Skip to main content
Company data became more complicated and vulnerable with the increase in the number of users. In spite of company policies and procedures being implemented, it is still not enough to address the access control gaps stated in ISO 27002... more
    • by 
    •   4  
      Risk ManagementBPORisk Based ApproachIdentity and Access Management
and hence a soft area of KM. Its absence is the reason for the costly medical errors that continue to raise HC costs today.
    • by 
    •   10  
      Information TechnologyEnterprise ArchitectureKnowledge ManagementQuality of Healthcare Services
In this research-in-progress paper, we encourage information systems (IS) researchers to consider the self-sovereign identity (SSI) approach to identity management. We highlight several issues with current data practices, then provide an... more
    • by 
    •   5  
      PrivacyComputer SecurityPrivacy and data protectionIdentity and Access Management
The Cyber Community has published numerous Zero Trust Architecture (ZTA) infographics, white papers, and possible solution papers. INFOSECFORCE certainly applauds all these efforts. The possible difference between many of these... more
    • by 
    •   8  
      Access ControlCyber SecurityRadius ServerIT Innovation
    • by 
    •   7  
      Enterprise ArchitectureE-GovernmentE-HealthStandardization
    • by 
    • Identity and Access Management
The present communication proposes a digitally operative Unique Digital Identification Number leveraging the Distributed Ledger Technology. DLT is a protocol that allows secure functioning of a digital database that exists across several... more
    • by 
    •   9  
      Management Information SystemsDatabase Management SystemsScientific evidence, dissociative identity disorder, high technology and lawIdentity and Access Management
    • by 
    •   18  
      EconomicsSecurityProductivityDecision Support Systems
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology... more
    • by 
    •   4  
      Information SecurityComputer SecurityFederated IdentityIdentity and Access Management
In this paper, we present the project denominated Efficient and Transparent Municipalities -MuNet, developed by the Organization of American States -OAS, with the sponsorship of the Canadian for International Development Agency -CIDA. The... more
    • by 
    •   9  
      Enterprise ArchitectureE-GovernmentE-HealtheGovernment
Studies have revealed intense competition over land in Chittagong Hill Tracts (CHT) of Bangladesh. This study examines land dispute processes within and between hill people (Chakma Community) and Bengali settlers (who migrated through... more
    • by 
    •   10  
      AnthropologyIndigenous or Aboriginal StudiesDevelopment StudiesResearch Methodology
The following paper explores the way transparency is used and applied, on a performative and symbolic level, as (1) a device for managing the establishment of sociocultural norms and values and (2) an expedient for understanding the... more
    • by 
    •   18  
      Identity (Culture)Sociology of IdentityAnonymityCommunication and Anonymity/Identity
Mrežne barijere (engl. firewalls) koriste se za postavljanje kontrolnih tačaka bezbednosti na granicama privatnih mreža. U kontrolnim tačkama mrežna barijera ispituje sve pakete koji prolaze između privatne mreže i Interneta. U zavisnosti... more
    • by 
    •   14  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
Governments and businesses alike are coming to understand that national and global economies should us the Internet as a medium for innovation and economic growth. A critical component that has been left to service providers to establish... more
    • by 
    •   9  
      EcommerceEBusinessDigital IdentityeGovernment
The emergence of Blockchain technology as the biggest innovations of the 21 st century, has given rise to new concepts of Identity Management to deal with the privacy and security challenges on the one hand, and to enhance the... more
    • by 
    •   2  
      Identity and Access ManagementBlockchain Technologies
Every year, millions of candidates submit their educational credentials worldwide for admissions or recruitments. An alarming ratio (almost 10%) of applicants, in every recruitment, fabricates their educational history or overstate their... more
    • by 
    •   10  
      Real estate managementDistributed SystemsIdentity and Access ManagementCentralized and Decentralized Communication Networks
The Book contains a comprehensive overview of physical as well as digital identities. Taking into account the central, federated and self-sovereign models of digital identity, the self-sovereign model has been suggested for identification... more
    • by 
    •   15  
      National IdentityCryptographyDigital IdentityUIDAI
The UID system preserves personally identifiable information (PII) of millions of users on a centralized government database, supported by some legacy software, with numerous SPOF (single points of failures). Such a centralized system,... more
    • by 
    •   8  
      Social IdentityCitizenship and IdentityIdentity and Access ManagementBlockchains
The blockchain technology, by virtue of its key features like decentralization, persistency, anonymity and auditability, would benefit citizens by allowing them to save time when accessing or providing their personal data and records.... more
    • by 
    •   8  
      FinanceDistributed ComputingBankingDecentralized Systems
This is my final thesis proposal document submitted to the College of Computer Studies of De La Salle University - Manila. The context of this paper is completely different from the one I have uploaded before that is why this is tagged as... more
    • by 
    •   3  
      Risk ManagementOperational RiskIdentity and Access Management
Over the past decade, biometrics technology has evolved from a technology used primarily in forensics and a narrow scientific and technological field to an indispensable technology in public and private sectors ex¬panding into areas... more
    • by 
    •   11  
      Information TechnologyBiometricsBiometrics And IdentityIdentity
Identity verification is increasingly a legal obligation. There are many different laws and regulations that impose ‎on private-sector parties (either expressly or impliedly) a duty to identify persons with whom they ‎are dealing. ‎This... more
    • by 
    •   5  
      Digital IdentityCorporate Identity ManagementIdentity managementFederated identity management
    • by 
    •   3  
      Privileged AccessIdentity and Access ManagementFederated Identity and Access Management
We live in an information paradigm. The standard model of physics is being challenged and replaced by a data-centric probabilistic universe. It turns out that deterministic material reality is a subjective view of events, in the light of... more
    • by 
    •   5  
      Information TechnologyClimate ChangeInfosecIdentity and Access Management
    • by 
    •   16  
      Information TechnologyEnterprise ArchitectureKnowledge ManagementHealth Economics
Enseignante, conseillère et coordinatrice pédagogique Etudiante Master 2-Sciences du langage, didactique des langues et communication
    • by 
    •   18  
      Sociology of EducationEnterprise ArchitectureContinuing Professional DevelopmentSociology of Knowledge
With the pandemic of COVID-19, people around the world increasingly work from home. Each natural person typically has several digital identities with different associated information. During the last years, various identity and access... more
    • by 
    •   7  
      Enterprise ArchitectureInformation SecurityNetwork SecuritySecurity
Because of the economic and job market requirements, the Gulf Corporation Council (GCC) countries have acquired extremely high proportion of migrant workers in the world, and is considered as the third largest in the world after the... more
    • by 
    •   6  
      National IdentityIdentity managementPopulation StudiesPopulation Trends
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal... more
    • by 
    •   5  
      PKI (Cryptography)eGovernmentIdentity managementeServices
wireless sensor network (WSN) is an unmistakable innovation for a long while. In most genuine applications, the immense measure of information assembled utilizing sensors are required to be put away and be made accessible for whenever,... more
    • by 
    •   20  
      Computer ScienceHealth CareVirtual CommunityWireless Sensor Networks
Every person has his/her own identity. It’s important to manage a digital identity in a computer network, with high priority. In spite of different applications we use in organization, resources need to be managed and allotted to the... more
    • by 
    •   10  
      Wireless Sensor NetworksDigital IdentityInformation Security and PrivacySocial Networking Security and Privacy
'Edgeware' for wireless grid connectivity, utilizes open specifications developed by the National Science Foundation (NSF) Partnerships for Innovation (PFI) 'Wireless Grid Innovation Testbed' (WiGiT) to enable greater interoperability... more
    • by  and +2
    •   16  
      Grid ComputingEnterprise ArchitectureMobile Ad Hoc NetworksWireless Communications
El Gobierno Electrónico es un poderoso instrumento para la transformación del tradicional modelo de Estado burocrático hacia el de un moderno Estado proveedor de bienes y servicios. La consolidación de un modelo de gestión digitalizado... more
    • by 
    •   8  
      Enterprise ArchitectureE-GovernanceE-GovernmentE-Health
Song, C. S., & Kim, Y.-K. (2021). Predictors of consumers’ willingness to share personal information with fashion sales robots. Journal of Retailing and Consumer Services, 63, 102727. This study investigates whether consumers'... more
    • by 
    •   17  
      Artificial IntelligenceFashion TheoryHumanoid RoboticsPersonal Information Management
This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and security on a federation scale remain significant concerns among practitioners... more
    • by 
    •   8  
      Access ControlHadoopBig DataReference model
"In the context of the emergent Web of Data, a large number of organizations, institutes and companies (e.g., DBpedia, Geonames, PubMed ACM, IEEE, NASA, BBC) adopt the Linked Data practices and publish their data utilizing Semantic Web... more
    • by  and +3
    •   179  
      Information SystemsBioinformaticsCognitive PsychologyComputer Science
    • by 
    •   10  
      Information SystemsEnterprise ArchitectureData MiningE-Government
    • by 
    • Identity and Access Management
    • by 
    •   9  
      Information TechnologyEnterprise ArchitectureKnowledge ManagementE-Government
Background. Organisational Interoperability's concern with the re-engineering of work processes is critical for the success of joined-up eGovernment services.
    • by 
    •   7  
      Enterprise ArchitectureE-GovernmentE-HealthStandardization
In the context of the emergent Web of Data, a large number of organizations, institutes and companies (e.g., DBpedia, Geonames, PubMed ACM, IEEE, NASA, BBC) adopt the Linked Data practices and publish their data utilizing Semantic Web... more
    • by  and +1
    •   172  
      Information SystemsBioinformaticsCognitive PsychologyComputer Science
Für elektronische Geschäftstransaktionen von und zwischen Behörden wird ein Kennzeichen benötigt, ein so genannter Behördenidentifikator, der die beteiligten Behörden eindeutig identifiziert. Dieser Behördenidentifikator wird in einem... more
    • by 
    •   10  
      Public AdministrationEnterprise ArchitectureE-GovernmentE-Health
A biosensor is a device that measures biological or chemical reactions by converting them into electrical signals. Biosensors are made up of a biological component, such as an enzyme, antibody, or cell, and a transducer that converts the... more
    • by 
    •   4  
      BiosensorsNanotechnologyNanobiotechnology and BiosensorsBiosensing Techniques
Abstract: Throughout history, architecture has been the embodiment of the cultural ideals of human societies, and based on these ideals, the living environments created by different individuals have become a whole with its own identity.... more
    • by 
    •   2  
      Cultural StudiesIdentity and Access Management
Cloud computing is a major trend and a fast growing phenomena in the IT world. Organizations working in different sectors such as education or business are becoming more interested in moving their applications to the cloud to boost their... more
    • by 
    •   6  
      Network SecurityAccess ControlCloud ComputingRussian Federation
Increasing growth of new technologies and new technological solutions follow increasing demand for new business. The increased usage of new technologies and the higher uses' awareness of the potential problems they bring along have... more
    • by 
    •   11  
      IT GovernanceIaaSElectronic Records ManagementData Protection
Standards and infrastructure pose both theoretical and empirical challenges for digital government scholarship. For their part, scholars of standards and infrastructure have tended to neglect digital government development and public... more
    • by 
    •   10  
      Enterprise ArchitectureThailandE-GovernmentE-Health
ServiceNow ITSM mobile agent is available on the Apple App Store and Google Play Store, this app allows users to access work, receive notifications, and approve or reject change requests.
    • by 
Several countries have invested in building their identity management systems to equip citizens with infrastructures and tools to benefit from e-services. However, current systems still lack the interoperability requirement, which is the... more
    • by 
    •   4  
      PrivacyTrust ManagementInteroperabilityIdentity and Access Management
This paper describes how "
    • by  and +1
    •   9  
      Knowledge ManagementSoft ComputingEuropean UnionCritical infrastructure protection