Sherif Mazen

Sherif Mazen
Cairo University | CU · Department of Information System (IS)

About

39
Publications
23,649
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations
Citations since 2017
20 Research Items
97 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025

Publications

Publications (39)
Chapter
The covid-19 pandemic causes a lot of changes in our lifestyles. Usage of information technology (IT) increased in all fields (government, business, industry, and academia). Despite its virtues, information technology has contributed to the repercussions. With advancements in the fields of information, communications, and technology, new types of I...
Chapter
Moving forward in digital transformation programs in many governments around the world created the need for integrating large organizations. Large software projects have become increasingly complex. They are often formed by integrating independent software systems. As a result, system integration has gained the attention of the information and comm...
Chapter
Organizations can outsource information systems (IS) at various scales, from a little percentage of services to the whole range of services that they want in which an organization decides to separate the IS-related tasks and outsource them to another organization to produce, based on a defined contract. Different factors affect the organization’s d...
Article
Full-text available
Harnessing big data in organizations today realizes benefits for competitive advantage. Generated profound insights are reflected in informed decision making, creating better business plans, and improved service delivery. Yet, organizations are still not recognizing how mature their big data management capabilities are. However, there is no structu...
Article
Organizations receive several cyberattacks on their daily operations, thus the need for auditing. However, there is no unified tool to perform cybersecurity audit tasks which are expensive and tedious. In this paper, we build a cybersecurity framework to perform cybersecurity auditing process in organizations. It covers several types of threats and...
Article
Full-text available
Each organization faces threats and risks in daily operations. One of the main risks is how to assess the security level to protect from the increasing risks associated with technology evolution. So, organizations can specify the required approaches and skills. In this paper, we propose a security maturity model that classifies the organizations in...
Chapter
Full-text available
In a practical sense, Information Systems (IS) have contributed to the success of most of the institutions. The importance of information systems stems from being the main factor in facilitating decision-making and any subsequent emerging problems. Therefore, it is important to verify their efficiency and accuracy by complying with quality standard...
Conference Paper
Full-text available
Every organization needs to constitute a strong information system (IS) and security management in order to improve its business processes with the best practices. Information system processes must be reviewed and audited by IS auditors. IS auditors use a set of tools and techniques to perform the auditing process on the organizations. In this pape...
Conference Paper
Full-text available
Predicting the failure of agile software projects is a great challenge faced by software companies. This paper focuses on the using of intelligent techniques such as fuzzy logic, multiple linear regressions, support vector machine, neural network to address this challenge. This paper also presents a review of some works related to this area of inte...
Article
revealing the failure of agile software projects is a great challenge faced by software companies. This paper focuses on the using of intelligent techniques such as fuzzy logic, multiple linear regressions, support vector machine, neural network to address this challenge. This paper also presents a review of some works related to this area of inter...
Conference Paper
Full-text available
In a time of growing threats and advancing circumstances, receiving and keeping up a strong cybersecurity profile in the enterprises are crucial. Important data and resources must be protected. Nowadays, cybersecurity became a predominant issue facing most organizations. It is recognized by organizations as an enterprise-wide issue requiring protec...
Article
Full-text available
Many developing countries are now experiencing revolution in e-government to deliver fluent and simple services for their citizens. However, governmental sectors face many challenges in using its e-governments’ services and its infrastructure, improving current services or developing new services; as data and applications increasingly inflating, IT...
Article
Full-text available
A software project encounters many changes during the software development life cycle. The key challenge is to control these changes and manage their impact on the project plan, budget, and implementation schedules. A well-developed change control process should assist the project manager and the responsible team in monitoring these changes.In this...
Article
Full-text available
In all business fields worldwide, the concept of governance is receiving a constantly increasing attention by decision makers as a key means for business success. And, as the vital role of higher education and research institutions is playing in developed and developing countries has become well understood, governance of such institutions emerged a...
Article
A great deal of research has been conducted and numerous software programs have been created around the world in order to monitor events that cause threats. Such efforts had sought to predict possible disastrous events and help minimize their adverse effects on human life and property. The authors have developed a multi-criteria early warning infor...
Article
Full-text available
In the past few years, there has been an increasing awareness of the important role of requirements engineering (RE) in a project's success, in both research and industry. Developing consistent requirements specifications that meet the customers' needs, in traditional development, is likely to be infeasible. For one reason, customers do not usually...
Chapter
This paper highlights the need of many organizations nowadays for early warning information systems (EWIS) that can predict the future and help prevent crises or reduce their negative effects. These EWIS should be based on a reliable and consistent framework. The frameworks currently available are mostly deterministic, simplified or inconsistent in...
Article
Full-text available
Web Applications (WA's) failures may lead to collapse of the institutions, therefore the importance of good quality WA's is increasing over the time. Testing is one of the best quality metrics that decide whether WA's are reliable or not. WA's testing approaches suffer from the lack of proper coverage of WA's functional requirements testing. On the...
Conference Paper
Full-text available
The main concern of this paper is proposing a quality assurance model for Information Systems Projects Management (IS-PM). This paper presents some important concepts related to this field. It presents the phases and activities of IS-PM. This paper presents a set of proposed standards for achieving each activity of planning ISs projects. Depending...
Article
Full-text available
The quality of the development process of an information system (IS) is the main concern of this paper. This paper applies a typical System Development Life Cycle (SDLC), consisting of five main phases: systems planning, systems analysis, systems design, systems implementation, and systems support. A main phase is divided into sub phases, a sub-pha...
Conference Paper
A long-term program is in progress at JPL to reduce cost and risk of flight mission operations through a defect/error prevention program. The goal of this program is the reduction and ultimately the prevention of human errors. The main thrust of this program is to create an environment in which the performance of both the human operator and the com...
Article
The objective of this paper is to explain our approach called “Work Flow Methodology for Analysis and Conceptual Data Base Design of Large Scale Computer Based Information System”. The user fills in, through the different steps of the methodology and in the light of the definition of dynamic adaptive system, a number of forms which relate the topol...
Article
Full-text available
As companies begin to compete in the challenging business environment of the new millennium, an ever-increasing reason for success lies in the function of effective human resource management (HRM). Controlling these resources (physical, organizational, information and human) gives the company the competitive advantage. The main purpose of this pape...

Network

Cited By

Projects

Projects (2)
Project
Goal: This project aims to cover the most important topics related to Software Project Management, such as: - Life cycle of Software projects. - Knowledge areas of Software Project Management. - Tools and Techniques used for Software Project Management. - Success factors of software projects. - Quality Assurance of software projects.