SlideShare a Scribd company logo
1 of 28
Download to read offline
EXPLORING IT PROFESSIONALS’ INTENTION TO
    USE SOFTWARE DEVELOPMENT RISK
        ASSESSMENT FRAMEWORK
               Elnaz Farhang Darehshori &
          Norshidah Mohamed, PhD (Presenter)
  WSEAS 12th International Conference on Applied Computer and Applied
                  Computational Science (ACACOS’13)
                 Renaissance Kuala Lumpur MALAYSIA

                         International Business School
                            http://www.ibs.utm.my
                         Universiti Teknologi Malaysia
OUTLINE

•   Introduction
•   Problem formulation
•   Problem solution
•   Conclusion




                          2
INTRODUCTION




               3
INTRODUCTION
• Software projects have shown an increase
  in size, complexity and number [1].
• While the success of software projects is
  becoming more critical for these
  companies [2], a high percentage of
  software projects still fail to meet their
  objectives [3].


                                               4
RESEARCH QUESTIONS

1. What is the acceptance of risk assessment
   framework among IT professionals?
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?



                                                5
PROBLEM FORMULATION




                      6
THEORETICAL BASIS




Theory of Reasoned Action (Fishbein and Ajzen, 1975)

                                                       7
THEORETICAL BASIS .. cont’

                Perceived
                Usefulness
                   (U)



                                   Attitude           Behavioral               Actual
External
                                   towards            intention to           system use
variables
                                  using (A)             use (BI)



                 Perceived
                Ease of use
                    (E)


            Technology Acceptance Model (Davis, Bagozzi and Warshaw, 1989)
                                                                                          8
RESEARCH MODEL
                             ACCEPTANCE OF
                            RISK ASSESSMENT
                              FRAMEWORK

EXTERNAL VARIABLES                               H2
                                 Perceived
                            ease of compliance
    Subjective norm
                                       H3


                      H5b
      Perceived                Perceived
     importance                usefulness


                                       H1
      Perceived
      awareness               Intention to use
                                framework

                                                      9
PROBLEM SOLUTION




                   10
RESEARCH CONTEXT
• Selected software development company in
  Malaysia
• Cross-sectional survey approach
• Research participants: IT professionals e.g.
  system administrator, programmer etc.
• Risk assessment framework : Malaysia Risk
  Assessment      Methodology     (MyRAM)    &
  Corrective and Preventing Action (CAPA) model
  based on learning from prior experiences
                                                  11
RESEARCH CONTEXT .. cont’




Source:
http://www.mampu.gov.my/pdf/surat_arahankp24nov10/SAMPEL%20DOKUMEN%20IS
MS/Sampel%20dokumen%20P1/RA%20Guideline%20%28MAMPU-BPICT-ISMS-P1-
008%29.pdf

                                                                          12
POPULATION & SAMPLING

•   Estimated population: 202
•   Sample: 150
•   Total usable responses: 100
•   Convenient sampling approach




                                   13
PROFILE OF RESPONDENTS
Profile of respondents             Percentage
Gender                   Male               54
                         Female             46
                         Total             100
Age                      20-29              36
                         30-39              43
                         40-49              20
                         Missing             1
                         Total             100
Education                Bachelor           46
                         Master             52
                         Doctorate           2
                         Total            100    14
PROFILE OF VARIABLES
Measures / code / mean                Factor          α
                                      loading
         Intention to use (overall mean score: 3.49)
It is worth to use MyRAM and                0.865    0.861
CAPA in software development.
(ITU1) mean: 3.91
In developing software, I will              0.841
frequently use MyRAM and CAPA.
(ITU2) mean: 3.67
I will strongly recommend others to         0.840
use MyRAM and CAPA when
developing software. (ITU3) mean:
3.08
When developing software, I plan to         0.838
use MyRAM and CAPA. (ITU4)
                                                             15
mean: 3.30
PROFILE OF VARIABLES ..
       cont’
Measures / code / mean                    Factor            α
                                          loading
          Perceived usefulness (overall mean score: 3.43)
Using MyRAM and CAPA improves my                  0.764     0.880
performance in assessing software
development risks. (PU1) mean: 3.46
In software development, using MyRAM              0.694
and CAPA enhances my effectiveness in
assessing software development risks.
(PU2) mean: 3.38
Using MyRAM and CAPA improves the                 0.885
quality of software development risk
assessment. (PU3) mean: 3.33
Overall, I find using MyRAM and CAPA              0.823
useful in assessing software development
risks. (PU4) mean: 3.55                                             16
PROFILE OF VARIABLES ..
                cont’
Measures / code / mean                                Factor loading    α
                     Perceived ease of compliance
                      (overall mean score: 3.68)
MyRAM and CAPA are easy for me to comply to.                    0.890   0.879
(PEOU1) mean:3.51
I find it is easy to comply to MyRAM and CAPA.                  0.894
(PEOU2) mean: 3.43
It would be easy for me to become skilful at                    0.747
complying to both MyRAM and CAPA. (PEOU3)
mean: 3.85
Overall, I find MyRAM and CAPA as software                      0.654
development risk assessment tool easy to comply to.
(PEOU4) mean: 3.92

                                                                                17
PROFILE OF VARIABLES ..
               cont’
Measures / code / mean                        Factor loading     α
                Subjective norm (overall mean score: 3.48)
Most people (e.g. my team members, colleagues)           0.850   0.895
who are important to me would think that I
should use MyRAM and CAPA. (SN1) mean:
3.48
The organisation that I work for would think that        0.817
I should use MyRAM and CAPA. (SN2) mean:
3.53
My superior and/or sponsor who influence(s) my           0.826
behaviour would think that I should use
MyRAM and CAPA. (SN3) mean: 3.44

                                                                         18
PROFILE OF VARIABLES ..
             cont’
Measures / code / mean                     Factor loading    α
           Perceived importance (overall mean score: 3.40)
For me personally, in my job, MyRAM and              0.835   0.899
CAPA are important. (PI1) mean: 3.42
For me personally, in my job, MyRAM and             0.837
CAPA are relevant. (PI2) mean: 3.41
For me personally, in my job, MyRAM and             0.816
CAPA are needed. (PI4) mean: 3.28
For me personally, in my job, MyRAM and             0.780
CAPA are essential. (PI3) mean: 3.48



                                                                     19
PROFILE OF VARIABLES ..
               cont’
Measures / code / mean                         Factor loading   α

             Perceived awareness (overall mean score: 3.70)
I understand what software development risks          0.894     0.824
are. (PA1) mean: 3.64
I understand the procedure to deal with                 0.889
software development risks. (PA2) mean: 3.54
I understand what software risk assessment              0.675
process is. (PA3) mean: 3.78
I understand what MyRAM is. (PA4) mean:                 0.932
3.81
I understand what CAPA is. (PA5) mean: 3.72             0.786


                                                                        20
CORRELATION ANALYSIS
                      ITU                 PU             PEOU      SN       PI       PA
ITU                       1
PU                  0.808**                       1

PEOU                0.708** 0.491**                            1

SN                  0.591** 0.565** 0.483**                             1

PI                  0.699** 0.711** 0.390** 0.626**                              1

PA                  0.845** 0.774** 0.546** 0.596** 0.641**                               1

     Correlation is significant at the 0.01 level (2-tailed)                                  21
CONCLUSION




             22
SUMMARY OF FINDINGS
1. What is the acceptance of risk assessment
   framework among IT professionals?
• IT professionals at the software company
  had positive perceptions of risk assessment
  framework acceptance.
• All measures of risk framework acceptance
  were valid and internally consistent in the
  context of Malaysian software development
  environment.                                  23
SUMMARY OF FINDINGS
      ..cont’
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?
  • All hypotheses were supported
  • Strong correlation is found for acceptance
     of risk assessment framework (intention to
     use, perceived usefulness and perceived
     ease of compliance).

                                                  24
SUMMARY OF FINDINGS
       ..cont’
2. Do subjective norm, perceived awareness
    and perceived importance correlate to risk
    assessment framework acceptance?
• When IT professionals perceive usefulness of
   the risk assessment framework, they will have
   intention to use it at their workplace.
• Besides, they perceive that the framework is
   easy to comply to. Owing to its ease of
   compliance, they are likely to see it as being
   useful to them.                                  25
SUMMARY OF FINDINGS
      ..cont’
2. Do subjective norm, perceived awareness
   and perceived importance correlate to risk
   assessment framework acceptance?
• People who matter to IT professionals at the
  workplace will promote the professionals’
  acceptance of the risk assessment framework.
• With awareness and perception of importance
  of the assessment framework, they see it as
  useful and are likely to use it.               26
LIMITATIONS & FUTURE
      RESEARCH
• Data was collected on a convenient basis at
  a particular software company and in
  Malaysia
• Future research may explore other
  companies and in countries other than
  Malaysia.


                                                27
THANK YOU
norshidah@ic.utm.my




                      28

More Related Content

Viewers also liked

Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyNeed for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyIvan Valev
 
Research on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsResearch on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsDenis Parra Santander
 
Groza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipGroza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipJoe Cobbs
 
Institución educativa
Institución educativaInstitución educativa
Institución educativajoan9710
 
Curriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianCurriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianPîrvu Bogdan Adrian
 
Evaluation question 1 nicole
Evaluation question 1 nicoleEvaluation question 1 nicole
Evaluation question 1 nicoleCharis Creber
 
Clase fines ciencia política estado
Clase fines ciencia política   estadoClase fines ciencia política   estado
Clase fines ciencia política estadoEduardo DNegri
 
Atelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneAtelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneRenaud AIOUTZ
 
COLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESCOLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESardila2014
 

Viewers also liked (16)

Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction StudyNeed for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
Need for Recovery, Off-Job Activities and Well-being: A Day Reconstruction Study
 
Research on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and ListsResearch on Recommender Systems: Beyond Ratings and Lists
Research on Recommender Systems: Beyond Ratings and Lists
 
Groza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B SponsorshipGroza Cobbs wmc2014_peru B2B Sponsorship
Groza Cobbs wmc2014_peru B2B Sponsorship
 
PPT MA presentation
PPT MA presentationPPT MA presentation
PPT MA presentation
 
Evaluation 2
Evaluation 2Evaluation 2
Evaluation 2
 
Institución educativa
Institución educativaInstitución educativa
Institución educativa
 
Curriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan AdrianCurriculum vitae- Pîrvu Bogdan Adrian
Curriculum vitae- Pîrvu Bogdan Adrian
 
4. cft
4. cft4. cft
4. cft
 
Healing With The Medicine Of The Prophet (PBUH)
Healing With The Medicine Of The Prophet (PBUH)Healing With The Medicine Of The Prophet (PBUH)
Healing With The Medicine Of The Prophet (PBUH)
 
Evaluation question 1 nicole
Evaluation question 1 nicoleEvaluation question 1 nicole
Evaluation question 1 nicole
 
Clase fines ciencia política estado
Clase fines ciencia política   estadoClase fines ciencia política   estado
Clase fines ciencia política estado
 
Atelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP AuvergneAtelier Portail et réseaux sociaux InterBDP Auvergne
Atelier Portail et réseaux sociaux InterBDP Auvergne
 
Prophet Muhammad ﷺ ’s Manner Of Performing Prayers
Prophet Muhammad ﷺ ’s Manner Of Performing PrayersProphet Muhammad ﷺ ’s Manner Of Performing Prayers
Prophet Muhammad ﷺ ’s Manner Of Performing Prayers
 
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
Case Studies on Successful M&A Practices in Acer and Lenovo: A Dynamic Capabi...
 
Día del idioma guerrero & kinalczyk
Día del idioma guerrero & kinalczykDía del idioma guerrero & kinalczyk
Día del idioma guerrero & kinalczyk
 
COLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALESCOLOMBIA Y SUS REGIONES NATURALES
COLOMBIA Y SUS REGIONES NATURALES
 

Similar to Presentation wseaskl acacos_4_april2013

Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Norshidah Mohamed
 
Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websitejasonfuoo
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practiceswaruireuben
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodIRJET Journal
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionDr. Amarjeet Singh
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsIAESIJAI
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionIRJET Journal
 
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISSEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISIRJET Journal
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projectsIRJET Journal
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
 
Safeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen Ja'far
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...CompTIA
 
Business Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT ServiceBusiness Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT Servicesaurabh rao
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
 

Similar to Presentation wseaskl acacos_4_april2013 (20)

Thesis Final Report
Thesis Final ReportThesis Final Report
Thesis Final Report
 
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
Computer Application Anxiety, Self-Efficacy and Open Source Learning Manageme...
 
Kumar2021
Kumar2021Kumar2021
Kumar2021
 
Enlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a websiteEnlister baidu's recommender system for the biggest chinese q&a website
Enlister baidu's recommender system for the biggest chinese q&a website
 
It secuirty policy guidelines and practices
It secuirty policy guidelines and practicesIt secuirty policy guidelines and practices
It secuirty policy guidelines and practices
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methods
 
MALWARE THREAT ANALYSIS
MALWARE THREAT ANALYSISMALWARE THREAT ANALYSIS
MALWARE THREAT ANALYSIS
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing Detection
 
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISSEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
 
Minimization of Risks in Construction projects
Minimization of Risks in Construction projectsMinimization of Risks in Construction projects
Minimization of Risks in Construction projects
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
Safeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdfSafeen Yaseen-Assignment-1 (HAZOP).pdf
Safeen Yaseen-Assignment-1 (HAZOP).pdf
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
Business Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT ServiceBusiness Benefits of Cloud Computing to Indian IT Service
Business Benefits of Cloud Computing to Indian IT Service
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 

More from Norshidah Mohamed

Icbm 2014presentation slides
Icbm 2014presentation slidesIcbm 2014presentation slides
Icbm 2014presentation slidesNorshidah Mohamed
 
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...Norshidah Mohamed
 
Information Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCInformation Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCNorshidah Mohamed
 
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCKnowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCNorshidah Mohamed
 
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013Norshidah Mohamed
 
Customer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceCustomer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceNorshidah Mohamed
 
Citizen Relationship Management
Citizen Relationship ManagementCitizen Relationship Management
Citizen Relationship ManagementNorshidah Mohamed
 
Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Norshidah Mohamed
 
Customer Relationship Management Alignment
Customer Relationship Management AlignmentCustomer Relationship Management Alignment
Customer Relationship Management AlignmentNorshidah Mohamed
 

More from Norshidah Mohamed (11)

Icbm 2014presentation slides
Icbm 2014presentation slidesIcbm 2014presentation slides
Icbm 2014presentation slides
 
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
 
Information Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRCInformation Systems Integration - WSEAS E-activities, Nanjing PRC
Information Systems Integration - WSEAS E-activities, Nanjing PRC
 
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRCKnowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
Knowledge quality - antecedents and impacts - WSEAS E-activities Nanjing, PRC
 
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
WSEAS E-activities Plenary Lecture Nanjing, PRC 2013
 
Customer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and PerformanceCustomer Relationship Management Alignment and Performance
Customer Relationship Management Alignment and Performance
 
Citizen Relationship Management
Citizen Relationship ManagementCitizen Relationship Management
Citizen Relationship Management
 
Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series Knowledge SPA IBS Seminar Series
Knowledge SPA IBS Seminar Series
 
Symposium 28 june 2011
Symposium 28 june 2011Symposium 28 june 2011
Symposium 28 june 2011
 
Social Network Sites (SNS)
Social Network Sites (SNS)Social Network Sites (SNS)
Social Network Sites (SNS)
 
Customer Relationship Management Alignment
Customer Relationship Management AlignmentCustomer Relationship Management Alignment
Customer Relationship Management Alignment
 

Recently uploaded

Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Recently uploaded (20)

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

Presentation wseaskl acacos_4_april2013

  • 1. EXPLORING IT PROFESSIONALS’ INTENTION TO USE SOFTWARE DEVELOPMENT RISK ASSESSMENT FRAMEWORK Elnaz Farhang Darehshori & Norshidah Mohamed, PhD (Presenter) WSEAS 12th International Conference on Applied Computer and Applied Computational Science (ACACOS’13) Renaissance Kuala Lumpur MALAYSIA International Business School http://www.ibs.utm.my Universiti Teknologi Malaysia
  • 2. OUTLINE • Introduction • Problem formulation • Problem solution • Conclusion 2
  • 4. INTRODUCTION • Software projects have shown an increase in size, complexity and number [1]. • While the success of software projects is becoming more critical for these companies [2], a high percentage of software projects still fail to meet their objectives [3]. 4
  • 5. RESEARCH QUESTIONS 1. What is the acceptance of risk assessment framework among IT professionals? 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? 5
  • 7. THEORETICAL BASIS Theory of Reasoned Action (Fishbein and Ajzen, 1975) 7
  • 8. THEORETICAL BASIS .. cont’ Perceived Usefulness (U) Attitude Behavioral Actual External towards intention to system use variables using (A) use (BI) Perceived Ease of use (E) Technology Acceptance Model (Davis, Bagozzi and Warshaw, 1989) 8
  • 9. RESEARCH MODEL ACCEPTANCE OF RISK ASSESSMENT FRAMEWORK EXTERNAL VARIABLES H2 Perceived ease of compliance Subjective norm H3 H5b Perceived Perceived importance usefulness H1 Perceived awareness Intention to use framework 9
  • 11. RESEARCH CONTEXT • Selected software development company in Malaysia • Cross-sectional survey approach • Research participants: IT professionals e.g. system administrator, programmer etc. • Risk assessment framework : Malaysia Risk Assessment Methodology (MyRAM) & Corrective and Preventing Action (CAPA) model based on learning from prior experiences 11
  • 12. RESEARCH CONTEXT .. cont’ Source: http://www.mampu.gov.my/pdf/surat_arahankp24nov10/SAMPEL%20DOKUMEN%20IS MS/Sampel%20dokumen%20P1/RA%20Guideline%20%28MAMPU-BPICT-ISMS-P1- 008%29.pdf 12
  • 13. POPULATION & SAMPLING • Estimated population: 202 • Sample: 150 • Total usable responses: 100 • Convenient sampling approach 13
  • 14. PROFILE OF RESPONDENTS Profile of respondents Percentage Gender Male 54 Female 46 Total 100 Age 20-29 36 30-39 43 40-49 20 Missing 1 Total 100 Education Bachelor 46 Master 52 Doctorate 2 Total 100 14
  • 15. PROFILE OF VARIABLES Measures / code / mean Factor α loading Intention to use (overall mean score: 3.49) It is worth to use MyRAM and 0.865 0.861 CAPA in software development. (ITU1) mean: 3.91 In developing software, I will 0.841 frequently use MyRAM and CAPA. (ITU2) mean: 3.67 I will strongly recommend others to 0.840 use MyRAM and CAPA when developing software. (ITU3) mean: 3.08 When developing software, I plan to 0.838 use MyRAM and CAPA. (ITU4) 15 mean: 3.30
  • 16. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor α loading Perceived usefulness (overall mean score: 3.43) Using MyRAM and CAPA improves my 0.764 0.880 performance in assessing software development risks. (PU1) mean: 3.46 In software development, using MyRAM 0.694 and CAPA enhances my effectiveness in assessing software development risks. (PU2) mean: 3.38 Using MyRAM and CAPA improves the 0.885 quality of software development risk assessment. (PU3) mean: 3.33 Overall, I find using MyRAM and CAPA 0.823 useful in assessing software development risks. (PU4) mean: 3.55 16
  • 17. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived ease of compliance (overall mean score: 3.68) MyRAM and CAPA are easy for me to comply to. 0.890 0.879 (PEOU1) mean:3.51 I find it is easy to comply to MyRAM and CAPA. 0.894 (PEOU2) mean: 3.43 It would be easy for me to become skilful at 0.747 complying to both MyRAM and CAPA. (PEOU3) mean: 3.85 Overall, I find MyRAM and CAPA as software 0.654 development risk assessment tool easy to comply to. (PEOU4) mean: 3.92 17
  • 18. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Subjective norm (overall mean score: 3.48) Most people (e.g. my team members, colleagues) 0.850 0.895 who are important to me would think that I should use MyRAM and CAPA. (SN1) mean: 3.48 The organisation that I work for would think that 0.817 I should use MyRAM and CAPA. (SN2) mean: 3.53 My superior and/or sponsor who influence(s) my 0.826 behaviour would think that I should use MyRAM and CAPA. (SN3) mean: 3.44 18
  • 19. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived importance (overall mean score: 3.40) For me personally, in my job, MyRAM and 0.835 0.899 CAPA are important. (PI1) mean: 3.42 For me personally, in my job, MyRAM and 0.837 CAPA are relevant. (PI2) mean: 3.41 For me personally, in my job, MyRAM and 0.816 CAPA are needed. (PI4) mean: 3.28 For me personally, in my job, MyRAM and 0.780 CAPA are essential. (PI3) mean: 3.48 19
  • 20. PROFILE OF VARIABLES .. cont’ Measures / code / mean Factor loading α Perceived awareness (overall mean score: 3.70) I understand what software development risks 0.894 0.824 are. (PA1) mean: 3.64 I understand the procedure to deal with 0.889 software development risks. (PA2) mean: 3.54 I understand what software risk assessment 0.675 process is. (PA3) mean: 3.78 I understand what MyRAM is. (PA4) mean: 0.932 3.81 I understand what CAPA is. (PA5) mean: 3.72 0.786 20
  • 21. CORRELATION ANALYSIS ITU PU PEOU SN PI PA ITU 1 PU 0.808** 1 PEOU 0.708** 0.491** 1 SN 0.591** 0.565** 0.483** 1 PI 0.699** 0.711** 0.390** 0.626** 1 PA 0.845** 0.774** 0.546** 0.596** 0.641** 1 Correlation is significant at the 0.01 level (2-tailed) 21
  • 23. SUMMARY OF FINDINGS 1. What is the acceptance of risk assessment framework among IT professionals? • IT professionals at the software company had positive perceptions of risk assessment framework acceptance. • All measures of risk framework acceptance were valid and internally consistent in the context of Malaysian software development environment. 23
  • 24. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • All hypotheses were supported • Strong correlation is found for acceptance of risk assessment framework (intention to use, perceived usefulness and perceived ease of compliance). 24
  • 25. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • When IT professionals perceive usefulness of the risk assessment framework, they will have intention to use it at their workplace. • Besides, they perceive that the framework is easy to comply to. Owing to its ease of compliance, they are likely to see it as being useful to them. 25
  • 26. SUMMARY OF FINDINGS ..cont’ 2. Do subjective norm, perceived awareness and perceived importance correlate to risk assessment framework acceptance? • People who matter to IT professionals at the workplace will promote the professionals’ acceptance of the risk assessment framework. • With awareness and perception of importance of the assessment framework, they see it as useful and are likely to use it. 26
  • 27. LIMITATIONS & FUTURE RESEARCH • Data was collected on a convenient basis at a particular software company and in Malaysia • Future research may explore other companies and in countries other than Malaysia. 27