180,275 research outputs found
Reliable method for Authorized Deduplication by Using Hybrid Cloud Environment
Information deduplication is one of vital data compression procedures for eliminating duplicate copies of repeating information and has been broadly utilized as a part of cloud storage to diminish the measure of storage room and spare transmission capacity .To ensure secrecy of delicate information while supporting deduplication, united encryption system has been proposed to scramble the information before out sourcing. For better assurance of information security , primary endeavor is to formally address the issue of approved information deduplication .Unique in relation to conventional deduplication frameworks ,the proposed security display bolsters differential benefits of clients in copy check other than information itself. A few new deduplication developments are displayed supporting approved copy check in a hybrid cloud environments. Security investigation shows that this plan is secure as far as definitions determined in proposed security demonstrate. As a proof of idea, the usage of a model of the proposed approved copy check conspire and additionally the lead testbed tests utilizing the model causes negligible overhead contrasted with ordinary operations
THE QUALITY ASSURANCE MANAGEMENT OF GRADUATES IN MA’ARIF NU VOCATIONAL HIGH SCHOOL BOBOTSARI AND MUHAMMADIYAH 2 VOCATIONAL HIGH SCHOOL PURBALINGGA
A research entitled Quality Assurance Management of Graduates in
Ma’aarif NU Vocational High School Bobotsari and Muhammadiyah 2
Vocational High School Purbalingga, has done to find out the formulation of the
quality assurance management of graduates, to find out the implementation of the
model quality assurance management of graduates, and to find out the evaluation
and controlling system the model of the quality assurance management of
graduates in Ma’arif NU Vocational High School Bobotsari and Muhammadiyah
2 Vocational High School Purbalingga. The benefits of the research are
theoritically expected to contribute ideas for the development of quality assurance
management of graduates in vocational high schools. In other words, this study is
expected to be a source of discussion and a source of inspiration, and practically,
for principals of vocational high school institutions in taking decisions related to
the development of vocational high school education institution he leads, as an
effort to improve the quality of school management to ensuring the quality of
education esspecially quality of the graduates, add knowledge of quality assurance
management of graduates.
This research was qualitative descriptive research and the subject of the
research are principal, vice principal such as curriculum affairs, student affairs,
public relations affair, equipments affairs, quality management representative
team, teachers, employees and others who can provide information related to the
research. This research was conducted using data collection methods such us
observation, documentation and interview.
The result of research show that Quality assurance management of
graduates in Ma'arif NU Vocational High School Bobotsari and muhammadiyah 2
Vocational hig school Purbalingga using the form QMS ISO 9001: 2008, both of
using steps according Deming’s 14 Theories to reach quality assurance
management of graduates, The assesment of quality assurance management of
graduates in Ma’arif NU Vocational High School is through self assesment and
external audit. While in Muhammadiyah 2 Vocational High School Purbalingga is
through self assesment, fulfillment customer satisfaction, monitoring &
measurement, and external audit
On-line quality assurance of study programmes: EQUASP approach
The description of the EQUASP model for quality assurance of study programmes, developed in framework of a TEMPUS project, is introduced. The introduction section contains brief information on the concept of quality and quality assurance of study programmes along with the Tuning approach to the design of study programmes and the standards and guidelines for quality assurance in the European Higher Education Area. The fourth section describes the EQUASP approach to quality assurance and pinpoints the necessary documentation for the quality assurance of study programmes. More specifically, the EQUASP standards for the quality assurance of study programmes are defined, followed with the identification of the fundamental processes for a quality management of study programmes together with the associated quality requirements and expected activities for their accomplishment. The information and data which study programmes need to document in order to provide evidence of the quality of the educational service offered and therefore, to assure their quality, are established. The standards and guidelines constitute the ‘EQUASP Model’ for the quality assurance of study programmes. The fifth section introduces the EQUASP approach for monitoring of quality of study programmes perceived by interested parties (students, graduates, employed graduates and employers).Finally, the sixth section summarizes the objectives already achieved and introduces the activities in progress for the completion of the project according to the
established work plan, while the conclusions summarize the benefits of the EQUASP system.Postprint (published version
Information assurance within supply chains’ structures and processes.
Doctoral degree. University of KwaZulu-Natal, Durban.Organisations are challenging the traditional linear-based market model which is characterised by
a straight line movement of goods and services. As a result, they are increasingly forming and
moving towards a value web of supply chain network that connects a whole ecosystem of trading
partners. These networks, which are mostly complex and dynamic, are creating a global market
environment in which organisations no longer focus only on their immediate suppliers and
customers, but also on the optimization and the smooth flow of information, funds and materials,
within their respective direct and remote trading networks.
The large number of participants within most supply chain networks has necessitated that these
networks be agile and resilient. For supply chain networks to be agile and resilient, and for supply
chains’ structures, processes and resources to be synchronized and integrated, the organisations
within the supply chain must share information. Hence, in today’s supply chains, interests are
moving towards obtaining the most benefits from information. In order to obtain these benefits
from information, organisations are making use of information systems and their related
technologies to acquire, process and adequately share information. These systems are making it
possible for organisations to form strategic partnerships within the supply chain networks.
The global market environment is causing supply chains to expand, and the expansion is exposing
information to various security vulnerabilities and risks. The exposure of information to different
vulnerabilities and risks is forcing trading partners to seek assurance that the information within
their supply chain network is adequately protected and also performs as advertised. To understand
how the assurance sought by trading partners can be provided, this study investigated information
and information systems’ security within supply chains’ structures and processes. The study also
investigated how information assurance objectives (i.e. confidentiality, integrity, availability,
authentication and non-repudiation) can be achieved optimally within supply chains. Finally, the
study proposes an information assurance model, which if adopted by decision makers, could
enable them sustain their respective functions and processes within the supply chain network.
In order to achieve the objectives of this study, the exploratory design and the case study approach
were adopted in this study. The study also adopted the qualitative research method, and hence,
semi-structured interviews were conducted, and served as the primary means of data collection.
Participants in this study were drawn from two categories of organisations, which are supply chain
and logistics organisations, and Information Technology (IT) consulting organisations. Therefore,
the purposive sampling method was adopted in this study. An inductive approach was adopted in
the analysis of data, and as a result, thematic analysis was adopted as the analysis method. The
main outcome of the study is the proposed information assurance model that can enable decision
makers sustain their respective functions and processes within the supply chain network
- …