2022
DOI: 10.1016/j.knosys.2021.107600
|View full text |Cite
|
Sign up to set email alerts
|

A bilevel whale optimization algorithm for risk management scheduling of information technology projects considering outsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 37 publications
0
15
0
Order By: Relevance
“…With the rapid development and widespread application of information technology, people are increasingly relying on networks and various communication channels for data transmission and information exchange [1][2]. However, these networks and communication channels are also prone to various security threats and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development and widespread application of information technology, people are increasingly relying on networks and various communication channels for data transmission and information exchange [1][2]. However, these networks and communication channels are also prone to various security threats and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The highly random flight mechanism allows individuals to explore the entire solution space as much as possible, so the population exhibits good diversity, but it also leads to poor local exploitation ability and slow convergence speed of the algorithm. Furthermore, when dealing with complex optimization problems, CS algorithm, like other evolutionary computation methods 7 , 8 , also has the problem of low search efficiency. Therefore, many scholars have conducted extensive research to enhance the convergence performance of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…, 2023), business ideas and innovation from their suppliers (Effah and Adam, 2022), vendor legitimacy (Hsu et al. , 2022), control the schedule risks (Lu et al. , 2022), information security (Bhatti et al ., 2021) and knowledge transfer in the relationship (Deng et al.…”
Section: Introductionmentioning
confidence: 99%
“…Recent research on IT outsourcing highlights that contractors face critical situations in their relationship with suppliers, including factors such as: process integration and information sharing (Navarro-Paule et al, 2023), business ideas and innovation from their suppliers (Effah and Adam, 2022), vendor legitimacy (Hsu et al, 2022), control the schedule risks (Lu et al, 2022), information security (Bhatti et al, 2021) and knowledge transfer in the relationship (Deng et al, 2021). Nevertheless, it is still unclear which characteristics of IT managers can be fundamental to impact Relational Governance (RG) in IT outsourcing positively.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation