نتایج جستجو برای: assurance region

تعداد نتایج: 557777  

2010
MARILYN FLEER ANNE KENNEDY

Government involvement in quality assurance is becoming the trend in many countries, including New Zealand. What values underpin the systems that evolve in each country, and who has given legitimacy to them? In the context of the prevailing ideology of early childhood, this paper unpacks quality assurance in Australia and comments on the assumptions, taken for granted premises and values which ...

حسین درگاهی, , مصطفی رضائیان, ,

Background: Quality assurance is a prevention-oriented system that can be used to improve the quality of care, increase productivity and monitor the performance management in clinical laboratories. ISO 9001: 2000 requirements are a collection of management and technical systems designed to implement quality assurance and monitor performance management in organizations. Methods: A checklist...

2001
Zhiqing Liu Peng Wang

Commodity software components are intrinsically untrustworthy and it is highly insecure to use them directly in mission critical systems. The trustworthiness of a system can be only vaguely specified or achieved without a quantifiable level of assurance measurement of the components used in the system. While large amounts of research efforts have been devoted to establishing a certain quantifia...

2010
Pál Varga Péter Tatai

A dolgozat bírálatai és a védésr®l készült jegyz®könyv a kés®bbiekben, a Budapesti M ¶szaki és Gazdaságtudományi Egyetem dékáni hivatalában lesznek elérhet®ek.

2003
Gregory J. Conti John M. D. Hill Scott Lathrop Kenneth L. Alford Daniel Ragsdale

This paper describes the experience of our institution in creating a comprehensive undergraduate information assurance (IA) program. An interdisciplinary approach was undertaken in order to include a larger portion of the student body and faculty and thus influence a broader audience. The program includes a wide variety of mutually supporting information assurance activities including a researc...

2006
Richard G. Epstein

This paper discusses how the author integrated issues in Information Assurance into parts of the undergraduate curriculum at his university. The emphasis is on his course on computer ethics and the social implications of computing. . Index terms – Integrating information assurance topics into the undergraduate curriculum; visions for the future.

Journal: :BMJ 1992
M Amouretti C Beraud E Saint-Martin

Conclusions Quality assurance as such is mainly a question of attitudes and behaviour. It is difficult to induce doctors to modify their behaviour by pressures other than from inside the profession. In France there are three types of understanding of medical evaluation: that of the official bodies and evaluation units of hospitals, who try to define and disseminate actual quality assurance; tha...

Journal: :IJSSE 2013
Yutaka Matsuno Shuichiro Yamamoto

In this paper, the authors present a new method for writing assurance cases. Assurance cases are documented bodies of evidence that provide a convincing and valid argument that a system is adequately dependable for a given application in a given environment. Assurance cases have been used mostly in the safety field, but are now beginning to be widely applied in other areas. Cyber security is on...

2010
Thomas Rhodes Frederick Boland Elizabeth Fong Michael Kass

Software assurance is an important part of the software development process to reduce risks and ensure that the software is dependable and trustworthy. Software defects and weaknesses can often lead to software errors and failures and to exploitation by malicious users. Testing, certification and accreditation have been traditionally used in the software assurance process to attempt to improve ...

2011
Johan Perols Uday S. Murthy

We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research. Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients’ systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies. Consequently, actual implementations of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید