ISO/IEC 29109-7:2011 is a part of the ISO/IEC 29109 series focused on biometric data interchange format conformance testing. Specifically, this standard addresses conformance testing methodology for signature/sign behavioral data as defined in ISO/IEC 19794-7. Here’s an overview of its purpose, key requirements, and application:
Overview of ISO/IEC 29109-7:2011
The standard outlines how to assess whether signature/sign behavioral biometric data is formatted in compliance with ISO/IEC 19794-7 requirements. Signature/sign biometrics capture the behavioral characteristics of a person’s signing motion, providing a means of verification that is both unique to the individual and commonly accepted in both legal and security contexts.
Purpose and Importance
The primary goal of ISO/IEC 29109-7:2011 is to ensure that biometric data related to signatures/signs is:
-
- Interoperable between different biometric systems and across borders.
-
- Consistently formatted so data can be reliably processed, stored, and shared.
-
- Secure and Accurate, supporting identity verification and fraud prevention efforts.
Key Components and Requirements
-
- Conformance Testing Protocols
-
- The standard provides specific test procedures to verify that the data format and structure align with ISO/IEC 19794-7.
-
- It defines precise methods for testing the integrity, accuracy, and consistency of the signature data structure.
-
- Conformance Testing Protocols
-
- Data Format Specifications
-
- The standard includes guidance on required data elements, such as the capture format and metadata needed for each biometric signature sample.
-
- It ensures that biometric data is structured to maintain accuracy and reliability across different platforms.
-
- Data Format Specifications
-
- Documentation and Reporting
-
- Organizations must document testing processes and results to demonstrate compliance.
-
- Regular reviews and audits help verify that the conformance testing meets quality standards and keeps up with updates to the standard.
-
- Documentation and Reporting
-
- Interoperability Focus
-
- A key aim of the standard is to promote seamless interoperability between systems, ensuring that the signature biometric data can be used in cross-system applications without reformatting.
-
- Interoperability Focus
Application Scenarios
ISO/IEC 29109-7:2011 is essential in sectors where signature verification is a standard security measure, including:
-
- Banking and Financial Services: For secure transactions, digital signing, and fraud prevention.
-
- Legal Documentation: Ensuring the validity and authenticity of digitally signed documents.
-
- Government Services: National ID systems and other applications where signature biometrics verify individual identity.
Benefits of ISO/IEC 29109-7:2011 Compliance
-
- Enhanced Security: By adhering to the standard, organizations improve the security of signature-based biometric data, reducing risks of identity theft and fraud.
-
- Operational Efficiency: Standardized data formatting reduces processing time and allows easier integration into existing systems.
-
- Global Compatibility: Organizations can achieve cross-border data compatibility, aiding in international collaborations and data exchange.
Implementing ISO/IEC 29109-7:2011
-
- Gap Analysis: Start by evaluating current signature data formats and processing methods.
-
- Testing and Validation: Use the conformance testing methods defined in the standard to validate signature data structure.
-
- Training and Continuous Monitoring: Train staff on the standard requirements and maintain continuous monitoring to ensure compliance over time.
ISO/IEC 29109-7:2011 plays a crucial role in upholding the integrity, compatibility, and security of biometric signature data, making it an invaluable standard for industries relying on behavioral biometrics for secure, reliable identity verification.
What is required ISO/IEC 29109-8:2011
ISO/IEC 29109-8:2011 provides guidelines for the conformance testing of iris image data as defined in ISO/IEC 19794-6. The standard specifies the requirements necessary to ensure that iris biometric data is formatted correctly and can be reliably used across different biometric systems. Here are the key requirements outlined in ISO/IEC 29109-8:2011:
Key Requirements of ISO/IEC 29109-8:2011
-
- Conformance Testing Procedures:
-
- Testing Methodology: Establishes a systematic approach to test iris images for compliance with the specifications outlined in ISO/IEC 19794-6.
-
- Test Cases: Specifies various test cases to assess data accuracy, consistency, and overall integrity.
-
- Conformance Testing Procedures:
-
- Data Structure Specifications:
-
- Format Compliance: Requires that iris image data conforms to specific format requirements, including image resolution, color depth, and image size.
-
- Data Elements: Defines mandatory and optional data elements for iris images, such as the image’s capture date, device ID, and quality indicators.
-
- Data Structure Specifications:
-
- Interoperability Standards:
-
- Cross-System Compatibility: Ensures that iris data can be used across various biometric systems without the need for reformatting.
-
- Global Data Exchange: Promotes a standard format that facilitates international interoperability for biometric data sharing.
-
- Interoperability Standards:
-
- Documentation and Reporting:
-
- Testing Documentation: Requires comprehensive documentation of the testing processes, results, and any non-compliance issues identified during testing.
-
- Audit Trails: Establishes a framework for maintaining records that can support compliance audits and reviews.
-
- Documentation and Reporting:
-
- Quality Control:
-
- Quality Assurance: Emphasizes the importance of quality control measures in the data capture process to ensure that the iris images meet the required standards before they are stored or transmitted.
-
- Quality Control:
-
- Security and Privacy Considerations:
-
- Data Protection: Encourages practices that protect the integrity and confidentiality of biometric data throughout its lifecycle.
-
- Security and Privacy Considerations:
Summary
In summary, ISO/IEC 29109-8:2011 outlines the necessary requirements for ensuring that iris biometric data is captured, formatted, and tested in accordance with established standards, thereby promoting reliable identification and verification processes in various applications. Organizations that utilize iris recognition technology must adhere to these guidelines to enhance data accuracy, security, and interoperability within their systems.
Who is required ISO/IEC 29109-8:2011
ISO/IEC 29109-8:2011 is relevant for various stakeholders involved in the biometric sector, specifically those working with iris recognition technology. The following entities and professionals are required to adhere to the guidelines established in this standard:
1. Biometric System Developers
-
- Companies or organizations that design and develop biometric systems incorporating iris recognition technology must ensure their systems comply with the standard to promote interoperability and reliability.
2. Biometric Data Providers
-
- Entities that collect or provide iris biometric data (e.g., enrollment centers, government agencies, or biometric service providers) are required to ensure that the data they capture meets the specified format and quality standards.
3. Quality Assurance and Testing Laboratories
-
- Laboratories conducting testing and validation of iris recognition systems or biometric data must follow the methodologies outlined in ISO/IEC 29109-8:2011 to ensure compliance with the relevant requirements.
4. Regulatory Bodies
-
- Government and regulatory agencies that oversee biometric data collection and use, particularly in applications like national ID programs or immigration control, may require compliance with this standard to ensure that systems are secure and effective.
5. End-Users of Biometric Systems
-
- Organizations that implement iris recognition systems for access control, security, or identity verification should be aware of the standard to ensure the systems they use are compliant and capable of reliable performance.
6. System Integrators
-
- Companies that integrate biometric technologies into larger security or identification systems should consider this standard when selecting or designing components to ensure compatibility and effectiveness.
7. Consultants and Auditors
-
- Professionals providing consulting services in biometric technology or conducting audits of biometric systems may use this standard as a framework for assessing compliance and operational effectiveness.
Conclusion
Overall, ISO/IEC 29109-8:2011 applies to a wide range of stakeholders in the biometric ecosystem, emphasizing the importance of standardization in promoting interoperability, security, and quality in iris recognition systems. Compliance with this standard is crucial for ensuring that biometric systems function effectively and securely across various applications.
When is required ISO/IEC 29109-8:2011
ISO/IEC 29109-8:2011 is required under several circumstances in the field of biometric systems, particularly those involving iris recognition technology. Here are the key scenarios when compliance with this standard is necessary:
1. Development of Iris Recognition Systems
-
- When organizations are designing or developing new iris recognition systems, adherence to ISO/IEC 29109-8:2011 ensures that the system meets international standards for data format and interoperability.
2. Data Collection and Enrollment
-
- During the process of collecting and enrolling iris biometric data, compliance with the standard is necessary to ensure that the data captured meets the required specifications for quality and format. This is crucial for subsequent identification or verification processes.
3. System Testing and Validation
-
- Organizations that conduct testing and validation of iris recognition systems must follow the guidelines set forth in the standard to ensure that their systems accurately process and interpret iris data. This includes compliance testing against established test cases.
4. Regulatory Compliance
-
- When operating in jurisdictions where biometric data usage is regulated, compliance with ISO/IEC 29109-8:2011 may be required to meet legal and regulatory standards governing the collection, storage, and processing of biometric information.
5. Interoperability Requirements
-
- In projects requiring interoperability between different biometric systems (e.g., in government initiatives, border control, or multi-agency collaborations), adherence to this standard is critical to ensure seamless data exchange and compatibility.
6. Quality Assurance Practices
-
- Organizations implementing quality control measures for their biometric data and systems need to align with ISO/IEC 29109-8:2011 to validate the integrity and reliability of their data processing practices.
7. Upgrading or Integrating Systems
-
- When upgrading existing systems or integrating new biometric technologies, compliance with this standard is necessary to ensure that all components function correctly and meet established quality benchmarks.
8. Training and Certification Programs
-
- Training programs for personnel involved in biometric data collection, analysis, or system maintenance may incorporate the standard as part of their curriculum to ensure that staff understand and implement best practices in line with international standards.
Conclusion
In summary, ISO/IEC 29109-8:2011 is required throughout various stages of the iris recognition system lifecycle, from development and data collection to testing and regulatory compliance. Organizations in the biometric sector should prioritize adherence to this standard to ensure reliable, secure, and interoperable systems.
Where is required ISO/IEC 29109-8:2011
ISO/IEC 29109-8:2011 is required in various contexts and settings where iris recognition technology is utilized. Here are the key locations and environments where compliance with this standard is necessary:
1. Biometric Data Collection Centers
-
- Facilities that capture and enroll iris biometric data, such as government registration offices, border control stations, and identity verification centers, must comply with this standard to ensure the quality and consistency of the data collected.
2. Security and Access Control Systems
-
- Organizations that implement iris recognition systems for access control to secure areas (e.g., airports, government buildings, data centers) should adhere to ISO/IEC 29109-8:2011 to ensure that their systems can reliably verify identity.
3. Law Enforcement and National Security Agencies
-
- Agencies involved in identification and verification processes, such as police departments, immigration control, and national security organizations, are required to follow this standard to ensure accuracy and interoperability in their biometric systems.
4. Healthcare Facilities
-
- Hospitals and medical institutions that use iris recognition for patient identification and access to medical records may require compliance to ensure patient privacy and data integrity.
5. Research and Development Labs
-
- Research institutions developing new biometric technologies or enhancing existing iris recognition methods need to comply with this standard to validate their findings and ensure compatibility with existing systems.
6.Biometric Technology Manufacturers
-
- Companies producing hardware or software solutions for iris recognition systems must adhere to ISO/IEC 29109-8:2011 during the design and manufacturing process to ensure that their products meet established standards.
7. Integration and Testing Facilities
-
- Organizations that integrate biometric systems into broader security solutions or perform testing and validation of these systems must apply this standard to ensure interoperability and compliance with regulatory requirements.
8. Training and Certification Organizations
-
- Institutions providing training for biometric system operators, technicians, and auditors should incorporate the guidelines of ISO/IEC 29109-8:2011 in their curricula to ensure that personnel are equipped with the necessary knowledge for compliance.
Conclusion
Overall, ISO/IEC 29109-8:2011 is required in various settings where iris recognition technology is deployed. Compliance with this standard is essential for ensuring that biometric systems operate effectively, securely, and in accordance with international best practices.
How is required ISO/IEC 29109-8:2011
The implementation of ISO/IEC 29109-8:2011 requires a structured approach to ensure compliance with its specifications for iris recognition technology. Here are the key steps and methodologies organizations should follow to effectively implement this standard:
1.Understanding the Standard
-
- Familiarization: Stakeholders must thoroughly understand the requirements outlined in ISO/IEC 29109-8:2011, including definitions, objectives, and technical specifications for iris recognition systems.
-
- Training: Provide training to relevant personnel (e.g., developers, technicians, and system operators) to ensure they are knowledgeable about the standard’s implications and application.
2. System Design and Development
-
- Adhere to Specifications: When developing iris recognition systems, ensure that the design aligns with the standard’s specifications regarding data formats, algorithms, and performance criteria.
-
- Incorporate Best Practices: Use recommended best practices for software development and system integration that comply with ISO/IEC 29109-8:2011.
3. Data Collection Procedures
-
- Standardized Protocols: Implement standardized protocols for iris data capture, ensuring that the equipment and methods used meet the standard’s guidelines for quality and accuracy.
-
- Quality Control: Establish quality control measures to ensure the collected data meets the specified criteria for usability in identification or verification processes.
4. Testing and Validation
-
- Compliance Testing: Conduct rigorous testing of the iris recognition systems to ensure they conform to the requirements of ISO/IEC 29109-8:2011. This includes functional testing, performance testing, and interoperability testing with other systems.
-
- Documentation: Maintain comprehensive documentation of all testing procedures, results, and any corrective actions taken to address non-compliance issues.
5. Integration and Interoperability
-
- System Integration: Ensure that the iris recognition system can integrate with other biometric systems or security applications in a manner that complies with interoperability standards outlined in ISO/IEC 29109-8:2011.
-
- Interface Standards: Use defined interfaces and communication protocols to facilitate seamless data exchange between systems.
6. Regulatory Compliance and Reporting
-
- Monitor Regulations: Stay informed about applicable regulations and legal requirements related to biometric data handling and ensure compliance with ISO/IEC 29109-8:2011 as part of broader regulatory obligations.
-
- Periodic Audits: Conduct periodic audits of the system and processes to ensure ongoing compliance with the standard and to identify areas for improvement.
7. Stakeholder Engagement and Communication
-
- Stakeholder Involvement: Engage relevant stakeholders (e.g., system users, clients, regulatory bodies) throughout the implementation process to gather feedback and address concerns.
-
- Communication Protocols: Establish clear communication protocols to report on compliance status and system performance to stakeholders.
8.Continuous Improvement
-
- Review and Update: Regularly review the implementation of ISO/IEC 29109-8:2011 and update systems and procedures based on new insights, technological advancements, or changes in regulatory requirements.
-
- Feedback Mechanisms: Implement feedback mechanisms to learn from operational experiences and make necessary adjustments to enhance system effectiveness and compliance.
Conclusion
Implementing ISO/IEC 29109-8:2011 requires a systematic approach involving training, adherence to technical specifications, rigorous testing, stakeholder engagement, and a commitment to continuous improvement. Organizations should prioritize compliance to ensure the reliability and security of their iris recognition systems while meeting international standards.
Case Study on ISO/IEC 29109-8:2011
Case Study: Implementation of ISO/IEC 29109-8:2011 in a National Identity Program
Background: A national government initiated a comprehensive identity management program to enhance national security, streamline access to services, and prevent identity fraud. As part of this initiative, the government sought to implement a biometric identification system that utilized iris recognition technology.
Objective: The primary objective was to develop an iris recognition system that adhered to international standards, particularly ISO/IEC 29109-8:2011, ensuring high accuracy, interoperability, and security of biometric data.
Implementation Steps
1. Stakeholder Engagement
-
- Identifying Stakeholders: The project team identified key stakeholders, including government agencies, technology vendors, and civil society organizations.
-
- Workshops and Meetings: Regular workshops were conducted to gather input and address concerns related to privacy, security, and data management.
2.System Design and Development
-
- Selecting Technology Vendors: The government partnered with technology vendors experienced in biometric systems and familiar with ISO standards.
-
- System Specifications: The design specifications for the iris recognition system were developed based on ISO/IEC 29109-8:2011, covering data capture methods, data formats, and algorithms for feature extraction.
3. Data Capture Protocols
-
- Standardized Capture Procedures: The project team established standardized protocols for capturing iris images, ensuring that the equipment used complied with the technical specifications outlined in the standard.
-
- Quality Assurance: Regular quality assurance checks were implemented to assess the quality of the captured iris data and ensure it met the required standards.
4. Testing and Validation
-
- Compliance Testing: The system underwent rigorous testing to ensure compliance with ISO/IEC 29109-8:2011. This included:
-
- Functional Testing: Verifying that the system performed as intended under various conditions.
-
- Performance Testing: Assessing the system’s accuracy and speed in recognizing iris patterns.
-
- Interoperability Testing: Ensuring the system could seamlessly integrate with existing databases and other biometric systems.
-
- Compliance Testing: The system underwent rigorous testing to ensure compliance with ISO/IEC 29109-8:2011. This included:
5. Regulatory Compliance and Data Security
-
- Legal Framework: The project team worked with legal experts to ensure that the implementation complied with national data protection regulations.
-
- Data Encryption: Strong encryption methods were employed to secure biometric data both during transmission and storage.
6. Training and Capacity Building
-
- Training Programs: Comprehensive training programs were developed for personnel responsible for operating the iris recognition system. Training included:
-
- Technical training on system operation.
-
- Workshops on data protection and privacy regulations.
-
- Training Programs: Comprehensive training programs were developed for personnel responsible for operating the iris recognition system. Training included:
7. Public Awareness and Feedback Mechanisms
-
- Public Outreach Campaign: A public awareness campaign was launched to inform citizens about the new identity management program and the benefits of iris recognition technology.
-
- Feedback Mechanism: Citizens were encouraged to provide feedback on their experiences with the new system, fostering transparency and trust.
Results
-
- Successful Implementation: The iris recognition system was successfully implemented within the stipulated timeline, meeting all ISO/IEC 29109-8:2011 requirements.
-
- Enhanced Security and Efficiency: The system significantly reduced identity fraud cases and streamlined access to government services.
-
- Positive Public Reception: Public feedback indicated a high level of acceptance and trust in the new system, with citizens appreciating the enhanced security measures.
Conclusion
This case study illustrates the effective implementation of ISO/IEC 29109-8:2011 in a national identity program utilizing iris recognition technology. By adhering to international standards, the government was able to enhance security, protect citizen data, and build public trust in biometric identification systems. The experience gained can serve as a model for other countries considering similar initiatives.
White Paper on ISO/IEC 29109-8:2011
Introduction
ISO/IEC 29109-8:2011 is an international standard that focuses on the evaluation of biometric systems, specifically addressing the performance requirements for iris recognition systems. The standard is part of the ISO/IEC 29109 series, which provides guidelines for the biometric community to ensure interoperability, security, and quality in biometric data processing. This white paper aims to elucidate the significance, requirements, and implementation of ISO/IEC 29109-8:2011, as well as its benefits for organizations using iris recognition technology.
Overview of ISO/IEC 29109-8:2011
Objectives
The primary objectives of ISO/IEC 29109-8:2011 include:
-
- Performance Assessment: Establishing a framework for assessing the performance of iris recognition systems under various operational conditions.
-
- Standardization: Providing a uniform approach to the evaluation of biometric systems, ensuring consistency across different implementations.
-
- Interoperability: Facilitating interoperability among biometric systems by establishing common evaluation criteria.
Scope
ISO/IEC 29109-8:2011 specifically focuses on:
-
- Definitions and concepts related to iris recognition technology.
-
- Test methodologies for evaluating iris recognition performance.
-
- Requirements for data collection, processing, and system performance metrics.
Requirements of ISO/IEC 29109-8:2011
1. System Requirements
-
- Data Quality: The standard specifies the need for high-quality iris image capture, ensuring that images are clear and suitable for recognition.
-
- Algorithm Performance: Requirements for the performance of algorithms used for iris feature extraction and matching, including metrics for false acceptance rates (FAR) and false rejection rates (FRR).
2. Testing and Evaluation
-
- Testing Protocols: Clear protocols for conducting performance tests, including sample sizes, testing environments, and evaluation metrics.
-
- Benchmarking: Establishing benchmarks for comparing different iris recognition systems based on their performance metrics.
3. Documentation and Reporting
-
- Test Reports: Guidelines for documenting test procedures and results to ensure transparency and reproducibility.
-
- Compliance Assessment: Procedures for assessing whether a system meets the requirements set forth in the standard.
Implementation of ISO/IEC 29109-8:2011
Steps for Implementation
-
- Stakeholder Engagement: Involve relevant stakeholders, including technology providers, regulatory bodies, and end-users in the planning and implementation phases.
-
- System Design and Development: Design and develop iris recognition systems that comply with the performance and quality standards outlined in ISO/IEC 29109-8:2011.
-
- Testing and Validation: Conduct rigorous testing and validation to assess compliance with the standard, ensuring that all performance metrics are met.
-
- Continuous Monitoring: Implement a system for continuous monitoring and evaluation of iris recognition performance to identify areas for improvement.
Challenges in Implementation
-
- Technical Complexity: The technical demands of the standard may require specialized knowledge and expertise, which can be a barrier for some organizations.
-
- Cost Implications: The need for high-quality hardware and software solutions, as well as ongoing testing and validation, can lead to increased costs.
Benefits of ISO/IEC 29109-8:2011
-
- Enhanced Security: By adhering to the standard, organizations can ensure that their iris recognition systems are robust and secure, reducing the risk of identity fraud.
-
- Improved Interoperability: The standard promotes interoperability among different biometric systems, enabling seamless integration and data sharing.
-
- Trust and Transparency: Compliance with international standards enhances public trust in biometric systems, fostering greater acceptance among users.
Conclusion
ISO/IEC 29109-8:2011 provides a comprehensive framework for the evaluation and implementation of iris recognition systems. By adhering to the requirements and recommendations outlined in this standard, organizations can enhance the performance, security, and interoperability of their biometric solutions. As biometric technology continues to evolve, adherence to established standards like ISO/IEC 29109-8:2011 will be critical in ensuring the reliability and acceptance of iris recognition systems in various applications.
References
-
- ISO/IEC 29109-8:2011 – Information technology — Biometric performance testing and reporting — Part 8: Iris recognition.
-
- National Institute of Standards and Technology (NIST) – Biometric standards and guidelines.
- Industry best practices for biometric system implementation.
- “Certification”. International Organization for Standardization. Archived from the original on Feb 27, 2024.
- ^ “Glossary of Important Assessment and Measurement Terms”. NCME. Archived from the original on 2017-07-22. Retrieved 8 March 2017.
- ^ Cem Kaner (Mar 26, 2014). “Why propose an advanced certification in software testing?”. Retrieved November 4, 2014.
- ^ “Academic Degrees Abbreviations”. Abbreviations.com. Archived from the original on Feb 15, 2014. Retrieved January 30, 2014.
- ^ “Motion Picture Association of America”. mpaa.org. Archived from the original on Dec 30, 2011.
- ^ International standards and private standards. International Organization for Standardization. 2010. ISBN 978-92-67-10518-5. Archived from the original on May 21, 2023 – via DocPlayer.
- ^ “Attestations of conformity”. CASCO. International Organization for Standardization. Archived from the original on Nov 30, 2023.
- ^ “U.S. Conformity Assessment System: 3rd Party Conformity Assessment”. ANSI Standards Portal. Retrieved November 4, 2014.
- ^ Jump up to:a b “Certifying Software Testers Worldwide – ISTQB® International Software Testing Qualifications Board”. Retrieved November 4, 2014.
- ^ “International Institute for Software Testing (IIST) CSTP & CTM Informational Home Page”. Testinginstitute.com. Retrieved January 30, 2014.
- Papanek, Victor J. (1984) [1972]. Design for the Real World: Human Ecology and Social Change (2nd ed.). Chicago: Academy Chicago. p. 276. ISBN 0897331532. OCLC 12343986.
- ^ Blizzard, Jacqualyn; Klotz, Leidy (2012). “A framework for sustainable whole systems design”. R Design Studies. 33 (5): 456–479. doi:10.1016/j.destud.2012.03.001.
- ^ Lukosh, Heidi; Bekebrede, Geertje; Kurapati, Shalini; Lukosch, Stephan (2018). “A Scientific Foundation of Simulation Games for the Analysis and Design of Complex Systems”. Simulation & Gaming. 49 (3): 279–314. doi:10.1177/1046878118768858. PMC 6187265. PMID 30369775.
- ^ Werner, Ulrich (September 1987). “Critical heuristics of social systems design”. European Journal of Operational Research. 31 (3): 276-283. doi:10.1016/0377-2217(87)90036-1.
- ^ Ulrich, Karl T.; Eppinger, Steven D. (2000). Product Design and Development (Second ed.). Boston: Irwin McGraw-Hill.
- ^
This article incorporates public domain material from Federal Standard 1037C. General Services Administration. Archived from the original on 2022-01-22. - ^
This article incorporates public domain material from Dictionary of Military and Associated Terms. United States Department of Defense. - ^ Arden, Trevor (1991). Information technology applications. London: Pitman. ISBN 978-0-273-03470-4.
- Jeffery, Neil (July 2009). “Stakeholder Engagement: A Road Map to Meaningful Engagement” (PDF). The Doughty Centre for Corporate Responsibility, Cranfield School of Management. Archived from the original (PDF) on 17 April 2015.
- ^ Ziafati Bafarasat, A. and Baker, M. (2016) Building consensus for network power? Some reflections on strategic spatial planning in the North West region of England, Environment and Planning C: Government and Policy, 34(5), pp.900-926.
- ^ “Stakeholder Engagement: A Good Practice Handbook for Companies Doing Business in Emerging Markets” (PDF). International Finance Corporation. May 2007. Archived from the original (PDF) on 24 January 2009.
- ^ Torelli, Riccardo; Balluchi, Federica; Furlotti, Katia (2019-07-22). “The materiality assessment and stakeholder engagement: A content analysis of sustainability reports”. Corporate Social Responsibility and Environmental Management. 27 (2): 470–484. doi:10.1002/csr.1813. ISSN 1535-3958. S2CID 199740313.
- “Communication and Management | Principles of Management”.
- ^ Oliver, C. E. (1983). Communications management. Project Management Quarterly, 14(1), 28–30.
- ^ “The Significance of Communication”.
- ^ Weber, J.L., Communication Management Techniques Every PM Should Know, January 6, 2020, web, https://www.projectmanager.com/blog/communication-management-techniques
- ^ “Communication and Collaboration in Project Management – Introduction – Project Management Hut”. pmhut.com. 17 February 2010.
- ^ “Communications Management”, Tutorialspoint, 2020, web, https://www.tutorial//spoint.com/management_concepts/communications_management.htm
- ^ Project Management Institute (1996). Project Communications Management. United States of America.
- ^ Ongkiko, Ila Virginia, and Flor, Alexander (2006). Introduction to Development Communication. University of the Philippines-Open University
- ^ Lumen Learning (n.d.) Principles of Management – Communication and Management. Retrieved from: https://courses.lumenlearning.com/wm-principlesofmanagement/chapter/communication-in-the-management-function/
- ^ Sinha, K. (n.d.) Importance of Communication in Management: 13 Importance’s. Retrieved from: https://www.yourarticlelibrary.com/management/communication/importance-of-communication-in-management-13-importances/64033
- ^ Lunenberg, F. (2010) Communication: The Process, Barriers, and Improving Effectiveness. Sam Houston State University.
- ^ “Communication and Management | Principles of Management”.
- ^ Rajkumar, S. (2010). Art of communication in project management. Paper presented at PMI® Research Conference: Defining the Future of Project Management, Washington, DC. Newtown Square, PA: Project Management Institute.
- ^ “Communication Definition & Meaning – Merriam-Webster”. 23 August 2023.
- ^ Nnamseh, M. (2009). The Role of Communication in Business Success. Nigeria Journal of Management Research, 1(4).
- ^ Etuk, E. J. (1991) Foundation of Modern Management. Calabar: Unical Press
- ^ “Communication and Management | Principles of Management”.
- ^ Chen, James. “Learn What Stakeholders Are and the Roles That They Play”. Investopedia. Retrieved 2020-12-06.
- ^ Van Riel, Cees B.M.; Fombrun, Charles J. (2007). Essentials of Corporate Communication. New York: Routledge. p. 205.
- ^ www.everettcc.edu https://www.everettcc.edu/ccec/enewsletters/stakeholder-engagement-strategic-planning#:~:text=External%20stakeholders%20need%20to%20understand,goal(s)%20and%20direction. Retrieved 2020-12-06.
{{cite web}}
: Missing or empty|title=
(help) - ^ “Different Effective Methods of Communication (Useful)”. EDUCBA. 2016-03-01. Retrieved 2020-12-06.
- ^ “Video Conferencing, Web Conferencing, Webinars, Screen Sharing”. Zoom Video. Retrieved 2020-12-06.
- ^ Mousena, Eleni & Sidiropoulou, Trifeni. (2018). Oral Communication Skills and Pedagogy. 10.5772/intechopen.70831.
- ^ What is Organizational Dynamics?. (n.d.). Retrieved from https://www.humanresourcesmba.net/faq/what-is-organizational-dynamics/
- ^ Küng, L. (2007). Strategic Leadership in the Media Industry. The Ashridge Journal, 1–6. Retrieved from http://www.lucykung.com/360_Sept07.pdf
- ^ Silvester, J. (2019). Leading in the Digital Era. BizEd AACSB International. Retrieved from https://bized.aacsb.edu/articles/2019/april/leading-in-the-digital-erahttps://en.wikipedia.org/wiki/Systems_design
- “Form and Style for ASTM Standards”. ASTM International. October 2017. Retrieved 8 February 2018.
- ^ Jump up to:a b c d e Committee E-11 on Quality Control of Materials (1963). ASTM Manual for Conducting an Interlaboratory Study of a Test Method. American Society for Testing and Materials. p. 3. Retrieved 8 February 2018.
- ^ Jump up to:a b Nigh, P.; Gattiker, A. (2000). “Test method evaluation experiments and data”. Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159). Vol. 2000. pp. 454–463. doi:10.1109/TEST.2000.894237. ISBN 978-0-7803-6546-9. S2CID 41043200.
- ^ Jump up to:a b c d e Bridwell, H.; Dhingra, V.; Peckman, D.; et al. (2010). “Perspectives on Method Validation: Importance of Adequate Method Validation”. The Quality Assurance Journal. 13 (3–4): 72–77. doi:10.1002/qaj.473.
- ^ “Glossary: S–Z”. Understanding Science. University of California Museum of Paleontology. Retrieved 8 February 2018.
- ^ Jump up to:a b “Why are these rest results so different?: The importance of testing methods in chemical and microbiological testing” (PDF). Asia Pacific Laboratory Accreditation Cooperation. January 2008. Retrieved 8 February 2018.
- ^ Jump up to:a b c Snodgrass, B.; Grant, T.; McCallum, K.; et al. (26 July 2014). “ISO 17025 Accreditation/Quality Management Systems Panel Discussion” (PDF). Association of American Feed Control Officials. Retrieved 8 February 2018.
- ^ Higgins, C. (2009). “Test Design and Documentation” (PPT). University of Nottingham. Retrieved 8 February 2018.
- ^ Jump up to:a b “Test Method, Validation and Verification of Methods: APHL Quality Management System (QMS) Competency Guidelines” (PDF). Association of Public Health Laboratories. Retrieved 8 February 2018.
- ^ Jump up to:a b Office of Regulatory Science (12 May 2014). “5.4 Test Methods and Method Validation” (PDF). Laboratory Manual Of Quality Policies For ORA Regulatory Laboratories: Volume 1. U.S. Food and Drug Administration. Retrieved 8 February 2018.
- “Definition of Interoperability”. dedicated website for a Definition of Interoperability at interoperability-definition.info. Copyright AFUL under CC BY-SA. Archived from the original on 2017-03-14. Retrieved 2017-03-13.
- ^ Institute of Electrical and Electronics Engineers. IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries. New York, NY: 1990.
- ^ Slater, T. (2012). “What is Interoperability?”. Network Centric Operations Industry Consortium. Archived from the original on 2014-07-14.
- ^ Slater, T. “Cross-Domain Interoperability”[usurped], Network Centric Operations Industry Consortium – NCOIC[usurped], 2013
- ^ Vercruysse, Kim; Dawson, David A.; Wright, Nigel (2019). “Interoperability: A conceptual framework to bridge the gap between multifunctional and multisystem urban flood management”. Journal of Flood Risk Management. 12 (S2): e12535. Bibcode:2019JFRM…12E2535V. doi:10.1111/jfr3.12535. ISSN 1753-318X.
- ^ Fenner, Richard; o’Donnell, Emily; Ahilan, Sangaralingam; Dawson, David; Kapetas, Leon; Krivtsov, Vladimir; Ncube, Sikhululekile; Vercruysse, Kim (2019), “Achieving Urban Flood Resilience in an Uncertain Future”, Water, 11 (5): 1082, doi:10.3390/w11051082, hdl:10871/37244
- ^ “Urban Flood Resilience”. www.urbanfloodresilience.ac.uk. Retrieved 2019-05-15.
- ^ NATO Glossary of Terms and Definitions, NATO AAP-06[permanent dead link]
- ^ Interoperability: A continuing Challenge in Coalition Air Operations – Chapter 2 “A broad Definition of Interoperability”, by Myron Hura, Gary McLeod, James Schneider and others, RAND Monograph Report, 2000, [1] Archived 2013-10-19 at the Wayback Machine
- ^ Allen, D. K., Karanasios, S., & Norman, A. (2013). Information sharing and interoperability: the case of major incident management. European Journal of Information Systems, 10.1057/ejis.2013.8.
- ^ Baldini, G. (2010). Report of the workshop on “Interoperable communications for Safety and Security”. Ispra: European Commission, Joint Research Centre (JRC), Institute for the Protection and Security of the Citizen.
- ^ “Interoperability system bridges communications gap”. FireRescue1. Archived from the original on 2017-02-02. Retrieved 2017-01-25.
- ^ Grier, Robin. “Interoperability Solutions”. Interoperability. Catalyst Communications. Retrieved 28 May 2011.
- ^ “FATPOT Technologies”. Archived from the original on 2018-07-10. Retrieved 2019-09-08.
- ^ “SIEC”. Retrieved 12 August 2016.
- ^ “SAFECOM – Homeland Security”. Archived from the original on 2014-12-21. Retrieved 12 August 2016.
- ^ “Apple opposes EU plans to make common charger port for all devices”. The Guardian. 23 September 2021. Retrieved 19 October 2021.
- ^ Peltier, Elian (23 September 2021). “In a setback for Apple, the European Union seeks a common charger for all phones”. The New York Times. Retrieved 19 October 2021.
- ^ “One common charging solution for all”. Internal Market, Industry, Entrepreneurship and SMEs – European Commission. 5 July 2016. Retrieved 19 October 2021.
- ^ Open Search Environments: The Free Alternative to Commercial Search Services
- ^ Gordon and Hernandez (2016-05-16). The Official Guide to the SSCP Book. SYBEX. ISBN 978-1119278634.
- ^ SC36 Secretariat (2003-11-13). “Proposed Draft Technical Report for: ISO/IEC xxxxx, Information technology — Learning, education, and training — Management and delivery — Specification and use of extensions and profiles” (PDF). ISO/IEC JTC1 SC36. Archived from the original (PDF) on 2007-11-29. Retrieved 12 August 2016.
- ^ “Open Services for Lifecycle Collaboration”. Retrieved 12 August 2016.
- ^ “OSLC (Open Services for Lifecycle Collaboration): open standard for i…”. 30 November 2011. Retrieved 12 August 2016.
- ^ 9. Java and JVM Interoperability [Book].
- ^ Thomas, Ben (5 March 2013). “Invalid Files and Language Learning: Your Brain’s Interoperable World”. Huffington Post. Retrieved 13 March 2013.
- ^ Bandoim, Lana. “Unified Interoperability as the Alternative to Big Data Costs?”. Yahoo! Voices. Retrieved 13 March 2013.
- ^ Jump up to:a b Moran, Andrew. “Tech leaders collaborate, unite over unified interoperability”. Digital Journal. Retrieved 13 March 2013.
- ^ “Next Generation Data Interoperability: It’s all About the Metadata” (PDF). Whitemarsh Information Systems Corporation. Retrieved 13 March 2013.
- ^ “Interoperability: What Is It and Why Should I Want It?”. Ariadne. Retrieved 13 March 2013.
- ^ MP Gallaher; AC O’Connor; JL Dettbarn, Jr.; LT Gilday (August 2004). Cost Analysis of Inadequate Interoperability in the U.S. Capital Facilities Industry (PDF) (Report). National Institute of Standards and Technology. p. iv. Archived from the original (PDF) on 2016-02-04. Retrieved 2012-04-19.
- ^ “e-Government Interoperability A comparative analysis of 30 countries” (PDF). CS Transform. 2010. Archived (PDF) from the original on 2022-10-09. Retrieved 21 January 2016.
- ^ “RAPS Preview: FDA CDRH Director Shuren Talks Priorities”. September 19, 2016. Retrieved April 8, 2017.
- ^
This article incorporates public domain material from Federal Standard 1037C. General Services Administration. Archived from the original on 2022-01-22. (in support of MIL-STD-188). - ^
This article incorporates public domain material from Dictionary of Military and Associated Terms. United States Department of Defense. - ^ Eastman, Charles M., and Eastman, Chuck (2008) BIM handbook: a guide to building information modeling for owners, managers, designers, engineers, and contractors John Wiley & Sons, pp.72-73.
- ^ “European Land Information Service”. Archived from the original on 2008-03-31. Retrieved 2008-10-19.
- ^ Design, Erskine. “Welcome – EULIS”. Archived from the original on 17 September 2016. Retrieved 12 August 2016.
- ^ “European Interoperability Framework (EIF)”.
- ^ IoT Semantic Interoperability: Research Challenges, Best Practices, Recommendations and Next Steps (PDF), European Research Cluster on the Internet of Things, March 2015
- ^ Morris, KC; Kulvatunyou, Serm; Frechette, Simon; Lubell, Josh; Goyal, Puja (December 2004). “XML Schema Validation Process for CORE.GOV” (PDF). Manufacturing Systems Integration Division, National Institute of Standards and Technology. Retrieved 13 June 2023.
- ^ NIEMOpen
- Jeffery, Neil (July 2009). “Stakeholder Engagement: A Road Map to Meaningful Engagement” (PDF). The Doughty Centre for Corporate Responsibility, Cranfield School of Management. Archived from the original (PDF) on 17 April 2015.
- ^ Ziafati Bafarasat, A. and Baker, M. (2016) Building consensus for network power? Some reflections on strategic spatial planning in the North West region of England, Environment and Planning C: Government and Policy, 34(5), pp.900-926.
- ^ “Stakeholder Engagement: A Good Practice Handbook for Companies Doing Business in Emerging Markets” (PDF). International Finance Corporation. May 2007. Archived from the original (PDF) on 24 January 2009.
- ^ Torelli, Riccardo; Balluchi, Federica; Furlotti, Katia (2019-07-22). “The materiality assessment and stakeholder engagement: A content analysis of sustainability reports”. Corporate Social Responsibility and Environmental Management. 27 (2): 470–484. doi:10.1002/csr.1813. ISSN 1535-3958. S2CID 199740313.