<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232011000300012</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Ranking risks in ambient intelligence projects]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salmerón]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Pablo de Olavide  ]]></institution>
<addr-line><![CDATA[Sevilla ]]></addr-line>
<country>España</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2011</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2011</year>
</pub-date>
<volume>9</volume>
<numero>3</numero>
<fpage>419</fpage>
<lpage>429</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232011000300012&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232011000300012&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232011000300012&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[At present, numerous ambient intelligent (AmI) applications are emerging which support current electronic and digital environments. Professionals develop each of them by means of projects. AmI application projects have certain features that make them different from other engineering projects. Moreover, a wide rage of risks are present in the whole project. Therefore, to increase these projects' chances to be successful, it is necessary to manage their specific risks adequately. In order to support the work of those practitioners managing these threats, this research proposes a multicriteria decision-making methodology called Analytic Hierarchy Process. This technique will enable the prioritization of risks in Ami projects according to their level of threat.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Hoy en día se están desarrollando numerosos sistemas de inteligencia ambiental (AmI) que soportan los actuales entornos electrónicos y digitales. Los profesionales desarrollan estas aplicaciones por medio de proyectos, los cuales tienen ciertas características que los diferencian de otros proyectos de ingeniería; además, una gran variedad de riesgos están presentes, amenazando su ejecución y resultado final. Por lo tanto, para aumentar la probabilidad de que estos proyectos culminen exitosamente, es necesario gestionar adecuadamente los riesgos que los amenazan. Con el fin de facilitar a los profesionales la labor de gestión de estos riesgos, esta investigación propone la aplicación de una metodología de decisión multicriterio, denominada AHP. Esta técnica nos permitirá priorizar los riesgos existentes en los proyectos de AmI de acuerdo con su nivel de amenaza.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[AmI applications]]></kwd>
<kwd lng="en"><![CDATA[risk management]]></kwd>
<kwd lng="en"><![CDATA[multicriteria decision-making methodology]]></kwd>
<kwd lng="en"><![CDATA[software development]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Ranking risks in ambient intelligence projects</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>C. L&oacute;pez*<sup>1</sup>, J. L. Salmer&oacute;n<sup>2</sup></b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>1,2</sup> Universidad Pablo de Olavide, Ctra. de Utrera, km. 1, 41013, Sevilla, Espa&ntilde;a. *E&#150;mail:</i> <a href="mailto:clopvar@upo.es">clopvar@upo.es</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">At present, numerous ambient intelligent (AmI) applications are emerging which support current electronic and digital environments. Professionals develop each of them by means of projects. AmI application projects have certain features that make them different from other engineering projects. Moreover, a wide rage of risks are present in the whole project. Therefore, to increase these projects' chances to be successful, it is necessary to manage their specific risks adequately. In order to support the work of those practitioners managing these threats, this research proposes a multicriteria decision&#150;making methodology called Analytic Hierarchy Process. This technique will enable the prioritization of risks in Ami projects according to their level of threat.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> AmI applications, risk management, multicriteria decision&#150;making methodology, software development.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>RESUMEN</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Hoy en d&iacute;a se est&aacute;n desarrollando numerosos sistemas de inteligencia ambiental (AmI) que soportan los actuales entornos electr&oacute;nicos y digitales. Los profesionales desarrollan estas aplicaciones por medio de proyectos, los cuales tienen ciertas caracter&iacute;sticas que los diferencian de otros proyectos de ingenier&iacute;a; adem&aacute;s, una gran variedad de riesgos est&aacute;n presentes, amenazando su ejecuci&oacute;n y resultado final. Por lo tanto, para aumentar la probabilidad de que estos proyectos culminen exitosamente, es necesario gestionar adecuadamente los riesgos que los amenazan. Con el fin de facilitar a los profesionales la labor de gesti&oacute;n de estos riesgos, esta investigaci&oacute;n propone la aplicaci&oacute;n de una metodolog&iacute;a de decisi&oacute;n multicriterio, denominada AHP. Esta t&eacute;cnica nos permitir&aacute; priorizar los riesgos existentes en los proyectos de AmI de acuerdo con su nivel de amenaza.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v9n3/v9n3a12.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>         <p align="justify"><font face="verdana" size="2"><b><i>Acknowledgments</i></b></font></p>         <p align="justify"><font size="2" face="verdana">The authors wish to thank the Spanish Ministry of Science and Technology (MICINN&#150;ECO2009.12853) and the Andalusian Regional Goverment (CICE&#150;P07&#150;SEJ&#150;03080) for their financial support.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; Helal A, Mann W., El&#150;Zabadani H., King J., Kaddoura Y., Jansen E., The gator tech smart house: A programmable pervasive space, IEEE Computer, Vol. 38, No. 3, 2005, pp. 50&#150;60.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827098&pid=S1665-6423201100030001200001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; Rakotonirainy A., Tay R., In&#150;vehicle ambient intelligent transport systems (i&#150;vaits): Towards an integrated research, 7th international IEEE Conference on intelligent Transportation Systems, 2004, pp. 648&#150;&#150;651. Washington DC, EEUU.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827100&pid=S1665-6423201100030001200002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Shi Y., Xie W., Xu G., Shi R., Chen E., Mao Y., Liu F., The smart classroom: Merging technologies for seamless tele&#150;education, IEEE Pervasive Computing, Vol. 2, No. 2, 2003, pp. 47&#150;55.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827102&pid=S1665-6423201100030001200003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; Isern D., S&aacute;nchez D., Moreno A., Agents applied in health care: A review, international Journal of Medical informatics, Vol. 79, No. 3, 2010, pp. 145&#150;166.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827104&pid=S1665-6423201100030001200004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; Gadzheva M., Privacy in the Age of Transparency, Social Science Computer Review, Vol. 26, No. 1, 2008, pp. 60&#150;74.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827106&pid=S1665-6423201100030001200005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; Cooka D.J., Augusto J.C., Jakkula V.R., Ambient intelligence: Technologies, applications, and opportunities, Pervasive and Mobile Computing, Vol. 5, No. 4, 2009, pp. 277&#150;298.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827108&pid=S1665-6423201100030001200006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Vrana I., Aly S., Conceptual models for managerial ambient intelligence, 2th international Ambient intelligence Forum, 2009, pp. 53&#150;63, Prague, Czech Republic.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827110&pid=S1665-6423201100030001200007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; Augusto, J.C., McCullagh, P., Ambient intelligence: Concepts and Applications, Computer Science and information Systems, Vol. 4, No. 1, 2007, pp. 1&#150;28.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827112&pid=S1665-6423201100030001200008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; Raisinghani, M., Benoit, A., Ding, J., Gomez, M., Gupta, K., Gusila, V., Power, D., Schmedding, O., Ambient intelligence: Changing forms of human&#150;computer interaction and their social implications, Journal of digital information, Vol. 5, No. 4, 2004, p. 271.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827114&pid=S1665-6423201100030001200009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; Dorofee A.J., Walker J.A., Alberts C.J., Higuera R.P., Murphy R.L., Williams R.C., Continuous risks management guidebook, Software Engineering institute (SEI), 1996, Pittsburgh, EEUU.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827116&pid=S1665-6423201100030001200010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; Saaty T.L., The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation, McGraw&#150;Hill, 1980, New York, EEUU.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827118&pid=S1665-6423201100030001200011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Saaty T.L., A scaling method for priorities in hierarchical structures, Journal of Mathematical Psychology, Vol. 15, No. 3, 1977, pp. 234&#150;281.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827120&pid=S1665-6423201100030001200012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; Zahedi F., The analytic hierarchy process. A survey of the method and its applications, Interfaces, Vol. 16, No. 4, 1986, pp. 96&#150;108.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827122&pid=S1665-6423201100030001200013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Okoli, C., Pawlowski S., The Delphi method as a research tool: an example, design considerations and applications, Information &amp; Management, Vol. 42, No. 1, 2004, pp. 15&#150;29.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827124&pid=S1665-6423201100030001200014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Clayton, M., Delphi: a technique to harness expert opinion for critical decision&#150;making tasks in education, Educational Psychology, Dorchesteron &#150; Thames, Vol. 17, No. 4, 1997, pp. 373&#150;387.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4827126&pid=S1665-6423201100030001200015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[ ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Helal]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Mann]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[El-Zabadani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaddoura]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Jansen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The gator tech smart house: A programmable pervasive space]]></article-title>
<source><![CDATA[IEEE Computer]]></source>
<year>2005</year>
<volume>38</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>50-60</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rakotonirainy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tay]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[In-vehicle ambient intelligent transport systems (i-vaits): Towards an integrated research]]></article-title>
<source><![CDATA[7th international IEEE Conference on intelligent Transportation Systems]]></source>
<year>2004</year>
<page-range>648--651</page-range><publisher-loc><![CDATA[Washington^eDC DC]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The smart classroom: Merging technologies for seamless tele-education]]></article-title>
<source><![CDATA[IEEE Pervasive Computing]]></source>
<year>2003</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>47-55</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Isern]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Agents applied in health care: A review]]></article-title>
<source><![CDATA[international Journal of Medical informatics]]></source>
<year>2010</year>
<volume>79</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>145-166</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gadzheva]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Privacy in the Age of Transparency]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2008</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>60-74</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cooka]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Augusto]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Jakkula]]></surname>
<given-names><![CDATA[V.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Ambient intelligence: Technologies, applications, and opportunities]]></article-title>
<source><![CDATA[Pervasive and Mobile Computing]]></source>
<year>2009</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>277-298</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vrana]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Aly]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conceptual models for managerial ambient intelligence, 2th international Ambient intelligence Forum]]></source>
<year>2009</year>
<page-range>53-63</page-range><publisher-loc><![CDATA[Prague ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Augusto]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[McCullagh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Ambient intelligence: Concepts and Applications]]></article-title>
<source><![CDATA[Computer Science and information Systems]]></source>
<year>2007</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-28</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raisinghani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Benoit]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gomez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gusila]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Power]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmedding]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Ambient intelligence: Changing forms of human-computer interaction and their social implications]]></article-title>
<source><![CDATA[Journal of digital information]]></source>
<year>2004</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>271</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dorofee]]></surname>
<given-names><![CDATA[A.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Alberts]]></surname>
<given-names><![CDATA[C.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Higuera]]></surname>
<given-names><![CDATA[R.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Murphy]]></surname>
<given-names><![CDATA[R.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[R.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Continuous risks management guidebook]]></source>
<year>1996</year>
<publisher-loc><![CDATA[Pittsburgh ]]></publisher-loc>
<publisher-name><![CDATA[Software Engineering institute (SEI)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saaty]]></surname>
<given-names><![CDATA[T.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation]]></source>
<year>1980</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saaty]]></surname>
<given-names><![CDATA[T.L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A scaling method for priorities in hierarchical structures]]></article-title>
<source><![CDATA[Journal of Mathematical Psychology]]></source>
<year>1977</year>
<volume>15</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>234-281</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zahedi]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The analytic hierarchy process. A survey of the method and its applications]]></article-title>
<source><![CDATA[Interfaces]]></source>
<year>1986</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>96-108</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Okoli]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pawlowski]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The Delphi method as a research tool: an example, design considerations and applications]]></article-title>
<source><![CDATA[Information & Management]]></source>
<year>2004</year>
<volume>42</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-29</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clayton]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Delphi: a technique to harness expert opinion for critical decision-making tasks in education]]></article-title>
<source><![CDATA[Educational Psychology, Dorchesteron - Thames]]></source>
<year>1997</year>
<volume>17</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>373-387</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
