Academic literature on the topic 'Identity access management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity access management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity access management"

1

Pol, Mr Vinay Jayprakash. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 796–98. http://dx.doi.org/10.31142/ijtsrd23935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kalwani, Seema. "Identity Access Management, Identity Governance Administration, Privileged Access Management differences, tools and applications." International Journal of Multidisciplinary Research and Growth Evaluation 6, no. 2 (2025): 1832–39. https://doi.org/10.54660/.ijmrge.2025.6.2.1832-1839.

Full text
Abstract:
The article provides an overview, definitions, functioning, importance, differences, technology and tools for Identity Access Management (IAM), Identity Governance and Administration (IGA), Privileged Access Management (PAM) covering the benefits, workflows of the tools used to implement identity security landscape in enterprises.
APA, Harvard, Vancouver, ISO, and other styles
3

Hariharan, Ramanan. "AI-Driven Identity and Access Management in Enterprise Systems." International journal of IoT 05, no. 01 (2025): 62–94. https://doi.org/10.55640/ijiot-05-01-05.

Full text
Abstract:
Identity and Access Management (IAM) is essential for cybersecurity architecture because of the increasing complexity of the digital enterprise. The research investigates how Artificial Intelligence (AI) transforms Identity and Access Management (IAM) by establishing context-aware systems that function adaptively through automated identity governance capabilities. Concepts from traditional IAM infrastructure face challenges when implementing dynamic access models because they base their function on manual processes and static policies in their design. Machine learning combined with behavioral
APA, Harvard, Vancouver, ISO, and other styles
4

Uddin, Mumina, and David Preston. "Systematic Review of Identity Access Management in Information Security." Journal of Advances in Computer Networks 3, no. 2 (2015): 150–56. http://dx.doi.org/10.7763/jacn.2015.v3.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carnley, P. Renee, and Houssain Kettani. "Identity and Access Management for the Internet of Things." International Journal of Future Computer and Communication 8, no. 4 (2019): 129–33. http://dx.doi.org/10.18178/ijfcc.2019.8.4.554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mr., Vinay Jayprakash Pol. "Identity and Access Management Tools." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 796–98. https://doi.org/10.31142/ijtsrd23935.

Full text
Abstract:
Identity and access management is a vital information security control for organizations to minimize the insider threats and advanced persistent threats that are caused by mismanaged user's identities and access control on sensitive business applications. Unauthorized access to business critical IT applications results in information disclosure and financial loss for many organizations across the world. Deployment of identity and access management as an essential information security control will enable organizations to detect or even prevent security breaches due to unauthorized access. T
APA, Harvard, Vancouver, ISO, and other styles
7

Venkata, Soma. "Cloud Identity and Access Management." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 113–17. https://doi.org/10.5281/zenodo.13762453.

Full text
Abstract:
Cloud-based identity & access management is a strategic solution designed mainly for different cloud-based related operations with many advantages including constructive security mechanisms, swift identity management, and authenticated access controls. It manages the identities of users from provisioning to denial while upholding critical compliance as well as security standards. This study analyses the effective efficient cloud-based identity & access management solutions that ensure compliance, assist scalability, and enhance security in cloud environments. It has been found that thr
APA, Harvard, Vancouver, ISO, and other styles
8

Krishnapatnam, Mahendra. "Enhancing Healthcare Security with AI-Driven Identity and Access Management." International Journal of Science and Research (IJSR) 14, no. 2 (2025): 835–38. https://doi.org/10.21275/sr25212205041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Vikas, and Aashish Bhardwaj. "Identity Management Systems." International Journal of Strategic Decision Sciences 9, no. 1 (2018): 63–78. http://dx.doi.org/10.4018/ijsds.2018010105.

Full text
Abstract:
This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the envi
APA, Harvard, Vancouver, ISO, and other styles
10

Jin, Qiang, and Deren Kudeki. "Identity and Access Management for Libraries." Technical Services Quarterly 36, no. 1 (2019): 44–60. http://dx.doi.org/10.1080/07317131.2018.1532056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identity access management"

1

Fryaufová, Lucie. "Řízení identit v organizacích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162629.

Full text
Abstract:
The topic of this thesis is focused on the issues of the Identity Management. The author of the work describes the possibilities using this concept and application Identity Management in organizations. This issue is not oriented just from the point of Information security where this area belongs. The goal of this work is to create a framework of the process Identity Management by using best practises and standards. The context of the work should describe new trends and using special tools for safety work with process of Identity Management and the risk in area of the Identity Management. To ac
APA, Harvard, Vancouver, ISO, and other styles
2

Jaferian, Pooya. "User-centered design of identity and access management systems." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/51243.

Full text
Abstract:
IT security management (ITSM) technologies are important components of IT security in organizations. But there has been little research on how ITSM technologies should incorporate human and social issues into their design. Identity and Access Management (IAM) systems, as an important category of ITSM, share such a gap with other ITSM technologies. The overreaching goal of this research is to narrow the gap between IAM technologies and social context. In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools. We gathered re
APA, Harvard, Vancouver, ISO, and other styles
3

Kotora, Ondřej. "Centralizovaná správa rolí." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3371.

Full text
Abstract:
Správa rolí a identit se stává elementární součástí podnikových informačních systémů. Je součástí oboru Identity a Access managementu, který je velmi mladou a dynamicky se rozvíjející tržní oblastí. Tato diplomová práce poskytuje základní přehled o členění této tržní oblasti a zároveň charakterizuje tuto oblast z pohledu obecného přístupu a přístupu na úrovni odvětví. Je zde popsána nabídka několika hlavních hráčů na trhu s důrazem na vhodnost nasazení v českém prostředí. Konkrétně je vybírán vhodný produkt pro nasazení v České správě sociálního zabezpečení, největší finančně správní institucí
APA, Harvard, Vancouver, ISO, and other styles
4

Rhermini, Siham. "Identity, Access Management and Single Sign-On Web-based Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92235.

Full text
Abstract:
The systems' complexity growth over wide networks has increased the need for a centralized access control and strong authentication methods. And because systems have become increasingly distributed, additional need for single sign on solutions have become even more relevant. The aim of this study is to draw the state of the art on strong authentication solutions for protecting resources over networks and establish an evaluation summary of all the solutions presented. The study also presents the single sign on functionality and different architectures to implement it. This study contains a mark
APA, Harvard, Vancouver, ISO, and other styles
5

Hummer, Matthias [Verfasser], Günther [Akademischer Betreuer] Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://d-nb.info/1189905426/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hummer, Matthias Verfasser], Günther [Akademischer Betreuer] [Pernul, and Dogan [Akademischer Betreuer] Kesdogan. "Sustainable Identity and Access Management / Matthias Hummer ; Günther Pernul, Dogan Kesdogan." Regensburg : Universitätsbibliothek Regensburg, 2019. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-403116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
8

Filipsson, Emma. "Modelling and simulating Identity and Access Management based lateral movement in a cloud infrastructure." Thesis, KTH, Fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Engström, Pontus. "Exploring the non-technical challenges : A case study of identity and access management projects." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256228.

Full text
Abstract:
The implementation of an Identity and Access Management (IAM) solution is a complex process to manage, consuming multiple years and involves organizational changes. In its nature, several challenges tend to appear to different stakeholders involved in the process. However, prior research has mainly addressed the technical components of an IAM-solution, hence the technical challenges that emerge during development and implementation. Therefore, the non-technical challenges of the IAM-project work and the challenges that constitute the client implementation are understudied. The purpose of this
APA, Harvard, Vancouver, ISO, and other styles
10

Callahan, Michael John. "Exploring Identity Management at Community Colleges in Texas with Open Access to College Computer Networks." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1641.

Full text
Abstract:
The study addressed the lack of identity management practices in Texas community colleges to identify guest users who access college computers. Guest user access is required by Texas law and is part of the state's mission to bridge the technology gap; however, improper identification methods leave the college vulnerable to liability issues. The purpose of this study was to eliminate or mitigate liabilities facing colleges by creating and using security policies to identify guest users. This study combined the theoretical concepts of Cameron's internal security management model with the externa
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Identity access management"

1

Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Group, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identity access management"

1

D’Oliveiro, Michael. "Identity access management." In The Streaming Media Guide. Routledge, 2019. http://dx.doi.org/10.4324/9780429429750-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haber, Morey J., and Darran Rolls. "Privileged Access Management." In Identity Attack Vectors. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5165-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haber, Morey J., and Darran Rolls. "Privileged Access Management (PAM)." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sturrus, Edwin, and Olga Kulikova. "Identity and Access Management." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Png, Adrian, and Luc Demanche. "Identity and Access Management." In Getting Started with Oracle Cloud Free Tier. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6011-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Danturthi, R. Sarma. "Identity and Access Management." In 70 Tips and Tricks for Mastering the CISSP Exam. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6225-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Robichau, Bernard Peter. "Identity and Access Management." In Healthcare Information Privacy and Security. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beach, Brian. "Identity and Access Management." In Pro Powershell for Amazon Web Services. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6452-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beach, Brian, Steven Armentrout, Rodney Bozo, and Emmanuel Tsouris. "Identity and Access Management." In Pro PowerShell for Amazon Web Services. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4850-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ots, Karl. "Identity and Access Management." In Azure Security Handbook. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity access management"

1

Singh, Abhishek Pratap, Ievgeniia Kuzminykh, and Bogdan Ghita. "Industry Perception of Security Challenges with Identity Access Management Solutions." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Voicu, Vladimir, Dorin Petreuş, Emil Cebuc, and Silviu Băjenaru Marcu. "University Identity and Access Management Infrastructure with Keycloak: Lessons Learned." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nosouhi, Mohammad Reza, Zubair Baig, Robin Doss, et al. "The Value of Strong Identity and Access Management for ICS/OT Security." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lakshmi, J. Maha, Krishna Prasad, P. Samson Anosh Babu, and Ravikumar Ch. "A Decentralized Approach for Enhancing Identity and Access Management through Blockchain Integration." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cuzzocrea, Alfredo, and Islam Belmerabet. "Privacy-Preserving Identity and Access Management in Multiple Cloud Environments: Models, Issues, and Solutions." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10826004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Attaluri, Vivek Chowdary, Muniraju Hullurappa, Ravikumar Batchu, Lakshmi Narasimha Raju Mudunuri, Gopichand Vemulapalli, and Naga Ramesh Palakurti. "Identity Access Management for Network Devices: Enhancing Security of Modern IT Infrastructure in Healthcare." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11032042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tsoodol, Lkhamrolom, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, and Oyun-Erdene Namsrai. "Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morris, Vinton, and Kevin Kornegay. "Flow Table Modification Using Behavioral-Based Fingerprinting Technique to Facilitate Zero Trust Identity Management and Access Control." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Demirsoy, H. Burak, Ezgi Nur Kose, Furkan Aydogan, Muhammed H. Ezgin, and M. Ali Akcayol. "Hybrid Deep Learning Model Based Advanced AI-Driven Identity and Access Management System for Enhanced Security and Efficiency." In 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS). IEEE, 2024. https://doi.org/10.1109/isas64331.2024.10845215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

WeiYi Liu, Yue Tan, and Enwei Zhang. "Service token for identity access management." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394143.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity access management"

1

McCarthy, Jim, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, and Leah Kauffman. Identity and access management for electric utilities. National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.sp.1800-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harbitz, Mia Elisabeth. The Civil Registry: A Neglected Dimension of International Development. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009117.

Full text
Abstract:
The right to a name and nationality is not only one of the most fundamental human rights but also a requirement to access to basic and essential services such as health and education. This right is exercised through an effective and universal civil registration. It also allows for reliable vital statistics and higher levels of transparency and efficacy that provides the foundation for inclusive public policies, especially social programs. Thus civil registry, legal identity and identity management (Id-M) are central elements for social and economic development. On the international stage, the
APA, Harvard, Vancouver, ISO, and other styles
3

Ketterer, Juan Antonio, and Agustina Calatayud. Integrated Value Chain Risk Management. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0010631.

Full text
Abstract:
A widespread view in the private sector is that the lack of access to finance significantly limits the entry into and the performance of value chains. Access to finance is expensive, scarce, and short term in countries in Latin America and the Caribbean, and it hampers firms' investment and the financial management required to gain entry and remain as participants in a value chain. The lack of access to finance is a consequence of a series of market failures that form the basis for public policy intervention. The region's development banks and specialized agencies have thus designed programs t
APA, Harvard, Vancouver, ISO, and other styles
4

Baena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.

Full text
Abstract:
This paper contributes to the debate around why and how access to information can be used to prevent and control corruption. Access to information can not only bring corruption cases to light, it can also be a fundamental tool for its prevention and control, given that it encourages the creation of channels of participation and helps to identify vulnerabilities in both the public and the private sectors that might become windows of opportunity for corrupt practices. The paper`s conceptual framework explains how initiatives aimed at promoting access to information that are based on the concept
APA, Harvard, Vancouver, ISO, and other styles
5

Gwin, Catherine, Mayra Ruiz, Saleema Vellani, and Alejandro Guerrero. IDB-9: Access to Information. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010517.

Full text
Abstract:
Following up on the IDB-9 commitments, the Inter-American Development Bank (IDB, or Bank) established a new Access to Information Policy that took effect on January 1, 2011. The new policy was expected to match international best practices and to increase the overall transparency of the Bank, strengthening its governance and development effectiveness. This review assesses the extent to which the access to information reform has been fully and effectively implemented. The review finds that the new policy largely matches best practices in comparator institutions, with, however, one provision tha
APA, Harvard, Vancouver, ISO, and other styles
6

Shaheen, Susan, Elliot Shaheen, Adam Cohen, Jacquelyn Broader, and Richard Davis. Managing the Curb: Understanding the Impacts of On-Demand Mobility on Public Transit, Micromobility, and Pedestrians. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.1904.

Full text
Abstract:
In recent years, innovative mobility and shifts in travel and consumption behavior are changing how people access and use the curb. Shared mobility—the shared use of a vehicle, bicycle, scooter, or other mode—coupled with outdoor dining, curbside pick-up, and robotic delivery are creating new needs related to the planning, management, and enforcement of curb access. This study examines curb planning and management from several angles, such as safety, social equity, and multimodal connections. This research employs a multi-method approach to identify the changing needs for curb space management
APA, Harvard, Vancouver, ISO, and other styles
7

Maletta, Giovanna, and Mike Lewis. Post-shipment On-site Inspections and Stockpile Management Assistance: Bridging Gaps. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/ulfp1679.

Full text
Abstract:
Post-shipment on-site inspections and international assistance in physical security and stockpile management (PSSM) have different scopes and objectives. On-site inspections allow exporting states to check exported military materiel to ensure that the importer is complying with its commitments, while PSSM assistance aims to improve states’ weapons and ammunition management systems. However, both instruments allow foreign specialists to visit a state’s weapons and ammunition storage facilities and enable information gathering to assess their integrity and identify possible diversion risks. This
APA, Harvard, Vancouver, ISO, and other styles
8

Butcher, Neil, and Alison Zimmermann. Opportunities and Challenges for EMIS Implementation in the Caribbean. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005071.

Full text
Abstract:
This report aims to identify relative strengths and weaknesses in Education Management Information Systems (EMIS) across the Caribbean region, as well as recommendations for improvement, by collating findings from analysis of EMIS implementation in three countries -Barbados (2022), Jamaica (2019), and Suriname (2019-20)- and a description of the Guyana EMIS. The analysis highlights three strengths across the countries analyzed: (i) use of annual school census as a data capturing tool; (ii) use of data and digital content for the management of students, learning, and teaching; and (iii) the ava
APA, Harvard, Vancouver, ISO, and other styles
9

Katz, Aron, Mark Johnson, and Jinelle Sperry. Environmental DNA sampling for at-risk and invasive species management on military ranges : guidelines and protocols for installation biologists and land managers. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48275.

Full text
Abstract:
Environmental DNA (eDNA) analysis, or the detection of trace DNA shed by organisms into their environment, has the potential to transform Army capabilities for threatened and endangered species (TES) and invasive species management by providing a rapid, noninvasive, and cost-effective option for monitoring wildlife. Despite these benefits, eDNA analysis is underutilized on military installations as limited access to guidance materials, protocols, training opportunities, and support from eDNA scientists makes it difficult for installation biologists and military land managers to design and exec
APA, Harvard, Vancouver, ISO, and other styles
10

Kennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40701.

Full text
Abstract:
This technical note synthesizes and disseminates results of a 2020 survey of USACE dredging program and project managers to identify and prioritize needs related to the modernization and streamlining of the dredged material assessment decision guidance pursuant to Section 404 of the Clean Water Act (CWA) and Section 103 of the Marine Protection Research and Sanctuaries Act (MPRSA). Priorities identified through the survey and subsequent follow-on interviews—together with advances in science and technology—will facilitate development of an electronic decision guidance tool to enable consistent,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!