Implementation of the Successful Integrated Quality Management System Hazard Analysis and Critical Control Points through Increasing the Competence of Human Resources
Implementasi Keberhasilan Sistem Manajemen Mutu Terpadu Hazard Analysis and Critical Control Point Melalui Peningkatan Kompetensi Sumber Daya Manusia
DOI:
https://doi.org/10.21070/ups.950Keywords:
Hazard Analysis and Critical Control Points, Human Resource Competence, Measurement of Human Resource CompetencyAbstract
The purpose of this research is to improve the competence of human resources in understanding and implementing Hazard Analysis and Critical Control Point (HACCP) in CV. DELTA MINA JAYA. The research method used in this study is a qualitative method with an interpretive approach. Data collection techniques in this study were carried out using three methods. The first was interviews, the second was observation, FGD and documentation. The results of this study are based on Risk Identification Management (RIM) measurements focusing on human resource competencies where the results of the RIM show that human resource competencies in CV. DELTA MINA JAYA regarding the application of HACCP still has a high risk of failure in obtaining a HACCP certificate. Furthermore, competency improvement in the application of HACCP that needs to be done is to provide training and consultation to employees in meeting HACCP requirements.
Downloads
References
W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.
R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations, Strategy, and Technology: Pursuing the competitive edge. Hoboken, NJ: Wiley, 2005.
The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.
A. Rezi and M. Allam, "Techniques in array processing by means of transformations, " in Control and Dynamic Systems, Vol. 69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.
O. B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.
H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov–Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].
A. Altun, "Understanding hypertext in the context of reading on the web: Language learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online]. Available: http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2004].
H. Imron, R. R. Isnanto and E. D. Widianto, "Perancangan Sistem Kendali pada Alat Listrik Rumah Tangga Menggunakan Media Pesan Singkat (SMS)". Jurnal Teknologi dan Sistem Komputer, vol.4, no. 3, pp. 454-462, Agustus 2016. [Online]. doi: http://dx.doi.org/10.14710/.4.3.2016.454-462. [Diakses 4 September 2016].
J. R. Beveridge and E. M. Riseman, "How easy is matching 2D line models using local search?" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.
E. H. Miller, "A note on reflector arrays," IEEE Transactions on Antennas and Propagation, to be published.
L. Liu and H. Miao, "A specification based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc.of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.
J. Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].
H. A. Nimr, "Defuzzification of the outputs of fuzzy controllers," presented at 5th Int. Conf. on Fuzzy Systems, 1996, Cairo, Egypt. 1996.
T. J. van Weert and R. K. Munro, Eds., Informatics and the Digital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conf. on Social, Ethical and Cognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.
R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB): Implementation guidelines for DVB terrestrial services; transmission aspects,” European Telecommunications Standards Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].
“A ‘layman’s’ explanation of Ultra Narrow Band technology,” Oct. 3, 2003. [Online]. Available: http://www.vmsk.org/Layman.pdf. [Accessed: Dec. 3, 2003].
G. Sussman, "Home page - Dr. Gerald Sussman," July 2002. [Online]. Available: http://www.comm.pdx.edu/faculty/Sussman/sussmanpage.htm. [Accessed: Sept. 12, 2004].
FLEXChip Signal Processor (MC68175/D), Motorola, 1996.
A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
F. Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. PhD [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.
J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.
Downloads
Additional Files
Posted
License
Copyright (c) 2023 UMSIDA Preprints Server

This work is licensed under a Creative Commons Attribution 4.0 International License.
