Search results

1 – 2 of 2
Article
Publication date: 1 December 1998

J. Riguidel and T. Ridler

This paper details the experiences gained by a photoresist manufacturer, an equipment supplier and a PCB manufacturing end user in the conversion of an inner layer production…

468

Abstract

This paper details the experiences gained by a photoresist manufacturer, an equipment supplier and a PCB manufacturing end user in the conversion of an inner layer production facility from dry film to liquid resists. The paper describes the steps necessary to plan the conversion, install equipment, start up production, train personnel and yield improve a liquid resist fine line inner layer process.

Details

Circuit World, vol. 24 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 2 of 2