Clark (2014) commented on the essential fact that in today’s tech savvy world, with the advent of social media the security of the media also has become a major concern. Twitter that is one of the increasing social networking sites has taken JVM or Java Virtual Machine for securing the network. This is because of the high performance and scalability of the JVM in better encapsulation as well as performance of the social networking site.
1.1) Aims of the Research Work
The aim of the research work is to find out the effectiveness of Java Programming language in Twitter for security purposes. It also focuses towards the effectiveness of using Java in Twitter for the operation and security of it. Other than this the research work also aims in showing the simple use of Java in creation of twitter accounts.
1.2) Objectives of Research Work
- To understand the essentiality and effectiveness of Java language in security of Twitter accounts and operation.
- To understand the usage of Java in generation of authentication of Twitter accounts along with its operation.
- To understand the whole architecture and language of Twitter.
H0: Usage of Java in twitter helps in securing the account more effectively and efficiently.
H1: Usage of Java in twitter does not help in securing the account more effectively and efficiently.
2) Literature Review
Sashittal et al. (2015) commented on the essential fact that Twitter that is one of the most talked about social networking site has become highly concerned about its security. This is essential for every social networking site in maintaining its security and verifies the authentication of the users using it. This is done in order to prevent the security, reducing the data redundancy as well maintain the consistency of the data and personal information of the users.
2.2) Architectural Overview of Twitter
As commented by Barbera (2014) the architecture of Twitter is pragmatic in nature and hence supports various decision designs. It uses both MySQL as well as distributed database system extensively that is framed through open-source DBMS. It is a highly structured network system that uses Hadoop extensively for partitioning the key-values. Since its operating system is based on real time system it uses Java platform for successful running.
2.3) language Choices
Initially Twitter used Ruby but now it is replaced by Java. Due to some technical debt that occurred due to usage of Earlybird, it was replaced by Java Blender server. This helps in high quality development of protocol servers that increases its performance, flexibility as well as scalability (Kim et al. 2015).
This section of the research proposal deals with the introduction of Java platform in the effective operation of Twitter. It also discusses about the overall architecture of the Twitter along with the choice of language that is useful for the better security and operation of Twitter.
3) Research Methodology
3.1) Research Approach
Bouffard and Lanet (2015) commented on the essential fact that research approach discusses the theories and principles that is related to the research work. The researcher has opted for deductive research approach that is also known as top-down approach that takes up the concepts and theories and narrows it sown that is best suited to the research work.
3.2) Research Design
As commented by Okamoto (2013) the research design can be depicted as the blueprint of the entire research work that helps the researcher in accomplishment of research work in the most successful way. For successful accomplishment of the research work, the researcher has adopted descriptive research design.
3.3) Research Philosophy
The researcher has taken into account the interpretive research design that helps in full utilization of the collected data and acquired knowledge.
3.4) Data Collection Methods
The researcher has opted for both primary and secondary data collection for the research work. Primary data is collected through qualitative as well as quantitative questionnaires to the users and developers (Kaneko and Yanai, 2015). The secondary data is collected from both online and offline sources that includes the journals, articles, books, case studies, websites etc.
3.5) Sample Size
10 Java developers and 50 users of Twitter are interviewed for the accomplishment of the research work.
3.6) Research Ethics
The researcher has to maintain the code of conduct of the university and the organization based on which the research work is done (Barbera, 2014).
Time constraint and lack in budget are the main constraints of the successful accomplishment of research work.
Barbera, P. (2014). Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data. Political Analysis, 23(1), pp.76-91.
Bouffard, G. and Lanet, J. (2015). The ultimate control flow transfer in a Java based smart card. Computers & Security, 50, pp.33-46.
Clark, M. (2014). Using Twitter to Practice Christian Ethics: Technology and Accompaniment. Teaching Theology & Religion, 17(3), pp.223-223.
Kaneko, T. and Yanai, K. (2015). Event photo mining from twitter using keyword bursts and image clustering. Neurocomputing.
Kim, J., Go, N. and Park, Y. (2015). A Code Concealment Method using Java Reflection and Dynamic Loading in Android. Journal of the Korea Institute of Information Security and Cryptology, 25(1), pp.17-30.
Okamoto, M. (2013). Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?. International Journal of Network Security & Its Applications, 5(5), pp.1-10.
Sashittal, H., Hodis, M. and Sriramachandramurthy, R. (2015). Entifying your brand among Twitter-using millennials. Business Horizons, 58(3), pp.325-333.