scholarly journals The Requirements of Methodologies for Developing Web Applications

2005 ◽  
pp. 261-280 ◽  
Author(s):  
Craig Standing

The Internet has had a significant impact on the process of developing information systems. However, there has been little research that has examined specifically the role of development methodologies in this new era. Although there are many new forces driving systems development many other issues are extensions of problems that have been there for some years. This study identifies the main requirements of methodologies for developing e-commerce applications. A number of e-commerce application development approaches are examined and a methodology is proposed which attempts to address a number of issues identified within the literature. The Internet Commerce Development Methodology (ICDM) considers evolutionary development of systems, provides a business and strategic focus and includes a management structure in addition to covering the engineering aspects of e-commerce application development. The methodology is evaluated by three focus groups. The results of the evaluations are used to highlight the factors that practitioners identify as important attributes of systems development methodologies for developing Web applications. These include emphasising a business focus, the consideration of organisational culture and management structures, and the importance of an external focus. Practitioners would ideally like methodologies to be relevant to their industry and provide detailed approaches for changing organisational culture. Many traditional systems development methodologies are perceived as being inadequate for dealing with the development of e-commerce systems. The research work proposes that there is a need for an overarching development framework where other more sub-system specific approaches can be integrated. However, any such framework should consider the strategic business drivers of the system, the evolutionary nature of systems, effective management structures, and the development of a conducive organisational culture.

Author(s):  
Alberto Cardoso ◽  
Maria Teresa Restivo ◽  
Hélia Guerra ◽  
Luís Brito Palma

The Internet of Everything is an interdisciplinary concept that involves technology, applications and people in a framework where emerging technologies can give a relevant contribute in education and in different application areas, namely in the scope of the interactive mobile technologies. This Special Issue collects a set of contributions to this topic resulting from the works presented in the Experiment@ International Workshop 2016 “The Emerging Technologies on the Internet of Everything” – ETIoE’16, held at University of the Azores (Ponta Delgada, Azores, Portugal). These articles comprise different perspectives in this field from research work and application development to case studies.


2017 ◽  
Vol 104 ◽  
pp. 1-16 ◽  
Author(s):  
Carlos Kamienski ◽  
Marc Jentsch ◽  
Markus Eisenhauer ◽  
Jussi Kiljander ◽  
Enrico Ferrera ◽  
...  

Web Applications are commonly using all the services made available online. The rapid development of the Internet of Things (IOT), all the organizations provides their services and controlled through an online, like online transaction of money, business transaction of buying and selling the products, healthcare services, military and GPS Systems. Web application development and maintenance is very difficult based on the security. Attacks are many forms to stealing the secure, personal information and privacy data. There is one major open source community Open Web Application Security Project (OWASP) providing information, development and validation of web application projects to make application to be secure. This research work, discussing few of the solutions, detection and prevention methods of Injection risk out of the top 10 OWASP risks. Due to the injection risk, impact on business that may lead to loss of information, unauthorized access of personal and secure information.


Author(s):  
M. E. Raimov ◽  
A. K. Mukasheva ◽  
G. B. Isayeva ◽  
K. Nuralbay

The rapid development of the Internet has brought with it both positive and negative aspects. Every year, there are more and more people and methods that want to steal information and disrupt the work of the resource, to carry out other similar actions. In this regard, the issue of site resistance to various attacks becomes particularly relevant, that is, it leads to the emergence of a large number of projects that help web application developers to improve the reliability of their products. In fact, actions such as testing and polling a website, searching for web applications, allow you to determine as a good warning measure the shortcomings of application development and closed testing show that, in this way, it is possible to determine whether an application is resistant to information security.


This article describes a quantitative research carried out with students from an academic institution in the city of Manaus-AM. Starting from the hypothesis of the time that students are waiting in a queue at a secretariat. Bearing in mind that in the present times the Information Technology is in an increasing evolution, where the mobile means of communication such as smartphones and the internet connection are extremely accessible by the population, thinking about this scope and the solution of this problem that is common to society in general. We intend to analyze the following question: the need to be in person in electronic queues and through this analysis to develop an application for the management of academic queues. To make this possible, we conducted a research through a tool called Justin mind, taking into account its easy handling for creating prototypes of web applications and mobile devices. The research is based on answering the following questions: regarding the application's proposal; what is the main problem faced by the participants when they arrive at an establishment, in relation to the time that the participants usually spend in line, regarding the use of the application in the academic environment, in relation to the desire to perform other activities while waiting in line. To check the feasibility of the application, the Google Forms platform was used, with the objective of knowing the public's opinion regarding the application's proposal and asking some questions directed to the needs that the application intends to solve. Taking into account all the data analyzed during the research. The application to be developed aims to allow the monitoring of the queue by the user through his mobile device. That way he does not necessarily need to be in the queue so he can carry out other activities, but always following the progress of the queue.


2006 ◽  
Vol 11 (2) ◽  
pp. 125-129 ◽  
Author(s):  
ÉVELYNE GAYOU

Portraits polychromes are a series of books associated with multimedia documents presented on the Internet site of the GRM since 2001. In releasing this collection, our primary concern was to increase awareness of the electroacoustic repertoire and the reserves in the GRM archives. The GRM, being a pioneering centre of electroacoustics, is fortunate to possess a consistent and significant reserve dating back to the beginning of the 1950s. At present, the catalogue contains around 2,000 works, accompanied with supplementary documents: composer's biographies, reviews, photographs, documentary movies, radio broadcasts, recorded public lectures, theoretical research work, transcriptions and analyses. In addition to the heritage value of the GRM's collection, the enterprise of the Portraits polychromes, with the aid of multimedia tools, aims to advance the progress of research on analysis and the transcription of musical works.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Mohammad Rashed Iqbal Faruque ◽  
Air Mohammad Siddiky ◽  
Eistiak Ahamed ◽  
Mohammad Tariqul Islam ◽  
Sabirin Abdullah

AbstractThe electromagnetic properties of the metal based dielectric in the field of millimeter and sub-millimeter technology attracts a new era for innovation. In this research work, we have introduced a parallel LC shaped metamaterial resonator with wider bandwidth. The negative refractive index for two resonant frequencies is located from the negative permittivity from 5.1 to 6.3, 10.4 to 12.9 GHz, where the negative refractive index is located from 5.4 to 6.3 and 10.5 to 13.5 GHz. The electromagnetic wave polarizing in the proposed structure with parallel LC shaped metallic structure shows a fascinating response of wider bandwidth for the external electric and magnetic field. This paper focuses on the design of conducting layer for the suggested design with the parallel metallic arm for analysing the mutual coupling effect of the scattering response where the sub-branch in metallic design is shown more resonant frequencies with the enhancement of the compactness. This proposed structure is analysed with different metallic arrangements and array structures for different boundary conditions.


2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.


Sign in / Sign up

Export Citation Format

Share Document