scholarly journals Learning From Doing

Author(s):  
Nicole Wang-Trexler ◽  
Martin K-C. Yeh ◽  
William C. Diehl ◽  
Rebecca E. Heiser ◽  
Andrea Gregg ◽  
...  

Software applications in educational technology have been a strong driving force for the success of online learning at all levels. These applications are created for various purposes and are used by a range of experts. The development of a successful educational technology software takes a deliberate team effort and thoughtful project management. This interpretive case study details the processes, successes, and challenges determined throughout the development of an educational web application, the Social Performance Optimization Tool (SPOT). In describing the evolution of SPOT, and the processes the heterogeneous team followed in the development of the web application, this study provides analysis and guidance to educational researchers who are interested in developing educational web applications in the future. The study described how authors mindfully adopted software design models, team management techniques, and communication tools. Additionally, the paper highlights practical and unique implications developers must account for when working in higher education contexts.

2018 ◽  
Vol 13 (1) ◽  
pp. 221
Author(s):  
Festim Halili ◽  
Lirie Koraqi

This paper addresses the security aspects of the software applications in the framework of several entrepreneurship. It has a certain goal and structure, through which it modestly aims to present the security aspect of web applications in Kosovo companies. At first we tried to give some theoretical concepts about security in general and security testing in particular. The key research elaboration of the research problem addresses the security aspect in the sector of companies that develop applications and do their testing, here we will dwell on a case-study case of different companies in Kosovo. The purpose of this section is to argue the importance of security and its application to various companies.


Author(s):  
Tayana Conte ◽  
Verônica T. Vaz ◽  
Jobson Massolar ◽  
Andrew Bott ◽  
Emilia Mendes ◽  
...  

This chapter presents the WDP (Web Design Perspectives-based Usability Evaluation), an inspection technique specifically designed to assess the usability of Web applications. This technique combines Web design perspectives and the heuristic evaluation method proposed by Nielsen (1994b). In addition to describing the components of the WDP technique this chapter also illustrates its use in practice by means of an industrial case study where the technique is applied to inspect a real Web application. In this case study, developers and requirement assessment staff applied the WDP technique to evaluate the usability of modules developed from scratch for a Web application. The results of this case study indicate the feasibility of performing usability inspections with the participation of a software project’s stakeholders, even when stakeholders are not usability experts.


Author(s):  
Hak-Lae Kim ◽  
John G. Breslin ◽  
Stefan Decker ◽  
Hong-Gee Kim

Social tagging has become an essential element for Web 2.0 and the emerging Semantic Web applications. With the rise of Web 2.0, websites that provide content creation and sharing features have become extremely popular. These sites allow users to categorize and browse content using tags (i.e., free-text keyword topics). However, the tagging structures or folksonomies created by users and communities are often interlocked with a particular site and cannot be reused in a different system or by a different client. This chapter presents a model for expressing the structure, features, and relations among tags in different Web 2.0 sites. The model, termed the Social Semantic Cloud of Tags (SCOT), allows for the exchange of semantic tag metadata and reuse of tags in various social software applications.


Author(s):  
Francy D. Rodríguez ◽  
Silvia T. Acuña ◽  
Natalia Juristo

Usability is a software system quality attribute. Although software engineers originally considered usability to be related exclusively to the user interface, it was later found to affect the core functionality of software applications. As of then, proposals for addressing usability at different stages of the software development cycle were researched. The objective of this paper is to present three reusable solutions at detailed design and programming level in order to effectively implement the Abort Operation, Progress Feedback and Preferences usability functionalities in web applications. To do this, an inductive research method was applied. We developed three web applications including the above usability functionalities as case studies. We looked for commonalities across the implementations in order to induce a general solution. The elements common to all three developed applications include: application scenarios, functionalities, responsibilities, classes, methods, attributes and code snippets. The findings were specified as an implementation-oriented design pattern and as programming patterns in three languages. Additional case studies were conducted in order to validate the proposed solution. The independent developers used the patterns to implement different applications for each case study. As a result, we found that solutions specified as patterns can be reused to develop web applications.


From the physical book store to the online bookstore, business owners find a way to meet the demands of their prospective customers. The daily advancement in technology has brought about a huge change the operation of e-commerce. The development of the Progressive Web Applications (PWA) by Google has caused a revolution in mobile development. Using an online bookstore as a case study, this research work presents a PWA architectural framework that can be adopted by any e-commerce applications. This was achieved after a systematic review of existing online bookstore models was carried out – identifying the gaps which will serve as strengths for the proposed model. Also, the emerging technology of PWA was critically reviewed to solidify the proposed model. Adoption of the model will avoid current issues faced the world of mobile development especially code fragmentation. However, exploring the payment gateways and modules will help solidify the model.


Author(s):  
Karan Gupta ◽  
Anita Goel

Tag software is included in web applications to facilitate categorization and classification of information. Generally, freely available tag software is adapted or new code written to incorporate tagging. However, there is an absence of requirement and design document for tagging, even academically. It becomes difficult to know the features that can be included in tag software; also, not all features may be required. This chapter presents a framework for integration of tag software in web applications. The framework has four components corresponding to phases of the software development lifecycle. For requirement, a weighted requirement checklist is presented to ease requirement selection. A metric, software estimation, is defined for quantifying selected requirement. A logical design defined for design phase displays interaction of entities with users. For development, best mechanisms are suggested to web applications. Software engineering artefacts are provided to help during testing. A case study is presented where estimation and design is applied to freely available tag software.


2020 ◽  
Vol 4 (2) ◽  
pp. 63
Author(s):  
Rian Andrian ◽  
Ahmad Fauzi

In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.


Sign in / Sign up

Export Citation Format

Share Document