Best practice project management: an analysis of the front end of the innovation process in the medical technology industry
暂无分享,去创建一个
[1] Richard L. Divine,et al. Creativity + business discipline = higher profits faster from new product development , 1999 .
[2] Erik Demeulemeester,et al. Resource-constrained project scheduling: A survey of recent developments , 1998, Comput. Oper. Res..
[3] Mario Vanhoucke,et al. An experimental investigation of metaheuristics for the multi-mode resource-constrained project scheduling problem on new dataset instances , 2014, Eur. J. Oper. Res..
[4] R. Cooper. Perspective: The Innovation Dilemma: How to Innovate When the Market Is Mature , 2011 .
[5] Rajiv Sabherwal,et al. The role of trust in outsourced IS development projects , 1999, CACM.
[6] R. González,et al. Information Systems Outsourcing Reasons and Risks: An Empirical Study , 2008 .
[7] Jeffrey Davidson,et al. Providing Clarity and A Common Language to the “Fuzzy Front End” , 2001 .
[8] Ortwin Renn,et al. Concepts of risk : a classification , 1992 .
[9] Mohammed H. A. Tafti,et al. Risks factors associated with offshore IT outsourcing , 2005, Ind. Manag. Data Syst..
[10] Marion G. Sobol,et al. IS outsourcing practices in the USA, Japan and Finland: a comparative study , 1997, J. Inf. Technol..
[11] D. R. Robinson. A Dynamic Programming Solution to Cost-Time Tradeoff for CPM , 1975 .
[12] B. Skiera,et al. Sourcing, Filtering, and Evaluating New Product Ideas: An Empirical Exploration of the Performance of Idea Markets , 2012 .
[13] Harilaos N. Psaraftis,et al. A Dynamic Programming Approach for Sequencing Groups of Identical Jobs , 1980, Oper. Res..
[14] Luís Amaral,et al. Outsourcing de Serviços de Sistemas De Informação na Banca em Portugal , 2015 .
[15] Robbie T. Nakatsu,et al. A risk profile of offshore-outsourced development projects , 2008, CACM.
[16] Leslie P. Willcocks,et al. IT outsourcing in insurance services: risk, creative contracting and business advantage , 1999, Inf. Syst. J..
[17] Bo Feng,et al. Identifying risk factors of IT outsourcing using interdependent information: An extended DEMATEL method , 2012, Expert Syst. Appl..
[18] Rinaldo Rinaldi,et al. Optimal resource leveling using non-serial dyanamic programming , 1994 .
[19] Elliot Maltz,et al. Is all communication created equal?: an investigation into the effects of communication mode on perceived information quality , 2000 .
[20] Eric K. Clemons,et al. Just Right Outsourcing: Understanding and Managing Risk , 2005, J. Manag. Inf. Syst..
[21] Paul Slovic,et al. Are trivial risks the greatest risks of all , 1999 .
[22] Sachidanandam Sakthivel,et al. Managing risk in offshore systems development , 2007, CACM.
[23] Amrik S. Sohal,et al. Best practice in product innovation at varian Australia , 2002 .
[24] Ralf Steinmetz,et al. European Conference on Information Systems ( ECIS ) Summer 10-6-2011 TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS : SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION , 2017 .
[25] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[26] Michael A. Chilton. Resource allocation in IT projects: using schedule optimization , 2014 .
[27] Leslie P. Willcocks,et al. IT outsourcing configuration: Research into defining and designing outsourcing arrangements , 2005, J. Strateg. Inf. Syst..
[28] Richard L. Divine,et al. CREATIVITY + BUSINESS DISCIPLINE = HIGHER PROFITS FASTER FROM NEW PRODUCT DEVELOPMENT , 1999 .
[29] B. Sauser,et al. Prioritization of outsourcing risks from a systemic perspective , 2012 .
[30] Donald D. Tippett,et al. Critical Success Factors for the Fuzzy Front End of Innovation in the Medical Device Industry , 2008 .
[31] Athanasios K. Tsakalidis,et al. From application service provision to service-oriented computing: A study of the IT outsourcing evolution , 2006, Telematics Informatics.
[32] U Dave,et al. Critical Chain , 1998, J. Oper. Res. Soc..
[33] Dale A. Howard,et al. Ultimate Study Guide: Foundations Microsoft Project 2013 , 2010 .
[34] Christina Ann Lacomb,et al. Examining Trader Behavior in Idea Markets: An Implementation of GE's Imagination Markets , 2012 .
[35] Leslie P. Willcocks,et al. The Relationship Advantage: Information Technologies, Sourcing, and Management , 2002 .
[36] Suzanne Rivard,et al. Assessing the risk of IT outsourcing , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[37] Akio Nagahira,et al. Reducing project related uncertainty in the “ fuzzy front end ” of innovation – A comparison of German and Japanese product innovation projects , 2003 .
[38] Richard Burns,et al. Business Research Methods and Statistics Using SPSS , 2008 .
[39] Heinz-Jürgen Boeddrich. Ideas in the Workplace: A New Approach Towards Organizing the Fuzzy Front End of the Innovation Process , 2004 .
[40] Subhankar Dhar,et al. Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices , 2006, J. Glob. Inf. Manag..
[41] E. Hippel,et al. Lead users: a source of novel product concepts , 1986 .
[42] Leslie P. Willcocks,et al. Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA , 1999, J. Strateg. Inf. Syst..
[43] Leslie P. Willcocks,et al. Application Service Provision: Risk Assessment and Mitigation , 2002, MIS Q. Executive.
[44] Jon-Arild Johannessen,et al. Aspects of innovation theory based on knowledge-management , 1999 .
[45] Janez Zerovnik,et al. Hybrid Local Search Techniques for the Resource-Constrained Project Scheduling Problem , 2007, Hybrid Metaheuristics.
[46] Robert C. Ash. Activity scheduling in the dynamic multi-project setting: choosing heuristics through deterministic simulation , 1999, WSC '99.
[47] Preston G. Smith,et al. Developing products in half the time , 1995 .
[48] Manish Agrawal,et al. Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects , 2007, IEEE Transactions on Software Engineering.
[49] Patrick De Causmaecker,et al. An automatic algorithm selection approach for the multi-mode resource-constrained project scheduling problem , 2014, Eur. J. Oper. Res..
[50] Kenneth B. Kahn,et al. PERSPECTIVE: Trends and Drivers of Success in NPD Practices: Results of the 2003 PDMA Best Practices Study* , 2009 .
[51] Amy Muller,et al. Beyond stage‐gate: restoring learning and adaptability to commercialization , 2012 .
[52] Willy Herroelen,et al. Identification and illumination of popular misconceptions about project scheduling and time buffering in a resource-constrained environment , 2005, J. Oper. Res. Soc..
[53] Jaak Jurison. The role of risk and return in information technology outsourcing decisions , 1995, J. Inf. Technol..
[54] R. W. Sierenberg. An Algorithm for the Line Balancing Problem , 1972 .
[55] Ronan McIvor,et al. What is the right outsourcing strategy for your process , 2008 .
[56] Rainer Kolisch. Resource Allocation Capabilities of Commercial Project Management Software Packages , 1999, Interfaces.
[57] Rosa Oppenheim,et al. Winning at New Products , 1990 .
[58] Wendy L. Currie,et al. Using multiple suppliers to mitigate the risk of IT outsourcing at ICI and Wessex Water , 1998, J. Inf. Technol..
[59] R. Ryan Nelson,et al. IT Project Management: Infamous Failures, Classic Mistakes, and Best Practices , 2007, MIS Q. Executive.
[60] Wendy L. Currie,et al. From Application Outsourcing to Infrastructure Management:: Extending the Offshore Outsourcing Service Portfolio , 2005 .
[61] S. R. Rosenthal,et al. Integrating the Fuzzy Front End of New Product Development , 1997 .
[62] L. Giddings. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 2d ed , 2005 .
[63] R. Cooper,et al. Winning Businesses in Product Development: The Critical Success Factors , 1996 .
[64] R. Cooper,et al. Benchmarking Best NPD Practices—II , 2004 .
[65] Kok Lay Teo,et al. A review of methods and algorithms for optimizing construction scheduling , 2013, J. Oper. Res. Soc..
[66] L. Zurich,et al. Operations Research in Production Planning, Scheduling, and Inventory Control , 1974 .
[67] Matilda Alexandrova,et al. IT Outsourcing Risks: Empirical Evidence from Bulgarian Service Providers , 2012 .
[68] Edward W. Davis,et al. A Comparison of Heuristic and Optimum Solutions in Resource-Constrained Project Scheduling , 1975 .
[69] Jerome D. Wiest. Some Properties of Schedules for Large Projects with Limited Resources , 1964 .
[70] M. Held,et al. A dynamic programming approach to sequencing problems , 1962, ACM National Meeting.
[71] Bandula Jayatilaka,et al. Information systems outsourcing: a survey and analysis of the literature , 2004, DATB.
[72] F. Knight. The economic nature of the firm: From Risk, Uncertainty, and Profit , 2009 .
[73] Rainer Kolisch. Serial and parallel resource-constrained project scheduling methods revisited: Theory and computation , 1994 .
[74] Howard B. Lee,et al. Foundations of Behavioral Research , 1973 .
[75] Gary R. Schirr. Flawed Tools: The Efficacy of Group Research Methods to Generate Customer Ideas , 2012 .
[76] Rainer Kolisch,et al. Approximate Dynamic Programming for Capacity Allocation in the Service Industry , 2010, Eur. J. Oper. Res..
[77] B. Bahli,et al. Validating measures of information technology outsourcing risk factors , 2005 .
[78] Edward W. Davis,et al. An Algorithm for Optimal Project Scheduling under Multiple Resource Constraints , 1971 .
[79] Madhuchhanda Das Aundhe,et al. Risks in offshore IT outsourcing: A service provider perspective , 2009 .
[80] Marion G. Sobol,et al. IS outsourcing practices in the USA, Japan and Finland: a comparative study , 1997, J. Inf. Technol..
[81] Dale F. Cooper,et al. Heuristics for Scheduling Resource-Constrained Projects: An Experimental Investigation , 1976 .
[82] Lili Marziana Abdullah,et al. Analysis and application of an outsourcing risk framework , 2012, J. Syst. Softw..
[83] Leslie P. Willcocks,et al. A review of the IT outsourcing literature: Insights for practice , 2009, J. Strateg. Inf. Syst..
[84] Nik Zulkarnaen Khidzir,et al. ICT Outsourcing Information Security Risk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics , 2013 .
[85] José L. Gascó,et al. Information systems outsourcing risks: a study of large firms , 2005, Ind. Manag. Data Syst..
[86] Suzanne Rivard,et al. The information technology outsourcing risk: a transaction cost and agency theory-based perspective , 2003, J. Inf. Technol..
[87] Phyllis J. Johnson,et al. Qualitative and Quantitative Issues in Research Design , 2002 .
[88] Robin L. Wakefield,et al. Measuring switching costs in IT outsourcing services , 2006, J. Strateg. Inf. Syst..
[89] Miguel P Caldas,et al. Research design: qualitative, quantitative, and mixed methods approaches , 2003 .
[90] P. Kidwell,et al. The mythical man-month: Essays on software engineering , 1996, IEEE Annals of the History of Computing.
[91] David Wilemon,et al. Focusing the Fuzzy Front-End in New Product Development , 2002 .
[92] M. J. Earl,et al. The Risks of Outsourcing IT , 1996 .
[93] Kathryn Cormican,et al. Auditing best practice for effective product innovation management , 2004 .
[94] William H. Glick,et al. Typologies As a Unique Form Of Theory Building: Toward Improved Understanding and Modeling , 1994 .
[95] David C. Chou,et al. Information systems outsourcing life cycle and risks analysis , 2009, Comput. Stand. Interfaces.
[96] Charles R. Hildreth,et al. Accounting for users' inflated assessments of on-line catalogue search performance and usefulness: an experimental study , 2001, Inf. Res..
[97] J. D. Wiest,et al. Management Guide to PERT/CPM , 1969 .
[98] Julia Rieck,et al. Mixed-integer linear programming for resource leveling problems , 2012, Eur. J. Oper. Res..