12,082 research outputs found

    Requirements traceability in model-driven development: Applying model and transformation conformance

    Get PDF
    The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship, which helps in assessing the quality of models, realizations and transformation specifications. Our framework is a basis for understanding requirements traceability in model-driven development, as well as for the design of tools that support requirements traceability in model-driven development processes. We propose a notion of conformance between application models which reduces the effort needed for assessment activities. We discuss how this notion of conformance can be integrated with model transformations

    An assessment of supply chain and innovation management practices in the manufacturing industries in Turkey

    Get PDF
    This paper aims at assessing the supply chain and innovation management in the manufacturing industries in Turkey on an empirical basis. The assessments presented are based on parts of the data and information collected through the execution of the Competitive Strategies and Best Practices Benchmarking Questionnaire in 82 companies from four sectors of the manufacturing industries in Turkey. Results of these sectoral benchmarking studies reported elsewhere indicate the need of adopting product differentiation particularly through more knowledge intensive products as the dominant competitive strategy and also the need for improvement in various areas of supply chain as well as innovation management. In this paper, these issues are analysed through the survey results and some conclusions are drawn. Several policy measures applicable in near future are suggested for improving the areas found in need of improvement

    Framework for Security Transparency in Cloud Computing

    Get PDF
    The migration of sensitive data and applications from the on-premise data centre to a cloud environment increases cyber risks to users, mainly because the cloud environment is managed and maintained by a third-party. In particular, the partial surrender of sensitive data and application to a cloud environment creates numerous concerns that are related to a lack of security transparency. Security transparency involves the disclosure of information by cloud service providers about the security measures being put in place to protect assets and meet the expectations of customers. It establishes trust in service relationship between cloud service providers and customers, and without evidence of continuous transparency, trust and confidence are affected and are likely to hinder extensive usage of cloud services. Also, insufficient security transparency is considered as an added level of risk and increases the difficulty of demonstrating conformance to customer requirements and ensuring that the cloud service providers adequately implement security obligations. The research community have acknowledged the pressing need to address security transparency concerns, and although technical aspects for ensuring security and privacy have been researched widely, the focus on security transparency is still scarce. The relatively few literature mostly approach the issue of security transparency from cloud providers’ perspective, while other works have contributed feasible techniques for comparison and selection of cloud service providers using metrics such as transparency and trustworthiness. However, there is still a shortage of research that focuses on improving security transparency from cloud users’ point of view. In particular, there is still a gap in the literature that (i) dissects security transparency from the lens of conceptual knowledge up to implementation from organizational and technical perspectives and; (ii) support continuous transparency by enabling the vetting and probing of cloud service providers’ conformity to specific customer requirements. The significant growth in moving business to the cloud – due to its scalability and perceived effectiveness – underlines the dire need for research in this area. This thesis presents a framework that comprises the core conceptual elements that constitute security transparency in cloud computing. It contributes to the knowledge domain of security transparency in cloud computing by proposing the following. Firstly, the research analyses the basics of cloud security transparency by exploring the notion and foundational concepts that constitute security transparency. Secondly, it proposes a framework which integrates various concepts from requirement engineering domain and an accompanying process that could be followed to implement the framework. The framework and its process provide an essential set of conceptual ideas, activities and steps that can be followed at an organizational level to attain security transparency, which are based on the principles of industry standards and best practices. Thirdly, for ensuring continuous transparency, the thesis proposes an essential tool that supports the collection and assessment of evidence from cloud providers, including the establishment of remedial actions for redressing deficiencies in cloud provider practices. The tool serves as a supplementary component of the proposed framework that enables continuous inspection of how predefined customer requirements are being satisfied. The thesis also validates the proposed security transparency framework and tool in terms of validity, applicability, adaptability, and acceptability using two different case studies. Feedbacks are collected from stakeholders and analysed using essential criteria such as ease of use, relevance, usability, etc. The result of the analysis illustrates the validity and acceptability of both the framework and tool in enhancing security transparency in a real-world environment

    From commercial marketing to electoral marketing: candidates’ attributes in the perception of Brazilian and American voters

    Get PDF
    This study investigates attributes that influence the vote in different socioeconomic contexts (Brazil/USA). Our results show an asymmetric effect of candidates’ attributes on voters’ decision. In less developed socioeconomic contexts, voters analyze candidates’ image by satisfying their unconscious will than by making strictly rational choices, which shows a shift of a democratic discourse to an eminently advertising clash. On the other hand, American voters tend to be more judicious regarding the image of their representatives, giving value to elements of the political debate. Such findings can be used to explain election results in both countries under a political marketing perspective.Este estudio investiga la influencia de los atributos en los votos en diferentes contextos socioeconĂłmicos (Brasil / USA). Nuestros resultados muestran un efecto asimĂ©trico de los atributos de los candidatos en los votantes decisiĂłn. En contextos socioeconĂłmicos menos desarrollados, los votantes de analizar la imagen de los candidatos por la satisfacciĂłn de sus voluntad inconsciente que al tomar decisiones estrictamente racional, que muestra el desplazamiento del discurso democrĂĄtico a un choque de publicidad eminentemente. Por otro lado, los votantes estadounidenses tendencia a ser mĂĄs juiciosa En cuanto a la imagen de sus representantes, dando valor a los elementos del debate polĂ­tico. Tales hallazgos pueden ser utilizados para explicar los resultados de las elecciones en ambos paĂ­ses bajo una perspectiva polĂ­tica de marketing

    Technical alignment

    Get PDF
    This essay discusses the importance of the areas of infrastructure and testing to help digital preservation services demonstrate reliability, transparency, and accountability. It encourages practitioners to build a strong culture in which transparency and collaborations between technical frameworks are valued highly. It also argues for devising and applying agreed-upon metrics that will enable the systematic analysis of preservation infrastructure. The essay begins by defining technical infrastructure and testing in the digital preservation context, provides case studies that exemplify both progress and challenges for technical alignment in both areas, and concludes with suggestions for achieving greater degrees of technical alignment going forward

    The Role of Evidence in Establishing Trust in Repositories

    Get PDF
    This article arises from work by the Digital Curation Centre (DCC) Working Group examining mechanisms to roll out audit and certification services for digital repositories in the United Kingdom. Our attempt to develop a program for applying audit and certification processes and tools took as its starting point the RLG-NARA Audit Checklist for Certifying Digital Repositories. Our intention was to appraise critically the checklist and conceive a means of applying its mechanics within a diverse range of repository environments. We were struck by the realization that while a great deal of effort has been invested in determining the characteristics of a 'trusted digital repository', far less effort has concentrated on the ways in which the presence of the attributes can be demonstrated and their qualities measured. With this in mind we sought to explore the role of evidence within the certification process, and to identify examples of the types of evidence (e.g., documentary, observational, and testimonial) that might be desirable during the course of a repository audit.

    Exploring the relationship between cost of quality and quality management in the South African manufacturing industry

    Get PDF
    Abstract: In the highly demanding business environment of today, companies are looking for affordable and sustainable methods of meeting customer demands, while improving business performance. The South African manufacturing industry is not excluded from the challenging business environment of today. Over the past years the South African manufacturing sectors have experienced the challenges relating to economic trends, globalisation and political influences. The government has tried to save the industry through the implementation of trade laws and policies. However, despite the support from Government the success of the manufacturing company in the 21st century is dependent on the quality management systems and partnerships. This research derived the concept of quality management and cost of quality from the literature. The study further explores the relationship between quality management factors and cost of quality categories. Over and above identification of the relationship between quality management factors and cost of quality categories; the research investigated the ability of quality management factors to predict the cost of quality categories. The research also aimed at investigating the quality management maturity of the South African manufacturing industry and benchmark the result with international companies. The quality management factors used in the current research include customer focus, leadership, process management, employee focus and business result focus. The cost of quality categories included conformance cost, failure cost and hidden cost. ..D.Phil. (Engineering Management
    • 

    corecore