Issa Atoum

Issa Atoum
The World Islamic Science and Education University · Department of Software Engineering

Ph.D.

About

29
Publications
65,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
264
Citations
Citations since 2017
13 Research Items
222 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Additional affiliations
September 2012 - June 2015
University Malaysia Sarawak
Position
  • Research and Teaching Assistant
Education
September 2012 - April 2015
University Malaysia Sarawak
Field of study
  • Computer Science/Software Engineering
September 2010 - June 2012
Philadelphia University Jordan
Field of study
  • Computer Science

Publications

Publications (29)
Article
Full-text available
Validation of software requirements is a primary phase in requirements engineering that ensures requirements match the target system with the intended needs of the acquirer. It aims to detect and correct errors that prevail in the specified requirements. Although there are tremendous requirements validation approaches, some software may fail becaus...
Article
Full-text available
Software quality in use (QinU) relates to human-software interactions when a software product is used in a particular context. Currently, QinU measurement models are bound to ineffective measurement formulation and many models are subjectively incoherent. This paper proposes a novel QinU framework (QinUF) to measure QinU competently consuming softw...
Article
Full-text available
Youth, especially students in universities, have tremendous energy that could be utilized to support their universities’ visions and their societies. However, students face several problems -for reasons related to their personalities, monetary support, and mentoring. During incubation, an idea goes several steps to crystallize, develop, and then be...
Article
Full-text available
Despite the ever-increasing interest in the field of text similarity methods, the development of adequate text similarity methods is lagging. Some methods are decent in entailment while others are reasonable to the degree to which two texts are similar. Very often, these methods are compared using Pearson’s correlation; however, Pearson’s correlati...
Article
Full-text available
The Pearson correlation is a performance measure that indicates the extent to which two variables are linearly related. When Pearson is applied to the semantic similarity domain, it shows the degree of correlation between scores of dataset test-pairs, the human and the observed similarity scores. However, the Pearson correlation is sensitive to out...
Conference Paper
Full-text available
A successful operational software depends on adequacy and degrees of freedom in requirements definitions. The software developer in conjunction with the customer validates requirements to ensure the completion of the intended use and the capability of the target application. Notwithstanding, requirements validation is time-consuming, effortless and...
Article
Full-text available
With the advance technology and increase in customer requirements, software organizations pursue to reduce cost and increase productivity by using standards and best practices. The Capability Maturity Model Integration (CMMI) is a software process improvement model that enhances productivity and reduces time and cost of running projects. As a refer...
Article
Full-text available
Project Portfolio Management (PPM) has gained success in many projects due to its large number of features that covers effective scheduling, risk management, collaboration, and third-party software integrations to mention a few. A broad range of PPM software is available; however, it is essential to select the PPM with minimum usage issues over tim...
Article
Full-text available
Cybersecurity is important for information dissemination, privacy and the human life. Managing cybersecurity related issues (such as banking hacks or phishing scams) during development, operation, and maintenance of cybersecurity models is a challenging task. Nearly no guidance is available on how to select, adapt, combine, and evolve cybersecurity...
Article
Full-text available
This article applied a previously proposed holistic cyber security implementation framework (HCS-IF) to implement the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan. The NIACSS identifies strategic objectives, national priorities, and an implementation road map. For clarity, we went through HCS-IF's major components....
Article
Full-text available
Cyber security frameworks direct the implementation of cyber security solutions. Managing the implementation of cyber security frameworks is a difficult task due to many problems. Part of these problems are concealed in the framework interdependent components (variables). Various works identified these variables, but they did not show their relatio...
Article
Full-text available
The performance measurement process identifies if an implementation process is within acceptable thresholds. Performance measures for cyber security implementation frameworks are considered strategic controls because it can guide the implementation process. Consequently, corrective or predictive actions could be applied to resolve a security issue...
Article
Full-text available
Sentence similarity is considered the basis of many natural language tasks such as information retrieval, question answering and text summarization. The semantic meaning between compared text fragments is based on the words‟ semantic features and their relationships. This article reviews a set of word and sentence similarity measures and compares t...
Article
Full-text available
Software review text fragments have considerably valuable information about users’ experience. It includes a huge set of properties including the software quality. Opinion mining or sentiment analysis is concerned with analyzing textual user judgments. The application of sentiment analysis on software reviews can find a quantitative value that repr...
Article
Full-text available
Requirements elicitation is considered the most important step in software engineering. There are several techniques to elicit requirements, however they are limited. Most approaches are general qualitative approaches. Thus, they do not suite specific software domain, such as cyber security. This article proposes a new technique to elicit requireme...
Article
Full-text available
similarity plays an important role in natural language processing tasks such as answering questions and summarizing text. At present, state-of-the-art text similarity algorithms rely on inefficient word pairings and/or knowledge derived from large corpora such as Wikipedia. This article evaluates previous word similarity measures on benchmark...
Conference Paper
Full-text available
Prepared domain specific datasets plays an important role to supervised learning approaches. In this article a new sentence dataset for software quality-in-use is proposed. Three experts were chosen to annotate the data using a proposed annotation scheme. Then the data were reconciled in a (no match eliminate) process to reduce bias. The Kappa, k s...
Article
Full-text available
The paper describes a novel approach to categorize users' reviews according to the three Quality in Use (QU) indicators defined in ISO: effectiveness, efficiency and freedom from risk. With the tremendous amount of reviews published each day, there is a need to automatically summarize user reviews to inform us if any of the software able to meet re...
Article
Full-text available
Software quality in use comprises quality from the user’s perspective. It has gained its importance in e-government applications, mobile-based applications, embedded systems, and even business process development. User’s decisions on software acquisitions are often ad hoc or based on preference due to difficulty in quantitatively measuring software...
Chapter
Full-text available
Software reviews are verified to be a good source of users’ experience. The software “quality in use” concerns meeting users’ needs. Current software quality models such as McCall and Boehm, are built to support software development process, rather than users perspectives. In this paper, opinion mining is used to extract and summarize software “qua...
Conference Paper
Full-text available
The paper describes a novel approach to categorize users' reviews according to the three Quality in Use (QU) indicators defined in ISO: effectiveness, efficiency and freedom from risk. With the tremendous amount of reviews published each day, there is a need to automatically summarize user reviews to inform us if any of the software able to meet re...
Article
Full-text available
Software quality-in-use comprehends the quality from users’ perspectives. It has gained its importance in e-learning applications, mobile service based applications and project management tools. User’s decisions on software acquisitions are often ad hoc or based on preference due to difficulty in quantitatively measure software quality-in-use. Howe...
Article
Full-text available
Purpose – The purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching and consolidated approach to implement cyber security strategies (CSSs). Design/methodology/approach – The HCS-IF is conceptually proposed to address the actual n...
Conference Paper
Full-text available
Software reviews are verified to be a good source of users’ experience. The software “quality in use” concerns meeting users’ needs. Current software quality models such as McCall and Boehm, are built to support software development process, rather than users perspectives. In this paper, opinion mining is used to extract and summarize software “qua...
Article
Full-text available
This paper proposes an implementation framework that lays out the ground for a coherent, systematic, and comprehensive approach to implement the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan. The Framework 1). Suggests a methodology to analyze the NIACSS, 2). Illustrates how the NIACSS analysis can be utilized to des...
Chapter
Full-text available
Measuring semantic similarity between words is very important to many applications related to information retrieval and natural language processing. In the paper, we have discovered that word similarity metrics suffer from the drawback of obtaining equal similarities of two words, if they have the same path and depth values in WordNet. Likewise inf...

Questions

Questions (9)
Question
If you got an invitation for a special issue.
when it is advised to reject/accept the invitation?
what factors could gain the success of the special issue ?
Question
Where can I find language-dependent audio datasets for deep learning applications other than English (example Arabic).
Is their any way to extract such data using YouTube or any other source?
Question
Looking for huge datasets for software requirements that could be used in machine learning.
Question
During my research on a topic related to software quality in use, I noticed a related ad on my Facebook page.
I did not yet publish the research and I did not discuss it elsewhere.
Do Facebook read the publication from the email?
Do Facebook record our discussion?
Or is it beyond that?
Thanks alot.
Question
In semantic similarity a benchmark data set is used to measure the effectiveness of semantic similarity measures. SemEval-2017 and earlier workshops uses the Pearson correlation to judge the effectiveness of proposed semantic similarity methods. One major problem for Pearson correlation is the outliers that influence the slope of the regression line, and consequently on the value of the correlation coefficient. Moreover, The Pearson correlation does not have the ability to show wither a similarity method is good for non-similar, average-similar or similar text fragments.
Is it time to find an alternative way?
if yes, what do you suggest?

Network

Cited By

Projects

Projects (6)
Project
Evaluate UX using machine learning
Project
Understand Software requirements and check requirements problems instantly.
Project
Simplify the implementation and deployment of CMMI.