Building Quality into Web Applications - Meeting the Challenges of Testing and Usability Paula Duchnowski CQA, CSTE (608)

Slides:



Advertisements
Similar presentations
Cultural Heritage in REGional NETworks REGNET Project Meeting Content Group
Advertisements

High level QA strategy for SQL Server enforcer
QA practitioners viewpoint
Topics to be discussed Introduction Performance Factors Methodology Test Process Tools Conclusion Abu Bakr Siddiq.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MIS 2000 Class 20 System Development Process Updated 2014.
Chapter 4 Quality Assurance in Context
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
MyFloridaMarketPlace Roundtable Technical/Networking Presentation March 19, :00 a.m. – noon.
Stepan Potiyenko ISS Sr.SW Developer.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Testing and Quality Assurance Testing Web Applications.
Introduction to z/OS Basics © 2006 IBM Corporation Chapter 8: Designing and developing applications for z/OS.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Chapter 9: Moving to Design
Computer Security: Principles and Practice
Glenn Research Center at Lewis Field Software Assurance of Web-based Applications SAWbA Tim Kurtz SAIC/GRC Software Assurance Symposium 2004.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
IT CAREERS Prepared by: Careene McCallum-Rodney. Computer Technician  Computer technicians:  install,  repair,  maintain,  and analyze many different.
Software Performance Engineering Failure Modes and Effects Analysis Presented by Kevin Mobley.
Testing Web Based Applications Differences in Traditional Legacy Testing vs. Web Systems Testing.
Web Development Process Description
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Software Testing (Part-II) Lecture Software Testing Software Testing is the process of finding the bugs in a software. It helps in Verifying and.
Chapter 2 The process Process, Methods, and Tools
System Analysis and Design
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Chapter 2 The Process. 2 Process  What is it?  Who does it?  Why is it important?  What are the steps?  What is the work product?  How to ensure.
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Dreamweaver Domain 3 KellerAdobe CS5 ACA Certification Prep Dreamweaver Domain 6 KellerAdobe CS5 ACA Certification Prep Dreamweaver Domain 6: Evaluating.
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
Teaching material for a course in Software Project Management & Software Engineering – part II.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 8 Slide 1 Software Prototyping l Rapid software development to validate requirements.
Software Development Software Testing. Testing Definitions There are many tests going under various names. The following is a general list to get a feel.
Auditing Information Systems (AIS)
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
IS Methodologies. Systems Development Life Cycle - SDLC Planning Planning define the system to be developed define the system to be developed Set the.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Prototyping Rapid software development to validate requirements.
Network design Topic 6 Testing and documentation.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT.  System and Software  System Engineering  Software Engineering  Software Engineering Standards  Software Development.
LOGO TESTING Team 8: 1.Nguyễn Hoàng Khánh 2.Dương Quốc Việt 3.Trang Thế Vinh.
Compuware Corporation Deliver Reliable Applications Faster Dave Kapelanski Automated Testing Manager.
Process Asad Ur Rehman Chief Technology Officer Feditec Enterprise.
What is a level of test?  Defined by a given Environment  Environment is a collection of people, hard ware, software, interfaces, data etc.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Tool Support for Testing
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Software Architecture in Practice
Quality Management Perfectqaservices.
Managing Multi-user Databases
IS4680 Security Auditing for Compliance
Presentation transcript:

Building Quality into Web Applications - Meeting the Challenges of Testing and Usability Paula Duchnowski CQA, CSTE (608)

2  The challenges of Web testing  Special types of tests for Web-based systems  When and how to conduct usability tests Topics of Discussion

3 Source: Jupiter/NFO Consumer Survey 53% 24% 9% 1% 13% 53% did not leave the site 24% returned, only after going to competitor’s site 13% did not return to the site after completing session 9% left the site, never returned 1% unknown Functionality Design Usability Content Scalability Performance User reaction to web site problems 47% left site Importance of Quality on the Web

4 Internet Challenges: Process Primary Challenge: Moving at ‘Web’ speed - how can testing keep pace? Iterative, incremental OO development methods Increased focus on Usability Increased focus on Quality: 40% of users will NOT return to a site if their experience is negative

5 Internet Challenges: Technical Architecture multi-tiered: Multiple points of failure Elimination/fuzzy boundaries between customer and business systems Open access requires strict security

6 Web Testing must be FAST! Don’t have weeks to test - maybe days Risk-based testing Iterative & incremental

Traditional Waterfall Life Cycle Analysis Design Build TEST Implementation

8 Web Development Life Cycle (Web DLC) Development is iterative Testing must transform into an iterative and incremental approach that mirrors development

9 What about Iterative Development? Prototypes & mini-builds that continue to evolve in an incremental and iterative life cycle Each iteration is tested - depth of test increases

10 What about Iterative Development? (continued) Testing: As with other deliverables- develop mini-builds of test plans. The test assets will evolve and grow with the application itself until it reaches its final maturity Will need test environment early to perform some level of verification on prototypes and other iterations

11 Link verification & continuity Configuration tests Security Load and performance testing Usability testing Web - More Types of Tests

12 Link Verification and Continuity Verification: each link has to have a destination Continuity: each link goes to the proper destination

13 Link Verification Tools that can evaluate missing / dead links Difficult to test all links manually Tools won’t test link continuity

14 Platform and Browser Tests

15 Configuration / Platform Too many combinations to realistically test ALL Know user profile –Most common configurations Full test on one or two configurations Sub-set of tests on other support configurations

16 Configuration Testing Don’t wait ’til final stages Supported configurations will impact design Test early on different combinations Need a LAB I can’t believe I didn’t test this in Netscape!

17 Security Testing Validates that the application is protected from unauthorized use Ensures data protected from unauthorized access and/or modification

18 Security Testing (continued) Security needs to be considered through all phases of a project Define a Security Policy and tailor for risk facing a certain system Tests focus on ensuring that policies are followed

19 Common Security Considerations Password security Encryption of data ( including passwords!) Firewalls Data access by non-UI means Virus detection Transmission logging Physical security

20 Stress & Load Testing Subject site to extreme conditions (high transaction volume, large database size, etc. Identifies impact of system on processing time, storage and other applications Know customer & transaction profile

21 Stress and Load Testing Measure the Following Breaking point: a.k.a. “performance knee” Throughput: Hits per second that system supports Response time: Time to respond to a piece of information Download time: Time to load images Round-trip time: Total transaction time (include connection & processing)

22 More Stress and Load Things to Measure Stress the servers, network, and database Monitor: –CPU usage –Disk space –Memory utilization –Memory leaks

23 Usability Testing An objective and efficient way to assess how well your Web site works for target users

24 Usability Testing Measures Ease of use Ease of learning Appeal Efficiency Usability testing measures your site at any stage of development for:

25 Why Usability Test a Web Site The average Web site has 11 “usability catastrophes” that prevent users from completing a task (Nielsen) On average, only 42% of users are able to find specific information on the Web (Spool) If their first experience is negative, 40% of users will not return to a site

26 Benefits of Usability Testing Increase the user’s task efficiency and success rate Find problems early in design and correct them Increase sales Gain repeat users Increase user satisfaction

27 Primary Usability Techniques Prototyping –Paper or online (low-fi or hi-fi) Heuristic evaluation by usability expert Observation –Various user profiles Recording and analysis of user sessions

28 Usability Testing Equipment  Paper  Pen/markers  Post-its  Stopwatch  Tape recorder  Computer w/logging software  Usability Lab Simple …………….. to Complex

29 Activities in the Web DLC to assure Web site Quality

30 Analysis Identify testing requirements by developing the testing strategy Project requirements should consider security, usability, configuration

31 Design Develop test cases Usability test design –Use white board drawings –Paper Prototypes Prepare the test environment: Create lab Install test tools

32 Design (continued) Facilitate review of key work products Train test team Establish defect repository Update test strategy Develop Unit Test Checklists

33 Build Conduct Unit testing Develop test cases Develop test scripts Facilitate code reviews

34 Build (continued) Create / maintain test data Finalize Test environment Create / maintain test data Track defects

35 Test Test execution –For tests identified in the test strategy Track & monitor defects Analyze test results Develop testing summary reports Establish regression test suite

36 Test - Usability Test with different users Test online prototypes Record and/or observe user experiences

37 Implementation Regression test enhancements / fixes Continue to track defects Conduct usability tests to identify improvements / enhancements

38  The challenges of Web testing  Special types of tests for Web-based systems  When and how to conduct usability tests Summary

39  Comments?  Questions? Q&A