9 papers:
- CSCW-2015-LeeFD #distance
- Making Decisions From a Distance: The Impact of Technological Mediation on Riskiness and Dehumanization (MKL, NF, LD), pp. 1576–1589.
- KDD-2015-DhurandharGRME #big data #risk management
- Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
- CSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial #risk management
- Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, PÖ, EW, JW, AH, JH), pp. 154–163.
- DHM-SET-2013-KongZC #behaviour #predict #risk management
- Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
- ESEC-FSE-2013-MockusHP #approach #quality #risk management
- Risky files: an approach to focus quality improvement effort (AM, RLH, JDP), pp. 691–694.
- ASE-2010-KessentiniVS #identification #risk management
- Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
- HCI-VAD-2009-KandoganHBM #collaboration #risk management
- Studying Reactive, Risky, Complex, Long-Spanning, and Collaborative Work: The Case of IT Service Delivery (EK, EMH, JHB, PPM), pp. 504–513.
- SIGIR-2009-ZhuWCT #information retrieval #modelling #nondeterminism #risk management
- Risky business: modeling and exploiting uncertainty in information retrieval (JZ, JW, IJC, MJT), pp. 99–106.
- ICSE-2000-MizunoKTS #evaluation #risk management
- Characterization of risky projects based on project managers’ evaluation (OM, TK, YT, KS), pp. 387–395.