SlideShare a Scribd company logo
1 of 9
Credential Transparency Initiative (CTI)
Step 1 – Functional Requirements
October 7, 2015
Slide 2
Work Plan & Steps
DCMI Guidelines
Credential Registry Technical Committee (CRTC)
1. Define functional
requirements and
use cases.
Review, refine and expand the functional requirements and use cases
for the four major applications, and work with subcommittees to
develop more detailed and tailored requirements and use cases for
specific descriptors including the competency descriptors.
2. Develop Domain
Model.
Develop domain information model(s).
3. Identify and
Develop Metadata
Vocabulary.
Finalize the definitions and vocabularies for each property and produce
a summary of the vocabularies and value structures for each descriptor
and their Uniform Resource Identifier (URI) references for accessing
Linked Data resources over the web following Dublin Core Metadata
Initiative (DCMI) guidelines. Existing metadata and vocabularies will be
re-used and refined wherever possible.
4. Design Metadata
Record.
Develop a Description Set Profile for all descriptors for credentials in
cooperation with subcommittees.
5. Develop Usage
Guidelines.
Explain each descriptor and provide guidance on major decisions that
must be made in creating a metadata record.
6. Develop Syntax
Guidelines.
Develop various encoding guidelines for CTI metadata in RDFa and
Microdata for HTML/XHTML tagging of web pages, RDF/XML, JSON-LD,
and Turtle, with others added in the future from the growing array of
graph bindings.
A DCAP is a document (or set of documents) that specifies and describes the
metadata used in a particular application. To accomplish this, a profile:
• describes what a community wants to accomplish with its application
(Functional Requirements);
• characterizes the types of things described by the metadata and their
relationships (Domain Model);
• enumerates the metadata terms to be used and the rules for their use
(Description Set Profile and Usage Guidelines); and
• defines the machine syntax that will be used to encode the data (Syntax
Guidelines and Data Formats).
http://dublincore.org/documents/profile-guidelines/#sect-2
Slide 3
Step 1: Functional Requirements and Use Cases
CTI is following the Guidelines for Dublin Core Application Profiles (DCAP):
Slide 4
Step 1: Functional Requirements and Use Cases
How these standards fit together is illustrated in the Singapore
Framework for Dublin Core Application Profiles [DCMI-SF]. Taking the
upper tier of the Singapore Framework as a roadmap, the sections that
follow walk through the process of creating a DCAP.
The bottom tier, RDF, provides the
foundation standards on which domain
standards are built.
The middle tier defines domain standards
that provide structural and semantic
stability for Application Profiles.
The upper tier holds the design and
documentation components of specific
metadata applications.
Functional requirements answer questions such as:
• What do you want to accomplish with your application?
• What are the limits of your application? What will it not attempt to do?
• How do you want the application you create to serve your users?
• Will your application need to perform specific actions, such as sorting, or downloading data
in particular formats?
• What are the key characteristics of your resources, and how does this affect your selection
of data elements? For example, do you need to handle a variety of character sets?
• What are the key characteristics of your users? Are they associated with a particular
institution or are you serving a general public? Do they all speak the same language? How
expert are they in relation to the data your application will manage? How expert are they
about the type of resources described?
• Are there existing community standards that need to be considered?
Slide 5
Step 1: Functional Requirements for Use Cases
Functional requirements guide the development of the application profile by
providing goals and boundaries and are an essential component of a successful
application profile development process. This development is often a broad
community task and may involve managers of services, experts in the materials
being used, application developers, and potential end-users of the services.
Step 1: Examples of Some CTI Use Cases
Search and
Discover
Search for and find credentials with similar or related competencies and within similar or
related scope of application (e.g. similar degree level or occupational cluster).
Equivalence Determine the level or degree equivalence between competency requirements among
credentials or other comparison sources (e.g. job profile, learning resource, competency
framework, quality assurance requirement, military training record, work history portfolio.
Gap Analysis Determine the gap between two different competency requirements such as an employer
competency requirement and the credential requirement or the credential holder portfolio of
one or more credentials.
Translation Translate equivalent or similar competency requirements written in one language (e.g. format,
types of information, grammar, vocabulary) into another language.
Connection Identify education and career paths or progressions (e.g. career pathway maps) between
credentials and the degree of transfer value and potential to stack and build on other
credentials as well as how to progress in learning sequences (e.g. learning maps).
Transparency Improve the capacity of all stakeholders to fully understand the meaning of the competency
requirement.
Assessability Improve the writing of competency requirements so they can be assessed through assessment
approaches that are widely accepted by major stakeholders in the credentialing marketplace.
Data Analytics Analyze and measure the degree of transparency, portability, and value in the credentialing
marketplace and provide usage information on the access and use of the credential data and
the original and derived claims of credential registry and app users.
Step 1: Examples of Some CTI Use Cases
Slide 7
Simple to Complex Use Case Examples
• Search and Discovery
• Employers search for and identify credentials that address one or more
of their competency requirements for hiring.
• Students and job-seekers search for credentials that have competency
requirements similar to competencies they have developed through
previous work and training, and search for related learning resources to
fill gaps.
• Equivalence
• Employers evaluate the degree of similarity between their hiring
competency requirements, those of selected credentials, and those
identified with job-seeker resumes/transcripts/profiles/portfolios.
• Credentialing organizations compare competency requirements of other
domains to evaluate and determine transfer value.
• Connections
• Students and job seekers explore education and career pathways and
learning maps based on the connections between competency
requirements for different credentials.
Step 1: Provide
Your Use Cases
Slide 8
Enter one ore more use
cases and scenarios.
Slide 9
Informational Website:
http://www.credentialtransparencyinitiative.org
Technical Planning Microsite:
http://www.credreg.org

More Related Content

Similar to Credential Transparency Initiative (CTI) Step 1 – Functional Requirements

Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.pptSoham De
 
Semantic interoperability courses training module 3 - reference data v0.10
Semantic interoperability courses    training module 3 - reference data v0.10Semantic interoperability courses    training module 3 - reference data v0.10
Semantic interoperability courses training module 3 - reference data v0.10Semic.eu
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationKishan Kaushik
 
Appendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docxAppendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docxarmitageclaire49
 
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docxIT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docxchristiandean12115
 
Lecture 8 & 9.pdf
Lecture 8 & 9.pdfLecture 8 & 9.pdf
Lecture 8 & 9.pdfRaoShahid10
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsOsama M. Khaled
 
Personal Competence Development in Learning Networks
Personal Competence Development in Learning NetworksPersonal Competence Development in Learning Networks
Personal Competence Development in Learning Networkstelss09
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Engine
 
Ica Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen ClarkeIca Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen ClarkeStephenClarke
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivam Thakur
 
Competency Model Clearinghouse
Competency Model ClearinghouseCompetency Model Clearinghouse
Competency Model ClearinghouseColleen LaRose
 
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesJoe Lamantia
 
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirementsnkaur
 
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...DATAVERSITY
 

Similar to Credential Transparency Initiative (CTI) Step 1 – Functional Requirements (20)

Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
 
Semantic interoperability courses training module 3 - reference data v0.10
Semantic interoperability courses    training module 3 - reference data v0.10Semantic interoperability courses    training module 3 - reference data v0.10
Semantic interoperability courses training module 3 - reference data v0.10
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Appendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docxAppendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docx
 
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docxIT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
 
Lecture 8 & 9.pdf
Lecture 8 & 9.pdfLecture 8 & 9.pdf
Lecture 8 & 9.pdf
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
Personal Competence Development in Learning Networks
Personal Competence Development in Learning NetworksPersonal Competence Development in Learning Networks
Personal Competence Development in Learning Networks
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry Partners
 
Ica Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen ClarkeIca Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen Clarke
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business Analyst
 
Competency Model Clearinghouse
Competency Model ClearinghouseCompetency Model Clearinghouse
Competency Model Clearinghouse
 
SRS
SRSSRS
SRS
 
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval Experiences
 
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirements
 
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...
 

More from Illinois workNet

IEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System OverviewIEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System OverviewIllinois workNet
 
IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022Illinois workNet
 
IEBS Power Point Presentation
IEBS Power Point Presentation IEBS Power Point Presentation
IEBS Power Point Presentation Illinois workNet
 
Exploring the Iowa ePolicy
Exploring the Iowa ePolicy Exploring the Iowa ePolicy
Exploring the Iowa ePolicy Illinois workNet
 
Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy Illinois workNet
 
Submitting Customer Success Stories
Submitting Customer Success StoriesSubmitting Customer Success Stories
Submitting Customer Success StoriesIllinois workNet
 
2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioaIllinois workNet
 
Why social media job seeker
Why social media job seekerWhy social media job seeker
Why social media job seekerIllinois workNet
 
New 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version finalNew 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version finalIllinois workNet
 
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and TrainingFinding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and TrainingIllinois workNet
 
Youth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form OverviewYouth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form OverviewIllinois workNet
 
Ilds annual report & plan 2018
Ilds annual report & plan 2018Ilds annual report & plan 2018
Ilds annual report & plan 2018Illinois workNet
 
NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation Illinois workNet
 

More from Illinois workNet (20)

IEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System OverviewIEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System Overview
 
IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
 
IEBS Power Point Presentation
IEBS Power Point Presentation IEBS Power Point Presentation
IEBS Power Point Presentation
 
Exploring the Iowa ePolicy
Exploring the Iowa ePolicy Exploring the Iowa ePolicy
Exploring the Iowa ePolicy
 
Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy
 
Using Iowa ePolicy
Using Iowa ePolicy Using Iowa ePolicy
Using Iowa ePolicy
 
Apprenticeship Guide
Apprenticeship GuideApprenticeship Guide
Apprenticeship Guide
 
WIOA Contract Reporting
WIOA Contract Reporting WIOA Contract Reporting
WIOA Contract Reporting
 
Illinois workNet Widget
Illinois workNet WidgetIllinois workNet Widget
Illinois workNet Widget
 
Submitting Customer Success Stories
Submitting Customer Success StoriesSubmitting Customer Success Stories
Submitting Customer Success Stories
 
2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa
 
Why social media job seeker
Why social media job seekerWhy social media job seeker
Why social media job seeker
 
New 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version finalNew 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version final
 
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and TrainingFinding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
 
Youth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form OverviewYouth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form Overview
 
Ilds annual report & plan 2018
Ilds annual report & plan 2018Ilds annual report & plan 2018
Ilds annual report & plan 2018
 
NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation
 
jobPrep 3.0
jobPrep 3.0jobPrep 3.0
jobPrep 3.0
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Credential Transparency Initiative (CTI) Step 1 – Functional Requirements

  • 1. Credential Transparency Initiative (CTI) Step 1 – Functional Requirements October 7, 2015
  • 2. Slide 2 Work Plan & Steps DCMI Guidelines Credential Registry Technical Committee (CRTC) 1. Define functional requirements and use cases. Review, refine and expand the functional requirements and use cases for the four major applications, and work with subcommittees to develop more detailed and tailored requirements and use cases for specific descriptors including the competency descriptors. 2. Develop Domain Model. Develop domain information model(s). 3. Identify and Develop Metadata Vocabulary. Finalize the definitions and vocabularies for each property and produce a summary of the vocabularies and value structures for each descriptor and their Uniform Resource Identifier (URI) references for accessing Linked Data resources over the web following Dublin Core Metadata Initiative (DCMI) guidelines. Existing metadata and vocabularies will be re-used and refined wherever possible. 4. Design Metadata Record. Develop a Description Set Profile for all descriptors for credentials in cooperation with subcommittees. 5. Develop Usage Guidelines. Explain each descriptor and provide guidance on major decisions that must be made in creating a metadata record. 6. Develop Syntax Guidelines. Develop various encoding guidelines for CTI metadata in RDFa and Microdata for HTML/XHTML tagging of web pages, RDF/XML, JSON-LD, and Turtle, with others added in the future from the growing array of graph bindings.
  • 3. A DCAP is a document (or set of documents) that specifies and describes the metadata used in a particular application. To accomplish this, a profile: • describes what a community wants to accomplish with its application (Functional Requirements); • characterizes the types of things described by the metadata and their relationships (Domain Model); • enumerates the metadata terms to be used and the rules for their use (Description Set Profile and Usage Guidelines); and • defines the machine syntax that will be used to encode the data (Syntax Guidelines and Data Formats). http://dublincore.org/documents/profile-guidelines/#sect-2 Slide 3 Step 1: Functional Requirements and Use Cases CTI is following the Guidelines for Dublin Core Application Profiles (DCAP):
  • 4. Slide 4 Step 1: Functional Requirements and Use Cases How these standards fit together is illustrated in the Singapore Framework for Dublin Core Application Profiles [DCMI-SF]. Taking the upper tier of the Singapore Framework as a roadmap, the sections that follow walk through the process of creating a DCAP. The bottom tier, RDF, provides the foundation standards on which domain standards are built. The middle tier defines domain standards that provide structural and semantic stability for Application Profiles. The upper tier holds the design and documentation components of specific metadata applications.
  • 5. Functional requirements answer questions such as: • What do you want to accomplish with your application? • What are the limits of your application? What will it not attempt to do? • How do you want the application you create to serve your users? • Will your application need to perform specific actions, such as sorting, or downloading data in particular formats? • What are the key characteristics of your resources, and how does this affect your selection of data elements? For example, do you need to handle a variety of character sets? • What are the key characteristics of your users? Are they associated with a particular institution or are you serving a general public? Do they all speak the same language? How expert are they in relation to the data your application will manage? How expert are they about the type of resources described? • Are there existing community standards that need to be considered? Slide 5 Step 1: Functional Requirements for Use Cases Functional requirements guide the development of the application profile by providing goals and boundaries and are an essential component of a successful application profile development process. This development is often a broad community task and may involve managers of services, experts in the materials being used, application developers, and potential end-users of the services.
  • 6. Step 1: Examples of Some CTI Use Cases Search and Discover Search for and find credentials with similar or related competencies and within similar or related scope of application (e.g. similar degree level or occupational cluster). Equivalence Determine the level or degree equivalence between competency requirements among credentials or other comparison sources (e.g. job profile, learning resource, competency framework, quality assurance requirement, military training record, work history portfolio. Gap Analysis Determine the gap between two different competency requirements such as an employer competency requirement and the credential requirement or the credential holder portfolio of one or more credentials. Translation Translate equivalent or similar competency requirements written in one language (e.g. format, types of information, grammar, vocabulary) into another language. Connection Identify education and career paths or progressions (e.g. career pathway maps) between credentials and the degree of transfer value and potential to stack and build on other credentials as well as how to progress in learning sequences (e.g. learning maps). Transparency Improve the capacity of all stakeholders to fully understand the meaning of the competency requirement. Assessability Improve the writing of competency requirements so they can be assessed through assessment approaches that are widely accepted by major stakeholders in the credentialing marketplace. Data Analytics Analyze and measure the degree of transparency, portability, and value in the credentialing marketplace and provide usage information on the access and use of the credential data and the original and derived claims of credential registry and app users.
  • 7. Step 1: Examples of Some CTI Use Cases Slide 7 Simple to Complex Use Case Examples • Search and Discovery • Employers search for and identify credentials that address one or more of their competency requirements for hiring. • Students and job-seekers search for credentials that have competency requirements similar to competencies they have developed through previous work and training, and search for related learning resources to fill gaps. • Equivalence • Employers evaluate the degree of similarity between their hiring competency requirements, those of selected credentials, and those identified with job-seeker resumes/transcripts/profiles/portfolios. • Credentialing organizations compare competency requirements of other domains to evaluate and determine transfer value. • Connections • Students and job seekers explore education and career pathways and learning maps based on the connections between competency requirements for different credentials.
  • 8. Step 1: Provide Your Use Cases Slide 8 Enter one ore more use cases and scenarios.

Editor's Notes

  1. Build use cases for each user group.