The role of developers’ social relationships in improving service selection

2016 ◽  
Vol 12 (4) ◽  
pp. 477-503 ◽  
Author(s):  
Devis Bianchini ◽  
Valeria De Antonellis ◽  
Michele Melchiori

Purpose Modern Enterprise Web Application development can exploit third-party software components, both internal and external to the enterprise, that provide access to huge and valuable data sets, tested by millions of users and often available as Web application programming interfaces (APIs). In this context, the developers have to select the right data services and might rely, to this purpose, on advanced techniques, based on functional and non-functional data service descriptive features. This paper focuses on this selection task where data service selection may be difficult because the developer has no control on services, and source reputation could be only partially known. Design/methodology/approach The proposed framework and methodology are apt to provide advanced search and ranking techniques by considering: lightweight data service descriptions, in terms of (semantic) tags and technical aspects; previously developed aggregations of data services, to use in the selection process of a service the past experiences with the services when used in similar applications; social relationships between developers (social network) and their credibility evaluations. This paper also discusses some experimental results regarding the plan to expand other experiments to check how developers feel using the approach. Findings In this paper, a data service selection framework that extends and specializes an existing one for Web APIs selection is presented. The revised multi-layered model for data services is discussed and proper metrics relying on it, meant for supporting the selection of data services in a context of Web application design, are introduced. Model and metrics take into account the network of social relationships between developers, to exploit them for estimating the importance that a developer assigns to other developers’ experience. Originality/value This research, with respect to the state of the art, focuses attention on developers’ social networks in an enterprise context, integrating the developers’ credibility assessment and implementing the social network-based data service selection on top of a rich framework based on a multi-perspective model for data services.

2019 ◽  
Vol 24 (1) ◽  
pp. 61-71
Author(s):  
Angana Debnath ◽  
Piyal Basu Roy

Purpose Alienation and isolation is an off-seen social aspect of gerontological crises. The purpose of this paper is to focus on the social isolation and loneliness of older people that emerge from inadequate integration with the social network, coupled with increasing social chasm between the aged and the young. The sample population is Cooch Behar municipal town, West Bengal, India. Design/methodology/approach To conduct the study, data have been collected through a questionnaire followed by purposive random sampling and analyzed with the help of loneliness scale and correlated variables. Findings The study reveals that marital status, social network, social class and health are some of the parameters that influence the level of social isolation and loneliness among the older people. Originality/value The result highlights the importance of social relationships and interaction on the ageing process.


2014 ◽  
Vol 43 (3) ◽  
pp. 330-349 ◽  
Author(s):  
Kaisa Henttonen ◽  
Jan-Erik Johanson ◽  
Minna Janhonen

Purpose – The focus in this paper is on the extent to which bonding and bridging social relationships predict the performance effectiveness and attitudinal (identity) outcomes. Design/methodology/approach – The research was survey-based, involving 76 work teams and a total of 499 employees in 48 organisations. Findings – The analysis reveals a positive relationship between both bonding and bridging relationships and performance effectiveness and attitudinal outcomes. Team identity mediates the relationship between the team ' s social-network structure and its performance effectiveness. Research limitations/implications – The research investigates the performance effectiveness and attitudinal outcomes of social networks simultaneously, which is rare, but for study-design reasons fails to investigate behavioural outcomes. More extensive data would reveal more about the possible interaction between bridging and bonding. Practical implications – In order to improve performance effectiveness managerial attention should focus on building a team and social networks. Originality/value – The research shows that team identity fully mediates the influence of bonding and bridging social relationships. This finding sheds light on the processes that mediate performance effectiveness, which in turn facilitate understanding of how team dynamics lead to differing performance levels. The results also reveal how the type of social network affects the creation of a team identity: individuals identify with the team through the social networks to which they belong both within it and outside. Thus, team identity matters given the evidence suggesting that those who identify more with their work teams perform more effectively.


2017 ◽  
Vol 13 (2) ◽  
pp. 114-139
Author(s):  
Saqib Ali ◽  
Taiseera AlBalushi ◽  
Ali AlBadi

Purpose The purpose of this research is to facilitate the full potential of the web for the people with disabilities. People with disabilities may fail to make full use of the potentials offered by the web even if they have the right hardware (computer and assistive technologies) as well as access to the internet because of the lack of accessibility. Design/methodology/approach This research outlines the guidelines that provide the foundation for building an accessibility-aware framework approach, where people with disabilities can access most of the electronic contents based on their disability levels. Findings The framework helps web engineers in developing accessible web pages for all types of users. Disability profile examples (blindness, low vision, deafness and hard of hearing) were taken to determine the performance of the framework approach. Research limitations/implications The validation and testing was carried out on the Sultan Qaboos University website. The framework approach could be further validated by performing the tests on various other public and private websites. Practical implications The guidelines can be used as a road map to overcome accessibility challenges during any web application development life cycle. A proper testing and evaluation is carried out on the framework to test its usability. Social implications Although people with disabilities are perhaps the segment of society which are expected to gain the most from these technologies, they are facing barriers to access the contents of the web because of the way it is presented. This proposed framework could assist all the people with the disability of blindness and hearing impairment to have a better experience with the internet, making the technology more beneficial and usable to them. In the future, this approach can be extended for the people with other disabilities. Originality/value This research provides a pioneering concept for accessibility-aware framework approach. This approach could be utilized for developing accessible web applications and electronic services for people with disabilities. The proposed framework can be used as a road map to overcome accessibility challenges during any web application development life cycle.


2015 ◽  
Vol 23 (1) ◽  
pp. 73-101 ◽  
Author(s):  
Eugene Ferry ◽  
John O Raw ◽  
Kevin Curran

Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly. Design/methodology/approach – To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data. Findings – Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices. Originality/value – OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.


Author(s):  
Matthias Kiese ◽  
Julian Kahl

Purpose This paper aims to examine a cluster-based strategy implemented in the German federal state of North Rhine-Westphalia under the 2007-2013 “Regional Competitiveness and Employment” programme. Departing from traditional discretionary approaches, a substantial share of the funds was now allocated on a competitive basis. The authors analyse the resulting distribution of funds across stakeholders and sub-regions and try to assess the pros and cons of this process, which constitutes a novel delivery system for cluster policies. Design/methodology/approach Following a literature review, the paper applies two sets of regression models to explain the distribution of funds under the new policy delivery system. Interviews with stakeholders provide evidence on the efficacy and efficiency of the competitive funding process. Findings The changes introduced in the 2007-2013 funding period benefit universities and research organisations, as well as intermediary organisations, whereas the private sector and especially small firms capture a rather small piece of the pie. Contrary to the “innovation paradox” hypothesis, structurally weak sub-regions did not lose out in state-wide funding contests. The presence of universities with an overall high volume of third-party funding is the key variable explaining the spatial distribution of funds. This interview evidence identifies the duration of the selection process and its administrative complexity as main weaknesses, which the authors attribute to bureaucratic rationality on different levels. Originality/value This is the first analysis of a competitive funding scheme at the sub-national level, using the German federal state of North Rhine-Westphalia as a case study. It sheds light on the mechanisms of funding allocation in the 2007-2013 funding period of the European Union’s cohesion policy, which was reoriented towards supporting regional competitiveness and employment in response to the Lisbon Agenda. While competitive funding is still seen as mobilising regional stakeholders and improving the quality of projects and the selection process, these findings highlight administrative complexity as a main deficiency, which has partly been addressed in the 2014-2020 funding period.


2015 ◽  
Vol 33 (3) ◽  
pp. 417-449 ◽  
Author(s):  
Li Si ◽  
Wenming Xing ◽  
Xiaozhe Zhuang ◽  
Xiaoqin Hua ◽  
Limei Zhou

Purpose – This paper aims to find the current situation of research data services by academic libraries and summarize some strategies for university libraries to reference. Recent years have seen an increasing number of university libraries extended their traditional roles and provided research data services. Design/methodology/approach – This paper selected 87 libraries of the top 100 universities listed in the World’s Best Universities released by the USA News in October 2012 as samples and conducted a Web site investigation to check if there were any research data services provided. In addition, it made an interview with the Wuhan University Library’s Research Data Service Workgroup to understand the procedure, difficulties and experiences of their research data service. Based on the survey and interview, it analyzed the current status and difficulties of research data services in university libraries and proposed some strategies for others to reference. Findings – Of the 87 university libraries investigated, 50 libraries have offered research data services. Most of the services can be divided into six aspects: research data introduction, data management guideline, data curation and storage service, data management training, data management reference and resource recommendation. Among these services, research data introduction is the most frequently provided (47.13 per cent), followed by data curation and storage services (43.68 per cent), data management guideline (42.53 per cent), data management reference (41.38 per cent), resource recommendation (41.38 per cent) and data management training (24.14 per cent). The difficulties met by research data service of Chinese academic libraries are also concluded. Originality/value – Through Web site investigation and interview with the Wuhan University Library’s Research Data Service, this paper presented an overall picture of research data services in university libraries and identified the difficulties and experiences of research data services of the Wuhan University Library. Based on some successful examples, it put forward some strategies for university libraries to reference. This study is very useful for academic libraries to promote their research data services.


2015 ◽  
Vol 53 (1) ◽  
pp. 8-39 ◽  
Author(s):  
Nienke M. Moolenaar ◽  
Peter J. C. Sleegers

Purpose – While in everyday practice, school leaders are often involved in social relationships with a variety of stakeholders both within and outside their own schools, studies on school leaders’ networks often focus either on networks within or outside schools. The purpose of this paper is to investigate the extent to which principals occupy similar positions in their school’s network and the larger district network. In addition, the authors examined whether principals’ centrality in both networks can be attributed to demographic characteristics and transformational leadership (TL). Design/methodology/approach – Using social network analysis, correlational and regression analysis, and an advanced social network technique, namely p2 modeling, the authors analyzed data collected among 708 educators in 46 Dutch elementary schools. The authors also offer a visualization of the district social network to explore principals’ relationships with other principals in the district. Findings – Results suggest that principals who occupy a central position in their school’s advice network are also more likely to occupy a central position in their district’s collaborative leadership network. Moreover, TL was found to affect the extent to which principals are central in both networks. Originality/value – The study is unique as it simultaneously explores principals’ social relationships in schools and the larger district. Moreover, the authors advance the knowledge of TL as a possible mechanism that may shape the pattern of these relationships, thereby connecting two streams of literature that were until now largely disconnected. Limitations to the study warrant further qualitative and longitudinal research on principals’ social relationships in schools, districts, and the larger community.


2017 ◽  
Vol 24 (6) ◽  
pp. 1597-1648 ◽  
Author(s):  
Balkrishna Eknath Narkhede ◽  
Rakesh Raut ◽  
Bhaskar Gardas ◽  
Huynh Trung Luong ◽  
Manoj Jha

Purpose The concept of third-party logistics service provider (3PLSP) has been considered as an essential organizational philosophy to achieve profits. The purpose of this paper is to analyze and examine the contextual relationship among the critical success factors (CSF) of 3PLSPs practices in the cement manufacturing industry. Design/methodology/approach In this paper, the total 20 critical selection criteria with nine processes for the 3PLSPs, of an Indian cement manufacturing industry have been identified through an exhaustive literature review and opinions of the experts i.e. academics and industries. Interpretive ranking process (IRP) methodology has been presented to find out the rankings of the individual criteria and the mutual influence in the selection process. Findings The proposed model establishes the dominance of relationship among identified criteria, which plays a vital role in the 3PLSPs selection process which are experience in similar product, quality of management, information technology capacity, flexibility in operation and delivery, compatibility with the users. Research limitations/implications An empirical research approach has not been used to collect primary data to rank different criteria for effective 3PLSPs implementation in the Industry. In this paper, an example of Indian cement industry is presented to show the real world applicability of the proposed model. Originality/value This model would help a decision maker to decide the issues related to a selection of 3PLSPs. The third party service provider comprises the use of external companies who controls and delivers logistic activities. The paper discusses very practical issues in an analytical manner, using the case base method.


2011 ◽  
Vol 32 (3) ◽  
pp. 161-169 ◽  
Author(s):  
Thomas V. Pollet ◽  
Sam G. B. Roberts ◽  
Robin I. M. Dunbar

Previous studies showed that extraversion influences social network size. However, it is unclear how extraversion affects the size of different layers of the network, and how extraversion relates to the emotional intensity of social relationships. We examined the relationships between extraversion, network size, and emotional closeness for 117 individuals. The results demonstrated that extraverts had larger networks at every layer (support clique, sympathy group, outer layer). The results were robust and were not attributable to potential confounds such as sex, though they were modest in size (raw correlations between extraversion and size of network layer, .20 < r < .23). However, extraverts were not emotionally closer to individuals in their network, even after controlling for network size. These results highlight the importance of considering not just social network size in relation to personality, but also the quality of relationships with network members.


2020 ◽  
Author(s):  
Darshak Mota ◽  
Neel Zadafiya ◽  
Jinan Fiaidhi

Java Spring is an application development framework for enterprise Java. It is an open source platform which is used to develop robust Java application easily. Spring can also be performed using MVC structure. The MVC architecture is based on Model View and Controller techniques, where the project structure or code is divided into three parts or sections which helps to categorize the code files and other files in an organized form. Model, View and Controller code are interrelated and often passes and fetches information from each other without having to put all code in a single file which can make testing the program easy. Testing the application while and after development is an integral part of the Software Development Life Cycle (SDLC). Different techniques have been used to test the web application which is developed using Java Spring MVC architecture. And compares the results among all the three different techniques used to test the web application.


Sign in / Sign up

Export Citation Format

Share Document