An exploratory study on systems development methodologies for web-based applications
نویسندگان
چکیده
Purpose – The purpose of the paper is to investigate the status of systems development methodologies (SDM) usage for developing web-based application in Malaysian organizations. In addition, it also seeks to investigate the use of techniques and tools for web-based application development. Design/methodology/approach – The study employed the use of a cross-sectional survey method with 200 questionnaires sent to information systems managers. A total of 66 usable questionnaires were returned. Findings – The use of SDM that are meant for web-based applications is still very low among Malaysian organizations. The majority of respondents indicated that the SDM being used were adapted on a project basis. Malaysian systems developers were more inclined to use techniques that were much suited for traditional applications. Nevertheless, the use of systems development tools was quite overwhelming. Despite acknowledging the merits of using SDM, respondents also indicated problems associated with their usage. Research limitations/implications – The number of respondents participated in the study was low and furthermore data were collected employing a cross-sectional design instead of longitudinal design. Originality/value – The paper provides empirical evidence regarding the use of SDM, techniques and tools for developing web-based applications.
منابع مشابه
Integrating hypermedia design concepts with a systems analysis and design methodology to develop manufacturing web applications
Many recognize the World Wide Web’s capability to provide a global network and platform for application support of engineering activities. Most manufacturing applications on the web were initially designed for other platforms and ported to the web to take advantage of universal access. Another opportunity provided by the web is for exploratory access to information through the hyperlinks. Howev...
متن کاملA Process Model for Developing Semantic Web Systems
Before the Web era various software development methodologies have been proposed for the development of software applications for different domains. The main objectives of those methodologies were to meet user’s requirements, find out means to suggest a systematic software development and reduce the maintenance cost of the developed software. On the emergence of the Web and to develop the web-b...
متن کاملDesign and Evaluation of a Method for Partitioning and Offloading Web-based Applications in Mobile Systems with Bandwidth Constraints
Computation offloading is known to be among the effective solutions of running heavy applications on smart mobile devices. However, irregular changes of a mobile data rate have direct impacts on code partitioning when offloading is in progress. It is believed that once a rate-adaptive partitioning performed, the replication of such substantial processes due to bandwidth fluctuation can be avoid...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 16 شماره
صفحات -
تاریخ انتشار 2008