System Analysis
System Analysis
SYSTEM ANALYSIS
In the literature, while there are some related work, such as web
ranking spam detection, online review spam detection and mobile App
recommendation, the problem of detecting ranking fraud for mobile Apps is still
under-explored. Generally speaking, the related works of this study can be
grouped into three categories. The first category is about web ranking spam
detection. The second category is focused on detecting online review spam.
Finally, the third category includes the studies on mobile App recommendation
2.1.1 DISADVANTAGES
Although some of the existing approaches can be used for anomaly detection
from historical rating and review records, they are not able to extract fraud
evidences for a given time period (i.e., leading session).
2.2.1 Advantages
The proposed framework is scalable and can be extended with other domain
generated evidences for ranking fraud detection.
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major requirements
for the system is essential.
Economical Feasibility
Technical Feasibility
Social Feasibility
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a
high demand on the available technical resources. This will lead to high demands
on the available technical resources. This will lead to high demands being placed
on the client. The developed system must have a modest requirement, as only
minimal or null changes are required for implementing this system.