81
Views
394
CrossRef citations to date
0
Altmetric

References

  • Alloway, R.M. Temporary management systems: application of a contingency model to the creation of computer based information systems. Ph.D. dissertation, Sloan School of Management, MIT, 1976.
  • Alter, S. Implementation risk analysis. TIMS Studies in Management Sciences, 13, 2 (April 1979), 103–119.
  • Alter, S., and Ginzberg, M. Managing uncertainty in MIS implementation. Sloan Management Review, 20, 1 (Fall 1978), 23–31.
  • Altman, E.I. Financial ratios, discriminant analysis and the prediction of corporate bankruptcy. Journal of Finance, 23, 4 (September 1968), 589–609.
  • Anderson, J., and Narasimhan, R. Assessing implementation risk: a methodological approach. Management Science, 25, 6 (June 1979), 512–521.
  • Banff, M.L. Information requirements analysis: a methodological review. Working paper 76-08-82, Wharton School, University of Pennsylvania, 1977.
  • Barki, H. A contingency model of DSS success: an empirical investigation. Ph.D. dissertation, School of Business Administration, The University of Western Ontario, London, Ontario, 1983.
  • Beath, C.M. Strategies for managing MIS: a transaction cost approach. Proceedings of the Fourth International Conference on Information Systems, Houston, ACM/SIGBDP, December 1983, pp. 415–427.
  • Bell, T.E. Managing Murphy’s law: engineering a minimum-risk system. IEEE Spectrum, 26, 6 (June 1989), 24–27.
  • Berkeley, D.; Humphreys, P.C.; and Thomas, R.D. Project risk action management. Construction Management and Economics, 9 (1991), 3–17.
  • Bernier, C. Etude des relations entre l’environnement, ¡’incertitude environnementale perçue et le mode de gestion dans les projets de développement de systèmes d’information. Ph.D. dissertation, École des Hautes Études Commerciales, Montréal, Québec, 1989.
  • Bernier, C., and Rivard, S. A contingency model for the management of software projects: an empirical investigation. Proceedings of the ASAC Conference, Whistler, British Columbia, 11, 4 (June 1990), 23–38.
  • Boehm, B.W. Software Risk Management. Los Alamitos, CA: IEEE Computer Society Press, 1989.
  • Brecher, A. An overview of formal methods of risk assessment. Conference Record IEEE Electro, Boston, 1988, pp. 1–9.
  • Casher, J.D. How to control risk and effectively reduce the chance of failure. Management Review, 73, 6 (June 1984), 50–54.
  • Charette, R.N. Software Engineering Risk Analysis and Management. New York: McGraw-Hill, 1989.
  • Davis, G.B. Strategies for information requirements determination. IBM System Journal, 21, 1 (March 1982), 4–30.
  • Denenberg, H.S.; Eilers, R.D.; Melone, J.J.; and Zelten, R.A. Risk and Insurance, 2d ed. Englewood Cliffs, NJ: Prentice-Hall, 1974.
  • Galbraith, J. Organization Design. Reading, MA: Addison-Wesley, 1977.
  • Guarro, S.B.; Principles and procedures of the LRAM approach to information systems risk analysis and management. Computers & Security, 6, 6 (December 1987), 493–504.
  • Haimes, Y.Y. Total risk management. Risk Analysis, 11, 2 (1991), 169–171.
  • Kangari, R., and Boyer, L.T. Risk management by expert systems. Project Management Journal, 20, 1 (1989), 40–48.
  • Kaplan, S., and Garrick, J.B. On the quantitative definition of risk. Risk Analysis, 1, 1 (1981), 11–27.
  • Kim, J., and Mueller, C.W. Factor Analysis: Statistical Methods and Practical Issues. Beverly Hills, CA: Sage Publications, 1988.
  • Linnerooth-Bayer, J., and Wahlstrom, B. Applications of probabilistic risk assessments: the selection of appropriate tools. Risk Analysis, 11, 2 (1991), 239–248.
  • McFarlan, F.W. Portfolio approach to information systems. Harvard Business Review, 59, 5 (September-October 1981), 142–150.
  • Naumann, J.D.; Jenkins, A. M.; and Wetherbe, J.C. Empirical investigation of systems development practices and results. Working paper 83-09, University of Minnesota, Minnesota, 1983.
  • Post, G.V., and Diltz, D.J. A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly, 10, 4 (December 1986), 363–375.
  • Rainer, R.K. Jr.; Snyder, C.A.; and Carr, H.H. Risk analysis for information technology. Journal of Management Information Systems, 8, 1 (1991), 129–147.
  • Rivard, S.; Talbot, J.; and Charest, M. Measuring the uncertainty of a system development project. Proceedings of the ASAC Conference, Toronto, Ontario, 8, 4 (June 1987), 115–124.
  • Robey, D.; Farrow, D.L.; and Franz, C.R. Group process and conflict in system development. Management Science, 35, 10 (1989), 1172–1191.
  • Rothfeder, J. It’s late, costly, incompetent—but try firing a computer system. Business Week (November 7, 1988), 164–165.
  • Sherer, S.A. Measuring the risk of software failure: a financial application. Proceedings of the Tenth International Conference on Information Systems, Boston, ACM/SIM/TIMS, December 1989, 237–245.
  • Tversky, A., and Kahneman, D. Belief in the law of small numbers. In D. Kahneman, P. Slovic, and A. Tversky, A. (eds.),Judgement under Uncertainty: Heuristics and Biases. Cambridge: Cambridge University Press, 1982, pp. 23–31.
  • U.S. Air Force Command. Software risk abatement. AFSC/AFLC Pamphlet 800-45, Andrew’s Air Force Base, CA: September 30, 1988.
  • Van de Ven, A.H., and Delbecq, A. A task contingent model of work-unit analysis. Administrative Science Quarterly, 19, 2 (June 1974), 183–197.
  • Van de Ven, A.H., and Ferry, D.L. Measuring and Assessing Organizations. New York: Wiley Interscience, 1980.
  • Wideman, R.M. Risk management. Project Management Journal, 17, 4 (September 1986), 20–26.
  • Zmud, R.W. Management of large software development efforts. MIS Quarterly, 4, 2 (June 1980), 45–55.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.