Academic literature on the topic 'Information and Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information and Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information and Integrity"

1

Harley, Kelsey, and Rodney Cooper. "Information Integrity." ACM Computing Surveys 54, no. 2 (2021): 1–35. http://dx.doi.org/10.1145/3436817.

Full text
Abstract:
The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting to vehicle control, the critical importance of information integrity to our well-being has compelled review of its treatment in the literature. Through formal information flow models, the data modification view, and the relationship to data quality, information integrity will be surveyed. Illustrations are given for databases and information trustworthiness. Integrity protection is advancing but lacks standardization
APA, Harvard, Vancouver, ISO, and other styles
2

Nayar, Madhavan. "ACHIEVING INFORMATION INTEGRITY." Information Systems Management 10, no. 2 (1993): 51–58. http://dx.doi.org/10.1080/10580539308906928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Serdyukov, Yu M. "Human information integrity." Herald of the Russian Academy of Sciences 77, no. 5 (2007): 474–78. http://dx.doi.org/10.1134/s101933160705005x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Milas, Ante Josip, and Ivan Dunđer. "Integrity-breached information." Međunarodne studije 23, no. 1 (2023): 63–83. http://dx.doi.org/10.46672/ms.23.1.4.

Full text
Abstract:
U suvremenom informacijskom prostoru izloženi smo mnogobrojnim informacijama među kojima su i informacije narušenog integriteta. Iako manipulacije informacijama u javnom informacijskom prostoru nisu novost, njihova količina i brzina diseminacije putem internetskih društvenih mreža i komunikacijskih operativnih sustava predstavljaju novi izazov i ugrozu za nacionalnu sigurnost demokratskih država. U javnom prostoru se koristi nekoliko različitih termina kojima se nastoji objasniti da je integritet informacije plasirane u javni prostor bitno narušen što za posljedicu ima terminološko i kognitivn
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Keith W., and Jeffrey Voas. "Information Integrity and IT Professionals' Integrity, Intertwined." IT Professional 10, no. 6 (2008): 35–40. http://dx.doi.org/10.1109/mitp.2008.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flowerday, Stephen, and Rossouw von Solms. "Real-time information integrity=system integrity+data integrity+continuous assurances." Computers & Security 24, no. 8 (2005): 604–13. http://dx.doi.org/10.1016/j.cose.2005.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rankin, Larry G. "Pipeline Integrity Information Integration." Materials Performance 43, no. 6 (2004): 56–60. https://doi.org/10.5006/mp2004_43_6-56.

Full text
Abstract:
Developing and implementing pipeline integrity management programs is a regulatory requirement for hazardous liquids and gas transmission pipeline operators in the U.S. A key element of an integrity management program is the integration of information pertinent to pipeline integrity. Meaningful information integration is necessary to facilitate analysis that will identify integrity issues. This article addresses information integration, the types of information that are integrated, expected results from the integration, and integration methods and basis.
APA, Harvard, Vancouver, ISO, and other styles
8

Mali, M. S. "Achieving Integrity in the System Design: Information Integrity View." Paradigm 9, no. 1 (2005): 62–65. http://dx.doi.org/10.1177/0971890720050109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tarunasena, T., R. Rusman, and W. Darmawan. "Information Literacy and Territorial Integrity." IOP Conference Series: Earth and Environmental Science 145 (April 2018): 012108. http://dx.doi.org/10.1088/1755-1315/145/1/012108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sommer, Peter. "Computer security and information integrity." Computer Fraud & Security Bulletin 1991, no. 5 (1991): 15–16. http://dx.doi.org/10.1016/0142-0496(91)90242-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information and Integrity"

1

Van, der Poll Huibrecht Margaretha. "Integrity issues of information created by book entries." Diss., Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-03032004-115957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flowerday, Stephen. "Restoring trust by verifying information integrity through continuous auditing." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/504.

Full text
Abstract:
Corporate scandals such as Enron, WorldCom and Parmalat, have focused recent governance efforts in the domain of financial reporting due to fraudulent and/or erroneous accounting practices. In addition, the ineffectiveness of the current system of controls has been highlighted, including that some directors have been weak and ineffective monitors of managers. This board of director ‘weakness’ has called for additional mechanisms for monitoring and controlling of management, focusing on financial reporting. This problem intensifies in that today companies function in real-time, and decisions ar
APA, Harvard, Vancouver, ISO, and other styles
3

Sanchez, Corentin. "A world model enabling information integrity for autonomous vehicles." Thesis, Compiègne, 2022. http://www.theses.fr/2022COMP2683.

Full text
Abstract:
Pour conduire dans des environnements urbains complexes, les véhicules autonomes doivent comprendre leur environnement de conduite. Cette tâche, également connue sous le nom de “connaissance de la situation”, repose sur une représentation virtuelle interne du monde fait par le véhicule, appelée “World Model”. Cette représentation est généralement construite à partir d’informations fournies par de multiples sources. Les cartes de navigation haute définition fournissent des informations préalables telles que la topologie du réseau routier, la description géométrique de la route et des informatio
APA, Harvard, Vancouver, ISO, and other styles
4

Bednar-Schadle, Teresa. "Misinterpretation of Digital Evidence| Recommendations to Improve Data Integrity." Thesis, Utica College, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423713.

Full text
Abstract:
<p> The criminal justice system struggles to remain current with modern technology, and the result is the conviction of innocent victims due to the misinterpretation of digital forensic data. It is common for criminal trials to rely on digital evidence and not uncommon the guilty acquitted based on digital evidence. The research contained in this report covered some of the factors contributing to the misinterpretation of digital forensic data. Among the contributing factors are lack of professional and ethical standards governing digital forensic investigators, inadequate training, outdated eq
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Feng. "Integrity-Based Kernel Malware Detection." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1572.

Full text
Abstract:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In
APA, Harvard, Vancouver, ISO, and other styles
6

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipa
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Kaiye. "Integrity Protection On the Linux Based Android Platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177176.

Full text
Abstract:
Integrity protection on the Linux based Android Platform is examined. The secure boot mechanism is studied and the verification of user space code is investigated. The task of this master thesis was to extend the current code signing mechanism to include signing of files in the file system, and code pages, and to implement verification of these files and pages. Proof-of-concept solutions of two presented methods are implemented. It was found that the integrity protection on the platform can be improved at a relatively reasonable cost by verifying hashes of modules and programs before they are
APA, Harvard, Vancouver, ISO, and other styles
8

Karlsson, Matilda, and Therese Hubertsson. "Delaktighet – en patients rättighet : En litteraturöversikt om patienters erfarenheter av att delta i bedsiderapportering." Thesis, Ersta Sköndal högskola, Institutionen för vårdvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:esh:diva-4937.

Full text
Abstract:
Bakgrund: Bedsiderapportering är en del av utvecklingen mot en mer personcentrerad vård med patienten i fokus. Rapporteringen syftar till att få patienten delaktig i informationsutbytet mellan sjuksköterskor vid skiftbyte och sker vid patientens säng. Kommunikationen vid rapporteringstillfället är viktigt för hur patienten skapar en förståelse för sin situation men också för att öka patientsäkerheten. År 2015 instiftades nya lagar kring patienters delaktighet i vården, vilket resulterat i att kravet på delaktighet har ökat. Syfte: Att belysa patienters erfarenheter av att delta i bedsiderappor
APA, Harvard, Vancouver, ISO, and other styles
9

Visavapattamawon, Suwanna. "Application of active rules to support database integrity constraints and view management." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1981.

Full text
Abstract:
The project demonstrates the enforcement of integrity constraints in both the conventional and active database systems. The project implements a more complex user-defined constraint, a complicated view and more detailed database auditing on the active database system.
APA, Harvard, Vancouver, ISO, and other styles
10

Wylie, Austin. "Geospatial Data Modeling to Support Energy Pipeline Integrity Management." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1447.

Full text
Abstract:
Several hundred thousand miles of energy pipelines span the whole of North America -- responsible for carrying the natural gas and liquid petroleum that power the continent's homes and economies. These pipelines, so crucial to everyday goings-on, are closely monitored by various operating companies to ensure they perform safely and smoothly. Happenings like earthquakes, erosion, and extreme weather, however -- and human factors like vehicle traffic and construction -- all pose threats to pipeline integrity. As such, there is a tremendous need to measure and indicate useful, actionable data for
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information and Integrity"

1

Sinnett, William M. Excellence in information integrity. Financial Executives Research Foundation, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bosselaers, Antoon, and Bart Preneel, eds. Integrity Primitives for Secure Information Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60640-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lynch, Clifford A. Accessibility and integrity of networked information collections. Office of Technology Assessment, Congress of the United States, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jajodia, Sushil, William List, Graeme McGregor, and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35317-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jajodia, Sushil, William List, Graeme W. McGregor, and Leon A. M. Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35396-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van Biene-Hershey, Margaret E., and Leon Strous, eds. Integrity and Internal Control in Information Systems. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35501-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. IEEE Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gertz, Michael, Erik Guldentops, and Leon Strous, eds. Integrity, Internal Control and Security in Information Systems. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gertz, Michael, ed. Integrity and Internal Control in Information Systems V. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35693-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jajodia, Sushil, and Leon Strous, eds. Integrity and Internal Control in Information Systems VI. Springer US, 2004. http://dx.doi.org/10.1007/b116855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information and Integrity"

1

Bolpagni, Marzia. "Building Information Modelling and Information Management." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mauri, Michele. "Information Visualization for the Construction Industry." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Joseph Chuenhuei. "From Building Information Modeling to Extended Reality." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bosselaers, Antoon, and Bart Preneel. "Integrity concepts." In Integrity Primitives for Secure Information Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60640-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

List, W., and W. R. Melville. "Integrity in Information Systems." In Integrity and Internal Control in Information Systems. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35317-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nayar, Madhavan K. "The Information Integrity Imperative." In Integrity, Internal Control and Security in Information Systems. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35583-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krijnen, Thomas, Francesca Noardo, Ken Arroyo Ohori, and Jantien Stoter. "Multi-disciplinary Use of Three-Dimensional Geospatial Information." In Structural Integrity. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82430-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Liyang, Bo Qin, and Ningxiang Wu. "A Multi-attribute Information Based Method of Material Strength Distribution Fitting." In Structural Integrity. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47883-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Decker, Hendrik. "Managing Risks by Integrity Constraints and Integrity Checking." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20116-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Angell, Ian O., and Steve Smithson. "The integrity of information systems." In Information Systems Management. Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21555-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information and Integrity"

1

Rankin, Larry G. "Pipeline Integrity Information Integration." In CORROSION 2004. NACE International, 2004. https://doi.org/10.5006/c2004-04175.

Full text
Abstract:
Abstract Developing and implementing pipeline integrity management programs is now a regulatory requirement for hazardous liquids and natural gas transmission pipeline operators in the United States. One of the key elements required of an integrity management program is the integration of information pertinent to pipeline integrity. Meaningful information integration is necessary to facilitate meaningful information analysis that will allow pipeline operators to identify and resolve integrity issues. This paper addresses the elements of the integrity program where information integration is pe
APA, Harvard, Vancouver, ISO, and other styles
2

Prakash, Enikepalli Sai, Sekharapalli Bargava Ravi Kanth, Pathi Chaitanya, and B. Lakshmi Sirisha. "Examsecured: Steganographic Integrity for Question Papers." In 2024 OITS International Conference on Information Technology (OCIT). IEEE, 2024. https://doi.org/10.1109/ocit65031.2024.00120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, Zhijie, Xingbo Xie, Xiaoyu Du, Ying Du, and Xin He. "Blockchain-Based Data Integrity Verification." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salhi, Mohammed, and Joelle Al Hage. "Zonotopic and Gaussian Information Filter for High Integrity Localization." In 2024 27th International Conference on Information Fusion (FUSION). IEEE, 2024. http://dx.doi.org/10.23919/fusion59988.2024.10706302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tian, Yunong, Xiaoyang Yu, and Qiufang Lin. "VINS-Integrity: An Integrity Monitoring Scheme for Visual/IMU Integration Based on Factor Graph Optimization." In 2024 4th International Conference on Electronic Information Engineering and Computer (EIECT). IEEE, 2024. https://doi.org/10.1109/eiect64462.2024.10866833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zepeda, Alberto, and Christopher Davies. "Integrity Management of Selective Seam Weld Corrosion on Vintage Pipelines." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00586.

Full text
Abstract:
Abstract This document has been prepared for the sole purpose of general informational. While every effort has been made to ensure the accuracy and reliability of the content, the authors and publishers do not guarantee the completeness, accuracy, or applicability of the information in all situations. The use of this information is at the reader’s discretion and risk.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Mingliang, Gang Wang, Zengzhi Liu, et al. "Proof of cloud data integrity based on blockchain." In 2024 4th International Conference on Information Communication and Software Engineering (ICICSE). IEEE, 2024. http://dx.doi.org/10.1109/icicse61805.2024.10625691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hou, Yinjian, Yancheng Zhao, and Kaiqi Yao. "Federated Learning Backdoor Defense Based on Watermark Integrity." In 2024 10th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 2024. https://doi.org/10.1109/bigdia63733.2024.10808344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Edwin Vijay, and S. K. Chaturvedi. "Equipment health management through information fusion for reliability." In Integrity (RAMS). IEEE, 2011. http://dx.doi.org/10.1109/rams.2011.5754474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, E. Lorna, Andrew K. S. Jardine, and Dragan Banjevic. "Incorporating repair information into maintenance optimization models for repairable systems." In Integrity (RAMS). IEEE, 2011. http://dx.doi.org/10.1109/rams.2011.5754498.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information and Integrity"

1

Mayfield, Terry, J. E. Roskos, Stephen R. Welke, John M. Boone, and Catherine W. McDonald. Integrity in Automated Information Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada253990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mayfield, Terry, J. E. Roskos, Stephen R. Welke, John M. Boone, and Catherine W. McDonald. Integrity in Automated Information Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada245555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abernethy, D. C., and Jr. Data and Information Integrity in a Distributed Environment. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada229949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elbeyi, Ece, Klaus Bruhn Jensen, Melissa Aronczyk, et al. Information Integrity about Climate Science: A Systematic Review. Edited by Robert Brulle, Jennifer Jacquet, Stephan Lewandowsky, and Timmons Roberts. International Panel on the Information Environment (IPIE), 2025. https://doi.org/10.61452/btzp3426.

Full text
Abstract:
A high-level précis of this Synthesis Report can be found in the Summary for Policymakers report, Facts, Fakes, and Climate Science. The human response to the climate crisis is being obstructed and delayed by the production and circulation of misleading information about the nature of climate change and the available solutions. The findings of this study indicate that powerful actors—including corporations, governments, and political parties—intentionally spread inaccurate or misleading narratives about anthropogenic climate change. These narratives circulate across digital, broadcast, and int
APA, Harvard, Vancouver, ISO, and other styles
5

Gallegos, J., V. Hamilton, T. Gaylor, K. McCurley, and T. Meeks. Information integrity and privacy for computerized medical patient records. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/392809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katzke, Stuart W., and Zela G. Ruthberg. Report of the invitational workshop on integrity policy in computer information systems (WIPCIS). National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elbeyi, Ece, Klaus Bruhn Jensen, Melissa Aronczyk, et al. Facts, Fakes, and Climate Science: Recommendations for Improving Information Integrity about Climate Science. Edited by Robert Brulle, Jennifer Jacquet, Stephan Lewandowsky, and Timmons Roberts. International Panel on the Information Environment (IPIE), 2025. https://doi.org/10.61452/qhrl3301.

Full text
Abstract:
This Summary for Policymakers provides a high-level précis of the Synthesis Report, Information Integrity about Climate Science: A Systematic Review. The human response to the climate crisis is being obstructed and delayed by the production and circulation of misleading information about the nature of climate change and the available solutions. The findings of this study indicate that powerful actors—including corporations, governments, and political parties—intentionally spread inaccurate or misleading narratives about anthropogenic climate change. These narratives circulate across digital, b
APA, Harvard, Vancouver, ISO, and other styles
8

Barry, Jeff. PR740-243902-R01 Common River Assessment and Information Sharing Platform. Pipeline Research Council International, Inc. (PRCI), 2025. https://doi.org/10.55274/r0000130.

Full text
Abstract:
Flood related channel bed erosion, bank migration, and channel avulsions can represent a significant threat to pipeline integrity. Because there is well over 100,000 miles of liquid petroleum pipelines across the United States, the number of pipeline water crossings at risk from potential flood related forces is equally large. However, the vast majority of these pipeline water crossings are located on small rivers and streams that do not represent a significant threat to pipeline integrity. Conversely, understanding which rivers have the potential to impact pipeline integrity is critical for p
APA, Harvard, Vancouver, ISO, and other styles
9

Barry, Jeff. PR-740-223900-R01 Common River Assessment and Information Sharing Platform. Pipeline Research Council International, Inc. (PRCI), 2023. http://dx.doi.org/10.55274/r0000043.

Full text
Abstract:
Flood related channel bed erosion, bank migration, and channel avulsions can represent a significant threat to pipeline integrity. Because there is well over 100,000 miles of liquid petroleum pipelines across the United States, the number of pipeline water crossings at risk from potential flood related forces is equally large. However, the vast majority of these pipeline water crossings are located on small rivers and streams that do not represent a significant threat to pipeline integrity. Conversely, understanding which rivers have the potential to impact pipeline integrity is critical for p
APA, Harvard, Vancouver, ISO, and other styles
10

Kotowski, Michael, and MaryBeth Mahne. The Role of Interpersonal Influence in the Management of Information Integrity within a Population. University of Tennessee, 2024. https://doi.org/10.7290/iii01flmd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!