Information technology for learning, education and training — A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Information technology for learning, education and training - A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Intelligent transport systems — Vehicle interface for provisioning and support of ITS services — Par...
ISO 13185-2:2015 specifies the requirements of an ASN.1-based protocol between a vehicle-ITS-Station Gateway (V-ITS-SG) and a nomadic and/or mobile device (ND) to easily exchange vehicle information data.
The ASN.1-based protocol has been specified to support a wired or wireless connection between the ND and V-ITS-SG.
The Unified Gateway Protocol (UGP) is used between the V-ITS-SG and the ND. UGP…
Information technology — Business Operational View — Part 8: Identification of privacy protection re...
This part of ISO/IEC 15944:
? provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the
additional requirements in Business Operational View (BOV) specifications for identifying the additional
external constraints to be applied to recorded information in business transactions relating to personal
information of an individual, as required by legal and…
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Information and documentation — RFID in libraries — Part 4: Encoding of data elements based on rules...
ISO/TS 28560-4:2014 defines rules for ISO 28560‑1 data elements to be encoded in radio frequency identification (RFID) tags with a memory structure that is partitioned into four memory banks. This primarily applies to ISO/IEC 18000‑63 (previously known as ISO/IEC 18000‑6 Type C) operating in the UHF frequency, but not necessarily restricted to this technology.
The rules for encoding a subset of…
Information and documentation — RFID in libraries — Part 1: Data elements and general guidelines for...
ISO 28560-1:2014 specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including academic, public, corporate, special, and school.
ISO 28560-1:2014 provides the framework to ensure interoperability between libraries that exchange library items with RFID tags, the freedom of the library to acquire or renew…
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology - Security techniques - Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Intelligent transport systems — Cooperative systems — Roles and responsibilities in the context of c...
ISO/TS 17427:2014 describes the (actor invariant) roles and responsibilities required to deploy and operate Cooperative-ITS (C-ITS). The organizational architecture described in this document is to be used for a fully operational system. ISO/TS 17427:2014 is couched in terms of an organizational or enterprise viewpoint, as defined in ISO/IEC 10746 Open Distributed Processing.
ISO/TS 17427:2014…