WBDV111:
FINALS
LESSON 11:
WEBSITE DEVELOPMENT TEAM
Website Development Team
Large-scale projects are not completed by
only one or two individuals. They are
created by a group of people working
together as a team. The job roles of project
manager, information architect, marketing
representative, copywriter, editor, graphic
designer, database administrator, network
administrator, and web developer are
usually needed for large projects. In
smaller companies or organizations,
each person can wear many hats and
juggle multiple job roles. In smaller-
scale projects, one of the web developers
may also act as the project manager,
graphic designer, database
administrator, and/or information
architect.
1. Project Manager
The project manager oversees the website
development process and coordinates
team activities. They create the project
plan and schedule and are accountable for
reaching project milestones and producing
results. Excellent organizational,
managerial, and communication skills
are required.
2. Information Architect
The information architect clarifies the
mission and goals of the site, assists in
determining site functionality, and is
instrumental in defining the site’s
organization, navigation, and labeling.
Sometimes, web developers or the project
manager take on this role.
3. Marketing Representative
The marketing representative handles the
organization’s marketing plan and
goals. They work with web designers to
create a web presence that aligns with
marketing goals and help coordinate the
website with other media such as print,
radio, and television.
4. Copywriter and Editor
The copywriter prepares and evaluates
text. When using material from brochures,
newsletters, or white papers, it must be
adapted for the web. The content manager
or editor works with the copywriter to
ensure correct grammar and consistency.
5. Content Manager
The content manager contributes to the
strategic and creative development of
the website and oversees content
updates. They must have skills in editing,
copywriting, marketing, technology, and
communication, and be capable of
facilitating change.
6. Graphic Designer
The graphic designer determines the use
of color and graphics, creates page
layouts, and designs images. They may
collaborate with web developers to create
graphic buttons and mouseover effects.
7. Database Administrator
A database administrator is required if the
site uses database information. They
create databases, define maintenance
procedures (including backup and
recovery), and manage access control.
8. Network Administrator
The network administrator configures and
maintains the web server, installs and
maintains system hardware/software,
and manages access security.
9. Web Developer
The web developer writes XHTML and
client-side scripting like JavaScript. They
may also develop server-side scripts using
PHP or ASP. In large projects, multiple
developers may work, each with a specific
focus.
10. Project Staffing Criteria
Regardless of project size, selecting the
right people is crucial. Consider work
experience, portfolios, education, and
certifications. Alternatively, you may
outsource all or part of the project.
Outsourcing may include tasks like
graphics creation, multimedia
animation, or server-side scripting.
Effective communication between the
project manager and the external team is
essential to align on goals and deadlines.
Whether developed in-house or
outsourced, a website project’s success
relies on careful planning and clear
communication. Using formal
development methodologies helps
ensure both.
LESSON 12
DEVELOPMENT PROCESS AND
METHODOLOGY
The Development Process
Methodology is a step-by-step plan that
encompasses the life cycle of a project
from start to finish. It comprises a series of
phases, each having specific activities and
deliverables. Most modern methodologies
have their roots in the System
Development Life Cycle (SDLC), a
process used for decades to build large-scale
information systems. SDLC comprises a set
of phases—systems investigation, systems
analysis, systems design, systems
implementation, and maintenance—each
typically completed before starting the next.
Websites are often developed using a
variation of SDLC, adapted for Web
projects. Large companies and Web design
firms usually create customized
methodologies. The Web Site
Development Cycle guides successful Web
project management. Depending on the
project scope and complexity, steps may
take from a single meeting to several
months.
System Development Life Cycle (SDLC)
Web Site Development Cycle
Web Site Development Cycle (WSDC)
A Web site is never truly finished—it must
stay current, fix errors, and add new
components. The first step is to define its
purpose.
1. Conceptualization
Determine the site's purpose: Is it to sell
products, match a competitor, or launch a
new idea? Understand the target audience
and define short- and long-term goals.
Goals should be measurable. Success
metrics should be agreed upon by the
client, project manager, and information
architect, then documented and approved
before development.
2. Analysis
Involves meetings and interviews with
client personnel, project manager,
information architect, marketing team,
and possibly network/database
administrators. Common tasks include:
a. Determine Information Topics –
Organize and categorize site content.
b. Determine Functionality
Requirements – Define what the site
does (e.g., “accept credit card orders”)
without detailing how.
c. Determine Environmental
Requirements – Assess hardware, OS,
memory, screen resolution, and
bandwidth requirements.
d. Determine Content Requirements –
Identify existing content sources and
responsibilities for new content
creation.
e. Compare Old and New Approach –
Note improvements in redesigned sites.
f. Review Competitors’ Sites – Identify
what works and what doesn’t in
competing websites.
g. Estimate Costs – Create a project plan
with cost/time estimates using tools like
Microsoft Project.
h. Do a Cost/Benefit Analysis – Compare
site benefits with costs; document must
be client-approved before continuing.
3. Design
Involves collaboration with graphic
designers, developers, and marketing.
Key tasks include:
a. Choose a Site Organization – Select
structure (hierarchical, linear, random) and
create a site map.
b. Prototype the Design – Sketch mock-
ups or wireframes for client/focus group
feedback.
c. Create a Page Layout Design – Design
homepage/content pages, determine color
schemes, logos, button graphics, and text
styles.
d. Document Each Page – Describe
content, functionality, and approval
sources. The client must approve the site
map and page designs before Production.
4. Production
Brings together design and development
work. Developers are crucial here. Tasks
include:
a. Choose a Web Authoring Tool – Use
tools like Dreamweaver or Microsoft
Expression Web for productivity and
consistency.
b. Organize Your Site Files – Use folders
for images, media, and server-side
scripts. Define file naming conventions.
c. Develop and Test Components –
Designers/developers create and unit test
each component. Senior developers or
managers review for quality before
integration.
5. Testing
Publish components to a test server that
matches the production environment.
Important testing considerations:
a. Test on Different Browsers/Versions
b. Test with Different Screen
Resolutions – Common ones include
1024×768, 1280×800, and 1280×1024
c. Test Using Different Bandwidths –
Ensure usability on both broadband and
dial-up connections
d. Test from Another Location – Simulate
a visitor’s experience
e. Test Using Mobile Devices – Check
compatibility with smartphones
f. Test Thoroughly – Create a test plan
outlining what to test on each page
Use automated tools and validators (e.g.,
Dreamweaver’s link/accessibility/code
checkers)
Accessibility Testing – Follow best
practices for accessibility
Usability Testing – Observe real
users performing tasks; record and
review feedback for improvements
6. Launch
Client reviews and approves the test site
before going live. This may involve a formal
meeting or sharing a test URL for client
feedback.
7. Maintenance
A Web site is never finished. There
are always errors or omissions that were
overlooked during the development
process. Clients usually find many new
uses for a Web site once they have one
and request modifications, additions,
and new sections (this is called site
maintenance). So at this point, the
project team identifies the new
opportunity or enhancement and begins
another loop through the development
process.
8. Evaluation
Remember the goals set for the Web site
in the Conceptualization phase? During
evaluation it’s time to review them and
determine if your Web site meets them.
If not, consider how you can enhance the
site, and begin another loop through the
development process.
LESSON 13
E-COMMERCE
E-Commerce
E-commerce is the integration of
communications, data management, and
security technologies, allowing individuals
and organizations to exchange
information related to the sale of goods
and services.
Major functions of e-commerce include:
Buying of goods
Selling of goods
Performing financial transactions
on the Internet
Advantages of E-Commerce
For businesses:
1. Reduced Costs: Online businesses
can operate 24/7 without the
overhead of a physical facility. A
website can serve as a revenue
source, often paying for itself quickly.
2. Increased Customer Satisfaction:
Websites improve communication
with customers through FAQs, email,
forums, or online chat.
3. More Effective Data Management:
E-commerce sites can automate
tasks like credit card verification,
inventory updates, and order
fulfillment.
4. Potentially Higher Sales: A 24/7
online store accessible globally has
the potential to surpass traditional
store sales.
For consumers:
1. Convenience: Shop anytime, with
no travel needed. Users can also
view more images and product
discussions.
2. Easier Comparison Shopping:
Consumers can compare prices and
value online without driving
between stores.
3. Wider Selection of Goods: Online
shopping offers more variety and
better access to products.
Risks of E-Commerce
For businesses:
1. Loss of Sales if Technology Fails:
Website reliability and user-
friendliness are crucial.
2. Fraudulent Transactions:
Businesses must handle risks such as
fake credit card purchases or
prank orders.
3. Customer Reluctance: Some
consumers may hesitate to buy
online. Incentives like free shipping
or easy returns can help.
4. Increased Competition: Lower
overhead makes it easier for new
competitors to enter the market with
professional-looking website.
For consumers:
1. Security Issues: Concerns over how
websites handle and store
transmitted data.
2. Privacy Issues: Privacy policies
vary; some sites use data for
internal marketing, others sell it.
3. Purchasing Based on Photos and
Descriptions: Consumers may be
disappointed if products don’t meet
expectations.
4. Returns: Returning items can be
more difficult than at physical
stores, discouraging some buyers.
E-Commerce Business Models
1. Business-to-Consumer (B2C):
Online stores sell directly to
consumers.
2. Business-to-Business (B2B):
Businesses exchange supply chain
info, often via Electronic Data
Interchange (EDI).
3. Consumer-to-Consumer (C2C):
Individuals sell to each other
online, typically through auctions
(e.g., eBay).
4. Business-to-Government (B2G):
Businesses sell to government
agencies, which require strict
usability standards.
Electronic Data Interchange (EDI)
EDI is the transfer of data between
companies over a network, enabling
standard business document exchanges
like purchase orders and invoices. It’s
been around since the 1960s. Trading
partners exchange EDI transmissions using
ANSI standards for documents like
requisitions and invoices.
EDI messages include:
Header
One or more data segments (with
data elements separated by
delimiters
Trailer
Modern technologies like XML and web
services now enhance EDI by offering more
customization over the Internet.
E-Commerce Issues
1. Intellectual Property:
o Cybersquatting involves
registering trademarked
domain names for profit.
o ICANN’s Uniform Domain
Name Dispute Policy
(http://www.icann.org/udrp/udr
p.htm) helps resolve these
issues.
2. Security:
o Constant concern due to
DDoS attacks that shut down
e-commerce sites, often by
malicious users (script
kiddies).
o Fraud occurs through fake
websites that steal credit
card information.
3. Taxation:
o State and local governments
rely on sales taxes, which are
often not collected in online
transactions.
o Consumers are supposed to pay
use tax, but compliance and
enforcement are minimal,
leading to lost public funding.
4. International Commerce:
o Global sites must consider
translation. Options include
automated services
(http://www.systranlinks.com)
or professional translators
(http://www.worldlingo.com).
LESSON 14
E-COMMERCE SECURITY
E-Commerce Security
Encryption
Encryption ensures privacy within an
organization and on the Internet. It is the
conversion of data into an unreadable
form called ciphertext, which cannot be
easily understood by unauthorized
individuals. Decryption is the process of
converting ciphertext into its original
form, called plaintext or clear text, so that
it can be understood. The process of
encryption and decryption requires an
algorithm and a key. Encryption is
important on the Internet because
information in a packet can be
intercepted as it travels through
communication media.
Types of Encryption Commonly Used on
the Internet
Symmetric-Key Encryption: Also
called single-key encryption
because both encryption and
decryption use the same key. Since
the key must be kept secret, both the
sender and receiver must know
the key before communication. An
advantage of symmetric-key
encryption is speed.
Figure 23:
www.google.com.ph/search?
q=symmetric+key+life+encryption&s
ource
Asymmetric-Key Encryption: Also
called public-key encryption
because there is no shared secret.
Two keys are created at the same
time—a public key and a private
key—which are mathematically
related in such a way that it is unlikely
anyone could guess one based on the
other. Only the public key can
decrypt a message encrypted with
the private key and vice versa. This
method is much slower than
symmetric-key encryption.
Figure 24:
www.google.com.ph/search?
q=asymmetric+key+life+encryption&
source
Hash Functions: Provide a way to
ensure message integrity. A hash
function transforms a string into a
shorter fixed-length value or key
called a digest, representing the
original string.
Secure Sockets Layer (SSL)
SSL is a protocol that allows data to be
privately exchanged over public
networks. Developed by Netscape, it
encrypts data sent between a client
(usually a web browser) and a web server
using both symmetric and asymmetric
keys. SSL provides secure
communication by using:
1. Server and (optionally) client
digital certificates for
authentication
2. Symmetric-key cryptography with
a session key for bulk encryption
3. Public-key cryptography for
session key transfer
4. Message digests (hash functions)
to verify transmission integrity
Digital Certificate
A digital certificate is a form of
asymmetric key that includes
information about the certificate, its
holder, and the issuer. Contents include:
1. The public key
2. Effective date
3. Expiration date
4. Details about the certificate
authority (issuer)
5. Details about the certificate
holder
6. A digest of the certificate content
VeriSign is a well-known
certificate authority (CA).
Order and Payment Processing
In B2C e-commerce, products are
displayed in an online catalog. On large
sites, these pages are dynamically
created using server-side scripts. Secure
ordering is facilitated by SSL. Once an
order is placed, there are several payment
methods.
Payment Models
A. Cash Model
The most difficult to implement—you
don’t send cash through a computer.
Instead, you use e-cash, purchasing
digital money from a bank and storing it
in a digital wallet. Transfers are
immediate. Vendors: InternetCashCard,
ECash Direct.
B. Check Model
Consumers write digital checks. As with
physical checks, fund availability must be
verified, and transfer isn’t immediate.
Vendor: PayByCheck.
C. Credit Model
Credit card processing is vital. Funds are
transferred from the customer to the
merchant’s bank. Site owners need to
apply for a merchant account. Real-time
verification may use a merchant gateway
or third-party service like Authorize.Net.
D. Smart Card
Popular in Europe, Australia, and Japan.
Similar to credit cards but with an
integrated circuit instead of a magnetic
strip.
Micropayment describes small-amount
transactions (microcents) exchanged
over the Internet.
E-Commerce Storefront Solutions
Instant Online Storefront
No software installation needed. Use a
web browser and templates provided by
the online storefront to set up a store.
Configure settings, add products, upload
images, descriptions, prices, and captions.
Off-the-Shelf Shopping Cart Software
Standardized e-commerce software is
purchased, installed, and customized on
your web server. Many web hosts offer this,
often including a shopping cart, order
processing, and optional credit card
processing.
Shopping Cart Software
Provides an online catalog where
visitors can browse, add items to a
virtual cart, and check out through an
order form.
Custom-Built Solution
Custom-building a large-scale e-
commerce site requires expertise, time,
and a large budget. May require a
commerce server—a web server
enhanced with support for commerce
activities.