Addressing the Credibility of Web Applications

Author(s):  
Pankaj Kamthan

The Internet, particularly the Web, has opened new vistas for businesses. The ability that anyone, using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial prospective. In retrospect, the fact that almost anyone can set up a Web Application claiming to offer products and services raises the question of credibility from a consumers’ viewpoint. If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the Web as a medium offers. Establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of Web Applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.

Author(s):  
Pankaj Kamthan

In recent years, there has been a steady shift in the nature of Web applications. The vehicle of this transition of Web applications is us, the people. The ability to post photographs or videos, exchange music snippets with peers, and annotate a piece of information, are but a few exemplars of this phenomenon. Indeed, the pseudonym Web 2.0 (O’Reilly, 2005) has been used to describe the apparent “socialization” of the Web. In spite of the significant prospects offered by humancentric Web applications, the mere fact that virtually anyone can set up such applications claiming to sell products and services or upload/post unscrutinized information on a topic as being “definitive,” raises the issues of credibility from a consumers’ viewpoint. Therefore, establishing credibility is essential for an organization’s reputation and for building consumers’ trust. The rest of the article is organized as follows. We first provide the background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of human-centric Web applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


2010 ◽  
pp. 105-112
Author(s):  
Pankaj Kamthan

In recent years, there has been a steady shift in the nature of Web applications. The vehicle of this transition of Web applications is us, the people. The ability to post photographs or videos, exchange music snippets with peers, and annotate a piece of information, are but a few exemplars of this phenomenon. Indeed, the pseudonym Web 2.0 (O’Reilly, 2005) has been used to describe the apparent “socialization” of the Web. In spite of the significant prospects offered by human-centric Web applications, the mere fact that virtually anyone can set up such applications claiming to sell products and services or upload/ post unscrutinized information on a topic as being “definitive,” raises the issues of credibility from a consumers’ viewpoint. Therefore, establishing credibility is essential for an organization’s reputation and for building consumers’ trust. The rest of the article is organized as follows. We first provide the background necessary for later discussion. This is followed by the introduction of a framework within which different types of credibility in the context of human-centric Web applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Priyanka Dixit

This chapter describes how security is an important aspect in today's digital world. Every day technology grows with new advancements in various areas, especially in the development of web-based applications. All most all of the web applications are on the internet, hence there is a large probability of attacks on those applications and threads. This makes security necessary while developing any web application. Lots of techniques have been developed for mitigating and defending against threats to the web based applications over the internet. This chapter overviews the important region of web application security, by sequencing the current strategies into a major picture to further the future research and advancement. Firstly, this chapter explains the major problem and obstacles that makes efforts unsuccessful for developing secure web applications. Next, this chapter distinguishes three basic security properties that a web application should possess: validation, integrity, accuracy and portray the comparing vulnerabilities that damage these properties alongside the assault vectors that contain these vulnerabilities.


Author(s):  
J. Vijaya Sagar Reddy ◽  
G. Ramesh

Web applications are the most widely used software in the internet. When a web application is developed and deployed in the real environment, It is very severe if any bug found by the attacker or the customer or the owner of the web application. It is the very important to do the proper pre-analysis testing before the release. It is very costly thing if the proper testing of web application is not done at the development location and any bug found at the customer location. For web application testing the existing systems such as DART, Cute and EXE are available. These tools generate test cases by executing the web application on concrete user inputs. These tools are best suitable for testing static web sites and are not suitable for dynamic web applications. The existing systems needs user inputs for generating the test cases. It is most difficult thing for the human being to provide dynamic inputs for all the possible cases. This paper presents algorithms and implementation, and an experimental evaluation that revealed HTML Failures, Execution Failures, Includes in PHP Web applications.


2011 ◽  
pp. 232-255
Author(s):  
Roberto Paiano ◽  
Leonardo Mangia ◽  
Vito Perrone

This chapter defines a publishing model for Web applications starting from the analysis of the most well-known modeling methodology, such as HDM, OOHDM, WebML, Conallen’s method and others. The analysis has been focused to verify the state of art about the modeling of Web application pages. In particular, the different types of elements that compose the Web page in the above models are taken into consideration. This chapter describes the evolution of the HDM methodology starting from the first approach based on the definition of a LP concept up to the more structured and complex Conceptual page, based on the influence of “operations” on the modeling of the dynamics of navigation between pages.


2009 ◽  
pp. 372-381 ◽  
Author(s):  
Pankaj Kamthan

Mobile access has opened new vistas for various sectors of society including businesses. The ability that anyone using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial potential. Indeed, the number of mobile applications has seen a tremendous growth in the last few years. In retrospect, the fact that almost anyone can set up a mobile application claiming to offer products and services raises the question of credibility from a consumer’s viewpoint. The obligation of establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the mobile Web as a medium offers. If a mobile application is not seen as credible, we face the inevitable consequence of a product, however functionally superior it might be, rendered socially isolated. The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by introduction of a framework within which different types of credibility in the context of mobile applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


2016 ◽  
Vol 1 (2) ◽  
pp. 46-62
Author(s):  
Taufik Ramadan Firdaus

Currently the Internet became one of the media that can not be separated, as well as a wide variety of applications supplied her. As the development of technologies, reliance on Web applications also increased. However, web applications have a wide range of threats, one of it is a CSRF (Cross-Site Request Forgery). This study uses CSRF (Cross-Site Request Forgery) Protection. CSRF (Cross-Site Request Forgery) Protection is a treatment method that has a variety of ways, one of which uses a token in the session when the user login. Token generated at login will be used as a user id that the system of web applications to identify where the request originated.  The results of this study are expected in order to increase web application defenses against CSRF (Cross-Site Request Forgery), so that web application users will be able to feel safe in using the Internet and its various feature. Reduced level of attacks on web applications. So that visitor traffic on the web application can be increased.


Author(s):  
Pankaj Kamthan

The Internet, particularly the Web, has opened new vistas for many sectors of society, and over the last decade it has played an increasingly integral role in our daily activities of communication, information, and entertainment. This evidently has had an impact on how Web applications are perceived, developed, and managed. The need to manage the size, complexity, and growth of Web applications has led to the discipline of Web engineering (Ginige & Murugesan, 2001). It is known (Kruchten, 2004) that conventional engineering practices cannot be simply mapped to software engineering without the engineer first understanding the nature of the software, and we contend the same applies to Web engineering. This article proposes a systematic approach to identify and elaborate the characteristics that make Web engineering a unique discipline, and considers the implications of these characteristics. The rest of the article is organized as follows. We first outline the background and related work necessary for the discussion that follows, and state our position in that regard. This is followed by a model to uniquely posit the nature of Web applications based on the dimensions of project, people, process, product, and resources. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Panjak Kamthan

Mobile access has opened new vistas for various sectors of society including businesses. The ability that anyone using (virtually) any device could be reached anytime and anywhere presents a tremendous commercial potential. Indeed, the number of mobile applications has seen a tremendous growth in the last few years. In retrospect, the fact that almost anyone can set up a mobile application claiming to offer products and services raises the question of credibility from a consumer’s viewpoint. The obligation of establishing credibility is essential for an organization’s reputation (Gibson, 2002) and for building consumers’ trust (Kamthan, 1999). If not addressed, there is a potential for lost consumer confidence, thus significantly reducing the advantages and opportunities the mobile Web as a medium offers. If a mobile application is not seen as credible, we face the inevitable consequence of a product, however functionally superior it might be, rendered socially isolated. The rest of the article is organized as follows. We first provide the motivational background necessary for later discussion. This is followed by introduction of a framework within which different types of credibility in the context of mobile applications can be systematically addressed and thereby improved. Next, challenges and directions for future research are outlined. Finally, concluding remarks are given.


Author(s):  
Ganeshkumar S ◽  
Elango Govindaraju

The end to end encryption of connections over the internet have evolved from SSL to TLS 1.3 over the years. Attacks have exposed vulnerabilities on each upgraded version of the cryptographic protocols used to secure connections over the internet. Organisations have to keep updating their web based applications to use the latest cryptographic protocol to ensure users are protected and feel comfortable using their web applications. But, the problem is that, web applications are not always standalone systems, there is usually a maze of systems that are integrated to provide services to the end user. The interactions between these systems happens within the controlled internal private network environment of the organisation. While only the front ending web application is visible to the end user. It is not often feasible to upgrade all internal systems to use the latest cryptographic protocol for internal interfaces/integration due to prohibitive cost of redevelopment and upgrades to infra and systems. Here we define an algorithm to setup internal & external firewalls to downgrade to a lower version of the cryptographic protocol (SSL) within the internal network for the integration/interfacing connections of internal systems while mandating the latest cryptographic protocol (TLS 1.x) for end user connections to the web application.


Sign in / Sign up

Export Citation Format

Share Document