Saïd Assar

Saïd Assar
Institut Mines Telecom Business School · Technology, Information, and Management

PhD Information Systems

About

96
Publications
124,847
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,071
Citations
Citations since 2017
12 Research Items
610 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Saïd holds a Ph.D. degree in Computer Science from P & M Curie Univ., Paris, and French HDR diploma from University Paris 1 Panthéon Sorbonne. He is Professor in IS at Institut Mines-Télécom Business School, and is an associate researcher at CRI Research Lab, Sorbonne University, France. In 2012, he was a visiting scholar at Lund University, Sweden, with the Software Eng. Research Group (SERG). His research interests include IS modeling, method and tools for IS development, service-orientation in IS, empirical software engineering, e-learning and e-government.
Additional affiliations
December 2018 - present
Institut Mines Telecom Business School
Position
  • Professor (Full)
March 2012 - June 2012
Lund University
Position
  • Visiting researcher
Description
  • On sabbatical leave at LTH
January 2006 - November 2018
Institut Mines Telecom Business School
Position
  • Professor (Associate)

Publications

Publications (96)
Article
Full-text available
Cet article est une introduction synthétique aux méthodes empiriques de recherche en ingénierie informatique. Ces méthodes font partie intégrante des sciences de la nature et des sciences du comportement. Dans l’ingénierie des SI en tant que science de conception, ces méthodes sont essentielles pour évaluer et valider l’artéfact conçu, qu’il soit u...
Article
Defect management is a central task in software maintenance. When a defect is reported, appropriate resources must be allocated to analyze and resolve the defect. An important issue in resource allocation is the estimation of Defect Resolution Time (DRT). Prior research has considered different approaches for DRT prediction exploiting information r...
Chapter
As Information and Communication Technologies (ICT) gradually permeate daily life, they are profoundly changing the way education is conceived and delivered. Teachers play a key role in this transformation process; their beliefs, pedagogical practices, and teaching skills are continuously challenged. ICT integration in the educational process can s...
Conference Paper
Full-text available
Model Driven Engineering (MDE) holds the promise of raising the level of abstraction when designing systems by promoting domain specific modeling languages, model transformation techniques and code generation engines. Although requirements engineering (RE) relies on models and on modeling, RE and MDE have evolved separately and in distinct communit...
Conference Paper
Full-text available
Theorizing is an essential endeavor in IS research, and top-ranked journals require their publications to include substantial theoretical contribution. In this paper, we seek to analyze and understand whether ERP research has been successful in building theory and developing a cumulative tradition. Our working hypothesis is that the profusion of th...
Chapter
Blockchain technology is touted to revolutionize the financial sector at the beginning of its emergence. However, its area of application has expanded to include: Supply Chain Management (SCM), healthcare, e-commerce, IoT, etc. Moreover, Smart contracts are now used by different industries not only for their high transparency and accuracy but also...
Conference Paper
Customer Experience (CE) is often presented as a competitive battlefield in the new digital context. However, it is defined so broadly, so holistically, that companies find it challenging to improve it through well-defined projects with an impact analysis of the different changes that could be brought about. Enterprise Architecture Management (EAM)...
Data
List of papers included in the Systematic Literature Review in the paper published at EMMSAD 2020 and entitled "Does Enterprise Architecture support Customer Experience Improvement? Towards a conceptualization in digital transformation context"
Article
Full-text available
Software engineering is at the core of the digitalization of society. Ill-informed decisions can have major consequences, as made evident in the 2017 government crisis in Sweden, originating in a data breach caused by an outsourcing deal made by the Swedish Transport Agency. Many Government Agencies (GovAgs) in Sweden are rapidly undergoing a digit...
Article
Full-text available
Cloud computing is a state-of-the-art technological innovation providing an extensive list of benefits for almost every business and governmental, small or medium-sized organizations. It has truly revolutionized the computational era by cutting down cost and reducing complexities of infrastructural configurations for computational platforms. This s...
Presentation
Full-text available
A presentation of the paper (same title) published online in Journal of Empirical Software Engineering, 27 June 2015, http://link.springer.com/article/10.1007/s10664-015-9391-7
Article
Full-text available
Les systèmes d'information (SI) sont des artéfacts socio-techniques au service de l'utilisateur et de l'entreprise, et dans lesquels le logiciel, l'organisationnel et l'humain s'entremêlent. La problématique fondamentale de l'ingénierie des SI concerne la production de méthodes et d'outils pour aider à la conception, au développement et au déploiem...
Presentation
Video recording and slides available at IEEE Education website: http://www.computer.org/web/computingnow/education
Article
Full-text available
Information System engineering involves multiple languages for modeling, programming and handling various artifacts throughout the development cycle. Beyond abstract and concrete syntax, the specification of a language raises the tricky problem of expressing its semantics. A precise and rigorous expression of language semantics is essential to buil...
Chapter
As Information and Communication Technologies (ICT) gradually permeate daily life, they are profoundly changing the way education is conceived and delivered. Teachers play a key role in this transformation process; their beliefs, pedagogical practices, and teaching skills are continuously challenged. ICT integration in the educational process can s...
Book
The goal of this book is to provide a comprehensive, multi-dimensional approach to research and practice in e-government 2.0 implementation. Contributions from an international panel of experts apply a variety of methodological approaches and illustrative case studies to present state-of-the-art analysis and perspectives. Around the world, governm...
Chapter
Full-text available
E-government 2.0 refers to the inclusions of features like social web, user-generated content, the delivery and use of open data, and network effects through more user engagement. Integrating Web 2.0 technologies into e-government is expected to create opportunities to improve online public services quality, change the relationship with citizens an...
Article
Full-text available
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBA...
Article
Full-text available
On the one hand, getting advantages of Enterprise Resource Planning (ERP) systems largely depends on their capacity to be configured and adapted to fit the customer and domain requirements. On the other hand, product line engineering (PLE) is a promising approach for configuring and adapting products by means of configuration and derivation process...
Article
Full-text available
A two pages review of the book entitled "Les méthodes agiles de développement informatique"
Conference Paper
Full-text available
In cloud-assisted wireless body area networks (WBAN), the data gathered by sensor nodes are delivered to a gateway node that collects and aggregates data and transfer it to cloud storage; making it vulnerable to numerous security attacks. Among these, Distributed Denial of Service (DDoS) attack could be considered as one of the major security threa...
Conference Paper
Full-text available
Technology and mobile devices have been successfully integrated in peoples' everyday activities. Educational institutions around the world are increasing their interest to create mobile learning (ML) environments considering the advantage of connectivity, situated learning, individualized learning, social interactivity, portability, affordability a...
Conference Paper
Full-text available
This paper looks at a fundamental issue in Information Systems (IS) research methodology, that of the use and construction of theories. Theory usage and construction are required for developing science, however they are poorly understood and pose difficult challenges to the researcher. To explore this issue, we propose a set of criteria and apply i...
Conference Paper
Full-text available
Information System engineering involves multiple languages for modeling, programming and handling various artifacts throughout the development cycle. These languages are usually supported by software tools. The construction of these tools is a complex task often done in an ad-hoc manner. Proper use of meta-modeling techniques has the potential to f...
Conference Paper
Full-text available
To specify process modeling language semantics and build corresponding enactment engine is a challenging problem. We propose a model driven approach which combines structural and event-based behavioral meta-modeling techniques. These specifications are transformed into a software architecture for a process enactment engine that exploits publish-sub...
Conference Paper
Full-text available
Ce court essai se penche sur une question méthodologique fondamentale, celle de l’usage et de la construction de théories dans la recherche en systèmes d’information (SI). En se basant sur un bref état de l’art, nous discutons d’abord la définition d’une théorie et la problématique de construction de théo-ries. Ensuite, nous élaborons une grille d’...
Chapter
Full-text available
Cloud computing security is a broad research domain with a large number of concerns, ranging from protecting hardware and platform technologies to protecting clouds data and resource access (through different end- user devices). Although the advantages of cloud computing are tremendous, the security and privacy concerns of cloud computing have alwa...
Conference Paper
Full-text available
Contrairement à l'auteur d'une recherche « classique » en MIS, celui d'une revue de la littérature ne bénéficie pas d'un format ou d'un guidage prédéfini et bien établi pour mener à bien son travail et aboutir à une publication ayant une forte valeur ajoutée. Pour faire le point sur ce sujet, nous étudions les travaux existants dans plusieurs domai...
Conference Paper
Full-text available
Integrating Web 2.0 technologies in e-government creates opportunities to improve online public services quality and potentially can contribute to achieve e-government strategic objectives. This paper presents and analyzes results from an exploratory field study conducted recently with experts and practitioners of e-government services in France. O...
Article
Full-text available
Romain HENNION, Hubert TOURNIER, Eric BOURGEOIS
Conference Paper
Full-text available
The amount of data in large-scale software engineering contexts con-tinues to grow and challenges efficiency of software engineering efforts. At the same time, information related to requirements plays a vital role in the success of software products and projects. To face the current challenges in software engineering information management, softwa...
Article
Full-text available
The amount of data in large-scale software engineering contexts continues to grow and challenges efficiency of software engineering efforts. At the same time, information related to requirements plays a vital role in the success of software products and projects. To face the current challenges in software engineering information management, softwar...
Conference Paper
Full-text available
As the mobile technology evolves, the possibilities for Mobile Learning (ML) are becoming increasingly attractive. However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is to understand the use and adoption of mobile technologies by teachers in a busi...
Article
Full-text available
Research on learning processes has shown that students tend to learn in different ways and prefer to use different teaching resources. The understanding of learning styles can be used to identify, and implement, better teaching and learning strategies, in order to allow students to acquire new knowledge in a more effective and efficient way. In thi...
Conference Paper
Full-text available
Building software tools to support a new modeling formalism is a complex, error prone and time consuming task. Previous experiences have taught us that maintainability and portability are key issues which are poorly supported when development is realized in and ad-hoc manner. To overcome these limitations, we are investigating a meta-model driven a...
Conference Paper
Full-text available
Goal modeling is a prominent design paradigm in various domains of information systems engineering. In the field of service oriented computing (SOC) and in the field of semantic web services, emergent research works are basing their engineering approach on the goal concept. Because of the complexity of processes underlying SOC, the usage of the goa...
Conference Paper
Full-text available
Mobile technology and mobile applications evolution have increased possibilities for mobile learning (ML). However, the lack of perceived learning value and institutional infrastructure are hindering the possibilities for ML attempts. The purpose of our study is the understanding opportunities and obstacles of mobile technologies as perceived by te...
Article
Investigaciones sobre procesos de aprendizaje han mostrado que los estudiantes tienden a aprender en diferentes maneras y que prefieren utilizar diferentes recursos de enseñanza. El entender los estilos de aprendizaje puede servir para identificar, e implantar, mejores estrategias de enseñanza y aprendizaje, de tal forma que los estudiantes adquier...
Chapter
Full-text available
http://www.cepadues.com/Pages/Livre/Livre.aspx?ID=772
Chapter
Full-text available
http://www.cepadues.com/Pages/Livre/Livre.aspx?ID=772
Chapter
Full-text available
Public procurement constitutes a significant portion of national PIB in all countries and electronic platforms for supporting public transactions are an important application of e-government. In France, new regulations since 2005 are pushing public and private actors to adopt electronic means for handling all steps of the purchase process in public...
Chapter
Full-text available
E-government is a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically found the field have opened perspectives from multiple research domains. The goal of this chapter is to review evolution of the e-government field from an institutional and an academic point of view. Our position is th...
Conference Paper
Full-text available
Integrating Web 2.0 technologies in e-government opens up new opportunities for improving the quality of online public services and developing new ones, and can potentially contribute in achieving e-government strategic objectives. This paper presents and analyzes the result of an exploratory field study conducted recently with a group of e-governm...
Conference Paper
Full-text available
Meta-models are essential artifacts for specifying and reasoning on models and on methods. Traditionally, meta-modeling follows the "data" perspective and only the structural part of a model is represented. The "process" and "behavior" perspectives are neglected or partly represented, and for a process meta-model, such specifications express its en...
Conference Paper
Full-text available
Intentional services have been proposed to bridge the gap between low level, technical software-service descriptions and high level, strategic expressions of business needs for services. This proposal leverages on the SOA to an intentional level, and introduces the iSOA architecture. Derived from business specifications by service providers, intent...
Conference Paper
Full-text available
Concevoir des modèles exécutables est l'une des préoccupations majeures de l'ingénierie dirigée par les modèles (IDM). Pour atteindre cet objectif, il est nécessaire de spécifier formellement les propriétés dynamiques d'un modèle selon un méta-modèle, afin de faciliter son exécution par un méta-CASE (Computer Aided Software Engineering- Ingénierie...
Conference Paper
Full-text available
With the increasing growth in popularity of Web services, it is still difficult for business users to fully benefit from the SOA if it remains at the software level. The introduction of intentional services has been proposed to bridge the gap between low level, technical software-service descriptions and high level, strategic expressions of busines...
Conference Paper
Full-text available
The increasing growth in popularity of Web services has made it difficult for business users to fully benefit from these services if they remain specified at the software level. The introduction of intentional services is an alternative for bridging the gap between low level, technical software-service descriptions and high level, strategic express...
Article
Designing executable models is one of the major concerns of model-driven engineering (MDE). To reach this aim, it is necessary to formally specify dynamic properties of a model according to a meta-model, in order to be directly executed by a meta-CASE tool (Computer Aided Software Engineering). Moreover, for some kind of models, it is so important...
Book
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from...
Conference Paper
Full-text available
With the increasing growth in popularity of Web services, discovering relevant Web services becomes a significant challenge. The introduction of intentional services has been proposed to bridge the gap between low level, technical softwareservice descriptions and high level, strategic expressions of business needs for services. Current Web Services...
Article
Full-text available
Nelson Mandela, former South African President and Noble Laureate, observed that, "Education is the most powerful weapon which you can use to change the world." He left unanswered two questions: Why do we want to change the world, and What is it that needs to be changed. The articles in this special issues address the questions of how ICTs can enab...
Article
Full-text available
Recent research on the learning process has shown that students tend to learn in different ways and that they prefer to use different teaching resources as well. Many researchers agree on the fact that learning materials shouldn't just reflect of the teacher's style, but should be designed for all kinds of students and all kind of learning styles....
Conference Paper
Full-text available
In face of proprietary software, products distributed by the Open Source Software (OSS) community are constantly gaining credibility. Companies and institutions are starting to adopt them on large scales and several governmental initiatives have encouraged their use in the private sector. The objective of this paper is to present the first results...
Article
Full-text available
D. Alban et P. Eynaud Edition Hermès - collection Management et Informatique 2009, 225 pages, ISBN 978-2-7462-2064-5
Conference Paper
Full-text available
The approach presented in this work aims to guide the companies in their design of requirements traceability models adapted to the context of their projects. This is achieved by allowing the construction of a model based on trace fragments adapted to each phase of the development process or to a specific situation. Furthermore, the approach guides...
Conference Paper
Full-text available
Recent research on the learning process has shown that students tend to learn in different ways and that they prefer to use different teaching resources as well. Many researchers agree on the fact that learning materials shouldn't just reflect of the teacher's style, but should be designed for all kinds of students and all kind of learning styles....
Article
Full-text available
Public e-procurement is the use of electronic means for publishing, processing, exchanging and storing all the information related to institutional purchases in public organisations. It requires complex technological tools, which must comply with legal and organisational constraints. In France, such tools have actually been deployed and used in all...