메뉴 건너뛰기




Volumn 8, Issue , 2006, Pages

The role of perceived control, attention-shaping, and expertise in IT project risk assessment

Author keywords

[No Author keywords available]

Indexed keywords

ATTENTION SHAPING; POTENTIAL AVENUES; RISK AWARENESS;

EID: 33749683619     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2006.483     Document Type: Conference Paper
Times cited : (6)

References (35)
  • 1
    • 2442641192 scopus 로고    scopus 로고
    • I. The Standish Group International, "Extreme Chaos," 2001.
    • (2001) Extreme Chaos
  • 3
    • 11844278235 scopus 로고    scopus 로고
    • The one-minute risk assessment tool
    • A. Tiwana and K. Mark, "The One-Minute Risk Assessment Tool," Communications of the ACM, vol. 47, pp. 73-77, 2004.
    • (2004) Communications of the ACM , vol.47 , pp. 73-77
    • Tiwana, A.1    Mark, K.2
  • 5
    • 0003427441 scopus 로고
    • Los Alamitos, Calif: IEEE Computer Society Press
    • B. W. Boehm, Software Risk Management. Los Alamitos, Calif: IEEE Computer Society Press, 1989.
    • (1989) Software Risk Management
    • Boehm, B.W.1
  • 7
    • 0025791156 scopus 로고
    • Software risk management: Principles and practices
    • B. W. Boehm, "Software Risk Management: Principles and Practices," IEEE Software, vol. 8, pp. 32-41, 1991.
    • (1991) IEEE Software , vol.8 , pp. 32-41
    • Boehm, B.W.1
  • 8
    • 0030361295 scopus 로고    scopus 로고
    • An inventory of personal constructs for information systems project risk researchers
    • T. Moynihan, "An inventory of personal constructs for information systems project risk researchers," Journal of Information Technology, vol. 11, pp. 359-371, 1996.
    • (1996) Journal of Information Technology , vol.11 , pp. 359-371
    • Moynihan, T.1
  • 9
    • 0025862343 scopus 로고
    • Applications of probabilistic risk assessments: The selection of appropriate tools
    • J. Linnerooth-Bayer and B. Wahlstrom, "Applications of probabilistic risk assessments: the selection of appropriate tools," Risk Analysis, vol. 11, pp. 239-248, 1991.
    • (1991) Risk Analysis , vol.11 , pp. 239-248
    • Linnerooth-Bayer, J.1    Wahlstrom, B.2
  • 10
    • 30744472925 scopus 로고
    • Principles and procedures of the LRAM approach to information systems risk analysis and management
    • S. B. Guarro, "Principles and procedures of the LRAM approach to information systems risk analysis and management," Computers & Security, vol. 6, pp. 493-504, 1987.
    • (1987) Computers & Security , vol.6 , pp. 493-504
    • Guarro, S.B.1
  • 11
    • 55249117122 scopus 로고
    • A stochastic dominance approach to risk analysis of computer systems
    • G. V. Post and D. J. Diltz, "A stochastic dominance approach to risk analysis of computer systems," MIS Quarterly, vol. 10, pp. 363-375, 1986.
    • (1986) MIS Quarterly , vol.10 , pp. 363-375
    • Post, G.V.1    Diltz, D.J.2
  • 13
    • 33645209293 scopus 로고    scopus 로고
    • How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model
    • L. Wallace, M. Keil, and A. Rai, "How Software Project Risk Affects Project Performance: An Investigation of the Dimensions of Risk and an Exploratory Model," Decision Sciences, vol. 35, pp. 289-321, 2004.
    • (2004) Decision Sciences , vol.35 , pp. 289-321
    • Wallace, L.1    Keil, M.2    Rai, A.3
  • 14
    • 13244253851 scopus 로고    scopus 로고
    • Deploying common systems globally: The dynamics of control
    • L. J. Kirsch, "Deploying Common Systems Globally: The Dynamics of Control," Information Systems Journal, vol. 15, pp. 374-395, 2004.
    • (2004) Information Systems Journal , vol.15 , pp. 374-395
    • Kirsch, L.J.1
  • 15
    • 0023456474 scopus 로고
    • Managerial perspectives on risk and risk taking
    • J. G. March and Z. Shapira, "Managerial Perspectives On Risk And Risk Taking," Management Science, vol. 33, pp. 1404-1418, 1987.
    • (1987) Management Science , vol.33 , pp. 1404-1418
    • March, J.G.1    Shapira, Z.2
  • 16
    • 85050784209 scopus 로고
    • Selective perception: A note on the departmental identifications of executives
    • D. C. Dearborn and H. A. Simon, "Selective Perception: A Note on the Departmental Identifications of Executives," Sociometry, vol. 21, pp. 140-144, 1958.
    • (1958) Sociometry , vol.21 , pp. 140-144
    • Dearborn, D.C.1    Simon, H.A.2
  • 18
    • 0032348156 scopus 로고    scopus 로고
    • Attention shaping and software risk - A categorical analysis of four classical risk management approaches
    • K. Lyytinen, L. Mathiassen, and J. Ropponen, "Attention Shaping and Software Risk - A Categorical Analysis of Four Classical Risk Management Approaches," Information Systems Research, vol. 9, pp. 233-255, 1998.
    • (1998) Information Systems Research , vol.9 , pp. 233-255
    • Lyytinen, K.1    Mathiassen, L.2    Ropponen, J.3
  • 19
    • 0002349273 scopus 로고
    • Applied organization change in industry: Structural, technical, and human approaches
    • W. W. Cooper, Leavitt, H. J. and Shelly, M. W., Ed. New York: Wiley
    • H. J. Leavitt, "Applied Organization Change in Industry: Structural, Technical, and Human Approaches," in New Perspectives in Organizational Research, W. W. Cooper, Leavitt, H. J. and Shelly, M. W., Ed. New York: Wiley, 1964, pp. 55-71.
    • (1964) New Perspectives in Organizational Research , pp. 55-71
    • Leavitt, H.J.1
  • 20
    • 0019928380 scopus 로고
    • Strategies for information requirements determination
    • G. B. Davis, "Strategies for Information Requirements Determination," IBM Systems Journal, vol. 21, pp. 4-30, 1982.
    • (1982) IBM Systems Journal , vol.21 , pp. 4-30
    • Davis, G.B.1
  • 21
    • 0011256050 scopus 로고
    • Portfolio approach to information systems
    • F. W. McFarlan, "Portfolio Approach to Information Systems," J. Systems Management, vol. 33, pp. 12-19, 1982.
    • (1982) J. Systems Management , vol.33 , pp. 12-19
    • McFarlan, F.W.1
  • 22
    • 84948491027 scopus 로고
    • Novice LISP errors: Undetected losses of information from working memory
    • J. R. Anderson and R. Jeffries, "Novice LISP errors: Undetected losses of information from working memory," Human Computer Interaction, vol. 1, pp. 107-131, 1985.
    • (1985) Human Computer Interaction , vol.1 , pp. 107-131
    • Anderson, J.R.1    Jeffries, R.2
  • 23
    • 0037992936 scopus 로고
    • Expertise on the bench: Modeling magistrates' judicial decision-making
    • R. G. M.T.H. Chi, and M.J. Farr (eds.), Ed. Hillsdale, NJ: Lawrence Erlbaum
    • J. A. Lawrence, "Expertise on the bench: modeling magistrates' judicial decision-making," in The Nature of Expertise, R. G. M.T.H. Chi, and M.J. Farr (eds.), Ed. Hillsdale, NJ: Lawrence Erlbaum, 1988, pp. 229-259.
    • (1988) The Nature of Expertise , pp. 229-259
    • Lawrence, J.A.1
  • 24
    • 0020858397 scopus 로고
    • Towards an understanding of the role of experience in the evolution from novice to expert
    • J. L. Kolodner, "Towards an Understanding of the Role of Experience in the Evolution from Novice to Expert," International Journal of Man-Machine Studies, vol. 19, pp. 497-518, 1983.
    • (1983) International Journal of Man-machine Studies , vol.19 , pp. 497-518
    • Kolodner, J.L.1
  • 29
    • 0018664202 scopus 로고
    • Modern coding practices and programmer performance
    • S. B. Sheppard, P. Milliman, B. Curtis, and T. Love, "Modern coding practices and programmer performance," Computer, vol. 12, pp. 41-49, 1979.
    • (1979) Computer , vol.12 , pp. 41-49
    • Sheppard, S.B.1    Milliman, P.2    Curtis, B.3    Love, T.4
  • 30
    • 0027680804 scopus 로고
    • Inside a software design team: Knowledge acquisition, sharing, and integration
    • D. B. Walz, J. J. Elam, and B. Curtis, "Inside a software design team: Knowledge acquisition, sharing, and integration," Communications of the ACM, vol. 36, pp. 62-77, 1993.
    • (1993) Communications of the ACM , vol.36 , pp. 62-77
    • Walz, D.B.1    Elam, J.J.2    Curtis, B.3
  • 31
    • 0032223732 scopus 로고    scopus 로고
    • Differences between novice and expert systems analysts: What do we know and what do we do?
    • K. D. Schenk, N. P. Vitalari, and K. S. Davis, "Differences between novice and expert systems analysts: What do we know and what do we do?" Journal of Management Information Systems, vol. 15, pp. 42-50, 1998.
    • (1998) Journal of Management Information Systems , vol.15 , pp. 42-50
    • Schenk, K.D.1    Vitalari, N.P.2    Davis, K.S.3
  • 32
    • 0032385074 scopus 로고    scopus 로고
    • Semantic structuring in analyst acquisition and representation of facts in requirements analysis
    • G. M. Marakas and J. J. Elam, "Semantic structuring in analyst acquisition and representation of facts in requirements analysis," Information Systems Research, vol. 9, pp. 37-63, 1998.
    • (1998) Information Systems Research , vol.9 , pp. 37-63
    • Marakas, G.M.1    Elam, J.J.2
  • 33
    • 0034250223 scopus 로고    scopus 로고
    • An investigation of risk perception and risk propensity on the decision to continue a software development project
    • M. Keil, Linda Wallace, Dan Turk, Gayle DixonRandall, Urban Nulden, "An investigation of risk perception and risk propensity on the decision to continue a software development project," The Journal of Systems and Software, vol. 53, pp. 145-157, 2000.
    • (2000) The Journal of Systems and Software , vol.53 , pp. 145-157
    • Keil, M.1    Wallace, L.2    Turk, D.3    DixonRandall, G.4    Nulden, U.5
  • 35
    • 58149370536 scopus 로고
    • Multivariate analysis versus multiple univariate analyses
    • C. J. Huberty and J. D. Morris, "Multivariate Analysis Versus Multiple Univariate Analyses," Psychological Bulletin, vol. 105, pp. 302-308, 1989.
    • (1989) Psychological Bulletin , vol.105 , pp. 302-308
    • Huberty, C.J.1    Morris, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.