58 results on '"Rozilawati Razali"'
Search Results
2. A grounded theory of selecting lean and agile practices for software development
- Author
-
Mashal Kasem Alqudah, Rozilawati Razali, Musab Kasim Alqudah, Muawya N. Al Dalaien, Hamzeh Mohammad Alabool, and Hamzah Ali Alkhazaleh
- Subjects
Software - Published
- 2023
- Full Text
- View/download PDF
3. An Enhanced PageRank Algorithm based on Optimized Normalized Technique and Content-based Approach
- Author
-
Koo Kwong Ze, Fares Hasan, Abudhahir Buhari, Elisha Tadiwa, and Rozilawati Razali
- Subjects
Normalization (statistics) ,Computer science ,business.industry ,Mean value ,General Medicine ,Page rank ,law.invention ,PageRank ,law ,Web page ,The Internet ,Web structure ,business ,Algorithm ,Pagerank algorithm - Abstract
PageRank is an algorithm concerning search queries over the Internet. The algorithm returns the best search results to the user based on the webpage relevancy by calculating the outgoing links from each webpage. Although useful, the algorithm consumes a considerable amount of time as it needs to calculate the available webpages, which are also increasing in number over time. Moreover, the returned results by the algorithm are biased towards old webpages because they have the volume due to their lifetime, thus resulting in newly created webpages to have lower page ranks even though they have comparatively more relevant and useful information. To overcome these issues, this paper proposes an alternative hybrid PageRank algorithm based on optimized normalization technique and content-based approach. The proposed algorithm reduces the number of iterations required to calculate the page rank, hence improves the efficiency, by calculating the mean of all page rank values and normalizes them through the use of the mean. Through this approach, the algorithm is also able to determine the relevancy of webpages based on validity of links rather than popularity. These claims are demonstrated by an experiment conducted on the proposed algorithm using a dummy web structure consisting of 12 webpages. The results showed that the traditional PageRank algorithm has 74% more iterations than the proposed algorithm. The proposed algorithm returned a mean value of 1.00 compared to 1.32 for the traditional algorithm. These results confirm that the proposed algorithm saves a substantial amount of computing power while being more precise and not biased.
- Published
- 2020
- Full Text
- View/download PDF
4. An IMPROVED PAGERANK ALGORITHM BASED ON A HYBRID APPROACH
- Author
-
Koo Kwong Ze, Rozilawati Razali, Fares Hasan, Abudhahir Buhari, and Elisha Tadiwa
- Subjects
Microbiology (medical) ,Normalization (statistics) ,Information retrieval ,Web search query ,business.industry ,Computer science ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,Immunology ,Value (computer science) ,Hybrid algorithm ,Turnaround time ,law.invention ,PageRank ,law ,Web page ,Immunology and Allergy ,The Internet ,business - Abstract
PageRank is an algorithm that brings an order to the Internet by returning the best result to the users corresponding to a search query. The algorithm returns the result by calculating the outgoing links that a webpage has thus reflecting whether the webpage is relevant or not. However, there are still problems existing which relate to the time needed to calculate the page rank of all the webpages. The turnaround time is long as the webpages in the Internet are a lot and keep increasing. Secondly, the results returned by the algorithm are biased towards mainly old webpages resulting in newly created webpages having lower page rankings compared to old webpages even though new pages might have comparatively more relevant information. To overcome these setbacks, this research proposes an alternative hybrid algorithm based on an optimized normalization technique and content-based approach. The proposed algorithm reduces the number of iterations required to calculate the page rank hence improving efficiency by calculating the mean of all page rank values and normalising the page rank value through the use of the mean. This is complemented by calculating the valid links of web pages based on the validity of the links rather than the conventional popularity.
- Published
- 2020
- Full Text
- View/download PDF
5. Combinatorial Test Suites Generation Strategy Utilizing the Whale Optimization Algorithm
- Author
-
Rozilawati Razali, Ali Hassan, Kamal Z. Zamli, and Salwani Abdullah
- Subjects
0209 industrial biotechnology ,Mathematical optimization ,General Computer Science ,Computer science ,Population ,02 engineering and technology ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,Test suite ,General Materials Science ,Software system ,Cuckoo search ,education ,education.field_of_study ,General Engineering ,Particle swarm optimization ,software testing ,meta-heuristic ,Constraint (information theory) ,Search-based software engineering (SBSE) ,T-way testing ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,Equivalence partitioning ,combinatorial testing - Abstract
The potentially many software system input combinations make exhaustive testing practically impossible. To address this issue, combinatorial t-way testing (where t indicates the interaction strength, i.e. the number of interacting parameters (input)) was adopted to minimize the number of cases for testing. Complimentary to existing testing techniques (e.g. boundary value, equivalence partitioning, cause and effect graphing), combinatorial testing helps to detect faults caused by the faulty interaction between input parameters. In the last 15 years, applications of meta-heuristics as the backbone of t-way test suite generation have shown promising results (e.g. Particle Swarm Optimization, Cuckoo Search, Flower Pollination Algorithm, and Hyper-Heuristics (HHH), to name a few). Supporting the No Free Lunch theorem, as well as potentially offering new insights into the whole process of t-way generation, this article proposes a new strategy with constraint support based on the Whale Optimization Algorithm (WOA). Our work is the first attempt to adopt the WOA as part of a search-based software engineering (SBSE) initiative for t-way test suite generation with constraint support. The experimental results of the test-suite generation indicate that WOA produces competitive outcomes compared to some selected single-based and population-based meta-heuristic algorithms.
- Published
- 2020
- Full Text
- View/download PDF
6. Organisational Information Security Management Maturity Model
- Author
-
Mazlina Zammani, Dalbir Singh, and Rozilawati Razali
- Subjects
Capability Maturity Model ,Process management ,General Computer Science ,Information security management ,Computer science ,Questionnaire ,Confidentiality ,Information security ,Maturity (finance) ,Implementation ,Qualitative research - Abstract
Information Security Management (ISM) is a systematic initiative in managing the organisation’s information security. ISM can also be defined as a strategic approach to addressing information security (IS) risks, breaches, and incidents that could threaten the confidentiality, integrity, and availability of information. Although organisations have complied with ISM requirements, security incidents are still afflicting numerous organisations. This issue shows that the current implementation of ISM is still ineffective. The ineffective ISM implementation illustrates the low maturity level. To achieve a higher level of maturity, organisations should always evaluate their ISM practices. Several maturity models have been developed by international organisations, consultants, and researchers to assist organisations in assessing their ISM practices. However, the current models do not evaluate ISM practices holistically. The measurement dimensions in current models are more focused on assessing certain factors only. This caused the maturity assessment to be not executed comprehensively. Therefore, this study aims to address this shortcoming by proposing a comprehensive maturity assessment model that takes into account ISM success factors to evaluate the effectiveness of the implementation. This study adopted a mixed-method approach, which comprises qualitative and quantitative studies to strengthen the research finding. The qualitative study analyses the existing literature and conducts interviews with nine industry practitioners and six experts while the quantitative study involves a questionnaire survey. The data obtained from the qualitative study were analysed using content analysis while the quantitative data employed statistics analysis. The study identified fourteen success factors and fifty-seven maturity dimensions, which each contains five maturity levels. The proposed model was evaluated through experts’ reviews to ensure its accuracy and suitability. The evaluation shows that the model can identify the ISM maturity level systematically and comprehensively. This model will ultimately help the organisations to improve the weaknesses in the implementations thus diminishing security incidents.
- Published
- 2021
- Full Text
- View/download PDF
7. The Discovery of Grounded Theory Practices for Software Engineering Research
- Author
-
Mashal Alqudah, Dzulaiha Aryanee Putri Zainal, and Rozilawati Razali
- Subjects
Process (engineering) ,business.industry ,Computer science ,Strategy and Management ,Best practice ,05 social sciences ,Software development ,050401 social sciences methods ,020207 software engineering ,02 engineering and technology ,Grounded theory ,Software ,0504 sociology ,Systems development life cycle ,0202 electrical engineering, electronic engineering, information engineering ,Business and International Management ,business ,Software engineering ,Qualitative research ,Agile software development - Abstract
Software engineering (SE) research addresses not only technical issues but also human behaviour. SE is considered as an immature discipline because many technical and social issues concerning software development and management have yet to be specified. SE in general is inclined towards quantitative approaches. Nevertheless, qualitative methods are still appropriate for SE research as the methods encourage deep understanding of subject matter. Grounded Theory (GT) is regarded as one of the potential qualitative methods that is applicable to SE research. The method is able to transform less and unknown SE phenomena into cohesive theories through systematic discovery of empirical data from the ground. This paper shares some encounters of using GT in SE research based on the reflection made on several SE research projects covering various phases of software development life cycle. The encounters are then transformed into adaptations and classified as GT practices for SE research, as an effort to inspire the spirit of using GT in SE particularly among novices. The practices embrace aspects concerning formulating research questions, handling preconceptions, utilising software tools, getting access to data and presenting theory and its development process. To illustrate on how the practices were derived, a case study is presented. The proposed GT practices could act as the starting point of adopting GT in SE research. They shall be refined and improved in future to possibly become best practices when more and more experience of using GT in SE are obtained.
- Published
- 2020
- Full Text
- View/download PDF
8. Whole of Government Critical Success Factors towards Integrated E-Government Services: A Preliminary Review
- Author
-
Rozilawati Razali and Mohamed Hairul Othman
- Subjects
E-Government ,Accounting ,Business administration ,Political science ,Whole of government ,Critical success factor ,Joined up government ,Business, Management and Accounting (miscellaneous) ,Business and International Management - Abstract
Electronic Government (E-government) becomes one of the key elements for sustainable development of the country. Previous studies on E-government indicate that most governments are performing well in E-government implementation. However, the issues of process duplication and bureaucracy in services should be addressed to build trust and increase citizens’ satisfaction. Currently, there is a necessity to focus on the development of integrated and tailored-made services that suit with citizens’ needs. This initiative entails high commitment and collaboration from agencies, which can be achieved through the whole of government (WoG) approach. This study aims to identify the critical success factors of WoG towards the development of integrated E-government services. A preliminary review was conducted on previous studies and reports to get some insights of the subject being studied. The identified data were coded and analysed using content analysis method. The findings demonstrate that there are a number of critical success factors for WoG, which consist of technical and non-technical aspects. The findings act as a theoretical framework for better understanding about WoG approach for integrated E-government services. Keywords: E-government; integrated services; whole of government (WoG); connected government; joined-up government ABSTRAK Kerajaan Elektronik (Kerajaan-E) merupakan antara elemen utama bagi mengukur kestabilan pembangunan dan sosio-ekonomi sesebuah negara. Kajian terdahulu berkaitan Kerajaan-E menunjukkan peningkatan prestasi pembangunan Kerajaan-E di kebanyakan negara. Namun pun begitu, isu berkaitan pertindanan proses di antara organisasi dan birokrasi perkhidmatan perlu ditangani bagi meningkatkan tahap kepercayaan dan penerimaan rakyat terhadap perkhidmatan Kerajaan-E. Pada masa kini, keutamaan perlu diberikan kepada membangunkan perkhidmatan yang bersepadu dan berorientasikan rakyat. Inisiatif ini memerlukan kerjasama erat dalam kalangan agensi yang hanya akan dapat dicapai menerusi pendekatan keseluruhan kerajaan. Kajian ini bertujuan mengenalpasti faktor kejayaan kritikal di dalam pendekatan keseluruhan kerajaan yang menyokong kepada pembentukan perkhidmatan Kerajaan-E bersepadu. Soroton susastera dilaksana terhadap kajian terdahulu dan laporan berkaitan. Data yang telah dikenalpasti dikod dan dianalisis menggunakan kaedah analisis kandungan. Dapatan kajian menunjukkan terdapat beberapa faktor kejayaan kritikal untuk pendekatan keseluruhan kerajaan yang merangkumi dimensi teknikal dan bukan teknikal. Dapatan ini bertindak sebagai kerangka teoretikal untuk memahami pendekatan keseluruhan kerajaan bagi pembentukan perkhidmatan Kerajaan-E bersepadu dengan lebih baik. Kata kunci: Perkhidmatan bersepadu; perkhidmatan kerajaan-e; pendekatan keseluruhan kerajaan; platform bersepadu; interoperbiliti
- Published
- 2018
- Full Text
- View/download PDF
9. Legacy Systems Modernisation for Citizen-Centric Digital Government: A Conceptual Model
- Author
-
Dian Indrayani Jambari, Rozilawati Razali, and Humairath Km Abu Bakar
- Subjects
legacy system ,Process management ,media_common.quotation_subject ,Geography, Planning and Development ,Legacy system ,TJ807-830 ,Management, Monitoring, Policy and Law ,TD194-195 ,Renewable energy sources ,Information system ,GE1-350 ,media_common ,Service (business) ,digital government ,Environmental effects of industries and plants ,Renewable Energy, Sustainability and the Environment ,business.industry ,Technology strategy ,Public sector ,Information technology ,citizen centric ,Environmental sciences ,legacy system modernisation ,Information and Communications Technology ,legacy system migration ,Conceptual model ,business - Abstract
Information technology and communication (ICT) plays an important role as a catalyst for organisational development and innovation. However, old information systems that are known as legacy systems often expose organisations to the risk of business failure. These systems are not only impeding the advancement in technology strategy but also hindering the organisations’ business competitiveness. Nevertheless, legacy systems are essential in supporting critical functions in organisations including the public sector and could not be scrapped easily. These systems need to be given a new strength through modernisation to continue providing the best service in line with global trends. Modernisation is a complex task that involves several related aspects. In the context of the public sector, legacy systems involve a complicated information relationship, environment, and culture, while ensuring the citizens are of high priority. The implementation of a digital government represents the transformation of the public service delivery to the citizens that emphasises a citizen-centric design. This study, therefore, aims to address this concern by reviewing the factors involved and suggesting a guideline in the form of a conceptual model to assist in the modernisation of legacy systems for a citizen-centric digital government. Data from the theoretical study were analysed using content analysis. The results show that the legacy systems’ modernisation comprised four main aspects, namely human, process, product, and organisation aspects, with related factors and elements. This model contributes as a reference for the public sector and provides overall guidance in performing legacy systems modernisation.
- Published
- 2021
- Full Text
- View/download PDF
10. Implementation Phases in Modernisation of Legacy Systems
- Author
-
Rozilawati Razali, Humairath Km Abu Bakar, and Dian Indrayani Jambari
- Subjects
Process management ,media_common.quotation_subject ,05 social sciences ,Legacy system ,050301 education ,02 engineering and technology ,Modernization theory ,Maintenance engineering ,Order (exchange) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Quality (business) ,Business ,0503 education ,media_common - Abstract
Legacy systems continue to play an important role in the implementation of information systems in organisations. Many large organisations still rely heavily on these systems in delivering critical services. Legacy systems are important assets of organisations as they contain important business logics and data over several years. Although these systems are critical to the business yet organisations have to face technical difficulties and unnecessary expenses in maintaining the systems. In order to continue providing quality services in line with the global changes, legacy systems need to be refreshed through modernisation. This study therefore reviewed the phases involved in legacy systems modernisation to identify gaps and their insufficiencies. It aims to provide an overall guidance to the organisations in performing legacy systems modernisation.
- Published
- 2019
- Full Text
- View/download PDF
11. The Competency of Project Managers in Managing Agile Cost Management
- Author
-
Rozilawati Razali, Zulkefli Mansor, Saadiah Yahya, and Noor Habibah Arshad
- Subjects
Engineering ,Health (social science) ,Knowledge management ,General Computer Science ,010308 nuclear & particles physics ,business.industry ,General Mathematics ,General Engineering ,Cost accounting ,01 natural sciences ,Education ,Engineering management ,General Energy ,0103 physical sciences ,business ,General Environmental Science ,Agile software development - Published
- 2016
- Full Text
- View/download PDF
12. Ruler for Effective Cost Management Practices in Agile Software Development Projects
- Author
-
Rozilawati Razali, Noor Habibah Arshad, Zulkefli Mansor, Jamaiah Yahaya, and Saadiah Yahya
- Subjects
Health (social science) ,business.product_category ,General Computer Science ,Computer science ,General Mathematics ,Cost accounting ,computer.software_genre ,01 natural sciences ,Education ,Software development process ,Ruler ,0103 physical sciences ,General Environmental Science ,010308 nuclear & particles physics ,business.industry ,Empirical process (process control model) ,General Engineering ,Engineering management ,General Energy ,Extreme programming practices ,Systems engineering ,Lean software development ,business ,computer ,Software project management ,Agile software development - Published
- 2016
- Full Text
- View/download PDF
13. Information Security Management Success Factors
- Author
-
Mazlina Zammani and Rozilawati Razali
- Subjects
Health (social science) ,Cloud computing security ,General Computer Science ,Certified Information Security Manager ,010308 nuclear & particles physics ,General Mathematics ,General Engineering ,Asset (computer security) ,01 natural sciences ,Security information and event management ,Education ,General Energy ,ITIL security management ,Security service ,Risk analysis (engineering) ,Information security management ,0103 physical sciences ,Security through obscurity ,Business ,General Environmental Science - Published
- 2016
- Full Text
- View/download PDF
14. Issues and Challenges of Cost Management in Agile Software Development Projects
- Author
-
Saadiah Yahya, Rozilawati Razali, Noor Habibah Arshad, Jamaiah Yahaya, and Zulkefli Mansor
- Subjects
0209 industrial biotechnology ,Health (social science) ,General Computer Science ,business.industry ,Computer science ,General Mathematics ,0211 other engineering and technologies ,General Engineering ,02 engineering and technology ,Education ,Project manager ,Cost overrun ,Engineering management ,020901 industrial engineering & automation ,General Energy ,021105 building & construction ,Cost engineering ,Systems engineering ,Extreme project management ,Project management ,business ,Software project management ,General Environmental Science ,Agile software development ,Project management triangle - Published
- 2016
- Full Text
- View/download PDF
15. Stakeholders Selection Model for Software Requirements Elicitation
- Author
-
Fares Anwar and Rozilawati Razali
- Subjects
Requirements management ,Business requirements ,Engineering ,Requirement ,Multidisciplinary ,Process management ,Management science ,business.industry ,05 social sciences ,020207 software engineering ,Expert elicitation ,02 engineering and technology ,Requirements elicitation ,Schedule (project management) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Software requirements ,business ,Requirements analysis ,050203 business & management - Abstract
Requirements elicitation is the most critical phase in software requirements engineering. The process is resource intensive, as it concerns with a lot of dedicated stakeholders gathering purposefully to present and stipulate software requirements. The extent of effectiveness of the process is greatly influenced by the suitability of the stakeholders in the process of gathering the requirements. Previous studies indicate that improper stakeholder selection normally lead to unsuccessful requirements elicitation process. Such phenomena would later cause serious impacts to projects such as costly rework, overrun schedule and poor quality software. This study addresses this issue by proposing a model for selecting the suitable stakeholders during requirements elicitation process. The study adopts both the quantitative data collection and analysis. The data gathering was done through survey questionnaire among 300 project managers and analysts. The study employs the Structural Equation Modelling (SEM) to analyse the quantitative data. The results indicate that selecting stakeholders with appropriate characteristics such as stakeholders role, knowledge and communication skills have significant effects on the requirements elicitation phase. The results also reveal that requirements elicitation phase has significant influence on requirements quality. This model is useful for project managers to decide on appropriate stakeholders who are going to be chosen based on their characteristics during requirements elicitation phase.
- Published
- 2016
- Full Text
- View/download PDF
16. A Guidance to Legacy Systems Modernization
- Author
-
Rozilawati Razali, Dian Indrayani Jambari, and Humairath Km Abu Bakar
- Subjects
Process management ,General Computer Science ,business.industry ,Service delivery framework ,Process (engineering) ,Legacy system ,General Engineering ,Information technology ,020207 software engineering ,02 engineering and technology ,Business value ,Modernization theory ,Information and Communications Technology ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,General Agricultural and Biological Sciences ,business - Abstract
Rapid development of information technology and communication (ICT) has increased the use of information systems in organizations since a decade ago. At the same time, many organizations are still using old information systems to support their business, known as legacy systems. Even though these systems cause technical problems, but they are still used to support service delivery to the customer. These systems are also essential to organizations as they have been operated for many years and possess high business value. The operation of legacy systems cannot be stopped quickly, as it will affect daily business tasks. However, organizations with legacy systems need to think about the ability of the systems to support their future direction. Modernization of legacy systems needs to be implemented to ensure the systems are aligned with global changes as well as improving the competitiveness of the organizations. This study, therefore, reviewed the phases and factors involved in legacy systems modernization to identify gaps and their insufficiencies. There are many studies on legacy systems, but only a few have focused on the overall process of legacy systems modernization. Most studies on legacy systems are technical in nature and refer to specific aspects and phases of modernization. This study aims to provide overall guidance to the organizations in performing legacy systems modernization.
- Published
- 2020
- Full Text
- View/download PDF
17. Agile Methods Selection Model: A Grounded Theory Study
- Author
-
Rozilawati Razali, Musab Kasim Alqudah, and Mashal Alqudah
- Subjects
Process management ,General Computer Science ,Scope (project management) ,Computer science ,business.industry ,Organizational culture ,Domain knowledge ,Project management ,business ,Maturity (finance) ,Grounded theory ,Task (project management) ,Agile software development - Abstract
Agile methods adoption has increased in recent years because of its contribution to the success rate of project development. Nevertheless, the success rate of projects implemented using Agile methods has not completely reached its expected mark, and selecting the appropriate Agile methods is one of the reasons for such lag. Selecting the appropriate Agile methods is a challenging task because there are so many methods to select from. In addition, a lot of organizations consider the selection of Agile methods as a mammoth task. Therefore, to assist Agile team members, this study aimed to investigate how the appropriate Agile methods can be determined for different projects. Based on a Grounded Theory study, 23 Agile experts drawn from 19 teams across thirteen countries were interviewed. Hence, this study employed the Ground Theory of selecting Agile methods. Sixteen factors, grouped into five categories, have been found to affect the selection of twenty Agile methods. The nature of project (size, maturity, criticality and decomposability), development team skills (communication skills, domain knowledge, team technical skills and maturity), project constraints (cost/value/ROI, cost of change, time, scope and requirements volatility), customer involvement (collaboration, commitment and domain knowledge) and organizational culture (type of organizational culture) are the key factors that should guide Agile team members in the selection of an appropriate Agile methods based on the value these factors have for different organizations and/or different projects.
- Published
- 2019
- Full Text
- View/download PDF
18. Factors Contributing to the Success of Information Security Management Implementation
- Author
-
Rozilawati Razali, Dalbir Singh, and Mazlina Zammani
- Subjects
Knowledge management ,General Computer Science ,business.industry ,Computer science ,05 social sciences ,02 engineering and technology ,Audit ,Information security ,Information security management ,Business continuity ,Statutory law ,020204 information systems ,0502 economics and business ,Accountability ,Information technology management ,0202 electrical engineering, electronic engineering, information engineering ,Information security policy ,Confidentiality ,business ,050203 business & management ,Risk management - Abstract
Information Security Management (ISM) concerns shielding the integrity, confidentiality, availability, authenticity, reliability and accountability of the organisation’s information from unauthorised access in order to ensure business continuity and customers’ confidence. The importance of information security (IS) in today’s situation should be given due attention. Recognising its importance, organisations nowadays have devoted wide efforts in protecting their information. They establish information security policy, processes, and procedures as well as reengineer their organisational structures to align with ISM principles. Regardless of the efforts, security incidents continue to occur in many organisations. This phenomenon shows that the current implementation of ISM is still ineffective due to unaware of the factors contributing to the success of ISM. Thus, the objective of this paper is to identify ISM success factors and their elements through a large-scale survey. The survey involves 243 practitioners from statutory bodies, public and private organisations in Malaysia. The results of the survey indicate that top management, IS coordinator team, ISM team, IS audit team, employees, third parties, IS policy, IS procedures, resource planning, competency development and awareness, risk management, business continuity management, IS audit and IT infrastructure are the factors that contribute to the success of ISM implementation. These factors shall guide practitioners in planning and refining ISM implementation in their organisations.
- Published
- 2019
- Full Text
- View/download PDF
19. Risk Factors for Software Requirements Change Implementation
- Author
-
Marfizah Abdul Rahman, Fatin Filzahti Ismail, and Rozilawati Razali
- Subjects
Process management ,General Computer Science ,business.industry ,Computer science ,Software development ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Risk factor (computing) ,Focus group ,Project team ,Structural equation modeling ,Product (business) ,Identification (information) ,Software ,0202 electrical engineering, electronic engineering, information engineering ,sense organs ,Software requirements ,skin and connective tissue diseases ,business - Abstract
Requirements change has been regarded as a substantial risk in software development projects. The factors that contribute to the risk are identified through impact analysis, which later determine the planning of the change implementation. The analysis is however not straightforward as the risk factors that constitute requirements change implementation is currently not much explored. This paper identifies the risk factors by firstly collating them qualitatively through a review of related work and a focus group study. The factors are then confirmed quantitatively through a survey in which data is analysed by using Partial Least Squares Structural Equation Modelling (PLS-SEM). The survey comprise of 276 practitioners from software industry who are involved in the impact analysis. The results indicate that User, Project Team, Top Management, Third Party, Organisation, Identification of Change, Existing Product and Planning of Change Implementation are the significant risk factors in planning of requirements change implementation.
- Published
- 2019
- Full Text
- View/download PDF
20. Team Formation for Agile Software Development: A Review
- Author
-
Zulkefli Mansor, Rozilawati Razali, and Dzulaiha Aryanee Putri Zainal
- Subjects
Team composition ,Teamwork ,Process management ,General Computer Science ,Computer science ,business.industry ,media_common.quotation_subject ,General Engineering ,Software development ,Domain (software engineering) ,Software development process ,Software ,Quality (business) ,General Agricultural and Biological Sciences ,business ,Agile software development ,media_common - Abstract
Rapid and unpredictable technology advancements cause a rise in demand for software products that can be delivered faster, adapt to volatile changes and save cost. Over the years, Agile Software Development (ASD) becomes more suitable as the software process that can cater to those demands while still maintaining the quality desired. With this Agile nature, it is apparent that the team that develops the software product need to have unique features as well. The team should also be formed correctly to gain effectiveness, strong performance and ultimately project success. Ineffective teams can be caused by, among others, conflict, inadequate skillset, unbalanced role assignment, lack of teamwork and non-competent team members. However, by far, the characteristics that need to be considered in forming effective teams are yet to be formalized. Thus, this study aims to identify the necessary characteristics in composing a competent team that is well balanced and can create coherent teamwork. The study involves a qualitative literature review which includes past studies about team formation specifically in the software development domain. The data were collected from online journal databases and analyzed using content analysis. From the analysis, six characteristics together with their attributes were identified as vital in team formation. Another two characteristics were also identified as influencing the six-team formation characteristics. These findings will need further empirical rigor before they can become a complete Agile Software Development team composition model. This model is believed to assist Agile practitioners in forming effective teams for their development projects.
- Published
- 2020
- Full Text
- View/download PDF
21. A comparison of scrum and Kanban for identifying their selection factors
- Author
-
Mashal Alqudah and Rozilawati Razali
- Subjects
Process management ,business.industry ,Computer science ,05 social sciences ,Software development ,020207 software engineering ,02 engineering and technology ,Software development process ,Scrum ,Workflow ,Kanban (development) ,Requirement prioritization ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,business ,050203 business & management ,Lead time ,Agile software development - Abstract
Scrum and Kanban methods handle and manage the progress of software development. These methods are used in different situations and workflows. Hence, they are effective for different Agile team members and projects in diverse situations. However, the use of inappropriate method or practice leads to software development processes that are inflexible and wasteful, impacting the organization and causing inefficient development. Adopters of Scrum and Kanban believe that wrong practices of both methods are risky and thus, Agile team members should be assisted in their decision making. The aim of this study is to determine the main factors to consider during the selection of Kanban and Scrum method. The identification of the factors was conducted through in-depth review of the relevant work, after which, content analysis was employed in the analysis of data. As discovered, method prescription, roles and responsibilities, adoption time, team size, batch size, requirements prioritization, feature size, lead time, technical practices, cost and quality were the main factors that guide Agile team members in choosing Scrum or Kanban as well as their practices.
- Published
- 2017
- Full Text
- View/download PDF
22. IMPACT ANALYSIS MODEL FOR SOFTWARE REQUIREMENT CHANGE
- Author
-
Rozilawati Razali, Dalbir Singh, and Marfizah Abdul Rahman
- Subjects
Physics ,software ,change management ,General Medicine ,Information technology ,impact analysis ,T58.5-58.64 ,Humanities ,ds: requirement change - Abstract
Persekitaran dan proses perniagaan yang dinamik menyebab perubahan keperluan dalam perisian tidak dapat dielak. Perubahan keperluan perisian perlu diurus dengan sebaiknya melalui analisis impak yang melibatkan pengenalpastian faktor penyumbang dan penilaian kesan perubahan keperluan terhadap persekitaran semasa. Analisis impak ini perlu disempurna oleh pasukan yang khas iaitu Jawatankuasa Kawalan Perubahan (JKP). Pada dasarnya, analisis impak membantu JKP memperoleh gambaran potensi impak sesuatu perubahan terhadap organisasi sebelum melaksananya. Ini perlu kerana analisis impak yang tidak sempurna boleh menjejas projek sekali gus kemampanan organisasi. Kajian lampau mengenal pasti beberapa faktor teknikal dan bukan teknikal yang perlu diambil kira semasa analisis impak perubahan keperluan perisian. Namun faktor tersebut dikaji secara bersendiri dan berasingan menyebabkan analisis impak menyeluruh sukar dilakukan. Justeru, kajian ini bertujuan mengenal pasti dan menggabung faktor tersebut sebagai model analisis impak perubahan keperluan yang bersepadu. Kajian ini bersifat kualitatif dengan data dikumpul mengguna teknik temu bual secara kumpulan fokus. Data yang dikumpul dianalisis mengguna teknik analisis kandungan. Hasil analisis mendapati terdapat empat kategori faktor yang terlibat iaitu Manusia, Proses, Teknologi (sedia ada) dan Organisasi. Setiap kategori faktor mengandungi faktor dan elemen tertentu yang dihubungkan untuk menggambarperkaitannya. Model ini dapat diguna oleh JKP sebagai panduan menilai sesuatu permintaan bagi perubahan keperluan perisian.
- Published
- 2014
23. Assessing Students’ Acceptance of Case Method in Software Engineering Education – A Survey
- Author
-
Rozilawati Razali and Dzulaiha Aryanee Putri Zainal
- Subjects
Software engineering education ,Descriptive statistics ,business.industry ,Subject (documents) ,Empirical assessment ,Case method ,Subject matter ,Software ,Meaningful learning ,Social skills ,Content analysis ,ComputingMilieux_COMPUTERSANDEDUCATION ,General Materials Science ,Software engineering ,business ,Set (psychology) ,Psychology - Abstract
Case Method (CM) is a teaching technique that uses real cases as a tool for delivering a particular subject. Software Engineering (SE) is a discipline that concerns the principles, methods and tools for developing and improving software. SE education therefore tends to be too theoretical. To impose realism where the students can be exposed to real scenarios and learn to apply those theories through discovery, CM is seen as necessary for SE education. This paper presents a survey conducted to a set of students who employed CM in learning SE. The objective of the survey was to assess the degree of acceptance among SE students on the usage of CM. The participants were Undergraduates and Masters that comprise local, international and matured students. The data were analysed quantitatively using descriptive statistics and qualitatively through content analysis. The results indicate that CM can be useful for SE education. The participants accepted CM because it improves the understanding of subject matter, enhances interpersonal skills and provides meaningful learning experience. Nonetheless, CM is seen as effective only when certain conditions are met. The results can be used by SE educators to enhance teaching and learning in future.
- Published
- 2013
- Full Text
- View/download PDF
24. Usability Dimensions for Mobile Applications-A Review
- Author
-
Rozilawati Razali, Dalbir Singh, and Rosnita Baharuddin
- Subjects
Engineering ,General Computer Science ,Cognitive walkthrough ,Multimedia ,business.industry ,System usability scale ,General Engineering ,Usability inspection ,Usability ,computer.software_genre ,Usability lab ,Usability goals ,Human–computer interaction ,Usability engineering ,business ,Web usability ,computer - Abstract
Usability has been increasingly recognized as a significant quality dimension to determine the success of mobile applications. Due to its importance, a number of usability guidelines have been proposed to direct the design of usable applications. The guidelines are intended particularly for desktop and web-based applications. Mobile applications on the other hand are different in many ways from those applications due to the mobility nature of mobile devices. To date, the usability guidelines for mobile applications are very limited. They in fact are isolated, which makes usability evaluation for mobile devices more difficult. This study aims to address this issue by proposing a set of usability dimensions that should be considered for designing and evaluating mobile applications. The dimensions are illustrated as a model that considers four contextual factors: user, environment, technology and task/activity. The model was proposed based on the reviews of previous related studies, which were analyzed by using content analysis approach. Twenty-five dimensions were found from the analysis. The dimensions however were synthesized and prioritized based on their importance towards designing usable mobile applications. As a result, ten most important dimensions were outlined in the model. The model can be used by practitioners and researchers as a guideline to design usable mobile applications and further research can be conducted in the near future.
- Published
- 2013
- Full Text
- View/download PDF
25. Student Centered Learning Environment for Project Monitoring
- Author
-
Jamhiriah Jilani, Norleyza Jailani, Zarina Shukur, Marini Abu Bakar, Mohd Juzaiddin Abd. Aziz, and Rozilawati Razali
- Subjects
Cooperative learning ,Engineering ,Knowledge management ,Student Centered Learning ,business.industry ,Teaching method ,Learning environment ,Software development ,Project supervision ,Experiential learning ,Learning sciences ,Computer Science final year project ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,General Earth and Planetary Sciences ,Time management ,business ,Software project management ,General Environmental Science - Abstract
Student Centered Learning Environment is a learning environment that describes thinking methods about learning and teaching that emphasizes student responsibility in learning activities such as planning, interacting with lecturers and other students, doing research and evaluating learning. This means that students play an important and active role in learning. Applying the concept to Computer Science final year project requires students to be independent in carrying out activities related to the research literature, mastering software tools or libraries, designing, developing and testing software, and writing reports. Theoretically, a supervisor plays the role of an advisor to ensure the project is successfully completed within the designated timeframe. However, most of the time, students are often given the freedom to manage their project, sometimes without adequate guidance from supervisors. This is a rather complicated problem for moderate and weak students. For students to actively participate in their own learning they must possess self-monitoring and other meta-cognitive skills which are not necessarily inherent in every individual. A survey done in our faculty shows that Computer Science students face a number of problems in the course of accomplishing their final year project which include time management, anxiety, academicachievements, and capability of managing project and strategy to complete the project (listed according to factors that most affected them). This paper will discuss the role of the Final Year Project Supervision Management System in support of student-centered learning for final year project at the School of Computer Science. Mapping between system features and principles of student centered learning is also presented. The system has been developed to monitor students’ progress both in software development and report writing, as well as managing the process of allocating supervisors and examiners to students and grading.
- Published
- 2013
- Full Text
- View/download PDF
26. Usability Requirement of Formal Verification Tools
- Author
-
Rozilawati Razali and Paul Garratt
- Subjects
empirical study ,Computer science ,business.industry ,Information technology ,General Medicine ,Artificial intelligence ,usability requirement ,T58.5-58.64 ,business ,formal verification tools ,Humanities ,Formal verification - Abstract
Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on the other hand are difficult to understand and use by most users. As supporting instruments, verification tools are expected to be as usable as possible to overcome this limitation. This study presents a survey conducted on two instances of verification tools that support formal notations, namely ProB and B-Toolkit. The focus of the survey was to identify the important features that are necessary for verification tools to become usable to users. The survey assessed the tools’ usability based on the Cognitive Dimensions of Notations (CD) framework and several criteria suggested by the International Organization for Standardization (ISO). Sixty-three participants responded to the survey. The data were analyzed by using the Grounded Theory. The analysis enabled the identification of abstract features and properties that formed a design guideline for usable verification tools. The 38guideline includes three main categories of feature; Interface, Utilities and Resources Management. The features are further elaborated through the specification of specific properties and dimensions for implementation. The guideline could act as a roadmap for tool designers to design verification tools that promote the use of formal notations.
- Published
- 2012
- Full Text
- View/download PDF
27. A Framework of Successful Executive Information System Development for Education Domain
- Author
-
Rozilawati Razali and Mahamsiatus Kamaruddin
- Subjects
Engineering ,Multidisciplinary ,Knowledge management ,Data collection ,business.industry ,Process (engineering) ,Executive information system ,Critical success factor ,Problem statement ,Information system ,business ,Field (computer science) ,Domain (software engineering) - Abstract
Problem statement: Education management is a centralized process of planning, monitoring and controlling entities involved in education affairs so that they align with educational aspirations. It normally concerns several layers of administration that requires different types of information from various operational units. Operational units in education however are scattered and managed independently. As a result, most information is isolated where it is not easily and readily available. This hinders executives from making good judgment since a holistic view about the operations cannot be obtained instantly. Approach: This issue can be resolved, for instance, by having an Executive Information System (EIS). EIS is a dedicated information system that has the capacity to not only retrieving and storing information but also performing comparative analyses through its mapping and merging feature. EIS however does not depend entirely on technology. To succeed, an EIS should be developed based on concrete underlying bases that consider both operational and business aspects. The bases are called Critical Success Factors (CSF). This study discusses the CSF that influence EIS development for education domain. The factors were identified through reviews of related work and two iterations of field work that used semi-structured interviews as the means of data collection. The study adopted qualitative approach where the data were analyzed by using content analysis. Results: The collated CSF form a framework of successful EIS development, which can be employed by education stakeholders as a guideline for developing EIS in the institution. Conclusion: The framework is seen as feasible and practical to be applied in education domain as it considers the necessary elements of education business.
- Published
- 2011
- Full Text
- View/download PDF
28. Considerations for Cost Estimation of Software Testing Outsourcing Projects
- Author
-
Rozilawati Razali, Zulkefli Mansor, and Fatin Filzahti Ismail
- Subjects
Estimation ,General Computer Science ,Cost–benefit analysis ,Cost estimate ,business.industry ,Computer science ,General Engineering ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Software quality ,Outsourcing ,Indirect costs ,Risk analysis (engineering) ,0202 electrical engineering, electronic engineering, information engineering ,Project management ,Duration (project management) ,General Agricultural and Biological Sciences ,business - Abstract
Software testing outsourcing appears to be the best alternative to acquire better software quality with competent ratification by extrinsic parties who have the capability to do it. Through the effort, organizations are peeking to promising benefits constitute in it such as current testing technology, experts, an abridgment of the project’s duration and more concentration on the main organisation’s activity. Along with these benefits, one important reason that encourages the decision is optimization of cost expenditure, which the strategy is perceived as a good move for a competitive organization. However, implementing such preference eventually results in a different outcome. Organizations have to bear the higher cost and incur losses of cost deviation from the expected estimation. The conflicting between cost and benefits raises an important concern of striving better cost estimation for such projects. This paper aims to address this interest by analyzing the existing literature in order to identify the contributing factors towards better cost estimation for software testing outsourcing project-context. The analysis is done using the content analysis method. The results could be divided into two categories; which are the cost items and contributing factors. Cost items consist of direct cost and indirect cost, which refers to the expenses for the project. While the contributing factors consist of people and environment, which are needed to produce accurate cost estimation. The findings provide an insight to excogitate attentively the essentials in the endeavor of improving the exactitude of cost estimation for software testing outsourcing project.
- Published
- 2019
- Full Text
- View/download PDF
29. An Empirical Study of Scrumban Formation based on the Selection of Scrum and Kanban Practices
- Author
-
Mashal Alqudah and Rozilawati Razali
- Subjects
Process management ,General Computer Science ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,General Engineering ,Scrumban ,020207 software engineering ,02 engineering and technology ,Scrum ,Empirical research ,Kanban (development) ,Requirement prioritization ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,General Agricultural and Biological Sciences ,business ,050203 business & management ,Lead time ,Agile software development ,media_common - Abstract
Scrumban is a combination of practices from Kanban and Scrum practices to manage the development of software based on different project situations. Scrumban practices formation can differ based on different projects and team members. However, since each method has its own pros and cons, inappropriate formation of Scrumban practices may lead to increased waste and time of development, and decreased quality, which in turn, affect the Agile organizations and cause inefficient and ineffective development. Practitioners of Kanban and Scrum are convinced that a combination of both methods is better than the use of one and thus, practitioners should be guided in their decision making. This study aims to show how Scrumban method is formed based on a combination of Kanban and Scrum methods. Scrumban formation and the identification of the factors, which assist in the combination of Kanban and Scrum were conducted through a review of the previous work and semi-structured interviews with 7 Agile experts, after which, content analysis was conducted to analyse the gathered data. Different factors - the method prescription, roles and responsibilities, adoption time, team size, batch size, requirements prioritization, feature size, lead time, technical practices, cost and quality, assist Agile team members in the formation of Scrumban by combining appropriate Kanban and Scrum practices. In addition, Scrumban were found to be more appropriate than Scrum or Kanban in saving time, improving quality and minimizing waste.
- Published
- 2018
- Full Text
- View/download PDF
30. Usability Requirements of Formal Verification Tools: A Survey
- Author
-
Rozilawati Razali and Paul Garratt
- Subjects
Functional verification ,Standardization ,Computer Networks and Communications ,business.industry ,Computer science ,Problem statement ,Usability ,Guideline ,Formal methods ,computer.software_genre ,System model ,Cognitive dimensions of notations ,Artificial Intelligence ,Verification ,Data mining ,Software engineering ,business ,Formal verification ,computer ,Software - Abstract
Problem statement: Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on the other hand are difficult to understand and use by most users. As supporting instruments, verification tools are expected to be as usable as possible to overcome this limitation. Approach: This study presented a survey conducted on two instances of verification tools that support a formal method, namely B. The focus of the survey was to identify the important features that are necessary for verification tools to become usable to users. The survey assessed the tools’ usability based on the Cognitive Dimensions of Notations (CD) framework and several criteria suggested by the International Organization for Standardization (ISO). Sixty-three participants responded to the survey. The data was analyzed by using the grounded theory. Results: The analysis enabled the identification of abstract concepts and properties that formed a design guideline for usable verification tools. The guideline includes there main aspects; Interface, Utilities and Resources Management. Conclusion: The guideline acts as a roadmap for tool designers to design verification tools that promote the use of formal notations.
- Published
- 2010
- Full Text
- View/download PDF
31. Cognitive dimensions and grounded theory in learning software modeling
- Author
-
Garratt Arcs and Rozilawati Razali
- Subjects
Learnability ,Computer science ,business.industry ,Modeling language ,Software usability ,Usability ,computer.software_genre ,Grounded theory ,Cognitive dimensions of notations ,Object-modeling technique ,Software learnability ,Unified Modeling Language ,Human–computer interaction ,Software modeling ,General Materials Science ,Artificial intelligence ,business ,computer ,Cognitive dimensions ,Natural language processing ,computer.programming_language - Abstract
The modeling of computer software is complex and error prone. Modeling methods and languages must be usable which implies easy to learn. Cognitive dimensions and grounded theory were used to analyse the usability and learnabilty of the new modeling language Unified Modeling Language- B: UML-B. A systematic survey of users’ encounters and interactions with UML-B clarified its good and bad features. The results indicate that UML-B is more usable and learnable than comparative modeling languages such as ‘B’. The results of this study will improve the future development of UML-B to increase its learnability hence its usability.
- Published
- 2009
- Full Text
- View/download PDF
32. Usability Assessment Of A Uml-based Formal Modeling Method Using A Cognitive Dimensions Framework
- Author
-
Paul Garratt, Michael Poppleton, Rozilawati Razali, and Colin Snook
- Subjects
Knowledge management ,Social Psychology ,Standardization ,lcsh:T58.5-58.64 ,business.industry ,Computer science ,lcsh:Information technology ,Communication ,semiformal and formal notations ,Usability ,Notation ,empirical assessment ,Grounded theory ,Human-Computer Interaction ,usability ,Cognitive dimensions of notations ,Unified Modeling Language ,Problem domain ,Usability engineering ,cognitive dimensions (CD) ,business ,computer ,computer.programming_language ,grounded theory - Abstract
Conceptual models communicate the important aspects of a problem domain to stakeholders. The quality of the models is highly dependent on the usability of the modeling method used. This paper presents a survey conducted on a method that integrates the use of a semiformal notation, namely the Unified Modeling Language (UML) and a formal notation, namely B. The survey assessed the usability of the method by using the grounded theory, the Cognitive Dimensions of Notations (CD) framework, and several criteria suggested by the International Organization for Standardization (ISO). Ten participants responded to the survey. The results suggest that the method is accessible to users when the principles and roles of each notation are obvious and well understood, and when there is strong support from the environment. Supported by the findings, a usability profile based on CD for designing a method that integrates semiformal and formal notations is proposed.
- Published
- 2008
33. A QUALITATIVE EMPIRICAL INVESTIGATION OF CONTRIBUTING SUCCESS FACTORS FOR SOFTWARE TESTING OUTSOURCING PROJECTS
- Author
-
Rozilawati Razali and Fatin Filzahti Ismail
- Subjects
Test strategy ,Knowledge management ,business.industry ,Vendor ,Process (engineering) ,media_common.quotation_subject ,General Engineering ,Knowledge process outsourcing ,Outsourcing ,Software testing ,Content analysis ,Quality (business) ,business ,media_common - Abstract
Software testing outsourcing is becoming attractive among organisations that desire to gain high quality products within reasonable cost while allowing testing experts to assure its quality. Despite these promising advantages however, organisations have yet to learn the factors that contribute to such projects’ success. The necessary planning and actions could not thus be taken towards the effort. Consequently, software testing outsourcing projects still fail. This study aimed to address this concern by collating the factors from previous research. The investigation continued by confirming the factors besides discovering other relevant factors from software testing practitioners. This study adopted qualitative approach where it employed semi-structured interviews involving five practitioners, who represented both client and vendor. The data were analysed using content analysis. The results show that there are two aspects to be considered, namely Process and People. The former contains nine factors and the latter comprises four factors. Each factor has specific elements, which delineates the characteristics or roles that it owns. The findings provide practitioners with understanding of conducting software testing outsourcing projects effectively.
- Published
- 2015
- Full Text
- View/download PDF
34. Problem-based Learning for Programming Education
- Author
-
Aminah Bibi Bawamohiddin and Rozilawati Razali
- Subjects
Programming education ,General Computer Science ,business.industry ,Computer science ,Management science ,05 social sciences ,Computer programming ,General Engineering ,050301 education ,02 engineering and technology ,Learning programming ,Empirical research ,Problem-based learning ,020204 information systems ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Learning methods ,Thematic analysis ,General Agricultural and Biological Sciences ,business ,0503 education ,Effective teaching - Abstract
Computer Programming is a core subject in Computer Science. This course requires the analysis and solving of problem critically. These skills are also required in preparing Computer Science students for the career world. Problem-based Learning is thus regarded as one of the suitable methods for Teaching and Learning programming. Although this method has been proven to hone student skills in other areas such as Medicine, its usage in Computer Programming courses has yet to bring about any impacts. This is because, to date, Problem-based Learning has been employed based on the practitioner’s intuition without specifically meeting the principles and concepts of Programming courses from the human, process, and product aspects. The human aspect involves practitioners during the process. The framework for this study is built using a qualitative method that combines theoretical and empirical studies. The theoretical study includes reviews of the implementation of previous Problem-based Learning in Computer Science as well as other fields. The empirical study involves information obtained from both the theoretical and empirical studies were analysed by utilising the Thematic Analysis method to generate the proposed framework for this study. This framework can be utilised as a guide for the management and practitioners in Computer Science education to use Problem-based Learning as an effective Teaching and Learning method for Programming courses.
- Published
- 2017
- Full Text
- View/download PDF
35. Key Factors for Selecting an Agile Method: A Systematic Literature Review
- Author
-
Rozilawati Razali and Mashal Alqudah
- Subjects
Engineering ,Agile usability engineering ,Process management ,General Computer Science ,Management science ,business.industry ,Empirical process (process control model) ,General Engineering ,Organizational culture ,Agile Unified Process ,020207 software engineering ,02 engineering and technology ,Systematic review ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Lean software development ,Project management ,General Agricultural and Biological Sciences ,business ,Agile software development - Abstract
Agile methods have become popular in recent years because the success rate of project development using Agile methods is better than structured design methods. Nevertheless, less than 50 percent of projects implemented using Agile methods are considered successful, and selecting the wrong Agile method is one of the reasons for project failure. Selecting the most appropriate Agile method is a challenging task because there are so many to choose from. In addition, potential adopters believe that migrating to an Agile method involves taking a drastic risk. Therefore, to assist project managers and other decision makers, this study aims to identify the key factors that should be considered when selecting an appropriate Agile method. A systematic literature review was performed to elicit these factors in an unbiased manner and then content analysis was used to analyze the resultant data. It was found that the nature of project, development team skills, project constraints, customer involvement and organizational culture are the key factors that should guide decision makers in the selection of an appropriate Agile method based on the value these factors have for different organizations and/or different projects.
- Published
- 2017
- Full Text
- View/download PDF
36. A preliminary review of interface design elements for mobile electronic government systems
- Author
-
Nurulhusna Ghazali and Rozilawati Razali
- Subjects
Human–computer interaction ,Computer science ,Mobile computing ,Mobile payment ,Mobile search ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Mobile Web ,Mobile technology ,Mobile business development ,M-government ,User interface design - Abstract
Electronic Government (e-Government) systems are intended primarily to deliver governmental information and services through the web. The rapid evolution of mobile technology has triggered the need for conventional web-based e-Government systems to move towards another era known as Mobile Government (m-Government) systems. Although the functionality remains the same, the use of mobile devices in m-Government systems has caused the interface design of such systems to be dissimilar from the conventional web-based e-Government systems. Mobile devices in some ways have limited capacity in terms retrieving and displaying information, which makes their interface design to be quite tricky. This study aims to review the existing interface design frameworks in order to identify and collate the essential design elements that should be considered in designing the interface for m-Government systems. The study analysed qualitatively four m-Government interface design frameworks, namely 7Cs Design Elements, A Functional Design Approach for Mobile Government Website, Adaptive Mobile Government Framework and Framework of information Quality of Mobile Interface e-Government. By using content analysis, the study identified eight design elements from such frameworks. The study also highlighted the limitations of the current frameworks that could be explored further by future studies in interface design for m-Government systems.
- Published
- 2014
- Full Text
- View/download PDF
37. A Guideline of Using Case Method in Software Engineering Courses
- Author
-
Dzulaiha Aryanee Putri Zainal, Rozilawati Razali, and Zarina Shukur
- Subjects
Semi-structured interview ,business.industry ,Teaching method ,Social science education ,Guideline ,Education ,Quality software ,Engineering education ,Computer software ,Mathematics education ,Psychology ,Software engineering ,business ,Qualitative research - Abstract
Software Engineering (SE) education has been reported to fall short in producing high quality software engineers. In seeking alternative solutions, Case Method (CM) is regarded as having potential to solve the issue. CM is a teaching and learning (T&L) method that has been found to be effective in Social Science education. In principle, instructors should be guided appropriately in order to adopt CM in T&L. SE education however lacks of such guidelines. This paper addresses this concern by identifying the factors and their corresponding elements and conditions that contribute to the effective use of CM in T&L SE courses. The factors, elements and conditions were then collated as a framework in the form of a guideline. The factors, elements and conditions were gathered through a series of studies, namely a theoretical study, two surveys and two expert reviews. The theoretical study involved reviewing previous research, while the surveys were performed with five groups of students who experienced CM in learning SE courses. The students were from various education and work backgrounds. Two types of survey instruments were employed, which are questionnaire and group interviews. To form the guideline, the gathered data were analysed qualitatively using contents analysis. The guideline was then validated by two experts through expert reviews. There are four main factors that constitute the guideline of using CM in T&L SE courses: Case, Instructor, Student and Infrastructure. Each factor has its corresponding elements and conditions. The guideline is useful for SE instructors to adopt CM in T&L SE courses at their institutions.
- Published
- 2014
- Full Text
- View/download PDF
38. The Suitability of Adopting Problem-based Learning in Computer Science Education
- Author
-
Rozilawati Razali and Aminah Bibi Bawamohiddin
- Subjects
Problem-based learning ,Computer science ,Management science ,Learning sciences - Published
- 2014
- Full Text
- View/download PDF
39. Contributing factors of successful software testing outsourcing
- Author
-
Rozilawati Razali and Fatin Filzahti Ismail
- Subjects
Test strategy ,Process management ,business.industry ,Personal software process ,Software construction ,Software quality analyst ,business ,System integration testing ,Knowledge process outsourcing ,Outsourcing - Published
- 2014
- Full Text
- View/download PDF
40. A Risk Model of Requirements Change Impact Analysis
- Author
-
Rozilawati Razali, Dalbir Singh, and Marfizah Abdul Rahman
- Subjects
Requirements management ,Requirement ,Business requirements ,business.industry ,Management science ,Business process ,Computer science ,Factor analysis of information risk ,Change impact analysis ,Change management (ITSM) ,Human-Computer Interaction ,IT risk management ,Risk analysis (engineering) ,Artificial Intelligence ,Risk analysis (business) ,Requirement prioritization ,Change management (engineering) ,Requirements change management ,Software system ,business ,Requirements analysis ,Software ,Risk management - Abstract
Software systems are critical assets to organisations as they support important business processes and workflow. To maintain the value of these assets, the requirements of software systems must evolve whenever there are changes in business needs. A key problem to organisations is implementing requirements change to the existing software systems. Such initiatives need proper analyses so that their effects could be determined before resources are spent. Impact analysis is therefore an important step in requirements change management. As a project, any change implementation involves risks. It is thus necessary for impact analysis to consider risk factors for implementing requirements change. However to date, the risk factors concerning requirement change are not much explored. This paper aims to identify the risk factors for implementing requirements change. The risk factors were identified through two qualitative approaches, namely a review of related work and a focus group study. The former involved fifty published articles and the latter concerned five domain experts. The collected risk factors from both studies were analysed by using content analysis. The risk factors form a risk model for analysing impacts of implementing requirements change. The model helps practitioners to assess the viability of requirements change requests.
- Published
- 2014
- Full Text
- View/download PDF
41. Key contributing factors towards successful Electronic Government systems interoperability
- Author
-
Rozilawati Razali and Mohamed Othman
- Subjects
Government ,Knowledge management ,Process (engineering) ,business.industry ,Information and Communications Technology ,Computer science ,WS-I Basic Profile ,Interoperability ,Public sector ,Cross-domain interoperability ,Semantic interoperability ,business - Abstract
Electronic Government (e-Government) is an initiative of transforming public sector delivery system towards high performance services and citizen oriented. The emergence of broadband and communication technology has catalyzed the growth of online systems forming the main thrust of e-Government. However, the satisfaction level of e-Government systems remains low because of recurrent transactions in different users systems. In addition, most of e-Government systems are still not integrated. Successful integration can be achieved if interoperability factors are completely defined in a framework and introduced in the early stages of system development. This paper aims to review existing e-Government interoperability frameworks which are European Interoperability Framework, e-Government Interoperability Framework (UK), Standards and Architectures for e-Government Applications (Germany) and E-Government Interoperability Framework (Greek). These frameworks were analyzed using content analysis method to identify the key successful factors towards e-Government systems interoperability. The factors were grouped into two dimensions; people and process. These dimensions and factors subsequently become the basis for developing a holistic and integrated framework in the future.
- Published
- 2013
- Full Text
- View/download PDF
42. A preliminary review of legacy information systems evaluation models
- Author
-
Rozilawati Razali and Humairath Km Abu Bakar
- Subjects
Knowledge management ,Computer science ,business.industry ,media_common.quotation_subject ,Maintainability ,Business process reengineering ,Business value ,Documentation ,Order (exchange) ,Content analysis ,Information system ,Quality (business) ,business ,media_common - Abstract
Some organisations own information systems (IS) whose age are more than ten years old to support their businesses. These systems are known as legacy information systems (LIS). LIS are still in use because they bring high business values. On the other hand, LIS normally lead to maintainability problems due to lack of experts who understand the systems, high maintenance costs and lack of documentation. This requires organisations to decide whether to continue maintaining LIS, discard them totally, replace them or perform reengineering. To make such decisions, organisations need guidance on LIS evaluation. This study therefore reviewed the available LIS evaluation models in order to identify gaps and insufficiencies in them. Four models were reviewed and qualitatively analysed using content analysis. The models include ISO 25010, ISO 25012, Hierarchical Models and Renaissance Method. Based on the analysis, the common aspects of LIS evaluation found are business value, technical quality and organisational characteristics. This study has provided some potential areas that could be explored further by future studies in LIS evaluation.
- Published
- 2013
- Full Text
- View/download PDF
43. Success Factors for Using Case Method in Teaching and Learning Software Engineering
- Author
-
Rozilawati Razali and Dzulaiha Aryanee Putri Zainal
- Subjects
Class size ,business.industry ,Teaching method ,Social science education ,Education ,Software development process ,Case method ,Content analysis ,Engineering education ,Active learning ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Software engineering ,business ,Psychology - Abstract
The Case Method (CM) has long been used effectively in Social Science education. Its potential use in Applied Science such as Software Engineering (SE) however has yet to be further explored. SE is an engineering discipline that concerns the principles, methods and tools used throughout the software development lifecycle. In CM, subjects are presented to students by means of real cases whereby students themselves either individually or in group discussions work through the problems and issues presented in the cases. The CM approach is deemed necessary for SE education in order to expose students to real scenarios that challenge them to develop the appropriate skills to deal with practical problems. As a largely theoretical subject, SE students could understand more about the practical application of SE concepts and ideas via such active learning activities. This paper presents a survey conducted on two sets of students who were exposed to CM in learning SE. Besides confirming the acceptance of CM among SE students, the surveys aimed to discover the contributing factors and elements that influence the efficacy of the method. The participants consisted of 64 undergraduates that comprised local full-time and executive students. The survey was performed in two semesters through group interviews. Data from the survey were analysed qualitatively using content analysis. The results showed that there are four factors that are important to teaching SE using CM, namely Environment, Case, Instructor, and Student. Each of these factors has certain criteria and characteristics that suggest how CM can be successfully used in teaching and learning SE. These findings can be used by SE educators to more effectively plan the use of CM as one possible teaching method in SE.
- Published
- 2013
- Full Text
- View/download PDF
44. An Empirical Study of Information Security Management Success Factors
- Author
-
Mazlina Zammani and Rozilawati Razali
- Subjects
Related factors ,Engineering ,Knowledge management ,General Computer Science ,business.industry ,05 social sciences ,General Engineering ,Success factors ,02 engineering and technology ,Information security ,Security information and event management ,Empirical research ,Key factors ,Information security management ,Content analysis ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,General Agricultural and Biological Sciences ,business ,050203 business & management - Abstract
Information security management (ISM) is a continuous, structured and systematic security approach to manage and protect the organisation’s information from being compromised by irresponsible parties. To ensure the information remains secure, many organisations have implemented ISM by establishing and reviewing information security (IS) policy, processes, procedures and organisational structures. Regardless of the efforts, security threats, incidents, vulnerabilities and risks are still plaguing many organisations. Lack of awareness of ISM effectiveness due to low understanding of the success factors is one of the major factors that cause this phenomenon. This study aimed to address this subject by firstly identifying the ISM key factors from existing literature and then by confirming the factors and discovering other related factors from practitioners’ perspective. This study used qualitative method where it adopted semi-structured interviews involving nine practitioners. The data were analysed using content analysis technique. Through the analysis, the study validated several ISM factors and their elements that contribute to the success of ISM. The findings provide practitioners with the high understanding of ISM key factors and could guide practitioners in implementing proper ISM.
- Published
- 2016
- Full Text
- View/download PDF
45. A Review of Scaling Agile Methods in Large Software Development
- Author
-
Rozilawati Razali and Mashal Alqudah
- Subjects
Engineering ,Knowledge management ,Agile usability engineering ,Process management ,General Computer Science ,business.industry ,Empirical process (process control model) ,General Engineering ,Agile Unified Process ,020207 software engineering ,02 engineering and technology ,Agile modeling ,Scrum ,020204 information systems ,Scaled Agile Framework ,0202 electrical engineering, electronic engineering, information engineering ,Lean software development ,General Agricultural and Biological Sciences ,business ,Agile software development - Abstract
Agile methods such as Dynamic Systems Development Method (DSDM), Extreme Programming (XP), SCRUM, Agile Modeling (AM) and Crystal Clear enable small teams to execute assigned task at their best. However, larger organizations aim at incorporating more Agile methods owing to the fact that its application is prevalently tailored for small teams. The scope in which large firms are interested will extend the original Agile methods to include larger teams, coordination, communication among teams and customers as well as oversight. Determining particular software method is always challenging for software companies especially when considering start-up, small to medium or large enterprises. Most of large organizations develop large-scale projects by teams of teams or teams of teams of teams. Therefore, most recognized Agile methods or first-generation methods such as XP and SCRUM need to be modified before they are employed in large organizations; which is not an easy task. Accomplishing said task would necessitate large organizations to pick and select from the scaling Agile methods in accommodating a single vision for large and multiple teams. Deciding the right choice requires wholesome understanding of the method including its strengths and weaknesses as well as when and how it makes sense. Therefore, the main aim of this paper is to review the existing literature of the utilized scaling Agile methods by defining, discussing and comparing them. In-depth reviews on the literature were performed to juxtapose the methods in impartial manner. In addition, the content analysis was used to analyse the resultant data. The result indicated that the DAD, LeSS, LeSS huge, SAFe, Spotify, Nexus and RAGE are the adopted scaling Agile methods at large organizations. They seem to be similar but there are discrepancies among them that take the form of team size, training and certification, methods and practices adopted, technical practices required and organizational type.
- Published
- 2016
- Full Text
- View/download PDF
46. A Framework for Requirements Prioritisation Process in an Agile Software Development Environment: Empirical Study
- Author
-
Rami Hasan Al-Ta’ani and Rozilawati Razali
- Subjects
Requirements management ,Requirement ,Engineering ,Business requirements ,Process management ,Agile usability engineering ,General Computer Science ,business.industry ,General Engineering ,Agile Unified Process ,Software requirements specification ,020207 software engineering ,02 engineering and technology ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,020201 artificial intelligence & image processing ,General Agricultural and Biological Sciences ,business ,Requirements analysis ,Agile software development - Abstract
User requirements are in high demand due to advancements of technology and business needs. Therefore it is extremely difficult to achieve user requirements at one single time. Agile methods have been introduced to mitigate such issues by implementing user requirements incrementally and iteratively. The top significant aspect in agile development is selecting a group of prominent requirements to be implemented in iteration. This could be derived from continuous requirements prioritisation (RP). To assign which requirements should be selected by practitioners is considered one of the obstacles faced in the process of implementing the inter-iteration period. This study aimed to identify the RP elements and factors that should be considered through the RP process in agile software development. The elements and factors were identified through a review of previous studies and in-depth interviews involving 18 agile practitioners from different software development organizations in different countries (i.e., Malaysia and Jordan), over a period of 2 years. To get the best result, the data is analyzed by using grounded theory techniques (Open, Axial and Selective coding). The elements and factors from the RP process will guide practitioners to an effective RP process that can produce high quality requirements, which are expected to meet the needs of the intended users.
- Published
- 2016
- Full Text
- View/download PDF
47. Developing Industrial Cases for Teaching Software Engineering – A Lesson Learned
- Author
-
Mahsa Chitsaz, Dzulaiha Aryanee Putri Zainal, and Rozilawati Razali
- Subjects
Software Engineering Process Group ,Social software engineering ,Computer science ,business.industry ,Team software process ,General Arts and Humanities ,Software development ,General Social Sciences ,Personal software process ,Package development process ,Software requirements ,Software engineering ,business ,General Economics, Econometrics and Finance - Abstract
Software engineers are provided with an enormous choice of technology for improving the quality of software. Being intangible, software products tend to be more intricate to build than any other artifacts. The selection of technology can thus become a critical factor for the success of software development. Software engineers are expected to be well-versed in various technologies to enable them to decide the best one for a particular development project. Sensible decisions however require not only understanding but also active minds, which can be achieved through meaningful learning. Being a discussion-based learning approach that encourages students to exploit knowledge and understanding of the subject matter, the Case Method seems to be a practical teaching and learning option. This method entails developing specific cases that promote exploration and critical thinking. To ensure the developed cases are useful, they should be evaluated. This paper presents a practical methodology for developing as well as evaluating industrial cases for teaching software engineering through the Case Method. It also shares some important lessons learned from the process. These lessons act as a guideline for future case developers to compose useful cases and motivate software engineering instructors to use cases in teaching.
- Published
- 2012
- Full Text
- View/download PDF
48. Critical success factors of executive information systems development for education management - A preliminary investigation
- Author
-
Rozilawati Razali, Aziz Deraman, and Mahamsiatus Kamaruddin
- Subjects
Management information systems ,Engineering ,Government ,Knowledge management ,Executive information system ,business.industry ,Content analysis ,Critical success factor ,Information system ,business ,Set (psychology) ,Affect (psychology) - Abstract
An Executive Information System (EIS) is a set of management tools that supports the information and decision-making needs of an organisation. Previous studies have suggested various technical factors that play important roles in the successful development of EIS. The success of a system however is not solely dependent on technical aspects alone. Studies on EIS should focus on critical success factors (CSF) that affect its development in a holistic way. This paper explores several critical factors that influence the success of EIS development, particularly for education management. The factors were identified through a field study with semi-structured interviews, conducted on five key players from two institutions. The data were analysed qualitatively by using content analysis. Based on the factors, the study proposes a theory of successful EIS development.
- Published
- 2011
- Full Text
- View/download PDF
49. Human Resources Information Systems (HRIS) for military domain - a conceptual framework
- Author
-
Rozilawati Razali and Mohamad Mohamad Noor
- Subjects
Human resource management system ,Engineering ,Knowledge management ,Conceptual framework ,business.industry ,Software deployment ,Process (engineering) ,Human resource management ,Information system ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Product (category theory) ,business ,Domain (software engineering) - Abstract
Human Resources Information Systems (HRIS) plays an important role for any organisation to effectively manage its human assets. In military domain, HRIS is particularly crucial as the organisation comprises a huge number of personnel who not only possess various skill sets but also are physically scattered at remote locations. Military operations in essence require the selection of right personnel for right tasks during troop deployment in the battlefield. Right selection is very critical as in war there is no second prize for the runner up. As the selection is normally based on the information in HRIS, the system must incorporate the necessary elements of military operations in order to suit the needs and goals of the organisation. This paper discusses the factors that contribute to the success of HRIS implementation for military domain. The factors form a HRIS framework that integrates three important elements in military, namely people, process, product. The framework was proposed based on literature review as well as field study that used interviews and observations techniques as the instruments. The sampling frame consisted of fifteen members of HRIS users from military domain. The data were analysed by using qualitative method. The framework can guide future military HRIS implementation that support armed forces' work processes and needs.
- Published
- 2011
- Full Text
- View/download PDF
50. An assessment model of information security implementation levels
- Author
-
Rozilawati Razali and Mohd Asri Mohamad Stambul
- Subjects
Security service ,Information security management ,Risk analysis (engineering) ,Certified Information Security Manager ,Information security standards ,Computer science ,Information security ,Computer security ,computer.software_genre ,Asset (computer security) ,computer ,Security information and event management ,Information security management system - Abstract
Information security is very important as it serves to protect an organisation from any threats and risks by ensuring the information is always safe to be accessed, reliable and confidentially protected. In order to ensure information security, organisations normally introduce policies and guidelines which are made available to all members. Despite this effort however, security threats on organisations' information still occur. One of the reasons is because organisations are not aware of the information security levels that they practise. This paper discusses a measurement model for assessing information security implementation levels in organisations. The model consists of three maturity levels that determine the degrees of which information security is addressed in an organisation. The levels contain several factors that are necessary for ensuring information security. The study used Systematic Literature Review (SLR) as the instruments to determine the appropriate measurement parameters. The identified parameters were combined with general models and measurement standards of information security. The model can be used by organisations to determine their levels of maturity in ensuring the security of their information. This enables them to improve their current information security practices.
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.