Applying multiple case studies research to investigate IT development outsourcing project risks.
| Main Author: | Abdullah, Lili Marziana |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21733/ http://irep.iium.edu.my/21733/1/Applying_Multiple_Case.pdf |
Similar Items
Exploratory case study research: outsourced project failure
by: Verner, June M., et al.
Published: (2012)
by: Verner, June M., et al.
Published: (2012)
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010)
by: Akhbar, R., et al.
Published: (2010)
Analysis and application of an outsourcing risk framework
by: Abdullah, Lili Marziana, et al.
Published: (2012)
by: Abdullah, Lili Marziana, et al.
Published: (2012)
Requirements elicitation and analysis: towards the automation of software project risk management
by: Nordin, Azlin, et al.
Published: (2014)
by: Nordin, Azlin, et al.
Published: (2014)
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)
E-learning development for MSc in operational research and applied statistics
by: Mustaffa, Noorfa Haszlinna
Published: (2003)
by: Mustaffa, Noorfa Haszlinna
Published: (2003)
IT outsourcing practices among Malaysia SMEs : some empirical evidence.
by: Hussin, Husnayati, et al.
Published: (2011)
by: Hussin, Husnayati, et al.
Published: (2011)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
An anthology of applied computer technologies
Published: (2011)
Published: (2011)
CERT Technologies
by: Alenezi, Khalid, et al.
Published: (2015)
by: Alenezi, Khalid, et al.
Published: (2015)
CERT team involving GEs structured
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
by: Abdulkareem Alenezi, Khaled, et al.
Published: (2015)
Applying Fuzziness in Neural Symbolic-Integration
by: Farah Liyana, Azizan, et al.
Published: (2012)
by: Farah Liyana, Azizan, et al.
Published: (2012)
Software Project Management: A Practical Guide to manage Small Software Development Project.
by: Abd Ghani, M. K.
Published: (2011)
by: Abd Ghani, M. K.
Published: (2011)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
Multiattribute analysis of the offshore outsourcing location decision using a decision support system framework
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Determining multi-criteria supplier selection towards sustainable development of IT project outsourcing
by: Fusiripong, Prashaya, et al.
Published: (2017)
by: Fusiripong, Prashaya, et al.
Published: (2017)
Investigating transportation research based on social media
analysis: A systematic mapping review
by: Zayet, T. M. A., et al.
Published: (2021)
by: Zayet, T. M. A., et al.
Published: (2021)
A research framework for user centered web development
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Applying link grammar formalism in the development of English-Indonesian machine translation system
by: N., Zamin, et al.
Published: (2008)
by: N., Zamin, et al.
Published: (2008)
Applying link grammar formalism in the development of English-Indonesian machine translation system
by: N., Zamin, et al.
Published: (2008)
by: N., Zamin, et al.
Published: (2008)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Filtering approaches and mish activation function applied on handwritten chinese character recognition
by: Yingna, Zhong, et al.
Published: (2024)
by: Yingna, Zhong, et al.
Published: (2024)
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Performance of different operation techniques applied in genetic algorithm towards benchmark functions
by: Ong, Chin Hwa
Published: (2018)
by: Ong, Chin Hwa
Published: (2018)
CIT543 - ICT RESEARCH METHODS & PROJECT MANAGEMENT APRIL 08
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CIT543 - ICT RESEARCH METHODS & PROJECT MANAGEMENT APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CIT543 – ICT RESEARCH METHODS AND PROJECT MANAGEMENT NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CIT 543 - ICT RESEARCH METHODS & PROJECT MANAGEMENT APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Improved handover decision algorithm using multiple criteria
by: Mohamed Abdullah, Radhwan, et al.
Published: (2018)
by: Mohamed Abdullah, Radhwan, et al.
Published: (2018)
Designing and developing an interactive projection mapping
AR book on cultural heritage of Myanmar
by: Chan, Z. H. Ave *, et al.
Published: (2019)
by: Chan, Z. H. Ave *, et al.
Published: (2019)
The simulation of project management-quality of software developed / Heng Ai Shi
by: Heng , Ai Shi
Published: (2004)
by: Heng , Ai Shi
Published: (2004)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Model-based hybrid variational level set method applied to lung cancer detection
by: Jing, Wang, et al.
Published: (2024)
by: Jing, Wang, et al.
Published: (2024)
Influence of Developing Professional Communication on the Success of Postgraduate Research Supervisory
by: Balsam, A. Mustafa
Published: (2015)
by: Balsam, A. Mustafa
Published: (2015)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
Fuzzy multiple heuristic orderings for examination timetabling
by: Asmuni, Hishammuddin, et al.
Published: (2005)
by: Asmuni, Hishammuddin, et al.
Published: (2005)
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Similar Items
-
Exploratory case study research: outsourced project failure
by: Verner, June M., et al.
Published: (2012) -
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010) -
Analysis and application of an outsourcing risk framework
by: Abdullah, Lili Marziana, et al.
Published: (2012) -
Requirements elicitation and analysis: towards the automation of software project risk management
by: Nordin, Azlin, et al.
Published: (2014) -
Risk assessment for Big Data in cloud computing: trust as an impact
by: Yusof Ali, Hazirah Bee, et al.
Published: (2019)