Invited speakers

Sadok ben yahia


Abstract : Social bookmarking tools are rapidly emerging on the Web as it can be witnessed by the overwhelming number of participants. Indeed, within the last years, social software on the Web, such as FLICKR, DEL.ICIO.US, IBSONOMY, to cite but a few, has received a tremendous impact with regard to hundreds of millions of users. A key factor to the success of social software tools in the Web is their grass-roots approach to sharing information between a broad community or people (folks) allowing them to browse and to search tags attached to information resources. The result of this collaborative tagging activity in the systems has led to user-generated classifications called folksonomies.
In this talk, we stand at the crossroads of three complementary fields that operate on « folksonomic data », namely Data mining, Information retrieval and Ontology engineering. Thus, we sketch the related works in these fields putting the focus on three applications : (i) mining of triadic concepts and therefore generic triadic concepts; (ii) Ontology building from folksonomies ; and (iii) user querying intention prediction thanks to Hidden Markov Models.

Jérôme Fourmont


Jérôme Fourmont is an Information System (IS) professional. He spent his first 6 years as an IS auditor for Deloitte and for Intermarché companies. Jérôme then managed the MIS Departments for global companies such as Christian Dior Couture, Quiksilver and Clarins Group the next 11 years. As Chief Information Officer (CIO), he defined IS strategy, promoted technologies, monitored programs, projects and IT operations.

Jérôme enjoys sharing and promoting digital best practices, within IT professional associations as Cigref, Agora des DSI, Adira or Afai/Isaca. He's also lecturer and tutor for Paris-Dauphine and Aix-Marseille Universities and Grenoble School of Management.

He started his own business in 2012 as an IT consultant and advise companies taking advantages of last digital initiatives (BYOD, CLOUD, …) and still optimizing their information system thanks to governance, project portfolio & change management, staff & team management, procurement & supplier relationships management, sourcing strategy (nearshore, offshore, …).

Abstract : The Project Plan, a tool to explicit the "How" beyond the "What"

Despite large & long researches on methodologies and CASE tools, project failures are still high ! Requirement specification and project management expertise are statistically the main issues but company hierarchy organization and human psychology are clearly others !

The Project Plan should no longer be considered as a nice-to-have tool mitigating these risks. Expliciting formally the human roles & responsibilities, the accepting process and the audit & control procedures are some of the best practices we will have a look to with this Project Plan tool.

Colette Rolland


Colette Rolland is Professor at the University Paris1 Panthéon-Sorbonne in the Informatics & Mathematics department since 1979 and is also an associated professor at the University of Loughborough, UK. She got her PhD Degree in Sciences and its ‘thèse d’état’ as well at the University of Nancy.
Her research interests lie on topics such as conceptual modelling, methodologies and CASE tools, method engineering & CAME tools, requirements engineering, business process modelling, co-evolution, IS and business alignment and change management. She has been involved in a large number of European research projects and she is used to lead cooperative research projects with companies.
Colette has an extensive experience in supervising PhD theses (110); she published about 350 reviewed papers in Journals and Conferences, has been editor of 25 Conference Proceedings, is member of the board of 10 International Journals and has delivered more than 60 keynote talks in International Conferences.
She is an IFIP officer, IEEE member and received several awards such as IFIP Silver Core, IFIP service Award, Franqui’s Foundation award (Belgium) and European award of ‘Information Systems’. She is Doctor Honoris Causa of the University of Geneva.

Ahmed Seffah


Ahmed Seffah is an affiliated associate professor and researcher at Concordia University and Paris Dauphine. In 2012, his is a distinguished visiting scholar at Almaden IBM. Dr Seffah research is at the crossroads of software engineering and human computer interaction, mainly in the field of human-centered software engineering and usable security systems including human experiences in service and software systems, model-driven engineering, quality in use measures and prediction, design patterns as a way to capture and disseminate design knowledge and best practices. He exploring these concerns in various industry projects related to security service systems for critical infrastructure protection, crisis preparedness and response. The outcomes are to make security systems more accessible and usable while proposing a human-Centric design, engineering and management approach. Dr. Seffah authored and co-edited 5 books and more than 100 publications in refereed journals and conferences. He is involved in different ISO and IEEE initiatives related to security, usability privacy and trust policies and standards. He has been lecturing at various universities in Canada and Europe.

Title : Security Systems has Users: Achieving Security via Usability, Trust and Privacy Patterns as a Tool for Reusing Design Knowledge and Best Practices

Usability and human concerns issues have been the poor parent in IT security research and secure systems engineering. Security experts have largely ignored usability and human factors issues - both because they often failed to recognize their impacts as well as they lacked the expertise to address them. With the current shift to software as a service, Web/cloud services and the Internet of services, there is a growing recognition that security problems can be solved only by building a tradeoff between human factors and security as two intimately related quality attributes. Day-to-day experiences show that most often security vulnerabilities and breaches are due to human errors and usability concerns. Furthermore, the future security service systems will depend heavily on the deployment of technology that can be broadly used by untrained users as they are more and more managing their own services via the Web. There is an academic agreement that we need to design secure systems that people can actually use, learn but less agreement about how to reach this goal in industrial context. We propose an approach that aims first to avoid the current industry practices suggesting that usability and security can be treated by two different teams. The first team is the Human Computer Interaction (HCI) designers responsible of the user interface (the front side of services) design and engineering. Their role is to ensure that the system supports an acceptable level of usability and a user experiences. The second team is the software and the security engineering developers. Their role is to ensure that the system is secure while engineering the integrity and confidentially of the underlying features and data. The objective of this talk is to discuss design patterns as a tool to bridging the systems engineering approaches to security and design methods dealing with HCI/usability concerns. We will model security concerns and attributes such as confidentiality, integrity and availability as design knowledge and as a vehicle for mediating the communication line between HCI and security experts, designers and developers. The proposed patterns and the underlying tool support includes traditional usability/interaction patterns such as efficiency, effectiveness and user/customer satisfaction but also new challenging for privacy, trust and accountability.