Frontend Framework Consideration for IT Developer

  • Budi Tjandra Negara Pradita University
Keywords: Frontend, Framework, AHP


The importance of a framework for a company engaged in application development makes the diversity of choices that a company must choose which is the best. Considering using a programming language framework is important, with the rapid evolution of programming language frameworks and the demands of a target completion time in a project. Each framework ​​has its own purpose, if a project involves many developers, then those developers will spend time to make sure that they don't obscure every line of the script which causes conflict with each other. To analyze what developers consider when choosing a framework, we use primary and secondary data, both qualitative and quantitative. Qualitative data processing using descriptive analysis based on interviews. The collected data is processed using the Analytic Hierarchy Process (AHP) method. The purpose of this research is to examine the implementation of Frontend Language Frameworks Developers. The results of the analysis show that the important element in Frontend Language Frameworks Developers is Security. The alternative that has the most important role in implementing Frontend Language Frameworks Developers is Vue.js.



[1] K. Li, Y. Ding, D. Shen, Q. Li, and Z. Zhen, “The design and research of front-end framework for microservice environment,” Proc. - 2020 Int. Conf. Comput. Inf. Big Data Appl. CIBDA 2020, pp. 124–127, 2020, doi: 10.1109/CIBDA50819.2020.00036.
[2] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling accurate phishing web page detection by applying deep learning techniques on HTML analysis,” arXiv, 2019.
[3] J. G. Ndia, G. M. Muketha, and K. K. Omieno, “a Survey of Cascading Style Sheets Complexity Metrics,” Int. J. Softw. Eng. Appl., vol. 10, no. 03, pp. 21–33, 2019, doi: 10.5121/ijsea.2019.10303.
[4] S. Delcev and D. Draskovic, “Modern JavaScript frameworks: A Survey Study,” 2018 Zooming Innov. Consum. Technol. Conf. ZINC 2018, pp. 106–109, 2018, doi: 10.1109/ZINC.2018.8448444.
[5] L. Shen, X. Chen, R. Liu, H. Wang, and G. Ji, “Domain-Specific Language Techniques for Visual Computing: A Comprehensive Study,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 3113–3134, 2021, doi: 10.1007/s11831-020-09492-4.
[6] T. Williams, H. Vo, K. Samset, and A. Edkins, “The front-end of projects: a systematic literature review and structuring,” Prod. Plan. Control, vol. 30, no. 14, pp. 1137–1169, 2019, doi: 10.1080/09537287.2019.1594429.
[7] Z. Bai, X.-L. Zhang, and J. Chen, “Partial AUC Metric Learning Based Speaker Verification Back-End,” no. November, pp. 380–384, 2020, doi: 10.21437/odyssey.2020-53.
[8] A. Shukla and S. Tripathi, “A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network,” Wirel. Networks, vol. 26, no. 5, pp. 3471–3493, 2020, doi: 10.1007/s11276-020-02277-4.
[9] A. Gupta, R. Christie, and R. Manjula, “Scalability in Internet of Things: Features, Techniques and Research Challenges,” Int. J. Comput. Intell. Res., vol. 13, no. 7, pp. 1617–1627, 2017.
[10] J. Huang, Y. Li, J. Zhang, and R. Dai, “UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities,” Proc. - 49th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Networks, DSN 2019, pp. 581–592, 2019, doi: 10.1109/DSN.2019.00064.
[11] K. Jamwal and L. Sen Sharma, “Clickjacking Attack: Hijacking User’s Click,” Int. J. Adv. Netw. Appl., vol. 10, no. 01, pp. 3735–3740, 2018, doi: 10.35444/ijana.2018.100110.
[12] S. Goswami, N. Hoque, D. K. Bhattacharyya, and J. Kalita, “An unsupervised method for detection of XSS attack,” Int. J. Netw. Secur., vol. 19, no. 5, pp. 761–775, 2017, doi: 10.6633/IJNS.201709.19(5).14.
[13] B. Appiah, E. Opoku-Mensah, and Z. Qin, “SQL injection attack detection using fingerprints and pattern matching technique,” Proc. IEEE Int. Conf. Softw. Eng. Serv. Sci. ICSESS, vol. 2017-Novem, pp. 583–587, 2018, doi: 10.1109/ICSESS.2017.8342983.
[14] L. Liang, K. Zheng, Q. Sheng, W. Wang, R. Fu, and X. Huang, “A denial of service attack method for iot system in photovoltaic energy system,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10394 LNCS, pp. 613–622, 2017, doi: 10.1007/978-3-319-64701-2_48.
[15] A. Mallik, A. Ahsan, M. M. Z. Shahadat, and J. C. Tsou, “Man-in-the-middle-attack: Understanding in simple words,” Int. J. Data Netw. Sci., vol. 3, no. 2, pp. 77–92, 2019, doi: 10.5267/j.ijdns.2019.1.001.