Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau

Open access


A Security Door Access Control System (SDACS) project involves a number of teams from different organizations with diverse project goals. One of the main challenges of such projects is the lack of a standard approach or common understanding to achieve a common goal among project parties. This research examines various management concerns for SDACS projects, highlights the expected common understanding for project participants, develops the project management constructs, and emphasizes on the resulting value of the project to all participants. A two-stage process of scale development and validation was conducted. First, six generic constructs were identified based on the Security Access Control System Framework. Next, a multi-item scale for each construct was developed with reference to the Result-Oriented Management Framework. Expert judges were invited to conduct manual sorting of the items iteratively until reliability and validity was reached. In the next stage, further refinement and validation were carried out with a synthesized survey instrument and a series of statistical testing followed. The finalized SDACS project management constructs and the related findings help reinforce the importance of a standardized management practice for SDACS projects. The value of this research not only benefits SDACS project managers but everyone who works on the project.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • Anderson J. C. & Gerbing D. W. (1991). Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities. Journal of Applied Psychology 76(5) 732-741.

  • Ang J. & Teo T. (1997). CSFs and sources of assistance and expertise in strategic IS planning: a Singapore perspective. European Journal of Information Systems 6(3) 164-171.

  • Bauer L. Cranor L. F. Reeder R. W. et al. (2009). Real Life Challenges in Access-control Management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 899-908 ACM New York NY USA.

  • Bentler P. M. & Bonett D. G. (1980). Significance tests and goodness-of-fit in the analysis of covariance structures. Psychological Bulletin 88 588-606.

  • Bollen K. A. (1989). Structural equations with latent variables. New York: Wiley.

  • Churchill G. A. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research 16(3) 64-73.

  • Cole G. A. 1993. Management Theory and Practice 4th ed. DP Publications Ltd.

  • Cooper R. B. & Zmud R. W. (1990). Information technology implementation research: a technology diffusion approach. Management Science 36(2) 123-139.

  • Gaming Sector Survey 2002-2012. Direcção dos Serviços de Estatística e Censos Macau. Accessed June 2014. Available from

  • Guan L. Hansen D. R. & Mowen M. M. (2008). Cost management: accounting and control South-Western College Pub.

  • Hatcher L. (1994). A step-by-step approach to using the SAS system for factor analysis and structural equation modeling. Cary NC: SAS Institute.

  • Holland C. P. & Light B. (1999). A critical success factors model for ERP implementation IEEE software May/June 30-35.

  • Hotels and Similar Establishments Survey 2002-2012. Direcção dos Serviços de Estatística e Censos Macau. Accessed June 2014. Available from

  • Kanter R. M. (1983). The change masters: innovation for productivity in the American corporation. Simon & Shuster New York.

  • Lam W. (2005). Investigating success factors in enterprise application integration: a case-driven analysis. European Journal of Information Systems 14 pp.175-187.

  • Menor L. J. (2000). An empirical investigation of new service development competence and performance. Unpublished doctoral dissertation University of North Carolina Chapel Hill.

  • Miles R. H. (2010). Accelerating corporate transformations (Don’t lose your nerve!). Harvard Business Review January-February 69-75.

  • Moore G. C. & Benbasat I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(2) 192-222.

  • Nunnally J. C. (1978). Psychometric theory. New York: McGraw-Hill.

  • Pedhazur E. J. & Schmelkin L. P. (1991). Measurement design and analysis: an integrated approach. Hillsdale NJ: Lawrence Erlbaum Associates.

  • Perreault W. D. JR. & Leigh L. E. (1989). Reliability of nominal data based on qualitative judgments. Journal of Marketing Research 26(2) 135-148.

  • Post R. S. & Kingsbury A. A. (1991). Security Administration. London: Butterworth - Heinemann.

  • Ramsing L. (2009). Project communication in a strategic internal perspective. Corporate Communications: An International Journal. Vol. 14 no. 3 345-357.

  • Samarati P. & Vimercati. S. C. (2001). Access Control: Policies Models and Mechanisms. In Foundations of Security Analysis and Design: Tutorial Lectures Lecture Notes in Computer Science vol. 2171 137-193.

  • Schouten J. & Beers W. V. (2010). Result-Oriented Management. Uitgeverij Thema.

  • Segars A. H. Grover V. & Teng J. T. C. (1998). Strategic information systems planning: planning system dimensions internal coalignment and implications for planning effectiveness. Decision Science 29(2) 303-345.

  • Stratman J. K. & Roth A. V. (2002). Enterprise resource planning (ERP) competence constructs: two-stage multi-item scale development and validation. Decision Science vol.33 No.4 601-628.

  • York University (2006) Access Control Program Framework: Policies Procedures and Regulations Access_Control_Framework_BoardAudit.pdf p2 York University.