5 1 Research Topics Writing Assignment-1 Srinivas Kavati Prof: Dr. Rick Belhaven

5

1

Research Topics

Writing Assignment-1

Srinivas Kavati

Prof: Dr. Rick

Belhaven University

BUS-771

05-06-2022

Areas of interests

Improvement of business apps

Incorporation of clients’ opinions in business app development

Study into the use of competent programming frameworks

Understanding of threats to business apps

Maintenance of balance between business app scalability and desired security

Leading development teams to deliver quality business apps

Evaluation of areas of interests

Improvement of business apps

Business apps have been used to help organizations serve their clients’ needs more organized and efficient. The business apps have therefore been made to specified business processes of an organization to cut through the needs and preferences of the clients as the business is mandated to deliver to its describers. There has always been a need to improve the features incorporated into a business app. This is because there has been rapid progress in technologies used, and the devices in use today have been upgraded with more functionalities, and it is only right that the business apps be enabled to make use of them.

Incorporation of clients’ opinions in business app development

The idea of helping in the business app development or improvement can be viewed as a worthwhile concept. The clients’ opinions and suggestions can be incorporated into the data analysis that the development team considers as they craft the business apps in relation to the business model and processes that work to serve the needs and preferences of the clients. The question here is how best to collect and analyze clients’ input.

Study into the use of competent programming frameworks

It is a concern that cannot be overlooked about the vulnerabilities that are to be studied as a development team is on the verge of making business apps. The use of competent programming frameworks to help in sealing the product from exploitation by attackers or rather its having vulnerabilities is thus advised. Different programming frameworks present differentiated avenues that may work for the identified purpose. Therefore, it is paramount that the vulnerabilities or exploitation methods that may be used against the business apps be known.

Understanding of threats to business apps

In creating business apps, the developers should be mindful that they cover all possible scenarios of viable attacks. Therefore, the developers should be able to identify the potential enemies to the functionality of the business apps being developed (Farooqi et al., 2020). The concept of abuse and misuse of business apps should be considered in the development of the business apps as the set up of security measures becomes a necessity and prerogative of the development team as they aim to assemble products that stand the test of time and ultimate exploitation attempts.

Maintenance of balance between business app scalability and desired security

In creating secure business apps, the aspect of scalability may be overlooked as inferior to the incorporation of security in the apps. This may therefore have the development team focus on security and have limited efforts into the scalability of the business apps being developed. Therefore, it may be necessary that the development team be mindful of how well to balance the aspects marked out as important for the business apps being crafted.

Leading development teams to deliver quality business apps

All teams need direction. In the direction of developing teams, it may be a question of how well one’s leadership skills are against the needed skills to be used in the project (Ando). In getting a handle on the team’s direction, one may have to work at being a leader and still be a manager in the project.

References

Ando, A. CONCEPTS OF THE COMMUNICATION IN LEADER VS. MANAGER RELATIONSHIP. SCIENTIFIC BOARD, 413.

Farooqi, S., Musa, M., Shafiq, Z., & Zaffar, F. (2020). Canarytrap: Detecting data misuse by third-party apps on online social networks. arXiv preprint arXiv:2006.15794.