IA3 Program Overview
Website Structure
Program Structure
Login Page
Register
Home Page/ Breaking News
Preferences/Search
Static
Templates
app.py
config.ini
UserDetails.json
home.html
layout.html
index.html
register.css
signin.css
sticky-footer-navbar.css
Task Requirements
User Interfaces
Documents
Due Dates
Criteria
Part 2
Self-prescribed Criteria
User Story and Context
Algorithms
Usability Features
searchPage.html
Accessibility
Security
Learnability
Effectiveness
utility
Data
userDetails_load()
userDetails_write()
get_api_key()
collect_link(endpoint)
app.route()s
login()
logout()
formswitch()
home()
search()
aDSpreferences()
UserDetails.json
NewsApi links
userEmail: {firstname, lastname, password, language, country, category}
Privacy and Security
Given 6th of June
Draft: 1 August
Final: 11 August
4-5 A3 pages of Research and Investigation
3-4 A3 pages of Data Exchange Solution
A3 page exploring Impacts
2-4 A3 pages of Annotated Code
Bibliography
1-2 minutes Video demonstrating the application
click to edit
Proof of Concept
Proto Personas
Use API Datasets from newsapi.org
View news events from Australia
Filter news events for other English-speaking countries
Filter news events by selected category
Search for news events using keywords
Barry Cade: 53, company CEO
Donny Brook: 28, Film Director
Liv Long: 35, Technology Journalist
Lives in Melbourne
Runs a multi-national finance and investment company with offices in Melbourne, London and New York City
Has a keen interest in all aspects of the entertainment industry
Is an avid follower of American sports
Writes for a technology magazine
Has her own blog where she writes about and reviews new tech products
Prescribed Criteria
Part 1
Part 3
Self-prescribed Criteria
Prescribed Criteria
Self-Prescribed Criteria
Prescribed Criteria
recognition and description of key elements of
– risks associated with storing and accessing data
– digital security strategies, including authentication and encryption strategies
symbolisation using mind maps and one or more of constructed sketches,
annotated diagrams, images or screenshots, and explanation of
– data interface, data structures and data specifications
– digital methods of exchanging data
analysis of the data exchange problem to identify
– the data structures, including data input and output requirements
– data exchange methods
recognition and description of key elements of risks associated with storing and accessing data digital security strategies, including authentication and encryption strategies.
analysis of a data security problem to identify risks to the system, data security and privacy.
Successfully demonstrate a coded solution which fulfills the requirements of a proof of concept described by the
accuracy of code after testing and identify errors and actions to make improvements
functionality, usability and efficiency of the components of the digital solution