84 research outputs found

    VALIDATION OF SECURITY REQUIREMENTS FOR MOBILE APPLICATION: A STUDY

    Get PDF
    The increased usage of 3G and 4G networks in smartphones has resulted in the need for validating security requirement to ensure safe and secure mobile application experience to users. However, improper validation of security requirements can lead to poor quality of software development. This is also commonly happened while developing software application for mobile. Thus, this paper discusses the gaps found from the existing work on validating the security requirements of mobile application and analyses a few security requirement engineering tools for mobile application that exist in the market for commercial or research purposes. We report our findings from review and analysis of different studies on security requirement engineering for mobile application. The strengths and weaknesses of the features and utility are also presented to provide further understanding of the gaps and weaknesses of each tool. We conclude that these tools are still immature and need further improvements

    Automatic Acceptance Test Case Generation From Essential Use Cases

    Get PDF
    Requirements validation is a crucial process to determine whether client-stakeholders’ needs and expectations of a product are sufficiently correct and complete. Various requirements validation techniques have been used to evaluate the correctness and quality of requirements, but most of these techniques are tedious, expensive and time consuming. Accordingly, most project members are reluctant to invest their time and efforts in the requirements validation process.Moreover, automated tool supports that promote effective collaboration between the client-stakeholders and the engineers are still lacking. In this paper, we describe a novel approach that combines prototyping and test-based requirements techniques to improve the requirements validation process and promote better communication and collaboration between requirements engineers and clientstakeholders. To justify the potential of this prototype tool, we also present three types of evaluation conducted on the prototpye tool, which are the usability survey, 3-tool comparison analysis and expert reviews

    A Pair-oriented Requirements Engineering Approach for Analysing Multi-lingual Requirements

    Get PDF
    Requirements written in multiple languages can lead to errorproneness,inconsistency and incorrectness. In a Malaysian setting, software engineers are exposed to both Malay and English requirements. This can be a challenging task for them especially when capturing and analyzing requirements. Further, they face difficulties to model requirements using semi-formal or formal models. This paper introduces a new approach, Pair-Oriented Requirements Engineering (PORE) that uses an Essential Use Case (EUC) model to capture and analyze multi-lingual requirements. This approach is intended to assist practitioners in developing correct and consistent requirements as well as developing teamwork skills. Two quasi-experiment studies involving 80 participants in the first study and 38 participants in a subsequent study were conducted to evaluate the effectiveness of this approach with respect to correctness and time spent in capturing multi-lingual requirements. It was found that PORE improves accuracy and hence helps users perform better in developing high quality requirements models

    THE NEEDS OF CLINICAL DOMAIN LIBRARY FOR ELICITING ACCURATE CLINICAL REQUIREMENTS

    Get PDF
    Issues in misinterpretation of terms and miscommunication with stakeholders still persist although there are various approaches and tools available to elicit and capture accurate requirements. Specifically in healthcare domain, these issues need serious attention considering that there are myriad complex medical terminologies, unfamiliar to most requirements engineers. Further, accurate terms and words need to be captured as misinterpretations in eliciting requirements may lead to harmful consequences to human’s lives and well-being. This paper presents two preliminary studies that compare the difficulties in eliciting clinical and business requirements. Based on a survey conducted with 20 respondents, it was found that eliciting clinical functional requirements is more difficult than the business requirements. Similar findings were also drawn from interviews conducted with 5 experienced requirements engineers. They also claimed that a clinical domain library could help them to elicit accurate functional requirements. The domain library should also have e several functions that can be used to facilitate the elicitation of accurate functional requirements

    Designing A User-Centred Model to Amplify Satisfaction in Utilizing Online Government Information

    Get PDF
    With the increasing reliance on digital platforms for accessing government services and information, user satisfaction becomes a crucial factor in ensuring effective service delivery and citizen engagement. Thus, this study explores into the development of a user-centred model aimed at enhancing user satisfaction in the utilization of online government information. The proposed model integrates Privacy; Safety; Service quality; Time; and Awareness with Satisfaction to create a model that aligns with citizens' needs and preferences. The data collection process targeted respondents among citizens of the United Arab Emirates (UAE) for the questionnaire survey. The respondents were selected using a convenience sampling technique, allowing for the collection of samples conveniently located around a specific area or accessible through internet services. A total of 396 participants took part in the survey and the collected data was used to develop the model using SmartPLS software. The developed model was analysed and the results reveal that the path from Privacy to Satisfaction holds significant influence, as indicated by a T statistic of 3.755 and a p-value of 0.000. Similarly, the paths from Safety and Service Quality to Satisfaction are also significant, with T statistics of 2.363 and 4.580, respectively, and corresponding p-values of 0.009 and 0.000. However, the paths from Awareness and Time to Satisfaction are found to be not significant, with T statistics of 1.162 and 0.935, and p-values of 0.123 and 0.175, respectively. By prioritizing user satisfaction, this research contributes to the advancement of digital government initiatives and citizen-centric service delivery paradigms

    Critical Thinking Skills among Final Year Students of Malaysian Technical Universities

    Get PDF
    Critical thinking is an essential skill that individuals need to have in order to be effective learners and workers in the global knowledge economy. In line with the mandate of the Ministry of Higher Education Malaysia (MOHE), institutions of higher learning including universities under the Malaysian Technical Universities Network (MTUN) have adopted several approaches to ensure that their graduates are equipped with the sufficient level of critical thinking skills. However, there is little knowledge about the attainment levels of critical thinking skills, among Malaysian tertiary students. Thus, the California Critical Thinking Skill Test (CCTST) was used to collect data from one hundred final year students at four Malaysian Technical Universities in order to identify their attainment level on critical thinking skills. The CCTST scores revealed that these students exhibit some proficiency in critical thinking, but they are way behind the global standard, as stipulated by Insight Assessment California. Students’ competencies of the CTS also vary across the four universities. This study has significant implications on the curriculum design and development as well as pedagogical practice adopted by MTUN universities in developing their students with appropriate level of critical thinking skills

    A Preliminary Study: Challenges in Capturing Security Requirements and Consistency Checking by Requirement Engineers

    Get PDF
    There has been a growing concern on the importance of security with the rise of phenomena, such as ecommerce and nomadic and geographically distributed work. Realizing the security early, especially in the requirement analysis phase, is important so that security problems can be tackled early enough before going further in the development process and avoid re-work. Ensuring the consistency of elicited functional security requirement of requirements specification is also crucial as the requirements should be well understood and agreed upon by all the stakeholders and end-users. Therefore, the aim of this paper is to further discuss on the challenges faced by Requirement Engineers (REs) in: (1) capturing Security Requirement and (2) Consistency Checking in Requirement Engineering. Motivated from the need to ensure consistency in functional security requirement for developing secure software and the gaps found in the existing works, a survey has been conducted involving 38 experts in software engineering in the industry. The survey aims to identify the current problems faced by them during the elicitation process, security standards used as the reference, elicitation and validation method, and the important properties considered while developing secure software. Results of the survey show that REs face difficulties to understand the security needs and the existing standards are difficult to understand. Therefore, it is proposed that an automated tool to elicit security requirements should be developed

    Leveraging Trust as an Intermediary Construct for Enhancing Public Acceptance of Smart Government Model

    Get PDF
    The primary aim of this study was to formulate a trust model aimed at augmenting public acceptance of UAE's smart government services. The study identified a total of 31 factors categorized into seven distinct groups or constructs. The model comprises five independent constructs which are Word of Mouth, Knowledge and Experience, IT Quality, Privacy, and Security. Then, Trust as an intermediary construct while Acceptance as a dependent construct. Through a convenience sampling approach, data was collected from 400 respondents via a questionnaire survey. The data collected was utilized to create and refine the model using SmartPLS software. The model underwent thorough analysis, including assessments of convergent reliability and validity, discriminant validity, and hypothesis testing. The study results revealed the significance of all six hypotheses, indicating the noteworthy impact of the five independent constructs on the intermediary construct (Trust), which in turn significantly influences the dependent construct (Acceptance). In terms of its contribution to existing knowledge, this study significantly enriches the literature on citizen-centric models and smart government. Moreover, in practical terms, the findings provide valuable insights for policy makers and smart government officials to strategically optimize approaches, thereby facilitating the expedited and more effective adoption of smart government services.

    IMPEDIMENT FACTORS TO SUCCESSFUL USAGE OF ONLINE HALAL CERTIFICATION

    Get PDF
    Purpose of the study: The purpose of this paper is to identify the impediment factors that hinder the successful usage of online halal certification. Methodology: Semi-structured interviews were conducted with 14 representatives from 14 halal food companies in Melaka, Malaysia. The respondents had used the system either to apply for new halal certificates or to renew the existing ones. The identification of the impediment factor was a part of the fulfillment of the translation process by Actor-Network Theory (ANT) during the process of problematization, interessement, enrollment, and mobilization. Identifying the impediment factors was conducted during the first translation stage of problematization. Main Findings: The findings indicate that there are three impediment factors that hinder the successful usage of MYeHalal system. The factors were categorized into three categories, namely, applicants' problem, technical problem, and operational problem. The applicants' problems were caused by the applicants themselves, while the technical problems were caused by the non-performing dysfunctions of the technology, and lastly, the operational problems were caused by the inefficiency of the certifier in fulfilling the tasks and providing the services to applicants. Applications of this study: The identification of these impediment factors will help halal applicants to be aware of the important elements before submitting their application via MYeHalal system. Further, this study will help to enlighten the ways to improve the performance of the system and make it convenient to be used and managed by both halal applicants and JAKIM as the certifier body. Originality: This paper is the first to discuss the inefficiency issues in the usage of online halal certification, since it was first introduced in Malaysia

    Model of Academics Professional Development Factors for Higher Education Institutions

    Get PDF
    This paper presents a study on developing a structural equation model of factors affecting UAE Academics Professional Development (APD) programs. Data used to develop the model was collected from questionnaire survey amongst three of UAE Higher Education Institutions. The model which comprised of seven independent constructs and one dependent construct was developed and assessed using AMOS SEM software. At the initial stage, eight measurement models (which is the eight constructs altogether) were developed and assessed individually using confirmatory factor analysis (CFA) of the software until it achieves goodness of fit. Then these eight measurement models are tied up into structural model which also assessed using CFA to find the goodness of fit. Once the structural model has achieved the goodness of fit, the path analysis or known as hypotheses testing was conducted on the model. The hypotheses testing found that five constructs have significant effect to academic’s professional development (APD) which are the i) design of teaching plan, ii) teaching skills, iii) communication skills, iv) expertise skill in the lesson content, and v) technology. While, two constructs which are i) individual and occupational identity and ii) policy and strategy do not have significant relationship with quality academic professional development. This model contributed to the body of knowledge and also to the related parties that involved in developing academic professional activitie
    • …
    corecore