Describe about the Project Research and Investigation Report for Online Transactions.
Development of an OTP system is an important part of secure online payment methods. The system is developed based on some requirements or future insights that may enable the online transactions popular among regular subscribers because of useful and time saving applications (Yigitbas et al. 2016). The main objectives of development of this system are to enhance the security and accuracy of the online payment methods without involving real cash. The OTP system requires a number of features – the payment method and the details are to be shown clearly so that the subscriber can understand properly; the interface should be user friendly and less time consuming, so that more users are interested in using the system.
In this report, a project suggestion has been provided for the development of a OPT system by selecting the most suitable methodology.
Existing Systems
There are many existing systems where OTP is currently used. Some of these are as follows.
Banking Transactions and ATMs– Nowadays, One Time Password system is widely used in online transactions that involve the user’s bank account. The user buys some product from an online retail shop and the payment mode is online. Hence, the user will pay online using his credit / debit card’s serial number (Tandon et al. 2013). However, without any authentication, the payment cannot be done. Hence, the bank sends a One Time Password (OTP) to the user’s registered mobile number that he must enter during the last stage of payment so that the process can go ahead. However, this password has a short life span (about 5-10 minutes) after which, it expires and the transaction fails. This is also applicable during withdrawal of cash from an ATM.
Password Authentication in Emails and other Online Accounts – OTP is also widely used in authentication of passwords in emails and other online accounts. During a time, a user may chose to change his password of his account. However, this can also be done by an unethical user. Hence, for authentication, the website sends an OTP to the user’s personal email or mobile number for authentication. Generally, this type of OTP does not have a short life span but failure to use it for authentication may result in temporary lock of the account (Huang and Huang 2013). The same procedure is also followed while creating a new account. For example, a user chooses to start an account in Facebook. Accordingly, he does by using his email account and / or mobile number. For authentication, Facebook will send him an OTP to his mobile number or email account that he will have to use to authenticate and get started with his account.
Security Token – Nowadays, OTP is also used for authentication of security tokens. Security tokens are electronic key for access to something that is protected. In this process, a user registers his fingerprint or retina scan that will be the authentication method for access (Devi et al. 2014). However, in order to authenticate whether the right person is giving the scans, an OTP is sent to the phone number of the user. Using this, he can confirm his identity and verify his access.
There are different methodologies available for software development. Some of them are as follows.
Agile Software Development Methodology – Agile Software Development Methodology is conducted through a series of iterations for the execution of large scale software development projects. Each iteration is actually taken as a miniature project as it takes a lot of steps and if one error occurs, the iteration is repeated (Weber 2016). This is why, agile methodology is an extremely lengthy process that takes up huge amount of time and resources. However, the main advantage of this methodology is that the outcome is always error-free. Due to its lengthy process and change of internal coding, this is not suitable for user interface development.
Dynamic Systems Development Model Methodology – This methodology is a modification of agile methodology in which the iterations are modified and changed with the changing demands of the system or client. For this purpose, the overall development project is divided into several parts, each having a particular deliverable (Eason 2016). At the successful completion of one iteration, that deliverable is quickly released from the overall project structure. Hence, the products from the project are delivered faster that agile methodology.
Extreme Programming (XP) Methodology – This is special kind of methodology that is specifically used in unstable environments. This is because, this particular methodology provides a lot of flexibility support and hence, developments can be done in unstable environments (Park, Kim and Jeong 2013). However, the main issue of this methodology is that the change in requirement in the last stages of development inflicts a very high amount of cost as the deliverables are pre-set in this methodology.
Joint Application Development (JAD) Methodology – The Joint Application Methodology or JAD is a methodology that is conducted through joint venture of the vendor and the client. In other words, the client and the vendor management team go through some meeting sessions to clarify the exact requirements of the clients (Despa 2014). After that, a series of workshops are conducted for preparation of the project plan. In these workshops, the project deliverables are prepared in the available technical setup and the developers prepare themselves for final development. Hence, this methodology is more business oriented rather than technical and hence, it is applicable for user interface designs.
Rapid Application Development (RAD) Methodology – This methodology is emphasized on the planning of the processes to be conducted rather than on the planning of the project (Dissanayake et al. 2014). Hence, once the deliverables are set, the project planning documentation is prepared and the methods to be used for executing the methodology is followed from the documentation.
The chosen methodology is Joint Application Development (JAD) Methodology as it is the most suitable methodology for the development of the user interface system. This methodology is based on the client requirements rather than the functions proposed by the company. The project planning of the development using JAD is developed through a series of workshops (Gilbert 2016). When the company (vendor) comes in a mutual agreement with the client regarding the user interface, the development is initiated. As the deliverables is set by mutual agreement with the client, the development can be done with a specific end goal and it is the most suitable methodology for user interface development.
The JAD methodology can be easily conducted in the latest technical setup available to the developers. However, without some workshops, execution of the methodology is not possible. In the workshops, the project is planned using documentation, worksheets, diagrams, and props that are useful for documenting and planning the flow of work using this methodology (Eason 2016). After analyzing the client requirements, the developers need to go through some workshops for preparation of the project plan. In these workshops, the project deliverables are prepared in the available technical setup and the developers prepare themselves for final development.
The JAD methodology significantly reduces the cost and time required for preparation of the system for developing user interface. Moreover, changes of wrong iterations are reduced as workshops are conducted prior to the actual development.
The resources required for the JAD methodology are as follows.
Resource |
Function |
Technically Updated Computers |
For the development of the user interface according to requirement |
Interface Tools |
For creating and adding different elements in the designed interface |
Debugging Softwares |
For identifying and removing bugs in the user interface |
System Firewall |
For protecting the system from loss of work due to external and internal attacks |
Testing Systems |
For testing the developed interface in different systems and software environments |
Conclusion
From the discussion in the report, it can be concluded that the best methodology for OTP development is Joint Application Development (JAD) Methodology as it is the most suitable methodology for the development of the user friendly and secure system. The OTP system requires a number of features – the payment method and the details are to be shown clearly so that the subscriber can understand properly; the interface should be user friendly and less time consuming, so that more users are interested in using the system. One Time Password system is widely used in online transactions that involve the user’s bank account. OTP is also widely used in authentication of passwords in emails and other online accounts. During a time, a user may chose to change his password of his account. However, this can also be done by an unethical user. Hence, for authentication, the website sends an OTP to the user’s personal email or mobile number for authentication. Nowadays, OTP is also used for authentication of security tokens. Hence, the most suitable methodology must be chosen in order to develop the OTP system. JAD methodology is based on the client requirements rather than the functions proposed by the company. The JAD methodology can be easily conducted in the latest technical setup available to the developers. In the JAD workshops, the project is planned using documentation, worksheets, diagrams, and props that are useful for documenting and planning the flow of work using this methodology.
References
Despa, M.L., 2014. Comparative study on software development methodologies. Database Systems Journal BOARD, 5, p.3.
Devi, D.S., Thilagavathy, K., Vaghula Krishnan, S., Harish, S. and Srinivasan, R., 2014. Integrating OTP authentication service in openstack. In Advanced Materials Research (Vol. 984, pp. 1309-1317). Trans Tech Publications.
Dissanayake, N.R., Dias, G.K.A., Al-Shalfan, K.A. and Al-Shalfan, K.A., 2014. What does the AJAX Rich Internet Applications need to Support the Rapid Application Development?. A Vision System for Vehicle Driving Safety Assistance, p.1.
Eason, O.K., 2016. Information Systems Development Methodologies Transitions: An Analysis of Waterfall to Agile Methodology.
Fischer, H., Yigitbas, E. and Sauer, S., 2015, September. Integrating Human-Centered and Model-Driven Methods in Agile UI Development. In INTERACT 2015 Adjunct Proceedings: 15th IFIP TC. 13 International Conference on Human-Computer Interaction 14-18 September 2015, Bamberg, Germany (Vol. 22, p. 215). University of Bamberg Press.
Gilbert, A.L., 2016. 25 Information Technology Transfer: The Singapore. Technology Transfer in the Developing Countries, p.320.
Halbrügge, M., Quade, M., Engelbrecht, K.P., Möller, S. and Albayrak, S., 2016, September. Predicting user error for ambient systems by integrating model-based UI development and cognitive modeling. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 1028-1039). ACM.
Huang, C.H. and Huang, S.C., 2013, October. RFID systems integrated OTP security authentication design. In Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific(pp. 1-8). IEEE.
Khaddam, I., Barakat, H. and Vanderdonckt, J., 2016. Enactment of User Interface Development Methods in Software Life Cycles. In ROCHI–INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION(p. 26).
Miñón, R., Paternò, F., Arrue, M. and Abascal, J., 2016. Integrating adaptation rules for people with special needs in model-based UI development process. Universal Access in the Information Society, 15(1), pp.153-168.
Park, G.Y., Kim, Y.M. and Jeong, C.H., 2013. Development of Testing Platform for Digital I and C System in Nuclear Power Plants.
Rambhia, A., Syed, H. and Doran, E., Microsoft Technology Licensing, Llc, 2015. Contextual search using natural language. U.S. Patent Application 14/875,143.
Tandon, A., Sharma, R., Sodhiya, S. and Vincent, P.D.R., 2013. QR Code based secure OTP distribution scheme for Authentication in Net-Banking. International Journal of Engineering & Technology, pp.0975-4024.
Weber, E.V., 2016. Performance Learning of Agile Methodology Using Paired Courses of Systems Analysis and Design and Web/Mobile Programming. In Proceedings of the EDSIG Conference ISSN (Vol. 2473, p. 3857).
Yigitbas, E., Kern, T., Urban, P. and Sauer, S., 2016, June. Multi-device UI Development for Task-Continuous Cross-Channel Web Applications. In International Conference on Web Engineering (pp. 114-127). Springer International Publishing.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download