KEMBAR78
WBDV Midterm | PDF | Encryption | Key (Cryptography)
0% found this document useful (0 votes)
12 views28 pages

WBDV Midterm

The document outlines the roles and responsibilities of a website development team, emphasizing the importance of collaboration among various roles such as project managers, designers, and developers. It also describes the web development process, including phases like conceptualization, analysis, design, production, testing, launch, maintenance, and evaluation. Additionally, it covers e-commerce fundamentals, advantages, risks, business models, and security measures, including encryption and SSL protocols.

Uploaded by

Jayvee Marcelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views28 pages

WBDV Midterm

The document outlines the roles and responsibilities of a website development team, emphasizing the importance of collaboration among various roles such as project managers, designers, and developers. It also describes the web development process, including phases like conceptualization, analysis, design, production, testing, launch, maintenance, and evaluation. Additionally, it covers e-commerce fundamentals, advantages, risks, business models, and security measures, including encryption and SSL protocols.

Uploaded by

Jayvee Marcelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

WBDV111:

FINALS
LESSON 11:

WEBSITE DEVELOPMENT TEAM

Website Development Team

Large-scale projects are not completed by


only one or two individuals. They are
created by a group of people working
together as a team. The job roles of project
manager, information architect, marketing
representative, copywriter, editor, graphic
designer, database administrator, network
administrator, and web developer are
usually needed for large projects. In
smaller companies or organizations,
each person can wear many hats and
juggle multiple job roles. In smaller-
scale projects, one of the web developers
may also act as the project manager,
graphic designer, database
administrator, and/or information
architect.

1. Project Manager

The project manager oversees the website


development process and coordinates
team activities. They create the project
plan and schedule and are accountable for
reaching project milestones and producing
results. Excellent organizational,
managerial, and communication skills
are required.

2. Information Architect

The information architect clarifies the


mission and goals of the site, assists in
determining site functionality, and is
instrumental in defining the site’s
organization, navigation, and labeling.
Sometimes, web developers or the project
manager take on this role.

3. Marketing Representative

The marketing representative handles the


organization’s marketing plan and
goals. They work with web designers to
create a web presence that aligns with
marketing goals and help coordinate the
website with other media such as print,
radio, and television.
4. Copywriter and Editor

The copywriter prepares and evaluates


text. When using material from brochures,
newsletters, or white papers, it must be
adapted for the web. The content manager
or editor works with the copywriter to
ensure correct grammar and consistency.

5. Content Manager

The content manager contributes to the


strategic and creative development of
the website and oversees content
updates. They must have skills in editing,
copywriting, marketing, technology, and
communication, and be capable of
facilitating change.

6. Graphic Designer

The graphic designer determines the use


of color and graphics, creates page
layouts, and designs images. They may
collaborate with web developers to create
graphic buttons and mouseover effects.

7. Database Administrator
A database administrator is required if the
site uses database information. They
create databases, define maintenance
procedures (including backup and
recovery), and manage access control.

8. Network Administrator

The network administrator configures and


maintains the web server, installs and
maintains system hardware/software,
and manages access security.

9. Web Developer

The web developer writes XHTML and


client-side scripting like JavaScript. They
may also develop server-side scripts using
PHP or ASP. In large projects, multiple
developers may work, each with a specific
focus.

10. Project Staffing Criteria

Regardless of project size, selecting the


right people is crucial. Consider work
experience, portfolios, education, and
certifications. Alternatively, you may
outsource all or part of the project.
Outsourcing may include tasks like
graphics creation, multimedia
animation, or server-side scripting.
Effective communication between the
project manager and the external team is
essential to align on goals and deadlines.
Whether developed in-house or
outsourced, a website project’s success
relies on careful planning and clear
communication. Using formal
development methodologies helps
ensure both.

LESSON 12

DEVELOPMENT PROCESS AND


METHODOLOGY

The Development Process

Methodology is a step-by-step plan that


encompasses the life cycle of a project
from start to finish. It comprises a series of
phases, each having specific activities and
deliverables. Most modern methodologies
have their roots in the System
Development Life Cycle (SDLC), a
process used for decades to build large-scale
information systems. SDLC comprises a set
of phases—systems investigation, systems
analysis, systems design, systems
implementation, and maintenance—each
typically completed before starting the next.

Websites are often developed using a


variation of SDLC, adapted for Web
projects. Large companies and Web design
firms usually create customized
methodologies. The Web Site
Development Cycle guides successful Web
project management. Depending on the
project scope and complexity, steps may
take from a single meeting to several
months.

System Development Life Cycle (SDLC)

Web Site Development Cycle

Web Site Development Cycle (WSDC)


A Web site is never truly finished—it must
stay current, fix errors, and add new
components. The first step is to define its
purpose.

1. Conceptualization

Determine the site's purpose: Is it to sell


products, match a competitor, or launch a
new idea? Understand the target audience
and define short- and long-term goals.
Goals should be measurable. Success
metrics should be agreed upon by the
client, project manager, and information
architect, then documented and approved
before development.

2. Analysis

Involves meetings and interviews with


client personnel, project manager,
information architect, marketing team,
and possibly network/database
administrators. Common tasks include:

a. Determine Information Topics –


Organize and categorize site content.

b. Determine Functionality
Requirements – Define what the site
does (e.g., “accept credit card orders”)
without detailing how.

c. Determine Environmental
Requirements – Assess hardware, OS,
memory, screen resolution, and
bandwidth requirements.

d. Determine Content Requirements –


Identify existing content sources and
responsibilities for new content
creation.
e. Compare Old and New Approach –
Note improvements in redesigned sites.

f. Review Competitors’ Sites – Identify


what works and what doesn’t in
competing websites.

g. Estimate Costs – Create a project plan


with cost/time estimates using tools like
Microsoft Project.

h. Do a Cost/Benefit Analysis – Compare


site benefits with costs; document must
be client-approved before continuing.

3. Design

Involves collaboration with graphic


designers, developers, and marketing.
Key tasks include:

a. Choose a Site Organization – Select


structure (hierarchical, linear, random) and
create a site map.
b. Prototype the Design – Sketch mock-
ups or wireframes for client/focus group
feedback.

c. Create a Page Layout Design – Design


homepage/content pages, determine color
schemes, logos, button graphics, and text
styles.

d. Document Each Page – Describe


content, functionality, and approval
sources. The client must approve the site
map and page designs before Production.

4. Production

Brings together design and development


work. Developers are crucial here. Tasks
include:

a. Choose a Web Authoring Tool – Use


tools like Dreamweaver or Microsoft
Expression Web for productivity and
consistency.

b. Organize Your Site Files – Use folders


for images, media, and server-side
scripts. Define file naming conventions.

c. Develop and Test Components –


Designers/developers create and unit test
each component. Senior developers or
managers review for quality before
integration.

5. Testing

Publish components to a test server that


matches the production environment.
Important testing considerations:

a. Test on Different Browsers/Versions

b. Test with Different Screen


Resolutions – Common ones include
1024×768, 1280×800, and 1280×1024

c. Test Using Different Bandwidths –


Ensure usability on both broadband and
dial-up connections

d. Test from Another Location – Simulate


a visitor’s experience
e. Test Using Mobile Devices – Check
compatibility with smartphones

f. Test Thoroughly – Create a test plan


outlining what to test on each page
Use automated tools and validators (e.g.,
Dreamweaver’s link/accessibility/code
checkers)

Accessibility Testing – Follow best


practices for accessibility

Usability Testing – Observe real


users performing tasks; record and
review feedback for improvements

6. Launch

Client reviews and approves the test site


before going live. This may involve a formal
meeting or sharing a test URL for client
feedback.

7. Maintenance

A Web site is never finished. There


are always errors or omissions that were
overlooked during the development
process. Clients usually find many new
uses for a Web site once they have one
and request modifications, additions,
and new sections (this is called site
maintenance). So at this point, the
project team identifies the new
opportunity or enhancement and begins
another loop through the development
process.

8. Evaluation

Remember the goals set for the Web site


in the Conceptualization phase? During
evaluation it’s time to review them and
determine if your Web site meets them.
If not, consider how you can enhance the
site, and begin another loop through the
development process.
LESSON 13

E-COMMERCE

E-Commerce

E-commerce is the integration of


communications, data management, and
security technologies, allowing individuals
and organizations to exchange
information related to the sale of goods
and services.

Major functions of e-commerce include:

 Buying of goods

 Selling of goods

 Performing financial transactions


on the Internet
Advantages of E-Commerce

For businesses:

1. Reduced Costs: Online businesses


can operate 24/7 without the
overhead of a physical facility. A
website can serve as a revenue
source, often paying for itself quickly.

2. Increased Customer Satisfaction:


Websites improve communication
with customers through FAQs, email,
forums, or online chat.

3. More Effective Data Management:


E-commerce sites can automate
tasks like credit card verification,
inventory updates, and order
fulfillment.

4. Potentially Higher Sales: A 24/7


online store accessible globally has
the potential to surpass traditional
store sales.
For consumers:

1. Convenience: Shop anytime, with


no travel needed. Users can also
view more images and product
discussions.

2. Easier Comparison Shopping:


Consumers can compare prices and
value online without driving
between stores.

3. Wider Selection of Goods: Online


shopping offers more variety and
better access to products.

Risks of E-Commerce

For businesses:

1. Loss of Sales if Technology Fails:


Website reliability and user-
friendliness are crucial.

2. Fraudulent Transactions:
Businesses must handle risks such as
fake credit card purchases or
prank orders.
3. Customer Reluctance: Some
consumers may hesitate to buy
online. Incentives like free shipping
or easy returns can help.

4. Increased Competition: Lower


overhead makes it easier for new
competitors to enter the market with
professional-looking website.

For consumers:

1. Security Issues: Concerns over how


websites handle and store
transmitted data.

2. Privacy Issues: Privacy policies


vary; some sites use data for
internal marketing, others sell it.

3. Purchasing Based on Photos and


Descriptions: Consumers may be
disappointed if products don’t meet
expectations.

4. Returns: Returning items can be


more difficult than at physical
stores, discouraging some buyers.
E-Commerce Business Models

1. Business-to-Consumer (B2C):
Online stores sell directly to
consumers.

2. Business-to-Business (B2B):
Businesses exchange supply chain
info, often via Electronic Data
Interchange (EDI).

3. Consumer-to-Consumer (C2C):
Individuals sell to each other
online, typically through auctions
(e.g., eBay).

4. Business-to-Government (B2G):
Businesses sell to government
agencies, which require strict
usability standards.
Electronic Data Interchange (EDI)

EDI is the transfer of data between


companies over a network, enabling
standard business document exchanges
like purchase orders and invoices. It’s
been around since the 1960s. Trading
partners exchange EDI transmissions using
ANSI standards for documents like
requisitions and invoices.

EDI messages include:

 Header

 One or more data segments (with


data elements separated by
delimiters

 Trailer

Modern technologies like XML and web


services now enhance EDI by offering more
customization over the Internet.

E-Commerce Issues

1. Intellectual Property:
o Cybersquatting involves
registering trademarked
domain names for profit.

o ICANN’s Uniform Domain


Name Dispute Policy
(http://www.icann.org/udrp/udr
p.htm) helps resolve these
issues.

2. Security:

o Constant concern due to


DDoS attacks that shut down
e-commerce sites, often by
malicious users (script
kiddies).

o Fraud occurs through fake


websites that steal credit
card information.

3. Taxation:

o State and local governments


rely on sales taxes, which are
often not collected in online
transactions.
o Consumers are supposed to pay
use tax, but compliance and
enforcement are minimal,
leading to lost public funding.

4. International Commerce:

o Global sites must consider


translation. Options include
automated services
(http://www.systranlinks.com)
or professional translators
(http://www.worldlingo.com).

LESSON 14

E-COMMERCE SECURITY

E-Commerce Security

Encryption
Encryption ensures privacy within an
organization and on the Internet. It is the
conversion of data into an unreadable
form called ciphertext, which cannot be
easily understood by unauthorized
individuals. Decryption is the process of
converting ciphertext into its original
form, called plaintext or clear text, so that
it can be understood. The process of
encryption and decryption requires an
algorithm and a key. Encryption is
important on the Internet because
information in a packet can be
intercepted as it travels through
communication media.

Types of Encryption Commonly Used on


the Internet

 Symmetric-Key Encryption: Also


called single-key encryption
because both encryption and
decryption use the same key. Since
the key must be kept secret, both the
sender and receiver must know
the key before communication. An
advantage of symmetric-key
encryption is speed.
Figure 23:
www.google.com.ph/search?
q=symmetric+key+life+encryption&s
ource
 Asymmetric-Key Encryption: Also
called public-key encryption
because there is no shared secret.
Two keys are created at the same
time—a public key and a private
key—which are mathematically
related in such a way that it is unlikely
anyone could guess one based on the
other. Only the public key can
decrypt a message encrypted with
the private key and vice versa. This
method is much slower than
symmetric-key encryption.
Figure 24:
www.google.com.ph/search?
q=asymmetric+key+life+encryption&
source

 Hash Functions: Provide a way to


ensure message integrity. A hash
function transforms a string into a
shorter fixed-length value or key
called a digest, representing the
original string.

Secure Sockets Layer (SSL)

SSL is a protocol that allows data to be


privately exchanged over public
networks. Developed by Netscape, it
encrypts data sent between a client
(usually a web browser) and a web server
using both symmetric and asymmetric
keys. SSL provides secure
communication by using:

1. Server and (optionally) client


digital certificates for
authentication

2. Symmetric-key cryptography with


a session key for bulk encryption

3. Public-key cryptography for


session key transfer

4. Message digests (hash functions)


to verify transmission integrity

Digital Certificate

A digital certificate is a form of


asymmetric key that includes
information about the certificate, its
holder, and the issuer. Contents include:

1. The public key


2. Effective date

3. Expiration date

4. Details about the certificate


authority (issuer)

5. Details about the certificate


holder

6. A digest of the certificate content


VeriSign is a well-known
certificate authority (CA).

Order and Payment Processing

In B2C e-commerce, products are


displayed in an online catalog. On large
sites, these pages are dynamically
created using server-side scripts. Secure
ordering is facilitated by SSL. Once an
order is placed, there are several payment
methods.
Payment Models

A. Cash Model

The most difficult to implement—you


don’t send cash through a computer.
Instead, you use e-cash, purchasing
digital money from a bank and storing it
in a digital wallet. Transfers are
immediate. Vendors: InternetCashCard,
ECash Direct.

B. Check Model

Consumers write digital checks. As with


physical checks, fund availability must be
verified, and transfer isn’t immediate.
Vendor: PayByCheck.

C. Credit Model

Credit card processing is vital. Funds are


transferred from the customer to the
merchant’s bank. Site owners need to
apply for a merchant account. Real-time
verification may use a merchant gateway
or third-party service like Authorize.Net.
D. Smart Card

Popular in Europe, Australia, and Japan.


Similar to credit cards but with an
integrated circuit instead of a magnetic
strip.
Micropayment describes small-amount
transactions (microcents) exchanged
over the Internet.

E-Commerce Storefront Solutions

Instant Online Storefront

No software installation needed. Use a


web browser and templates provided by
the online storefront to set up a store.
Configure settings, add products, upload
images, descriptions, prices, and captions.

Off-the-Shelf Shopping Cart Software

Standardized e-commerce software is


purchased, installed, and customized on
your web server. Many web hosts offer this,
often including a shopping cart, order
processing, and optional credit card
processing.

Shopping Cart Software

Provides an online catalog where


visitors can browse, add items to a
virtual cart, and check out through an
order form.

Custom-Built Solution

Custom-building a large-scale e-
commerce site requires expertise, time,
and a large budget. May require a
commerce server—a web server
enhanced with support for commerce
activities.

You might also like