IA3 Program Overview

Website Structure

Program Structure

Login Page

Register

Home Page/ Breaking News

Preferences/Search

Static

Templates

app.py

config.ini

UserDetails.json

home.html

layout.html

index.html

register.css

signin.css

sticky-footer-navbar.css

Task Requirements

User Interfaces

Documents

Due Dates

Criteria

Part 2

Self-prescribed Criteria

User Story and Context

Algorithms

Usability Features

searchPage.html

Accessibility

Security

Learnability

Effectiveness

utility

Data

userDetails_load()

userDetails_write()

get_api_key()

collect_link(endpoint)

app.route()s

login()

logout()

formswitch()

home()

search()

aDSpreferences()

UserDetails.json

NewsApi links

userEmail: {firstname, lastname, password, language, country, category}

Privacy and Security

Given 6th of June

Draft: 1 August

Final: 11 August

4-5 A3 pages of Research and Investigation

3-4 A3 pages of Data Exchange Solution

A3 page exploring Impacts

2-4 A3 pages of Annotated Code

Bibliography

1-2 minutes Video demonstrating the application

click to edit

Proof of Concept

Proto Personas

Use API Datasets from newsapi.org

View news events from Australia

Filter news events for other English-speaking countries

Filter news events by selected category

Search for news events using keywords

Barry Cade: 53, company CEO

Donny Brook: 28, Film Director

Liv Long: 35, Technology Journalist

Lives in Melbourne

Runs a multi-national finance and investment company with offices in Melbourne, London and New York City

Has a keen interest in all aspects of the entertainment industry

Is an avid follower of American sports

Writes for a technology magazine

Has her own blog where she writes about and reviews new tech products

Prescribed Criteria

Part 1

Part 3

Self-prescribed Criteria

Prescribed Criteria

Self-Prescribed Criteria

Prescribed Criteria

recognition and description of key elements of

– risks associated with storing and accessing data

– digital security strategies, including authentication and encryption strategies

symbolisation using mind maps and one or more of constructed sketches,

annotated diagrams, images or screenshots, and explanation of

– data interface, data structures and data specifications

– digital methods of exchanging data

analysis of the data exchange problem to identify

– the data structures, including data input and output requirements

– data exchange methods

recognition and description of key elements of risks associated with storing and accessing data digital security strategies, including authentication and encryption strategies.

analysis of a data security problem to identify risks to the system, data security and privacy.

Successfully demonstrate a coded solution which fulfills the requirements of a proof of concept described by the

accuracy of code after testing and identify errors and actions to make improvements

functionality, usability and efficiency of the components of the digital solution