2019
DOI: 10.1016/j.ins.2019.02.061
|View full text |Cite
|
Sign up to set email alerts
|

Two-level Tabu-predatory search for schedule risk control of IT outsourcing projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Yildiz et al (2014) developed a knowledge-based cost risk mapping tool that considers the causality among interdependent cost overrun risk factors for the identification of risk paths and assessment of risk levels. For project schedule risk, Lu et al (2019) considered the cooperative relationships between the client and vendors to propose a two-level schedule risk control model consisting of minimizing the schedule risk and maximizing the benefit of vendors. Ballesteros-p erez et al (2019) stressed the importance of activity sensitivity to determine which activities could increase the risk of a project schedule delay and proposed a new method to evaluate the performance of activity sensitivity metrics.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Yildiz et al (2014) developed a knowledge-based cost risk mapping tool that considers the causality among interdependent cost overrun risk factors for the identification of risk paths and assessment of risk levels. For project schedule risk, Lu et al (2019) considered the cooperative relationships between the client and vendors to propose a two-level schedule risk control model consisting of minimizing the schedule risk and maximizing the benefit of vendors. Ballesteros-p erez et al (2019) stressed the importance of activity sensitivity to determine which activities could increase the risk of a project schedule delay and proposed a new method to evaluate the performance of activity sensitivity metrics.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Outsourcing in information technology has increased dramatically. Therefore, risk control in this area has been considered more than other areas (Lu et al, 2019). Given that the studied organization is engaged in outsourcing other companies, therefore, studying outsourcing can control the risks in different parts of outsourcing projects.…”
Section: Introductionmentioning
confidence: 99%