-
Resource
The Steady Convergence of Physical and Digital Identity
[GNC Magazine]An opinion piece on the advancement and ubiquitousness of digital technologies for identification purposes.
-
Resource
Gender and Genetics
[World Health Organization, Genomic Resource Center]A scientific discussion on the complexities of gender assignment.
-
Resource
Documenting Research with Transgender and Gender Diverse People: Protocol for an Evidence Map and Thematic Analysis
[National Library of Medicine National Institutes of Health]Mapping and description of transgender research in the fields of social sciences, sciences, humanities, health, education, and business.
-
Resource
Beyond Cultural Identity: Reflections on Multiculturalism
[Mediate.com]This article reflects on the concept of cultural identity. Originally published in Culture Learning, East-West Center Press, Richard Brislin, Editor, 1977, pp. 24-41, then republished Intercultural -
Resource
Glossary of Key Information Security Terms
[National Institute of Standards and Technology, U.S. Department of Commerce]This glossary provides a central resource of terms and definitions most commonly used in National Institute of Standard and Technology information security publications.
-
Resource
Glossary of Key Information Security Terms, NISTIR 7298 Revision 2
This document explains the importance of protecting the confidentiality of personally identifiable information (PII) in the context of information security.
Our Resource Library provides access to curated resources related to CRVS systems, including research, tools, publications, CRVS eLearning course, our Expert Talks video series, and a glossary of terms and definitions.
A CRVS system is one that connects relevant data from the civil registry and the health information system for the purpose of producing vital statistics. In order to function well, CRVS systems depend on common elements. These are featured under a unique section of our library. Examples include resources that focus on training, assessments and evaluations, identity management, data security and privacy, information and communications technology, and more.