Abstract
The acceptance of the system prototype by tentative users indicates the completeness of the conceptual design and the beginning of the implementation phase. Before the implementation there are, nonetheless, several issues that must be taken into consideration in order to proceed with the development of a usable and stable online system. These issues mainly concern the initial user requirements derived from the requirement analysis, the results stemming from the conceptual design evaluation, and practical issues inherent in the development process, such as the adopted methodology, the software platform and the tools to be used, the tentative software system architecture, etc.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bhatnagar, S., Herath, T., Sharman, R., Rao, H.R., Upadhyaya, S.J.: Web 2.0: issues for the design of social net. In: Lytras, M.D., Damiani, E., Ordonez, P. (eds.) Web 2.0, pp. 1–14. Springer, New York (2009)
Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 191–233 (2009). Article 6 6:1–6:38
Cofta, P.: Designing for trust. In: Whitworth, B., de Moor, A. (eds.) Handbook of Research on Socio-Technical Design and Social Networking Systems, pp. 388–401. Information Science Reference, Hershey (2009)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246, August 2008 (2008)
Fogel, J., Nehmad, E.: Internet social network communities: risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25(1), 153–160 (2009)
Fraternali, P.: Tools and approaches for developing data-intensive web applications: a survey. ACM Comput. Surv. 31(3), 227–263 (1999). ACM, New York
Goncalves, M.A., Fox, E.A., Watson, L.T., Kipp, N.A.: Streams, structures, spaces, scenarios, societies (5s): a formal model for digital libraries. ACM Trans. Inf. Syst.(TOIS) 22(2), 270–312 (2004). ACM, New York
Grundy, J., Hosking, J.: Developing adaptable user interfaces for component-based systems. Interact. Comput. 14(3), 175–194 (2002). Elsevier
Hayes, B.: Cloud computing. Commun. ACM 51(7), 9–11 (2008). ACM, New York
Herrmann, T.: Systems design with the socio-technical walkthrough. In: Whitworth, B., de Moor, A. (eds.) Handbook of Research on Socio-Technical Design and Social Networking Systems, pp. 336–351. Information Science Reference, Hershey (2009)
Joshi, J.B.D., Aref, W.G., Ghafoor, A., Spafford, E.H.: Security models for web-based applications. Commun. ACM 44(2), 38–44 (2001). ACM, New York
Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM0́8), October 26–30, Napa Valley, pp. 289–298. ACM, New York (2008)
Langheinrich, M.: A P3P preference exchange language (APPEL), 26 February 2001. W3C Working Draft. http://www.w3.org/TR/P3P-preferences (2001)
Lazar, J.: The world wide web. In: Jacko, J., and Sears, A. (eds.) The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, pp. 714–730. Lawrence Erlbaum, Mahwah (2003)
Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, vol. 0, pp. 23–31. IEEE Computer Society, Washington, D.C. (2009)
Preist, C.: Goals and vision. In: Studer, R., Grimm, S., Abecker, A. (eds.) Semantic Web Services Concepts, Technologies, and Applications. Springer, Berlin/Heidelberg (2007)
Ram, S., Park, J., Lee, D.: Digital libraries for the next millennium: challenges and research directions. Inf. Syst. Front. 1(1), 75–94 (1999). Kluwer, Hingham
Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in Facebook. In: CHI 2010, April 10–15, Atlanta (2010)
Von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47(2), 56–60 (2004)
Wenning, R., Schunter, M.: The platform for privacy preferences 1.1 (P3P1.1) specification, 2006. W3C Working Group Note 13 November 2006. http://www.w3.org/TR/P3P11/ (2006)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Verlag Wien
About this chapter
Cite this chapter
Karampelas, P. (2013). Implementation Techniques. In: Techniques and Tools for Designing an Online Social Network Platform. Lecture Notes in Social Networks, vol 3. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0787-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0787-4_5
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0786-7
Online ISBN: 978-3-7091-0787-4
eBook Packages: Computer ScienceComputer Science (R0)