10 Domains of Web Development
This list is inspired by the CISSP Domains of Information Security. The CISSP domains provide a clear path towards areas of study in the assessment and management of various security concerns. The primary advantage to this form of knowledge organization is in communicating a set of decision-making skills appropriate to a single area of concerns where those concerns together to encompass the required general body of knowledge.
The 10 domains are as follows:
- Events and Interaction
- Internationalization / Localization
- Understandability / Content
This list is not exhaustive and open to scrutiny. If anybody reading this has a difference of opinion please open a Github issue and share it. This list should be challenged and could very well be wrong.
Accessibility (a11y) is the means of intentionally providing content, services, and products to audiences in a way that is anti-discriminatory. The primary concentration is to ensure equivalent access to users with disabilities who may require the use of assistive technologies. Improvements to accessibility benefits everybody by ensuring content is better organized, easier to understand, and easier to access. The five primary disability categories of concern by web technologies are: auditory, cognitive, epileptic, motor reflex, and visual.
Most information on the web is conveyed by a plurality of formats expressed as text. Due to this auditory assistance is typically only required with media that contains an auditory signal such as video or a sound clip. Auditory assistance can be accomplished by providing text captions embedded into a video allowing the conveyed speech to be read visually by the audience as it is spoken and conveyed in the video or through providing a text equivalent of the conveyed speech.
Cognitive impairment typically represents a wide diversity of behavioral, intellectual capacity, and neurologic conditions that impact greater potential for fluid comprehension and retention of information according to a common person standard. The most common ways to reduce cognitive barriers are to reduce educational requirements to use or consume content and to ensure content is well organized and properly described. Examples of cognitive violations may include poorly organized content, interactions that changes or removes information without indication, content that changes in response to an automatic delay, content that hides or suppresses other content, or content/interactions that are misleading or unclear. See the section on Understandability for additional information.
Photo-sensitive epileptic seizures can be triggered through repeated flash or rapidly changing visual impulses. The standard guidance from WCAG 2.0 is to ensure stark contrasts of colors or visual flickers occur at a rate of slower than 3 times per second.
Motor reflex disorders impacts the body's finer coordination and dexterity. Missing or impaired extremities and digits, though not an indication of degraded motor control, is included in this category as the result is an impairment of access by means of physical interaction. The primary considerations for conformance is proper order of keyboard focus state, ensuring the focused element is clearly visible, and that interactive controls space apart enough to ease access by mouse users who have less steady hands.
Most accessibility efforts are invested towards vision impaired users. Vision impairment includes limited vision, blurring, color blindness, partial blindness, and complete blindness. Blind users typically use text reading applications to read textual content and descriptive meta data aloud by a synthesize voice. Different text readers will navigate the content of a web page in various different ways. The order of content, page structure, description of content, and order of headings is extremely important. This demands a strict understanding of HTML, semantics, and description. An additional technology, Accessible Rich Internet Applications (ARIA), is provided to allow additional description and navigation for text readers. A secondary visual concern is to ensure color contrast meets the standards specified by the WCAG.
Architecture is the means of organizing and planning technical requirements, business requirements, and available resources into a product, service, or offering as envisioned by identified stakeholders. This is typically severely under represented as merely a means of organizing software components. A more accurate characterization are these terms applied broadly: planning, organization, and execution. The primary objective is all about making basic decisions early and documenting them so their influences upon creativity and direction are known and intentional. Dwight D. Eisenhower once said:
Plans are worthless, but planning is everything.
It is safe to assume if a given technology architecture is separated from business input the needs of the business will grow independently of the technology without hope of resolution. This distancing will eventually result in a critical impasse where business decisions are invariably constrained by limitations of the software system or where the software system must be replaced by a separate system at incredible expense.
- Separation of Concerns
- System Architecture
- The Operations Process, Army
- Design Methods
- Requirements Analysis
Data is atomic particles of primitives or symbols that convey an informational asset directly. In the context of software design data is typically represented as types as supported and defined by a given language or system. In the specific context of transmission data is conveyed in various structures, such as: XML, JSON, YAML, and various similar formats. When data is organized properly into a structure that is self-descriptive and easily understood by the consuming humans and executing automation systems it becomes information as defined by the DIKW model of shared wisdom.
The most common and preferred means of formatting data for the web is JSON format due to its minimal syntax, terseness, and primitive nature. In most cases intelligent data structures are not demanded by most current web applications. In this case data is structured in a way that is manually defined and populated by primitive data facets. This structure can be transferred across the wire as demanded and easily consumed by the receiving application provided the structure of the data is already known to the receiving application. One limitation of this approach is that data structure definitions cannot be dynamically adjusted to meet the demands of changing applications. Another limitation is that since the data structure provided by JSON is primitive meta-data descriptions, and thus context, cannot be reasoned from the data in any sort of automated means.
Events and Interaction
It is important to understand the so called event loop and how it has architectural implications far beyond user interaction. The event loops is a means of explaining a model of asynchronous execution in a single threaded language.
- DOM on-event handlers
- Using and Declaring Callbacks
- Node Events
Internationalization / Localization
Internationalization (i18n) is the means of a software application's ability to adapt content, presentation, and data facets to the conventions and customs of a regional or geo-political locale. Such changes may include changes to currency symbols, data/time formats, presentation of numbers, and different human written language. Localization is the process of defining and adding the various definitions for a given locale to an internationalization process.
One of the more challenging aspects of internationalization is accounting for time zones. Dates and times can be gathered from a server or local computer in an automated way and often quite easily. Rarely are time zones associated with that data and when it is available it remains extremely challenging to normalize or translate. The most normalized and standard time zone is Coordinated Universal Time (UTC), which is also known as Zulu time. Zulu time observes definitions similar to the more commonly known Greenwich Mean Time (GMT), but is more precise due to leap seconds and does not change seasonally like daylight savings time. Other time zones are defined according to local politics only and those boundaries may not align with other political boundaries like country or state borders. Time zone boundaries are periodically subject to change in response to political redefinitions and seasonal changes, such as day lights savings time. Time zones are typically defined as a positive or negative offset to GMT on the whole, half, or quarter hour. With consideration for these variables it is possible, in some locations, to travel from the North Pole to the South Pole directly and cross through 6 or more time zones.
- Localization and internationalization, what's the difference?
- W3C Internationalization Activity
- Internationalized Resource Identifier
Presentation is the means of supplementally enhancing a given communication to intentionally alter how an audience perceives the communication without manipulating or interfering with the communication. Typically presentation refers to a visual enhancement, but may also refer to certain interactive experiences and certain limited adjustments of media, such as modifications to play back speed.
The primary purpose of presentation is to alter human perceptions and behaviors when consuming content. This can means something as benign as making content easier to understand and consume by window dressing its appearance. It can also seek to incite deliberate cognitive emotions for the express purpose of manipulating opinions and emotions.
Cascading Style Sheets
The most common application of presentation is through CSS code. It is important to understand how presentation can touch accessibility, security, and understandability in both positive and negative ways to ensure a given software application reaches a wider audience in a non-malicious and anti-discriminatory ways.
To reduce risks to accessibility, internationalization, semantics, and other important considers it is imperative that presentation code be fully separated from data, content, architectural code, and all manners of data structures. Separated CSS is easier to maintain and alter without needing to change the enhanced resource.
- W3C - Cascading Style Sheets
- Accessibility Features of CSS
- Responsive Design
- Google, Mobile Friendly Test
- Separation of Presentation and Content
Security is the process of identifying risks and progressively reducing, eliminating, or isolating them. Risks are any interference to a provided business activity that disrupts, defaces, or denies that activity. Risks are not always known qualities and are frequently unknown. Threats are identified vectors known to cause some amount of risk.
Security threats can be something as obvious as a malicious agent actively seeking to destroy a given service or product. Security threats can also be accidents and minor unintentional behavior, such as a small software bug that is exposed from a combination of features not anticipated by the software authors.
The iSC(2) organization has identified several areas of security concern of which many are not connected to any malicious behavior. It is the job of a security manager to reduce all risks where possible without regard for malicious intent. This can mean preventing legal civil suits, reducing software defects, reducing unauthorized entry, reviewing software architecture, enforcing data sensitivity, and so forth.
Software violations can occur anywhere from accidentally and poorly written content that damages a brand to a complete denial of service from a malicious criminal. In software the most common threats occur from users exposing and engaging software defects. Frequently this behavior is not malicious and may even be completely unintentional. The most dangerous web software vulnerabilities typically occur from malicious individuals finding and abuse software with poor user security.
The most destructive threat vector are referred to as the insider threat. Typically this refers to employees of a provided organization, but it includes anybody who provided deliberate access to confidential materials. Again, this sector is most commonly experiences without any negative intent, such as a developer releasing code that causes a defect in production.
It is necessary to be aware of common security threats to the development of web applications and ensure these threats are eliminated or mitigated. Many such problems can be addressed through policies and automated controls, but sometimes manual intervention is required to sufficiently reduce a threat to acceptable levels.
- Systems Security Certified Practitioner
- Online Web Application Security Project
- Payment Card Industry, Data Security Standard
- Internet Security
- Transport Layer Security
- HTTP access control
- Cross-Origin Resource Sharing
- List of useful HTTP headers
The ability to extend data is referred to as semantics and means of discovering more precise definitions from parts of a larger whole are referred to as context. Understanding how to implement these concepts allows automation tools to extend, mutation, selectively store, and transfer content independent of manual human intervention. This is the foundation of the data-oriented approach to artificial intelligence. The web platform has a natural advantage with regard to artificial intelligence because it is highly distributed. Various applications operating remotely doing different automated tasks are capable of benefiting from shared data generated by other unrelated systems so long as such data remains available. This is the focus of research referred to as the Semantic Web.
Semantics is the means of intentionally describing content with meta data. Application of semantics is essential to the success of accessibility and search engine optimization (SEO). For example, Google's backlinks strategy would be considered a semantic technology approach. When considered as part of the architectural process semantics can result in more meaningful content that is communicated directly, which has second and third order consequences to the business from the resulting influences upon user behavior.
A meta-data description could be structured wherein a piece of meta-data extends the definition of an enclosed meta-data facet, which means content is described and the definition of that description is extended. This is referred to as structured meta-data and is exemplified by lists in HTML when used appropriately.
Structured meta-data is the cornerstone of the RDF series of technologies and is a huge influence upon the design of XML Schema language. The advantage of an RDF similar technology is that the relations between data facets influences how data-facets are described and extended, which means the relations between nodes is just as important as their definition. This phenomenon is somewhat observed when walking the DOM on well written HTML.
The primary difference between an RDF system and the DOM is explicitness and state. In an RDF like system the data graph is saved explicitly so that it can be queried as a database system. The W3C defined such a query language called SPARQL.
Distributed Data and Hyperlinking
Semantics isn't limited to local extensions of data. The web is a highly distributed system and the semantic web is an evolution of that distribution. The primary design goal of the semantic web is to allow additional data, supplementation, and new data definitions through hyperlinking. The idea is that by making data openly available in a standardized and commonly consumed format such data is available to a variety of applications each with their own reasoning upon that data. The ability to gather disparate reasoning capabilities and combine those capabilities in new ways is the very definition of shared knowledge according to the DIKW model of wisdom. This is the foundation behind reasoning based artificial intelligence, and a form of this approach is commonly referred to as heuristics.
- DIKW Pyramid
- Semantic Web
- Search Engine Optimization
- Google provides backlink tool for site owners
- XML Namespaces
Transmission is the means of moving data from one location to another. The primary transmission technology of the web is HTTP an application layer protocol that rides over the TCP transmission stack. HTTP almost exclusively operates against an addressing scheme called URL, which is the more common form of URI technology.
Transmissions can occur in a single instance or in a plurality. They can be static (human initiated) or dynamic (application initiated). They be synchronous (blocking) or asynchronous. The web is a highly distributed system and transmission capabilities are the primary enabling technology behind that distribution.
Because transmission capabilities are so profoundly essential there is a great amount of flexibility in where and when they may occur in a given application. This great flexibility also suggests a wide opportunity for security exploitation. To solve for some of this web browsers employ a cross-origin request limitation that prevents transmissions to or from third party domains unless a CORS rule exists to explicitly allow the transmission.
- Transport Layer Security
- HTTP access control
- Cross-Origin Resource Sharing
- List of useful HTTP headers
- xmlHttpRequest Object
- Fetch API
Understandability / Content
There is no greater opportunity to win users and influence behaviors, such as increasing retail conversion, than through the effectiveness of a well written communication. The potential to write details that concise, explicit, and accurate goes further to demonstrate precision and care than any other single factor. In additional to winning external users well written communication also has extremely important considerations for internal users and developers with regard to documentation, logging, release notes and so forth.
The words expressed in a purely textual communication also have security and accessibility implications. For instance false states on a commercial website could result in a law suit. The quality of text and information that is externally available is the single most important factor to search engine ranking.
Users respond differently to different messaging. This is a testable factor through A/B testing and thus suggests behavioral implications that not immediately known. This form of behavioral analysis is called understandability. There are several different strategies to accomplish this, that is to make the product easier to understand. In order to make a product or service more understandable it is important to empathize with users. It is challenging to have an idea of what the audience doesn't know, but identifying gaps in the audience's understanding is what can almost instantly transform a weak product into an amazing product. The technical qualities are the substance of content, the order in which content is provided, the presentation and description of that content, and the means of interacting with that content.
Eliminating barriers to understandability in your audience is a challenge, but eroding barriers where feedback and sharing are important is a greater challenge. Fortunately there is a science dedicated to this subject called knowledge management. In knowledge management the primary problem to solve is that a technical expert is valuable for their ability to solve a given problem, but would be substantially more valuable to the organization if they could document and train others in their expertise. This requires sharing of skills and capabilities gained through years of experience and hard work that most people find incredibly challenging to share in a way that makes sense to less experienced people. This isn't just a challenge of finding the right words or substance to describe a topic. It is a challenge of being a super-influencer as necessary to overcome behavioral and cultural barriers and defenses an audience is likely unaware they have raised.
- Writing for the Web
- The Inverted Pyramid: a Great Format for Web Pages
- Social media “toolkit” has more influence than traditional news release
- 6 Steps To Influence Others With Your Business Writing
- Good Documentation and Quality Management Principles
- Content Integration
- What is KM? Knowledge Management Explained