{"title":"分析与结果","authors":"E. Abela, Dimitris","doi":"10.4018/978-1-5225-8389-9.ch003","DOIUrl":null,"url":null,"abstract":"This chapter makes available the analysis of collected information for the sole reason of research. It has been prepared for the conduct of secondary research that shapes an appropriate way for the purpose of primary research framework. Then the information collected by virtue of several conducted interviews was examined and analyzed. Hence, the chapter develops the basis of the platform on which the discussion is founded. In the last section of this chapter, the authors presented the trustworthiness of evidence of their research work.","PeriodicalId":132099,"journal":{"name":"Knowledge Management Techniques for Risk Management in IT Projects","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis and Results\",\"authors\":\"E. Abela, Dimitris\",\"doi\":\"10.4018/978-1-5225-8389-9.ch003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter makes available the analysis of collected information for the sole reason of research. It has been prepared for the conduct of secondary research that shapes an appropriate way for the purpose of primary research framework. Then the information collected by virtue of several conducted interviews was examined and analyzed. Hence, the chapter develops the basis of the platform on which the discussion is founded. In the last section of this chapter, the authors presented the trustworthiness of evidence of their research work.\",\"PeriodicalId\":132099,\"journal\":{\"name\":\"Knowledge Management Techniques for Risk Management in IT Projects\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Knowledge Management Techniques for Risk Management in IT Projects\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-5225-8389-9.ch003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge Management Techniques for Risk Management in IT Projects","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-8389-9.ch003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This chapter makes available the analysis of collected information for the sole reason of research. It has been prepared for the conduct of secondary research that shapes an appropriate way for the purpose of primary research framework. Then the information collected by virtue of several conducted interviews was examined and analyzed. Hence, the chapter develops the basis of the platform on which the discussion is founded. In the last section of this chapter, the authors presented the trustworthiness of evidence of their research work.