To see the other types of publications on this topic, follow the link: Data Manipulation and Integrity.

Journal articles on the topic 'Data Manipulation and Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data Manipulation and Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Apurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.

Full text
Abstract:
The abstract highlights the importance of data integrity, especially in the pharmaceutical industry. It emphasizes that accurate and reliable data is essential for organizational stability and performance. The ALCOA principles (Attributable, Legible, Contemporaneous, Original, and Accurate) are recommended by regulatory bodies like the USFDA to ensure data integrity. Violations can occur due to data manipulation, inadequate procedures, or shared accounts. A study found that most breaches occurred in quality control (QC), with China and India having the highest number of violations. The study u
APA, Harvard, Vancouver, ISO, and other styles
2

Service, R. F. "RESEARCH INTEGRITY: Pioneering Physics Papers Under Suspicion for Data Manipulation." Science 296, no. 5572 (2002): 1376–77. http://dx.doi.org/10.1126/science.296.5572.1376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sreevibhu, Sagi, and Teendra Pavan Kumar. "Application of Integrated RSA Encryption in Remote Data Integrity Check." Journal of Research in Science and Engineering 6, no. 8 (2024): 32–37. http://dx.doi.org/10.53469/jrse.2024.06(08).08.

Full text
Abstract:
Cloud computing storage services offer a convenient means of maintaining and managing large volumes of data at a minimal cost. However, they do not guarantee data integrity. Data is transferred to remote cloud servers that may be unsafe or untrustworthy, raising the risk of unauthorized manipulation by external entities or unintentional modification by service providers. Protecting data from potential hackers has thus become imperative to safeguard its integrity. To address this challenge, the paper proposes an Enhanced Data Integrity technique tailored for cloud computing environments. As par
APA, Harvard, Vancouver, ISO, and other styles
4

Eka Mayasari and Sri Trisnaningsih. "Case Study: Manipulation of Financial Reports at PT. Adisarana Wanaartha Life Insurance (Wanaartha Life)." Formosa Journal of Applied Sciences 2, no. 10 (2023): 2541–50. http://dx.doi.org/10.55927/fjas.v2i10.6578.

Full text
Abstract:
This research aims to determine violations in professional ethics both from public accountants and from related parties. Violations committed by accountants can undermine the nature and integrity of accounting. When there are violations involving data manipulation, misrepresentation, or unethical behavior in accounting practices, it can shake the foundations of the integrity of the profession. The author uses the Expert Opinion Method to analyze what and how violations of the code of ethics for the public accounting profession take place. To identify efforts related to the studies discussed, t
APA, Harvard, Vancouver, ISO, and other styles
5

Ullagaddi, P. "Safeguarding Data Integrity in Pharmaceutical Manufacturing." Journal of Advances in Medical and Pharmaceutical Sciences 26, no. 8 (2024): 64–75. http://dx.doi.org/10.9734/jamps/2024/v26i8708.

Full text
Abstract:
Aims: Comprehensively analyze data integrity challenges in the pharmaceutical industry, analyze regulatory observations, and propose mitigation strategies for ensuring compliance with current good manufacturing practices (cGMP), particularly for electronic data and computerized systems. Study Design: Analysis of regulatory documents, industry-standard guides, and case studies. Methodology: The study involved a comprehensive review of FDA guidance documents, warning letters, and Form 483 observations related to data integrity. Case studies of non-compliance were analyzed to identify common issu
APA, Harvard, Vancouver, ISO, and other styles
6

ARFEEN, RIMSHA. "Detection of Data Manipulation in Datasets Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50775.

Full text
Abstract:
Data integrity is pivotal for achieving model performance and delicacy and for making believable opinions in moment's data wisdom and analytics environment. This design enforced and estimated a machine literacy- driven frame that can descry data tampering through a generative analysis of a structured dataset in its original and acclimated countries. By transubstantiating both datasets to match their structure, and calculating a point-full difference vector, the system estimated and linked possible tampering in the acclimated dataset through statistical analysis on named ordered features, simil
APA, Harvard, Vancouver, ISO, and other styles
7

Putra, Ryan Adi, Rizka Ardiansyah, Mohammad Yazdi Pusadan, Anita Ahmad Kasim, and Yuri Yudhaswana Joefrie. "Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration." Advance Sustainable Science, Engineering and Technology 6, no. 1 (2024): 02401017. http://dx.doi.org/10.26877/asset.v6i1.17772.

Full text
Abstract:
In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providin
APA, Harvard, Vancouver, ISO, and other styles
8

Jaiswal, Himani, Muddukrishna B. S., and Girish Pai Kulyadi. "Data Integrity Violations: A Challenge to the Pharmaceutical Industry." International Journal of Pharmaceutical Quality Assurance 11, no. 01 (2020): 196–98. http://dx.doi.org/10.25258/ijpqa.11.1.30.

Full text
Abstract:
Data integrity refers to data reliability throughout the data lifecycle. Terminology “ALCOA” means that the data should be attributable, legible, contemporaneously recorded, original, and accurate. “ALCOA Plus” was introduced later. Violation of the integrity of data is termed as a breach of data integrity. It can take place in various fields, but not limited to manufacturing, quality control (QC), quality assurance (QA), and research. Some of the reasons for breach in data integrity are fabrication or duplication of data, out of specification, out of trend, back-dating, manipulation of data,
APA, Harvard, Vancouver, ISO, and other styles
9

Novianti, Sinta, and Deannes Isynuwardhana. "Pengaruh Komisaris Independen, Leverage, Dan Kepemilikan Institusional Terhadap Integritas Laporan Keuangan." Jurnal Pendidikan Akuntansi & Keuangan 9, no. 1 (2021): 64–73. http://dx.doi.org/10.17509/jpak.v9i1.27003.

Full text
Abstract:
Several cases that occurred in several companies in Indonesia, such as manipulation of financial statements, showed that the integrity of the financial statements presented by the company was still low. To avoid manipulation, it requires concervative accounting practices. This study aims to determine how the influence of independent commissioner variables, leverage, and institutional ownership on the financial statements integrity. This study’s population are all mining sector companies listed on the Indonesia Stock Exchange in 2015-2018. The samples produced were 128 samples using purposive s
APA, Harvard, Vancouver, ISO, and other styles
10

Elwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.

Full text
Abstract:
ABSTRACT: Gamification, the incorporation of game-design elements into non-game contexts, hasemerged as a powerful strategy to enhance user engagement, motivation, and productivity across variousindustries. As gamified systems become increasingly sophisticated and pervasive, particularly within theframework of Industry 4.0, the associated cybersecurity challenges grow in complexity and severity. Thispaper provides a comprehensive analysis of the cybersecurity vulnerabilities inherent in gamified systems,including data privacy concerns, user manipulation risks, and threats to system integrity.
APA, Harvard, Vancouver, ISO, and other styles
11

Keezhadath, Arun Ayilliath, and Lalitha Amarapalli. "Ensuring Data Integrity in Pharmaceutical Quality Systems: A Risk-Based Approach." Journal of AI-Powered Medical Innovations (International online ISSN 3078-1930) 1, no. 1 (2024): 83–104. https://doi.org/10.60087/japmi.vol01.issue01.p104.

Full text
Abstract:
The integrity of data within pharmaceutical quality systems is crucial to ensuring product quality, patient safety, and regulatory compliance. This paper presents a risk-based approach to safeguarding data integrity across pharmaceutical quality systems. It discusses the regulatory frameworks, industry best practices, and the potential risks associated with data manipulation, loss, or corruption. By applying risk assessment tools, the paper outlines strategies for identifying vulnerable points in data management processes and proposes corrective actions to mitigate these risks. Furthermore, it
APA, Harvard, Vancouver, ISO, and other styles
12

Irmayanti, Dian Putri, Ivan Yulivan, and AV Rahajeng Widyarsih. "The Threat Of Tax Evasion Practices In the Coal Mining Sector In Indonesia On Economic Security." Educoretax 4, no. 6 (2024): 800–813. http://dx.doi.org/10.54957/educoretax.v4i6.899.

Full text
Abstract:
This research examines tax evasion practices in Indonesia’s coal mining sector, with a focus on identifying methods used and the role of state intelligence in addressing them. Using a qualitative approach, the study collected data through in-depth interviews with government officials, academics, and industry practitioners. The findings reveal six primary tax evasion practices: illegal mining, income and expense manipulation, document bribery, transaction manipulation, and document falsification. These practices significantly reduce state revenue and undermine the integrity of the coal mining s
APA, Harvard, Vancouver, ISO, and other styles
13

Rohmah, Mufidatur, and Sri Trisnaningsih. "Analysis Violation of Professional Ethics in Manipulation Report Finance (Study The case of PT Garuda Indonesia)." International Journal of Management Science and Information Technology 3, no. 1 (2023): 8–15. http://dx.doi.org/10.35870/ijmsit.v3i1.844.

Full text
Abstract:
Everyone around the world is talking about the financial statement manipulation scandal. One of the many fraud or manipulation scandals in Indonesia's financial statements that has caught the public's attention is that of PT Garuda Indonesia. The purpose of this research is to analyze the professional ethics violated by the accountants of PT Garuda Indonesia when manipulating or falsifying financial statements. This study employs a case study approach and a qualitative research method at PT Garuda Indonesia. The data collection technique uses the literary method, namely searching for or diggin
APA, Harvard, Vancouver, ISO, and other styles
14

Elouataoui, Widad, Imane El Alaoui, Saida El Mendili, and Youssef Gahi. "An Advanced Big Data Quality Framework Based on Weighted Metrics." Big Data and Cognitive Computing 6, no. 4 (2022): 153. http://dx.doi.org/10.3390/bdcc6040153.

Full text
Abstract:
While big data benefits are numerous, the use of big data requires, however, addressing new challenges related to data processing, data security, and especially degradation of data quality. Despite the increased importance of data quality for big data, data quality measurement is actually limited to few metrics. Indeed, while more than 50 data quality dimensions have been defined in the literature, the number of measured dimensions is limited to 11 dimensions. Therefore, this paper aims to extend the measured dimensions by defining four new data quality metrics: Integrity, Accessibility, Ease
APA, Harvard, Vancouver, ISO, and other styles
15

Fathurrozi, Adi. "Peran Etika Advokat dalam Penyelesaian Sengketa Manipulasi Data Pada Hukum Keluarga Islam." Jurnal Ilmiah Global Education 6, no. 2 (2025): 547–54. https://doi.org/10.55681/jige.v6i2.3739.

Full text
Abstract:
Data manipulation disputes in Islamic family law, such as falsification of marriage documents, manipulation of marriage age, and fabrication of evidence, are complex and sensitive issues. In the process of resolving them, advocates play an important role as law enforcers and mediators who must uphold professional ethics. This study aims to analyze the role of advocate ethics in dealing with and resolving data manipulation disputes in Islamic family law with a normative legal approach. The research method uses a literature study of laws and regulations, advocate codes of ethics, and Islamic fam
APA, Harvard, Vancouver, ISO, and other styles
16

Kavoliūnaitė-Ragauskienė, Eglė. "Artificial Intelligence in Manipulation: The Significance and Strategies for Prevention." Baltic Journal of Law & Politics 17, no. 2 (2024): 116–41. https://doi.org/10.2478/bjlp-2024-00018.

Full text
Abstract:
Abstract Manipulation has always been a persistent aspect of society, but the rise of artificial intelligence has significantly amplified its scope and impact. AI’s ability to access and process vast amounts of personal data has revolutionized the way individuals can be targeted with specific information. This technology enables the rapid delivery of highly personalized messages, making it easier to exploit psychological vulnerabilities and influence decision-making without the individual’s awareness. The use of AI for manipulation may pose serious threats to personal autonomy, as individuals
APA, Harvard, Vancouver, ISO, and other styles
17

Thorp, H. Holden. "Generative approach to research integrity." Science 381, no. 6658 (2023): 587. http://dx.doi.org/10.1126/science.adk1852.

Full text
Abstract:
It’s been a bad few weeks for public perceptions of research integrity, as multiple cases at elite universities have received wide news coverage. Francesca Gino, a scientist at Harvard University, is in a legal dispute over whether data in newly retracted papers about dishonesty were manipulated; she is now suing Harvard and the researchers who surfaced the alleged problems. Likewise, Duke University is investigating published work by scientist Daniel Ariely. Johns Hopkins University may initiate an investigation of research misconduct by Nobel laureate Gregg Semenza. And most prominently, the
APA, Harvard, Vancouver, ISO, and other styles
18

R., Atshaya, Bhavatharni J., Darshana S.B., and Ismankhan Y.M. "A Comparative Study on Hashing Algorithms for Data Integrity and Efficiency." Journal of Electronics and Informatics 7, no. 2 (2025): 95–111. https://doi.org/10.36548/jei.2025.2.002.

Full text
Abstract:
In recent years, the widespread availability of image editing tools has led to the proliferation of phony and manipulated photos on the Internet and social media. Various techniques have been developed to detect image forgery and identify altered or fabricated regions, with a growing emphasis on deep learning (DL) methods. This study explores recent advances in DL-based forgery detection algorithms, focusing on the detection of copy-move and splicing attacks two of the most common image tampering techniques. Additionally, the challenges posed by DeepFake-generated content, which often mimics s
APA, Harvard, Vancouver, ISO, and other styles
19

Hartgerink, Chris H. J., E. M. Kemper, Markus W. Hollmann, and Gerben ter Riet. "Analyzing DECREASE trials to estimate evidence of data manipulation." F1000Research 6 (November 13, 2017): 1995. http://dx.doi.org/10.12688/f1000research.12584.1.

Full text
Abstract:
Background: The effect of beta-blockers on perioperative mortality in non-cardiac surgery has been controversial due to concerns regarding the scientific integrity of the DECREASE-I and DECREASE-IV trials. Previous meta-analyses indicated beta-blockade might increase mortality after removing the DECREASE trials from the evidence base. Methods: In this report, we statistically investigate the DECREASE trials and model their veracity (i.e., the probability that these effects or more extreme occurred naturally) and estimate how many data points might have been manipulated in the DECREASE trials u
APA, Harvard, Vancouver, ISO, and other styles
20

Ordoñez, Cristian Camilo, Gustavo Ramirez-Gonzalez, and Juan Carlos Corrales. "Enhancing Data Integrity in Blockchain Oracles Through Multi-Label Analysis." Applied Sciences 15, no. 5 (2025): 2379. https://doi.org/10.3390/app15052379.

Full text
Abstract:
The oracle problem in blockchain refers to the critical need to obtain reliable external data for the correct execution of smart contracts. Dependence on these external sources involves risks of manipulation and inaccuracies that can compromise automated decisions on the blockchain. Although solutions such as decentralized oracles and consensus mechanisms have been developed, ensuring data integrity remains a significant challenge. A validation approach based on Integrity Multi-level Weighted Voting (IMWV) is proposed to address this need. This model employs a multi-level weighted voting schem
APA, Harvard, Vancouver, ISO, and other styles
21

Maheswara, Reddy Basireddy. "Developing Tools to Compare Databases using Python." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 56–61. https://doi.org/10.5281/zenodo.13253397.

Full text
Abstract:
Organizations frequently use several databases to store and manage their data in today's data-driven environment. It can be difficult to guarantee data integrity and consistency among various databases, though. This work investigates the creation of tools for database comparisons using Python, an effective and adaptable programming language. With the help of Python's vast library ecosystem, programmers may construct powerful tools that can connect to many kinds of databases, extract data, and carry out in-depth comparisons. In order to provide developers with a thorough manual for streamlining
APA, Harvard, Vancouver, ISO, and other styles
22

Lukasiak, Jason, David Stirling, Shane Perrow, and Nick Harders. "Manipulation of compressed data using MPEG-7 low level audio descriptors." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2003): 83–91. http://dx.doi.org/10.26636/jtit.2003.2.166.

Full text
Abstract:
This paper analyses the consistency of a set of MPEG-7 low level audio descriptors when the input audio stream has previously been compressed with a lossy compression algorithm. The analysis results show that lossy compression has a detrimental effect on the integrity of practical search and retrieval schemes that utilize the low level audio descriptors. Methods are then proposed to reduce the detrimental effects of compression in searching schemes. These proposed methods include improved searches, switched adaptive scalar and vector prediction, and other prediction schemes based on machine le
APA, Harvard, Vancouver, ISO, and other styles
23

Rossner, Mike. "A false sense of security." Journal of Cell Biology 183, no. 4 (2008): 573–74. http://dx.doi.org/10.1083/jcb.200810172.

Full text
Abstract:
Some journals are using ineffective software to screen images for manipulation. In doing so, they are creating a false sense of security in the research community about the integrity of the image data they publish.
APA, Harvard, Vancouver, ISO, and other styles
24

Adelia Furry Avriandi, Apriana Nur Asyifa, Giyan Triyani Sari, Maharani Dara Dinanti, Sandra Audina Maharani, and Herlina Manurung. "Analisis Audit Kasus Manipulasi Laporan Keuangan PT Wanaartha Life Tahun 2023." Jurnal Akuntan Publik 1, no. 4 (2023): 274–81. https://doi.org/10.59581/jap-widyakarya.v1i4.1860.

Full text
Abstract:
This study aims to examine the practice of financial statement manipulation that occurred at PT Wanaartha Life in 2023. This case emphasizes the importance of transparency and integrity in corporate financial reporting. The practice of manipulating financial statements is considered unethical and often occurs due to various motivations, including pressure to achieve financial targets and maintain the company's reputation. Violations of the professional code of ethics can have a negative impact on society, because members of the profession who do not comply with established rules and values can
APA, Harvard, Vancouver, ISO, and other styles
25

Dr S.G. Jachak, Jayshri Mahajan, Tejaswini Kshirsagar, Shruti Gaikwad, and Priyanka Mule. "Digital Watermarking and Steganography." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 03 (2025): 969–76. https://doi.org/10.47392/irjaem.2025.0158.

Full text
Abstract:
In the digital era, protecting the authenticity and integrity of various file types—like PDFs, PNG images, Excel sheets, and Word documents—is more important than ever. While traditional encryption methods do a good job of keeping data confidential, they often don't prevent issues like unauthorized redistribution, manipulation, or piracy. This is where digital watermarking, particularly through the use of steganography, can be highly effective. The main challenge is to develop a watermarking technique that is both robust and visible. This means the watermark should be embedded in different typ
APA, Harvard, Vancouver, ISO, and other styles
26

Ferrara, Massimiliano. "Strategic Interplay: Game-Theoretic Frameworks for Topological Robustness Against Data Poisoning." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 22 (July 14, 2025): 540–44. https://doi.org/10.37394/23209.2025.22.44.

Full text
Abstract:
This investigation explores the strategic dynamics between adversarial manipulation and defensive mechanisms through the lens of game theory and topological data analysis. We construct a novel theoretical framework that synthesizes concepts from cooperative game theory with the structural insights provided by persistence homology to formulate defensive strategies against data poisoning attacks. Our central contribution is a gametheoretic equilibrium model that characterizes the competitive interaction between attackers attempting to compromise data integrity and defenders working to preserve t
APA, Harvard, Vancouver, ISO, and other styles
27

Firdaus, Caesar, Wahyudin Wahyudin, and Eddy Prasetyo Nugroho. "Monitoring System with Two Central Facilities Protocol." Indonesian Journal of Science and Technology 2, no. 1 (2017): 8. http://dx.doi.org/10.17509/ijost.v2i1.5986.

Full text
Abstract:
The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could f
APA, Harvard, Vancouver, ISO, and other styles
28

Chanchal, Manohar Avchar*. "Ensuring Data Integrity in the Pharmaceutical Industry: Challenges and Best Practices." International Journal of Pharmaceutical Sciences 3, no. 3 (2025): 3238–50. https://doi.org/10.5281/zenodo.15111267.

Full text
Abstract:
One of the most important and crucial part that always overlooked in the pharmaceutical industry is the Data Integrity aspect of the industry. Data is the most important thing that can be misused, altered and vulnerable to inconsistency, maintaining its integrity is most crucial challenges in the pharmaceutical industry in recent years, this has forced the regulators like FDA, WHO and MHRA to impose a strict guideline that should be followed to maintain compliance and to prevent the data manipulation, error or loss. Data Integrity Ensures that the data is accurate, complete with zero alteratio
APA, Harvard, Vancouver, ISO, and other styles
29

Malasowe, Bridget Ogheneovo, Magaret Dumebi Okpor, Fidelis Aghware, Rita Erhovwo Ako, and Edim Bassey Edim. "Assuring Data Integrity, Preservation, Transparency and Privacy of Genomic Data in the Sharing Process Using Blockchain Technology." Advances in Multidisciplinary & Scientific Research Journal Publication 10, no. 3 (2024): 17–46. http://dx.doi.org/10.22624/aims/bhi/v10n3p2.

Full text
Abstract:
Personalized medicine has been made possible by the development of genomic research, which has opened up previously unheard-of possibilities for the identification, management, and prevention of diseases based on unique genetic profiles. On the other hand, privacy, data integrity, and consent management pose serious obstacles to the transparent and safe exchange of genetic data. This study investigates how blockchain technology can help with these issues by providing a decentralized, transparent, and unchangeable platform for exchanging genetic data. With its strong security features, blockcha
APA, Harvard, Vancouver, ISO, and other styles
30

Marbun, Nasib. "Implementation of RC4 Stream Cipher for Data Security in Internet Café Billing Systems." Instal : Jurnal Komputer 17, no. 03 (2025): 127–33. https://doi.org/10.54209/jurnalinstall.v17i03.366.

Full text
Abstract:
In the field of data communication, cryptography plays a crucial role in ensuring data confidentiality, authenticity, and integrity. This technique is essential when transmitting sensitive information over public networks, preventing unauthorized access or manipulation. In the context of internet cafés (warnet), which provide global computer network access, a secure billing system is vital to prevent data tampering related to user activity duration and associated charges. This study applies the RC4 stream cipher encryption algorithm to protect the billing data. By encrypting user data before s
APA, Harvard, Vancouver, ISO, and other styles
31

Neeli, Sethu Sesha Synam. "A Hands-On Guide to Data Integrity and Privacy for Database Administrators." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem16443.

Full text
Abstract:
In the contemporary digital landscape, data has emerged as a critical organizational asset, driving operational efficiency and strategic decision-making across diverse sectors—from government and social institutions to educational establishments. The widespread adoption of database management systems (DBMS) for storing and managing sensitive information has heightened the significance of database security. This paper investigates the escalating importance of database security within the broader context of information security. The reliance on databases for storing crucial organizational data n
APA, Harvard, Vancouver, ISO, and other styles
32

Devie, Devie, Nathania Marchella Angelina Anggono, Vincent Christian Satya Pradana, and Hendri Kwistianus. "The Analysis of Corporate Governance on Integrity Financial Statements in Banking Companies Listed on The Indonesia Stock Exchange." International Journal of Organizational Behavior and Policy 3, no. 2 (2024): 97–108. http://dx.doi.org/10.9744/ijobp.3.2.97-108.

Full text
Abstract:
The integrity of financial statements is often questioned due to manipulation of accounting data, involving directors, commissioners, audit committees, and company owners. This study empirically demonstrates the impact of corporate governance - through board size, independent commissioners, audit committees, and institutional ownership - on financial statement integrity. Using quan­titative methods, the study involved 37 banking companies listed on the Indonesia Stock Exchange from 2017 to 2022. The results show that board size, independent commissioner, audit committee, institutional ownershi
APA, Harvard, Vancouver, ISO, and other styles
33

Soraya, Nyayu, Maryamah, Syarnubi, and Septia Fahiroh. "Strategies for Cultivating Anti-Corruption Self-Awareness in Higher Education Learning." Tadrib: Jurnal Pendidikan Agama Islam 11, no. 1 (2025): 58–75. https://doi.org/10.19109/tadrib.v11i1.27661.

Full text
Abstract:
This study aims to explore the strategic implementation of anti-corruption self-awareness cultivation in the learning process within the Islamic Education Program at UIN Raden Fatah Palembang. Corruption in Indonesia, including among students, is often characterized by behaviors such as cheating, proxy attendance, and data manipulation, making anti-corruption education crucial. This research uses a descriptive qualitative method, with interviews, observations, and documentation as data collection techniques. The results indicate that values such as honesty, integrity, transparency, and account
APA, Harvard, Vancouver, ISO, and other styles
34

Adebunmi Okechukwu Adewusi, Njideka Rita Chiekezie, and Nsisong Louis Eyo-Udo. "Cybersecurity in precision agriculture: Protecting data integrity and privacy." International Journal of Applied Research in Social Sciences 5, no. 10 (2023): 693–708. http://dx.doi.org/10.51594/ijarss.v5i10.1482.

Full text
Abstract:
Precision agriculture, an innovative approach to farming that leverages data-driven technologies, has revolutionized the agricultural sector by enhancing productivity, resource efficiency, and sustainability. However, the increasing reliance on digital tools and connected devices has introduced significant cybersecurity challenges, particularly concerning data integrity and privacy. This paper explores the critical importance of cybersecurity in precision agriculture, focusing on protecting sensitive agricultural data from breaches, unauthorized access, and potential manipulation. As precision
APA, Harvard, Vancouver, ISO, and other styles
35

Maheswara, Reddy Basireddy. "Developing Tools to Compare Databases using Python." European Journal of Advances in Engineering and Technology 10, no. 2 (2023): 56–61. https://doi.org/10.5281/zenodo.13325121.

Full text
Abstract:
Organizations frequently use several databases to store and manage their data in today's data-driven environment. It can be difficult to guarantee data integrity and consistency among various databases, though. This work investigates the creation of tools for database comparisons using Python, an effective and adaptable programming language. With the help of Python's vast library ecosystem, programmers may construct powerful tools that can connect to many kinds of databases, extract data, and carry out in-depth comparisons. In order to provide developers with a thorough manual for streamlining
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Seunghyeon, Hong-Woo Seok, Ki-rim Lee, and Hoh Peter In. "B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability." ISPRS International Journal of Geo-Information 11, no. 3 (2022): 186. http://dx.doi.org/10.3390/ijgi11030186.

Full text
Abstract:
When surveying national reference points using a global positioning system (GPS), appropriate work regulations pertaining to the surveying time must be observed. However, such data can be modified easily, so identifying non-compliance with work regulations and forgeries is challenging. If such incidents occur in cadastral surveys, it may result in financial damages to stakeholders, such as citizens and the state. Therefore, it is necessary to improve the reliability by ensuring the integrity of the GPS positioning data and allowing anyone to track them. In this study, a prototype system was de
APA, Harvard, Vancouver, ISO, and other styles
37

Pankaj, M. Bhuyar, and S. W. Mohod Dr. "Multimedia Data Security through Embedded Image." International Journal of Advanced Innovative Technology in Engineering (IJAITE) 7, no. 5 (2022): 1–9. https://doi.org/10.5281/zenodo.7181044.

Full text
Abstract:
Hiding information in an image in a way that does not affect the original cover image pixels or cause a permanent distortion after extracting that information is known as reversible data hiding technology. Many reversible data hiding schemes have been proposed and successfully applied in military applications. Such schemes are developed to ensure digital images authenticity and integrity without any distortion on the original images. They guarantee that any attempt to change the watermarked image will be detected by the image owner. In this research, an algorithm is proposed to reversibly hide
APA, Harvard, Vancouver, ISO, and other styles
38

Avros, Renata, Saar Keshet, Dvora Toledano Kitai, Evgeny Vexler, and Zeev Volkovich. "Detecting Pseudo-Manipulated Citations in Scientific Literature through Perturbations of the Citation Graph." Mathematics 11, no. 18 (2023): 3820. http://dx.doi.org/10.3390/math11183820.

Full text
Abstract:
Ensuring the integrity of scientific literature is essential for advancing knowledge and research. However, the credibility and trustworthiness of scholarly publications are compromised by manipulated citations. Traditional methods, such as manual inspection and basic statistical analyses, have limitations in detecting intricate patterns and subtle manipulations of citations. In recent years, network-based approaches have emerged as promising techniques for identifying and understanding citation manipulation. This study introduces a novel method to identify potential citation manipulation in a
APA, Harvard, Vancouver, ISO, and other styles
39

Zahn, J., W. Rascher, and A. Neubert. "P107 How significant is the lack of formulations for paediatric inpatients?" Archives of Disease in Childhood 104, no. 6 (2019): e62.2-e62. http://dx.doi.org/10.1136/archdischild-2019-esdppp.145.

Full text
Abstract:
BackgroundPharmacotherapy in children is complex requiring individual dosages of an active substance which are often not compatible with commercially available medicinal products.1–2 Manipulations of medicinal products, e.g. splitting or mortaring of tablets are common practice and often unavoidable although they entail risks for the patient as they can affect dosing accuracy, bioavailability and integrity of the dosage form.3–4In this study we aim to determine how many medicines have to be manipulated before administration in a hospital setting in Germany.MethodsA prospective observational ap
APA, Harvard, Vancouver, ISO, and other styles
40

Anwar, Adnan, Abdun Mahmood, Biplob Ray, Md Apel Mahmud, and Zahir Tari. "Machine Learning to Ensure Data Integrity in Power System Topological Network Database." Electronics 9, no. 4 (2020): 693. http://dx.doi.org/10.3390/electronics9040693.

Full text
Abstract:
Operational and planning modules of energy systems heavily depend on the information of the underlying topological and electric parameters, which are often kept in database within the operation centre. Therefore, these operational and planning modules are vulnerable to cyber anomalies due to accidental or deliberate changes in the power system database model. To validate, we have demonstrated the impact of cyber-anomalies on the database model used for operation of energy systems. To counter these cyber-anomalies, we have proposed a defence mechanism based on widely accepted classification tec
APA, Harvard, Vancouver, ISO, and other styles
41

Makura, Sheunesu, Hein Venter, and Azola Lukhozi. "Enhancing Healthcare Data Security Using Blockchain." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 404–15. https://doi.org/10.34190/eccws.24.1.3512.

Full text
Abstract:
Healthcare data management has undergone significant transformation with the widespread adoption of Electronic Health Records (EHR). However, this evolution also presents critical challenges related to data security, privacy, and interoperability. Traditional EHR systems often fall short in implementing robust safeguards against unauthorized access, data tampering, and breaches, putting sensitive patient information at risk. Addressing these concerns is vital to ensure trust in healthcare systems and compliance with stringent regulatory frameworks. This paper investigates the potential of bloc
APA, Harvard, Vancouver, ISO, and other styles
42

Chukanova, Svitlana. "Academic Integrity Norms Compliance in the Process of Research Data Management: Foreign Practice." Ukrainian Journal on Library and Information Science Current Archives About, no. 2 (December 27, 2018): 52–63. https://doi.org/10.31866/2616-7654.2.2018.152574.

Full text
Abstract:
The article deals with the principles of adherence to the standards of academic integrity and ways of avoiding misconduct manipulation with research data in the process of Research Data Management (RDM) on the example of world universities and organizations with experience in implementing high-quality RDM.In this article was used the author’s experience gained during participating in Erasmus Plus Staff Mobility for Training Program agreed between the National University of Kyiv-Mohyla Academy and The University of Glasgow (Scotland, the UK). In particular, was regarded as the UK approach
APA, Harvard, Vancouver, ISO, and other styles
43

Oluwatobi, Enitan Modeyin, and Abioye Adeyemo PhD Julius. "Exploring the Boundaries between Persuasion and Manipulation in Political Communication." GVU Journal of Research and Development 1, no. 2 (2024): 226–37. https://doi.org/10.5281/zenodo.14038496.

Full text
Abstract:
The researchers explored the boundaries between persuasion and manipulation in political communication. The objective was to ascertain the extent to which these tactics are used in political discourse and their impact on public opinion. The study was guided by the theory of reasoned action and the propaganda model and employed a library research approach, analysing secondary data sources such as articles, books and official reports. The discourse highlighted the distinct differences between persuasion and manipulation in political communication. While persuasion i
APA, Harvard, Vancouver, ISO, and other styles
44

Hampiholi, Narayan. "THROUGH THE LENS OF PRINCIPLED DATA PRACTICE A GROUNDBREAKING EXPLORATION INTO ETHICAL HEALTHCARE PLATFORMS." International Journal of Engineering Applied Sciences and Technology 8, no. 5 (2023): 26–30. http://dx.doi.org/10.33564/ijeast.2023.v08i05.004.

Full text
Abstract:
Fundamental Ethical Principles of Data Privacy and Security and how Healthcare Data Platforms Ensure the Confidentiality and Integrity of Patient Information, Safeguarding it Against Unauthorized Access and Cyber Threats. In the last years, there has been a considerable increase in the usage of electronic health records (EHRs). Credit card numbers, full name, bank account numbers, social security numbers, street addresses, phone numbers, passport numbers, treatments, and medical histories are all private patient information that may be found in health information systems. This information must
APA, Harvard, Vancouver, ISO, and other styles
45

Desie, Erku Kifle, and Asrat Mulatu Beyene. "Improving Data Security in Cloud Storage Systems Using HybridAlgorithms with Integrity Verification." Journal of Computational Science and Data Analytics 01, no. 2 (2024): 34–58. https://doi.org/10.69660/jcsda.01022403.

Full text
Abstract:
In a cloud system, storage services allow users to store data on the Internet. How-ever, storing data in the public cloud increases the risk of loss, interception, modification,and manipulation by unauthorized users. So, users need to protect their data by applying security mechanisms. In this work, we proposed an efficient hybrid algorithm along with data slicing and integrity verification to improve user-side cloud data security. The proposed hybrid algorithm combines multiple symmetric and asymmetric algorithms to improve both performance and security. It takes the advantages of both to com
APA, Harvard, Vancouver, ISO, and other styles
46

Gloria Ehichioya and Ikharebha Ebehiremen Bridget. "Exploring Ethical Dilemmas Faced by Accountants and Business Managers in Nigeria." African Journal of Management and Business Research 18, no. 1 (2025): 270–91. https://doi.org/10.62154/ajmbr.2025.018.010669.

Full text
Abstract:
This study explores the ethical dilemmas faced by accountants and business managers in Nigeria, with a focus on financial reporting manipulation, corruption and bribery, and asset misappropriation. Ethical conduct is crucial in maintaining trust, transparency, and integrity within financial and business management sectors. However, persistent challenges in Nigeria affect professionals’ ethical perceptions and behaviours. Using a survey-based methodology, data were collected from a sample of 144 Nigerian accountants and business managers to examine the relationships between these unethical prac
APA, Harvard, Vancouver, ISO, and other styles
47

Vibha Upadhya, Et al. "The Analysis of Data Tampering and Forensics in a Cloud Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 99–103. http://dx.doi.org/10.17762/ijritcc.v11i10.8470.

Full text
Abstract:
In cloud systems, where sensitive data is stored and processed remotely, data manipulation is a serious security problem. The issues of data tampering in cloud environments are explored in this research, along with the importance of forensic investigation in reducing its effects. We explore several data tampering techniques and illustrate the need for strong security measures to guard against unlawful behavior. This paper also covers forensic analysis methods, tools, and techniques that are crucial in locating, analyzing, and minimizing data tampering instances in cloud systems. The security p
APA, Harvard, Vancouver, ISO, and other styles
48

Dong, Gang Nathan. "Earnings Management in U.S. Hospitals." Journal of Health and Human Services Administration 39, no. 1 (2016): 41–70. http://dx.doi.org/10.1177/107937391603900104.

Full text
Abstract:
Objective This paper examines the hospital management practices of manipulating financial earnings within the bounds of generally accepted accounting principles (GAAP). Study Design We conduct regression analyses that relate earnings management to hospital characteristics to assess the economic determinants of hospital earnings management behavior. Method and Data From the CMS Cost Reports we collected hospital financial data of all U.S. hospitals that request reimbursement from the federal government for treating Medicare patients, and regress discretionary accruals on hospital size, profitab
APA, Harvard, Vancouver, ISO, and other styles
49

Suseno, Taufiq Rizky Darmawan, Irawan Afrianto, and Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (2024): 1759–69. https://doi.org/10.11591/ijece.v14i2.pp1759-1769.

Full text
Abstract:
A diploma is a certificate or official document given by a school or college that is useful for continuing education, applying for jobs, and assessing student intelligence. The main problem with diplomas and other academic documents is that many are forged. This study aims to develop a prototype for recording student academic data using blockchain and blockchain and InterPlanetary file system (IPFS). The research stages were conducted with system conceptualization, data modeling, smart contract development, IPFS integration, data transaction development, user interface/user experience (UI/UX)
APA, Harvard, Vancouver, ISO, and other styles
50

Apooyin Agboola Emmanuel. "The impact of cybersecurity on financial reporting: Strengthening data integrity and regulatory compliance." International Journal of Science and Research Archive 14, no. 2 (2025): 626–37. https://doi.org/10.30574/ijsra.2025.14.2.0427.

Full text
Abstract:
Cybersecurity plays a critical role in financial reporting by ensuring data integrity, confidentiality, and regulatory compliance. As financial institutions and corporations increasingly rely on digital systems for financial transactions and reporting, the risks associated with cyber threats have grown significantly. Cyberattacks, data breaches, and system vulnerabilities can compromise the accuracy and reliability of financial information, leading to severe financial, operational, and reputational consequences. This paper explores the impact of cybersecurity on financial reporting, emphasizin
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!