2023
DOI: 10.1061/jcemd4.coeng-12588
|View full text |Cite
|
Sign up to set email alerts
|

Ex Post Project Risk Assessment: Method and Empirical Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…2.7 Enables a safe and productive construction environment According to Adekunle et al (2022a) and Erfani et al (2023), the need of every construction company is to satisfy the client this can be achieved through improved services and information or DM. This is justified by the fact that the use of DRM will allow the continuous application of 4IR tools that are known to improve productivity on construction sites.…”
Section: Construction Data Risks Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…2.7 Enables a safe and productive construction environment According to Adekunle et al (2022a) and Erfani et al (2023), the need of every construction company is to satisfy the client this can be achieved through improved services and information or DM. This is justified by the fact that the use of DRM will allow the continuous application of 4IR tools that are known to improve productivity on construction sites.…”
Section: Construction Data Risks Managementmentioning
confidence: 99%
“…Among the threats, are unauthorised access to the information system, software and maintenance errors, human and natural disasters, manipulation of data, espionage, loss of support services, wrong data entry, vandalism and theft, terrorism, user error, earthquakes, loss of electricity supply, information leakage, all of which have affected many sectors, including the CI. The vulnerabilities include cybersecurity negligence on the physical (hardware, employee), internet and software level such as inadequate control of physical access, lack of backup system, uncontrolled use of information, non-protection of hardware, unmotivated, lack of workers training, uncontrolled download from the internet among others (Sultanate of Oman Information Technology Authority, 2017; Cains et al, 2021;Talha et al, 2019;Tanga et al, 2022a;Zhao, 2023;Erfani et al, 2023). All these can be cured via the installation of a DM process.…”
Section: Introductionmentioning
confidence: 99%