Návrhy Internetových Aplikací

Total Page:16

File Type:pdf, Size:1020Kb

Návrhy Internetových Aplikací Bankovní institut vysoká škola Praha Katedra informačních technologií a elektronického obchodování Návrhy internetových aplikací Bakalářská práce Autor: Jiří Nachtigall Informační technologie, MPIS Vedoucí práce: Ing. Jiří Rotschedl Praha Srpen, 2010 Prohlášení Prohlašuji, že jsem bakalářskou práci zpracoval samostatně a s použitím uvedené literatury. V Praze, dne 24. srpna 2010 Jiří Nachtigall Poděkování Na tomto místě bych rád poděkoval vedoucímu práce Ing. Jiřímu Rotschedlovi za vedení a cenné rady při přípravě této práce. Dále bych chtěl poděkovat Ing. Josefu Holému ze společnosti Sun Microsystems za odbornou konzultaci. Anotace Tato práce se zaměřuje na oblast návrhu internetových aplikací. Podrobně popisuje celý proces návrhu počínaje analýzou za použití k tomu určených nástrojů jako je use case a user story. Další částí procesu je návrh technologického řešení, které se skládá z výběru serverového řešení, programovacích technik a databází. Jako poslední je zmíněn návrh uživatelského rozhraní pomocí drátěných modelů a návrh samotného designu internetové aplikace. Annotation This work focuses on web application design. It describes whole process of design in detail. It starts with analysis using some tools especially created for this purpose like use case and user story. Next part of the process is technical design which consists from selection of server solution, programming language and database. And finally user interface prepared using wireframes is mentioned here alongside with graphical design of the web application. Obsah Úvod ...................................................................................................................................... 7 1. Analýza požadavků........................................................................................................ 8 1.1 Požadavky ............................................................................................................... 8 1.1.1 Typy požadavků .............................................................................................. 9 1.1.2 Dokumentace ................................................................................................... 9 1.2 Use case analýza ................................................................................................... 10 1.2.1 Realizace ........................................................................................................ 10 1.2.2 Popis .............................................................................................................. 10 1.2.3 Třídy analýzy ................................................................................................. 10 1.2.4 Odpovědnosti ................................................................................................. 10 1.2.5 Asociace......................................................................................................... 11 1.2.6 Chování .......................................................................................................... 11 1.2.7 Popis atribut ................................................................................................... 12 1.3 Use cases ............................................................................................................... 12 1.3.1 Zaměření ........................................................................................................ 13 1.3.2 Stupeň detailu ................................................................................................ 14 1.3.3 Notace ............................................................................................................ 15 1.3.4 Šablony .......................................................................................................... 15 1.3.5 Omezení ......................................................................................................... 19 1.4 Use case diagramy ................................................................................................ 20 1.4.1 Use case vztahy ............................................................................................. 21 1.5 User stories............................................................................................................ 22 1.5.1 Vytváření user story....................................................................................... 23 1.5.2 Příklady .......................................................................................................... 23 1.5.3 Použití ............................................................................................................ 23 1.5.4 Výhody .......................................................................................................... 24 1.5.5 Omezení ......................................................................................................... 24 1.6 Shrnutí user stories a use cases ............................................................................. 25 2. Design architektury...................................................................................................... 25 2.1 Serverová řešení .................................................................................................... 26 2.1.1 LAMP ............................................................................................................ 26 2.1.2 WINS ............................................................................................................. 29 2.2 Aplikační vrstva .................................................................................................... 32 2.2.1 PHP ................................................................................................................ 33 2.2.2 Python ............................................................................................................ 34 2.2.3 Ruby............................................................................................................... 35 2.2.4 Java ................................................................................................................ 37 2.3 Databáze ................................................................................................................ 38 2.3.1 MySQL .......................................................................................................... 43 2.3.2 Oracle............................................................................................................. 45 2.3.3 PostgreSQL .................................................................................................... 47 2.3.4 MS SQL Server ............................................................................................. 48 3. Wireframe design ........................................................................................................ 49 3.1 Papírové prototypování ......................................................................................... 50 3.2 Microsoft Office Visio .......................................................................................... 51 3.3 Axure RP Pro ........................................................................................................ 52 4. Visual design ............................................................................................................... 53 Závěr .................................................................................................................................... 56 Citace ................................................................................................................................... 59 Seznam použité literatury .................................................................................................... 60 Seznam obrázků ................................................................................................................... 63 Seznam tabulek .................................................................................................................... 63 Úvod Celosvětová síť Internet zažívá v posledním desetiletí velký rozmach. Není proto divu, že se spousta vývojářů softwarových aplikací začíná orientovat na vývoj internetových aplikací. Na samém počátku se vyvíjely pouze statické webové prezentace, které se postupně doplňovaly o nové prvky, až se postupem času dospělo k propracovaným a složitým aplikacím. Tyto aplikace těží z řady výhod, které běžným uživatelům poskytují. Jde především o možnost přístupu k takové aplikaci prakticky odkudkoliv bez nutnosti jakékoliv instalace. Zároveň ale umožňují chování velice podobné jako běžné aplikace instalované na konkrétním počítači. Průběžně tak vzniká velké množství technologií, nástrojů a platforem, které nabízí vývojářům široké možnosti využití. Hlavním omezujícím prvkem internetových aplikací je tak samotný internetový prohlížeč, přes který se k takovýmto aplikacím přistupuje. V praxi to pak vypadá tak, že aplikace je uživateli prezentována přes internetový prohlížeč pomocí základních technologií, jako jsou HTML, CSS, JavaScript a další. Samotná implementace aplikace však již není závislá na internetovém prohlížeči a jeho schopnostech, ale může být naprosto odlišná. Tato část aplikace je tvořená pomocí serverových technologií, jako jsou PHP, CGI skripty, databáze. Základní podmínkou však zůstává nutnost standardního výstupu, který je schopen internetový prohlížeč správně zobrazit. Hovoříme tak o architektuře klient/server, kde se jeden či více klientů připojují k serveru, na kterém běží potřebné služby
Recommended publications
  • Ujumbo: a Generic Development Toolkit for Messaging Based Workflows
    Ujumbo: A Generic Development Toolkit for Messaging Based Workflows Dept. of CIS - Senior Design 2012-2013 Archit Budhraja Bob Han Sung Won Hwang [email protected] [email protected] [email protected] Univ. of Pennsylvania Univ. of Pennsylvania Univ. of Pennsylvania Philadelphia, PA Philadelphia, PA Philadelphia, PA Jonathan J. Leung Sean Welleck Boon Thau Loo [email protected] [email protected] [email protected] Univ. of Pennsylvania Univ. of Pennsylvania Univ. of Pennsylvania Philadelphia, PA Philadelphia, PA Philadelphia, PA ABSTRACT We began development by consulting local and interna- Many organizations, especially in developing countries often tional nonprofits and small scale organizations that may lack technical expertise, resource, and financial capital neces- require custom platforms in their operations. We gath- sary to build applications with complex logic flows. Looking ered data on their proposed workflows, needed functional- at the different kinds of products on the market, there seems ity, as well as surveyed their available financial resources. to be a lot of commonality between them yet each of them After talking to several resource-constrained and non-profit is developed independently of each other, requiring program- clients, it was observed there was far too much manual com- ming ability and a substantial investment in time and financ- munication. Most organizations we interviewed are physi- ing for each application. Our project aims to reduce these cally entering and processing data on day to day operations, additional costs in building a new application with common often in simple spreadsheet software. They also invest many communication features by creating a generic platform that hours manually calling and text messaging their members for users with non-technical abilities could build off of.
    [Show full text]
  • Web Application Firewall Security Advisory
    Web Application Firewall Web Application Firewall Security Advisory Product Documentation ©2013-2019 Tencent Cloud. All rights reserved. Page 1 of 20 Web Application Firewall Copyright Notice ©2013-2019 Tencent Cloud. All rights reserved. Copyright in this document is exclusively owned by Tencent Cloud. You must not reproduce, modify, copy or distribute in any way, in whole or in part, the contents of this document without Tencent Cloud's the prior written consent. Trademark Notice All trademarks associated with Tencent Cloud and its services are owned by Tencent Cloud Computing (Beijing) Company Limited and its affiliated companies. Trademarks of third parties referred to in this document are owned by their respective proprietors. Service Statement This document is intended to provide users with general information about Tencent Cloud's products and services only and does not form part of Tencent Cloud's terms and conditions. Tencent Cloud's products or services are subject to change. Specific products and services and the standards applicable to them are exclusively provided for in Tencent Cloud's applicable terms and conditions. ©2013-2019 Tencent Cloud. All rights reserved. Page 2 of 20 Web Application Firewall Contents Security Advisory Command Execution Vulnerability in Exchange Server SQL Injection Vulnerability in Yonyou GRP-U8 XXE Vulnerability in Apache Cocoon (CVE-2020-11991) Arbitrary Code Execution Vulnerability in WordPress File Manager Jenkins Security Advisory for September Remote Code Execution Vulnerabilities in Apache Struts 2 (CVE-2019-0230 and CVE-2019- 0233) SQL Injection Vulnerability in Apache SkyWalking (CVE-2020-13921) ©2013-2019 Tencent Cloud. All rights reserved. Page 3 of 20 Web Application Firewall Security Advisory Command Execution Vulnerability in Exchange Server Last updated:2020-12-15 15:20:26 On September 17, 2020, Tencent Security detected that Microsoft issued a security advisory for a command execution vulnerability in Exchange Server (CVE-2020-16875).
    [Show full text]
  • Rapidsms in Rwanda
    Evaluating the Impact of RapidSMS: Final Report A Report Commissioned by UNICEF Rwanda December 2, 2016 Hinda Ruton, MSc1,2 Angele Musabyimana, MD, MSc1 Karen Grépin, PhD3 Joseph Ngenzi1 Emmanuel Nzabonimana1 Michael R. Law, PhD1,2,4 1. School of Public Health, College of Medicine and Health Sciences, University of Rwanda, Kigali, Rwanda 2. Centre for Health Services and Policy Research, The University of British Columbia, Vancouver, British Columbia, Canada 3. Sir Wilfred Laurier University, Waterloo, Ontario, Canada 4. Department of Global Health and Social Medicine, Harvard Medical School, Boston, MA, USA 1 Table of Contents Table of Contents ..................................................................................................................................... 2 Index of Tables and Figures ...................................................................................................................... 4 Tables ...................................................................................................................................................... 4 Figures ..................................................................................................................................................... 4 List of Acronyms....................................................................................................................................... 6 Executive Summary .................................................................................................................................
    [Show full text]
  • Opensource Webframeworks(Cocoon,Struts
    Webframeworks - Teil 2 Cocoon, Jetspeed, Struts und Co. AUTOR Thomas Bayer ) Schulung ) Orientation in Objects GmbH Veröffentlicht am: 1.4.2003 ABSTRACT Nachdem die Frage geklärt wurde, wann ein Framework eingesetzt werden soll, hilft ) Beratung ) Ihnen der zweite Teil bei der Auswahl eines passenden Frameworks. Bei den im Folgenden beschriebenen Frameworks handelt es sich ausschließlich um Open Source Frameworks. Eine kommerzielle Verwendung ist in den meisten Fällen durch die Apache oder LGPL Lizenz möglich. Diese Frameworks sind nicht nur aus Kostengründen immer häufiger in kommerziellen Projekten zu finden. Ein Framework muss leben, es genügt nicht, dass ein Hersteller von Zeit zu Zeit Updates anbietet. Wichtig für die Entscheidung für ein Framework ist die Gemeinschaft der ) Entwicklung ) Entwickler, die das Framework entwickeln und verwenden. Offene Frameworks besitzen meist eine größere Entwicklergemeinde als hochpreisige Produkte. Für diesen Artikel wurden die Frameworks kategorisiert und Überschriften zugeordnet. Die einzelnen Kategorien wie MVC oder Templating Framework gehen teilweise ) ineinander über und sind schwer zu trennen. Besonders das "Schlagwort" MVC beansprucht fast jedes Framework für sich. Artikel ) Trivadis Germany GmbH Weinheimer Str. 68 D-68309 Mannheim Tel. +49 (0) 6 21 - 7 18 39 - 0 Fax +49 (0) 6 21 - 7 18 39 - 50 [email protected] Java, XML, UML, XSLT, Open Source, JBoss, SOAP, CVS, Spring, JSF, Eclipse 5 MVC FRAMEWORKS Die folgenden Jakarta Projekte stehen in enger Beziehung zu Turbine: • Service Framework Fulcrum Fast alle der hier aufgeführten Frameworks behaupten, die Model • Das verteilte Java Caching System JCS View Controller Architektur zu unterstützen. Ein typischer Vertreter, der sich stark auf MVC fürs Web konzentriert, ist Struts.
    [Show full text]
  • The Jakarta Struts Cookbook Is an Amazing Collection of Code
    Jakarta Struts Cookbook By Bill Siggelkow Publisher: O'Reilly Pub Date: February 2005 ISBN: 0-596-00771-X Pages: 526 Table of • Contents • Index • Reviews • Examples The Jakarta Struts Cookbook is an amazing collection of code solutions to Reader common--and uncommon--problems encountered when building web • Reviews applications with the Struts Framework. With solutions to real-world • Errata problems just a few page flips away, this quick, look-up reference is • Academic perfect for independent developers, large development teams, and everyone in between who wishes to use the Struts Framework to its fullest potential. Jakarta Struts Cookbook By Bill Siggelkow Publisher: O'Reilly Pub Date: February 2005 ISBN: 0-596-00771-X Pages: 526 Table of • Contents • Index • Reviews • Examples Reader • Reviews • Errata • Academic Copyright Preface Audience Scope and Organization Assumptions This Book Makes Conventions Used in This Book Using Code Examples Comments and Questions Safari Enabled Acknowledgments Chapter 1. Getting Started: Enabling Struts Development Introduction Recipe 1.1. Downloading Struts Recipe 1.2. Deploying the Struts Example Application Recipe 1.3. Migrating from Struts 1.0 to Struts 1.1 Recipe 1.4. Upgrading from Struts 1.1 to Struts 1.2 Recipe 1.5. Converting JSP Applications to Struts Recipe 1.6. Managing Struts Configuration Files Recipe 1.7. Using Ant to Build and Deploy Recipe 1.8. Generating Struts Configuration Files Using XDoclet Chapter 2. Configuring Struts Applications Introduction Recipe 2.1. Using Plug-ins for Application Initialization Recipe 2.2. Eliminating Tag Library Declarations Recipe 2.3. Using Constants on JSPs Recipe 2.4. Using Multiple Struts Configuration Files Recipe 2.5.
    [Show full text]
  • Terms of References for Trainers in Professional Short Courses in in E-Health
    Terms of References for Trainers in Professional Short Courses in in e-Health I. BACKGROUND AND JUSTIFICATION E-health is one of the key areas on which the East African Community Regional Centre of Excellence in Biomedical Engineering, E-Health, Rehabilitation and Mobility Sciences (CEBE) is focusing. The CEBE aims to increase the knowledge and skills of e-Health workforce in Rwanda and other East African countries for improved healthcare service delivery and e-Health systems management, which is currently quite limited. As more and more health facilities acquire more equipment for diagnosis and treatment purposes, CEBE’s target is to build the capacity of end users, managers, technical personnel and researchers who will design, develop, implement and evaluate e- health systems. 2. Overall Goal of the short course trainings The purpose of this e-health capacity building trainings is to strengthen the knowledge and skills in Rwanda and in the Region for the development and management e-Health applications and systems under the national eHealth enterprise architecture. 3. The specific objectives of the e-health capacity building trainings are as follows: 3.1 Design teaching materials and upload them on the e-learning platform of the University of Rwanda. For any or all of the following five selected e-health short courses a. Telemedicine applications b. Security, privacy and legal framework of health information systems c. Medical Coding d. E-Health: Software Development and Implementation (EHSDI) e. Electronic Medical Records use, Management and Health Information Systems 3.2 Deliver any or all of the five short courses as mentioned above and detailed in Annex 1.
    [Show full text]
  • Apache Cocoon 2
    Apache Cocoon 2 Motivación, Introducción y Explicación Saúl Zárrate Cárdenas Apache Cocoon 2: Motivación, Introducción y Explicación por Saúl Zárrate Cárdenas Este documento se cede al dominio público. Historial de revisiones Revisión 0.0 6 de Mayo de 2002 Revisado por: szc Creación Historial de revisiones Revisión 0.1 5 de Junio de 2002 Revisado por: jidl Correcciones de ortografía y marcado Historial de revisiones Revisión 0.2 17 de Julio de 2002 Revisado por: szc Adición de formato de reunión semanal como apéndice y organización de directorios para las imagenes y los fuentes Historial de revisiones Revisión 0.3 31 de agosto de 2002 Revisado por: fjfs Cambio de formato de imágenes a png y correcciones ortográficas Revisión 1.0 18 de Octubre de 2002 Revisado por: jid Conversión a xml, correccion de errores menores de marcado Tabla de contenidos 1. ¿Por qué Cocoon? ..................................................................................................................................1 1.1. Motivación ..................................................................................................................................1 1.2. Entornos de publicación web (Web Publishing Framework) ......................................................2 2. Cocoon ....................................................................................................................................................3 2.1. ¿Qué es Cocoon?.........................................................................................................................3
    [Show full text]
  • Speed Evidence Evaluation
    World Vision Project SPEED EVIDENCE EVALUATION June 2014 CONTENTS CONTENTS • Objectives • Summary and Analysis • Matrices - Products Against Features - Products Against Standards • Appendices - Appendix A - List of Products Evaluated and Included in the Matrix - Appendix B - List of Products Evaluated and Excluded from the Matrix - Appendix C - List of Features by Product for Products in the Matrix OBJECTIVES OBJECTIVES Based on the features of Speed Evidence • Identify and evaluate products that are able to deliver similar and extended functionality • Compare products using a matrix of products against features SUMMARY AND ANALYSIS SUMMARY AND ANALYSIS It is important to note that this research not based upon first hand experience of the products but on information gleaned from websites and case studies, in some cases inferences were made. • Matrix of products against features - 28 products evaluated against Speed Evidence - Products are evaluated against 33 features under 8 headings • Features - The 33 features are listed under specific headings - E.g. Uploading/downloading surveys, Sends bulk SMS, Twitter feeds, Geo- located data, Easy to manage contacts, Set notifications, Free & easy to set up SUMMARY AND ANALYSIS ●Headings - The 8 headings are assessments, SMS, emails, data feeds, mapping, data management, user experience and other • Top 3 platforms by features - Speed Evidence 31/33 features, 8/8 headings - Ushahidi 21/33 features and 8/8 headings - Palantir Gotham 15/33 features and 7/8 headings • Palantir Gotham is a possible
    [Show full text]
  • Reflexión Académica En Diseño & Comunicación
    ISSN 1668-1673 XXXII • 2017 Año XVIII. Vol 32. Noviembre 2017. Buenos Aires. Argentina Reflexión Académica en Diseño & Comunicación IV Congreso de Creatividad, Diseño y Comunicación para Profesores y Autoridades de Nivel Medio. `Interfaces Palermo´ Reflexión Académica en Diseño y Comunicación Comité Editorial Universidad de Palermo. Lucia Acar. Universidade Estácio de Sá. Brasil. Facultad de Diseño y Comunicación. Gonzalo Javier Alarcón Vital. Universidad Autónoma Metropolitana. México. Centro de Estudios en Diseño y Comunicación. Mercedes Alfonsín. Universidad de Buenos Aires. Argentina. Mario Bravo 1050. Fernando Alberto Alvarez Romero. Pontificia Universidad Católica del C1175ABT. Ciudad Autónoma de Buenos Aires, Argentina. Ecuador. Ecuador. www.palermo.edu Gonzalo Aranda Toro. Universidad Santo Tomás. Chile. [email protected] Christian Atance. Universidad de Lomas de Zamora. Argentina. Mónica Balabani. Universidad de Palermo. Argentina. Director Alberto Beckers Argomedo. Universidad Santo Tomás. Chile. Oscar Echevarría Renato Antonio Bertao. Universidade Positivo. Brasil. Allan Castelnuovo. Market Research Society. Reino Unido. Coordinadora de la Publicación Jorge Manuel Castro Falero. Universidad de la Empresa. Uruguay. Diana Divasto Raúl Castro Zuñeda. Universidad de Palermo. Argentina. Michael Dinwiddie. New York University. USA. Mario Rubén Dorochesi Fernandois. Universidad Técnica Federico Santa María. Chile. Adriana Inés Echeverria. Universidad de la Cuenca del Plata. Argentina. Universidad de Palermo Jimena Mariana García Ascolani. Universidad Comunera. Paraguay. Rector Marcelo Ghio. Instituto San Ignacio. Perú. Ricardo Popovsky Clara Lucia Grisales Montoya. Academia Superior de Artes. Colombia. Haenz Gutiérrez Quintana. Universidad Federal de Santa Catarina. Brasil. Facultad de Diseño y Comunicación José Korn Bruzzone. Universidad Tecnológica de Chile. Chile. Decano Zulema Marzorati. Universidad de Buenos Aires. Argentina. Oscar Echevarría Denisse Morales.
    [Show full text]
  • Using Locational Data from Mobile Phones to Enhance the Science of Delivery
    INFORMATION AND COMMUNICATION TECHNOLOGIES USING LOCATIONAL DATA FROM MOBILE PHONES TO ENHANCE THE SCIENCE OF DELIVERY Ryan Haddad, Tim Kelly, Teemu Leinonen and Vesa Saarinen June 2014 WORLD BANK REPOrt NUMBER ACS9644 USING LOCATIONAL DATA FROM MOBILE PHONES TO ENHANCE THE SCIENCE OF DELIVERY Ryan Haddad, Tim Kelly, Teemu Leinonen and Vesa Saarinen June 2014 WORLD BANK REPOrt NUMBER ACS9644 STANDARD DISCLAIMER This volume is a product of the staff of the International Bank for Reconstruction and Development/ The World Bank. The findings, interpretations, and conclusions expressed in this paper do not necessarily reflect the views of the Executive Directors of The World Bank or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. COPYRIGHT STATEMENT The material in this publication is copyrighted. Copying and/or transmitting portions or all of this work without permission may be a violation of applicable law. The International Bank for Reconstruction and Development/ The World Bank encourages dissemination of its work and will normally grant permission to reproduce portions of the work promptly. For permission to photocopy or reprint any part of this work, please send a request with complete information to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA, telephone 978-750-8400, fax 978-750-4470, http://www.copyright.com/.
    [Show full text]
  • Global Human Rights Monitoring, New Technologies, and the Politics Of
    The European Journal of International Law Vol. 23 no. 4 © The Author, 2012. Published by Oxford University Press on behalf of EJIL Ltd. All rights reserved. For Permissions, please email: [email protected] Global Human Rights Monitoring, New Technologies, and the Politics of Information Downloaded from Philip Alston* and Colin Gillespie** http://ejil.oxfordjournals.org/ Abstract Antonio Cassese’s vision for the future of the international human rights and criminal justice regimes relied critically upon the availability of reliable and systematic sources of information about alleged violations, to be provided primarily by the major interna- tional human rights NGOs. But the reality is that the existing system is problematically at New York University School of Law on December 20, 2012 fragmented, hierarchical, non-collaborative, and excessively shaped by organizational self-interest. The politics of information suggests that, in the absence of significant pressure for change, the major INGOs will continue to adopt a proprietorial rather than a communal approach to reported data. We argue that while new information and com- munications technologies have already demonstrated their potential to transform the existing human rights regime, there is a compelling case to be made for establishing a comprehensive reporting website, open to local actors as well as the international community, and equipped with a collaborative online editing tool that would begin to resemble a human rights version of the Wikipedia. The article explores the many advan- tages of a human rights wiki, and notes the range of choices that would need to be made in order to shape the structure, and modes of organization and management of such an initiative.
    [Show full text]
  • Global Human Rights Monitoring, New Technologies, and the Politics of Information
    The European Journal of International Law Vol. 23 no. 4 © The Author, 2012. Published by Oxford University Press on behalf of EJIL Ltd. All rights reserved. For Permissions, please email: [email protected] Global Human Rights Monitoring, New Technologies, and the Politics of Information Philip Alston* and Colin Gillespie** Downloaded from Abstract Antonio Cassese’s vision for the future of the international human rights and criminal http://ejil.oxfordjournals.org/ justice regimes relied critically upon the availability of reliable and systematic sources of information about alleged violations, to be provided primarily by the major interna- tional human rights NGOs. But the reality is that the existing system is problematically fragmented, hierarchical, non-collaborative, and excessively shaped by organizational self-interest. The politics of information suggests that, in the absence of significant pressure for change, the major INGOs will continue to adopt a proprietorial rather than a communal approach to reported data. We argue that while new information and com- munications technologies have already demonstrated their potential to transform the by guest on April 13, 2015 existing human rights regime, there is a compelling case to be made for establishing a comprehensive reporting website, open to local actors as well as the international community, and equipped with a collaborative online editing tool that would begin to resemble a human rights version of the Wikipedia. The article explores the many advan- tages of a human rights wiki, and notes the range of choices that would need to be made in order to shape the structure, and modes of organization and management of such an initiative.
    [Show full text]