You are previewing Software Development Techniques for Constructive Information Systems Design.
O'Reilly logo
Software Development Techniques for Constructive Information Systems Design

Book Description

Software development and information systems design have a unique relationship, but are often discussed and studied independently. However, meticulous software development is vital for the success of an information system. Software Development Techniques for Constructive Information Systems Design focuses the aspects of information systems and software development as a merging process. This reference source pays special attention to the emerging research, trends, and experiences in this area which is bound to enhance the reader’s understanding of the growing and ever-adapting field. Academics, researchers, students, and working professionals in this field will benefit from this publication’s unique perspective.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Dedication
  6. Preface
    1. INTRODUCTION
    2. ORGANIZATION OF BOOK
  7. Section 1: Software Development Methodologies and Techniques
    1. Chapter 1: Determining the Requirements for E-Selection in a Small Recruitment Company
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL BACKGROUND
      4. PROBLEM DEFINITION: RESULTS OF THE INTERVIEWS
      5. ANALYSIS AND DIAGNOSIS
      6. ADVANCED PRIORITIZING
      7. PLAN OF ACTION (DESIGN)
      8. DISCUSSION
      9. RECOMMENDATIONS
    2. Chapter 2: A Constructive Approach for Conceptual Database Design
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. APPROACH
      5. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    3. Chapter 3: A Survey on Secure Software Development Lifecycles
      1. ABSTRACT
      2. INTRODUCTION
      3. SOFTWARE DEVELOPMENT AND SECURITY
      4. OWASP COMPREHENSIVE, LIGHTWEIGHT APPLICATION SECURITY PROCESS (CLASP)
      5. MICROSOFT SECURE DEVELOPMENT LIFECYCLE
      6. SOFTWARE SECURITY TOUCHPOINTS
      7. INITIATIVES ON BUILDING AND MAINTAINING A SECURE SOFTWARE PRODUCT
      8. COMPARING THE SECURITY DEVELOPMENT PROPOSALS
      9. CONCLUSION
    4. Chapter 4: Quality Practices for Managing Software Development in Information System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    5. Chapter 5: Project Management and Diagramming Software
      1. ABSTRACT
      2. INTRODUCTION
      3. PROJECT MANAGEMENT SOFTWARE
      4. DIAGRAMMING SOFTWARE
      5. CONCLUSION
    6. Chapter 6: Software Development Methodologies for Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. CLOUD COMPUTING
      4. SOFTWARE DEVELOPMENT MODELS
      5. SOFTWARE DEVELOPMENT PROJECTS: MODELS AND APPROACHES
      6. SOFTWARE DEVELOPMENT IN CLOUD COMPUTING PROJECTS
      7. CONCLUSION
    7. Chapter 7: Information System and System Development Life Cycle
      1. ABSTRACT
      2. INTRODUCTION
      3. SYSTEMS DEVELOPMENT LIFE-CYCLE
      4. SYSTEM ANALYST
      5. CONCLUSION
    8. Chapter 8: Towards a Theoretical “Cybernetic” Framework
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL UNDERPINNINGS
      4. CONSTRUCTIVE DIMENSIONS FOR AN EFFECTIVE COLLABORATIVE LEARNING PROCESS
      5. THE POLYMORPHIC DIMENSION OF CONTEMPORARY LEARNING THEORIES
      6. THE REFORMATIVE ROLE OF [D-] CSCL IN REORGANIZATION AND STRENGTHENING OF KNOWLEDGE
      7. VIRTUAL ENVIRONMENTS AND COLLABORATIVE E-LEARNING
      8. CATEGORIES OF 3D VR SYSTEMS
      9. COMMON FEATURES
      10. ENVIRONMENTAL FACTORS INFLUENCING THE CHOICE
      11. A NEW REVELATION FOR KNOWLEDGE TRANSFORMATION
      12. SECOND LIFE
      13. USING SECOND LIFE FOR E-LEARNING ACTIVITIES
      14. QUALITATIVE AND FUNCTIONAL TECHNICAL CHARACTERISTICS
      15. PROBLEM STRUCTURING
      16. OUTLINE SCOPE AND MAIN PURPOSE
      17. CYBERNETIC E-EDUCATION
      18. PEDAGOGICAL DESIGN IMPLEMENTATION IN ACCORDANCE WITH THE SYSTEMIC APPROACH
      19. EFFICIENT OPERATION FACTORS TO SUPPORT SUSTAINABLE [D] -CSCL AUTHENTIC SCENARIOS THROUGH VIRTUAL WORLDS
      20. DESIGNING A “CYBERNETIC” MODEL (THEORETICAL-ACADEMIC PART)
      21. CONSTRUCTING THE FRAMEWORK (PRACTICAL-TEACHING PART)
      22. PROJECT DESIGN
      23. REQUIREMENTS ANALYSIS
      24. A “CYBERNETIC” PEDAGOGICAL APPROACH FOR MANAGING LEARNING ACTIVITIES IN SECOND LIFE
      25. CONCLUDING REMARKS
      26. STRUCTURAL ELEMENTS FOR FUNCTIONAL FEATURES TO TEST DRIVEN-DEVELOPMENT WORKS IN THE FUTURE
    9. Chapter 9: Information Systems and Software Development
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CASE: COMPUTER AIDED SOFTWARE ENGINEERING
      5. CONCLUSION
      6. APPENDIX
    10. Chapter 10: Toward Agile Interactive Software Development Process Models for Crowd Source Projects
      1. ABSTRACT
      2. INTRODUCTION
      3. 1. SOFTWARE PROCESS AND PROJECT MODELS
      4. 2. EVOLUTION OF SOFTWARE PROCESS ORIENTED MODELS
      5. 3. UNTRADITIONAL SOFTWARE DEVELOPMENT PROCESSES
      6. 4. SOFTWARE EVOLUTIONARY MODELS
      7. CONCLUSION
    11. Chapter 11: Software Development Techniques for Constructive Information Systems
      1. ABSTRACT
      2. 1.0 INTRODUCTION
      3. 2.0 BACKGROUND
      4. 3.0 SOFTWARE DEVELOPMENT
      5. 4.0 PARTICIPANTS IN SYSTEMS DEVELOPMENT PROCESS
      6. CONCLUSION
      7. FUTURE RESEARCH DIRECTIONS
  8. Section 2: Advanced Topics in Software Engineering
    1. Chapter 12: Software Security Engineering – Part I
      1. ABSTRACT
      2. INTRODUCTION
      3. ASPECTS OF SOFTWARE SECURITY
      4. SOFTWARE SECURITY ENGINEERING
      5. SECURITY RISK ANALYSIS
      6. THREATS MODELING
      7. CONCLUSION
    2. Chapter 13: Software Security Engineering – Part II
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCTION TO SECURITY POLICY
      4. ACCESS CONTROL
      5. CONSTRUCTION OF SECURE SOFTWARE
      6. SECURITY ASSESSMENT
      7. CONCLUSION
    3. Chapter 14: A Comparative Analysis of Software Engineering Approaches for Sequence Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. A BRIEF DISCUSSION OF RESEARCH OVER SEQUENCE ANALYSIS
      4. SEQUENCE ANALYSIS TOOLS
      5. BASIC METHODOLOGIES
      6. PROTEIN STRUCTURAL AND FUNCTIONAL RESEARCH
      7. RESEACH FOCUS FOR SEQUENCE ANALYSIS
      8. WHY SEQUENCE ANALYSIS?
      9. CONCLUSION
    4. Chapter 15: Development of Enterprise Content Management Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED ECM LITERATURE REVIEW
      4. RELATED LITERATURE REVIEW OF SYSTEMS DEVELOPMENT APPROACHES
      5. THE PROPOSED FRAMEWORK
      6. CASE STUDY
      7. CONCLUSION
    5. Chapter 16: Fault Tree Analysis (FTA) via Binary Diagram Decision (BDD) for Information Systems Design
      1. ABSTRACT
      2. INTRODUCTION
      3. BINARY DIAGRAM DECISIONS
      4. RANKING FOR THE EVENTS
      5. CASE STUDY
      6. CONCLUSION
    6. Chapter 17: Developing Semantic Web Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ENGINEERING SEMANTIC WEB APPLICATIONS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    7. Chapter 18: Knowledge Management
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. DEFINITION OF KNOWLEDGE
      6. TACIT AND EXPLICIT KNOWLEDGE
      7. THE FOUR KNOWS CONCEPT
      8. TRANSFORMATION OF TACIT KNOWLEDGE INTO EXPLICIT KNOWLEDGE
      9. NEED FOR TRANSFORMATION OF TACIT KNOWLEDGE INTO EXPLICIT KNOWLEDGE
      10. KNOWLEDGE MANAGEMENT IN ICT PERSPECTIVE
      11. KNOWLEDGE MANAGEMENT
      12. PROCEDURAL KNOWLEDGE
      13. PROCEDURAL KNOWLEDGE IN CLASSROOM
      14. DECLARATIVE KNOWLEDGE
      15. ARTIFICIAL INTELLIGENCE
      16. DISPERSED KNOWLEDGE
      17. SITUATED KNOWLEDGE
      18. CONCLUSION
    8. Chapter 19: A Software Engineering Approach for Access Control to Multi-Level-Security Documents
      1. ABSTRACT
      2. INTRODUCTION
      3. TEXT COMPARASION METHODOLOGIES
      4. THE PROPOSED APPROACH
      5. CONCLUSION
    9. Chapter 20: Trends in Information Security
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INFORMATION SECURITY AND COLLABORATION ACROSS BOUNDARIES
      5. INFORMATION SECURITY – BUSINESS ORIENTATION
      6. INFORMATION SECURITY AND CLOUD COMPUTING
      7. INFORMATION SECURITY - STANDARDS & REGULATIONS LANDSCAPE
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    10. Chapter 21: Constructive Knowledge Management Model and Information Retrieval Methods for Software Engineering
      1. ABSTRACT
      2. 1. KNOWLEDGE MANAGEMENT
      3. 2. INFORMATION RETRIEVAL
      4. 3. CONCLUSION
    11. Chapter 22: Modeling Transparency in Software Systems for Distributed Work Groups
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TRANSPARENCY
      4. 3 IMPLEMENTING TRANSPARENCY IN A WORK GROUP
      5. 4 CONCLUSION
    12. Chapter 23: Ontology Augmented Software Engineering
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ONTOLOGIES IN SOFTWARE ENGINEERING
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  9. Compilation of References
  10. About the Contributors