A Security Door Access Control System (SDACS) project involves a number of teams from different organizations with diverse project goals. One of the main challenges of such projects is the lack of a standard approach or common understanding to achieve a common goal among project parties. This research examines various management concerns for SDACS projects, highlights the expected common understanding for project participants, develops the project management constructs, and emphasizes on the resulting value of the project to all participants. A two-stage process of scale development and validation was conducted. First, six generic constructs were identified based on the Security Access Control System Framework. Next, a multi-item scale for each construct was developed with reference to the Result-Oriented Management Framework. Expert judges were invited to conduct manual sorting of the items iteratively until reliability and validity was reached. In the next stage, further refinement and validation were carried out with a synthesized survey instrument and a series of statistical testing followed. The finalized SDACS project management constructs and the related findings help reinforce the importance of a standardized management practice for SDACS projects. The value of this research not only benefits SDACS project managers but everyone who works on the project.
If the inline PDF is not rendering correctly, you can download the PDF file here.
Anderson, J. C., & Gerbing, D. W. (1991). Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities. Journal of Applied Psychology, 76(5), 732-741.
Ang, J., & Teo, T. (1997). CSFs and sources of assistance and expertise in strategic IS planning: a Singapore perspective. European Journal of Information Systems, 6(3), 164-171.
Bauer, L., Cranor, L. F., Reeder, R. W. et al. (2009). Real Life Challenges in Access-control Management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 899-908, ACM New York, NY, USA.
Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness-of-fit in the analysis of covariance structures. Psychological Bulletin, 88, 588-606.
Bollen, K. A. (1989). Structural equations with latent variables. New York: Wiley.
Churchill, G. A. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(3), 64-73.
Cole, G. A. 1993. Management Theory and Practice, 4th ed. DP Publications Ltd.
Cooper, R. B. & Zmud, R. W. (1990). Information technology implementation research: a technology diffusion approach. Management Science, 36(2), 123-139.
Gaming Sector Survey 2002-2012. Direcção dos Serviços de Estatística e Censos, Macau. Accessed June 2014. Available from http://www.dsec.gov.mo/default.aspx?noredirect=true
Guan, L., Hansen, D. R., & Mowen, M. M. (2008). Cost management: accounting and control, South-Western College Pub.
Hatcher, L. (1994). A step-by-step approach to using the SAS system for factor analysis and structural equation modeling. Cary, NC: SAS Institute.
Holland, C. P. & Light, B. (1999). A critical success factors model for ERP implementation IEEE software, May/June, 30-35.
Hotels and Similar Establishments Survey 2002-2012. Direcção dos Serviços de Estatística e Censos, Macau. Accessed June 2014. Available from http://www.dsec.gov.mo/default.aspx?noredirect=true
Kanter, R. M. (1983). The change masters: innovation for productivity in the American corporation. Simon & Shuster, New York.
Lam, W. (2005). Investigating success factors in enterprise application integration: a case-driven analysis. European Journal of Information Systems 14, pp.175-187.
Menor, L. J. (2000). An empirical investigation of new service development competence and performance. Unpublished doctoral dissertation, University of North Carolina, Chapel Hill.
Miles, R. H. (2010). Accelerating corporate transformations (Don’t lose your nerve!). Harvard Business Review, January-February, 69-75.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(2), 192-222.
Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill.
Pedhazur, E. J., & Schmelkin, L. P. (1991). Measurement, design, and analysis: an integrated approach. Hillsdale, NJ: Lawrence Erlbaum Associates.
Perreault, W. D. JR., & Leigh, L. E. (1989). Reliability of nominal data based on qualitative judgments. Journal of Marketing Research, 26(2), 135-148.
Post, R. S. & Kingsbury, A. A. (1991). Security Administration. London: Butterworth - Heinemann.
Ramsing, L. (2009). Project communication in a strategic internal perspective. Corporate Communications: An International Journal. Vol. 14 no. 3, 345-357.
Samarati, P. & Vimercati. S. C. (2001). Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design: Tutorial Lectures, Lecture Notes in Computer Science, vol. 2171, 137-193.
Schouten, J. & Beers, W. V. (2010). Result-Oriented Management. Uitgeverij Thema.
Segars, A. H., Grover, V., & Teng, J. T. C. (1998). Strategic information systems planning: planning system dimensions, internal coalignment, and implications for planning effectiveness. Decision Science, 29(2), 303-345.
Stratman, J. K., & Roth, A. V. (2002). Enterprise resource planning (ERP) competence constructs: two-stage multi-item scale development and validation. Decision Science, vol.33, No.4, 601-628.
York University (2006) Access Control Program Framework: Policies, Procedures and Regulations, Access_Control_Framework_BoardAudit.pdf, p2, York University.