This document summarizes a research study that explored IT professionals' acceptance of software development risk assessment frameworks. The study was conducted in Malaysia and examined professionals' intentions to use the Malaysia Risk Assessment Methodology (MyRAM) and Corrective and Preventive Action (CAPA) model. The results showed that professionals had positive perceptions of the frameworks and key acceptance factors like perceived usefulness, ease of use, and subjective norms were strongly correlated with intention to use. Acceptance was higher when professionals found the frameworks useful and easy to comply with, and were influenced by others at their workplace. The study provides insights but was limited to one company, and future research could explore other organizations and locations.
Construct Validity of the School Academic Optimism Scale among Elementary Sch...Jessica Harlan
Vaux’s (2015) investigation of academic optimism and its effect on school effectiveness prompted the use of confirmatory factor analysis to examine the stability of the School Academic Optimism Scale (SAOS) factor structure with elementary teachers from 67 school in Northern Alabama. The reciprocal nature of academic optimism’s subscales warrants further examination into the explanation of greater school effectiveness.
This presentation simplifies the content of a white paper presented by Piyush Kumar regarding the Impact of Performance, Cost and Competitive Considerations on the relationship between Satisfaction and Repurchase Intent in Business Markets.
Construct Validity of the School Academic Optimism Scale among Elementary Sch...Jessica Harlan
Vaux’s (2015) investigation of academic optimism and its effect on school effectiveness prompted the use of confirmatory factor analysis to examine the stability of the School Academic Optimism Scale (SAOS) factor structure with elementary teachers from 67 school in Northern Alabama. The reciprocal nature of academic optimism’s subscales warrants further examination into the explanation of greater school effectiveness.
This presentation simplifies the content of a white paper presented by Piyush Kumar regarding the Impact of Performance, Cost and Competitive Considerations on the relationship between Satisfaction and Repurchase Intent in Business Markets.
Keynote at Chilean Week of Computer Science. I present a brief overview of algorithms for Recommender and then I present my work Tag-based Recommendation, Implicit Feedback and Visual Interactive Interfaces.
While a substantial body of research has emerged examining the affect corporate sponsorship has on consumers, the literature has yet to consider how sponsorship affects business-to-business customers. Grounded in social identity theory, this paper addresses this important gap by proposing and empirically testing a B2B sponsorships effects model. The model is tested utilizing Structural Equation Modeling (SEM) of data collected from 552 active business-to-business customers of an industry supply company. Results suggest B2B customers are attuned to company sponsorship activities and are influenced by these sponsorships. Specifically, corporate sponsorships can influence customer’s loyalty, positive word-of-mouth and purchase decisions by enhancing customer’s level of company identification. Theoretical and managerial implications are discussed.
Atelier Portail et réseaux sociaux InterBDP AuvergneRenaud AIOUTZ
Une nouvelle façon de communiquer : les portails et les réseaux Sociaux
Face à l’omniprésence des Facebook, Twitter et autres réseaux sociaux dans la vie quotidienne de beaucoup de lecteurs, comment les Bibliothèques Départementales peuvent-elles se positionner ?
Faut-il être présent ou non ? Que souhaitons-nous communiquer à travers une page Facebook ou un portail ? A qui s’adresse-t-on ?
Journée Inter BDP Auvergne
28 mars 2013 – Le Puy-en-Velay
Atelier animé par :
Alexandrine Ramos – MD du Cantal
aramos@cg15.fr
Florian Briand – MD de l'Allier
briand.f@cg03.fr
Renaud Aïoutz – MD du Puy-de-Dôme
renaud.aioutz@cg63.fr
Abdul Aziz bin Abdullah bin Baz
Language: English | Format: PDF | Pages: 32 | Size: 1 MB
Each worship has a quality and manner demonstrated by Allah or by His prophet peace be upon him. So the writer of this message said in the introduction: “This is a brief about the manner of praying of the prophet introduced to each Muslim to try hard to follow him for the saying of the prophet “Pray as you have seen me praying.” narrated by Bukhari.
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
In today's interconnected world, the risk of malwares is a major concern for users. Antivirus software is a
device to prevent, discover, and eliminatemalwares such as, computer worm, trojan horses,computer
viruses,spyware and adware. In the competitive IT environment, due to availability of many antivirus
software and their diverse features evaluating them is an arguable and complicated issue for users which
has a significant impact on the efficiency of computers defense systems. The anti-virus selection problem
can be formulated as a multiple criteria decision making problem. This paper proposes an antivirus
evaluation model for computer users based on group fuzzy TOPSIS. We study a real world case of antivirus
software and define criteria for antivirus selection problem. Seven alternatives were selected from among
the most popular antiviruses in the market and seven criteria were determined by the experts. The study is
followed by the sensitivity analyses of the results which also gives valuable insights into the needs and
solutions for different users in different conditions.
Keynote at Chilean Week of Computer Science. I present a brief overview of algorithms for Recommender and then I present my work Tag-based Recommendation, Implicit Feedback and Visual Interactive Interfaces.
While a substantial body of research has emerged examining the affect corporate sponsorship has on consumers, the literature has yet to consider how sponsorship affects business-to-business customers. Grounded in social identity theory, this paper addresses this important gap by proposing and empirically testing a B2B sponsorships effects model. The model is tested utilizing Structural Equation Modeling (SEM) of data collected from 552 active business-to-business customers of an industry supply company. Results suggest B2B customers are attuned to company sponsorship activities and are influenced by these sponsorships. Specifically, corporate sponsorships can influence customer’s loyalty, positive word-of-mouth and purchase decisions by enhancing customer’s level of company identification. Theoretical and managerial implications are discussed.
Atelier Portail et réseaux sociaux InterBDP AuvergneRenaud AIOUTZ
Une nouvelle façon de communiquer : les portails et les réseaux Sociaux
Face à l’omniprésence des Facebook, Twitter et autres réseaux sociaux dans la vie quotidienne de beaucoup de lecteurs, comment les Bibliothèques Départementales peuvent-elles se positionner ?
Faut-il être présent ou non ? Que souhaitons-nous communiquer à travers une page Facebook ou un portail ? A qui s’adresse-t-on ?
Journée Inter BDP Auvergne
28 mars 2013 – Le Puy-en-Velay
Atelier animé par :
Alexandrine Ramos – MD du Cantal
aramos@cg15.fr
Florian Briand – MD de l'Allier
briand.f@cg03.fr
Renaud Aïoutz – MD du Puy-de-Dôme
renaud.aioutz@cg63.fr
Abdul Aziz bin Abdullah bin Baz
Language: English | Format: PDF | Pages: 32 | Size: 1 MB
Each worship has a quality and manner demonstrated by Allah or by His prophet peace be upon him. So the writer of this message said in the introduction: “This is a brief about the manner of praying of the prophet introduced to each Muslim to try hard to follow him for the saying of the prophet “Pray as you have seen me praying.” narrated by Bukhari.
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONijfls
In today's interconnected world, the risk of malwares is a major concern for users. Antivirus software is a
device to prevent, discover, and eliminatemalwares such as, computer worm, trojan horses,computer
viruses,spyware and adware. In the competitive IT environment, due to availability of many antivirus
software and their diverse features evaluating them is an arguable and complicated issue for users which
has a significant impact on the efficiency of computers defense systems. The anti-virus selection problem
can be formulated as a multiple criteria decision making problem. This paper proposes an antivirus
evaluation model for computer users based on group fuzzy TOPSIS. We study a real world case of antivirus
software and define criteria for antivirus selection problem. Seven alternatives were selected from among
the most popular antiviruses in the market and seven criteria were determined by the experts. The study is
followed by the sensitivity analyses of the results which also gives valuable insights into the needs and
solutions for different users in different conditions.
Health Informatics – Application of Clinical Risk Management to the Manufacture and Deployment of Health Software. Thick M. eHealth week 2010 (Barcelona: CCIB Convention Centre; 2010)
Artificial intelligence based pattern recognition is
one of the most important tools in process control to identify
process problems. The objective of this study was to
evaluate the relative performance of a feature-based
Recognizer compared with the raw data-based recognizer.
The study focused on recognition of seven commonly
researched patterns plotted on the quality chart. The
artificial intelligence based pattern recognizer trained using
the three selected statistical features resulted in significantly
better performance compared with the raw data-based
recognizer.
A survey of predicting software reliability using machine learning methodsIAESIJAI
In light of technical and technological progress, software has become an urgent need in every aspect of human life, including the medicine sector and industrial control. Therefore, it is imperative that the software always works flawlessly. The information technology sector has witnessed a rapid expansion in recent years, as software companies can no longer rely only on cost advantages to stay competitive in the market, but programmers must provide reliable and high-quality software, and in order to estimate and predict software reliability using machine learning and deep learning, it was introduced A brief overview of the important scientific contributions to the subject of software reliability, and the researchers' findings of highly efficient methods and techniques for predicting software reliability.
This is my thesis part of my MTech in Data Analytics. It talks about Malware analysis using static, dymanic and memory analysis techniques. This paper also focuses on implementation algo approach etc in detail.
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
This research introduces a novel method for predicting Android ransomware attacks using categorical classification techniques. By analyzing features extracted from Android applications, the model effectively identifies malicious behavior, providing a proactive defense against ransomware threats on mobile devices. Enhancing security and ensuring a safer mobile ecosystem.
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...CompTIA
- Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Advanced Security Practitioner (CASP)
- Measuring CASP difficulty
- Why Hybrid Testing Approaches Work Best
- Mapping the NICE Cybersecurity Workforce Framework
Business Benefits of Cloud Computing to Indian IT Servicesaurabh rao
A 20,000 word research thesis on Cloud Computing, the benefits and risks associated with its adoption in the context of Indian IT services industry.
Research carried out as a part of my Master's program in Robert Gordon University.
SOCIAL NETWORKING SITES – USERS’ AWARENESS OF PRIVACY MEASURES, PRIVACY FEATURES USE AND INFORMATION PRIVACY CONCERN Presented at Knowledge SPA IBS Seminar Series
8 Feb. 2012. Best Paper Award at the International Conference on Research and Innovation in Information
Systems 23 - 24 November, 2011. Kuala Lumpur, Malaysia.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
1. EXPLORING IT PROFESSIONALS’ INTENTION TO
USE SOFTWARE DEVELOPMENT RISK
ASSESSMENT FRAMEWORK
Elnaz Farhang Darehshori &
Norshidah Mohamed, PhD (Presenter)
WSEAS 12th International Conference on Applied Computer and Applied
Computational Science (ACACOS’13)
Renaissance Kuala Lumpur MALAYSIA
International Business School
http://www.ibs.utm.my
Universiti Teknologi Malaysia
2. OUTLINE
• Introduction
• Problem formulation
• Problem solution
• Conclusion
2
4. INTRODUCTION
• Software projects have shown an increase
in size, complexity and number [1].
• While the success of software projects is
becoming more critical for these
companies [2], a high percentage of
software projects still fail to meet their
objectives [3].
4
5. RESEARCH QUESTIONS
1. What is the acceptance of risk assessment
framework among IT professionals?
2. Do subjective norm, perceived awareness
and perceived importance correlate to risk
assessment framework acceptance?
5
8. THEORETICAL BASIS .. cont’
Perceived
Usefulness
(U)
Attitude Behavioral Actual
External
towards intention to system use
variables
using (A) use (BI)
Perceived
Ease of use
(E)
Technology Acceptance Model (Davis, Bagozzi and Warshaw, 1989)
8
9. RESEARCH MODEL
ACCEPTANCE OF
RISK ASSESSMENT
FRAMEWORK
EXTERNAL VARIABLES H2
Perceived
ease of compliance
Subjective norm
H3
H5b
Perceived Perceived
importance usefulness
H1
Perceived
awareness Intention to use
framework
9
11. RESEARCH CONTEXT
• Selected software development company in
Malaysia
• Cross-sectional survey approach
• Research participants: IT professionals e.g.
system administrator, programmer etc.
• Risk assessment framework : Malaysia Risk
Assessment Methodology (MyRAM) &
Corrective and Preventing Action (CAPA) model
based on learning from prior experiences
11
12. RESEARCH CONTEXT .. cont’
Source:
http://www.mampu.gov.my/pdf/surat_arahankp24nov10/SAMPEL%20DOKUMEN%20IS
MS/Sampel%20dokumen%20P1/RA%20Guideline%20%28MAMPU-BPICT-ISMS-P1-
008%29.pdf
12
14. PROFILE OF RESPONDENTS
Profile of respondents Percentage
Gender Male 54
Female 46
Total 100
Age 20-29 36
30-39 43
40-49 20
Missing 1
Total 100
Education Bachelor 46
Master 52
Doctorate 2
Total 100 14
15. PROFILE OF VARIABLES
Measures / code / mean Factor α
loading
Intention to use (overall mean score: 3.49)
It is worth to use MyRAM and 0.865 0.861
CAPA in software development.
(ITU1) mean: 3.91
In developing software, I will 0.841
frequently use MyRAM and CAPA.
(ITU2) mean: 3.67
I will strongly recommend others to 0.840
use MyRAM and CAPA when
developing software. (ITU3) mean:
3.08
When developing software, I plan to 0.838
use MyRAM and CAPA. (ITU4)
15
mean: 3.30
16. PROFILE OF VARIABLES ..
cont’
Measures / code / mean Factor α
loading
Perceived usefulness (overall mean score: 3.43)
Using MyRAM and CAPA improves my 0.764 0.880
performance in assessing software
development risks. (PU1) mean: 3.46
In software development, using MyRAM 0.694
and CAPA enhances my effectiveness in
assessing software development risks.
(PU2) mean: 3.38
Using MyRAM and CAPA improves the 0.885
quality of software development risk
assessment. (PU3) mean: 3.33
Overall, I find using MyRAM and CAPA 0.823
useful in assessing software development
risks. (PU4) mean: 3.55 16
17. PROFILE OF VARIABLES ..
cont’
Measures / code / mean Factor loading α
Perceived ease of compliance
(overall mean score: 3.68)
MyRAM and CAPA are easy for me to comply to. 0.890 0.879
(PEOU1) mean:3.51
I find it is easy to comply to MyRAM and CAPA. 0.894
(PEOU2) mean: 3.43
It would be easy for me to become skilful at 0.747
complying to both MyRAM and CAPA. (PEOU3)
mean: 3.85
Overall, I find MyRAM and CAPA as software 0.654
development risk assessment tool easy to comply to.
(PEOU4) mean: 3.92
17
18. PROFILE OF VARIABLES ..
cont’
Measures / code / mean Factor loading α
Subjective norm (overall mean score: 3.48)
Most people (e.g. my team members, colleagues) 0.850 0.895
who are important to me would think that I
should use MyRAM and CAPA. (SN1) mean:
3.48
The organisation that I work for would think that 0.817
I should use MyRAM and CAPA. (SN2) mean:
3.53
My superior and/or sponsor who influence(s) my 0.826
behaviour would think that I should use
MyRAM and CAPA. (SN3) mean: 3.44
18
19. PROFILE OF VARIABLES ..
cont’
Measures / code / mean Factor loading α
Perceived importance (overall mean score: 3.40)
For me personally, in my job, MyRAM and 0.835 0.899
CAPA are important. (PI1) mean: 3.42
For me personally, in my job, MyRAM and 0.837
CAPA are relevant. (PI2) mean: 3.41
For me personally, in my job, MyRAM and 0.816
CAPA are needed. (PI4) mean: 3.28
For me personally, in my job, MyRAM and 0.780
CAPA are essential. (PI3) mean: 3.48
19
20. PROFILE OF VARIABLES ..
cont’
Measures / code / mean Factor loading α
Perceived awareness (overall mean score: 3.70)
I understand what software development risks 0.894 0.824
are. (PA1) mean: 3.64
I understand the procedure to deal with 0.889
software development risks. (PA2) mean: 3.54
I understand what software risk assessment 0.675
process is. (PA3) mean: 3.78
I understand what MyRAM is. (PA4) mean: 0.932
3.81
I understand what CAPA is. (PA5) mean: 3.72 0.786
20
21. CORRELATION ANALYSIS
ITU PU PEOU SN PI PA
ITU 1
PU 0.808** 1
PEOU 0.708** 0.491** 1
SN 0.591** 0.565** 0.483** 1
PI 0.699** 0.711** 0.390** 0.626** 1
PA 0.845** 0.774** 0.546** 0.596** 0.641** 1
Correlation is significant at the 0.01 level (2-tailed) 21
23. SUMMARY OF FINDINGS
1. What is the acceptance of risk assessment
framework among IT professionals?
• IT professionals at the software company
had positive perceptions of risk assessment
framework acceptance.
• All measures of risk framework acceptance
were valid and internally consistent in the
context of Malaysian software development
environment. 23
24. SUMMARY OF FINDINGS
..cont’
2. Do subjective norm, perceived awareness
and perceived importance correlate to risk
assessment framework acceptance?
• All hypotheses were supported
• Strong correlation is found for acceptance
of risk assessment framework (intention to
use, perceived usefulness and perceived
ease of compliance).
24
25. SUMMARY OF FINDINGS
..cont’
2. Do subjective norm, perceived awareness
and perceived importance correlate to risk
assessment framework acceptance?
• When IT professionals perceive usefulness of
the risk assessment framework, they will have
intention to use it at their workplace.
• Besides, they perceive that the framework is
easy to comply to. Owing to its ease of
compliance, they are likely to see it as being
useful to them. 25
26. SUMMARY OF FINDINGS
..cont’
2. Do subjective norm, perceived awareness
and perceived importance correlate to risk
assessment framework acceptance?
• People who matter to IT professionals at the
workplace will promote the professionals’
acceptance of the risk assessment framework.
• With awareness and perception of importance
of the assessment framework, they see it as
useful and are likely to use it. 26
27. LIMITATIONS & FUTURE
RESEARCH
• Data was collected on a convenient basis at
a particular software company and in
Malaysia
• Future research may explore other
companies and in countries other than
Malaysia.
27