Journal articles on the topic 'Integrity of information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Integrity of information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Harley, Kelsey, and Rodney Cooper. "Information Integrity." ACM Computing Surveys 54, no. 2 (2021): 1–35. http://dx.doi.org/10.1145/3436817.
Full textSerdyukov, Yu M. "Human information integrity." Herald of the Russian Academy of Sciences 77, no. 5 (2007): 474–78. http://dx.doi.org/10.1134/s101933160705005x.
Full textNayar, Madhavan. "ACHIEVING INFORMATION INTEGRITY." Information Systems Management 10, no. 2 (1993): 51–58. http://dx.doi.org/10.1080/10580539308906928.
Full textMiller, Keith W., and Jeffrey Voas. "Information Integrity and IT Professionals' Integrity, Intertwined." IT Professional 10, no. 6 (2008): 35–40. http://dx.doi.org/10.1109/mitp.2008.124.
Full textFlowerday, Stephen, and Rossouw von Solms. "Real-time information integrity=system integrity+data integrity+continuous assurances." Computers & Security 24, no. 8 (2005): 604–13. http://dx.doi.org/10.1016/j.cose.2005.08.004.
Full textMali, M. S. "Achieving Integrity in the System Design: Information Integrity View." Paradigm 9, no. 1 (2005): 62–65. http://dx.doi.org/10.1177/0971890720050109.
Full textTarunasena, T., R. Rusman, and W. Darmawan. "Information Literacy and Territorial Integrity." IOP Conference Series: Earth and Environmental Science 145 (April 2018): 012108. http://dx.doi.org/10.1088/1755-1315/145/1/012108.
Full textJohn, Alison. "Internal communication and information integrity." Global Knowledge, Memory and Communication 69, no. 1/2 (2019): 5–6. http://dx.doi.org/10.1108/gkmc-06-2019-0064.
Full textSommer, Peter. "Computer security and information integrity." Computer Fraud & Security Bulletin 1991, no. 5 (1991): 15–16. http://dx.doi.org/10.1016/0142-0496(91)90242-w.
Full textWoodbury, Marsha. "Information Integrity in Africa: Exploring Information Corruption Issues." International Review of Information Ethics 7 (September 1, 2007): 229–35. http://dx.doi.org/10.29173/irie39.
Full textHegner, Stephen J., and M. Andrea Rodríguez. "A Model for Multigranular Data and Its Integrity." Informatica 28, no. 1 (2017): 45–78. http://dx.doi.org/10.15388/informatica.2017.120.
Full textKIM, Young-Jin, Yun-Jae KIM, and Jae-Boong CHOI. "Towards a New Horizon in Structural Integrity: Integrity, Information and Intelligence." JSME International Journal Series A 45, no. 4 (2002): 460–75. http://dx.doi.org/10.1299/jsmea.45.460.
Full textKim, Young-Jin, Yun-Jae Kim, and Jae-Boong Choi. "Towards a New Horizon in Structural Integrity : Integrity, Information and Intelligence." Proceedings of the Asian Pacific Conference on Fracture and Strength and International Conference on Advanced Technology in Experimental Mechanics 1.01.203 (2001): 48–59. http://dx.doi.org/10.1299/jsmeatemapcfs.1.01.203.0_48.
Full textMotro, Amihai. "Integrity = validity + completeness." ACM Transactions on Database Systems 14, no. 4 (1989): 480–502. http://dx.doi.org/10.1145/76902.76904.
Full textKhurana, Reema, and Vijay V. Mandke. "Business process modeling with information integrity." Business Process Management Journal 15, no. 4 (2009): 487–503. http://dx.doi.org/10.1108/14637150910975507.
Full textPalmer, Jim, and Diane Zwemer. "Sources and information: Maintaining institutional integrity." New Directions for Community Colleges 1985, no. 52 (1985): 77–101. http://dx.doi.org/10.1002/cc.36819855209.
Full textMandke, Vijay V., and Madhavan K. Nayar. "Beyond Quality: the Information Integrity Imperative." Total Quality Management & Business Excellence 15, no. 5-6 (2004): 645–54. http://dx.doi.org/10.1080/14783360410001680134.
Full textKhan Pathan, Al-Sakib, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn. "Information integrity in smart grid systems." Information Systems 53 (October 2015): 145–46. http://dx.doi.org/10.1016/j.is.2015.05.002.
Full textCohen, Fred. "Maintaining a poor person's information integrity." Computers & Security 7, no. 5 (1988): 489–94. http://dx.doi.org/10.1016/0167-4048(88)90202-7.
Full textList, William, and Rob Melville. "Integrity in information systems — Executive summary." Computers & Security 13, no. 4 (1994): 295–301. http://dx.doi.org/10.1016/0167-4048(94)90018-3.
Full textEastman, Charles M. "Managing integrity in design information flows." Computer-Aided Design 28, no. 6-7 (1996): 551–65. http://dx.doi.org/10.1016/0010-4485(95)00069-0.
Full textCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Full textBerger, Leslie, and J. Efrim Boritz. "Accounting Students' Sensitivity to Attributes of Information Integrity." Issues in Accounting Education 27, no. 4 (2012): 867–93. http://dx.doi.org/10.2308/iace-50252.
Full textPushkarev, Alexander V., and Sergei N. Novikov. "STUDY OF METHODS FOR ENSURING INFORMATION INTEGRITY IN INFORMATION SYSTEMS WITH OPTICAL COMMUNICATION CHANNELS." Interexpo GEO-Siberia 6, no. 2 (2020): 66–71. http://dx.doi.org/10.33764/2618-981x-2020-6-2-66-71.
Full textMadsen, Wayne. "Information Warfare: A New Threat to Information Security and Integrity." Information Systems Security 4, no. 3 (1995): 12–15. http://dx.doi.org/10.1080/10658989509342503.
Full textPushkarev, Alexander, and Sergei Novikov. "ANALYSIS OF APPROACHES TO ENSURE INFORMATION INTEGRITY." Interexpo GEO-Siberia 6, no. 1 (2019): 122–27. http://dx.doi.org/10.33764/2618-981x-2019-6-1-122-127.
Full textWang, Chuan Sheng, and Quan Long Guan. "Research of Integrity Constraints in Information Integration." Applied Mechanics and Materials 20-23 (January 2010): 1091–95. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1091.
Full textPark, Youngran, Hyunho Kang, Kazuhiko Yamaguchi, and Kingo Kobayashi. "A novel steganographic system with information integrity." IEICE Electronics Express 4, no. 12 (2007): 393–99. http://dx.doi.org/10.1587/elex.4.393.
Full textTaha, Dujan, Ahmed Nori, and Yaseen Ismaiel. "Hiding in Text using Information Integrity Service." AL-Rafidain Journal of Computer Sciences and Mathematics 6, no. 1 (2009): 115–22. http://dx.doi.org/10.33899/csmj.2009.163789.
Full textV. Mandke, Vijay. "Information Integrity Adding Value to Corporate Assets." Paradigm 9, no. 1 (2005): 38–50. http://dx.doi.org/10.1177/0971890720050106.
Full textJudge, Elizabeth F., and Amir M. Korhani. "Disinformation, Digital Information Equality, and Electoral Integrity." Election Law Journal: Rules, Politics, and Policy 19, no. 2 (2020): 240–61. http://dx.doi.org/10.1089/elj.2019.0566.
Full textKawamura, Y., and Y. Sumi. "Information System for Structural Integrity of Ships." Proceedings of the Institution of Mechanical Engineers, Part M: Journal of Engineering for the Maritime Environment 219, no. 2 (2005): 93–106. http://dx.doi.org/10.1243/147509005x10422.
Full textMenezes, Alfred. "Contemporary cryptology—The science of information integrity." Designs, Codes and Cryptography 4, no. 2 (1994): 193–95. http://dx.doi.org/10.1007/bf01578872.
Full textHarn, Lein, Hung-Yu Lin, and Shoubao Yang. "A software authentication system for information integrity." Computers & Security 11, no. 8 (1992): 747–52. http://dx.doi.org/10.1016/0167-4048(92)90130-j.
Full textSchulte-Strathaus, Rolf, and Robert Bea. "SSIIS -The Ship Structural Integrity Information System." Marine Technology and SNAME News 33, no. 04 (1996): 299–308. http://dx.doi.org/10.5957/mt1.1996.33.4.299.
Full textJeong, Yoon-Su, and Sung-Ho Sim. "Hierarchical Multipath Blockchain Based IoT Information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information." Sensors 21, no. 6 (2021): 2049. http://dx.doi.org/10.3390/s21062049.
Full textSvanks, MI. "Integrity analysis." Information and Software Technology 30, no. 10 (1988): 595–605. http://dx.doi.org/10.1016/0950-5849(88)90116-4.
Full textLeonard, Elisabeth, Hollie White, and Tonia Graves. "Managing with Integrity." Serials Librarian 56, no. 1-4 (2009): 25–31. http://dx.doi.org/10.1080/03615260802662107.
Full textClarke, M., and K. J. Woolley. "ASSET KNOWLEDGE INTEGRITY MANAGEMENT (ASSET INTEGRITY MANAGEMENT FORTHETHIRD MILLENNIUM)." APPEA Journal 40, no. 1 (2000): 531. http://dx.doi.org/10.1071/aj99033.
Full textWong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Full textLiu, Liyuan, Jinman Luo, Chengfang Gao, and Shanlong Zhao. "Information Integrity Evaluation of Information System Integration Based on Bayesian Algorithm." IOP Conference Series: Materials Science and Engineering 750 (March 24, 2020): 012182. http://dx.doi.org/10.1088/1757-899x/750/1/012182.
Full textMilner, R. M. "NEGOTIATING TEXT INTEGRITY." Information, Communication & Society 13, no. 5 (2010): 722–46. http://dx.doi.org/10.1080/13691180903456538.
Full textDeng, Yuan Qing, Hui Shi, Jing Gong, and Jia Yu Li. "Integrity Protection of the Intelligent Robot's Remote Information." Advanced Materials Research 706-708 (June 2013): 836–39. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.836.
Full textSimmons, G. J., and Catherine Meadows. "The Role of Trust in Information Integrity Protocols*." Journal of Computer Security 3, no. 1 (1995): 71–84. http://dx.doi.org/10.3233/jcs-1994/1995-3106.
Full textkim sung-kon. "The Error and Integrity of Information Visualization Design." Journal of Digital Design 15, no. 1 (2015): 65–76. http://dx.doi.org/10.17280/jdd.2015.15.1.007.
Full textNayar, Madhavan K. "Information Integrity (I*I): the Next Quality Frontier." Total Quality Management & Business Excellence 15, no. 5-6 (2004): 743–51. http://dx.doi.org/10.1080/14783360410001680224.
Full textCallen, Michael, Clark C. Gibson, Danielle F. Jung, and James D. Long. "Improving Electoral Integrity with Information and Communications Technology." Journal of Experimental Political Science 3, no. 1 (2015): 4–17. http://dx.doi.org/10.1017/xps.2015.14.
Full textLemieux, Jacques R. "Integrity and the quality of information: Part 2." Computer Fraud & Security 1997, no. 4 (1997): 14–19. http://dx.doi.org/10.1016/s1361-3723(97)83560-9.
Full textLemieux, Jacques R. "Integrity and the quality of information: Part 1." Computer Fraud & Security 1997, no. 3 (1997): 15–19. http://dx.doi.org/10.1016/s1361-3723(97)83579-8.
Full textRügenhagen, Melanie, Thorsten Stephan Beck, and Emily Joan Sartorius. "Information Integrity in the Era of Fake News." Bibliothek Forschung und Praxis 44, no. 1 (2020): 34–53. http://dx.doi.org/10.1515/bfp-2020-0005.
Full text