International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 216 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Information Security | United States of America | Volume 11 Issue 11, November 2022 | Popularity: 4.6 / 10


     

Human Resource Management with IAM

Sampath Talluri


Abstract: Modern firms rely on HRMS (human resource management system) and IAM (identity and access management) to manage staff and protect personal information. A human resource management system, or HRMS, is a comprehensive set of tools to manage an employee's stay with a firm, from recruiting to performance review and even off boarding. In other terms, identity and access management (IAM) is a security solution that restricts access to specific systems and maintains digital identities. Its primary purpose is to keep unauthorized persons from accessing important information.


Keywords: Human resource management (HRM), Identity and access management (IAM), Challenges, Best Practices, Business efficiency, Security, Compliance


Edition: Volume 11 Issue 11, November 2022


Pages: 1496 - 1501


DOI: https://www.doi.org/10.21275/SR231204082334



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sampath Talluri, "Human Resource Management with IAM", International Journal of Science and Research (IJSR), Volume 11 Issue 11, November 2022, pp. 1496-1501, https://www.ijsr.net/getabstract.php?paperid=SR231204082334, DOI: https://www.doi.org/10.21275/SR231204082334



Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024

Pages: 183 - 184

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy

Share this Article

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami, Nisarg Shah

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article
Top