9,726 research outputs found

    A quality management based on the Quality Model life cycle

    Get PDF
    Managing quality is a hard and expensive task that involves the execution and control of processes and techniques. For a good quality management, it is important to know the current state and the objective to be achieved. It is essential to take into account with a Quality Model that specifies the purposes of managing quality. QuEF (Quality Evaluation Framework) is a framework to manage quality in MDWE (Model-driven Web Engineering). This paper suggests managing quality but pointing out the Quality Model life cycle. The purpose is to converge toward a quality continuous improvement by means of reducing effort and time.Ministerio de Ciencia e Innovación TIN2010-20057-C03-02Ministerio de Ciencia e Innovación TIN 2010-12312-EJunta de Andalucía TIC-578

    Usability and Accessibility of Air Force Intranet Web Sites

    Get PDF
    The Air Force is moving to a network centric environment where information must be data visible, accessible, and understandable. This transformation has seen the adoption of the Internet web browser as a de facto standard for information access. The Technology Acceptance Model suggests that information systems must not only be useful but also be usable and a large body of usability engineering knowledge exists to support usable design. In addition, the U.S. government mandates specific minimum design features required to support disabled user access. This research effort seeks to establish an understanding of how well common practice usability design principles and government mandated accessibility guidelines are followed by Air Force intranet web sites. Heuristic evaluation is used to investigate web site usability. Accessibility is inspected against government guidelines. The results of this study suggest that Air Force intranet web sites do not adequately comply with many usability principles and that accessibility compliance varies from site to site. Furthermore, although the majority of usability and accessibility design principles are not captured in military guidance, scores were higher for those principles that are captured in the guidance than for those that are not

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage

    The Development Methodology Of Operational Dashboard As A Tool For Organizational Performance Monitoring (A Case Study: Telkom Polytechnic)

    Get PDF
    The management needs to monitor and measure the performance of the organization continuously to restrain that business processes aims at the organization's mission and vision. This study assist management to monitor the organization performance continuously to restrain that business processes aims at the organization's goals. Providing the information about the achievement on KPIs that really fit the needs of its users, conveying the information are accurately and timely in the comfortable presentation format that effective. The information comes from various units within organization, so the management can take action or strategic decision-making quickly and precisely targeted for the improvement of the organization. The problems can be solved with information provider tools of the dashboard software. Dashboard software to be built is operational dashboard for the study program. Operational dashboard provides information on the ongoing activities, along with changes in real time to provide awareness to the things that need to be responded quickly, the information presented is very specific to the sufficient depth detail level, it is dynamic because it uses the data with higher frequency real time updates. The methodology proposed by Eva Hariyanti [5] was modified to suitable with environment condition. Her methodology aimed to develop dashboard at strategic and tactical level, while this study to produced operational dashboard. Her methodology concerns in provide data/information, personalized and collaboration among user. The methodology to develop operational dashboard was not cover analytical and trackability characteristic. Keywords : monitor, KPI, performance, operational dashboar

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators

    Designing a Process Guidance System to Support User’s Business Process Compliance

    Get PDF
    Organizations define business processes specifying how employees should conduct their daily work. They require their employees to conform to defined process standards in order to avoid expensive mistakes and ensure the intended process outcomes. From a research perspective, process compliance has been primarily addressed by process-centric information systems supporting the execution of business processes. However, employees still have difficulties in being process compliant. What is missing is the direct support for users in the proper execution of business processes within the actual work environment. We follow a design science approach to address this gap and suggest a process guidance system supporting user’s business process compliance. Grounded by findings from existing guidance research, we derive meta-requirements and design principles of such systems and evaluate our artifact by two expert workshops discussing the proposed solution

    Decision support tools for agriculture: Towards effective design and delivery

    Get PDF
    Decision support tools, usually considered to be software-based, may be an important part of the quest for evidence-based decision-making in agriculture to improve productivity and environmental outputs. These tools can lead users through clear steps and suggest optimal decision paths or may act more as information sources to improve the evidence base for decisions. Yet, despite their availability in a wide range of formats, studies in several countries have shown uptake to be disappointingly low. This paper uses a mixed methods approach to investigate the factors affecting the uptake and use of decision support tools by farmers and advisers in the UK. Through a combination of qualitative interviews and quantitative surveys, we found that fifteen factors are influential in convincing farmers and advisers to use decision support tools, which include usability, cost-effectiveness, performance, relevance to user, and compatibility with compliance demands. This study finds a plethora of agricultural decision support tools in operation in the UK, yet, like other studies, shows that their uptake is low. A better understanding of the fifteen factors identified should lead to more effective design and delivery of tools in the future.This research was funded as part of Defra's Sustainable Intensification Platform (Project Code LM0201). In addition, WJS was funded by Arcadia, LVD was funded by the UK Natural Environment Research Council under the Biodiversity and Ecosystem Service Sustainability (BESS) programme, grant code NE/K015419/1. T.A. was supported by the European Commission's Marie Curie International Incoming Fellowship Programme (PIIF-GA-2011-303221) and the Isaac Newton Trust.This is the final version of the article. It first appeared from Elsevier via https://doi.org/10.1016/j.agsy.2016.09.00

    Proposed audit guide : Audits of service-center-produced records ;Audits of service-center-produced records; Exposure draft (American Institute of Certified Public Accountants), 1984, Sept. 4

    Get PDF
    This proposed audit guide provides guidance to independent auditors of organizations that use services provided by EDP service centers and to independent auditors who are engaged to report on certain aspects of the system of internal accounting control that relate to accounting systems processed by EDP service centers. This guide would replace and supersede the audit guide, Audits of Service-Center-Produced Records, issued in 1974. This guide represents a revision of the 1974 guide to incorporate the general guidance in Statement on Auditing Standards No. 44, Special-Purpose Reports on Internal Accounting Control at Service Organizations, and other auditing pronouncements issued since the guide was first published. This proposed audit guide discusses: 1. The effects of a client\u27s use of an EDP service center on the auditor\u27s study and evaluation of internal control. 2. Reporting on reviews of EDP service centers. 3. Using reports on internal control at EDP service centers.https://egrove.olemiss.edu/aicpa_sop/1473/thumbnail.jp
    corecore