Journal articles on the topic 'Data Manipulation and Integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data Manipulation and Integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Apurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.
Full textService, R. F. "RESEARCH INTEGRITY: Pioneering Physics Papers Under Suspicion for Data Manipulation." Science 296, no. 5572 (2002): 1376–77. http://dx.doi.org/10.1126/science.296.5572.1376.
Full textSreevibhu, Sagi, and Teendra Pavan Kumar. "Application of Integrated RSA Encryption in Remote Data Integrity Check." Journal of Research in Science and Engineering 6, no. 8 (2024): 32–37. http://dx.doi.org/10.53469/jrse.2024.06(08).08.
Full textEka Mayasari and Sri Trisnaningsih. "Case Study: Manipulation of Financial Reports at PT. Adisarana Wanaartha Life Insurance (Wanaartha Life)." Formosa Journal of Applied Sciences 2, no. 10 (2023): 2541–50. http://dx.doi.org/10.55927/fjas.v2i10.6578.
Full textUllagaddi, P. "Safeguarding Data Integrity in Pharmaceutical Manufacturing." Journal of Advances in Medical and Pharmaceutical Sciences 26, no. 8 (2024): 64–75. http://dx.doi.org/10.9734/jamps/2024/v26i8708.
Full textARFEEN, RIMSHA. "Detection of Data Manipulation in Datasets Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50775.
Full textPutra, Ryan Adi, Rizka Ardiansyah, Mohammad Yazdi Pusadan, Anita Ahmad Kasim, and Yuri Yudhaswana Joefrie. "Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration." Advance Sustainable Science, Engineering and Technology 6, no. 1 (2024): 02401017. http://dx.doi.org/10.26877/asset.v6i1.17772.
Full textJaiswal, Himani, Muddukrishna B. S., and Girish Pai Kulyadi. "Data Integrity Violations: A Challenge to the Pharmaceutical Industry." International Journal of Pharmaceutical Quality Assurance 11, no. 01 (2020): 196–98. http://dx.doi.org/10.25258/ijpqa.11.1.30.
Full textNovianti, Sinta, and Deannes Isynuwardhana. "Pengaruh Komisaris Independen, Leverage, Dan Kepemilikan Institusional Terhadap Integritas Laporan Keuangan." Jurnal Pendidikan Akuntansi & Keuangan 9, no. 1 (2021): 64–73. http://dx.doi.org/10.17509/jpak.v9i1.27003.
Full textElwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.
Full textKeezhadath, Arun Ayilliath, and Lalitha Amarapalli. "Ensuring Data Integrity in Pharmaceutical Quality Systems: A Risk-Based Approach." Journal of AI-Powered Medical Innovations (International online ISSN 3078-1930) 1, no. 1 (2024): 83–104. https://doi.org/10.60087/japmi.vol01.issue01.p104.
Full textIrmayanti, Dian Putri, Ivan Yulivan, and AV Rahajeng Widyarsih. "The Threat Of Tax Evasion Practices In the Coal Mining Sector In Indonesia On Economic Security." Educoretax 4, no. 6 (2024): 800–813. http://dx.doi.org/10.54957/educoretax.v4i6.899.
Full textRohmah, Mufidatur, and Sri Trisnaningsih. "Analysis Violation of Professional Ethics in Manipulation Report Finance (Study The case of PT Garuda Indonesia)." International Journal of Management Science and Information Technology 3, no. 1 (2023): 8–15. http://dx.doi.org/10.35870/ijmsit.v3i1.844.
Full textElouataoui, Widad, Imane El Alaoui, Saida El Mendili, and Youssef Gahi. "An Advanced Big Data Quality Framework Based on Weighted Metrics." Big Data and Cognitive Computing 6, no. 4 (2022): 153. http://dx.doi.org/10.3390/bdcc6040153.
Full textFathurrozi, Adi. "Peran Etika Advokat dalam Penyelesaian Sengketa Manipulasi Data Pada Hukum Keluarga Islam." Jurnal Ilmiah Global Education 6, no. 2 (2025): 547–54. https://doi.org/10.55681/jige.v6i2.3739.
Full textKavoliūnaitė-Ragauskienė, Eglė. "Artificial Intelligence in Manipulation: The Significance and Strategies for Prevention." Baltic Journal of Law & Politics 17, no. 2 (2024): 116–41. https://doi.org/10.2478/bjlp-2024-00018.
Full textThorp, H. Holden. "Generative approach to research integrity." Science 381, no. 6658 (2023): 587. http://dx.doi.org/10.1126/science.adk1852.
Full textR., Atshaya, Bhavatharni J., Darshana S.B., and Ismankhan Y.M. "A Comparative Study on Hashing Algorithms for Data Integrity and Efficiency." Journal of Electronics and Informatics 7, no. 2 (2025): 95–111. https://doi.org/10.36548/jei.2025.2.002.
Full textHartgerink, Chris H. J., E. M. Kemper, Markus W. Hollmann, and Gerben ter Riet. "Analyzing DECREASE trials to estimate evidence of data manipulation." F1000Research 6 (November 13, 2017): 1995. http://dx.doi.org/10.12688/f1000research.12584.1.
Full textOrdoñez, Cristian Camilo, Gustavo Ramirez-Gonzalez, and Juan Carlos Corrales. "Enhancing Data Integrity in Blockchain Oracles Through Multi-Label Analysis." Applied Sciences 15, no. 5 (2025): 2379. https://doi.org/10.3390/app15052379.
Full textMaheswara, Reddy Basireddy. "Developing Tools to Compare Databases using Python." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 56–61. https://doi.org/10.5281/zenodo.13253397.
Full textLukasiak, Jason, David Stirling, Shane Perrow, and Nick Harders. "Manipulation of compressed data using MPEG-7 low level audio descriptors." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2003): 83–91. http://dx.doi.org/10.26636/jtit.2003.2.166.
Full textRossner, Mike. "A false sense of security." Journal of Cell Biology 183, no. 4 (2008): 573–74. http://dx.doi.org/10.1083/jcb.200810172.
Full textAdelia Furry Avriandi, Apriana Nur Asyifa, Giyan Triyani Sari, Maharani Dara Dinanti, Sandra Audina Maharani, and Herlina Manurung. "Analisis Audit Kasus Manipulasi Laporan Keuangan PT Wanaartha Life Tahun 2023." Jurnal Akuntan Publik 1, no. 4 (2023): 274–81. https://doi.org/10.59581/jap-widyakarya.v1i4.1860.
Full textDr S.G. Jachak, Jayshri Mahajan, Tejaswini Kshirsagar, Shruti Gaikwad, and Priyanka Mule. "Digital Watermarking and Steganography." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 03 (2025): 969–76. https://doi.org/10.47392/irjaem.2025.0158.
Full textFerrara, Massimiliano. "Strategic Interplay: Game-Theoretic Frameworks for Topological Robustness Against Data Poisoning." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 22 (July 14, 2025): 540–44. https://doi.org/10.37394/23209.2025.22.44.
Full textFirdaus, Caesar, Wahyudin Wahyudin, and Eddy Prasetyo Nugroho. "Monitoring System with Two Central Facilities Protocol." Indonesian Journal of Science and Technology 2, no. 1 (2017): 8. http://dx.doi.org/10.17509/ijost.v2i1.5986.
Full textChanchal, Manohar Avchar*. "Ensuring Data Integrity in the Pharmaceutical Industry: Challenges and Best Practices." International Journal of Pharmaceutical Sciences 3, no. 3 (2025): 3238–50. https://doi.org/10.5281/zenodo.15111267.
Full textMalasowe, Bridget Ogheneovo, Magaret Dumebi Okpor, Fidelis Aghware, Rita Erhovwo Ako, and Edim Bassey Edim. "Assuring Data Integrity, Preservation, Transparency and Privacy of Genomic Data in the Sharing Process Using Blockchain Technology." Advances in Multidisciplinary & Scientific Research Journal Publication 10, no. 3 (2024): 17–46. http://dx.doi.org/10.22624/aims/bhi/v10n3p2.
Full textMarbun, Nasib. "Implementation of RC4 Stream Cipher for Data Security in Internet Café Billing Systems." Instal : Jurnal Komputer 17, no. 03 (2025): 127–33. https://doi.org/10.54209/jurnalinstall.v17i03.366.
Full textNeeli, Sethu Sesha Synam. "A Hands-On Guide to Data Integrity and Privacy for Database Administrators." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem16443.
Full textDevie, Devie, Nathania Marchella Angelina Anggono, Vincent Christian Satya Pradana, and Hendri Kwistianus. "The Analysis of Corporate Governance on Integrity Financial Statements in Banking Companies Listed on The Indonesia Stock Exchange." International Journal of Organizational Behavior and Policy 3, no. 2 (2024): 97–108. http://dx.doi.org/10.9744/ijobp.3.2.97-108.
Full textSoraya, Nyayu, Maryamah, Syarnubi, and Septia Fahiroh. "Strategies for Cultivating Anti-Corruption Self-Awareness in Higher Education Learning." Tadrib: Jurnal Pendidikan Agama Islam 11, no. 1 (2025): 58–75. https://doi.org/10.19109/tadrib.v11i1.27661.
Full textAdebunmi Okechukwu Adewusi, Njideka Rita Chiekezie, and Nsisong Louis Eyo-Udo. "Cybersecurity in precision agriculture: Protecting data integrity and privacy." International Journal of Applied Research in Social Sciences 5, no. 10 (2023): 693–708. http://dx.doi.org/10.51594/ijarss.v5i10.1482.
Full textMaheswara, Reddy Basireddy. "Developing Tools to Compare Databases using Python." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 56–61. https://doi.org/10.5281/zenodo.13325121.
Full textLee, Seunghyeon, Hong-Woo Seok, Ki-rim Lee, and Hoh Peter In. "B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability." ISPRS International Journal of Geo-Information 11, no. 3 (2022): 186. http://dx.doi.org/10.3390/ijgi11030186.
Full textPankaj, M. Bhuyar, and S. W. Mohod Dr. "Multimedia Data Security through Embedded Image." International Journal of Advanced Innovative Technology in Engineering (IJAITE) 7, no. 5 (2022): 1–9. https://doi.org/10.5281/zenodo.7181044.
Full textAvros, Renata, Saar Keshet, Dvora Toledano Kitai, Evgeny Vexler, and Zeev Volkovich. "Detecting Pseudo-Manipulated Citations in Scientific Literature through Perturbations of the Citation Graph." Mathematics 11, no. 18 (2023): 3820. http://dx.doi.org/10.3390/math11183820.
Full textZahn, J., W. Rascher, and A. Neubert. "P107 How significant is the lack of formulations for paediatric inpatients?" Archives of Disease in Childhood 104, no. 6 (2019): e62.2-e62. http://dx.doi.org/10.1136/archdischild-2019-esdppp.145.
Full textAnwar, Adnan, Abdun Mahmood, Biplob Ray, Md Apel Mahmud, and Zahir Tari. "Machine Learning to Ensure Data Integrity in Power System Topological Network Database." Electronics 9, no. 4 (2020): 693. http://dx.doi.org/10.3390/electronics9040693.
Full textMakura, Sheunesu, Hein Venter, and Azola Lukhozi. "Enhancing Healthcare Data Security Using Blockchain." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 404–15. https://doi.org/10.34190/eccws.24.1.3512.
Full textChukanova, Svitlana. "Academic Integrity Norms Compliance in the Process of Research Data Management: Foreign Practice." Ukrainian Journal on Library and Information Science Current Archives About, no. 2 (December 27, 2018): 52–63. https://doi.org/10.31866/2616-7654.2.2018.152574.
Full textOluwatobi, Enitan Modeyin, and Abioye Adeyemo PhD Julius. "Exploring the Boundaries between Persuasion and Manipulation in Political Communication." GVU Journal of Research and Development 1, no. 2 (2024): 226–37. https://doi.org/10.5281/zenodo.14038496.
Full textHampiholi, Narayan. "THROUGH THE LENS OF PRINCIPLED DATA PRACTICE A GROUNDBREAKING EXPLORATION INTO ETHICAL HEALTHCARE PLATFORMS." International Journal of Engineering Applied Sciences and Technology 8, no. 5 (2023): 26–30. http://dx.doi.org/10.33564/ijeast.2023.v08i05.004.
Full textDesie, Erku Kifle, and Asrat Mulatu Beyene. "Improving Data Security in Cloud Storage Systems Using HybridAlgorithms with Integrity Verification." Journal of Computational Science and Data Analytics 01, no. 2 (2024): 34–58. https://doi.org/10.69660/jcsda.01022403.
Full textGloria Ehichioya and Ikharebha Ebehiremen Bridget. "Exploring Ethical Dilemmas Faced by Accountants and Business Managers in Nigeria." African Journal of Management and Business Research 18, no. 1 (2025): 270–91. https://doi.org/10.62154/ajmbr.2025.018.010669.
Full textVibha Upadhya, Et al. "The Analysis of Data Tampering and Forensics in a Cloud Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 99–103. http://dx.doi.org/10.17762/ijritcc.v11i10.8470.
Full textDong, Gang Nathan. "Earnings Management in U.S. Hospitals." Journal of Health and Human Services Administration 39, no. 1 (2016): 41–70. http://dx.doi.org/10.1177/107937391603900104.
Full textSuseno, Taufiq Rizky Darmawan, Irawan Afrianto, and Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (2024): 1759–69. https://doi.org/10.11591/ijece.v14i2.pp1759-1769.
Full textApooyin Agboola Emmanuel. "The impact of cybersecurity on financial reporting: Strengthening data integrity and regulatory compliance." International Journal of Science and Research Archive 14, no. 2 (2025): 626–37. https://doi.org/10.30574/ijsra.2025.14.2.0427.
Full text