Downloads: 2 | Views: 216 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper | Information Security | United States of America | Volume 11 Issue 11, November 2022 | Popularity: 4.6 / 10
Human Resource Management with IAM
Sampath Talluri
Abstract: Modern firms rely on HRMS (human resource management system) and IAM (identity and access management) to manage staff and protect personal information. A human resource management system, or HRMS, is a comprehensive set of tools to manage an employee's stay with a firm, from recruiting to performance review and even off boarding. In other terms, identity and access management (IAM) is a security solution that restricts access to specific systems and maintains digital identities. Its primary purpose is to keep unauthorized persons from accessing important information.
Keywords: Human resource management (HRM), Identity and access management (IAM), Challenges, Best Practices, Business efficiency, Security, Compliance
Edition: Volume 11 Issue 11, November 2022
Pages: 1496 - 1501
DOI: https://www.doi.org/10.21275/SR231204082334
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024
Pages: 183 - 184Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Downloads: 0
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi, Dr. Mohammed Naif Alatawi
Downloads: 0
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022
Pages: 1376 - 1377Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models
Santosh Kumar Kande
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 11 Issue 2, February 2022
Pages: 148 - 151Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami, Nisarg Shah
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi