Mohammad I. Zarour

Mohammad I. Zarour
Hashemite University | HU · Department of Software Engineering (SWE)

PhD

About

66
Publications
57,084
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,273
Citations
Additional affiliations
August 2011 - July 2013
United Nation Development Program (UNDP)
Position
  • Chief Technical Adivsor (CTA)
Description
  • Manage IT projects, Develop policies and conduct IT related field studies
August 2013 - present
Prince Sultan University
Position
  • Professor (Assistant)
March 2009 - July 2011
Petra University
Position
  • Professor (Assistant)

Publications

Publications (66)
Article
Full-text available
System-based learning (SBL) in engineering domains integrates systems thinking and engineering principles to develop a system. In software engineering, to develop software using the DevOps process, using SBL environment, students gain a comprehensive understanding of the DevOps software development process and apply theoretical concepts to real-wor...
Preprint
Full-text available
DevOps and Artificial Intelligence (AI) are interconnected with each other. DevOps is a business-driven approach to providing quickly delivered quality software, and AI is the technology that can be used in the system to enhance its functionality. So, DevOps teams can use AI to test, code, release, monitor, and improve the system. Through AI, the a...
Article
Full-text available
With the popularity of e-learning, personalization and ubiquity have become important aspects of online learning. To make learning more personalized and ubiquitous, we propose a learner model for a query-based personalized learning recommendation system. Several contextual attributes characterize a learner, but considering all of them is costly for...
Article
Full-text available
IT organizations are striving to develop software solutions that meet customer needs as well as their business goals. Software organization scontinuously improve their software development practices for faster time-to-market and better software quality. The success factors to conduct process improvement initiatives are documented in the literature,...
Article
Full-text available
IT organizations are striving to develop software solutions that meet customer needs as well as their business goals. Software organizations continuously improve their software development practices for faster time-to-market and better software quality. The success factors to conduct process improvement initiatives are documented in the literature,...
Article
Full-text available
Data integrity continues to be a persistent problem in the current healthcare sector. It ensures that the data is correct and has not even in any manner been improperly changed. Incorrect data might become significant health threats for patients and a big responsibility for clinicians, resulting in problems such as scam, misconduct, inadequate trea...
Article
Full-text available
In practice, the software process is an intermediate phase for enhancement and improvements the design for different types of software products and help developers to converts the specified requirements into prototypes that implement the design into reality. The objective of this paper is to provide software developers, designers and software engin...
Article
Full-text available
Currently, the customer's demands have expressively amplified their expectations of getting software at a high-quality level. However, the non-functional requirements of the software products attention have been expanded in both the academic and the industrial fields; so, there is no framework for specifying and measuring such kinds of quality cons...
Article
Full-text available
Nowadays, IT organizations are not seeing DevOps as a competitive advantage or added value, but how can organizations survive if not adopting it? Many software development organizations are adopting DevOps software processes to foster better collaboration between development and operation teams, to improve the software development process’s quality...
Article
Full-text available
Blockchain technology is among the most significant developments and revolutionary innovations of the Information Technology industry. It corners a crucial space in the present digital era and has already made significant differences in human life. Moreover, it is anticipated that the Blockchain technology will improvise the existing IT facilities...
Article
Full-text available
The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment, thus making our lives far more comfortable. However, the present day healthcare industry has also become the...
Conference Paper
Full-text available
Huge numbers of worldwide-deployed software suffer from poor quality and possess vulnerabilities with serious impact. Meanwhile, people are using such software to save and manage their valuable information including their monetary data. This has increased the hackers' appetite to attack software. Henceforth, researchers and practitioners are convin...
Preprint
Full-text available
This work aims at discussing the complexity aspect of software while demonstrating its relationship with security. Complexity is an essential part of software; however, numerous studies indicate that they increase the vulnerability of the software systems and introduce bugs in the program. Many developers face difficulty when trying to understand t...
Article
Full-text available
This work aims at discussing the complexity aspect of software while demonstrating its relationship with security. Complexity is an essential part of software; however, numerous studies indicate that they increase the vulnerability of the software systems and introduce bugs in the program. Many developers face difficulty when trying to understand t...
Chapter
Securing the cyberspace is a challenging task that needs well educated and trained professionals. Developing a workforce that can hold the burden of monitoring and ensure cyberspace security is becoming prominent nowadays. Accordingly, developing effective cybersecurity programs is gaining more focus in academia and industry. This paper examines th...
Article
Software development success depends on variousfactors,one of which is the adopted software process. Although the focus in software engineering is to engineer the development process in a way that guarantees higher process and product quality, the focus has recently been shifted toward extending the software process to consider other phases from th...
Article
Full-text available
Despite the big number of software process models currently available which have been used and practiced for many years, we could not till now totally solve the problem of projects' late submissions! Meanwhile Software have constantly become bigger, more complex, and require high quality. A recently developed model, called DevOps, aims at producing...
Article
Full-text available
Background Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with se...
Article
Full-text available
It is critical to develop secure software with long-term performance and capability to withstand and forestall the growing competition in the software development industry. To enhance the potential of Confidentiality, Integrity, and Availability (CIA), a mechanism is required to built in and secure the durability at the time of software development...
Article
Background Software complexity affects its quality; a complex software is not only difficult to read, maintain and less efficient, but it also can be less secure with many vulnerabilities. Complexity metrics, e.g. cyclomatic complexity and nesting levels, are commonly used to predict and benchmark software cost and efficiency. Complexity metrics ar...
Article
Open source web applications are really taking over major businesses. The main inspiration claimed for these applications are security, popularity, and availability. In this work, Static analysis of the source code of multiple open-source web applications is performed in order to investigate the security vulnerabilities of these applications. The a...
Article
Bad smells are not uncommon in software systems. Such problems arise as a result of incomplete, inconsistent or incorrect requirements followed, accordingly, by bad design decisions which travel to the construction phase ending up with malfunctioning software. Such problems are expected to be handled and resolved during the evolution of the softwar...
Article
Nowadays, software systems are very complex which make software maintenance, especially bug fixing, very challenging. Identifying an appropriate developer to handle a new reported bug is very difficult and error-prone which results in a lengthy bug fixing process. In this paper, we propose a new developer recommendation approach, CLUBA, for assigni...
Article
There is a big consensus that the quality of the software process has a great influence on the quality of the developed software. Hence, improving process quality helps in developing better software products with fewer defects on time and within budget. Accordingly, many software companies worldwide are conducting software process improvement (SPI)...
Preprint
Most bug assignment approaches utilize text classification and information retrieval techniques. These approaches use the textual contents of bug reports to build recommendation models. The textual contents of bug reports are usually of high dimension and noisy source of information. These approaches suffer from low accuracy and high computational...
Article
Full-text available
Most bug assignment approaches utilize text classification and information retrieval techniques. These approaches use the textual contents of bug reports to build recommendation models. The textual contents of bug reports are usually of high dimension and noisy source of information. These approaches suffer from low accuracy and high computational...
Article
Full-text available
Successful software products necessitate users’ satisfaction when experiencing the use of the software. This is not only determined by the software functionalities and completeness, but also with the overall user experience when using the software product. Although user experience is widely adopted by practitioners and in industry, there is no scie...
Article
Full-text available
Software product quality is affected by the quality of the process used to develop it. Improving process quality helps software organizations in developing better software products on time and within budget. To achieve these benefits, software organizations are becoming more interested to pursue Software Process Improvement (SPI) initiatives. The f...
Article
Full-text available
Technology is changing the way we used to live. The new generation, indisputably, is the generation of technology. Mobile applications have become one of the most used products on mobile devices. Nowadays, the users of technology applications started developing their user experience very early in their lives! The success or failure of a software pr...
Article
Full-text available
The Guide to the Software Engineering Body of Knowledge (the SWEBOK Guide) represents the consensus on the knowledge that software engineers, and their organizations, should use whenever and wherever appropriate in software development. This paper presents an innovative use of this SWEBOK Guide as a benchmarking reference for software organizations...
Chapter
Nowadays, the term software-defined networking (SDN) becomes very popular. It is an approach that decouples the “control plane” and the “data plane” in switches to allow more programmable control of network traffic flows. Currently, several efforts are under way to thoroughly study and deploy SDN, as well as create standards that regulate the use o...
Article
Context: Software engineering (SE) has a multidisciplinary and dynamic nature that makes it challenging to design its educational material. Guide to the software engineering body of knowledge (SWEBOK) which has evolved to become ISO/IEC 19759 standard has identified various knowledge areas to be part of any SE curricula. Although there is a number...
Article
Full-text available
Throughout the software evolution, several maintenance actions such as adding new features , fixing problems, improving the design might negatively or positively affect the software design quality. Quality degradation, if not handled in the right time, can accumulate and cause serious problems for future maintenance effort. Several researchers cons...
Conference Paper
Software process improvement (SPI) approaches are highly mature within both product and service development enterprises. Among SPI approaches, particularly within large enterprises, CMMI is widely used and demonstrated its influencein leading the application of performance improvement methods in industry. In this paper, we test the readiness of gov...
Article
Google N-gram viewer is one of those newly published Google services. Google archived or digitized a large number of books in different languages. Google populated the corpora from over 5 million books published up to 2008. This Google service allows users to enter queries of words. The tool then charts time-based data that show the frequency of us...
Conference Paper
Full-text available
Throughout the software evolution, several maintenance actions such as adding new features, fixing problems, improving the design might negatively or positively affect the software design quality. Quality degradation, if not handled in the right time, can accumulate and cause serious problems for future maintenance effort. In this work, we study th...
Article
Full-text available
The ability to control data and information through the Internet can be challenging. Preliminary analysis showed that some tampering and forgery may occur to some words of the Quran in the electronic versions that span the Internet. Such small modifications may not be noticed by public audience. The holy book of Quran includes a unique feature in t...
Conference Paper
Convenience and the ability to perform advanced transactions encourage banks clients to use online banking. As security and usability are two growing concerns for online banking users, banks have invested heavily in improving their web portals security and user experience and trust in them. Despite considerable efforts to evaluate particular securi...
Article
Full-text available
This paper proposes an approach to software estimation based on productivity models with fixed/variable costs and economies/diseconomies of scale. The paper looks first at productivity alone as a single variable model, and then discusses multi-variable models for estimation in specific contexts. An empirical study in a Canadian organization that il...
Article
Full-text available
For many banks and customers in the Middle East and Islamic world, the availability and the ability to apply Islamic Shariah rules on financial activities is very important. In some cases, business and technical barriers can limit the ability to apply and offer financial services that are implemented according to Shariah rules. In this paper, we d...
Conference Paper
Full-text available
Google N-gram Viewer is a graphing tool that charts time-based data to show the frequency of usage of words or phrases. The tool is based on a large dataset from books collected by Google from open sources. Although Arabic is the fifth spoken language in the world with speakers more than French, German, Russian and Italian languages, unfortunately,...
Conference Paper
Full-text available
Management interest is not limited to accurate estimate of software projects, but also to being more productive than your peers. This paper proposes an estimation approach based on economics concepts, such as productivity models with fixed/variable costs and economies/diseconomies of scale. This paper also reports on an empirical study in a Canadia...
Conference Paper
Open Source Software (OSS) solutions are growing rapidly as they become more mature. Countries have focused their efforts to support OSS initiatives and foster their development by providing government support through laws and legislation, and education. Because of the growing national interest in OSS, we surveyed efforts of twenty major world econ...
Article
Software Process Assessment (SPA) is an effective method used to understand organizations’ software process quality. Assessment methods are tools used to identify the possible software process improvement opportunities. This paper studies the design process of the SPA methods from an engineering viewpoint and uses Vincenti’s classifications of engi...
Article
Full-text available
Various initiatives designed to increase Arabic Web content have been undertaken in recent years, and now search engines are reporting that the Arabic portion of Web content has grown relative to the overall Web content. An accurate estimate of Arabic Web content is crucial for those interested in studying it and enriching it. In this paper, we pro...
Conference Paper
Full-text available
Many research have been accomplished in assessing software process in small enterprises; in this paper we introduce our experience in conducting SPI initiatives with very small enterprises VSE using the OWPL assessment method. Interventions to these enterprises have been made to help them improving their software processes. The lessons learned by a...
Conference Paper
Full-text available
Evaluation of competing software process assessment (SPA) methods is an important issue for software process improvement initiatives. SPA methods designers usually claim the successful design and implementations of their SPA methods. Unfortunately, no independently evaluation, based on a set of defined evaluation criteria, has yet been documented....
Chapter
Software organizations have been struggling for decades to improve the quality of their products by improving their software development processes. Designing an improvement program for a software development process is a demanding and complex task. This task consists of two main processes: the assessment process and the improvement process. A succe...
Chapter
AbstracTSoftware organizations have been struggling for decades to improve the quality of their products by improving their software development processes. Designing an improvement program for a software development process is a demanding and complex task. This task consists of two main processes: the assessment process and the improvement process....
Conference Paper
Full-text available
Evaluation of competing software process assessment (SPA) methods is an important issue for software process improvement initiatives. Although SPA methods designers may claim successful design and implementations of their SPA methods, no evaluation of these claims, based on a set of evaluation criteria, has yet been documented. In addition, indepen...
Conference Paper
Software process assessment (SPA) is an effective tool to understand an organization’s process quality and to explore improvement opportunities. The knowledge represented as good-practices to develop assessment methods is, unfortunately, scattered in the literature concerned with developing either lightweight or heavyweight SPA methods. This paper...
Conference Paper
Software process assessment (SPA) plays an important role in the Model-based software process improvement (SPI) paradigm; assessment methods are used to understand software organizations’ current process quality and identify the possible improvement opportunities. This paper studies the design process of the SPA methods from an engineering viewpoin...
Conference Paper
Full-text available
It is a challenge for small and very small organizations to adopt software process improvement models and the associated assessment methods to improve their software process. A number of customized assessment methods based on SPI models, such as CMM/CMMI and ISO 15504, have been proposed to fit the needs of such organizations. To help them select a...
Conference Paper
Full-text available
The software industry is an important economic activity in industrial countries. Nowadays the investment in this field measured in millions of dollars, the IT organizations varies in their size and role. An area of concern to IT organizations is implementing and adopting Software Process Improvement (SPI) models. For many years, researchers have de...

Questions

Questions (3)
Question
When drawing the abuse/misuse cases, actors such as the adversary/hacker, are unavailable at that time. This means that the identified threats via abuse cases can be specified partially and indirectly by actors other than those who will abuse the use case itself, I man the hackers.
Question
There are many materials and discussions on the internet about both CMMI and Agile, most of which discuss the topic theoretically. I think it would be useful to share and summarize some experiences about success stories in using both CMMI and Agile methodology.
Question
There are various definitions of SMEs in terms of their number of employees and their turnover. From your point of view, how you define SMEs?

Network

Cited By