen","year":"1978"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0020","series-title":"Managing Decisions under Uncertainty","author":"Baird","year":"1989"},{"issue":"6","key":"10.1016\/S0065-2458(08)60336-8_bb0025","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/32.6156","article-title":"The TAME Project: Towards improvement-oriented software environments","volume":"14","author":"Basili","year":"1988","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0065-2458(08)60336-8_bb0030","series-title":"Management: Function and Strategy","author":"Bateman","year":"1990"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0035","series-title":"Disaster Recovery Planning","author":"Bates","year":"1992"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0040","series-title":"Software Engineering Economics","author":"Boehm","year":"1981"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0045","first-page":"61","article-title":"A spiral model of development and enhancement","volume":"11","author":"Boehm","year":"1986","journal-title":"SEN"},{"issue":"5","key":"10.1016\/S0065-2458(08)60336-8_bb0050","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.59","article-title":"A spiral model of development and enhancement","volume":"21","author":"Boehm","year":"1988","journal-title":"IEEE Computer"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0055","series-title":"Tutorial: Software Risk Management","author":"Boehm","year":"1989"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0060","series-title":"The Mythical Man-Month","author":"Brooks","year":"1982"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0065","first-page":"94","article-title":"Industrial-strength management strategies","author":"Brown","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0070","doi-asserted-by":"crossref","article-title":"Taxonomy-based risk identification","author":"Carr","year":"1993","DOI":"10.21236\/ADA266992"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0075","series-title":"Software Engineering Risk Analysis and Management","author":"Charette","year":"1989"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0080","series-title":"Applications Strategies for Risk Analysis","author":"Charette","year":"1990"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0085","article-title":"Risk management to maximise commercial opportunity","author":"Charette","year":"1991"},{"issue":"6","key":"10.1016\/S0065-2458(08)60336-8_rf0090","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/103701.103705","article-title":"The risks with risk analysis","volume":"34","author":"Charette","year":"1991","journal-title":"CACM"},{"issue":"7","key":"10.1016\/S0065-2458(08)60336-8_bb0095","first-page":"2","article-title":"Building bridges over intelligent rivers","volume":"5","author":"Charette","year":"1992","journal-title":"Am. Programmer"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0100","article-title":"Notes from the front: Essential risk management","author":"Charette","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0105","first-page":"5","article-title":"Up the down escalator: Managing risk in an uncertain world","author":"Charette","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0110","first-page":"4","article-title":"The mechanics of managing risk","author":"Charette","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0115","first-page":"14","article-title":"Managing risk: The practice of the art","author":"Charette","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0120","first-page":"12","article-title":"Outsourcing: Getting rid of your IT","author":"Charette","year":"1994"},{"issue":"3","key":"10.1016\/S0065-2458(08)60336-8_bb0125","first-page":"10","article-title":"On becoming a risk entrepreneur","volume":"8","author":"Charette","year":"1995","journal-title":"Am. Programmer"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0130","first-page":"90","article-title":"Are we developers, liars or just fools?","author":"Charette","year":"1995"},{"issue":"3","key":"10.1016\/S0065-2458(08)60336-8_bb0135","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1145\/227234.227599","article-title":"Taking responsibility for our risks","volume":"39","author":"Charette","year":"1996","journal-title":"CACM"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0140","first-page":"110","article-title":"Large scale software project management is risk management","author":"Charette","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0145","series-title":"Introduction to the Management of Risk","author":"Charette","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0150","series-title":"Making Hard Decisions","author":"Clemen","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0155","first-page":"65","article-title":"A defined process for project postmortem review","author":"Collier","year":"1996"},{"issue":"3","key":"10.1016\/S0065-2458(08)60336-8_bb0160","first-page":"12","article-title":"The $2000hour: How managers influence project performance through the rework cycle","volume":"22","author":"Cooper","year":"1994","journal-title":"Eng. Management Rev."},{"key":"10.1016\/S0065-2458(08)60336-8_bb0165","series-title":"An Introduction to Risk Management","author":"Crockford","year":"1980"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0170","series-title":"Quality Is Free","author":"Crosby","year":"1979"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0175","series-title":"Controlling Software Projects","author":"DeMarco","year":"1982"},{"issue":"4","key":"10.1016\/S0065-2458(08)60336-8_bb0180","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/17.97444","article-title":"An exploratory analysis relating the software project management process to project success","volume":"38","author":"Deutsch","year":"1991","journal-title":"IEEE Trans. Eng. Manage."},{"key":"10.1016\/S0065-2458(08)60336-8_bb0185","series-title":"Thinking Strategically: The Competitive Edge in Business, Politics, and Everyday Life","author":"Dixit","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0190","series-title":"On the Psychology of Military Incompetence","author":"Dixon","year":"1979"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0195","series-title":"Defense Systems Management Handbook","article-title":"Defense Management Systems College (DMSC)","year":"1983"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0200","series-title":"Risk Management for Software Projects","author":"Down","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0205","series-title":"The Practice of Management","author":"Drucker","year":"1954"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0210","series-title":"Managing for Results","author":"Drucker","year":"1964"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0215","series-title":"Innovation and Entrepreneurship","author":"Drucker","year":"1985"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0220","series-title":"Management of the Absurd","author":"Farson","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0225","article-title":"Software Acquisition Capability Maturity Model (SA-CMM)","author":"Ferguson","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0230","article-title":"Engineering a culture for risk management","author":"Gemmer","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0235","series-title":"Contracting for computer software. GAO, Report GAO\/FGMSD-80-4","author":"Government Accounting Office (GAO)","year":"1979"},{"key":"10.1016\/S0065-2458(08)60336-8_rf0240","series-title":"Practical Risk Assessment for Project Management","author":"Grey","year":"1995"},{"issue":"1","key":"10.1016\/S0065-2458(08)60336-8_bb0245","first-page":"169","article-title":"Towards a holistic approach to risk assessment and management","volume":"9","author":"Haimes","year":"1989","journal-title":"Risk Analysis"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0250","series-title":"Competing for the Future","author":"Hamel","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0255","article-title":"Software risk management","author":"Higuera","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0260","article-title":"Team risk management: A new model for customer-supplier relationships","author":"Higuera","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0265","series-title":"Management of Project Risk","author":"Her Majesty\u2019s Stationery Office (HMSO)","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0270","series-title":"Computational Mathematics in Engineering","author":"Hovanessian","year":"1976"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0275","series-title":"IEEE Std 982.1-1988","article-title":"IEEE Standard Dictionary of Measures to Produce Reliable Software","author":"IEEE","year":"1988"},{"issue":"12","key":"10.1016\/S0065-2458(08)60336-8_bb0280","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/219663.219682","article-title":"Accountability and computer decision systems","volume":"38","author":"Johnson","year":"1995","journal-title":"CACM"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0285","series-title":"Applied Software Measurement: Assuring Productivity and Quality","author":"Jones","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0290","series-title":"Assessment and Control of Software Risks","author":"Jones","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0295","series-title":"Patterns of Software Systems Failure and Success","author":"Jones","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0300","series-title":"\u201cEngineering Risk and Hazard Assessment\u201d, Vol. 1","year":"1986"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0305","series-title":"Software Engineering Risk Management","author":"Karolak","year":"1996"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0310","series-title":"Shaping the Future: Business Design through Information Technology","author":"Keen","year":"1991"},{"issue":"2","key":"10.1016\/S0065-2458(08)60336-8_bb0315","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1111\/j.1539-6924.1990.tb01039.x","article-title":"Risk management agonistes","volume":"10","author":"Kloman","year":"1990","journal-title":"Risk Analysis"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0320","article-title":"The software engineering risk repository","author":"Konda","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0325","article-title":"What went wrong?","volume":"29","author":"KPMG","year":"1995","journal-title":"Director, May, p."},{"key":"10.1016\/S0065-2458(08)60336-8_bb0330","series-title":"Safeware: System Safety and Computers","author":"Leveson","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0335","series-title":"Of Acceptable Risk: Science and Determination of Safety","author":"Lowrance","year":"1976"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0340","series-title":"Taking Risks","author":"MacCrimmon","year":"1986"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0345","first-page":"33","article-title":"Beyond blaming: Congruence in large system development projects","author":"McLendon","year":"1996"},{"issue":"12","key":"10.1016\/S0065-2458(08)60336-8_bb0350","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/219663.219683","article-title":"Values, personal information privacy, and regulatory approaches","volume":"38","author":"Milberg","year":"1995","journal-title":"CACM"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0355","series-title":"The Business of Risk","author":"Moore","year":"1983"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0360","series-title":"Riding the Waves of Change","author":"Morgan","year":"1988"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0365","series-title":"Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis","author":"Morgan","year":"1990"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0370","series-title":"Judgment Calls","author":"Mowen","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_rf0375","series-title":"The Practitioner\u2019s Guide to EDP Auditing","author":"Mullen","year":"1990"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0380","series-title":"Post-Challenger Evaluation of Space Shuttle Risk Assessment and Management","author":"National Academy Press (NAP)","year":"1988"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0385","series-title":"Computers at Risk: Safe Computing in the Information Age","author":"National Academy Press (NAP)","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0390","series-title":"Software Engineering","year":"1969"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0395","series-title":"Computer Related Risks","author":"Neumann","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0400","author":"National Security Industrial Association (NSIA)","year":"1987"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0405","doi-asserted-by":"crossref","article-title":"Capability maturity model for software, version 1.1","author":"Paulk","year":"1993","DOI":"10.21236\/ADA263403"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0410","series-title":"Business","author":"Pride","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0415","series-title":"Risk.\u201d University Press of America","author":"Rescher","year":"1983"},{"issue":"4","key":"10.1016\/S0065-2458(08)60336-8_bb0420","first-page":"84","article-title":"No excuses management","volume":"68","author":"Rogers","year":"1990","journal-title":"Harvard Business Review"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0425","article-title":"Software risk management practice in industry and support for risk engineering in the GOAL tool set","author":"Rook","year":"1993"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0430","series-title":"Taguchi Techniques for Quality Engineering","author":"Ross","year":"1988"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0435","article-title":"An Anatomy of Risk","author":"Rowe","year":"1988"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0440","series-title":"The Art of the Long View","author":"Schwartz","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0445","article-title":"Software Engineering Institute, Carnegie-Mellon University","author":"SEI","year":"1991"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0450","author":"Software Engineering Institute (SEI)","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0455","series-title":"Software Failure Risk","author":"Sherer","year":"1992"},{"issue":"12","key":"10.1016\/S0065-2458(08)60336-8_bb0460","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/219663.219679","article-title":"The ethical and legal quandary of email privacy","volume":"38","author":"Sipior","year":"1995","journal-title":"CACM"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0465","first-page":"4","article-title":"Consortium prepares evolutionary spiral process deliverables","volume":"5","author":"Software Productivity Consortium (SPC)","year":"1991","journal-title":"SPC Quarterly"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0470","series-title":"The Standish Group International","article-title":"Chaos. Charting the Seas of Information Technology","author":"Standish","year":"1994"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0475","series-title":"The Business Value of Computers","author":"Strassman","year":"1990"},{"issue":"1","key":"10.1016\/S0065-2458(08)60336-8_bb0480","first-page":"3","article-title":"Risk objectivism and risk subjectivism: When are risks real?","volume":"1","author":"Thompson","year":"1990","journal-title":"Risk: Issues in Health & Safety"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0485","series-title":"The Program Manager\u2019s Guide to Software Acquisition Best Practices","author":"U.S. Department of Defense","year":"1995"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0490","series-title":"A Strategy of Change","author":"Wilson","year":"1992"},{"key":"10.1016\/S0065-2458(08)60336-8_bb0495","series-title":"Root Cause Analysis","author":"Wilson","year":"1993"}],"container-title":["Advances in Computers"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245808603368?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245808603368?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T23:51:12Z","timestamp":1559951472000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245808603368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"references-count":99,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(08)60336-8","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}