Journal articles on the topic 'Information and Integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information and Integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Harley, Kelsey, and Rodney Cooper. "Information Integrity." ACM Computing Surveys 54, no. 2 (2021): 1–35. http://dx.doi.org/10.1145/3436817.
Full textNayar, Madhavan. "ACHIEVING INFORMATION INTEGRITY." Information Systems Management 10, no. 2 (1993): 51–58. http://dx.doi.org/10.1080/10580539308906928.
Full textSerdyukov, Yu M. "Human information integrity." Herald of the Russian Academy of Sciences 77, no. 5 (2007): 474–78. http://dx.doi.org/10.1134/s101933160705005x.
Full textMilas, Ante Josip, and Ivan Dunđer. "Integrity-breached information." Međunarodne studije 23, no. 1 (2023): 63–83. http://dx.doi.org/10.46672/ms.23.1.4.
Full textMiller, Keith W., and Jeffrey Voas. "Information Integrity and IT Professionals' Integrity, Intertwined." IT Professional 10, no. 6 (2008): 35–40. http://dx.doi.org/10.1109/mitp.2008.124.
Full textFlowerday, Stephen, and Rossouw von Solms. "Real-time information integrity=system integrity+data integrity+continuous assurances." Computers & Security 24, no. 8 (2005): 604–13. http://dx.doi.org/10.1016/j.cose.2005.08.004.
Full textRankin, Larry G. "Pipeline Integrity Information Integration." Materials Performance 43, no. 6 (2004): 56–60. https://doi.org/10.5006/mp2004_43_6-56.
Full textMali, M. S. "Achieving Integrity in the System Design: Information Integrity View." Paradigm 9, no. 1 (2005): 62–65. http://dx.doi.org/10.1177/0971890720050109.
Full textTarunasena, T., R. Rusman, and W. Darmawan. "Information Literacy and Territorial Integrity." IOP Conference Series: Earth and Environmental Science 145 (April 2018): 012108. http://dx.doi.org/10.1088/1755-1315/145/1/012108.
Full textSommer, Peter. "Computer security and information integrity." Computer Fraud & Security Bulletin 1991, no. 5 (1991): 15–16. http://dx.doi.org/10.1016/0142-0496(91)90242-w.
Full textJohn, Alison. "Internal communication and information integrity." Global Knowledge, Memory and Communication 69, no. 1/2 (2019): 5–6. http://dx.doi.org/10.1108/gkmc-06-2019-0064.
Full textEkaputri, Anastasia Arini, Aldo Biondy Roesli, R. Venesia Putri Maridjan, and Evelyn Hendriana. "INFORMATION INTEGRITY AND ELECTORAL CHOICES." Jurnal Manajemen Pemasaran 19, no. 1 (2025): 1–13. https://doi.org/10.9744/pemasaran.19.1.1-13.
Full textWoodbury, Marsha. "Information Integrity in Africa: Exploring Information Corruption Issues." International Review of Information Ethics 7 (September 1, 2007): 229–35. http://dx.doi.org/10.29173/irie39.
Full textDzelendzyak, Ulyana, and Nazar Mashtaler. "COMPREHENSIVE APPROACH TO PROTECTING DATA AND THE INFORMATION SYSTEM INTEGRITY." Measuring Equipment and Metrology 85, no. 3 (2024): 47–53. http://dx.doi.org/10.23939/istcmtm2024.03.047.
Full textHegner, Stephen J., and M. Andrea Rodríguez. "A Model for Multigranular Data and Its Integrity." Informatica 28, no. 1 (2017): 45–78. http://dx.doi.org/10.15388/informatica.2017.120.
Full textKim, Young-Jin, Yun-Jae Kim, and Jae-Boong Choi. "Towards a New Horizon in Structural Integrity : Integrity, Information and Intelligence." Proceedings of the Asian Pacific Conference on Fracture and Strength and International Conference on Advanced Technology in Experimental Mechanics 1.01.203 (2001): 48–59. http://dx.doi.org/10.1299/jsmeatemapcfs.1.01.203.0_48.
Full textKIM, Young-Jin, Yun-Jae KIM, and Jae-Boong CHOI. "Towards a New Horizon in Structural Integrity: Integrity, Information and Intelligence." JSME International Journal Series A 45, no. 4 (2002): 460–75. http://dx.doi.org/10.1299/jsmea.45.460.
Full textKhurana, Reema, and Vijay V. Mandke. "Business process modeling with information integrity." Business Process Management Journal 15, no. 4 (2009): 487–503. http://dx.doi.org/10.1108/14637150910975507.
Full textCohen, Fred. "Maintaining a poor person's information integrity." Computers & Security 7, no. 5 (1988): 489–94. http://dx.doi.org/10.1016/0167-4048(88)90202-7.
Full textList, William, and Rob Melville. "Integrity in information systems — Executive summary." Computers & Security 13, no. 4 (1994): 295–301. http://dx.doi.org/10.1016/0167-4048(94)90018-3.
Full textKhan Pathan, Al-Sakib, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn. "Information integrity in smart grid systems." Information Systems 53 (October 2015): 145–46. http://dx.doi.org/10.1016/j.is.2015.05.002.
Full textEastman, Charles M. "Managing integrity in design information flows." Computer-Aided Design 28, no. 6-7 (1996): 551–65. http://dx.doi.org/10.1016/0010-4485(95)00069-0.
Full textMandke, Vijay V., and Madhavan K. Nayar. "Beyond Quality: the Information Integrity Imperative." Total Quality Management & Business Excellence 15, no. 5-6 (2004): 645–54. http://dx.doi.org/10.1080/14783360410001680134.
Full textPalmer, Jim, and Diane Zwemer. "Sources and information: Maintaining institutional integrity." New Directions for Community Colleges 1985, no. 52 (1985): 77–101. http://dx.doi.org/10.1002/cc.36819855209.
Full textMotro, Amihai. "Integrity = validity + completeness." ACM Transactions on Database Systems 14, no. 4 (1989): 480–502. http://dx.doi.org/10.1145/76902.76904.
Full textCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Full textBerger, Leslie, and J. Efrim Boritz. "Accounting Students' Sensitivity to Attributes of Information Integrity." Issues in Accounting Education 27, no. 4 (2012): 867–93. http://dx.doi.org/10.2308/iace-50252.
Full textPushkarev, Alexander V., and Sergei N. Novikov. "STUDY OF METHODS FOR ENSURING INFORMATION INTEGRITY IN INFORMATION SYSTEMS WITH OPTICAL COMMUNICATION CHANNELS." Interexpo GEO-Siberia 6, no. 2 (2020): 66–71. http://dx.doi.org/10.33764/2618-981x-2020-6-2-66-71.
Full textPushkarev, Alexander, and Sergei Novikov. "ANALYSIS OF APPROACHES TO ENSURE INFORMATION INTEGRITY." Interexpo GEO-Siberia 6, no. 1 (2019): 122–27. http://dx.doi.org/10.33764/2618-981x-2019-6-1-122-127.
Full textMadsen, Wayne. "Information Warfare: A New Threat to Information Security and Integrity." Information Systems Security 4, no. 3 (1995): 12–15. http://dx.doi.org/10.1080/10658989509342503.
Full textJeong, Yoon-Su, and Sung-Ho Sim. "Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information." Sensors 21, no. 6 (2021): 2049. http://dx.doi.org/10.3390/s21062049.
Full textTaha, Dujan, Ahmed Nori, and Yaseen Ismaiel. "Hiding in Text using Information Integrity Service." AL-Rafidain Journal of Computer Sciences and Mathematics 6, no. 1 (2009): 115–22. http://dx.doi.org/10.33899/csmj.2009.163789.
Full textSchulte-Strathaus, Rolf, and Robert Bea. "SSIIS -The Ship Structural Integrity Information System." Marine Technology and SNAME News 33, no. 04 (1996): 299–308. http://dx.doi.org/10.5957/mt1.1996.33.4.299.
Full textPark, Youngran, Hyunho Kang, Kazuhiko Yamaguchi, and Kingo Kobayashi. "A novel steganographic system with information integrity." IEICE Electronics Express 4, no. 12 (2007): 393–99. http://dx.doi.org/10.1587/elex.4.393.
Full textWang, Chuan Sheng, and Quan Long Guan. "Research of Integrity Constraints in Information Integration." Applied Mechanics and Materials 20-23 (January 2010): 1091–95. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1091.
Full textJudge, Elizabeth F., and Amir M. Korhani. "Disinformation, Digital Information Equality, and Electoral Integrity." Election Law Journal: Rules, Politics, and Policy 19, no. 2 (2020): 240–61. http://dx.doi.org/10.1089/elj.2019.0566.
Full textKawamura, Y., and Y. Sumi. "Information System for Structural Integrity of Ships." Proceedings of the Institution of Mechanical Engineers, Part M: Journal of Engineering for the Maritime Environment 219, no. 2 (2005): 93–106. http://dx.doi.org/10.1243/147509005x10422.
Full textV. Mandke, Vijay. "Information Integrity Adding Value to Corporate Assets." Paradigm 9, no. 1 (2005): 38–50. http://dx.doi.org/10.1177/0971890720050106.
Full textHarn, Lein, Hung-Yu Lin, and Shoubao Yang. "A software authentication system for information integrity." Computers & Security 11, no. 8 (1992): 747–52. http://dx.doi.org/10.1016/0167-4048(92)90130-j.
Full textMenezes, Alfred. "Contemporary cryptology—The science of information integrity." Designs, Codes and Cryptography 4, no. 2 (1994): 193–95. http://dx.doi.org/10.1007/bf01578872.
Full textClarke, M., and K. J. Woolley. "ASSET KNOWLEDGE INTEGRITY MANAGEMENT (ASSET INTEGRITY MANAGEMENT FORTHETHIRD MILLENNIUM)." APPEA Journal 40, no. 1 (2000): 531. http://dx.doi.org/10.1071/aj99033.
Full textSvanks, MI. "Integrity analysis." Information and Software Technology 30, no. 10 (1988): 595–605. http://dx.doi.org/10.1016/0950-5849(88)90116-4.
Full textLeonard, Elisabeth, Hollie White, and Tonia Graves. "Managing with Integrity." Serials Librarian 56, no. 1-4 (2009): 25–31. http://dx.doi.org/10.1080/03615260802662107.
Full textDeng, Yuan Qing, Hui Shi, Jing Gong, and Jia Yu Li. "Integrity Protection of the Intelligent Robot's Remote Information." Advanced Materials Research 706-708 (June 2013): 836–39. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.836.
Full textWong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Full textLiu, Liyuan, Jinman Luo, Chengfang Gao, and Shanlong Zhao. "Information Integrity Evaluation of Information System Integration Based on Bayesian Algorithm." IOP Conference Series: Materials Science and Engineering 750 (March 24, 2020): 012182. http://dx.doi.org/10.1088/1757-899x/750/1/012182.
Full textMilner, R. M. "NEGOTIATING TEXT INTEGRITY." Information, Communication & Society 13, no. 5 (2010): 722–46. http://dx.doi.org/10.1080/13691180903456538.
Full textZheng, Chaoliang. "Research on Accounting Information Integrity Verification Method based on Blockchain." Academic Journal of Management and Social Sciences 3, no. 3 (2023): 202–5. http://dx.doi.org/10.54097/ajmss.v3i3.11192.
Full textGarcia-Pueyo, Lluís. "Integrity 2024: Integrity in Social Networks and Media." ACM SIGWEB Newsletter 2024, Winter (2024): 1–2. http://dx.doi.org/10.1145/3643603.3643605.
Full textSim, Sung-Ho, and Yoon-Su Jeong. "Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments." Sensors 21, no. 10 (2021): 3515. http://dx.doi.org/10.3390/s21103515.
Full text