Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes metho...Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes methods through which secure software development processes can be integrated into the Systems Software Development Life-cycle (SDLC) to improve system quality. Cyber-security and quality assurance are both involved in reducing risk. Software security teams work to reduce security risks, whereas quality assurance teams work to decrease risks to quality. There is a need for clear standards, frameworks, processes, and procedures to be followed by organizations to ensure high-level quality while reducing security risks. This research uses a survey of industry professionals to help identify best practices for developing software with fewer defects from the early stages of the SDLC to improve both the quality and security of software. Results show that there is a need for better security awareness among all members of software development teams.展开更多
A mobile portal is an internet gateway that provides online services primarily accessed via mobiles and other handheld devices. Mobile portals are part of web 3.0 that is starting to revolutionize online services. Suc...A mobile portal is an internet gateway that provides online services primarily accessed via mobiles and other handheld devices. Mobile portals are part of web 3.0 that is starting to revolutionize online services. Such portals can help pastoralists in Kenya access essential information and marketing services online. The aim of the study was to design and implement a mobile portal that will help Kenyan pastoralists improve their yields. The study adopted systems development life cycle (SDLC) methodology to design, implement and test the portal and used structured interviews and observation to collect user requirements. The portal was coded in J2ME, JSP and SQL languages and developed using Java Development Kit (JDK), Sun Wireless Toolkit, Lightweight User Interface Toolkit (LWUIT), Struts, Tomcat and MySQL. The outcome of the study was the mobile portal successfully developed, tested and deployed.展开更多
SMART is the reactor that has been researched for many years by KAERI in order to provide the small-mid scale of power for typically seawater desalination. Now Korea Atomic Energy Research Institute (KAERI) has issued...SMART is the reactor that has been researched for many years by KAERI in order to provide the small-mid scale of power for typically seawater desalination. Now Korea Atomic Energy Research Institute (KAERI) has issued Standard Safety Analysis Report (SSAR) and acquired Standard Design Approval (SDA) for SMART. In order to conduct the design verification and validation for license, the integrated simulation test environment that is composed of 1) the system specific simulation codes formerly developed in the name of Nuclear Plant Analyzer (NPA) including NSSS and BOP simulation, 2) Instructor Station (IS), 3) Supervisory Control and Data Acquisition (SCADA), 4) operator and instructor Human Machine Interface (HMI), and 5) soft-controller has been considered as an important area for operator training and system validation. These sub-components has been designed and implemented for verifying and validating the SMART design and training of operators and for generating the backup data for licensing. This paper introduces the structure of integrated simulation test environment for SMART, explains the efforts to assist system-specific simulation code interface, and also addresses the effort for implementing and optimizing the test environment by maintaining its own simulation functionality and performance in order to review the simulation results efficiently.展开更多
As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform tra...As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.展开更多
Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. Howev...Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.展开更多
Analysis of agricultural production systems of hydroponic tomato in Morelos state of Mexico, through a systematic approach, called systems development of life cycle (SDLC) was performed by comparing this with the me...Analysis of agricultural production systems of hydroponic tomato in Morelos state of Mexico, through a systematic approach, called systems development of life cycle (SDLC) was performed by comparing this with the methodology known as life cycle assessment (LCA). This permits to analyze the differences in approaches of all these methodologies to propose improvements in the current system, which can allow an improved assessment of the environmental quality of agricultural products, which often is subject to confusion. That due to measurement parameters are not generally accepted by society, producers and consumers, may ensure that the process is fully sustainable and is considered quite as a green technology processes towards an ecological benefit and therefore for the humanity.展开更多
Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educa...Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educational software has simplified the processes in greater extend. A implemented while developing such educational software. In particu proper lar, the development methodology has to be software developed to enrich these education processes should follow a development strategy to motivate the end users to utilize the hypermedia potentials. The software development life cycle (SDLC) has different phases in designing such educationa technology and assists the end users to benefit from the modern technology. This study identifies the various factors to be considered at each phase of the SDLC while developing educational software. Also, this study proposes some suggestions to be followed in ESDLC with respect to educational processes perspectives. The core idea of this study is to identify the various issues in implementing such educational software in day to day teaching and learning processes.展开更多
IEEE 1012 [1] describes the SDLC phase activities for software independent verification and validation (IV & V) for nuclear power plant in truly general and conceptual manner, which requires the upward and/or down...IEEE 1012 [1] describes the SDLC phase activities for software independent verification and validation (IV & V) for nuclear power plant in truly general and conceptual manner, which requires the upward and/or downward tailoring on its interpretation for practical IV & V. It contains crucial and encompassing check points and guidelines to analyze the design integrity, without addressing the formalized and the specific criteria for IV & V activities confirming the technical integrity. It is necessary to list up the inspection viewpoint via interpretation of the standard that is practical review points checking design consistency. For fruitful IV & V of Control Element Driving Mechanism Control System (CEDMCS) software for Yonggwang Nuclear Power Plant unit 3 & 4, the specific viewpoints and approach are necessary based on the guidelines of IEEE 1012 to enhance the system quality by considering the level of implementation of the theoretical and the practical IV & V. Additionally IV & V guideline of IEEE 1012 does not specifically provide the concrete measure considering the system characteristics of CEDMCS. This paper provides the seven (7) characteristic criteria for CEDMCS IV & V, and by applying these viewpoints, the design analysis such as function, performance, interface and exception, backward and forward requirement traceability analysis has been conducted. The requirement, design, implementation, and test phase were only considered for IV & V in this project. This article also provides the translation of code to map theoretical verification and validation into practical verification and validation. This paper emphasizes the necessity of the intensive design inspection and walkthrough for requirement phase to resolve the design faults because the IV & V of early phase of SDLC obviously contributes to find out most of critical design inconsistency. Especially for test phase IV & V, it is strongly recommended to prepare the test plan document which is going to be the basis for the test coverage selection and te展开更多
Cybersecurity is a global goal that is central to national security planning in many countries.One of the most active research fields is design of practices for the development of so-called highly secure software as a...Cybersecurity is a global goal that is central to national security planning in many countries.One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats.The use of a secure software product in a real environment enables the reduction of the vulnerability of the system as a whole.It would be logical to find the most optimal solution for the integration of secure coding in the classic SDLC(software development life cycle).This paper aims to suggest practices and tips that should be followed for secure coding,in order to avoid cost and time overruns because of untimely identification of security issues.It presents the implementation of secure coding practices in software development,and showcases several real-world scenarios from different phases of the SDLC,as well as mitigation strategies.The paper covers techniques for SQL injection mitigation,authentication management for staging environments,and access control verification using JSON Web Tokens.展开更多
文摘Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes methods through which secure software development processes can be integrated into the Systems Software Development Life-cycle (SDLC) to improve system quality. Cyber-security and quality assurance are both involved in reducing risk. Software security teams work to reduce security risks, whereas quality assurance teams work to decrease risks to quality. There is a need for clear standards, frameworks, processes, and procedures to be followed by organizations to ensure high-level quality while reducing security risks. This research uses a survey of industry professionals to help identify best practices for developing software with fewer defects from the early stages of the SDLC to improve both the quality and security of software. Results show that there is a need for better security awareness among all members of software development teams.
文摘A mobile portal is an internet gateway that provides online services primarily accessed via mobiles and other handheld devices. Mobile portals are part of web 3.0 that is starting to revolutionize online services. Such portals can help pastoralists in Kenya access essential information and marketing services online. The aim of the study was to design and implement a mobile portal that will help Kenyan pastoralists improve their yields. The study adopted systems development life cycle (SDLC) methodology to design, implement and test the portal and used structured interviews and observation to collect user requirements. The portal was coded in J2ME, JSP and SQL languages and developed using Java Development Kit (JDK), Sun Wireless Toolkit, Lightweight User Interface Toolkit (LWUIT), Struts, Tomcat and MySQL. The outcome of the study was the mobile portal successfully developed, tested and deployed.
文摘SMART is the reactor that has been researched for many years by KAERI in order to provide the small-mid scale of power for typically seawater desalination. Now Korea Atomic Energy Research Institute (KAERI) has issued Standard Safety Analysis Report (SSAR) and acquired Standard Design Approval (SDA) for SMART. In order to conduct the design verification and validation for license, the integrated simulation test environment that is composed of 1) the system specific simulation codes formerly developed in the name of Nuclear Plant Analyzer (NPA) including NSSS and BOP simulation, 2) Instructor Station (IS), 3) Supervisory Control and Data Acquisition (SCADA), 4) operator and instructor Human Machine Interface (HMI), and 5) soft-controller has been considered as an important area for operator training and system validation. These sub-components has been designed and implemented for verifying and validating the SMART design and training of operators and for generating the backup data for licensing. This paper introduces the structure of integrated simulation test environment for SMART, explains the efforts to assist system-specific simulation code interface, and also addresses the effort for implementing and optimizing the test environment by maintaining its own simulation functionality and performance in order to review the simulation results efficiently.
文摘As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment.
文摘Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.
文摘Analysis of agricultural production systems of hydroponic tomato in Morelos state of Mexico, through a systematic approach, called systems development of life cycle (SDLC) was performed by comparing this with the methodology known as life cycle assessment (LCA). This permits to analyze the differences in approaches of all these methodologies to propose improvements in the current system, which can allow an improved assessment of the environmental quality of agricultural products, which often is subject to confusion. That due to measurement parameters are not generally accepted by society, producers and consumers, may ensure that the process is fully sustainable and is considered quite as a green technology processes towards an ecological benefit and therefore for the humanity.
文摘Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educational software has simplified the processes in greater extend. A implemented while developing such educational software. In particu proper lar, the development methodology has to be software developed to enrich these education processes should follow a development strategy to motivate the end users to utilize the hypermedia potentials. The software development life cycle (SDLC) has different phases in designing such educationa technology and assists the end users to benefit from the modern technology. This study identifies the various factors to be considered at each phase of the SDLC while developing educational software. Also, this study proposes some suggestions to be followed in ESDLC with respect to educational processes perspectives. The core idea of this study is to identify the various issues in implementing such educational software in day to day teaching and learning processes.
文摘IEEE 1012 [1] describes the SDLC phase activities for software independent verification and validation (IV & V) for nuclear power plant in truly general and conceptual manner, which requires the upward and/or downward tailoring on its interpretation for practical IV & V. It contains crucial and encompassing check points and guidelines to analyze the design integrity, without addressing the formalized and the specific criteria for IV & V activities confirming the technical integrity. It is necessary to list up the inspection viewpoint via interpretation of the standard that is practical review points checking design consistency. For fruitful IV & V of Control Element Driving Mechanism Control System (CEDMCS) software for Yonggwang Nuclear Power Plant unit 3 & 4, the specific viewpoints and approach are necessary based on the guidelines of IEEE 1012 to enhance the system quality by considering the level of implementation of the theoretical and the practical IV & V. Additionally IV & V guideline of IEEE 1012 does not specifically provide the concrete measure considering the system characteristics of CEDMCS. This paper provides the seven (7) characteristic criteria for CEDMCS IV & V, and by applying these viewpoints, the design analysis such as function, performance, interface and exception, backward and forward requirement traceability analysis has been conducted. The requirement, design, implementation, and test phase were only considered for IV & V in this project. This article also provides the translation of code to map theoretical verification and validation into practical verification and validation. This paper emphasizes the necessity of the intensive design inspection and walkthrough for requirement phase to resolve the design faults because the IV & V of early phase of SDLC obviously contributes to find out most of critical design inconsistency. Especially for test phase IV & V, it is strongly recommended to prepare the test plan document which is going to be the basis for the test coverage selection and te
文摘Cybersecurity is a global goal that is central to national security planning in many countries.One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats.The use of a secure software product in a real environment enables the reduction of the vulnerability of the system as a whole.It would be logical to find the most optimal solution for the integration of secure coding in the classic SDLC(software development life cycle).This paper aims to suggest practices and tips that should be followed for secure coding,in order to avoid cost and time overruns because of untimely identification of security issues.It presents the implementation of secure coding practices in software development,and showcases several real-world scenarios from different phases of the SDLC,as well as mitigation strategies.The paper covers techniques for SQL injection mitigation,authentication management for staging environments,and access control verification using JSON Web Tokens.