{"title":"Analysis and Results","authors":"E. Abela, Dimitris","doi":"10.4018/978-1-5225-8389-9.ch003","DOIUrl":"https://doi.org/10.4018/978-1-5225-8389-9.ch003","url":null,"abstract":"This chapter makes available the analysis of collected information for the sole reason of research. It has been prepared for the conduct of secondary research that shapes an appropriate way for the purpose of primary research framework. Then the information collected by virtue of several conducted interviews was examined and analyzed. Hence, the chapter develops the basis of the platform on which the discussion is founded. In the last section of this chapter, the authors presented the trustworthiness of evidence of their research work.","PeriodicalId":132099,"journal":{"name":"Knowledge Management Techniques for Risk Management in IT Projects","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Methodology","authors":"S. Rajasekar, P. Philominathan, V. Chinnathambi","doi":"10.4018/978-1-5225-8389-9.ch002","DOIUrl":"https://doi.org/10.4018/978-1-5225-8389-9.ch002","url":null,"abstract":"The purpose of this study using the qualitative approach was to discover the gap that exists among the uses of PM, RM, and KM tools and techniques used in various IT projects. The primary objective of the current chapter was to propose an appropriate research methodology practiced for assessing and examining KM, RM, and PM during the undertaking the IT projects as well as to comprehend by what means KM and RM become a part of PM.","PeriodicalId":132099,"journal":{"name":"Knowledge Management Techniques for Risk Management in IT Projects","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121287121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}