{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:23:50Z","timestamp":1725571430196},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/noms.2010.5488498","type":"proceedings-article","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T18:37:30Z","timestamp":1277404650000},"page":"400-407","source":"Crossref","is-referenced-by-count":2,"title":["Computer-generated comprehensive risk assessment for IT project management"],"prefix":"10.1109","author":[{"given":"Juliano Araujo","family":"Wickboldt","sequence":"first","affiliation":[]},{"given":"Luis Armando","family":"Bianchin","sequence":"additional","affiliation":[]},{"given":"Roben Castagna","family":"Lunardi","sequence":"additional","affiliation":[]},{"given":"Fabricio Girardi","family":"Andreis","sequence":"additional","affiliation":[]},{"given":"Ricardo Luis","family":"dos Santos","sequence":"additional","affiliation":[]},{"given":"Bruno Lopes","family":"Dalmazo","sequence":"additional","affiliation":[]},{"given":"Weverton Luis da Costa","family":"Cordeiro","sequence":"additional","affiliation":[]},{"given":"Abraham Lincoln Rabelo","family":"de Sousa","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]},{"given":"Luciano Paschoal","family":"Gaspary","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Bartolini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"first-page":"338","article-title":"Measurement, prediction and risk analysis for Web applications","year":"2001","author":"fewster","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.76"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2008.03.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75694-1_13"},{"key":"ref15","first-page":"200","article-title":"Decision support for service transition management","author":"setzer","year":"2008","journal-title":"IEEE\/IFIP Network Operations and Management Symposium (NOMS)"},{"journal-title":"Computer Networks","article-title":"ChangeLedge: Change Design and Planning in Networked Systems based on Reuse of Knowledge and Automation","year":"2009","author":"cordeiro","key":"ref16"},{"year":"2007","key":"ref17","article-title":"Workflow process definition interface-xml process definition language"},{"year":"2008","key":"ref18","article-title":"Common Information Model"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2009.5188847"},{"journal-title":"Office of Government Commerce","article-title":"ITIL-Information Technology Infrastructure Library: Service Transition Version 3.0.","year":"2007","key":"ref3"},{"journal-title":"The Institute of Risk Management","year":"2002","key":"ref6"},{"key":"ref5","first-page":"27","article-title":"Improving IT Change Management Processes with Automated Risk Assessment","author":"wickboldt","year":"2009","journal-title":"20th IFIP\/IEEE International Workshop on Distributed Systems Operations and Management (DSOM) LNCS 5841"},{"journal-title":"International Journal of Project Management","article-title":"Deliberate ignorance in project risk manage-ment","year":"2009","author":"kutsch","key":"ref8"},{"journal-title":"Office of Government Commerce","article-title":"Management of risk: guidance for practitioners","year":"2007","key":"ref7"},{"journal-title":"A Guide to the Project Management Body of Knowledge PMBOK Guide","year":"2004","key":"ref2"},{"journal-title":"Office of Government Commerce","article-title":"ITIL-Information Technology Infrastructure Library: Service Design Version 3.0.","year":"2007","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2007.03.011"}],"event":{"name":"2010 IEEE\/IFIP Network Operations and Management Symposium - NOMS 2010","start":{"date-parts":[[2010,4,19]]},"location":"Osaka","end":{"date-parts":[[2010,4,23]]}},"container-title":["2010 IEEE Network Operations and Management Symposium - NOMS 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5482535\/5488304\/05488498.pdf?arnumber=5488498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T00:47:02Z","timestamp":1489884422000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5488498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/noms.2010.5488498","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}