SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
EXPLORING IT PROFESSIONALS’ INTENTION TO
    USE SOFTWARE DEVELOPMENT RISK
        ASSESSMENT FRAMEWORK
               Elnaz Farhang Darehshori &
          Norshidah Mohamed, PhD (Presenter)
  WSEAS 12th International Conference on Applied Computer and Applied
                  Computational Science (ACACOS’13)
                 Renaissance Kuala Lumpur MALAYSIA

                         International Business School
                            http://www.ibs.utm.my
                         Universiti Teknologi Malaysia
OUTLINE

•   Introduction
•   Problem formulation
•   Problem solution
•   Conclusion




                          2
INTRODUCTION




               3
INTRODUCTION
• Software projects have shown an increase
  in size, complexity and number [1].
• While the success of software projects is
  becoming more critical for these
  companies [2], a high percentage of
  software projects still fail to meet their
  objectives [3].


                                               4
RESEARCH QUESTIONS

1. What is the acceptance of risk assessment
   framework among IT professionals?
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?



                                                5
PROBLEM FORMULATION




                      6
THEORETICAL BASIS




Theory of Reasoned Action (Fishbein and Ajzen, 1975)

                                                       7
THEORETICAL BASIS .. cont’

                Perceived
                Usefulness
                   (U)



                                   Attitude           Behavioral               Actual
External
                                   towards            intention to           system use
variables
                                  using (A)             use (BI)



                 Perceived
                Ease of use
                    (E)


            Technology Acceptance Model (Davis, Bagozzi and Warshaw, 1989)
                                                                                          8
RESEARCH MODEL
                             ACCEPTANCE OF
                            RISK ASSESSMENT
                              FRAMEWORK

EXTERNAL VARIABLES                               H2
                                 Perceived
                            ease of compliance
    Subjective norm
                                       H3


                      H5b
      Perceived                Perceived
     importance                usefulness


                                       H1
      Perceived
      awareness               Intention to use
                                framework

                                                      9
PROBLEM SOLUTION




                   10
RESEARCH CONTEXT
• Selected software development company in
  Malaysia
• Cross-sectional survey approach
• Research participants: IT professionals e.g.
  system administrator, programmer etc.
• Risk assessment framework : Malaysia Risk
  Assessment      Methodology     (MyRAM)    &
  Corrective and Preventing Action (CAPA) model
  based on learning from prior experiences
                                                  11
RESEARCH CONTEXT .. cont’




Source:
http://www.mampu.gov.my/pdf/surat_arahankp24nov10/SAMPEL%20DOKUMEN%20IS
MS/Sampel%20dokumen%20P1/RA%20Guideline%20%28MAMPU-BPICT-ISMS-P1-
008%29.pdf

                                                                          12
POPULATION & SAMPLING

•   Estimated population: 202
•   Sample: 150
•   Total usable responses: 100
•   Convenient sampling approach




                                   13
PROFILE OF RESPONDENTS
Profile of respondents             Percentage
Gender                   Male               54
                         Female             46
                         Total             100
Age                      20-29              36
                         30-39              43
                         40-49              20
                         Missing             1
                         Total             100
Education                Bachelor           46
                         Master             52
                         Doctorate           2
                         Total            100    14
PROFILE OF VARIABLES
Measures / code / mean                Factor          α
                                      loading
         Intention to use (overall mean score: 3.49)
It is worth to use MyRAM and                0.865    0.861
CAPA in software development.
(ITU1) mean: 3.91
In developing software, I will              0.841
frequently use MyRAM and CAPA.
(ITU2) mean: 3.67
I will strongly recommend others to         0.840
use MyRAM and CAPA when
developing software. (ITU3) mean:
3.08
When developing software, I plan to         0.838
use MyRAM and CAPA. (ITU4)
                                                             15
mean: 3.30
PROFILE OF VARIABLES ..
       cont’
Measures / code / mean                    Factor            α
                                          loading
          Perceived usefulness (overall mean score: 3.43)
Using MyRAM and CAPA improves my                  0.764     0.880
performance in assessing software
development risks. (PU1) mean: 3.46
In software development, using MyRAM              0.694
and CAPA enhances my effectiveness in
assessing software development risks.
(PU2) mean: 3.38
Using MyRAM and CAPA improves the                 0.885
quality of software development risk
assessment. (PU3) mean: 3.33
Overall, I find using MyRAM and CAPA              0.823
useful in assessing software development
risks. (PU4) mean: 3.55                                             16
PROFILE OF VARIABLES ..
                cont’
Measures / code / mean                                Factor loading    α
                     Perceived ease of compliance
                      (overall mean score: 3.68)
MyRAM and CAPA are easy for me to comply to.                    0.890   0.879
(PEOU1) mean:3.51
I find it is easy to comply to MyRAM and CAPA.                  0.894
(PEOU2) mean: 3.43
It would be easy for me to become skilful at                    0.747
complying to both MyRAM and CAPA. (PEOU3)
mean: 3.85
Overall, I find MyRAM and CAPA as software                      0.654
development risk assessment tool easy to comply to.
(PEOU4) mean: 3.92

                                                                                17
PROFILE OF VARIABLES ..
               cont’
Measures / code / mean                        Factor loading     α
                Subjective norm (overall mean score: 3.48)
Most people (e.g. my team members, colleagues)           0.850   0.895
who are important to me would think that I
should use MyRAM and CAPA. (SN1) mean:
3.48
The organisation that I work for would think that        0.817
I should use MyRAM and CAPA. (SN2) mean:
3.53
My superior and/or sponsor who influence(s) my           0.826
behaviour would think that I should use
MyRAM and CAPA. (SN3) mean: 3.44

                                                                         18
PROFILE OF VARIABLES ..
             cont’
Measures / code / mean                     Factor loading    α
           Perceived importance (overall mean score: 3.40)
For me personally, in my job, MyRAM and              0.835   0.899
CAPA are important. (PI1) mean: 3.42
For me personally, in my job, MyRAM and             0.837
CAPA are relevant. (PI2) mean: 3.41
For me personally, in my job, MyRAM and             0.816
CAPA are needed. (PI4) mean: 3.28
For me personally, in my job, MyRAM and             0.780
CAPA are essential. (PI3) mean: 3.48



                                                                     19
PROFILE OF VARIABLES ..
               cont’
Measures / code / mean                         Factor loading   α

             Perceived awareness (overall mean score: 3.70)
I understand what software development risks          0.894     0.824
are. (PA1) mean: 3.64
I understand the procedure to deal with                 0.889
software development risks. (PA2) mean: 3.54
I understand what software risk assessment              0.675
process is. (PA3) mean: 3.78
I understand what MyRAM is. (PA4) mean:                 0.932
3.81
I understand what CAPA is. (PA5) mean: 3.72             0.786


                                                                        20
CORRELATION ANALYSIS
                      ITU                 PU             PEOU      SN       PI       PA
ITU                       1
PU                  0.808**                       1

PEOU                0.708** 0.491**                            1

SN                  0.591** 0.565** 0.483**                             1

PI                  0.699** 0.711** 0.390** 0.626**                              1

PA                  0.845** 0.774** 0.546** 0.596** 0.641**                               1

     Correlation is significant at the 0.01 level (2-tailed)                                  21
CONCLUSION




             22
SUMMARY OF FINDINGS
1. What is the acceptance of risk assessment
   framework among IT professionals?
• IT professionals at the software company
  had positive perceptions of risk assessment
  framework acceptance.
• All measures of risk framework acceptance
  were valid and internally consistent in the
  context of Malaysian software development
  environment.                                  23
SUMMARY OF FINDINGS
      ..cont’
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?
  • All hypotheses were supported
  • Strong correlation is found for acceptance
     of risk assessment framework (intention to
     use, perceived usefulness and perceived
     ease of compliance).

                                                  24
SUMMARY OF FINDINGS
       ..cont’
2. Do subjective norm, perceived awareness
    and perceived importance correlate to risk
    assessment framework acceptance?
• When IT professionals perceive usefulness of
   the risk assessment framework, they will have
   intention to use it at their workplace.
• Besides, they perceive that the framework is
   easy to comply to. Owing to its ease of
   compliance, they are likely to see it as being
   useful to them.                                  25
SUMMARY OF FINDINGS
      ..cont’
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?
• People who matter to IT professionals at the
  workplace will promote the professionals’
  acceptance of the risk assessment framework.
• With awareness and perception of importance
  of the assessment framework, they see it as
  useful and are likely to use it.               26
LIMITATIONS & FUTURE
      RESEARCH
• Data was collected on a convenient basis at
  a particular software company and in
  Malaysia
• Future research may explore other
  companies and in countries other than
  Malaysia.


                                                27
THANK YOU
norshidah@ic.utm.my




                      28

Weitere ähnliche Inhalte

Andere mochten auch

Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyNeed for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyIvan Valev
 
Research on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsResearch on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsDenis Parra Santander
 
Groza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipGroza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipJoe Cobbs
 
Institución educativa
Institución educativaInstitución educativa
Institución educativajoan9710
 
Curriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianCurriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianPîrvu Bogdan Adrian
 
Evaluation question 1 nicole
Evaluation question 1 nicoleEvaluation question 1 nicole
Evaluation question 1 nicoleCharis Creber
 
Clase fines ciencia política estado
Clase fines ciencia política   estadoClase fines ciencia política   estado
Clase fines ciencia política estadoEduardo DNegri
 
Atelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneAtelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneRenaud AIOUTZ
 
COLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESCOLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESardila2014
 

Andere mochten auch (16)

Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyNeed for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
 
Research on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsResearch on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and Lists
 
Groza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipGroza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B Sponsorship
 
PPT MA presentation
PPT MA presentationPPT MA presentation
PPT MA presentation
 
Evaluation 2
Evaluation 2Evaluation 2
Evaluation 2
 
Institución educativa
Institución educativaInstitución educativa
Institución educativa
 
Curriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianCurriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan Adrian
 
4. cft
4. cft4. cft
4. cft
 
Healing With The Medicine Of The Prophet (PBUH)
Healing With The Medicine Of The Prophet (PBUH)Healing With The Medicine Of The Prophet (PBUH)
Healing With The Medicine Of The Prophet (PBUH)
 
Evaluation question 1 nicole
Evaluation question 1 nicoleEvaluation question 1 nicole
Evaluation question 1 nicole
 
Clase fines ciencia política estado
Clase fines ciencia política   estadoClase fines ciencia política   estado
Clase fines ciencia política estado
 
Atelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneAtelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP Auvergne
 
Prophet Muhammad ﷺ ’s Manner Of Performing Prayers
Prophet Muhammad ﷺ ’s Manner Of Performing PrayersProphet Muhammad ﷺ ’s Manner Of Performing Prayers
Prophet Muhammad ﷺ ’s Manner Of Performing Prayers
 
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
 
Día del idioma guerrero & kinalczyk
Día del idioma guerrero & kinalczykDía del idioma guerrero & kinalczyk
Día del idioma guerrero & kinalczyk
 
COLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESCOLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALES
 

Ähnlich wie Presentation wseaskl acacos_4_april2013

Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Norshidah Mohamed
 
Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websitejasonfuoo
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practiceswaruireuben
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodIRJET Journal
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionDr. Amarjeet Singh
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsIAESIJAI
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionIRJET Journal
 
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISSEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISIRJET Journal
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projectsIRJET Journal
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
 
Safeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen Ja'far
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...CompTIA
 
Business Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT ServiceBusiness Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT Servicesaurabh rao
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
 

Ähnlich wie Presentation wseaskl acacos_4_april2013 (20)

Thesis Final Report
Thesis Final ReportThesis Final Report
Thesis Final Report
 
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
 
Kumar2021
Kumar2021Kumar2021
Kumar2021
 
Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a website
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practices
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methods
 
MALWARE THREAT ANALYSIS
MALWARE THREAT ANALYSISMALWARE THREAT ANALYSIS
MALWARE THREAT ANALYSIS
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing Detection
 
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISSEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projects
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
Safeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdf
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
Business Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT ServiceBusiness Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT Service
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 

Mehr von Norshidah Mohamed

Icbm 2014presentation slides
Icbm 2014presentation slidesIcbm 2014presentation slides
Icbm 2014presentation slidesNorshidah Mohamed
 
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...Norshidah Mohamed
 
Information Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCInformation Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCNorshidah Mohamed
 
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCKnowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCNorshidah Mohamed
 
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013Norshidah Mohamed
 
Customer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceCustomer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceNorshidah Mohamed
 
Citizen Relationship Management
Citizen Relationship ManagementCitizen Relationship Management
Citizen Relationship ManagementNorshidah Mohamed
 
Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Norshidah Mohamed
 
Customer Relationship Management Alignment
Customer Relationship Management AlignmentCustomer Relationship Management Alignment
Customer Relationship Management AlignmentNorshidah Mohamed
 

Mehr von Norshidah Mohamed (11)

Icbm 2014presentation slides
Icbm 2014presentation slidesIcbm 2014presentation slides
Icbm 2014presentation slides
 
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
 
Information Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCInformation Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRC
 
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCKnowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
 
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
 
Customer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceCustomer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and Performance
 
Citizen Relationship Management
Citizen Relationship ManagementCitizen Relationship Management
Citizen Relationship Management
 
Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series
 
Symposium 28 june 2011
Symposium 28 june 2011Symposium 28 june 2011
Symposium 28 june 2011
 
Social Network Sites (SNS)
Social Network Sites (SNS)Social Network Sites (SNS)
Social Network Sites (SNS)
 
Customer Relationship Management Alignment
Customer Relationship Management AlignmentCustomer Relationship Management Alignment
Customer Relationship Management Alignment
 

Kürzlich hochgeladen

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...pujan9679
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowranineha57744
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 

Kürzlich hochgeladen (20)

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 

Presentation wseaskl acacos_4_april2013

  • 1. EXPLORING IT PROFESSIONALS’ INTENTION TO USE SOFTWARE DEVELOPMENT RISK ASSESSMENT FRAMEWORK Elnaz Farhang Darehshori & Norshidah Mohamed, PhD (Presenter) WSEAS 12th International Conference on Applied Computer and Applied Computational Science (ACACOS’13) Renaissance Kuala Lumpur MALAYSIA International Business School http://www.ibs.utm.my Universiti Teknologi Malaysia
  • 2. OUTLINE • Introduction • Problem formulation • Problem solution • Conclusion 2
  • 4. INTRODUCTION • Software projects have shown an increase in size, complexity and number [1]. • While the success of software projects is becoming more critical for these companies [2], a high percentage of software projects still fail to meet their objectives [3]. 4
  • 5. RESEARCH QUESTIONS 1. What is the acceptance of risk assessment framework among IT professionals? 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? 5
  • 7. THEORETICAL BASIS Theory of Reasoned Action (Fishbein and Ajzen, 1975) 7
  • 8. THEORETICAL BASIS .. cont’ Perceived Usefulness (U) Attitude Behavioral Actual External towards intention to system use variables using (A) use (BI) Perceived Ease of use (E) Technology Acceptance Model (Davis, Bagozzi and Warshaw, 1989) 8
  • 9. RESEARCH MODEL ACCEPTANCE OF RISK ASSESSMENT FRAMEWORK EXTERNAL VARIABLES H2 Perceived ease of compliance Subjective norm H3 H5b Perceived Perceived importance usefulness H1 Perceived awareness Intention to use framework 9
  • 11. RESEARCH CONTEXT • Selected software development company in Malaysia • Cross-sectional survey approach • Research participants: IT professionals e.g. system administrator, programmer etc. • Risk assessment framework : Malaysia Risk Assessment Methodology (MyRAM) & Corrective and Preventing Action (CAPA) model based on learning from prior experiences 11
  • 12. RESEARCH CONTEXT .. cont’ Source: http://www.mampu.gov.my/pdf/surat_arahankp24nov10/SAMPEL%20DOKUMEN%20IS MS/Sampel%20dokumen%20P1/RA%20Guideline%20%28MAMPU-BPICT-ISMS-P1- 008%29.pdf 12
  • 13. POPULATION & SAMPLING • Estimated population: 202 • Sample: 150 • Total usable responses: 100 • Convenient sampling approach 13
  • 14. PROFILE OF RESPONDENTS Profile of respondents Percentage Gender Male 54 Female 46 Total 100 Age 20-29 36 30-39 43 40-49 20 Missing 1 Total 100 Education Bachelor 46 Master 52 Doctorate 2 Total 100 14
  • 15. PROFILE OF VARIABLES Measures / code / mean Factor α loading Intention to use (overall mean score: 3.49) It is worth to use MyRAM and 0.865 0.861 CAPA in software development. (ITU1) mean: 3.91 In developing software, I will 0.841 frequently use MyRAM and CAPA. (ITU2) mean: 3.67 I will strongly recommend others to 0.840 use MyRAM and CAPA when developing software. (ITU3) mean: 3.08 When developing software, I plan to 0.838 use MyRAM and CAPA. (ITU4) 15 mean: 3.30
  • 16. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor α loading Perceived usefulness (overall mean score: 3.43) Using MyRAM and CAPA improves my 0.764 0.880 performance in assessing software development risks. (PU1) mean: 3.46 In software development, using MyRAM 0.694 and CAPA enhances my effectiveness in assessing software development risks. (PU2) mean: 3.38 Using MyRAM and CAPA improves the 0.885 quality of software development risk assessment. (PU3) mean: 3.33 Overall, I find using MyRAM and CAPA 0.823 useful in assessing software development risks. (PU4) mean: 3.55 16
  • 17. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived ease of compliance (overall mean score: 3.68) MyRAM and CAPA are easy for me to comply to. 0.890 0.879 (PEOU1) mean:3.51 I find it is easy to comply to MyRAM and CAPA. 0.894 (PEOU2) mean: 3.43 It would be easy for me to become skilful at 0.747 complying to both MyRAM and CAPA. (PEOU3) mean: 3.85 Overall, I find MyRAM and CAPA as software 0.654 development risk assessment tool easy to comply to. (PEOU4) mean: 3.92 17
  • 18. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Subjective norm (overall mean score: 3.48) Most people (e.g. my team members, colleagues) 0.850 0.895 who are important to me would think that I should use MyRAM and CAPA. (SN1) mean: 3.48 The organisation that I work for would think that 0.817 I should use MyRAM and CAPA. (SN2) mean: 3.53 My superior and/or sponsor who influence(s) my 0.826 behaviour would think that I should use MyRAM and CAPA. (SN3) mean: 3.44 18
  • 19. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived importance (overall mean score: 3.40) For me personally, in my job, MyRAM and 0.835 0.899 CAPA are important. (PI1) mean: 3.42 For me personally, in my job, MyRAM and 0.837 CAPA are relevant. (PI2) mean: 3.41 For me personally, in my job, MyRAM and 0.816 CAPA are needed. (PI4) mean: 3.28 For me personally, in my job, MyRAM and 0.780 CAPA are essential. (PI3) mean: 3.48 19
  • 20. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived awareness (overall mean score: 3.70) I understand what software development risks 0.894 0.824 are. (PA1) mean: 3.64 I understand the procedure to deal with 0.889 software development risks. (PA2) mean: 3.54 I understand what software risk assessment 0.675 process is. (PA3) mean: 3.78 I understand what MyRAM is. (PA4) mean: 0.932 3.81 I understand what CAPA is. (PA5) mean: 3.72 0.786 20
  • 21. CORRELATION ANALYSIS ITU PU PEOU SN PI PA ITU 1 PU 0.808** 1 PEOU 0.708** 0.491** 1 SN 0.591** 0.565** 0.483** 1 PI 0.699** 0.711** 0.390** 0.626** 1 PA 0.845** 0.774** 0.546** 0.596** 0.641** 1 Correlation is significant at the 0.01 level (2-tailed) 21
  • 23. SUMMARY OF FINDINGS 1. What is the acceptance of risk assessment framework among IT professionals? • IT professionals at the software company had positive perceptions of risk assessment framework acceptance. • All measures of risk framework acceptance were valid and internally consistent in the context of Malaysian software development environment. 23
  • 24. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • All hypotheses were supported • Strong correlation is found for acceptance of risk assessment framework (intention to use, perceived usefulness and perceived ease of compliance). 24
  • 25. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • When IT professionals perceive usefulness of the risk assessment framework, they will have intention to use it at their workplace. • Besides, they perceive that the framework is easy to comply to. Owing to its ease of compliance, they are likely to see it as being useful to them. 25
  • 26. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • People who matter to IT professionals at the workplace will promote the professionals’ acceptance of the risk assessment framework. • With awareness and perception of importance of the assessment framework, they see it as useful and are likely to use it. 26
  • 27. LIMITATIONS & FUTURE RESEARCH • Data was collected on a convenient basis at a particular software company and in Malaysia • Future research may explore other companies and in countries other than Malaysia. 27