SlideShare a Scribd company logo
Credential Transparency Initiative (CTI)
Step 1 – Functional Requirements
October 7, 2015
Slide 2
Work Plan & Steps
DCMI Guidelines
Credential Registry Technical Committee (CRTC)
1. Define functional
requirements and
use cases.
Review, refine and expand the functional requirements and use cases
for the four major applications, and work with subcommittees to
develop more detailed and tailored requirements and use cases for
specific descriptors including the competency descriptors.
2. Develop Domain
Model.
Develop domain information model(s).
3. Identify and
Develop Metadata
Vocabulary.
Finalize the definitions and vocabularies for each property and produce
a summary of the vocabularies and value structures for each descriptor
and their Uniform Resource Identifier (URI) references for accessing
Linked Data resources over the web following Dublin Core Metadata
Initiative (DCMI) guidelines. Existing metadata and vocabularies will be
re-used and refined wherever possible.
4. Design Metadata
Record.
Develop a Description Set Profile for all descriptors for credentials in
cooperation with subcommittees.
5. Develop Usage
Guidelines.
Explain each descriptor and provide guidance on major decisions that
must be made in creating a metadata record.
6. Develop Syntax
Guidelines.
Develop various encoding guidelines for CTI metadata in RDFa and
Microdata for HTML/XHTML tagging of web pages, RDF/XML, JSON-LD,
and Turtle, with others added in the future from the growing array of
graph bindings.
A DCAP is a document (or set of documents) that specifies and describes the
metadata used in a particular application. To accomplish this, a profile:
• describes what a community wants to accomplish with its application
(Functional Requirements);
• characterizes the types of things described by the metadata and their
relationships (Domain Model);
• enumerates the metadata terms to be used and the rules for their use
(Description Set Profile and Usage Guidelines); and
• defines the machine syntax that will be used to encode the data (Syntax
Guidelines and Data Formats).
http://dublincore.org/documents/profile-guidelines/#sect-2
Slide 3
Step 1: Functional Requirements and Use Cases
CTI is following the Guidelines for Dublin Core Application Profiles (DCAP):
Slide 4
Step 1: Functional Requirements and Use Cases
How these standards fit together is illustrated in the Singapore
Framework for Dublin Core Application Profiles [DCMI-SF]. Taking the
upper tier of the Singapore Framework as a roadmap, the sections that
follow walk through the process of creating a DCAP.
The bottom tier, RDF, provides the
foundation standards on which domain
standards are built.
The middle tier defines domain standards
that provide structural and semantic
stability for Application Profiles.
The upper tier holds the design and
documentation components of specific
metadata applications.
Functional requirements answer questions such as:
• What do you want to accomplish with your application?
• What are the limits of your application? What will it not attempt to do?
• How do you want the application you create to serve your users?
• Will your application need to perform specific actions, such as sorting, or downloading data
in particular formats?
• What are the key characteristics of your resources, and how does this affect your selection
of data elements? For example, do you need to handle a variety of character sets?
• What are the key characteristics of your users? Are they associated with a particular
institution or are you serving a general public? Do they all speak the same language? How
expert are they in relation to the data your application will manage? How expert are they
about the type of resources described?
• Are there existing community standards that need to be considered?
Slide 5
Step 1: Functional Requirements for Use Cases
Functional requirements guide the development of the application profile by
providing goals and boundaries and are an essential component of a successful
application profile development process. This development is often a broad
community task and may involve managers of services, experts in the materials
being used, application developers, and potential end-users of the services.
Step 1: Examples of Some CTI Use Cases
Search and
Discover
Search for and find credentials with similar or related competencies and within similar or
related scope of application (e.g. similar degree level or occupational cluster).
Equivalence Determine the level or degree equivalence between competency requirements among
credentials or other comparison sources (e.g. job profile, learning resource, competency
framework, quality assurance requirement, military training record, work history portfolio.
Gap Analysis Determine the gap between two different competency requirements such as an employer
competency requirement and the credential requirement or the credential holder portfolio of
one or more credentials.
Translation Translate equivalent or similar competency requirements written in one language (e.g. format,
types of information, grammar, vocabulary) into another language.
Connection Identify education and career paths or progressions (e.g. career pathway maps) between
credentials and the degree of transfer value and potential to stack and build on other
credentials as well as how to progress in learning sequences (e.g. learning maps).
Transparency Improve the capacity of all stakeholders to fully understand the meaning of the competency
requirement.
Assessability Improve the writing of competency requirements so they can be assessed through assessment
approaches that are widely accepted by major stakeholders in the credentialing marketplace.
Data Analytics Analyze and measure the degree of transparency, portability, and value in the credentialing
marketplace and provide usage information on the access and use of the credential data and
the original and derived claims of credential registry and app users.
Step 1: Examples of Some CTI Use Cases
Slide 7
Simple to Complex Use Case Examples
• Search and Discovery
• Employers search for and identify credentials that address one or more
of their competency requirements for hiring.
• Students and job-seekers search for credentials that have competency
requirements similar to competencies they have developed through
previous work and training, and search for related learning resources to
fill gaps.
• Equivalence
• Employers evaluate the degree of similarity between their hiring
competency requirements, those of selected credentials, and those
identified with job-seeker resumes/transcripts/profiles/portfolios.
• Credentialing organizations compare competency requirements of other
domains to evaluate and determine transfer value.
• Connections
• Students and job seekers explore education and career pathways and
learning maps based on the connections between competency
requirements for different credentials.
Step 1: Provide
Your Use Cases
Slide 8
Enter one ore more use
cases and scenarios.
Slide 9
Informational Website:
http://www.credentialtransparencyinitiative.org
Technical Planning Microsite:
http://www.credreg.org

More Related Content

Similar to Credential Transparency Initiative (CTI) Step 1 – Functional Requirements

Requirements engineering
Requirements engineeringRequirements engineering
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Department for Communities and Local Government Local Digital Campaign
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
Soham De
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
AMITKUMARSINGH756828
 
Semantic interoperability courses training module 3 - reference data v0.10
Semantic interoperability courses    training module 3 - reference data v0.10Semantic interoperability courses    training module 3 - reference data v0.10
Semantic interoperability courses training module 3 - reference data v0.10
Semic.eu
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
Kishan Kaushik
 
Appendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docxAppendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docx
armitageclaire49
 
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docxIT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
christiandean12115
 
Lecture 8 & 9.pdf
Lecture 8 & 9.pdfLecture 8 & 9.pdf
Lecture 8 & 9.pdf
RaoShahid10
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
Osama M. Khaled
 
Personal Competence Development in Learning Networks
Personal Competence Development in Learning NetworksPersonal Competence Development in Learning Networks
Personal Competence Development in Learning Networks
telss09
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
Gerardo Pardo-Castellote
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry Partners
Credential Engine
 
Ica Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen ClarkeIca Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen Clarke
StephenClarke
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business Analyst
Shivam Thakur
 
Competency Model Clearinghouse
Competency Model ClearinghouseCompetency Model Clearinghouse
Competency Model Clearinghouse
Colleen LaRose
 
SRS
SRSSRS
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval Experiences
Joe Lamantia
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
zimalfayzankhan
 
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirements
nkaur
 

Similar to Credential Transparency Initiative (CTI) Step 1 – Functional Requirements (20)

Requirements engineering
Requirements engineeringRequirements engineering
Requirements engineering
 
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
Resource-sharing Central Search | LocalGov Digital Hack Presentation | June ...
 
Requirement Management.ppt
Requirement Management.pptRequirement Management.ppt
Requirement Management.ppt
 
SE-Unit II.pdf
SE-Unit II.pdfSE-Unit II.pdf
SE-Unit II.pdf
 
Semantic interoperability courses training module 3 - reference data v0.10
Semantic interoperability courses    training module 3 - reference data v0.10Semantic interoperability courses    training module 3 - reference data v0.10
Semantic interoperability courses training module 3 - reference data v0.10
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Appendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docxAppendix AProof of effectiveness of some of the agile methods us.docx
Appendix AProof of effectiveness of some of the agile methods us.docx
 
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docxIT 204 Final Project Guidelines and RubricOverviewThe fina.docx
IT 204 Final Project Guidelines and RubricOverviewThe fina.docx
 
Lecture 8 & 9.pdf
Lecture 8 & 9.pdfLecture 8 & 9.pdf
Lecture 8 & 9.pdf
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
Personal Competence Development in Learning Networks
Personal Competence Development in Learning NetworksPersonal Competence Development in Learning Networks
Personal Competence Development in Learning Networks
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry Partners
 
Ica Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen ClarkeIca Adri Module 2 Presentation Kl Stephen Clarke
Ica Adri Module 2 Presentation Kl Stephen Clarke
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business Analyst
 
Competency Model Clearinghouse
Competency Model ClearinghouseCompetency Model Clearinghouse
Competency Model Clearinghouse
 
SRS
SRSSRS
SRS
 
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval Experiences
 
Good PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptxGood PracticesFor RequirementEngineering.pptx
Good PracticesFor RequirementEngineering.pptx
 
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirements
 

More from Illinois workNet

IEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System OverviewIEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System Overview
Illinois workNet
 
IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022
Illinois workNet
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
Illinois workNet
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
Illinois workNet
 
IEBS Power Point Presentation
IEBS Power Point Presentation IEBS Power Point Presentation
IEBS Power Point Presentation
Illinois workNet
 
Exploring the Iowa ePolicy
Exploring the Iowa ePolicy Exploring the Iowa ePolicy
Exploring the Iowa ePolicy
Illinois workNet
 
Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy
Illinois workNet
 
Using Iowa ePolicy
Using Iowa ePolicy Using Iowa ePolicy
Using Iowa ePolicy
Illinois workNet
 
Apprenticeship Guide
Apprenticeship GuideApprenticeship Guide
Apprenticeship Guide
Illinois workNet
 
WIOA Contract Reporting
WIOA Contract Reporting WIOA Contract Reporting
WIOA Contract Reporting
Illinois workNet
 
Illinois workNet Widget
Illinois workNet WidgetIllinois workNet Widget
Illinois workNet Widget
Illinois workNet
 
Submitting Customer Success Stories
Submitting Customer Success StoriesSubmitting Customer Success Stories
Submitting Customer Success Stories
Illinois workNet
 
2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa
Illinois workNet
 
Why social media job seeker
Why social media job seekerWhy social media job seeker
Why social media job seeker
Illinois workNet
 
New 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version finalNew 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version final
Illinois workNet
 
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and TrainingFinding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
Illinois workNet
 
Youth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form OverviewYouth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form Overview
Illinois workNet
 
Ilds annual report & plan 2018
Ilds annual report & plan 2018Ilds annual report & plan 2018
Ilds annual report & plan 2018
Illinois workNet
 
NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation
Illinois workNet
 
jobPrep 3.0
jobPrep 3.0jobPrep 3.0
jobPrep 3.0
Illinois workNet
 

More from Illinois workNet (20)

IEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System OverviewIEBS - Illinois Employment and Business System Overview
IEBS - Illinois Employment and Business System Overview
 
IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022IWIS Apprenticeship IL Overview February 2022
IWIS Apprenticeship IL Overview February 2022
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
 
Demand Occupations
Demand OccupationsDemand Occupations
Demand Occupations
 
IEBS Power Point Presentation
IEBS Power Point Presentation IEBS Power Point Presentation
IEBS Power Point Presentation
 
Exploring the Iowa ePolicy
Exploring the Iowa ePolicy Exploring the Iowa ePolicy
Exploring the Iowa ePolicy
 
Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy Staying Up-to-Date with Iowa Policy
Staying Up-to-Date with Iowa Policy
 
Using Iowa ePolicy
Using Iowa ePolicy Using Iowa ePolicy
Using Iowa ePolicy
 
Apprenticeship Guide
Apprenticeship GuideApprenticeship Guide
Apprenticeship Guide
 
WIOA Contract Reporting
WIOA Contract Reporting WIOA Contract Reporting
WIOA Contract Reporting
 
Illinois workNet Widget
Illinois workNet WidgetIllinois workNet Widget
Illinois workNet Widget
 
Submitting Customer Success Stories
Submitting Customer Success StoriesSubmitting Customer Success Stories
Submitting Customer Success Stories
 
2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa2019 performance accountability attendee version_wioa
2019 performance accountability attendee version_wioa
 
Why social media job seeker
Why social media job seekerWhy social media job seeker
Why social media job seeker
 
New 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version finalNew 2018 performance accountability pp attendee version final
New 2018 performance accountability pp attendee version final
 
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and TrainingFinding your Most Valuable Business Asset - Recruiting, Hiring and Training
Finding your Most Valuable Business Asset - Recruiting, Hiring and Training
 
Youth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form OverviewYouth Career Pathways Intake Form Overview
Youth Career Pathways Intake Form Overview
 
Ilds annual report & plan 2018
Ilds annual report & plan 2018Ilds annual report & plan 2018
Ilds annual report & plan 2018
 
NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation NOFO: Tips for responding to a solicitation
NOFO: Tips for responding to a solicitation
 
jobPrep 3.0
jobPrep 3.0jobPrep 3.0
jobPrep 3.0
 

Recently uploaded

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Credential Transparency Initiative (CTI) Step 1 – Functional Requirements

  • 1. Credential Transparency Initiative (CTI) Step 1 – Functional Requirements October 7, 2015
  • 2. Slide 2 Work Plan & Steps DCMI Guidelines Credential Registry Technical Committee (CRTC) 1. Define functional requirements and use cases. Review, refine and expand the functional requirements and use cases for the four major applications, and work with subcommittees to develop more detailed and tailored requirements and use cases for specific descriptors including the competency descriptors. 2. Develop Domain Model. Develop domain information model(s). 3. Identify and Develop Metadata Vocabulary. Finalize the definitions and vocabularies for each property and produce a summary of the vocabularies and value structures for each descriptor and their Uniform Resource Identifier (URI) references for accessing Linked Data resources over the web following Dublin Core Metadata Initiative (DCMI) guidelines. Existing metadata and vocabularies will be re-used and refined wherever possible. 4. Design Metadata Record. Develop a Description Set Profile for all descriptors for credentials in cooperation with subcommittees. 5. Develop Usage Guidelines. Explain each descriptor and provide guidance on major decisions that must be made in creating a metadata record. 6. Develop Syntax Guidelines. Develop various encoding guidelines for CTI metadata in RDFa and Microdata for HTML/XHTML tagging of web pages, RDF/XML, JSON-LD, and Turtle, with others added in the future from the growing array of graph bindings.
  • 3. A DCAP is a document (or set of documents) that specifies and describes the metadata used in a particular application. To accomplish this, a profile: • describes what a community wants to accomplish with its application (Functional Requirements); • characterizes the types of things described by the metadata and their relationships (Domain Model); • enumerates the metadata terms to be used and the rules for their use (Description Set Profile and Usage Guidelines); and • defines the machine syntax that will be used to encode the data (Syntax Guidelines and Data Formats). http://dublincore.org/documents/profile-guidelines/#sect-2 Slide 3 Step 1: Functional Requirements and Use Cases CTI is following the Guidelines for Dublin Core Application Profiles (DCAP):
  • 4. Slide 4 Step 1: Functional Requirements and Use Cases How these standards fit together is illustrated in the Singapore Framework for Dublin Core Application Profiles [DCMI-SF]. Taking the upper tier of the Singapore Framework as a roadmap, the sections that follow walk through the process of creating a DCAP. The bottom tier, RDF, provides the foundation standards on which domain standards are built. The middle tier defines domain standards that provide structural and semantic stability for Application Profiles. The upper tier holds the design and documentation components of specific metadata applications.
  • 5. Functional requirements answer questions such as: • What do you want to accomplish with your application? • What are the limits of your application? What will it not attempt to do? • How do you want the application you create to serve your users? • Will your application need to perform specific actions, such as sorting, or downloading data in particular formats? • What are the key characteristics of your resources, and how does this affect your selection of data elements? For example, do you need to handle a variety of character sets? • What are the key characteristics of your users? Are they associated with a particular institution or are you serving a general public? Do they all speak the same language? How expert are they in relation to the data your application will manage? How expert are they about the type of resources described? • Are there existing community standards that need to be considered? Slide 5 Step 1: Functional Requirements for Use Cases Functional requirements guide the development of the application profile by providing goals and boundaries and are an essential component of a successful application profile development process. This development is often a broad community task and may involve managers of services, experts in the materials being used, application developers, and potential end-users of the services.
  • 6. Step 1: Examples of Some CTI Use Cases Search and Discover Search for and find credentials with similar or related competencies and within similar or related scope of application (e.g. similar degree level or occupational cluster). Equivalence Determine the level or degree equivalence between competency requirements among credentials or other comparison sources (e.g. job profile, learning resource, competency framework, quality assurance requirement, military training record, work history portfolio. Gap Analysis Determine the gap between two different competency requirements such as an employer competency requirement and the credential requirement or the credential holder portfolio of one or more credentials. Translation Translate equivalent or similar competency requirements written in one language (e.g. format, types of information, grammar, vocabulary) into another language. Connection Identify education and career paths or progressions (e.g. career pathway maps) between credentials and the degree of transfer value and potential to stack and build on other credentials as well as how to progress in learning sequences (e.g. learning maps). Transparency Improve the capacity of all stakeholders to fully understand the meaning of the competency requirement. Assessability Improve the writing of competency requirements so they can be assessed through assessment approaches that are widely accepted by major stakeholders in the credentialing marketplace. Data Analytics Analyze and measure the degree of transparency, portability, and value in the credentialing marketplace and provide usage information on the access and use of the credential data and the original and derived claims of credential registry and app users.
  • 7. Step 1: Examples of Some CTI Use Cases Slide 7 Simple to Complex Use Case Examples • Search and Discovery • Employers search for and identify credentials that address one or more of their competency requirements for hiring. • Students and job-seekers search for credentials that have competency requirements similar to competencies they have developed through previous work and training, and search for related learning resources to fill gaps. • Equivalence • Employers evaluate the degree of similarity between their hiring competency requirements, those of selected credentials, and those identified with job-seeker resumes/transcripts/profiles/portfolios. • Credentialing organizations compare competency requirements of other domains to evaluate and determine transfer value. • Connections • Students and job seekers explore education and career pathways and learning maps based on the connections between competency requirements for different credentials.
  • 8. Step 1: Provide Your Use Cases Slide 8 Enter one ore more use cases and scenarios.

Editor's Notes

  1. Build use cases for each user group.