Collection as the Cornerstone of Presented by Sara Bishop, Administrative Systems Development West...

14
Collection as the Cornerstone of Presented by Sara Bishop, Administrative Systems Development West Virginia University Office of Information Technology at the 8th International Symposium on Electronic Theses & Dissertations

Transcript of Collection as the Cornerstone of Presented by Sara Bishop, Administrative Systems Development West...

Collection as the

Cornerstone of

Presented by Sara Bishop, Administrative Systems Development

West Virginia University Office of Information Technology

at the 8th International Symposium on Electronic Theses & Dissertations

September 28, 2005

2

Topics of Discussion Brief History Why the Struts Framework? Parallel Initiatives Birth of Viability & Lessons Learned

September 28, 2005

3

Brief History 2nd institution to implement required ETDs Migrated to Oracle platform 2003 Most critical enhancements:

Improved data quality & consistency Enabled secure submissions & access

worldwide User friendly & automated collection

maintenance functions

September 28, 2005

4

Why the Struts Framework?

MVC-based Apache open source framework

Combines use of JSPs & Java Servlets

Separates the user interface from content generation & is platform independent

Data transfer via Data Transfer Objects (DTO)

September 28, 2005

5

Data Transfer Objects

Extend JSPs with custom tag libraries Move functionality from JSP pages to

tag implementation classes Pass entire ActionForm to DTO

Username & password validation Browsing of collections

September 28, 2005

6

Decision Highlights Platform independence

Enhanced performance

Separation of logic from display

Ease of code maintenance

Extensibility & ease of use

September 28, 2005

7

Parallel Initiatives Organization-wide Budget reductions

Content Accessibility

Application Security Risk Assessment Initiative

September 28, 2005

8

Content Accessibility

World Wide Web Consortium (W3C) Accessibility Guidelines

Design without nested tables Design with summary fields Access keys with each HTML button Specialized style sheets

September 28, 2005

9

Application Security

“…information resources are vital assets requiring protection commensurate with their value…must be actively managed to ensure the continued confidentiality, integrity and availability of these resources”.

September 28, 2005

10

App Security Safeguards

Include input validation everywhere

Test for incorrect and correct user behavior

Know who is accessing the application data

Team with your security people

September 28, 2005

11

Birth of

Electronic Institutional Document Repository“…to collect, archive, & provide access to

University’s scholarly research output.”

Success of the eTD Collection lead to additions:

eHT (electronic Honors Theses) eSRA (electronic Scholarly Resources

Archive)

September 28, 2005

12

Viability & Lessons Learned

WVU in-house system is market competitive

Java development tools are versatile Incorporate security checklist as part of

the development cycle Consider accessibility due to global

audience Stay abreast of current trend &

technologies

September 28, 2005

13

The goal of any development projectshould always be to deliver the most

secure and best quality product possible and to assume pride in the responsibility of maintaining that product while keeping pace with

technology.

September 28, 2005

Thank you! Questions?

Future questions please contact at e-mail:

[email protected]