Validating the Extended Software Process Assessment and Certification Model through Focus Group


  • Shafinah Farvin Packeer Mohamed
  • Fauziah Baharom
  • Aziz Deraman
  • Yuhanis Yusof



Secure software practices, exploratory study, software practitioners, Malaysia


Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsible people to undertake computer crimes. Millions of users across the globe have fallen as victims to computer crimes, including Malaysia. It is because of current programming condition which is progressively mind boggling, dispersed, keeps classified information and effectively presented to malevolent assaults. Therefore, secure programming process is progressively increasing much significance among programming professionals and specialists. Be that as it may, just couple of studies were led in exploring its present practice in the product business, particularly in Malaysia. Along these lines, an exploratory examination is led among programming experts in Malaysia to consider their encounters and practices on the protected programming process in reality extends. This paper examines the discoveries from the examination, which included 93 programming specialists. Organized survey is used for information gathering reason while factual techniques, for example, recurrence, mean, and cross arrangement are utilized for information investigation. Results from this examination uncover that product professionals are winding up progressively mindful on the significance of secure programming process, nonetheless, they absence of proper execution of the practices.




[1] Jones, C., & Bonsignour, O. (2012). The economics of software quality. Boston: Pearson Education.

[2] Heck, P., Klabbers and M., Eekelen, M. 2010. A software product certification model. Software Quality Journal, 18(1) 37-55.

[3] Aziz Deraman, Jamaiah Yahya, Fauziah Baharom, Amalina Farhi Ahmad Fadzlah and Abdul Razak Hamdan. 2007. Continuous quality improvement in software certification

[4] environment. International Conference on Electrical Engineering and Informatics, 11-17.

[5] Shakeel PM. Neural Networks Based Prediction Of Wind Energy Using Pitch Angle Control. International Journal of Innovations in Scientific and Engineering Research (IJISER). 2014;1(1):33-7.

[6] Baskar, S., & Dhulipala, V. R., “Biomedical Rehabilitation: Data Error Detection and Correction Using Two Dimensional Linear Feedback Shift Register Based Cyclic Redundancy Checkâ€, Journal of Medical Imaging and Health Informatics, 2018, 8(4), 805-808.

[7] Jamaiah Yahya. 2007. The development of software certification model based on product quality approach. (Unpublished doctoral dissertation). Universiti Kebangsaan Malaysia, Selangor, Malaysia.

[8] Shakeel PM, Baskar S, Dhulipala VS, Jaber MM., “Cloud based framework for diagnosis of diabetes mellitus using K-means clusteringâ€, Health information science and systems, 2018 Dec 1;6(1):16.

[9] O'Regan, G. 2012. A practical approach to software quality. London: Springer.

[10] Fauziah Baharom, Jamaiah Yahya, Aziz Deraman and Abdul Razak Hamdan 2011. SPQF:software process quality factor for software process assessment and certification. International Conference on Electrical Engineering and Informatics, 1-7.

[11] Pressman, R. S. 2010. Software engineering a practitioner's approach 7th Ed. New York: McGraw-Hill Higher Education.

[12] Saaty, T. L. 1990. The analytic hierarchy process. New York: McGraw-Hil.

[13] Shafinah Farvin Packeer Mohamed, Fauziah Baharom and Aziz Deraman. 2014a. An exploratory study of agile based software development practices. Journal of Software Engineering and its Application, 8 (5), 85-114.

[14] P. Mohamed Shakeel; Tarek E. El. Tobely; Haytham Al-Feel; Gunasekaran Manogaran; S. Baskar., “Neural Network Based Brain Tumor Detection Using Wireless Infrared Imaging Sensorâ€, IEEE Access, 2019, Page(s): 1

[15] Davis, N. 2009. Secure software development lifecycle process. Software Engineering Institute. [Online]. From lc/326-BSI.html. [Accessed on 1 April 2011].

[16] Agile Manifesto. 2012. [Online]. From:[Accessed on 2 November 2009].

[17] De Win, B., Scandariato, R., Buyens, K., Gregoire, J., and Joosen, W. 2009. On the secure software development process: CLASP, SDL and Touchpoints compared. Information and software technology, 51(7), 1152-1171.

[18] Scriven, M. 1991. Evaluation thesaurus: fourth edition. Sage.

[19] Zultner, R. E. 1992. Quality function deployment (QFD) for Software. American Programmer.

[20] SCAMPI Upgrade Team. 2011. Standard CMMI® appraisal method for process improvement Version 1.3: Method Definition Document Handbook

[21] Lascelles, D. and Peacock, R. 1996. Self-assessment for business excellence. Berkshire: McGraw-Hill.

[22] Serkani, E. S., Mardi, M., Najafi, E., Jahanian, K., and Herat, A. T. 2013. Using AHP and ANP approaches for selecting improvement projects of Iranian Excellence Model in healthcare sector. African Journal of Business Management, 7(23).

[23] Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM., “Maintaining security and privacy in health care system using learning based Deep-Q-Networksâ€, Journal of medical systems, 2018 Oct 1;42(10):186.

[24] Martakis, A., and Daneva, M. 2013. Handling requirements dependencies in Agile projects: A focus group with Agile software development practitioners. International Conference on Research Challenges in Information Science, 1-11.

[25] Kontio, J., Lehtola, L., and Bragge, J. 2004. Using the focus group method in software engineering: obtaining practitioner and user experiences. International Symposium on Empirical Software Engineering, 271-280.

[26] Shafinah Farvin Packeer Mohamed, Fauziah Baharom and Aziz Deraman. 2014. Knowledge sharing on implementing software process quality model evaluation: focus group approach. Knowledge Management International Conference, 545-550.

[27] Shafinah Farvin Packeer Mohamed, Fauziah Baharom and Aziz Deraman. 2015. ESPAC Model: Extended Software Process Assessment and Certification Model for Agile and secure software processes. ARPN Journal of Engineering and Applied Sciences, 10 (3), 1364-1373.

[28] Shafinah Farvin Packeer Mohamed, Fauziah Baharom, Aziz Deraman and Yuhanis Yusof. 2016. The validation of Extended Software Process Assessment and Certification Model using Focus Group. IC-ICT4T Conference, 192-197.

[29] ISO (2015). ISO Standards. [Online]. From: [Acessed on 24 January 2013].

[30] Deming, W. 1982. Out of Crisis. Cambridge, MA: MIT Center for Advanced Engineering Study.

[31] Evans, R., Tsohou, A., Tryfonas, T., and Morgan, T. 2010. Engineering secure systems with ISO 26702 and 27001. International Conference on System of Systems Engineering, 1-6.

View Full Article: