<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Erzincan University Journal of Science and Technology</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2149-4584</issn>
                                                                                            <publisher>
                    <publisher-name>Erzincan Binali Yıldırım Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.18185/erzifbed.1581945</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Management Information Systems</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yönetim Bilişim Sistemleri</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>A Mobile Secure Content Development Application for Children in the Software Development Life Cycle Framework</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>Yazılım Geliştirme Yaşam Döngüsü Çerçevesinde Çocuklar için Bir Mobil Güvenli İçerik Geliştirme Uygulaması</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0006-0852-1996</contrib-id>
                                                                <name>
                                    <surname>Karabaş</surname>
                                    <given-names>İsakhan</given-names>
                                </name>
                                                                    <aff>ERZİNCAN BİNALİ YILDIRIM ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ YAPAY ZEKA VE ROBOTİK ANABİLİM DALI</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5212-6017</contrib-id>
                                                                <name>
                                    <surname>Aslay</surname>
                                    <given-names>Fulya</given-names>
                                </name>
                                                                    <aff>ERZİNCAN BİNALİ YILDIRIM ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ YAPAY ZEKA VE ROBOTİK ANABİLİM DALI</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0002-8743-2676</contrib-id>
                                                                <name>
                                    <surname>Öksüz</surname>
                                    <given-names>Elif</given-names>
                                </name>
                                                                    <aff>ERZİNCAN BİNALİ YILDIRIM ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ YAPAY ZEKA VE ROBOTİK ANABİLİM DALI</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20241231">
                    <day>12</day>
                    <month>31</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>17</volume>
                                        <issue>3</issue>
                                        <fpage>884</fpage>
                                        <lpage>904</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241108">
                        <day>11</day>
                        <month>08</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20241216">
                        <day>12</day>
                        <month>16</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2008, Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi</copyright-statement>
                    <copyright-year>2008</copyright-year>
                    <copyright-holder>Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>This study deals with the software development process of a mobile application that will support children&#039;s learning, development and entertainment processes while ensuring their safety in the online environment. The project was carried out within the framework of the Software Development Life Cycle (SDLC) and adopted a systematic approach including requirements analysis, design, development, testing and maintenance phases. The application aims to provide appropriate content for children by minimizing digital security risks and to enable parents to safely control their children&#039;s internet use. With the Extreme Programming (XP) methodology, a continuous improvement process based on user feedback was implemented and security and performance tests were successfully completed. The article shows that not only coding but also effective management of the whole process in software development projects contributes to project success. The study is expected to contribute to the literature on children&#039;s digital safety and provide a basis for future research in this field.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Bu çalışma, çocukların çevrimiçi ortamda güvenliğini sağlarken öğrenme, gelişim ve eğlence süreçlerini destekleyecek bir mobil uygulamanın yazılım geliştirme sürecini ele almaktadır. Yazılım Geliştirme Yaşam Döngüsü (SDLC) çerçevesinde yürütülen proje; gereksinim analizi, tasarım, geliştirme, test ve bakım aşamalarını içeren sistematik bir yaklaşımı benimsemiştir. Uygulama, dijital güvenlik risklerini minimize ederek çocuklara uygun içerik sunmayı ve ebeveynlerin çocuklarının internet kullanımını güvenle kontrol edebilmesini sağlamayı hedeflemektedir. Ekstrem Programlama (XP) metodolojisiyle kullanıcı geri bildirimlerine dayalı sürekli iyileştirme süreci uygulanmış, güvenlik ve performans testleri başarıyla tamamlanmıştır. Çalışma yazılım geliştirme projelerinde yalnızca kodlamanın değil, tüm sürecin etkin yönetilmesinin proje başarısına katkı sağladığını göstermektedir. Çalışmanın çocukların dijital güvenliği alanındaki literatüre katkı sunması ve bu alanda gelecekteki araştırmalar için bir temel oluşturması hedeflenmektedir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Life Cycle</kwd>
                                                    <kwd>  Methodology</kwd>
                                                    <kwd>  Software Development Process</kwd>
                                                    <kwd>  Software Engineering</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Yaşam Döngüsü</kwd>
                                                    <kwd>  Yazılım Geliştirme Süreci</kwd>
                                                    <kwd>  Yazılım Mühendisliği</kwd>
                                                    <kwd>  Metodoloji</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Curtis, B., Krasner, H., Iscoe, N., (1988). A field study of the software design process for large systems. Commun ACM; 31: 1268–1287.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Rod S. BEGINNING Software Engineering, Second Edition, (2024). Beginning Software Engineering, Second Edition; 1–685.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Setyantoro A. Process Models in Software Engineering. https://www.academia.edu/36272460/Process_Models_in_Software_Engineering.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Sari, P.I., Rahmawati, I., Mariyana, R., Charmeida, N. (2024) The Correlation Between Parental Awareness and Concern to The Early Childhoods’ Digital Safety. Kiddo: Jurnal Pendidikan Islam Anak Usia Dini, 5, 310–326.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Lonergan, A., Moriarty, A., McNicholas, F., Byrne, T. (2023) Cyberbullying and internet safety: a survey of child and adolescent mental health practitioners. Ir J Psychol Med; 40: 43–50.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Pressman, R.S., Maxim, B.R. (2015) The Software Engineer’s Responsibility. Software Engineering: A Practitioner’s Approach, 865–867.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Software development life cycle methods | by Chathurika Dhananjani | Medium. https://chathurikadhananjani97.medium.com/software-development-life-cycle-methods-712be36f6aae.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	DevOps Puppet. In a simple word a Puppet is a… | by Sidhant Suryavansham | Medium. https://sidhant-suryavansham.medium.com/devops-puppet-78400f04696b.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Software Development Life Cycle | Benefits, Phases, Process &amp; Models. https://www.weetechsolution.com/blog/software-development-life-cycle.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Comparative Analysis of Software Development Life Cycle Models https://www.researchgate.net/publication/286134213_Comparative_Analysis_of_Software_Development_Life_Cycle_Models.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Wang, Y.M., Elhag, T.M.S. (2006) Fuzzy TOPSIS method based on alpha level sets with an application to bridge risk assessment. Expert Syst Appl, 31, 309–319.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Boehm, B.W. (1988) A Spiral Model of Software Development and Enhancement. Computer (Long Beach Calif), 21,: 61–72.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	McConnell, S. R. (2010) Development: Taming Wild Software Schedules. Microsoft Press, 6, 680.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Saaty, T.L. (1990) How to make a decision: The analytic hierarchy process. Eur J Oper Res, 48, 9–26.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Liberatore, M.J., Nydick, R.L. (2008). The analytic hierarchy process in medical and health care decision making: A literature review. Eur J Oper Res, 189, 194–207.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Aniley, D.B., Jalew, E.A., Agegnehu, G.A. (2024) Selection of Software Development Life Cycle Models using Machine Learning Approach. Int J Comput Appl, 186, 36–43.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	MIH (2023) Software Development Life Cycle (SDLC) Methodologies for Information Systems Project Management. IJFMR - International Journal For Multidisciplinary Research; 5.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Brans, J.P., Vincke, P. (1985). Note—A Preference Ranking Organisation Method. Manage Sci, 31, 647–656.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Islam, A.K.M.Z., Ferworn, DrA. (2020). A Comparison between Agile and Traditional Software Development Methodologies. Global Journal of Computer Science and Technology; 20: 7–42.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Keskinkılıç, M. &amp; Kahveci, F. (2019) Yazılım Mühendisliğinde Çevik Yöntemler Üzerine Kavramsal Bir İnceleme ve Sınıflandırma. Atatürk Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 23(3), 1067-1091.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Herdika, H.R., Budiardjo, E.K. (2020) Variability and Commonality Requirement Specification on Agile Software Development: Scrum, XP, Lean, and Kanban. International Conference on Computer and Informatics Engineering, 323–329.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Schwaber, K., Sutherland, J. (2020) The Scrum Guide The Definitive Guide to Scrum: The Rules of the Game.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Ahmad, M.O., Markkula, J., Oivo, M. (2013) Kanban in software development: A systematic literature review. Proceedings- 39th Euromicro Conference Series on Software Engineering and Advanced Applications, SEAA, 9–16.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Beck K. Praise for Extreme Programming Explained, Second Edition.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Lean Software Development: An Agile Toolkit: Poppendieck, Mary, Poppendieck, Tom: 0785342150780: Amazon.com: Books. https://www.amazon.com/Lean-Software-Development-Agile-Toolkit/dp/0321150783.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Fowler, M., Beck, K. (2018) Refactoring : Improving the Design of Existing Code, Second Edition Fowler, Martin.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Test Driven Development: By Example: Beck, Kent: 8601400403228: Amazon.com: Books. https://www.amazon.com/Test-Driven-Development-Kent-Beck/dp/0321146530.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Williams, L., Kessler, R.R., (2003) Pair Programming Illuminated, 265.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Continuous Integration: Improving Software Quality and Reducing Risk: Paul M. Duvall, Steve Matyas, Andrew Glover: 9780321336385: Amazon.com: Books. https://www.amazon.com/Continuous-Integration-Improving-Software-Reducing/dp/0321336380.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Cohn, M. (2009). What is a User Story? User Stories Applied, 4.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Yazılım Gereksinim Analizi | AppMaster. https://appmaster.io/tr/blog/yazilim-gereksinimleri-analizi.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Mobil Uygulama Geliştirme Rehberi | Vayes. https://www.vayes.com.tr/tr/blog/mobil-uygulama-gelistirme-rehberi.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Gereksinim yönetimi - Vikipedi. https://tr.wikipedia.org/wiki/Gereksinim_y%C3%B6netimi.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34]	Albrecht, A.J., Gaffney, J.E., (1983) Software Function, Source Lines of Code, and Development Effort Prediction. IEEE Transactions on Software Engineering, SE-9, 639–648.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35]	Milicic, D. (2004) Applying COCOMO II- A case study.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36]	Albakri, M.M., Rizwan, M., Qureshi, J. Empirical Estimation of COCOMO I and COCOMO II Using a Case Study.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37]	Yazılımcılar Dünyası: COCOMO (Constructive Costing Model).</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">https://www.yazilimcilardunyasi.com/2017/01/cocomo-constructive-costing-model.html.
[38]	Rush, C., Roy, R. (2023) Analysis of cost estimating processes used within a concurrent engineering environment throughout a product life cycle. Advances in Concurrent Engineering; 58–67.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39]	Baresi, L., Pezzè, M. (2006) An Introduction to Software Testing. Electron Notes Theor Comput Sci,  148, 89–111.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40]	Corral, L., Sillitti, A., Succi, G. (2013) Agile Software Development Processes for Mobile Systems: Accomplishment, Evidence and Evolution. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8093 LNCS: 90–106.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">[41]	Dobing, B., Parsons, J. (2006) How UML is used. Commun ACM, 49109–113.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">[42]	Faitelson, D., Tyszberowicz, S. (2017) UML Diagram Refinement (Focusing on Class-And Use Case Diagrams). Proceedings - International Conference on Software Engineering; 735–745.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">[43]	Jayasiriwardene, S., Meedeniya, D. (2021) Architectural framework for an interactive learning toolkit. Proceedings - International Research Conference on Smart Computing and Systems Engineering; 14–21.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">[44]	Li, S., Lei, Y., Jia, Z., Boukhlif, M., Hanine, M., Kharmoum, N. (2023) A Decade of Intelligent Software Testing Research: A Bibliometric Analysis. Electronics, 12.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">[45]	Umudova, S. (2019) Analysis of Software Maintenance Phases. Noble International Journal of Scientific Research; 3: 62–66.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">[46]	The Unified Modeling Language Reference Manual, (2nd Edition): Rumbaugh, James, Jacobson, Ivar, Booch, Grady: 9780321718952: Amazon.com: Books. https://www.amazon.com/Unified-Modeling-Language-Reference-paperback/dp/032171895X.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">[47]	Curtis, B., Krasner, H., Iscoe, N. (1988) A field study of the software design process for large systems. Commun ACM, 31, 1268–1287.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">[48]	Setyantoro A. Process Models in Software Engineering. https://www.academia.edu/36272460/Process_Models_in_Software_Engineering.</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">[49]	Children’s online activities, risks and safety: A literature review by the UKCCIS Evidence Group - GOV.UK. https://www.gov.uk/government/publications/childrens-online-activities-risks-and-safety-a-literature-review-by-the-ukccis-evidence-group.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">[50]	Secure Development Lifecycle for App Security - AppSOC. https://www.appsoc.com/blog/understanding-the-secure-development-lifecycle-sdlc-for-app-security.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">[51]	Lonergan, A., Moriarty A, McNicholas F, Byrne T, (2023) Cyberbullying and internet safety: a survey of child and adolescent mental health practitioners. Ir J Psychol Med; 40: 43–50.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
