'Controlling' Web 2.0 applications in the workplace

Zakaria Maamar, Vanilson Buregio, Noura Faci, Djamal Benslimane, Quan Z. Sheng

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications are on the rise and the lack of guidelines and awareness is a main reason. This paper presents an approach for 'controlling' the social actions that Web 2.0 applications allow users to execute. These actions are identified after analyzing some representative Web 2.0 applications and then defined in terms of stakeholders, content, and tools. The control over these actions is defined with UML Object Constraint Language (OCL) and then demonstrated through a prototype system.

Original languageEnglish
Title of host publicationProceedings of the 19th IEEE International Enterprise Distributed Object Computing Conference
Subtitle of host publicationEDOC 2015
EditorsSylvain Hallé, Wolfgang Mayer
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages191-200
Number of pages10
ISBN (Electronic)9781467392037
DOIs
Publication statusPublished - 5 Nov 2015
Externally publishedYes
Event19th IEEE International Enterprise Distributed Object Computing Conference Workshps and Demonstrations, EDOCW 2015 - Adelaide, Australia
Duration: 22 Sept 201525 Sept 2015

Other

Other19th IEEE International Enterprise Distributed Object Computing Conference Workshps and Demonstrations, EDOCW 2015
Country/TerritoryAustralia
CityAdelaide
Period22/09/1525/09/15

Keywords

  • OCL
  • social action
  • social enterprise
  • Web 2.0 application

Fingerprint

Dive into the research topics of ''Controlling' Web 2.0 applications in the workplace'. Together they form a unique fingerprint.

Cite this