Auswahl der wissenschaftlichen Literatur zum Thema „Identity access management“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Identity access management" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Identity access management"

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kalwani, Seema. "Identity Access Management, Identity Governance Administration, Privileged Access Management differences, tools and applications." International Journal of Multidisciplinary Research and Growth Evaluation 6, no. 2 (2025): 1832–39. https://doi.org/10.54660/.ijmrge.2025.6.2.1832-1839.

Der volle Inhalt der Quelle
Annotation:
The article provides an overview, definitions, functioning, importance, differences, technology and tools for Identity Access Management (IAM), Identity Governance and Administration (IGA), Privileged Access Management (PAM) covering the benefits, workflows of the tools used to implement identity security landscape in enterprises.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.

Der volle Inhalt der Quelle
Annotation:
Identity and Access Management (IAM) is essential for cybersecurity architecture because of the increasing complexity of the digital enterprise. The research investigates how Artificial Intelligence (AI) transforms Identity and Access Management (IAM) by establishing context-aware systems that function adaptively through automated identity governance capabilities. Concepts from traditional IAM infrastructure face challenges when implementing dynamic access models because they base their function on manual processes and static policies in their design. Machine learning combined with behavioral
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Uddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Carnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mr., Vinay Jayprakash Pol. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 796–98. https://doi.org/10.31142/ijtsrd23935.

Der volle Inhalt der Quelle
Annotation:
Identity and access management is a vital information security control for organizations to minimize the insider threats and advanced persistent threats that are caused by mismanaged user's identities and access control on sensitive business applications. Unauthorized access to business critical IT applications results in information disclosure and financial loss for many organizations across the world. Deployment of identity and access management as an essential information security control will enable organizations to detect or even prevent security breaches due to unauthorized access. T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Venkata, Soma. "Cloud Identity and Access Management." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 113–17. https://doi.org/10.5281/zenodo.13762453.

Der volle Inhalt der Quelle
Annotation:
Cloud-based identity & access management is a strategic solution designed mainly for different cloud-based related operations with many advantages including constructive security mechanisms, swift identity management, and authenticated access controls. It manages the identities of users from provisioning to denial while upholding critical compliance as well as security standards. This study analyses the effective efficient cloud-based identity & access management solutions that ensure compliance, assist scalability, and enhance security in cloud environments. It has been found that thr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Krishnapatnam, Mahendra. "Enhancing Healthcare Security with AI-Driven Identity and Access Management." International Journal of Science and Research (IJSR) 14, no. 2 (2025): 835–38. https://doi.org/10.21275/sr25212205041.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Der volle Inhalt der Quelle
Annotation:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the envi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Jin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Identity access management"

1

Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.

Der volle Inhalt der Quelle
Annotation:
The topic of this thesis is focused on the issues of the Identity Management. The author of the work describes the possibilities using this concept and application Identity Management in organizations. This issue is not oriented just from the point of Information security where this area belongs. The goal of this work is to create a framework of the process Identity Management by using best practises and standards. The context of the work should describe new trends and using special tools for safety work with process of Identity Management and the risk in area of the Identity Management. To ac
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.

Der volle Inhalt der Quelle
Annotation:
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITSM, share such a gap with other ITSM technologies. The overreaching goal of this research is to narrow the gap between IAM technologies and social context. In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools. We gathered re
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.

Der volle Inhalt der Quelle
Annotation:
Správa rolí a identit se stává elementární součástí podnikových informačních systémů. Je součástí oboru Identity a Access managementu, který je velmi mladou a dynamicky se rozvíjející tržní oblastí. Tato diplomová práce poskytuje základní přehled o členění této tržní oblasti a zároveň charakterizuje tuto oblast z pohledu obecného přístupu a přístupu na úrovni odvětví. Je zde popsána nabídka několika hlavních hráčů na trhu s důrazem na vhodnost nasazení v českém prostředí. Konkrétně je vybírán vhodný produkt pro nasazení v České správě sociálního zabezpečení, největší finančně správní institucí
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Rhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.

Der volle Inhalt der Quelle
Annotation:
The systems' complexity growth over wide networks has increased the need for a centralized access control and strong authentication methods. And because systems have become increasingly distributed, additional need for single sign on solutions have become even more relevant. The aim of this study is to draw the state of the art on strong authentication solutions for protecting resources over networks and establish an evaluation summary of all the solutions presented. The study also presents the single sign on functionality and different architectures to implement it. This study contains a mark
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Der volle Inhalt der Quelle
Annotation:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Filipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Engström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.

Der volle Inhalt der Quelle
Annotation:
The implementation of an Identity and Access Management (IAM) solution is a complex process to manage, consuming multiple years and involves organizational changes. In its nature, several challenges tend to appear to different stakeholders involved in the process. However, prior research has mainly addressed the technical components of an IAM-solution, hence the technical challenges that emerge during development and implementation. Therefore, the non-technical challenges of the IAM-project work and the challenges that constitute the client implementation are understudied. The purpose of this
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.

Der volle Inhalt der Quelle
Annotation:
The study addressed the lack of identity management practices in Texas community colleges to identify guest users who access college computers. Guest user access is required by Texas law and is part of the state's mission to bridge the technology gap; however, improper identification methods leave the college vulnerable to liability issues. The purpose of this study was to eliminate or mitigate liabilities facing colleges by creating and using security policies to identify guest users. This study combined the theoretical concepts of Cameron's internal security management model with the externa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Identity access management"

1

Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Pohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Group, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Identity access management"

1

D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide. Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Haber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Haber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Png, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Danturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Robichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Beach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Beach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ots, Karl. "Identity and Access Management." In Azure Security Handbook. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Identity access management"

1

Singh, Abhishek Pratap, Ievgeniia Kuzminykh, and Bogdan Ghita. "Industry Perception of Security Challenges with Identity Access Management Solutions." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646296.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Voicu, Vladimir, Dorin Petreuş, Emil Cebuc, and Silviu Băjenaru Marcu. "University Identity and Access Management Infrastructure with Keycloak: Lessons Learned." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722517.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Nosouhi, Mohammad Reza, Zubair Baig, Robin Doss, et al. "The Value of Strong Identity and Access Management for ICS/OT Security." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788047.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Lakshmi, J. Maha, Krishna Prasad, P. Samson Anosh Babu, and Ravikumar Ch. "A Decentralized Approach for Enhancing Identity and Access Management through Blockchain Integration." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871512.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cuzzocrea, Alfredo, and Islam Belmerabet. "Privacy-Preserving Identity and Access Management in Multiple Cloud Environments: Models, Issues, and Solutions." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10826004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Attaluri, Vivek Chowdary, Muniraju Hullurappa, Ravikumar Batchu, Lakshmi Narasimha Raju Mudunuri, Gopichand Vemulapalli, and Naga Ramesh Palakurti. "Identity Access Management for Network Devices: Enhancing Security of Modern IT Infrastructure in Healthcare." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11032042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Tsoodol, Lkhamrolom, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, and Oyun-Erdene Namsrai. "Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00124.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Morris, Vinton, and Kevin Kornegay. "Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903861.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Demirsoy, H. Burak, Ezgi Nur Kose, Furkan Aydogan, Muhammed H. Ezgin, and M. Ali Akcayol. "Hybrid Deep Learning Model Based Advanced AI-Driven Identity and Access Management System for Enhanced Security and Efficiency." In 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS). IEEE, 2024. https://doi.org/10.1109/isas64331.2024.10845215.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

WeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Identity access management"

1

McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Harbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009117.

Der volle Inhalt der Quelle
Annotation:
The right to a name and nationality is not only one of the most fundamental human rights but also a requirement to access to basic and essential services such as health and education. This right is exercised through an effective and universal civil registration. It also allows for reliable vital statistics and higher levels of transparency and efficacy that provides the foundation for inclusive public policies, especially social programs. Thus civil registry, legal identity and identity management (Id-M) are central elements for social and economic development. On the international stage, the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ketterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0010631.

Der volle Inhalt der Quelle
Annotation:
A widespread view in the private sector is that the lack of access to finance significantly limits the entry into and the performance of value chains. Access to finance is expensive, scarce, and short term in countries in Latin America and the Caribbean, and it hampers firms' investment and the financial management required to gain entry and remain as participants in a value chain. The lack of access to finance is a consequence of a series of market failures that form the basis for public policy intervention. The region's development banks and specialized agencies have thus designed programs t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Baena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.

Der volle Inhalt der Quelle
Annotation:
This paper contributes to the debate around why and how access to information can be used to prevent and control corruption. Access to information can not only bring corruption cases to light, it can also be a fundamental tool for its prevention and control, given that it encourages the creation of channels of participation and helps to identify vulnerabilities in both the public and the private sectors that might become windows of opportunity for corrupt practices. The paper`s conceptual framework explains how initiatives aimed at promoting access to information that are based on the concept
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010517.

Der volle Inhalt der Quelle
Annotation:
Following up on the IDB-9 commitments, the Inter-American Development Bank (IDB, or Bank) established a new Access to Information Policy that took effect on January 1, 2011. The new policy was expected to match international best practices and to increase the overall transparency of the Bank, strengthening its governance and development effectiveness. This review assesses the extent to which the access to information reform has been fully and effectively implemented. The review finds that the new policy largely matches best practices in comparator institutions, with, however, one provision tha
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Shaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.1904.

Der volle Inhalt der Quelle
Annotation:
In recent years, innovative mobility and shifts in travel and consumption behavior are changing how people access and use the curb. Shared mobility—the shared use of a vehicle, bicycle, scooter, or other mode—coupled with outdoor dining, curbside pick-up, and robotic delivery are creating new needs related to the planning, management, and enforcement of curb access. This study examines curb planning and management from several angles, such as safety, social equity, and multimodal connections. This research employs a multi-method approach to identify the changing needs for curb space management
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Maletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/ulfp1679.

Der volle Inhalt der Quelle
Annotation:
Post-shipment on-site inspections and international assistance in physical security and stockpile management (PSSM) have different scopes and objectives. On-site inspections allow exporting states to check exported military materiel to ensure that the importer is complying with its commitments, while PSSM assistance aims to improve states’ weapons and ammunition management systems. However, both instruments allow foreign specialists to visit a state’s weapons and ammunition storage facilities and enable information gathering to assess their integrity and identify possible diversion risks. This
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Butcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005071.

Der volle Inhalt der Quelle
Annotation:
This report aims to identify relative strengths and weaknesses in Education Management Information Systems (EMIS) across the Caribbean region, as well as recommendations for improvement, by collating findings from analysis of EMIS implementation in three countries -Barbados (2022), Jamaica (2019), and Suriname (2019-20)- and a description of the Guyana EMIS. The analysis highlights three strengths across the countries analyzed: (i) use of annual school census as a data capturing tool; (ii) use of data and digital content for the management of students, learning, and teaching; and (iii) the ava
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Katz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48275.

Der volle Inhalt der Quelle
Annotation:
Environmental DNA (eDNA) analysis, or the detection of trace DNA shed by organisms into their environment, has the potential to transform Army capabilities for threatened and endangered species (TES) and invasive species management by providing a rapid, noninvasive, and cost-effective option for monitoring wildlife. Despite these benefits, eDNA analysis is underutilized on military installations as limited access to guidance materials, protocols, training opportunities, and support from eDNA scientists makes it difficult for installation biologists and military land managers to design and exec
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40701.

Der volle Inhalt der Quelle
Annotation:
This technical note synthesizes and disseminates results of a 2020 survey of USACE dredging program and project managers to identify and prioritize needs related to the modernization and streamlining of the dredged material assessment decision guidance pursuant to Section 404 of the Clean Water Act (CWA) and Section 103 of the Marine Protection Research and Sanctuaries Act (MPRSA). Priorities identified through the survey and subsequent follow-on interviews—together with advances in science and technology—will facilitate development of an electronic decision guidance tool to enable consistent,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!