Please use this identifier to cite or link to this item:
http://umt-ir.umt.edu.my:8080/handle/123456789/5903
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shafinah Farvin, Packeer Mohamed | - |
dc.contributor.author | Fauziah, Baharom | - |
dc.contributor.author | Aziz, Deraman | - |
dc.contributor.author | Jamaiah, Yahya | - |
dc.contributor.author | Haslina, Mohd | - |
dc.date.accessioned | 2017-05-04T08:12:27Z | - |
dc.date.available | 2017-05-04T08:12:27Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Vol. 8 (8);39-45 p. | en_US |
dc.identifier.issn | 2180 1843 | - |
dc.identifier.issn | 2289 8131 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5903 | - |
dc.description.abstract | Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsible people to undertake computer crimes. Millions of users across the globe have fallen as victims to computer crimes, including Malaysia. It is due to current software environment which is more complex, distributed, keeps confidential data and easily exposed to malicious attacks. Consequently, secure software process is increasingly gaining much importance among software practitioners and researchers. However, even though its importance has been revealed, only few studies were conducted regarding its current practice in the software industry, especially in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices on the secure software process in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software process, however, they lack of appropriate implementation of the practices | en_US |
dc.language.iso | en | en_US |
dc.publisher | Journal of Telecommunication, Electronic and Computer Engineering | en_US |
dc.subject | Secure Software Practices | en_US |
dc.subject | Exploratory Study | en_US |
dc.subject | Software Practitioners | en_US |
dc.subject | Malaysia | en_US |
dc.title | An Exploratory Study on Secure Software Practices Among Software Practitioners in Malaysia | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
J2016-365-An exploratory study on secure software practices among software practitioners in Malaysia.pdf | Fulltext file | 494.62 kB | Adobe PDF | View/Open |
Items in UMT-IR are protected by copyright, with all rights reserved, unless otherwise indicated