Academic literature on the topic 'Information and Integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information and Integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information and Integrity"
Harley, Kelsey, and Rodney Cooper. "Information Integrity." ACM Computing Surveys 54, no. 2 (2021): 1–35. http://dx.doi.org/10.1145/3436817.
Full textNayar, Madhavan. "ACHIEVING INFORMATION INTEGRITY." Information Systems Management 10, no. 2 (1993): 51–58. http://dx.doi.org/10.1080/10580539308906928.
Full textSerdyukov, Yu M. "Human information integrity." Herald of the Russian Academy of Sciences 77, no. 5 (2007): 474–78. http://dx.doi.org/10.1134/s101933160705005x.
Full textMilas, Ante Josip, and Ivan Dunđer. "Integrity-breached information." Međunarodne studije 23, no. 1 (2023): 63–83. http://dx.doi.org/10.46672/ms.23.1.4.
Full textMiller, Keith W., and Jeffrey Voas. "Information Integrity and IT Professionals' Integrity, Intertwined." IT Professional 10, no. 6 (2008): 35–40. http://dx.doi.org/10.1109/mitp.2008.124.
Full textFlowerday, Stephen, and Rossouw von Solms. "Real-time information integrity=system integrity+data integrity+continuous assurances." Computers & Security 24, no. 8 (2005): 604–13. http://dx.doi.org/10.1016/j.cose.2005.08.004.
Full textRankin, Larry G. "Pipeline Integrity Information Integration." Materials Performance 43, no. 6 (2004): 56–60. https://doi.org/10.5006/mp2004_43_6-56.
Full textMali, M. S. "Achieving Integrity in the System Design: Information Integrity View." Paradigm 9, no. 1 (2005): 62–65. http://dx.doi.org/10.1177/0971890720050109.
Full textTarunasena, T., R. Rusman, and W. Darmawan. "Information Literacy and Territorial Integrity." IOP Conference Series: Earth and Environmental Science 145 (April 2018): 012108. http://dx.doi.org/10.1088/1755-1315/145/1/012108.
Full textSommer, Peter. "Computer security and information integrity." Computer Fraud & Security Bulletin 1991, no. 5 (1991): 15–16. http://dx.doi.org/10.1016/0142-0496(91)90242-w.
Full textDissertations / Theses on the topic "Information and Integrity"
Van, der Poll Huibrecht Margaretha. "Integrity issues of information created by book entries." Diss., Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-03032004-115957.
Full textFlowerday, Stephen. "Restoring trust by verifying information integrity through continuous auditing." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/504.
Full textSanchez, Corentin. "A world model enabling information integrity for autonomous vehicles." Thesis, Compiègne, 2022. http://www.theses.fr/2022COMP2683.
Full textBednar-Schadle, Teresa. "Misinterpretation of Digital Evidence| Recommendations to Improve Data Integrity." Thesis, Utica College, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423713.
Full textZhu, Feng. "Integrity-Based Kernel Malware Detection." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1572.
Full textÅhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.
Full textChang, Kaiye. "Integrity Protection On the Linux Based Android Platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177176.
Full textKarlsson, Matilda, and Therese Hubertsson. "Delaktighet – en patients rättighet : En litteraturöversikt om patienters erfarenheter av att delta i bedsiderapportering." Thesis, Ersta Sköndal högskola, Institutionen för vårdvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:esh:diva-4937.
Full textVisavapattamawon, Suwanna. "Application of active rules to support database integrity constraints and view management." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1981.
Full textWylie, Austin. "Geospatial Data Modeling to Support Energy Pipeline Integrity Management." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1447.
Full textBooks on the topic "Information and Integrity"
Sinnett, William M. Excellence in information integrity. Financial Executives Research Foundation, 2008.
Find full textBosselaers, Antoon, and Bart Preneel, eds. Integrity Primitives for Secure Information Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60640-8.
Full textLynch, Clifford A. Accessibility and integrity of networked information collections. Office of Technology Assessment, Congress of the United States, 1993.
Find full textJajodia, Sushil, William List, Graeme McGregor, and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35317-3.
Full textJajodia, Sushil, William List, Graeme W. McGregor, and Leon A. M. Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35396-8.
Full textvan Biene-Hershey, Margaret E., and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35501-6.
Full textJ, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. IEEE Press, 1992.
Find full textGertz, Michael, Erik Guldentops, and Leon Strous, eds. Integrity, Internal Control and Security in Information Systems. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2.
Full textGertz, Michael, ed. Integrity and Internal Control in Information Systems V. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35693-8.
Full textJajodia, Sushil, and Leon Strous, eds. Integrity and Internal Control in Information Systems VI. Springer US, 2004. http://dx.doi.org/10.1007/b116855.
Full textBook chapters on the topic "Information and Integrity"
Bolpagni, Marzia. "Building Information Modelling and Information Management." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_2.
Full textMauri, Michele. "Information Visualization for the Construction Industry." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_8.
Full textHuang, Joseph Chuenhuei. "From Building Information Modeling to Extended Reality." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_20.
Full textBosselaers, Antoon, and Bart Preneel. "Integrity concepts." In Integrity Primitives for Secure Information Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60640-8_2.
Full textList, W., and W. R. Melville. "Integrity in Information Systems." In Integrity and Internal Control in Information Systems. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35317-3_17.
Full textNayar, Madhavan K. "The Information Integrity Imperative." In Integrity, Internal Control and Security in Information Systems. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2_11.
Full textKrijnen, Thomas, Francesca Noardo, Ken Arroyo Ohori, and Jantien Stoter. "Multi-disciplinary Use of Three-Dimensional Geospatial Information." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_12.
Full textXie, Liyang, Bo Qin, and Ningxiang Wu. "A Multi-attribute Information Based Method of Material Strength Distribution Fitting." In Structural Integrity. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47883-4_8.
Full textDecker, Hendrik. "Managing Risks by Integrity Constraints and Integrity Checking." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20116-5_18.
Full textAngell, Ian O., and Steve Smithson. "The integrity of information systems." In Information Systems Management. Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21555-3_6.
Full textConference papers on the topic "Information and Integrity"
Rankin, Larry G. "Pipeline Integrity Information Integration." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04175.
Full textPrakash, Enikepalli Sai, Sekharapalli Bargava Ravi Kanth, Pathi Chaitanya, and B. Lakshmi Sirisha. "Examsecured: Steganographic Integrity for Question Papers." In 2024 OITS International Conference on Information Technology (OCIT). IEEE, 2024. https://doi.org/10.1109/ocit65031.2024.00120.
Full textHan, Zhijie, Xingbo Xie, Xiaoyu Du, Ying Du, and Xin He. "Blockchain-Based Data Integrity Verification." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00043.
Full textSalhi, Mohammed, and Joelle Al Hage. "Zonotopic and Gaussian Information Filter for High Integrity Localization." In 2024 27th International Conference on Information Fusion (FUSION). IEEE, 2024. http://dx.doi.org/10.23919/fusion59988.2024.10706302.
Full textTian, Yunong, Xiaoyang Yu, and Qiufang Lin. "VINS-Integrity: An Integrity Monitoring Scheme for Visual/IMU Integration Based on Factor Graph Optimization." In 2024 4th International Conference on Electronic Information Engineering and Computer (EIECT). IEEE, 2024. https://doi.org/10.1109/eiect64462.2024.10866833.
Full textZepeda, Alberto, and Christopher Davies. "Integrity Management of Selective Seam Weld Corrosion on Vintage Pipelines." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00586.
Full textYu, Mingliang, Gang Wang, Zengzhi Liu, et al. "Proof of cloud data integrity based on blockchain." In 2024 4th International Conference on Information Communication and Software Engineering (ICICSE). IEEE, 2024. http://dx.doi.org/10.1109/icicse61805.2024.10625691.
Full textHou, Yinjian, Yancheng Zhao, and Kaiqi Yao. "Federated Learning Backdoor Defense Based on Watermark Integrity." In 2024 10th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 2024. https://doi.org/10.1109/bigdia63733.2024.10808344.
Full textKumar, Edwin Vijay, and S. K. Chaturvedi. "Equipment health management through information fusion for reliability." In Integrity (RAMS). IEEE, 2011. http://dx.doi.org/10.1109/rams.2011.5754474.
Full textWong, E. Lorna, Andrew K. S. Jardine, and Dragan Banjevic. "Incorporating repair information into maintenance optimization models for repairable systems." In Integrity (RAMS). IEEE, 2011. http://dx.doi.org/10.1109/rams.2011.5754498.
Full textReports on the topic "Information and Integrity"
Mayfield, Terry, J. E. Roskos, Stephen R. Welke, John M. Boone, and Catherine W. McDonald. Integrity in Automated Information Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada253990.
Full textMayfield, Terry, J. E. Roskos, Stephen R. Welke, John M. Boone, and Catherine W. McDonald. Integrity in Automated Information Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada245555.
Full textAbernethy, D. C., and Jr. Data and Information Integrity in a Distributed Environment. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada229949.
Full textElbeyi, Ece, Klaus Bruhn Jensen, Melissa Aronczyk, et al. Information Integrity about Climate Science: A Systematic Review. Edited by Robert Brulle, Jennifer Jacquet, Stephan Lewandowsky, and Timmons Roberts. International Panel on the Information Environment (IPIE), 2025. https://doi.org/10.61452/btzp3426.
Full textGallegos, J., V. Hamilton, T. Gaylor, K. McCurley, and T. Meeks. Information integrity and privacy for computerized medical patient records. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/392809.
Full textKatzke, Stuart W., and Zela G. Ruthberg. Report of the invitational workshop on integrity policy in computer information systems (WIPCIS). National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-160.
Full textElbeyi, Ece, Klaus Bruhn Jensen, Melissa Aronczyk, et al. Facts, Fakes, and Climate Science: Recommendations for Improving Information Integrity about Climate Science. Edited by Robert Brulle, Jennifer Jacquet, Stephan Lewandowsky, and Timmons Roberts. International Panel on the Information Environment (IPIE), 2025. https://doi.org/10.61452/qhrl3301.
Full textBarry, Jeff. PR740-243902-R01 Common River Assessment and Information Sharing Platform. Pipeline Research Council International, Inc. (PRCI), 2025. https://doi.org/10.55274/r0000130.
Full textBarry, Jeff. PR-740-223900-R01 Common River Assessment and Information Sharing Platform. Pipeline Research Council International, Inc. (PRCI), 2023. http://dx.doi.org/10.55274/r0000043.
Full textKotowski, Michael, and MaryBeth Mahne. The Role of Interpersonal Influence in the Management of Information Integrity within a Population. University of Tennessee, 2024. https://doi.org/10.7290/iii01flmd.
Full text