12,082 research outputs found
Requirements traceability in model-driven development: Applying model and transformation conformance
The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship, which helps in assessing the quality of models, realizations and transformation specifications. Our framework is a basis for understanding requirements traceability in model-driven development, as well as for the design of tools that support requirements traceability in model-driven development processes. We propose a notion of conformance between application models which reduces the effort needed for assessment activities. We discuss how this notion of conformance can be integrated with model transformations
An assessment of supply chain and innovation management practices in the manufacturing industries in Turkey
This paper aims at assessing the supply chain and innovation management in the manufacturing industries in Turkey on an empirical basis. The assessments presented are based on parts of the data and information collected through the execution of the Competitive Strategies and Best Practices Benchmarking Questionnaire in 82 companies from four sectors of the manufacturing industries in Turkey. Results of these sectoral benchmarking studies reported elsewhere indicate the need of adopting product differentiation particularly through more knowledge intensive products as the dominant competitive strategy and also the need for improvement in various areas of supply chain as well as innovation management. In this paper, these issues are analysed through the survey results and some conclusions are drawn. Several policy measures applicable in near future are suggested for improving the areas found in need of improvement
Framework for Security Transparency in Cloud Computing
The migration of sensitive data and applications from the on-premise data centre to a cloud environment increases cyber risks to users, mainly because the cloud environment is managed and maintained by a third-party. In particular, the partial surrender of sensitive data and application to a cloud environment creates numerous concerns that are related to a lack of security transparency. Security transparency involves the disclosure of information by cloud service providers about the security measures being put in place to protect assets and meet the expectations of customers. It establishes trust in service relationship between cloud service providers and customers, and without evidence of continuous transparency, trust and confidence are affected and are likely to hinder extensive usage of cloud services. Also, insufficient security transparency is considered as an added level of risk and increases the difficulty of demonstrating conformance to customer requirements and ensuring that the cloud service providers adequately implement security obligations.
The research community have acknowledged the pressing need to address security transparency concerns, and although technical aspects for ensuring security and privacy have been researched widely, the focus on security transparency is still scarce. The relatively few literature mostly approach the issue of security transparency from cloud providersâ perspective, while other works have contributed feasible techniques for comparison and selection of cloud service providers using metrics such as transparency and trustworthiness. However, there is still a shortage of research that focuses on improving security transparency from cloud usersâ point of view. In particular, there is still a gap in the literature that (i) dissects security transparency from the lens of conceptual knowledge up to implementation from organizational and technical perspectives and; (ii) support continuous transparency by enabling the vetting and probing of cloud service providersâ conformity to specific customer requirements. The significant growth in moving business to the cloud â due to its scalability and perceived effectiveness â underlines the dire need for research in this area.
This thesis presents a framework that comprises the core conceptual elements that constitute security transparency in cloud computing. It contributes to the knowledge domain of security transparency in cloud computing by proposing the following. Firstly, the research analyses the basics of cloud security transparency by exploring the notion and foundational concepts that constitute security transparency. Secondly, it proposes a framework which integrates various concepts from requirement engineering domain and an accompanying process that could be followed to implement the framework. The framework and its process provide an essential set of conceptual ideas, activities and steps that can be followed at an organizational level to attain security transparency, which are based on the principles of industry standards and best practices. Thirdly, for ensuring continuous transparency, the thesis proposes an essential tool that supports the collection and assessment of evidence from cloud providers, including the establishment of remedial actions for redressing deficiencies in cloud provider practices. The tool serves as a supplementary component of the proposed framework that enables continuous inspection of how predefined customer requirements are being satisfied.
The thesis also validates the proposed security transparency framework and tool in terms of validity, applicability, adaptability, and acceptability using two different case studies. Feedbacks are collected from stakeholders and analysed using essential criteria such as ease of use, relevance, usability, etc. The result of the analysis illustrates the validity and acceptability of both the framework and tool in enhancing security transparency in a real-world environment
Recommended from our members
Auditing the accessibility of Massive Open Online Courses (MOOCs)
The outcome from the research being reported in this paper is the design of an accessibility audit to evaluate Massive Open Online Courses (MOOCs) for accessibility and to arrive at solutions and adaptations that can meet user needs. This accessibility audit includes expert-based heuristic evaluations and user-based evaluations of the MOOC platforms and individual courses
Recommended from our members
Evaluating global e-government sites: A view using web diagnostics tools
This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2004 The AuthorsSeveral governments across the world have embraced the digital revolution and continue to take advantage of the information and communication facilities offered by the Internet to offer public services. Conversely, citizensâ awareness and expectations of Internet based online-public-services have also increased in recent times. Although the numbers of the different national e-Government web portals have rapidly increased in the last three years, the success of these portals will largely depend on their accessibility, quality and privacy. This paper reports the results of an
evaluative study of a cross-section of e-Government portals from these three perspectives, using a common set of performance metrics and Web diagnostic engines. Results show that not only are there wide variations in the spectrum of information and services provided by these portals, but that significant work still needs to be undertaken in order to make the portals examples of âbest practiceâ e-Government services
From commercial marketing to electoral marketing: candidatesâ attributes in the perception of Brazilian and American voters
This study investigates attributes that influence the vote in different socioeconomic contexts (Brazil/USA). Our results show an asymmetric effect of candidatesâ attributes on votersâ decision. In less developed socioeconomic contexts, voters analyze candidatesâ image by satisfying their unconscious will than by making strictly rational choices, which shows a shift of a democratic discourse to an eminently advertising clash. On the other hand, American voters tend to be more judicious regarding the image of their representatives, giving value to elements of the political debate. Such findings can be used to explain election results in both countries under a political marketing perspective.Este estudio investiga la influencia de los atributos en los votos en diferentes contextos socioeconĂłmicos (Brasil / USA). Nuestros resultados muestran un efecto asimĂ©trico de los atributos de los candidatos en los votantes decisiĂłn. En contextos socioeconĂłmicos menos desarrollados, los votantes de analizar la imagen de los candidatos por la satisfacciĂłn de sus voluntad inconsciente que al tomar decisiones estrictamente racional, que muestra el desplazamiento del discurso democrĂĄtico a un choque de publicidad eminentemente. Por otro lado, los votantes estadounidenses tendencia a ser mĂĄs juiciosa En cuanto a la imagen de sus representantes, dando valor a los elementos del debate polĂtico. Tales hallazgos pueden ser utilizados para explicar los resultados de las elecciones en ambos paĂses bajo una perspectiva polĂtica de marketing
Technical alignment
This essay discusses the importance of the areas of
infrastructure and testing to help digital preservation services
demonstrate reliability, transparency, and accountability. It
encourages practitioners to build a strong culture in which
transparency and collaborations between technical frameworks
are valued highly. It also argues for devising and applying
agreed-upon metrics that will enable the systematic analysis of
preservation infrastructure. The essay begins by defining
technical infrastructure and testing in the digital preservation
context, provides case studies that exemplify both progress and
challenges for technical alignment in both areas, and concludes
with suggestions for achieving greater degrees of technical
alignment going forward
The Role of Evidence in Establishing Trust in Repositories
This article arises from work by the Digital Curation Centre (DCC) Working Group examining mechanisms to roll out audit and certification services for digital repositories in the United Kingdom. Our attempt to develop a program for applying audit and certification processes and tools took as its starting point the RLG-NARA Audit Checklist for Certifying Digital Repositories. Our intention was to appraise critically the checklist and conceive a means of applying its mechanics within a diverse range of repository environments. We were struck by the realization that while a great deal of effort has been invested in determining the characteristics of a 'trusted digital repository', far less effort has concentrated on the ways in which the presence of the attributes can be demonstrated and their qualities measured. With this in mind we sought to explore the role of evidence within the certification process, and to identify examples of the types of evidence (e.g., documentary, observational, and testimonial) that might be desirable during the course of a repository audit.
Exploring the relationship between cost of quality and quality management in the South African manufacturing industry
Abstract: In the highly demanding business environment of today, companies are looking for affordable and sustainable methods of meeting customer demands, while improving business performance. The South African manufacturing industry is not excluded from the challenging business environment of today. Over the past years the South African manufacturing sectors have experienced the challenges relating to economic trends, globalisation and political influences. The government has tried to save the industry through the implementation of trade laws and policies. However, despite the support from Government the success of the manufacturing company in the 21st century is dependent on the quality management systems and partnerships. This research derived the concept of quality management and cost of quality from the literature. The study further explores the relationship between quality management factors and cost of quality categories. Over and above identification of the relationship between quality management factors and cost of quality categories; the research investigated the ability of quality management factors to predict the cost of quality categories. The research also aimed at investigating the quality management maturity of the South African manufacturing industry and benchmark the result with international companies. The quality management factors used in the current research include customer focus, leadership, process management, employee focus and business result focus. The cost of quality categories included conformance cost, failure cost and hidden cost. ..D.Phil. (Engineering Management
- âŠ