Manuscript for Alibata Browser

Only available on StudyMode
  • Download(s) : 124
  • Published : March 5, 2013
Open Document
Text Preview
ALIBATA WEB BROWSER
ALIBATA WEB BROWSER
A case study submitted to
College of Computer Studies
In partial fulfilment of the requirements
For Software Engineering Course
A case study submitted to
College of Computer Studies
In partial fulfilment of the requirements
For Software Engineering Course

Table of Contents
Title Page1
Table of Contents2
Abstract3
Project Title4
Introduction4
Project Team5
Project Objectives5
Project Conception5
Scope of the Project5 – 7
Project Constraints7
Timeline7
Figure 1.0 – Gantt Chart7
Glossary of Terms8 – 11
Software Engineering Paradigm12
Figure 2.0 – Re-Use Based Development Model12
Activity Diagram (Existing System)13
Figure 3.0 – Existing System13
Fishbone (ISHIKAWA) Diagram14
Figure 4.0 – Problem of Existing System14
Cause and Effect Matrix Table15
Figure 4.1 – Existing System and Solution 15
Stakeholders 16
Use Case Diagram (Proposed System)16
Figure 5.0 – Proposed System16
Use Case Narrative17
Figure 5.1 – 5.5 – Use Case as per Module17 - 21
Use Case Summary22
Figure 5.6 – Summary of Use Cases described22
Non-Functional Requirements22 - 23
Implementation Plan23
Maintenance Plan23

“This is a case study in search for a solution dealing with cybercrime populating the web. Cybersex, hacking, scamming, identity theft, violation of human privacy, fraud, breaking national security, spamming, viruses, malware, adware, spyware and many others, all these happening 24/7 on the web, while at the office, at work, at the school, at the internet cafe or even at home. They are terrifying consumers and on other side being exploited by companies or individuals craving for easy money taking advantage of fast internet browsing.

By careful study, in this manuscript the innovators will know the different facet of web browsing whether online gaming or social networking, security must be implemented with double effort. Activity Diagram and Fishbone Diagram best explain the worst scenario. Using many analytical tools to assure accuracy and reliability so that the solutions found will be updated to the current situation of everyday web browsing. Bringing a Case Diagram will show much of the effort being put here to elaborate the enhanced features being developed for secured web browsing. Timeline, Implementation and Maintenance Plan are also included to ensure that effort and resources are not being wasted but utilized very well. Part of the maintenance plan is making our Web Browser open source to further the development of our very own Filipino Web Browser.” “This is a case study in search for a solution dealing with cybercrime populating the web. Cybersex, hacking, scamming, identity theft, violation of human privacy, fraud, breaking national security, spamming, viruses, malware, adware, spyware and many others, all these happening 24/7 on the web, while at the office, at work, at the school, at the internet cafe or even at home. They are terrifying consumers and on other side being exploited by companies or individuals craving for easy money taking advantage of fast internet browsing.

By careful study, in this manuscript the innovators will know the different facet of web browsing whether online gaming or social networking, security must be implemented with double effort. Activity Diagram and Fishbone Diagram best explain the worst scenario. Using many analytical tools to assure accuracy and reliability so that the solutions found will be updated to the current situation of everyday web browsing. Bringing a Case Diagram will show much of the effort being put here to elaborate the enhanced features being developed for secured web browsing. Timeline, Implementation and Maintenance Plan are also included to ensure that effort and resources are not being wasted but utilized very well. Part of the maintenance plan is making our Web Browser open source to further the development of our very own Filipino Web Browser.”

Project Title:...
tracking img