Search results

1 – 10 of over 57000
Article
Publication date: 12 June 2019

B. Preedip Balaji, Vinay M.S., Shalini B.G. and Mohan Raju J.S.

This paper aims to explore recent trends of how Web 2.0 applications were used in 75 academic libraries in Asia through their library websites.

1100

Abstract

Purpose

This paper aims to explore recent trends of how Web 2.0 applications were used in 75 academic libraries in Asia through their library websites.

Design/methodology/approach

The Times Higher Education Asia University Rankings 2016 was considered for this study and out of 200 top universities ranked, 75 universities were selected for data collection. Using a multi-method approach, this study evaluated key design elements, library service platforms and website content of each academic library website, examining their site features, Web 2.0 types and applications. The criteria for selecting the websites were first the website was in English and second had Web 2.0 applications integrated into the main website. For the ranking of websites, a library web service index was developed, benchmarking from these groups – resource discovery tools, Web 2.0 applications, e-resources, mobile applications, library guides, digital reference services and digital inclusion – as indicators.

Findings

The authors found that over two-thirds of Asian university libraries have deployed one or more Web 2.0 applications, though their popularity and implementation vary greatly. Most widely used Web 2.0 applications are Facebook (61.3 per cent), RSS (53.3 per cent), Twitter (46.7 per cent) and YouTube (37.3 per cent). Instant messaging (5.3 per cent) and podcasting (4 per cent) were least applied. With an average of 44 per cent, the diffusion rate of Web information is moderately high among the majority of the Asian university libraries.

Originality/value

Many studies explored Web 2.0 applications from developed countries. However, this study attempts evaluating the use of Web 2.0 applications through content, sites and features of academic libraries in Asia, from developing countries perspective.

Details

The Electronic Library , vol. 37 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 22 November 2011

Helen Kapodistria, Sarandis Mitropoulos and Christos Douligeris

The purpose of this paper is to introduce a new tool which detects, prevents and records common web attacks that mainly result in web applications information leaking using…

1693

Abstract

Purpose

The purpose of this paper is to introduce a new tool which detects, prevents and records common web attacks that mainly result in web applications information leaking using pattern recognition. It is a cross‐platform application, namely, it is not OS‐dependent or web server dependent. It offers a flexible attacks search engine, which scans http requests and responses during a webpage serving without affecting the web server performance.

Design/methodology/approach

The paper starts with a study of the most known web vulnerabilities and the way they can be exploited. Then, it focuses on those web attacks based on input validation, which are the ones the new tool detects through pattern recognition. This tool acts as a proxy server having a simple GUI for administration purposes. Patterns can be detected in both http requests and responses in an extensible and manageable way.

Findings

The new tool was compared to dotDefender, a commercial web application firewall, and ModSecurity, a widely used open source application firewall, using over 200 attack patterns. The new tool had satisfying results for every attack category examined having a high percentage of success. Results for stored XSS could not be achieved since the other tools are not able to search and detect them in http responses. The fact that the new tool is very extensible, it makes it possible for future work to be done.

Originality/value

This paper introduces a new web server plug‐in, which has some advanced web application firewall features with a flexible attacks search engine which scans http requests and responses. By scanning http responses, attacks such as stored XSS can be detected, a feature that cannot be found on other web application firewalls.

Details

Information Management & Computer Security, vol. 19 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 2006

Andreas Langegger, Jürgen Palkoska and Roland Wagner

The World Wide Web has undergone a rapid transition from the originally static hypertext to an ubiquitous hypermedia system. Today, the Web is not only used as a basis for…

Abstract

The World Wide Web has undergone a rapid transition from the originally static hypertext to an ubiquitous hypermedia system. Today, the Web is not only used as a basis for distributed applications (Web applications), moreover it serves as a generic architecture for autonomous applications and services. Many research work has been done regarding the modeling and engineering process of Web applications and various platforms, frameworks and development kits exist for the efficient implementation of such systems. Concerning the modeling process, many of the published concepts try to merge traditional hypermedia modeling with techniques from the software engineering domain. Unfortunately, those concepts which capture all facets of the Web’s architecture become rather bulky and are eventually not applicable for a model‐driven Web application development. Moreover, there is a need for frameworks which address both, the modeling process and the implementation task and allow a model driven, semi‐automatic engineering process using CASE tools. This paper outlines the DaVinci Web Engineering Framework which supports the modeling as well as the semi‐automated implementation of Web applications. The DaVinci Architectural Layer specifies a persistent, hierarchical GUI model and a generic interaction scheme. This allows the elimination of the hypermedia paradigm, which turned out to be rather practical when building Web applications.

Details

International Journal of Web Information Systems, vol. 2 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 13 April 2012

Ka I. Pun, Yain Whar Si and Kin Chan Pau

Intensive traffic often occurs in web‐enabled business processes hosted by travel industry and government portals. An extreme case for intensive traffic is flash crowd situations…

1351

Abstract

Purpose

Intensive traffic often occurs in web‐enabled business processes hosted by travel industry and government portals. An extreme case for intensive traffic is flash crowd situations when the number of web users spike within a short time due to unexpected events caused by political unrest or extreme weather conditions. As a result, the servers hosting these business processes can no longer handle overwhelming service requests. To alleviate this problem, process engineers usually analyze audit trail data collected from the application server and reengineer their business processes to withstand unexpected surge in the visitors. However, such analysis can only reveal the performance of the application server from the internal perspective. This paper aims to investigate this issue.

Design/methodology/approach

This paper proposes an approach for analyzing key performance indicators of traffic intensive web‐enabled business processes from audit trail data, web server logs, and stress testing logs.

Findings

The key performance indicators identified in the study's approach can be used to understand the behavior of traffic intensive web‐enabled business processes and the underlying factors that affect the stability of the web server.

Originality/value

The proposed analysis also provides an internal as well as an external view of the performance. Moreover, the calculated key performance indicators can be used by the process engineers for locating potential bottlenecks, reengineering business processes, and implementing contingency measures for traffic intensive situations.

Details

Business Process Management Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 13 April 2010

Riaan J. Rudman

The purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications…

3275

Abstract

Purpose

The purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications, with specific focus on unauthorised access (encompassing hackers). The study aims to recommend possible safeguards to mitigate these incremental risks to an acceptable level.

Design/methodology/approach

An extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and Related Technology (CobiT) and Trust Service Principles and Criteria and associated control objectives relating to security risks, specifically to hacker risks. These objectives were used to identify relevant risks and formulate appropriate internal control measures.

Findings

The findings show that every organisation, technology and application is unique and the safeguards depend on the nature of the organisation, information at stake, degree of vulnerability and risks. A comprehensive security program, including a multi‐layer technological, as well as an administrative component, should be implemented. User training on acceptable practices should also be conducted.

Originality/value

Obtaining an understanding of Web 2.0 and Web 2.0 security is important, as Web 2.0 is a new, poorly understood technology and with the growing mobility of users, the potential surface area of attack increases and should be managed. The paper will help organisations, information repository managers, information technology (IT) professionals, librarians and internal and external auditors to understand the “new” risks relating to unauthorised access, which previously did not exist in an on‐line environment, and will assist the development of a framework to limit the most significant risks.

Details

The Electronic Library, vol. 28 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 28 September 2007

Joaquim Gabarró, Isabel Vallejo and Fatos Xhafa

This paper aims to deal with some design issues of web applications using partial orders to enhance their navigability and extensibility.

Abstract

Purpose

This paper aims to deal with some design issues of web applications using partial orders to enhance their navigability and extensibility.

Design/methodology/approach

The paper uses a static web applications model as a deterministic labelled transition system in which states are html pages and transitions are urls.

Findings

By using this model it is possible, on the one hand, to characterize the temporal evolution of a web application and, on the other, to classify web applications into several types according to the way the information is organized over the web application. This classification captures interesting properties related to the navigability and extensibility of web applications.

Practical implications

These ideas are applied to develop a simple web application, namely, a small virtual museum based on approximations of original paintings. Moreover, based on the extensibility characterization, the virtual museum is extended with different paintings approximations, while preserving navigability properties as well as browsing of paintings' approximations of higher quality resolution.

Originality/value

The results of this work provide useful and practical insights into the design of web applications that ensure navigability and extensibility properties.

Details

International Journal of Web Information Systems, vol. 3 no. 1/2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 October 2004

Wendy L. Currie, Xinkun Wang and Vishanth Weerakkody

This paper discusses an ongoing research programme, which explores the development of the software‐as‐a‐service business model by different service providers (xSPs). With the…

2809

Abstract

This paper discusses an ongoing research programme, which explores the development of the software‐as‐a‐service business model by different service providers (xSPs). With the demise of the first phase of the ASP market, due to the failure of vendors to provide business value to potential and existing customers, Web services promise to resolve some of these problems by integrating software applications across heterogeneous technology platforms and business environments. Whether this will be achieved is the subject of continuing debate. This paper presents the preliminary findings from a study, which uses the Microsoft .NET technology platform to develop Web services. Two Web‐enabled prototype databases are discussed. The paper concludes that Web services is still relatively new, but if key technical and business challenges are resolved, it may provide value for the customer where ASPs failed.

Details

Journal of Enterprise Information Management, vol. 17 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 13 April 2012

Alton Y.K. Chua, Dion H. Goh and Rebecca P. Ang

The purpose of this paper is to investigate the extent to which Web 2.0 applications are prevalent in government web sites, the ways in which Web 2.0 applications have been used…

2469

Abstract

Purpose

The purpose of this paper is to investigate the extent to which Web 2.0 applications are prevalent in government web sites, the ways in which Web 2.0 applications have been used in government web sites, as well as whether the presence of Web 2.0 applications correlates with the perceived quality of government web sites.

Design/methodology/approach

Divided equally between developing and advanced economies, a total of 200 government web sites were analysed using content analysis and multiple regression analysis.

Findings

The prevalence of seven Web 2.0 applications in descending order was: RSS, multimedia sharing services, blogs, forums, social tagging services, social networking services and wikis. More web sites in advanced countries include Web 2.0 applications than those in developing countries. The presence of Web 2.0 applications was found to have a correlation with the overall web site quality, and in particular, service quality.

Research limitations/implications

This paper only covers government web sites in English. Emerging genres of Web 2.0 applications such as mashups and virtual worlds have not been included. Moreover the data were drawn solely from the public domain.

Practical implications

Decision makers and e‐government web developers may benchmark their own efforts in deploying Web 2.0 applications against this study. The numerous exemplars cited here serve as a springboard to generate more ideas on how Web 2.0 applications could be used and harnessed to improve the overall quality of government web sites.

Originality/value

This paper unites two research interests: Web 2.0 and web site quality. It also extends previous studies by investigating the suite of Web 2.0 applications found in government web sites around the world.

Details

Online Information Review, vol. 36 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 18 April 2016

Camilo Carromeu, Debora Barroso Paiva and Maria Istela Cagnin

This paper aims to discuss the motivation and present the evolution from a Software Product Line (SPL) in the e-Gov Web (e-Gov Web SPL) domain to a SPL in the mobile domain (e-Gov…

718

Abstract

Purpose

This paper aims to discuss the motivation and present the evolution from a Software Product Line (SPL) in the e-Gov Web (e-Gov Web SPL) domain to a SPL in the mobile domain (e-Gov Mobile SPL).

Design/methodology/approach

The evolution was supported by the Product Line UML-Based Software Engineering approach and the feature model.

Findings

The authors were able to observe that it is feasible to evolve from a SPL for the Web platform to a SPL for the mobile platform, with the intent to port existing Web applications to mobile platforms such that users can have access to the main information and are able to interact with the most important functionalities of Web applications in a mobile device.

Research limitations/implications

As for the main limitations, the authors can point out the small number of instantiations performed until the moment with the support of the e-Gov Mobile SPL, what prevented the conduction of an empirical study.

Practical implications

Using e-Gov Mobile SPL, it is possible to reduce development time and cost.

Originality/value

The existing SPLs do not worry about supporting the development of mobile applications corresponding to existing Web applications, as it is desirable to have access to the information and main features of these applications in mobile devices. We obtained some e-Gov Mobile SPL instantiations corresponding to e-Gov Web SPL instantiations to attend the demands of the Brazilian Agricultural Research Corporation Unit situated at Campo Grande, MS, Brazil.

Details

International Journal of Web Information Systems, vol. 12 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 21 February 2020

Magaly Gaviria-Marin and Claudio Cruz-Cázares

The purpose of this article is to analyze the influence of the diversity of information and the use of Web 2.0 applications on the web positioning of online business information…

Abstract

Purpose

The purpose of this article is to analyze the influence of the diversity of information and the use of Web 2.0 applications on the web positioning of online business information providers.

Design/methodology/approach

A total of 203 online business information provider websites were selected using three search engines (Google, Yahoo and Bing). This information was encoded to develop two logistic regression models.

Findings

The results suggest that the knowledge offered and the resources used to transfer this knowledge play important roles in the web positioning of online business information providers. This study found that entrepreneurs mainly seek technological knowledge, and to acquire it, they use various Web 2.0 applications that do not necessarily include social networks.

Practical implications

This article presents a novel proposal to analyze how knowledge diversity and Web 2.0 applications influence the web rankings of websites that offer information and knowledge for established or new, small and medium enterprises.

Originality/value

This article is novel in that it links the theory of knowledge dissemination with the technologies of the Internet (websites, Web 2.0 applications) and provides evidence of diverse sources of online information that are potentially useful for the entrepreneur of the twentieth century.

Propósito

El propósito de este artículo es analizar la influencia de la diversidad de información y el uso de las aplicaciones Web 2.0 en el posicionamiento Web de los proveedores de información empresarial en línea.

Diseño/metodología/enfoque

Un total de 203 sitios Web de los proveedores de información empresarial en línea fueron seleccionados utilizando tres motores de búsqueda (Google, Yahoo y Bing). Esta información fue codificada para desarrollar dos modelos de regresión logística.

Resultados

Los resultados sugieren que el conocimiento ofrecido y los recursos utilizados para transferir este conocimiento desempeñan funciones importantes en el posicionamiento Web de los proveedores de información empresarial en línea. Este estudio encontró que los empresarios buscan principalmente el conocimiento tecnológico y, para adquirirlo; utilizan varias aplicaciones Web 2.0 que no necesariamente incluyen las redes sociales.

Implicaciones Prácticas

Este estudio presenta una propuesta novedosa para analizar cómo la diversidad de conocimiento y las aplicaciones Web 2.0 influyen en el posicionamiento Web de los sitios Web que ofrecen información y conocimiento para las pequeñas y medianas empresas sean nuevas o establecidas.

Originalidad/Valor

Este artículo es novedoso porque vincula la teoría de la difusión de conocimiento con las tecnologías de Internet (sitios Web, aplicaciones Web 2.0) y proporciona evidencia de diversas fuentes de información en línea que son potencialmente útiles para el empresario del siglo XX.

Details

Academia Revista Latinoamericana de Administración, vol. 33 no. 2
Type: Research Article
ISSN: 1012-8255

Keywords

1 – 10 of over 57000