To see the other types of publications on this topic, follow the link: Information and Integrity.

Journal articles on the topic 'Information and Integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information and Integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Harley, Kelsey, and Rodney Cooper. "Information Integrity." ACM Computing Surveys 54, no. 2 (2021): 1–35. http://dx.doi.org/10.1145/3436817.

Full text
Abstract:
The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting to vehicle control, the critical importance of information integrity to our well-being has compelled review of its treatment in the literature. Through formal information flow models, the data modification view, and the relationship to data quality, information integrity will be surveyed. Illustrations are given for databases and information trustworthiness. Integrity protection is advancing but lacks standardization
APA, Harvard, Vancouver, ISO, and other styles
2

Nayar, Madhavan. "ACHIEVING INFORMATION INTEGRITY." Information Systems Management 10, no. 2 (1993): 51–58. http://dx.doi.org/10.1080/10580539308906928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Serdyukov, Yu M. "Human information integrity." Herald of the Russian Academy of Sciences 77, no. 5 (2007): 474–78. http://dx.doi.org/10.1134/s101933160705005x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Milas, Ante Josip, and Ivan Dunđer. "Integrity-breached information." Međunarodne studije 23, no. 1 (2023): 63–83. http://dx.doi.org/10.46672/ms.23.1.4.

Full text
Abstract:
U suvremenom informacijskom prostoru izloženi smo mnogobrojnim informacijama među kojima su i informacije narušenog integriteta. Iako manipulacije informacijama u javnom informacijskom prostoru nisu novost, njihova količina i brzina diseminacije putem internetskih društvenih mreža i komunikacijskih operativnih sustava predstavljaju novi izazov i ugrozu za nacionalnu sigurnost demokratskih država. U javnom prostoru se koristi nekoliko različitih termina kojima se nastoji objasniti da je integritet informacije plasirane u javni prostor bitno narušen što za posljedicu ima terminološko i kognitivn
APA, Harvard, Vancouver, ISO, and other styles
5

Miller, Keith W., and Jeffrey Voas. "Information Integrity and IT Professionals' Integrity, Intertwined." IT Professional 10, no. 6 (2008): 35–40. http://dx.doi.org/10.1109/mitp.2008.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flowerday, Stephen, and Rossouw von Solms. "Real-time information integrity=system integrity+data integrity+continuous assurances." Computers & Security 24, no. 8 (2005): 604–13. http://dx.doi.org/10.1016/j.cose.2005.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rankin, Larry G. "Pipeline Integrity Information Integration." Materials Performance 43, no. 6 (2004): 56–60. https://doi.org/10.5006/mp2004_43_6-56.

Full text
Abstract:
Developing and implementing pipeline integrity management programs is a regulatory requirement for hazardous liquids and gas transmission pipeline operators in the U.S. A key element of an integrity management program is the integration of information pertinent to pipeline integrity. Meaningful information integration is necessary to facilitate analysis that will identify integrity issues. This article addresses information integration, the types of information that are integrated, expected results from the integration, and integration methods and basis.
APA, Harvard, Vancouver, ISO, and other styles
8

Mali, M. S. "Achieving Integrity in the System Design: Information Integrity View." Paradigm 9, no. 1 (2005): 62–65. http://dx.doi.org/10.1177/0971890720050109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tarunasena, T., R. Rusman, and W. Darmawan. "Information Literacy and Territorial Integrity." IOP Conference Series: Earth and Environmental Science 145 (April 2018): 012108. http://dx.doi.org/10.1088/1755-1315/145/1/012108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sommer, Peter. "Computer security and information integrity." Computer Fraud & Security Bulletin 1991, no. 5 (1991): 15–16. http://dx.doi.org/10.1016/0142-0496(91)90242-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

John, Alison. "Internal communication and information integrity." Global Knowledge, Memory and Communication 69, no. 1/2 (2019): 5–6. http://dx.doi.org/10.1108/gkmc-06-2019-0064.

Full text
Abstract:
Purpose Internal communication and information integrity – a professional services approach to the impact of “fake news”. This paper aims to explain how to build internal communication so that staff can recognise real from fake and the impact that “fake news” can have on organisations through global media. Design/methodology/approach The author offers a personal perspective of the potential impact of “fake news” on an organisation, and of how internal communication can be built on trust and transparency. Findings Most effective internal communications are built on the authenticity of the brand
APA, Harvard, Vancouver, ISO, and other styles
12

Ekaputri, Anastasia Arini, Aldo Biondy Roesli, R. Venesia Putri Maridjan, and Evelyn Hendriana. "INFORMATION INTEGRITY AND ELECTORAL CHOICES." Jurnal Manajemen Pemasaran 19, no. 1 (2025): 1–13. https://doi.org/10.9744/pemasaran.19.1.1-13.

Full text
Abstract:
This study explores the relationship between news truthfulness, news credibility, source credibility, political brand trust, political brand image, and voting intention. The objective of this study is to understand how those factors collectively influence voters' perception and behavior. Using a quantitative approach, the data was collected through online surveys of 250 eligible voters in Indonesia, analyzed using Structural Equation Modeling (SEM). The results indicate that news truthfulness significantly increases both political brand trust and image. Meanwhile, source credibility positively
APA, Harvard, Vancouver, ISO, and other styles
13

Woodbury, Marsha. "Information Integrity in Africa: Exploring Information Corruption Issues." International Review of Information Ethics 7 (September 1, 2007): 229–35. http://dx.doi.org/10.29173/irie39.

Full text
Abstract:
This paper examines information integrity, with the premise that sound, dependable information enhances the values of the entire society. Several issues about information integrity of great concern to Africa are access to information, the right of individuals to correct records that are erroneous, accurate and culturally appropriate translations, and the standard of freedom of the press. The basis for this paper is human rights doctrine largely embodied in the ethical principals of the international informatics community.
APA, Harvard, Vancouver, ISO, and other styles
14

Dzelendzyak, Ulyana, and Nazar Mashtaler. "COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY." Measuring Equipment and Metrology 85, no. 3 (2024): 47–53. http://dx.doi.org/10.23939/istcmtm2024.03.047.

Full text
Abstract:
The article discusses key information security principles, focusing on confidentiality, integrity, availability, traceability, and the DIE model (Distributed, Immutable, Ephemeral). Confidentiality emphasizes the importance of secrecy and controlling access to prevent sensitive information from misappropriation. Integrity ensures that data remains accurate and trustworthy, with measures to prevent unauthorized modifications. Availability highlights the necessity of reliable and timely access to data, even in the face of potential system failures or disasters, by implementing safeguards like ba
APA, Harvard, Vancouver, ISO, and other styles
15

Hegner, Stephen J., and M. Andrea Rodríguez. "A Model for Multigranular Data and Its Integrity." Informatica 28, no. 1 (2017): 45–78. http://dx.doi.org/10.15388/informatica.2017.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Young-Jin, Yun-Jae Kim, and Jae-Boong Choi. "Towards a New Horizon in Structural Integrity : Integrity, Information and Intelligence." Proceedings of the Asian Pacific Conference on Fracture and Strength and International Conference on Advanced Technology in Experimental Mechanics 1.01.203 (2001): 48–59. http://dx.doi.org/10.1299/jsmeatemapcfs.1.01.203.0_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

KIM, Young-Jin, Yun-Jae KIM, and Jae-Boong CHOI. "Towards a New Horizon in Structural Integrity: Integrity, Information and Intelligence." JSME International Journal Series A 45, no. 4 (2002): 460–75. http://dx.doi.org/10.1299/jsmea.45.460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Khurana, Reema, and Vijay V. Mandke. "Business process modeling with information integrity." Business Process Management Journal 15, no. 4 (2009): 487–503. http://dx.doi.org/10.1108/14637150910975507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cohen, Fred. "Maintaining a poor person's information integrity." Computers & Security 7, no. 5 (1988): 489–94. http://dx.doi.org/10.1016/0167-4048(88)90202-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

List, William, and Rob Melville. "Integrity in information systems — Executive summary." Computers & Security 13, no. 4 (1994): 295–301. http://dx.doi.org/10.1016/0167-4048(94)90018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Khan Pathan, Al-Sakib, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn. "Information integrity in smart grid systems." Information Systems 53 (October 2015): 145–46. http://dx.doi.org/10.1016/j.is.2015.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Eastman, Charles M. "Managing integrity in design information flows." Computer-Aided Design 28, no. 6-7 (1996): 551–65. http://dx.doi.org/10.1016/0010-4485(95)00069-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mandke, Vijay V., and Madhavan K. Nayar. "Beyond Quality: the Information Integrity Imperative." Total Quality Management & Business Excellence 15, no. 5-6 (2004): 645–54. http://dx.doi.org/10.1080/14783360410001680134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Palmer, Jim, and Diane Zwemer. "Sources and information: Maintaining institutional integrity." New Directions for Community Colleges 1985, no. 52 (1985): 77–101. http://dx.doi.org/10.1002/cc.36819855209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Motro, Amihai. "Integrity = validity + completeness." ACM Transactions on Database Systems 14, no. 4 (1989): 480–502. http://dx.doi.org/10.1145/76902.76904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

CLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.

Full text
Abstract:
Three integrity measures are introduced: contamination, channel suppression and program suppression. Contamination is a measure of how much untrusted information reaches trusted outputs; it is the dual of leakage, which is a measure of information-flow confidentiality. Channel suppression is a measure of how much information about inputs to a noisy channel is missing from the channel outputs. And program suppression is a measure of how much information about the correct output of a program is lost because of attacker influence and implementation errors. Program and channel suppression do not h
APA, Harvard, Vancouver, ISO, and other styles
27

Berger, Leslie, and J. Efrim Boritz. "Accounting Students' Sensitivity to Attributes of Information Integrity." Issues in Accounting Education 27, no. 4 (2012): 867–93. http://dx.doi.org/10.2308/iace-50252.

Full text
Abstract:
ABSTRACT This study investigates how students incorporate information integrity impairments into judgments and judgment confidence. The effects of four information integrity attributes (completeness, currency, accuracy, and authorization) were examined. Our results show that accounting students incorporate some information integrity attributes into their judgments and judgment confidence. As the severity of the integrity impairments increased, accounting students assigned more weight to information integrity impairments in judging the performance of division managers. We find that accounting s
APA, Harvard, Vancouver, ISO, and other styles
28

Pushkarev, Alexander V., and Sergei N. Novikov. "STUDY OF METHODS FOR ENSURING INFORMATION INTEGRITY IN INFORMATION SYSTEMS WITH OPTICAL COMMUNICATION CHANNELS." Interexpo GEO-Siberia 6, no. 2 (2020): 66–71. http://dx.doi.org/10.33764/2618-981x-2020-6-2-66-71.

Full text
Abstract:
The relevance of the work lies in the fact that the number of information systems with optical communication channels is increasing. However, for such systems, the optimal method for ensuring the integrity of information has not been identified. The purpose of the work is to identify the best method for ensuring the integrity of information in information systems with optical communication channels. This article discusses methods for ensuring the integrity of information at the stages of storage and transmission of information. The main method for ensuring the integrity of information at the s
APA, Harvard, Vancouver, ISO, and other styles
29

Pushkarev, Alexander, and Sergei Novikov. "ANALYSIS OF APPROACHES TO ENSURE INFORMATION INTEGRITY." Interexpo GEO-Siberia 6, no. 1 (2019): 122–27. http://dx.doi.org/10.33764/2618-981x-2019-6-1-122-127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Madsen, Wayne. "Information Warfare: A New Threat to Information Security and Integrity." Information Systems Security 4, no. 3 (1995): 12–15. http://dx.doi.org/10.1080/10658989509342503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jeong, Yoon-Su, and Sung-Ho Sim. "Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information." Sensors 21, no. 6 (2021): 2049. http://dx.doi.org/10.3390/s21062049.

Full text
Abstract:
As cloud technology advances, devices such as IoT (Internet of Things) are being utilized in various areas ranging from transportation, manufacturing, energy, automation, space, defense, and healthcare. As the number of IoT devices increases, the safety of IoT information, which is vulnerable to cyber attacks, is emerging as an important area of interest in distributed cloud environments. However, integrity techniques are not guaranteed to easily identify the integrity threats and attacks on IoT information operating in the distributed cloud associated with IoT systems and CPS (Cyber-Physical
APA, Harvard, Vancouver, ISO, and other styles
32

Taha, Dujan, Ahmed Nori, and Yaseen Ismaiel. "Hiding in Text using Information Integrity Service." AL-Rafidain Journal of Computer Sciences and Mathematics 6, no. 1 (2009): 115–22. http://dx.doi.org/10.33899/csmj.2009.163789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schulte-Strathaus, Rolf, and Robert Bea. "SSIIS -The Ship Structural Integrity Information System." Marine Technology and SNAME News 33, no. 04 (1996): 299–308. http://dx.doi.org/10.5957/mt1.1996.33.4.299.

Full text
Abstract:
The availability of advanced database systems in conjunction with increased computer storage and performance capabilities makes it possible to improve vessel design, maintenance and operations through the use of integrated database systems. This paper describes the development of a Ship Structural Integrity Information System (SSIIS). The general need for ship information systems is outlined. Existing database systems are summarized and evaluated. The information needs of various vessel analysis software have been reviewed to determine the necessary data structure for SSIIS. The initial develo
APA, Harvard, Vancouver, ISO, and other styles
34

Park, Youngran, Hyunho Kang, Kazuhiko Yamaguchi, and Kingo Kobayashi. "A novel steganographic system with information integrity." IEICE Electronics Express 4, no. 12 (2007): 393–99. http://dx.doi.org/10.1587/elex.4.393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Chuan Sheng, and Quan Long Guan. "Research of Integrity Constraints in Information Integration." Applied Mechanics and Materials 20-23 (January 2010): 1091–95. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1091.

Full text
Abstract:
As more and more resources are integrated in enterprises, or between enterprises or industries, the information integration must encounter all kinds of problems which should be solved in production system. The paper discussed integrity constraints in information integration which were found in production system, and proposed solution for the problem.
APA, Harvard, Vancouver, ISO, and other styles
36

Judge, Elizabeth F., and Amir M. Korhani. "Disinformation, Digital Information Equality, and Electoral Integrity." Election Law Journal: Rules, Politics, and Policy 19, no. 2 (2020): 240–61. http://dx.doi.org/10.1089/elj.2019.0566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kawamura, Y., and Y. Sumi. "Information System for Structural Integrity of Ships." Proceedings of the Institution of Mechanical Engineers, Part M: Journal of Engineering for the Maritime Environment 219, no. 2 (2005): 93–106. http://dx.doi.org/10.1243/147509005x10422.

Full text
Abstract:
The maintenance of ship structures is very important to avoid serious casualties such as oil spill from tankers. For this reason, it is necessary to detect and evaluate the state of the damages properly. In this paper, a new concept of an information system for structural integrity of ships is proposed in order to improve the safety and to assess the condition of structural strength in service. In this system, all information of damages in a certain ship obtained from hull surveys is managed in an information database, allowing assessments to be made at any time in the ship's life of the prese
APA, Harvard, Vancouver, ISO, and other styles
38

V. Mandke, Vijay. "Information Integrity Adding Value to Corporate Assets." Paradigm 9, no. 1 (2005): 38–50. http://dx.doi.org/10.1177/0971890720050106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Harn, Lein, Hung-Yu Lin, and Shoubao Yang. "A software authentication system for information integrity." Computers & Security 11, no. 8 (1992): 747–52. http://dx.doi.org/10.1016/0167-4048(92)90130-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Menezes, Alfred. "Contemporary cryptology—The science of information integrity." Designs, Codes and Cryptography 4, no. 2 (1994): 193–95. http://dx.doi.org/10.1007/bf01578872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Clarke, M., and K. J. Woolley. "ASSET KNOWLEDGE INTEGRITY MANAGEMENT (ASSET INTEGRITY MANAGEMENT FORTHETHIRD MILLENNIUM)." APPEA Journal 40, no. 1 (2000): 531. http://dx.doi.org/10.1071/aj99033.

Full text
Abstract:
This paper presents a framework for introducing effective knowledge transfer across departments and disciplines at all stages of a project lifecycle, with the aim of improving the process of asset integrity in the Third Millennium.The tools of building a learning organisation are presented as a starting point for promoting a knowledge management culture that recognises that most of the valuable information resides with the people and needs a mechanism for capture.All too often, vital information remains with key people on the job because they simply do not have a means to transfer that knowled
APA, Harvard, Vancouver, ISO, and other styles
42

Svanks, MI. "Integrity analysis." Information and Software Technology 30, no. 10 (1988): 595–605. http://dx.doi.org/10.1016/0950-5849(88)90116-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Leonard, Elisabeth, Hollie White, and Tonia Graves. "Managing with Integrity." Serials Librarian 56, no. 1-4 (2009): 25–31. http://dx.doi.org/10.1080/03615260802662107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Deng, Yuan Qing, Hui Shi, Jing Gong, and Jia Yu Li. "Integrity Protection of the Intelligent Robot's Remote Information." Advanced Materials Research 706-708 (June 2013): 836–39. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.836.

Full text
Abstract:
The remote information of the intelligent robot, especially the control information, has to be protected for integrity, in order to prevent the enemy or competitors from attack, such as manipulation and forgery. This paper uses the 3GPP integrity algorithm f9 to protect the integrity of the intelligent robot’s remote information, and uses FPGA to realize the hard core algorithm KASUMI of the f9, and gives an implementation example.
APA, Harvard, Vancouver, ISO, and other styles
45

Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.

Full text
Abstract:
Purpose The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/methodology/approach The methodology employed is multiple case studies approach with in-depth interviews with five multinational enterprises (MNEs)/multinational corporations (MNCs). Findings The findings reveal that information leakage can be approached with human governance mechanism such as organizational ethical climate and information security culture. Besides, higher frequency of leakages negativel
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Liyuan, Jinman Luo, Chengfang Gao, and Shanlong Zhao. "Information Integrity Evaluation of Information System Integration Based on Bayesian Algorithm." IOP Conference Series: Materials Science and Engineering 750 (March 24, 2020): 012182. http://dx.doi.org/10.1088/1757-899x/750/1/012182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Milner, R. M. "NEGOTIATING TEXT INTEGRITY." Information, Communication & Society 13, no. 5 (2010): 722–46. http://dx.doi.org/10.1080/13691180903456538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zheng, Chaoliang. "Research on Accounting Information Integrity Verification Method based on Blockchain." Academic Journal of Management and Social Sciences 3, no. 3 (2023): 202–5. http://dx.doi.org/10.54097/ajmss.v3i3.11192.

Full text
Abstract:
Conventional accounting information integrity verification method mainly uses SOA mode to obtain verification parameters, which is susceptible to the influence of cloud memory verification transmission bandwidth, resulting in high information integrity verification overhead, therefore, this paper designs a new accounting information integrity verification method based on blockchain. The experimental results show that the designed blockchain-based accounting information integrity verification method has a smaller verification overhead under different data blocks, which proves that the designed
APA, Harvard, Vancouver, ISO, and other styles
49

Garcia-Pueyo, Lluís. "Integrity 2024: Integrity in Social Networks and Media." ACM SIGWEB Newsletter 2024, Winter (2024): 1–2. http://dx.doi.org/10.1145/3643603.3643605.

Full text
Abstract:
Integrity 2024 is the fifth edition of the Workshop on Integrity in Social Networks and Media, held in conjunction with the ACM Conference on Web Search and Data Mining (WSDM) since the 2020 edition. The goal of the workshop is to bring together academic and industry researchers working on integrity, fairness, trust and safety in social networks to discuss the most pressing risks and cutting-edge technologies to reliably measure and mitigate them. The event consists of invited talks from academic experts and industry leaders as well as peer-reviewed papers and posters through an open call-for-
APA, Harvard, Vancouver, ISO, and other styles
50

Sim, Sung-Ho, and Yoon-Su Jeong. "Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments." Sensors 21, no. 10 (2021): 3515. http://dx.doi.org/10.3390/s21103515.

Full text
Abstract:
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT infor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!