
Saïd AssarInstitut Mines Telecom Business School · Technology, Information, and Management
Saïd Assar
PhD Information Systems
About
97
Publications
154,164
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,251
Citations
Introduction
Saïd holds a Ph.D. degree in Computer Science from P & M Curie Univ., Paris, and French HDR diploma from University Paris 1 Panthéon Sorbonne. He is Professor in IS at Institut Mines-Télécom Business School, and is an associate researcher at CRI Research Lab, Sorbonne University, France. In 2012, he was a visiting scholar at Lund University, Sweden, with the Software Eng. Research Group (SERG). His research interests include IS modeling, method and tools for IS development, service-orientation in IS, empirical software engineering, e-learning and e-government.
Additional affiliations
December 2018 - present
Institut Mines Telecom Business School
Position
- Professor (Full)
July 1990 - July 2015
March 2012 - June 2012
Publications
Publications (97)
Cet article est une introduction synthétique aux méthodes empiriques de recherche en ingénierie informatique. Ces méthodes font partie intégrante des sciences de la nature et des sciences du comportement. Dans l’ingénierie des SI en tant que science de conception, ces méthodes sont essentielles pour évaluer et valider l’artéfact conçu, qu’il soit u...
Defect management is a central task in software maintenance. When a defect is reported, appropriate resources must be allocated to analyze and resolve the defect. An important issue in resource allocation is the estimation of Defect Resolution Time (DRT). Prior research has considered different approaches for DRT prediction exploiting information r...
As Information and Communication Technologies (ICT) gradually permeate daily life, they are profoundly changing the way education is conceived and delivered. Teachers play a key role in this transformation process; their beliefs, pedagogical practices, and teaching skills are continuously challenged. ICT integration in the educational process can s...
Model Driven Engineering (MDE) holds the promise of raising the level of abstraction when designing systems by promoting domain specific modeling languages, model transformation techniques and code generation engines. Although requirements engineering (RE) relies on models and on modeling, RE and MDE have evolved separately and in distinct communit...
Theorizing is an essential endeavor in IS research, and top-ranked journals require their publications to include substantial theoretical contribution. In this paper, we seek to analyze and understand whether ERP research has been successful in building theory and developing a cumulative tradition. Our working hypothesis is that the profusion of th...
Blockchain technology is touted to revolutionize the financial sector at the beginning of its emergence. However, its area of application has expanded to include: Supply Chain Management (SCM), healthcare, e-commerce, IoT, etc. Moreover, Smart contracts are now used by different industries not only for their high transparency and accuracy but also...
Customer Experience (CE) is often presented as a competitive battlefield in the new digital context. However, it is defined so broadly, so holistically, that companies find it challenging to improve it through well-defined projects with an impact analysis of the different changes that could be brought about. Enterprise Architecture Management (EAM)...
List of papers included in the Systematic Literature Review in the paper published at EMMSAD 2020 and entitled "Does Enterprise Architecture support Customer Experience Improvement? Towards a conceptualization in digital transformation context"
Appendix for RCIS2020 paper by S Dhaiouir & S Assar
Software engineering is at the core of the digitalization of society. Ill-informed decisions can have major consequences, as made evident in the 2017 government crisis in Sweden, originating in a data breach caused by an outsourcing deal made by the Swedish Transport Agency. Many Government Agencies (GovAgs) in Sweden are rapidly undergoing a digit...
Software engineering is at the core of the digitalization of society. Ill-informed decisions can have major consequences, as made evident in the 2017 government crisis in Sweden, originating in a data breach caused by an outsourcing deal made by the Swedish Transport Agency. Many Government Agencies (GovAgs) in Sweden are rapidly undergoing a digit...
Cloud computing is a state-of-the-art technological innovation
providing an extensive list of benefits for almost every business
and governmental, small or medium-sized organizations. It has
truly revolutionized the computational era by cutting down cost
and reducing complexities of infrastructural configurations for
computational platforms. This s...
A presentation of the paper (same title) published online in Journal of Empirical Software Engineering, 27 June 2015, http://link.springer.com/article/10.1007/s10664-015-9391-7
Les systèmes d'information (SI) sont des artéfacts socio-techniques au service de l'utilisateur et de l'entreprise, et dans lesquels le logiciel, l'organisationnel et l'humain s'entremêlent. La problématique fondamentale de l'ingénierie des SI concerne la production de méthodes et d'outils pour aider à la conception, au développement et au déploiem...
Video recording and slides available at IEEE Education website:
http://www.computer.org/web/computingnow/education
Information System engineering involves multiple languages for modeling, programming and handling various artifacts throughout the development cycle. Beyond abstract and concrete syntax, the specification of a language raises the tricky problem of expressing its semantics. A precise and rigorous expression of language semantics is essential to buil...
As Information and Communication Technologies (ICT) gradually permeate daily life, they are profoundly changing the way education is conceived and delivered. Teachers play a key role in this transformation process; their beliefs, pedagogical practices, and teaching skills are continuously challenged. ICT integration in the educational process can s...
The goal of this book is to provide a comprehensive, multi-dimensional approach to research and practice in e-government 2.0 implementation. Contributions from an international panel of experts apply a variety of methodological approaches and illustrative case studies to present state-of-the-art analysis and perspectives.
Around the world, governm...
E-government 2.0 refers to the inclusions of features like social web, user-generated content, the delivery and use of open data, and network effects through more user engagement. Integrating Web 2.0 technologies into e-government is expected to create opportunities to improve online public services quality, change the relationship with citizens an...
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBA...
On the one hand, getting advantages of Enterprise Resource Planning (ERP) systems largely depends on their capacity to be configured and adapted to fit the customer and domain requirements. On the other hand, product line engineering (PLE) is a promising approach for configuring and adapting products by means of configuration and derivation process...
A two pages review of the book entitled "Les méthodes agiles de développement informatique"
In cloud-assisted wireless body area networks (WBAN), the data gathered by sensor nodes are delivered to a gateway node that collects and aggregates data and transfer it to cloud storage; making it vulnerable to numerous security attacks. Among these, Distributed Denial of Service (DDoS) attack could be considered as one of the major security threa...
Pascal RIVIÈRE, Joël BIZINGRE, Joseph PAUMIER.
Technology and mobile devices have been successfully integrated in peoples' everyday activities. Educational institutions around the world are increasing their interest to create mobile learning (ML) environments considering the advantage of connectivity, situated learning, individualized learning, social interactivity, portability, affordability a...
This paper looks at a fundamental issue in Information Systems (IS) research methodology, that of the use
and construction of theories. Theory usage and construction are required for developing science, however they are poorly understood and pose difficult challenges to the researcher. To explore this issue, we propose a set of criteria and apply i...
Information System engineering involves multiple languages for modeling, programming and handling various artifacts throughout the development cycle. These languages are usually supported by software tools. The construction of these tools is a complex task often done in an ad-hoc manner. Proper use of meta-modeling techniques has the potential to f...
To specify process modeling language semantics and build corresponding enactment engine is a challenging problem. We propose a model driven approach which combines structural and event-based behavioral meta-modeling techniques. These specifications are transformed into a software architecture for a process enactment engine that exploits publish-sub...
Ce court essai se penche sur une question méthodologique fondamentale, celle de l’usage et de la construction de théories dans la recherche en systèmes d’information (SI). En se basant sur un bref état de l’art, nous discutons d’abord la définition d’une théorie et la problématique de construction de théo-ries. Ensuite, nous élaborons une grille d’...
Cloud computing security is a broad research domain with a large number of concerns, ranging from protecting hardware and platform technologies to protecting clouds data and resource access (through different end- user devices). Although the advantages of cloud computing are tremendous, the security and privacy concerns of cloud computing have alwa...
Contrairement à l'auteur d'une recherche « classique » en MIS, celui d'une revue de la littérature ne bénéficie pas d'un format ou d'un guidage prédéfini et bien établi pour mener à bien son travail et aboutir à une publication ayant une forte valeur ajoutée. Pour faire le point sur ce sujet, nous étudions les travaux existants dans plusieurs domai...
Romain HENNION, Hubert TOURNIER, Eric BOURGEOIS
Integrating Web 2.0 technologies in e-government creates opportunities to improve online public services quality and potentially can contribute to achieve e-government strategic objectives. This paper presents and analyzes results from an exploratory field study conducted recently with experts and practitioners of e-government services in France. O...
The amount of data in large-scale software engineering contexts con-tinues to grow and challenges efficiency of software engineering efforts. At the same time, information related to requirements plays a vital role in the success of software products and projects. To face the current challenges in software engineering information management, softwa...
The amount of data in large-scale software engineering contexts continues to grow and challenges efficiency of software engineering efforts. At the same time, information related to requirements plays a vital role in the success of software products and projects. To face the current challenges in software engineering information management, softwar...
As the mobile technology evolves, the possibilities for Mobile Learning (ML) are becoming increasingly attractive. However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is to understand the use and adoption of mobile technologies by teachers in a busi...
Research on learning processes has shown that students tend to learn in different ways and prefer to use different teaching resources. The understanding of learning styles can be used to identify, and implement, better teaching and learning strategies, in order to allow students to acquire new knowledge in a more effective and efficient way. In thi...
Building software tools to support a new modeling formalism is a complex, error prone and time consuming task. Previous experiences have taught us that maintainability and portability are key issues which are poorly supported when development is realized in and ad-hoc manner. To overcome these limitations, we are investigating a meta-model driven a...
Goal modeling is a prominent design paradigm in various domains of information systems engineering. In the field of service oriented computing (SOC) and in the field of semantic web services, emergent research works are basing their engineering approach on the goal concept. Because of the complexity of processes underlying SOC, the usage of the goa...
Mobile technology and mobile applications evolution have increased possibilities for mobile learning (ML). However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is the understanding opportunities and obstacles of mobile technologies as perceived by te...
Investigaciones sobre procesos de aprendizaje han mostrado que los estudiantes tienden a aprender en diferentes maneras y que prefieren utilizar diferentes recursos de enseñanza. El entender los estilos de aprendizaje puede servir para identificar, e implantar, mejores estrategias de enseñanza y aprendizaje, de tal forma que los estudiantes adquier...
I. BOUGHZALA, A. DUDEZERT
http://www.cepadues.com/Pages/Livre/Livre.aspx?ID=772
http://www.cepadues.com/Pages/Livre/Livre.aspx?ID=772
Public procurement constitutes a significant portion of national PIB in all countries and electronic platforms for supporting public transactions are an important application of e-government. In France, new regulations since 2005 are pushing public and private actors to adopt electronic means for handling all steps of the purchase process in public...
E-government is a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically found the field have opened perspectives from multiple research domains. The goal of this chapter is to review evolution of the e-government field from an institutional and an academic point of view. Our position is th...
Integrating Web 2.0 technologies in e-government opens up new opportunities for improving the quality of online public services
and developing new ones, and can potentially contribute in achieving e-government strategic objectives. This paper presents
and analyzes the result of an exploratory field study conducted recently with a group of e-governm...
Meta-models are essential artifacts for specifying and reasoning on models and on methods. Traditionally, meta-modeling follows the "data" perspective and only the structural part of a model is represented. The "process" and "behavior" perspectives are neglected or partly represented, and for a process meta-model, such specifications express its en...
Intentional services have been proposed to bridge the gap between low level, technical software-service descriptions and high level, strategic expressions of business needs for services. This proposal leverages on the SOA to an intentional level, and introduces the iSOA architecture. Derived from business specifications by service providers, intent...
Concevoir des modèles exécutables est l'une des préoccupations majeures de l'ingénierie dirigée par les modèles (IDM). Pour atteindre cet objectif, il est nécessaire de spécifier formellement les propriétés dynamiques d'un modèle selon un méta-modèle, afin de faciliter son exécution par un méta-CASE (Computer Aided Software Engineering- Ingénierie...
With the increasing growth in popularity of Web services, it is still difficult for business users to fully benefit from the SOA if it remains at the software level. The introduction of intentional services has been proposed to bridge the gap between low level, technical software-service descriptions and high level, strategic expressions of busines...
The increasing growth in popularity of Web services has made it difficult for business users to fully benefit from these services if they remain specified at the software level. The introduction of intentional services is an alternative for bridging the gap between low level, technical software-service descriptions and high level, strategic express...
Designing executable models is one of the major concerns of model-driven engineering (MDE). To reach this aim, it is necessary to formally specify dynamic properties of a model according to a meta-model, in order to be directly executed by a meta-CASE tool (Computer Aided Software Engineering). Moreover, for some kind of models, it is so important...
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from...
With the increasing growth in popularity of Web services, discovering relevant Web services becomes a significant challenge. The introduction of intentional services has been proposed to bridge the gap between low level, technical softwareservice descriptions and high level, strategic expressions of business needs for services. Current Web Services...
Nelson Mandela, former South African President and Noble Laureate, observed that, "Education is the most powerful weapon which you can use to change the world." He left unanswered two questions: Why do we want to change the world, and What is it that needs to be changed. The articles in this special issues address the questions of how ICTs can enab...
Recent research on the learning process has shown that students tend to learn in different ways and that they prefer to use different teaching resources as well. Many researchers agree on the fact that learning materials shouldn't just reflect of the teacher's style, but should be designed for all kinds of students and all kind of learning styles....
D. Alban et P. Eynaud
Edition Hermès - collection Management et Informatique
2009, 225 pages, ISBN 978-2-7462-2064-5
In face of proprietary software, products distributed by the Open Source Software (OSS) community are constantly gaining credibility. Companies and institutions are starting to adopt them on large scales and several governmental initiatives have encouraged their use in the private sector. The objective of this paper is to present the first results...
The approach presented in this work aims to guide the companies in their design of requirements traceability models adapted to the context of their projects. This is achieved by allowing the construction of a model based on trace fragments adapted to each phase of the development process or to a specific situation. Furthermore, the approach guides...
Recent research on the learning process has shown that students tend to learn in different ways and that they prefer to use different teaching resources as well. Many researchers agree on the fact that learning materials shouldn't just reflect of the teacher's style, but should be designed for all kinds of students and all kind of learning styles....
Public e-procurement is the use of electronic means for publishing, processing, exchanging and storing all the information related to institutional purchases in public organisations. It requires complex technological tools, which must comply with legal and organisational constraints. In France, such tools have actually been deployed and used in all...
In information systems projects, the adequacy of designed and implemented solution is difficult to define and to measure. Using literature review and empirical investigation, adequacy is defined in this paper as the best compromise between quality requirements and cost constraints. Quality and cost are defined as the weighted sum of quality and cos...
L'e-gouvernement ou l'e-administration désignent autant l'application des technologies de l'internet pour la mise en ligne des procédures administratives que la réorganisation des administrations et la réforme de l'État ou la création d'un nouvel espace démocratique en ligne. Issu initialement de la pratique, le domaine de l'e-administration a évol...