About
29
Publications
65,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
264
Citations
Citations since 2017
Introduction
Working on a computational approach to predict quality-in-use from software reviews.
Additional affiliations
September 2012 - June 2015
Education
September 2012 - April 2015
September 2010 - June 2012
Publications
Publications (29)
Validation of software requirements is a primary phase in requirements engineering that ensures requirements match the target system with the intended needs of the acquirer. It aims to detect and correct errors that prevail in the specified requirements. Although there are tremendous requirements validation approaches, some software may fail becaus...
Software quality in use (QinU) relates to human-software interactions when a software product is used in a particular context. Currently, QinU measurement models are bound to ineffective measurement formulation and many models are subjectively incoherent. This paper proposes a novel QinU framework (QinUF) to measure QinU competently consuming softw...
Youth, especially students in universities, have tremendous energy that could be utilized to support their universities’ visions and their societies. However, students face several problems -for reasons related to their personalities, monetary support, and mentoring. During incubation, an idea goes several steps to crystallize, develop, and then be...
Despite the ever-increasing interest in the field of text similarity methods, the development of adequate text similarity methods is lagging. Some methods are decent in entailment while others are reasonable to the degree to which two texts are similar. Very often, these methods are compared using Pearson’s correlation; however, Pearson’s correlati...
The Pearson correlation is a performance measure that indicates the extent to which two variables are linearly related. When Pearson is applied to the semantic similarity domain, it shows the degree of correlation between scores of dataset test-pairs, the human and the observed similarity scores. However, the Pearson correlation is sensitive to out...
A successful operational software depends on adequacy and degrees of freedom in requirements definitions. The software developer in conjunction with the customer validates requirements to ensure the completion of the intended use and the capability of the target application. Notwithstanding, requirements validation is time-consuming, effortless and...
With the advance technology and increase in customer requirements, software organizations pursue to reduce cost and increase productivity by using standards and best practices. The Capability Maturity Model Integration (CMMI) is a software process improvement model that enhances productivity and reduces time and cost of running projects. As a refer...
Project Portfolio Management (PPM) has gained
success in many projects due to its large number of features that
covers effective scheduling, risk management, collaboration, and
third-party software integrations to mention a few. A broad
range of PPM software is available; however, it is essential to
select the PPM with minimum usage issues over tim...
Cybersecurity is important for information dissemination, privacy and the human life. Managing cybersecurity related issues (such as banking hacks or phishing scams) during development, operation, and maintenance of cybersecurity models is a challenging task. Nearly no guidance is available on how to select, adapt, combine, and evolve cybersecurity...
This article applied a previously proposed holistic cyber security implementation
framework (HCS-IF) to implement the National Information Assurance and Cyber Security
Strategy (NIACSS) of Jordan. The NIACSS identifies strategic objectives, national priorities,
and an implementation road map. For clarity, we went through HCS-IF's major components....
Cyber security frameworks direct the implementation of cyber security solutions. Managing the implementation of cyber security frameworks is a difficult task due to many problems. Part of these problems are concealed in the framework interdependent components (variables). Various works identified these variables, but they did not show their relatio...
The performance measurement process identifies if an implementation process is within acceptable thresholds. Performance measures for cyber security implementation frameworks are considered strategic controls because it can guide the implementation process. Consequently, corrective or predictive actions could be applied to resolve a security issue...
Sentence similarity is considered the basis of many natural language tasks such as information retrieval, question answering and text summarization. The semantic meaning between compared text fragments is based on the words‟ semantic features and their relationships. This article reviews a set of word and sentence similarity measures and compares t...
Software review text fragments have considerably valuable information about users’ experience. It includes a huge set of properties including the software quality. Opinion mining or sentiment analysis is concerned with analyzing textual user judgments. The application of sentiment analysis on software reviews can find a quantitative value that repr...
Requirements elicitation is considered the most important step in software engineering. There are several techniques to elicit requirements, however they are limited. Most approaches are general qualitative approaches. Thus, they do not suite specific software domain, such as cyber security. This article proposes a new technique to elicit requireme...
similarity plays an important role in natural
language processing tasks such as answering questions and
summarizing text. At present, state-of-the-art text similarity
algorithms rely on inefficient word pairings and/or knowledge
derived from large corpora such as Wikipedia. This article
evaluates previous word similarity measures on benchmark...
Prepared domain specific datasets plays an important role to supervised
learning approaches. In this article a new sentence dataset for software
quality-in-use is proposed. Three experts were chosen to annotate the data
using a proposed annotation scheme. Then the data were reconciled in a (no
match eliminate) process to reduce bias. The Kappa, k s...
The paper describes a novel approach to categorize users' reviews according to the three Quality in Use (QU) indicators defined in ISO: effectiveness, efficiency and freedom from risk. With the tremendous amount of reviews published each day, there is a need to automatically summarize user reviews to inform us if any of the software able to meet re...
Software quality in use comprises quality from the user’s perspective. It has gained its importance in e-government applications, mobile-based applications, embedded systems, and even business process development. User’s decisions on software acquisitions are often ad hoc or based on preference due to difficulty in quantitatively measuring software...
Software reviews are verified to be a good source of users’ experience. The software “quality in use” concerns meeting users’ needs. Current software quality models such as McCall and Boehm, are built to support software development process, rather than users perspectives. In this paper, opinion mining is used to extract and summarize software “qua...
The paper describes a novel approach to categorize users' reviews according to the three Quality in Use (QU) indicators defined in ISO: effectiveness, efficiency and freedom from risk. With the tremendous amount of reviews published each day, there is a need to automatically summarize user reviews to inform us if any of the software able to meet re...
Software quality-in-use comprehends the quality from users’ perspectives. It has gained its importance in e-learning applications, mobile service based applications and project management tools. User’s decisions on software acquisitions are often ad hoc or based on preference due to difficulty in quantitatively measure software quality-in-use. Howe...
Purpose
– The purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching and consolidated approach to implement cyber security strategies (CSSs).
Design/methodology/approach
– The HCS-IF is conceptually proposed to address the actual n...
Software reviews are verified to be a good source of users’ experience. The software “quality in use” concerns meeting users’ needs. Current software quality models such as McCall and Boehm, are built to support software development process, rather than users perspectives. In this paper, opinion mining is used to extract and summarize software “qua...
This paper proposes an implementation framework that lays out the ground for a coherent, systematic, and comprehensive approach to implement the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan. The Framework 1). Suggests a methodology to analyze the NIACSS, 2). Illustrates how the NIACSS analysis can be utilized to des...
Measuring semantic similarity between words is very important to many applications related to information retrieval and natural language processing. In the paper, we have discovered that word similarity metrics suffer from the drawback of obtaining equal similarities of two words, if they have the same path and depth values in WordNet. Likewise inf...
Questions
Questions (9)
If you got an invitation for a special issue.
when it is advised to reject/accept the invitation?
what factors could gain the success of the special issue ?
Where can I find language-dependent audio datasets for deep learning applications other than English (example Arabic).
Is their any way to extract such data using YouTube or any other source?
Looking for huge datasets for software requirements that could be used in machine learning.
During my research on a topic related to software quality in use, I noticed a related ad on my Facebook page.
I did not yet publish the research and I did not discuss it elsewhere.
Do Facebook read the publication from the email?
Do Facebook record our discussion?
Or is it beyond that?
Thanks alot.
In semantic similarity a benchmark data set is used to measure the effectiveness of semantic similarity measures. SemEval-2017 and earlier workshops uses the Pearson correlation to judge the effectiveness of proposed semantic similarity methods. One major problem for Pearson correlation is the outliers that influence the slope of the regression line, and consequently on the value of the correlation coefficient. Moreover, The Pearson correlation does not have the ability to show wither a similarity method is good for non-similar, average-similar or similar text fragments.
Is it time to find an alternative way?
if yes, what do you suggest?
Projects
Projects (6)