Pub Date : 2021-10-01DOI: 10.4018/IJITPM.2021100105
V. Muthukumaran, V. Vinothkumar, Rose Bindu Joseph, Meram Munirathanam, B. Jeyakumar
Defending all single connection failures for a particular system, segment routing issue, the switch will focus on the problems of selecting a small subset of trust-aware routing to improve the deep learning (DL). In the end, even if there were multiple path failures, these paths may introduce long-term, unnecessary overload in the proposed long short-term memory networks-based queuing routing segmentation (LSTM-QRS) experience of reducing traffic delays and adjusting traffic length by reducing network bandwidth. The critical factor is a novel traffic repair technique used to create a traffic repair path that switches to software-defined network (SDN) using multiple routing and providing additional flexibility in re-routing using long short-term memory networks (LSTM)-based queuing routing segment (LSTM-QRS) algorithms. It reduces the repair path length and recommends replacing the target-based traffic with the connection-based traffic fault detection router to avoid targeted traffic network congestion.
{"title":"Improving Network Security Based on Trust-Aware Routing Protocols Using Long Short-Term Memory-Queuing Segment-Routing Algorithms","authors":"V. Muthukumaran, V. Vinothkumar, Rose Bindu Joseph, Meram Munirathanam, B. Jeyakumar","doi":"10.4018/IJITPM.2021100105","DOIUrl":"https://doi.org/10.4018/IJITPM.2021100105","url":null,"abstract":"Defending all single connection failures for a particular system, segment routing issue, the switch will focus on the problems of selecting a small subset of trust-aware routing to improve the deep learning (DL). In the end, even if there were multiple path failures, these paths may introduce long-term, unnecessary overload in the proposed long short-term memory networks-based queuing routing segmentation (LSTM-QRS) experience of reducing traffic delays and adjusting traffic length by reducing network bandwidth. The critical factor is a novel traffic repair technique used to create a traffic repair path that switches to software-defined network (SDN) using multiple routing and providing additional flexibility in re-routing using long short-term memory networks (LSTM)-based queuing routing segment (LSTM-QRS) algorithms. It reduces the repair path length and recommends replacing the target-based traffic with the connection-based traffic fault detection router to avoid targeted traffic network congestion.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rich spectral and spatial information of hyperspectral images are well known in the literature. The higher dimensionality of HSI creates Hughes's effect and increased computational complexity. This demands reduction for HS images as a pre-processing step. The necessary reduction of bands can be achieved by a proper band selection (BS) technique. The proposed features based unsupervised BS technique follows three subsequent steps: 1) for each band image statistical features are extracted, 2) bands are clustered with a k-means approach using the extracted features, 3) each cluster is ranked using mean entropy measure, 4) bad clusters are removed, and 5) for each selected cluster, a representative band is selected. The proposed method is validated over three widely used standard datasets and six state-of-the-art approaches using an ensemble of binary SVM classifiers. The obtained results strongly suggest the clustering is essential to reduce the redundancy, and removal of cluster is informative to keep the informative bands.
{"title":"Featured Clustering and Ranking-Based Bad Cluster Removal for Hyperspectral Band Selection and Classification Using Ensemble of Binary SVM Classifiers","authors":"Kishore Raju Kalidindi, Pardha Saradhi Varma Gottumukkala, Rajyalakshmi Davuluri","doi":"10.4018/IJITPM.2021100106","DOIUrl":"https://doi.org/10.4018/IJITPM.2021100106","url":null,"abstract":"The rich spectral and spatial information of hyperspectral images are well known in the literature. The higher dimensionality of HSI creates Hughes's effect and increased computational complexity. This demands reduction for HS images as a pre-processing step. The necessary reduction of bands can be achieved by a proper band selection (BS) technique. The proposed features based unsupervised BS technique follows three subsequent steps: 1) for each band image statistical features are extracted, 2) bands are clustered with a k-means approach using the extracted features, 3) each cluster is ranked using mean entropy measure, 4) bad clusters are removed, and 5) for each selected cluster, a representative band is selected. The proposed method is validated over three widely used standard datasets and six state-of-the-art approaches using an ensemble of binary SVM classifiers. The obtained results strongly suggest the clustering is essential to reduce the redundancy, and removal of cluster is informative to keep the informative bands.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"66 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114023737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJITPM.2021100104
J. Balaraju, P. Rao
This paper proposes a novel node management for the distributed system using DNA hiding and generating a unique key by combing a unique physical address (MAC) of node and hostname. This mechanism provides better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The objective of this paper is to design an algorithm to implement node-sensitive data hiding using DNA sequences and provide security to the node and its data from hackers.
{"title":"A Novel Node Management in Hadoop Cluster by Using DNA","authors":"J. Balaraju, P. Rao","doi":"10.4018/IJITPM.2021100104","DOIUrl":"https://doi.org/10.4018/IJITPM.2021100104","url":null,"abstract":"This paper proposes a novel node management for the distributed system using DNA hiding and generating a unique key by combing a unique physical address (MAC) of node and hostname. This mechanism provides better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The objective of this paper is to design an algorithm to implement node-sensitive data hiding using DNA sequences and provide security to the node and its data from hackers.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123900646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/IJITPM.2021100101
Subba Reddy Meruva, B. Venkateswarlu
Association rule defines the relationship among the items and discovers the frequent items using a support-confidence framework. This framework establishes user-interested or strong association rules with two thresholds (i.e., minimum support and minimum confidence). Traditional association rule mining methods (i.e., apriori and frequent pattern growth [FP-growth]) are widely used for discovering of frequent itemsets, and limitation of these methods is that they are not considering the key factors of the items such as profit, quantity, or cost of items during the mining process. Applications like e-commerce, marketing, healthcare, and web recommendations, etc. consist of items with their utility or profit. Such cases, utility-based itemsets mining methods, are playing a vital role in the generation of effective association rules and are also useful in the mining of high utility itemsets. This paper presents the survey on high-utility itemsets mining methods and discusses the observation study of existing methods with their experimental study using benchmarked datasets.
{"title":"Review of Association Mining Methods for the Extraction of Rules Based on the Frequency and Utility Factors","authors":"Subba Reddy Meruva, B. Venkateswarlu","doi":"10.4018/IJITPM.2021100101","DOIUrl":"https://doi.org/10.4018/IJITPM.2021100101","url":null,"abstract":"Association rule defines the relationship among the items and discovers the frequent items using a support-confidence framework. This framework establishes user-interested or strong association rules with two thresholds (i.e., minimum support and minimum confidence). Traditional association rule mining methods (i.e., apriori and frequent pattern growth [FP-growth]) are widely used for discovering of frequent itemsets, and limitation of these methods is that they are not considering the key factors of the items such as profit, quantity, or cost of items during the mining process. Applications like e-commerce, marketing, healthcare, and web recommendations, etc. consist of items with their utility or profit. Such cases, utility-based itemsets mining methods, are playing a vital role in the generation of effective association rules and are also useful in the mining of high utility itemsets. This paper presents the survey on high-utility itemsets mining methods and discusses the observation study of existing methods with their experimental study using benchmarked datasets.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070105
A. Al-Refaie, Ala Qapaja, Ahmad Al-Hawadi
This research proposed optimization models for task scheduling and sequencing in work-intensive multiple projects under normal and unexpected events. The objectives of scheduling model were minimizing the total overtime/under-time costs and maximizing satisfaction values on tasks due dates and processing standard times. Further, the sequencing model aimed to minimize the sum of tasks' start times, maximize resource utilization, and maximize satisfaction on project completion times. Illustrations of the proposed scheduling and sequencing optimization models were provided where the results showed effective scheduling and sequencing of project tasks at minimal costs and achieved the desired satisfaction levels on tasks and projects and significantly enhanced resource efficiency at minimal overtime and under-time costs. Further, optimization models were modified to deal with unexpected events. In conclusion, the proposed models may support project managers in planning project tasks in a cost-effective manner under normal and unexpected events.
{"title":"Optimal Fuzzy Scheduling and Sequencing of Work-Intensive Multiple Projects Under Normal and Unexpected Events","authors":"A. Al-Refaie, Ala Qapaja, Ahmad Al-Hawadi","doi":"10.4018/IJITPM.2021070105","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070105","url":null,"abstract":"This research proposed optimization models for task scheduling and sequencing in work-intensive multiple projects under normal and unexpected events. The objectives of scheduling model were minimizing the total overtime/under-time costs and maximizing satisfaction values on tasks due dates and processing standard times. Further, the sequencing model aimed to minimize the sum of tasks' start times, maximize resource utilization, and maximize satisfaction on project completion times. Illustrations of the proposed scheduling and sequencing optimization models were provided where the results showed effective scheduling and sequencing of project tasks at minimal costs and achieved the desired satisfaction levels on tasks and projects and significantly enhanced resource efficiency at minimal overtime and under-time costs. Further, optimization models were modified to deal with unexpected events. In conclusion, the proposed models may support project managers in planning project tasks in a cost-effective manner under normal and unexpected events.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070104
Qiong Wu, K. Cormican, Suzana Sampaio
Shared leadership refers to an emergent, collective team process where leadership is distributed among and stems from team members, rather than a single designated leader. While shared leadership has gained considerable attention in the literature in recent years, it has received little attention in information systems (IS) project teams. In this study, a theoretical moderation framework in IS project teams that portrays the positive relationship between shared leadership and IS project success is presented. Moreover, project-centered moderators (i.e., project complexity and project task interdependence) and team-centered moderators (i.e., team autonomy and team supportive culture) have been proposed to influence the shared leadership-IS project success relationship. This study proposes that this relationship is stronger when projects are more complex and more interdependent, and when teams have a higher level of autonomy and supportive culture.
{"title":"Shared Leadership: Towards a Theoretical Moderation Framework in Information Systems Project Teams","authors":"Qiong Wu, K. Cormican, Suzana Sampaio","doi":"10.4018/IJITPM.2021070104","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070104","url":null,"abstract":"Shared leadership refers to an emergent, collective team process where leadership is distributed among and stems from team members, rather than a single designated leader. While shared leadership has gained considerable attention in the literature in recent years, it has received little attention in information systems (IS) project teams. In this study, a theoretical moderation framework in IS project teams that portrays the positive relationship between shared leadership and IS project success is presented. Moreover, project-centered moderators (i.e., project complexity and project task interdependence) and team-centered moderators (i.e., team autonomy and team supportive culture) have been proposed to influence the shared leadership-IS project success relationship. This study proposes that this relationship is stronger when projects are more complex and more interdependent, and when teams have a higher level of autonomy and supportive culture.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070103
Habiba Shah, Syed Danial Hashmi, Iram Naz
Using evolutionary perspective of gossip and knowledge-based view, the study proposes knowledge sharing behaviour as the underlying mechanism that helps in establishing the relationship between positive workplace gossip and success of IT projects. The study used multi-source and multi-layered data collection technique; data were collected from 304 employees working in information technology (IT) projects within Pakistan. The study used peer reports for knowledge sharing behaviour, while gossip and project success were self-reported. Results of the study show that positive workplace gossip has a positive relation with project success. The study also found support of partial mediation of knowledge sharing behaviour between positive workplace gossip and project success. These results have crucial implications for policy makers and project managers of IT projects. The findings reveal the importance of informal social networks of project team members towards project success. Managers shall device such mechanisms that allow for propagation of informal networks and knowledge sharing. Keywords Critical Success Factors, Information Technology Projects, Knowledge Sharing Behaviour, Positive Workplace Gossip, Project Success.
{"title":"Proposing Knowledge Sharing as a Mediator Between Positive Gossip and Success of IT Projects","authors":"Habiba Shah, Syed Danial Hashmi, Iram Naz","doi":"10.4018/IJITPM.2021070103","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070103","url":null,"abstract":"Using evolutionary perspective of gossip and knowledge-based view, the study proposes knowledge sharing behaviour as the underlying mechanism that helps in establishing the relationship between positive workplace gossip and success of IT projects. The study used multi-source and multi-layered data collection technique; data were collected from 304 employees working in information technology (IT) projects within Pakistan. The study used peer reports for knowledge sharing behaviour, while gossip and project success were self-reported. Results of the study show that positive workplace gossip has a positive relation with project success. The study also found support of partial mediation of knowledge sharing behaviour between positive workplace gossip and project success. These results have crucial implications for policy makers and project managers of IT projects. The findings reveal the importance of informal social networks of project team members towards project success. Managers shall device such mechanisms that allow for propagation of informal networks and knowledge sharing. Keywords Critical Success Factors, Information Technology Projects, Knowledge Sharing Behaviour, Positive Workplace Gossip, Project Success.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070106
Stefan Morcov, L. Pintelon, R. Kusters
Complexity is ubiquitous in modern engineering and project management. It is traditionally associated with failure. Also, complexity works! It delivers functionality, creativity, innovation. Complexity management contributes to the success of high-risk IT projects, helps better project understanding, allows for better prioritization and planning of resources. Managing negative complexity reduces project risk. Positive and appropriate complexity are catalysts for opportunities. This paper is a qualitative longitudinal study based on multiple industry project cases, consisting in the repeated evaluation of a set of complexity management tools. The tools were deployed in a classical process framework: plan, identify, analyze, plan responses, monitor, and control. The evaluated tools red-flag and measure complexity, analyze its sources and effects, and plan mitigation strategies. The study aims to provide project managers with methods for increasing project success rates and reducing failure in complex IT project environments.
{"title":"A Practical Assessment of Modern IT Project Complexity Management Tools: Taming Positive, Appropriate, Negative Complexity","authors":"Stefan Morcov, L. Pintelon, R. Kusters","doi":"10.4018/IJITPM.2021070106","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070106","url":null,"abstract":"Complexity is ubiquitous in modern engineering and project management. It is traditionally associated with failure. Also, complexity works! It delivers functionality, creativity, innovation. Complexity management contributes to the success of high-risk IT projects, helps better project understanding, allows for better prioritization and planning of resources. Managing negative complexity reduces project risk. Positive and appropriate complexity are catalysts for opportunities. This paper is a qualitative longitudinal study based on multiple industry project cases, consisting in the repeated evaluation of a set of complexity management tools. The tools were deployed in a classical process framework: plan, identify, analyze, plan responses, monitor, and control. The evaluated tools red-flag and measure complexity, analyze its sources and effects, and plan mitigation strategies. The study aims to provide project managers with methods for increasing project success rates and reducing failure in complex IT project environments.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070101
Naela Bahurmuz, Rishaa Alnajim, Rasha Al-Mutairi, Zainab Al-Shingiti, F. Saleem, Bahjat Fakieh
The common view of requirements engineering consists of requirement elicitation, specification, validation, and evolution. Requirement elicitation is a significant stage to assure the quality of the requirement documentations and would affect the project success or failure. There are different techniques to elicit the requirements. Each technique has its advantages and disadvantages. Thus, it is important to adopt more than one kind of technique to describe a system clearly from different viewpoints. This study prospected some of the research papers in the same field to display the requirements elicitation techniques that are used in developing mobile applications from a variety of research disciplines. It suggests some requirements elicitation concepts to guide software engineers in selecting the techniques according to customers' needs and to show the common challenges that they face.
{"title":"Requirements Elicitation Techniques in Mobile Applications: A Systematic Literature Review","authors":"Naela Bahurmuz, Rishaa Alnajim, Rasha Al-Mutairi, Zainab Al-Shingiti, F. Saleem, Bahjat Fakieh","doi":"10.4018/IJITPM.2021070101","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070101","url":null,"abstract":"The common view of requirements engineering consists of requirement elicitation, specification, validation, and evolution. Requirement elicitation is a significant stage to assure the quality of the requirement documentations and would affect the project success or failure. There are different techniques to elicit the requirements. Each technique has its advantages and disadvantages. Thus, it is important to adopt more than one kind of technique to describe a system clearly from different viewpoints. This study prospected some of the research papers in the same field to display the requirements elicitation techniques that are used in developing mobile applications from a variety of research disciplines. It suggests some requirements elicitation concepts to guide software engineers in selecting the techniques according to customers' needs and to show the common challenges that they face.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJITPM.2021070102
K. Strang
Project manager (PM) certification and other commonly-tested independent factors were deductively examined using logistic regression to develop an explanatory model of high-priced public procurement project success versus failure. Overall 59% were successful, and 41% failed. The model correctly classified 67.3% of the 2,692 projects, yielding a significant 12% effect size. Individual factors, PM experience, certification, and contractor quality, impacted performance, but contractor size, revenue, industry type, PM age, gender, and education had negligible effect on performance. Quality was in the opposite hypothesized direction. Certified PMs were more likely to achieve successful projects rather than encounter failures. Future research advice was offered.
{"title":"Which Organizational and Individual Factors Predict Success vs. Failure in Procurement Projects","authors":"K. Strang","doi":"10.4018/IJITPM.2021070102","DOIUrl":"https://doi.org/10.4018/IJITPM.2021070102","url":null,"abstract":"Project manager (PM) certification and other commonly-tested independent factors were deductively examined using logistic regression to develop an explanatory model of high-priced public procurement project success versus failure. Overall 59% were successful, and 41% failed. The model correctly classified 67.3% of the 2,692 projects, yielding a significant 12% effect size. Individual factors, PM experience, certification, and contractor quality, impacted performance, but contractor size, revenue, industry type, PM age, gender, and education had negligible effect on performance. Quality was in the opposite hypothesized direction. Certified PMs were more likely to achieve successful projects rather than encounter failures. Future research advice was offered.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}