{"id":"https://openalex.org/W2294839699","doi":"https://doi.org/10.18293/seke2015-122","title":"Analysis of Risk Dependencies in Collaborative Risk Management","display_name":"Analysis of Risk Dependencies in Collaborative Risk Management","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W2294839699","doi":"https://doi.org/10.18293/seke2015-122","mag":"2294839699"},"language":"en","primary_location":{"id":"doi:10.18293/seke2015-122","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2015-122","pdf_url":"https://doi.org/10.18293/seke2015-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2015-122","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025666286","display_name":"Catherine Barchet","orcid":null},"institutions":[{"id":"https://openalex.org/I33501960","display_name":"Universidade Federal de Santa Maria","ror":"https://ror.org/01b78mz79","country_code":"BR","type":"education","lineage":["https://openalex.org/I33501960"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Catherine Barchet","raw_affiliation_strings":["Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil"],"affiliations":[{"raw_affiliation_string":"Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]},{"raw_affiliation_string":"Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029891245","display_name":"Lu\u00eds A. L. Silva","orcid":null},"institutions":[{"id":"https://openalex.org/I33501960","display_name":"Universidade Federal de Santa Maria","ror":"https://ror.org/01b78mz79","country_code":"BR","type":"education","lineage":["https://openalex.org/I33501960"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Lu\u00eds Alvaro Silva","raw_affiliation_strings":["Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil"],"affiliations":[{"raw_affiliation_string":"Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]},{"raw_affiliation_string":"Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001819817","display_name":"Lisandra Manzoni Fontoura","orcid":"https://orcid.org/0000-0002-4669-1383"},"institutions":[{"id":"https://openalex.org/I33501960","display_name":"Universidade Federal de Santa Maria","ror":"https://ror.org/01b78mz79","country_code":"BR","type":"education","lineage":["https://openalex.org/I33501960"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Lisandra Fontoura","raw_affiliation_strings":["Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil"],"affiliations":[{"raw_affiliation_string":"Programa de Ps-Graduao em Cincia da Computao Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]},{"raw_affiliation_string":"Programa de P\u00f3s-Gradua\u00e7\u00e3o em Ci\u00eancia da Computa\u00e7\u00e3o Universidade Federal de Santa Maria -UFSM Santa Maria, Brasil","institution_ids":["https://openalex.org/I33501960"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025666286"],"corresponding_institution_ids":["https://openalex.org/I33501960"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20733775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2015","issue":null,"first_page":"314","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.7766495943069458},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.7308753728866577},{"id":"https://openalex.org/keywords/project-risk-management","display_name":"Project risk management","score":0.7136682271957397},{"id":"https://openalex.org/keywords/risk-management-plan","display_name":"Risk management plan","score":0.7084032893180847},{"id":"https://openalex.org/keywords/argumentative","display_name":"Argumentative","score":0.6359221935272217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6054885983467102},{"id":"https://openalex.org/keywords/it-risk-management","display_name":"IT risk management","score":0.5690869092941284},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5504438281059265},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5332638025283813},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.51806640625},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.47099369764328003},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4155963361263275},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3955824077129364},{"id":"https://openalex.org/keywords/project-management","display_name":"Project management","score":0.34134191274642944},{"id":"https://openalex.org/keywords/project-management-triangle","display_name":"Project management triangle","score":0.22418829798698425},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17363029718399048},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16756582260131836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14489176869392395},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.10083451867103577},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0857086181640625}],"concepts":[{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.7766495943069458},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.7308753728866577},{"id":"https://openalex.org/C37752577","wikidata":"https://www.wikidata.org/wiki/Q642369","display_name":"Project risk management","level":4,"score":0.7136682271957397},{"id":"https://openalex.org/C121297759","wikidata":"https://www.wikidata.org/wiki/Q7336284","display_name":"Risk management plan","level":4,"score":0.7084032893180847},{"id":"https://openalex.org/C2781306805","wikidata":"https://www.wikidata.org/wiki/Q4789761","display_name":"Argumentative","level":2,"score":0.6359221935272217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6054885983467102},{"id":"https://openalex.org/C95609273","wikidata":"https://www.wikidata.org/wiki/Q5975208","display_name":"IT risk management","level":3,"score":0.5690869092941284},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5504438281059265},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5332638025283813},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.51806640625},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.47099369764328003},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4155963361263275},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3955824077129364},{"id":"https://openalex.org/C15952604","wikidata":"https://www.wikidata.org/wiki/Q179012","display_name":"Project management","level":2,"score":0.34134191274642944},{"id":"https://openalex.org/C168074093","wikidata":"https://www.wikidata.org/wiki/Q2394609","display_name":"Project management triangle","level":3,"score":0.22418829798698425},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17363029718399048},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16756582260131836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14489176869392395},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.10083451867103577},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0857086181640625},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.18293/seke2015-122","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2015-122","pdf_url":"https://doi.org/10.18293/seke2015-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:repositorio.ufsm.br:1/5455","is_oa":true,"landing_page_url":"http://repositorio.ufsm.br/handle/1/5455","pdf_url":null,"source":{"id":"https://openalex.org/S4306402641","display_name":"LA Referencia (Red Federada de Repositorios Institucionales de Publicaciones Cient\u00edficas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4383465926","host_organization_name":"LA Referencia","host_organization_lineage":["https://openalex.org/I4383465926"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"instacron:UFSM","raw_type":"info:eu-repo/semantics/masterThesis"}],"best_oa_location":{"id":"doi:10.18293/seke2015-122","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2015-122","pdf_url":"https://doi.org/10.18293/seke2015-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2294839699.pdf","grobid_xml":"https://content.openalex.org/works/W2294839699.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1578957392","https://openalex.org/W1974936136","https://openalex.org/W2026286248","https://openalex.org/W2035731137","https://openalex.org/W2088426136","https://openalex.org/W2094441239","https://openalex.org/W2103175089","https://openalex.org/W2119078396","https://openalex.org/W2121835362","https://openalex.org/W2159080219","https://openalex.org/W2403069582","https://openalex.org/W2915095518","https://openalex.org/W2978952889"],"related_works":["https://openalex.org/W2290702339","https://openalex.org/W2769154894","https://openalex.org/W2965162099","https://openalex.org/W588430108","https://openalex.org/W1980848184","https://openalex.org/W4384212083","https://openalex.org/W2013365971","https://openalex.org/W791782957","https://openalex.org/W2185741609","https://openalex.org/W574755183"],"abstract_inverted_index":{"Risk":[0],"management":[1,36,110,122,163],"aims":[2],"to":[3,139,154],"discuss":[4],"the":[5,12,43,60,84,97,101,155,158],"probabilities":[6],"and":[7,92,103,132],"consequences":[8],"of":[9,14,45,62,87,105,157,161],"risks":[10,50],"on":[11,70],"goals":[13],"a":[15,71,115,120,146],"software":[16],"project.":[17],"In":[18],"such":[19],"projects,":[20],"there":[21],"are":[22,29,51,57,112],"dependence":[23],"relationships":[24],"between":[25],"risks,":[26],"although":[27],"they":[28],"not":[30,82],"treated":[31],"yet":[32],"by":[33,166],"standard":[34],"risk":[35,46,64,77,88,90,93,109,121,162],"practices.":[37],"This":[38,79],"paper":[39],"is":[40,68],"concerned":[41],"with":[42],"analysis":[44,91,160],"dependencies,":[47],"where":[48,125],"these":[49],"assessed":[52],"when":[53],"multiple":[54],"project":[55,167],"stakeholders":[56],"involved":[58],"in":[59,114,134,145],"development":[61],"collaborative":[63,76,98],"debates.":[65],"Our":[66],"approach":[67],"based":[69],"dialogue":[72],"game":[73],"protocol":[74,80],"for":[75,119],"management.":[78],"mediates":[81],"only":[83],"discussion":[85,123,140],"tasks":[86],"identification,":[89],"planning,":[94],"but":[95],"also":[96],"debate":[99],"regarding":[100],"identification":[102],"treatment":[104],"dependent":[106],"risks.":[107],"These":[108],"concepts":[111],"represented":[113],"Bayesian":[116],"network":[117],"model":[118,137],"situation,":[124],"alternative":[126],"simulation":[127],"scenarios":[128],"can":[129],"be":[130],"proposed":[131],"tested":[133],"this":[135,151],"probabilistic":[136],"according":[138],"participants'":[141],"requests.":[142],"As":[143],"observed":[144],"case":[147],"study,":[148],"results":[149],"from":[150],"process":[152],"lead":[153],"enhancement":[156],"argumentative":[159],"issues":[164],"developed":[165],"stakeholders.":[168]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
