Rozilawati Razali

Rozilawati Razali
Universiti Kebangsaan Malaysia | ukm

BSc; MSc; PhD

About

78
Publications
93,081
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,194
Citations

Publications

Publications (78)
Article
Full-text available
Phenomenology and grounded theory are two prominent qualitative methods, particularly used in social sciences research. Phenomenology is carried out to understand the individuals’ actual experience regarding a phenomenon. The method describes "what" individuals experience and "how" they experience it. The focus is on the meaning of the exposures ex...
Article
Full-text available
The practices of lean and agile methods are important to manage and guide projects development in different situations. However, selecting the appropriate practices of lean and agile methods is a daunting task, owing to the availability of hundreds of practices. This wide variety of available practices bewilders potential users, in terms of the bes...
Article
Full-text available
Legacy systems are valuable assets in most public sector agencies that have been in use for a long time. These systems support government service delivery to the citizens and maintain vital public administration functions and data. However, legacy systems are often related to technical difficulties that impede innovation efforts. The maintenance of...
Article
Full-text available
Information technology and communication (ICT) plays an important role as a catalyst for organisational development and innovation. However, old information systems that are known as legacy systems often expose organisations to the risk of business failure. These systems are not only impeding the advancement in technology strategy but also hinderin...
Article
Full-text available
Information Security Management (ISM) is a systematic initiative in managing the organisation’s information security. ISM can also be defined as a strategic approach to addressing information security (IS) risks, breaches, and incidents that could threaten the confidentiality, integrity, and availability of information. Although organisations have...
Article
Full-text available
Software engineering (SE) research addresses not only technical issues but also human behaviour. SE is considered as an immature discipline because many technical and social issues concerning software development and management have yet to be specified. SE in general is inclined towards quantitative approaches. Nevertheless, qualitative methods are...
Conference Paper
Full-text available
Software Engineering (SE) research investigates issues not only concerning technical aspects but also human behaviours. On the other hand, SE is still regarded as an immature and young discipline, as many phenomena in software development and management have yet to be understood by its community. As such, SE research opts for qualitative methods, w...
Article
Rapid development of information technology and communication (ICT) has increased the use of information systems in organizations since a decade ago. At the same time, many organizations are still using old information systems to support their business, known as legacy systems. Even though these systems cause technical problems, but they are still...
Article
Full-text available
The emergence of numerous innovations promotes the development of information and communication technology (ICT) in many countries and changes the way government services are delivered to the citizens. By leveraging ICT advancements, the traditional landscape of government services has shifted towards enhancing the well-being of citizens through su...
Article
Rapid and unpredictable technology advancements cause a rise in demand for software products that can be delivered faster, adapt to volatile changes and save cost. Over the years, Agile Software Development (ASD) becomes more suitable as the software process that can cater to those demands while still maintaining the quality desired. With this Agil...
Article
Full-text available
Mobile learning applications have created new learning opportunities which lead to the transition from traditional learning to modern learning, thus enhancing individuals’ learning experiences. Mobile learning applications that come with good and effective user interface allow users to be aware and mindful about the subject matter. This enables use...
Article
Full-text available
[PDF] from researchgate.net Agile Methods Selection Model: A Grounded Theory Study Authors Mashal Kasem Alqudah, Rozilawati Razali, Musab Kasim Alqudah Publication date 2019/1/1 Journal International Journal of Advanced Computer Science and Applications Volume 10 Issue 7 Pages 357-366 Publisher Science and Information Organization Description Agile...
Article
Software testing outsourcing appears to be the best alternative to acquire better software quality with competent ratification by extrinsic parties who have the capability to do it. Through the effort, organizations are peeking to promising benefits constitute in it such as current testing technology, experts, an abridgment of the project's duratio...
Article
Full-text available
Requirements change has been regarded as a substantial risk in software development projects. The factors that contribute to the risk are identified through impact analysis, which later determine the planning of the change implementation. The analysis is however not straightforward as the risk factors that constitute requirements change implementat...
Article
Full-text available
Scrumban is a combination of practices from Kanban and Scrum practices to manage the development of software based on different project situations. Scrumban practices formation can differ based on different projects and team members. However, since each method has its own pros and cons, inappropriate formation of Scrumban practices may lead to incr...
Article
Full-text available
Electronic Government (E-government) becomes one of the key elements for sustainable development of the country. Previous studies on E-government indicate that most governments are performing well in E-government implementation. However, the issues of process duplication and bureaucracy in services should be addressed to build trust and increase ci...
Article
Over the last decade, the rapid development of the information and communications technology (ICT) has increased the use of information systems in the public sector. In a fast pace, the ICT technology has evolved and switched to more advanced setting to fulfill the system’s intricate demand. Apparently, some agencies in public sector are recognized...
Conference Paper
Full-text available
Scrum and Kanban methods handle and manage the progress of software development. These methods are used in different situations and workflows. Hence, they are effective for different Agile team members and projects in diverse situations. However, the use of inappropriate method or practice leads to software development processes that are inflexible...
Article
In an unstable software development characterized by the turbulence of markets and the competitive pressures, the organization is forced to adopt new software development methodology to be survival. The agile methods have been introduced to maintain the organization endurance. New challenges await agile methods, when requirement prioritisation and...
Article
Full-text available
Agile methods have become popular in recent years because the success rate of project development using Agile methods is better than structured design methods. Nevertheless, less than 50 percent of projects implemented using Agile methods are considered successful, and selecting the wrong Agile method is one of the reasons for project failure. Sele...
Article
Full-text available
Agile methods such as Dynamic Systems Development Method (DSDM), Extreme Programming (XP), SCRUM, Agile Modeling (AM) and Crystal Clear enable small teams to execute assigned task at their best. However, larger organizations aim at incorporating more Agile methods owing to the fact that its application is prevalently tailored for small teams. The s...
Article
Full-text available
Information security management (ISM) is a continuous, structured and systematic security approach to managing and protect the organisation's information from being compromised by irresponsible parties. To ensure the information remains secure, many organisations have implemented ISM by establishing and reviewing information security (IS) policy, p...
Article
User requirements are in high demand due to advancements of technology and business needs. Therefore it is extremely difficult to achieve user requirements at one single time. Agile methods have been introduced to mitigate such issues by implementing user requirements incrementally and iteratively. The top significant aspect in agile development is...
Article
Full-text available
Managing cost in any software development project become more challenging and sensitive these days. This is due to the complexity of the processes and the demand by the stakeholders that really requires high competent of project managers to manage the project cost effectively. Most of project managers agreed that managing cost effectively is very i...
Article
Information security (IS) in the context of organisation is a concept that concerns safeguarding the organisation’s critical information by performing security activities. To ensure that IS is effectively enforced and executed, many organisations have introduced information security management (ISM) initiatives. IS standards, policies, guidelines a...
Article
Full-text available
In software development project, cost management has been identified as one of the challenges aspect should be faced by the project community. Poor cost management will affect the software projects such as project delay and cost overrun. Therefore, his paper tries to look into the issues and challenges faced by the Project Manager when they manage...
Article
Full-text available
Agile cost management is seen interesting to be concerned due to enhancement of the development processes. By fixing the time, cost and requirements will help project managers to concentrate to the development processes. Therefore, the competent project manager is required to adopt with the new processes especially in managing the cost. By having c...
Article
Requirements elicitation is the most critical phase in software requirements engineering. The process is resource intensive, as it concerns with a lot of dedicated stakeholders gathering purposefully to present and stipulate software requirements. The extent of effectiveness of the process is greatly influenced by the suitability of the stakeholder...
Article
Requirements engineering (RE) combines technical and human aspects in software development, It covers the process of eliciting, analysing, specifying, validating and managing the requirements of software systems, RE needs to understand the people and the context within which specific actions and decisions take place, Hence, RE research opts for qua...
Article
Software testing outsourcing is becoming attractive among organisations that desire to gain high quality products within reasonable cost while allowing testing experts to assure its quality. Despite these promising advantages however, organisations have yet to learn the factors that contribute to such projects’ success. The necessary planning and a...
Article
Electronic Government (e-Government) systems are intended primarily to deliver governmental information and services through the web. The rapid evolution of mobile technology has triggered the need for conventional web-based e-Government systems to move towards another era known as Mobile Government (m-Government) systems. Although the functionalit...
Article
Requirements elicitation is widely regarded as the most challenging activity within the scope of requirements engineering. The activity concerns the understanding of problems that a system should address, which later leads to the identification of system requirements. As an abstract process, its effectiveness is greatly influenced by the credibilit...
Article
In the era of globalisation, governments around the world strive to provide the best electronic Government (e- Government) systems to their people. Although the performance of e-Government systems is improving over time, their usability is still unacceptable. One of the reasons of this phenomenon is that most e-Government systems were developed wit...
Article
Software testing outsourcing is becoming a trend in many organisations nowadays. There are many advantages that are believed to be obtained through software testing outsourcing such as cost savings, access to experts and better technology as well as higher quality software products. Due to its immaturity however, it is still uncertain on what would...
Article
Full-text available
Software Engineering (SE) education has been reported to fall short in producing high quality software engineers. In seeking alternative solutions, Case Method (CM) is regarded as having potential to solve the issue. CM is a teaching and learning (T&L) method that has been found to be effective in Social Science education. In principle, instructors...
Article
Full-text available
Software requirement changes are inevitable due to the dynamic needs of business process and environment. Such changes in requirement need to be managed accordingly by determining the influencing factors as well as assessing their impacts on the current environment through impact analysis. The analysis is accomplished by a dedicated team, namely Ch...
Article
Software systems are critical assets to organisations as they support important business processes and workflow. To maintain the value of these assets, the requirements of software systems must evolve whenever there are changes in business needs. A key problem to organisations is implementing requirements change to the existing software systems. Su...
Article
The use of mathematical notations in formal methods increases a system model's precision and consistency. The notations however are regarded as being difficult to comprehend due to unfamiliar symbols and interpretation rules that are not apparent to practitioners. Graphical methods use visual or graphical notations to present system elements. They...
Article
Full-text available
The popularity of mobile devices in the market is impressive, but this influx of different products has made it difficult for users to secure their infrastructures from potential data breaches. As the number of exposures and attacks increase, there has been a corresponding rise in security solutions offered by researchers. This article reviews the...
Article
Full-text available
Student Centered Learning Environment is a learning environment that describes thinking methods about learning and teaching that emphasizes student responsibility in learning activities such as planning, interacting with lecturers and other students, doing research and evaluating learning. This means that students play an important and active role...
Article
Full-text available
The advance of technology and business needs have triggered user requirements to evolvealmost every day.It is therefore impossible to fulfill the requirements at once. Agile methods have been introduced to mitigate such issues by implementing user requirements incrementally and iteratively. Selecting a group of prominent requirements to be implemen...
Conference Paper
Full-text available
Some organisations own information systems (IS) whose age are more than ten years old to support their businesses. These systems are known as legacy information systems (LIS). LIS are still in use because they bring high business values. On the other hand, LIS normally lead to maintainability problems due to lack of experts who understand the syste...
Conference Paper
Full-text available
Electronic Government (e-Government) is an initiative of transforming public sector delivery system towards high performance services and citizen oriented. The emergence of broadband and communication technology has catalyzed the growth of online systems forming the main thrust of e-Government. However, the satisfaction level of e-Government system...
Article
Full-text available
Case Method (CM) is a teaching technique that uses real cases as a tool for delivering a particular subject. Software Engineering (SE) is a discipline that concerns the principles, methods and tools for developing and improving software. SE education therefore tends to be too theoretical. To impose realism where the students can be exposed to real...
Article
Full-text available
The Case Method (CM) has long been used effectively in Social Science education. Its potential use in Applied Science such as Software Engineering (SE) however has yet to be further explored. SE is an engineering discipline that concerns the principles, methods and tools used throughout the software development lifecycle. In CM, subjects are presen...
Article
Usability has been increasingly recognized as a significant quality dimension to determine the success of mobile applications. Due to its importance, a number of usability guidelines have been proposed to direct the design of usable applications. The guidelines are intended particularly for desktop and web-based applications. Mobile applications on...
Article
Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on the other hand are difficult to understand and use by most users. As supporting instruments, verificati...
Article
Full-text available
Software engineers are provided with an enormous choice of technology for improving the quality of software. Being intangible, software products tend to be more intricate to build than any other artifacts. The selection of technology can thus become a critical factor for the success of software development. Software engineers are expected to be wel...
Article
Full-text available
Context-aware applications are mobile applications that use settings to provide relevant information and services to users. Technology selection is the process of determining methods, techniques and tools that could fulfill the development requirements of a particular application. Currently, a number of technology selection methods have been propos...
Article
Requirements elicitation (RE) is the most critical phase in requirement engineering. It is the moment in which analysts elicit, understand and validate the requirements of a system from stakeholders. RE process is resource-intensive and it is therefore accomplished with the support of predetermined techniques. The advancement of technology has intr...
Article
Requirements elicitation is the most critical phase in software development as it captures the required functionality of a software system. The elicitation process is indeed resource intensive. It involves a number of dedicated stakeholders who are deliberately gathered to confer and stipulate software requirements. The effectiveness of the process...
Conference Paper
Information security is very important as it serves to protect an organisation from any threats and risks by ensuring the information is always safe to be accessed, reliable and confidentially protected. In order to ensure information security, organisations normally introduce policies and guidelines which are made available to all members. Despite...
Conference Paper
Human Resources Information Systems (HRIS) plays an important role for any organisation to effectively manage its human assets. In military domain, HRIS is particularly crucial as the organisation comprises a huge number of personnel who not only possess various skill sets but also are physically scattered at remote locations. Military operations i...
Conference Paper
An Executive Information System (EIS) is a set of management tools that supports the information and decision- making needs of an organisation. Previous studies have suggested various technical factors that play important roles in the successful development of EIS. The success of a system however is not solely dependent on technical aspects alone....
Conference Paper
Web-based applications are task-oriented software that is accessed through a web browser and connected to a Hypertext Transfer Protocol (HTTP) for data communication. Nowadays, web-based applications have become much more complex as their operations are beyond simple browsing of information. The applications include not only HyperText Markup Langua...
Conference Paper
Requirements elicitation is one of the most important and critical phase in software development. It is the moment in which the users’ needs of a software system are captured, understood and validated. This is achieved through two-way communications between users and requirement analysts. The process however is not so straightforward to accomplish....
Article
Full-text available
Problem statement: Education management is a centralized process of planning, monitoring and controlling entities involved in education affairs so that they align with educational aspirations. It normally concerns several layers of administration that requires different types of information from various operational units. Operational units in educa...
Article
Full-text available
Problem statement: Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on the other hand are difficult to understand and use by most users. As supporting inst...
Conference Paper
Functional requirements are the statements of services that a system should provide to its users. It is imperative to state explicitly those requirements at the very beginning of system development process, as they act as the basis for the later stages. Normally, this is accomplished through modelling. Modelling enables functional requirements to b...
Conference Paper
Software engineering offers vast variety of methods and tools for improving the quality of software development. As software products seem to be more complex to build than any other engineered artifacts, selecting suitable methods and tools appears to be crucial. Software engineers should possess broad knowledge on various technologies so that thei...
Article
Full-text available
The modeling of computer software is complex and error prone. Modeling methods and languages must be usable which implies easy to learn. Cognitive dimensions and grounded theory were used to analyse the usability and learnabilty of the new modeling language Unified Modeling Language- B: UML-B. A systematic survey of users’ encounters and interactio...
Article
Full-text available
Managing heterogeneous network systems is a difficult task because each of these networks has its own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and service...
Conference Paper
The notation and environment in conceptual modelling transform developers' initial perception about a system to a concrete model. Any usability constraints that the notation and environment impose on the modeling process affect not only the quality of the model but also the quality of the final product. This paper presents a usability profile for d...
Article
Education management is a social process to identify, maintain, stimulate and unite human resources and physical assets in a comprehensive way in order to meet educational aspirations. Education management of a country in general involves several layers of management that requires different types of information from various operational units. As th...
Article
Conceptual models communicate the important aspects of a problem domain to stakeholders. The quality of the models is highly dependent on the usability of the modelling method used. This paper presents a survey conducted on a method that integrates the use of a semi-formal notation, namely the Unified Modelling Language (UML) and a formal notation,...
Article
This paper summarises two controlled experiments conducted on a model that integrates the use of semi-formal notation, the Unified Modelling Language (UML) and a formal notation, B. The experiments assessed the comprehensibility of the model, namely UML-B. The first experiment compared the comprehensibility of a UML-B model and a B model. In the se...
Conference Paper
This paper summarises two controlled experiments conducted on a model that integrates the use of semi-formal notation, the Unified Modelling Language (UML) and a formal notation, B. The experiments assessed the comprehensibility of the model, namely UML-B. The first experiment compared the comprehensibility of a UML-B model and a B model. In the se...
Article
Full-text available
The primary objective of software specification is to promote understanding of the system properties between stakeholders. Specification comprehensibility is essential particularly during software validation and maintenance as it permits the understanding of the system properties more easily and quickly prior to the required tasks. Formal notation...
Conference Paper
Full-text available
The primary objective of software specification is to promote understanding of the system properties between stakeholders. Specification comprehensibility is essential particularly during software validation and maintenance as it permits the understanding of the system properties more easily and quickly prior to the required tasks. Formal notation...
Article
This document contains the questionnaires and responses of the survey conducted on the UML-B method. The survey assessed the usability of the method, particularly the notation used, from the developers’ perspective. The questionnaires were constructed based on a usability evaluation framework namely the Cognitive Dimensions of Notations (CD) and th...
Article
Full-text available
This paper summarises two controlled experiments conducted on a model that integrates the use of semi-formal notation, the Unified Modelling Language (UML) and a formal notation, B. The experiments assessed the comprehensibility of the model, namely UML-B. The first experiment compared the comprehensibility of a UML-B model and a B model. In the se...
Article
Full-text available
Software maintenance, which involves making enhancements, modifications and corrections to existing software systems, consumes more than half of developer time. Specification comprehensibility plays an important role in software maintenance as it permits the understanding of the system properties more easily and quickly. The use of formal notation...
Conference Paper
Software maintenance, which involves making enhancements, modifications and corrections to existing software systems, consumes more than half of developer time. Specification comprehensibility plays an important role in software maintenance as it permits the understanding of the system properties more easily and quickly. The use of formal notation...

Network

Cited By