Iman M. A. Helal

Iman M. A. Helal
Cairo University | CU · Department of Information System (IS)

PhD in Information Systems

About

25
Publications
15,315
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
86
Citations
Citations since 2017
20 Research Items
79 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
Introduction
Current research interests varies between business process monitoring, collaborative business processes, the relationship between BPM, block-chain and digital transformation. Also, information systems auditing is another direction that covers its connection with cybersecurity, CAATs, and cloud computing.
Additional affiliations
August 2017 - present
Cairo University
Position
  • Professor (Assistant)
March 2017 - present
Faculty of Computers and Information, Cairo University, Cairo, Egypt
Position
  • Professor (Assistant)
July 2011 - February 2017
Faculty of Computers and Information, Cairo University
Position
  • Lecturer
Education
September 2012 - March 2017
Cairo University
Field of study
  • Business Process Management and Information Systems

Publications

Publications (25)
Article
Process mining is a sub-field of data mining that focuses on analyzing timestamped and partially ordered data. This type of data is commonly called event logs. Each event is required to have at least three attributes: case ID, task ID/name, and timestamp to apply process mining techniques. Thus, any missing information need to be supplied first. Tr...
Article
Full-text available
Manufacturers today compete to offer not only products, but products accompanied by services, which are referred to as product-service systems (PSSs). PSS mass customization is defined as the production of products and services to meet the needs of individual customers with near-mass-production efficiency. In the context of the PSS mass customizati...
Article
Full-text available
Each organization faces threats and risks in daily operations. One of the main risks is how to assess the security level to protect from the increasing risks associated with technology evolution. So, organizations can specify the required approaches and skills. In this paper, we propose a security maturity model that classifies the organizations in...
Article
Full-text available
Harnessing big data in organizations today realizes benefits for competitive advantage. Generated profound insights are reflected in informed decision making, creating better business plans, and improved service delivery. Yet, organizations are still not recognizing how mature their big data management capabilities are. However, there is no structu...
Article
Full-text available
Nowadays, manufacturers are shifting from a traditional product-centric business paradigm to a service-centric one by offering products that are accompanied by services, which is known as Product-Service Systems (PSSs). PSS customization entails configuring products with varying degrees of differentiation to meet the needs of various customers. Thi...
Chapter
Event logs are used for a plethora of process analytics and mining techniques. A class of these mining activities is conformance (compliance) checking. The goal is to identify the violation of such patterns, i.e., anti-patterns. Several approaches have been proposed to tackle this analysis task. These approaches have been based on different data mo...
Chapter
The covid-19 pandemic causes a lot of changes in our lifestyles. Usage of information technology (IT) increased in all fields (government, business, industry, and academia). Despite its virtues, information technology has contributed to the repercussions. With advancements in the fields of information, communications, and technology, new types of I...
Preprint
Validation of compliance rules against process data is a fundamental functionality for business process management. Over the years, the problem has been addressed for different types of process data, i.e., process models, process event data at runtime, and event logs representing historical execution. Several approaches have been proposed to tackle...
Chapter
Moving forward in digital transformation programs in many governments around the world created the need for integrating large organizations. Large software projects have become increasingly complex. They are often formed by integrating independent software systems. As a result, system integration has gained the attention of the information and comm...
Chapter
Organizations can outsource information systems (IS) at various scales, from a little percentage of services to the whole range of services that they want in which an organization decides to separate the IS-related tasks and outsource them to another organization to produce, based on a defined contract. Different factors affect the organization’s d...
Chapter
Nowadays, blockchain systems are attracting attention in both academic and industry fields. Their main advantages are to their provided capabilities in security, and immutability. However, these systems are still immature growth, as there is a lack of templates for blockchain development. Interoperability can be considered one of the challenges whi...
Article
Organizations receive several cyberattacks on their daily operations, thus the need for auditing. However, there is no unified tool to perform cybersecurity audit tasks which are expensive and tedious. In this paper, we build a cybersecurity framework to perform cybersecurity auditing process in organizations. It covers several types of threats and...
Preprint
Full-text available
Process mining is of great importance for both data-centric and process-centric systems. Process mining receives so-called process logs which are collections of partially-ordered events. An event has to possess at least three attributes, case ID, task ID and a timestamp for mining approaches to work. When a case ID is unknown, the event is called u...
Chapter
Full-text available
In a practical sense, Information Systems (IS) have contributed to the success of most of the institutions. The importance of information systems stems from being the main factor in facilitating decision-making and any subsequent emerging problems. Therefore, it is important to verify their efficiency and accuracy by complying with quality standard...
Article
Full-text available
Process mining is of great importance for both data-centric and process-centric systems. Process mining receives so-called process logs which are collections of partially-ordered events. An event has to possess at least three attributes, case ID, task ID and a timestamp for mining approaches to work. When a case ID is unknown, the event is called u...
Conference Paper
Full-text available
Every organization needs to constitute a strong information system (IS) and security management in order to improve its business processes with the best practices. Information system processes must be reviewed and audited by IS auditors. IS auditors use a set of tools and techniques to perform the auditing process on the organizations. In this pape...
Conference Paper
Full-text available
In a time of growing threats and advancing circumstances, receiving and keeping up a strong cybersecurity profile in the enterprises are crucial. Important data and resources must be protected. Nowadays, cybersecurity became a predominant issue facing most organizations. It is recognized by organizations as an enterprise-wide issue requiring protec...
Article
Recommending the right resource to execute the next activity of a running process instance is of utmost importance for the overall performance of the business process, as well as the resource and for the whole organization. Several approaches have recommended a resource based on the task requirements and the resource capabilities. Moreover, the pro...
Thesis
Full-text available
Business Process Management continues to gain much interest ever since the economic crisis that occurred in 2008. Many organizations are monitoring and auditing their own systems for detecting any violations, in order to avoid them. This has led many researches to address the issue of business processes monitoring at different business process life...
Conference Paper
Full-text available
Events produced from business process execution need identification of process instance. With the lack of a central execution, it is hard to correlate these events to specific cases. Monitoring business processes is useful in conformance checking, compliance enforcement, risk management, and performance analysis. However, all these techniques and a...
Conference Paper
Full-text available
Event logs are invaluable sources of knowledge about the actual execution of processes. A large number of techniques to mine, check conformance and analyze performance have been developed based on logs. All these techniques require at least case ID, activity ID and the timestamp to be in the log. If one of those is missing, these techniques cannot...
Technical Report
Full-text available
Event logs are invaluable sources of knowledge about the actual execution of processes. A large number of techniques to mine, check conformance and analyze performance have been developed based on logs. All these techniques require at least case ID, activity ID and the timestamp to be in the log. If one of those is missing, these techniques cannot...
Thesis
Full-text available
Nowadays, rules make part of any software system starting from active databases and ending with real-time applications and sophisticated games. Meanwhile, an event can trigger many different rules according to the conditions controlling these rules. Although rules are core part to many kinds of systems, their maintenance and update are not easy wit...
Conference Paper
Full-text available
Nowadays, rules make part of any software system including real-time applications and games, meanwhile an event can trigger many different rules according to the conditions controlling these rules. Although rules are core part to many kinds of systems, its maintenance and update are not easy without affecting the whole application. Hence, many syst...

Network

Cited By

Projects

Projects (3)
Project
This project aims at monitoring violations of unmanaged business processes in execution time, and developing a tool that will be applicable to monitor these violations and maintain them under certain conditions specified by business domain.
Project
The project aims at correlating events (logs) that lack a case identifier.