Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE)...
ISO/IEC 25024:2015 defines data quality measures for quantitatively measuring the data quality in terms of characteristics defined in ISO/IEC 25012.
ISO/IEC 25024:2015 contains the following:
- a basic set of data quality measures for each characteristic;
- a basic set of target entities to which the quality measures are applied during the data-life-cycle;
- an explanation of how…
A Guideline for accountable management of end-of-life materials
1.1 Objectives
This Guideline has been developed to aid primary and secondary service providers and to establish a set
of common definitions, performance metrics, and reporting requirements in support of best practices in
the management of end-of-life (EOL) materials.
In addition to providing a consistent framework that will allow for more effective and informed decision
making on EOL…
Information technology — Learning, education and training — Metadata for learning resources — Part 2...
ISO/IEC 19788 specifies, in a rule-based manner, metadata elements and their attributes for the description of
learning resources. This includes the rules governing the identification of data elements and the specification
of their attributes.
These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning
resource (MLR) record.
This part of ISO/…
Information technology — Business Operational View — Part 8: Identification of privacy protection re...
This part of ISO/IEC 15944:
? provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the
additional requirements in Business Operational View (BOV) specifications for identifying the additional
external constraints to be applied to recorded information in business transactions relating to personal
information of an individual, as required by legal and…
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Health informatics — Audit trails for electronic health records
ISO 27789:2013 specifies a common framework for audit trails for electronic health records (EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health information auditable across information systems and domains.
It is applicable to systems processing personal health information which, complying with ISO 27799, create a secure audit record each time a user…
Information technology - Modeling Languages - Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described.
The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Information technology — Modeling Languages — Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described.
The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…
Information technology - Security techniques - Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…