Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Integrity

Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
Corresponds to the information that should be maintained in their original format, in agreement with the necessary for the purposes personal or organizational.
Published in Chapter:
Security of ICTs Supporting Healthcare Activities
José Manuel Gaivéo (School of Business and Administration of Polytechnic Institute of Setubal, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch011
Abstract
Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
Deals with protecting the information from not being modified by attackers which play the role of an unauthorized party.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Integrity Protection of Mobile Agent Data
Integrity regards the protection of data or program code from being modified by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
Management Education for Integrity: Raising Ethical Standards in Online Management Classes
Is defined as consistency in behavior that promotes a positive learning experience within a course.
Full Text Chapter Download: US $37.50 Add to Cart
Dimensions of Technology Trustworthiness and Technology Trust Modes
The belief that the trustee will adhere to an expected ethical or moral code.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is one of the building blocks of the information security which assures that data should not be altered, by any adversary in the network, during data transfer from source to destination.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Health Information Systems to Improve Data Security
An act of preserving a system and its data from unauthorized modification; In other terms, data that is transferred across a network should reach its recipient as it was sent.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Nurturing Integrity in Management Education with the Development of an Alternative Web of Metaphors
Refers to the way in which individuals align their actions with their values by 1) deciding an action is right or wrong, 2) carrying out that action, and 3) engaging in conversation with others about their reasons for action.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol
It includes keeping up the consistency, precision, and dependability of information over its whole life cycle.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Forensics and Cyber Attacks
Non-corruptibility feature that a message has during transferring from source to destination.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
It states that the watermark should be difficult to remove or modify without distorting the host signal.
Full Text Chapter Download: US $37.50 Add to Cart
Management Education for Developing Spiritual Integrity
“commitment in action to a morally justifiable set of principles and value.”
Full Text Chapter Download: US $37.50 Add to Cart
Leadership on Ethical Bases in the University Environment to Improve Standards in Higher Education
Ensuring value landmarks and promoting ethics in education, but also in life after graduation.
Full Text Chapter Download: US $37.50 Add to Cart
Importance of Ethics and Education to Understand the Audit Mission
The quality of being honest and having strong moral principles; the state of being whole and undivided.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Mobile Code
Integrity exists when the agent platform protects agents from unauthorized modification of their code, state, and data and ensure that only authorized agents or processes carry out any modification of the shared data
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Cloud Computing
A property by which the data enclosed in a message being transmitted remains intact in its form after being received. Thus, the data arrives in the same form as it was during sending.
Full Text Chapter Download: US $37.50 Add to Cart
Liability or Ethics?: The Real Value of Compliance
A culture of business conduct led by high ethical principles rather than formal obligations.
Full Text Chapter Download: US $37.50 Add to Cart
PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
is the absence of improper system state alterations. It implies that data is modified only by authorized users and only in an authorized manner.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
Full Text Chapter Download: US $37.50 Add to Cart
Secure Data Deduplication of Encrypted Data in Cloud
Protecting the information from being modified by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
Disruptive Technology Impacts on Security
The assurance that information is untainted. This strictly means that the information put into the computer is the same as the information that comes back later. Integrity is often also used to mean data is accurate.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Importance of Electronic Record Preservation in E-Business
Referring to the fact that a record is complete and unaltered.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy on Personalized Multi-Agent System
Guarding against improper information modification or destruction, and includes ensuring information has not been altered by unauthorized or unknown means.
Full Text Chapter Download: US $37.50 Add to Cart
Perceptions of Doctoral-Affiliated Professionals: Articulated Reflections of Queen Bee Syndrome Experiences
The belief that there is a moral code of action, as reflected by a person. What a person says is what a person does, the intent to speak the truth and act in an honorable way towards others, with a basic belief that acting in a moral and ethical manner in all things is a reflection of one’s respect for self as well as respect for others.
Full Text Chapter Download: US $37.50 Add to Cart
Spyware
This refers to the use of an internal set of principles used for guiding actions.
Published in Chapter: Spyware; From: Handbook of Research on Technoethics
Full Text Chapter Download: US $37.50 Add to Cart
Cyberaccounting for the Leaders of the Future
The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Role of Trust in Ecommerce: A Comprehensive Model of Interpersonal and Technology Trust Constructs
Full Text Chapter Download: US $37.50 Add to Cart
The Problem with People and Information Security
Corresponds to the information that should be maintained in their original format, in agreement with the necessary for the purposes personal or organizational.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Management and Information Technology Security Services
Provides assurance that the business messages and transactions are complete, accurate, and unaltered.
Full Text Chapter Download: US $37.50 Add to Cart
Core Thinkers of Intellectual Emancipation: Integrity Before Education
Maintaining honesty, moral ideals, and ethical conduct in educational procedures. Integrity in education encompasses upholding academic honesty, valuing multiple opinions, and fostering a climate of trust and justice within the educational setting.
Full Text Chapter Download: US $37.50 Add to Cart
Debating About, Against, and With ChatGPT: Redesigning Academic Debate Pedagogy for the World of Generative Artificial Intelligence
In this essay, a term used to describe the maintenance of the norms, conventions, and ethics of academic life that give it meaning and purpose.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Building on Trust in a Complex World: Educational Research and Technology
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
Ensuring that data remains accurate and unchanged by unauthorized people/parties during transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Teletranslation
Protection against unauthorized modification or destruction of information.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Mindful Leadership in Diverse Workplaces
The skill is often seen as just truthfulness or honesty. However, it also means having—and standing by—a set of strong values. It is behaving honorably, even when no one is watching. Integrity in the workplace often means making ethical choices and helping the company maintain a positive image. All businesses seek to hire workers who have a strong sense of integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Benchmarking: A Method to Improve the Entity's Performance and Change Process
The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Quality of an IS reflecting the logical correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Note that, in a formal security mode, integrity is interpreted more narrowly to mean protection against unauthorized modification or destruction of information.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
The ability to assure that data have not been modified accidentally or by any unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security Using Face Recognition
Integrity can be associated with data, software and hardware. Integrity refers to demonstrate the data in same initial form as it was earlier before any authorized modification has done thus by avoiding any imposter or unauthorized modification.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Transformational Leadership for Effective Corporate Governance in Public Sector Enterprises: A Malaysian Experience
Use of powers and resources entrusted to the public sector enterprises effectively and honestly, safeguarding the public interest. Leaders with integrity exercise their tasks adequately, carefully, and responsibly.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Methods behind Cyber Terrorism
Quality of an IS reflecting the logical correctness and reliability of the OS; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Note that, in a formal security mode, integrity is interpreted more narrowly to mean protection against unauthorized modification or destruction of information (Harris, 2002 AU32: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study in the Role of Trust in Web Service Securities
Refers to transaction accuracy and assurance that Web services transactions have not been altered or deleted.
Full Text Chapter Download: US $37.50 Add to Cart
Honest Communication in Online Learning
Implies that an individual is incorruptible and will be completely honest.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Facilitated Virtual Marketplace for Airline Ticketing
Is regarding the protection of data or program code from being modified by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
It is the quality of a document or file that has not been altered. That also makes it possible to verify that there has been no manipulation in the original document.
Full Text Chapter Download: US $37.50 Add to Cart
Integrity as a Core Value in Organizations
Is moral consistency that reflects the attempt to do what is right for the organization and for the public good.
Full Text Chapter Download: US $37.50 Add to Cart
Securing Over-the-Air Code Updates in Wireless Sensor Networks
Integrity of a WSN means that neither information nor functionality can be altered by unauthorized persons, and if they are altered, it can be detected.
Full Text Chapter Download: US $37.50 Add to Cart
Academic Integrity of Global Digital Masked Bandits Lurking the Deep and Dark Web
Being whole and having a consistent set of ethical, moral, and legal practices.
Full Text Chapter Download: US $37.50 Add to Cart
Networking and Corruption
The quality of being honest and firm in your moral principles and in what you do.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Swarm Robotics
The assurance that the data has not been altered, either maliciously or accidentally, in an unauthorised way.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study on DNA-Based Cryptosystem
Integrity is to assure that the data is reliable, accurate and it remains in its original form from being modified by unintended users.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Inconsistency-Tolerant Integrity Checking
In databases, integrity stands for semantic consistency, that is, the correctness of stored data with regard to their intended meaning, as expressed by integrity constraints. Integrity should not be confused with a namesake issue often associated with data security.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Threats in Public and Private Organizations: Evidence From Romania
The prohibition amendment—by deleting or adding—or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Road Map to Information Security Management
Data integrity ensures that the transaction is unchanged from its source and has not been accidentally or maliciously altered.
Full Text Chapter Download: US $37.50 Add to Cart
A Consciousness-Based Approach to Management Education for Integrity
“Honestly matching words and feelings with thoughts and actions, with no desire other than the good of others, without malice or desire to deceive, take advantage, manipulate or control” (Covey, 1991, p. 108).
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Diversities in the Use of the Profit and Loss Statement
The prohibition amendment, by deleting or adding, or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is the property by which we can validate that the information contained in any document has altered or not.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues Related to Cloud Applications in STEM Education
Integrity involves data, software, and hardware. It refers to protecting data, software, and hardware from unauthorized deletion, modification, theft, or fabrication.
Full Text Chapter Download: US $37.50 Add to Cart
Innovative Methods of Teaching Integrity and Ethics in Management Education
The quality of being honest and having strong moral principles that you refuse to change, the quality of being whole and complete
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Insuring that information that is stored or transmitted is not maliciously changed. Protection mechanisms for data while stored or transmitted are important to protect the original meaning of information. Integrity suggests control of information while stored or transmitted internally as a security service.
Full Text Chapter Download: US $37.50 Add to Cart
Tax Advice: An Essential Element in the Success of an E-Business
The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Evaluation of Security Architectures for Mobile Broadband Access
A security service which verifies that stored or transferred information has remained unchanged.
Full Text Chapter Download: US $37.50 Add to Cart
Building a Culture of Integrity
Adherence to a code of standards or values; having qualities of honesty and consistency.
Full Text Chapter Download: US $37.50 Add to Cart
Survivability Evaluation Modeling Techniques and Measures
A fraction of time that all accessible data items in the database are clean.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing and Mobility in Future IP Networks
A security service, which verifies that stored or transferred information has remained unchanged.
Full Text Chapter Download: US $37.50 Add to Cart
Database Integrity Checking
Semantic consistency, that is, the correctness of stored data with regard to their intended meaning, as expressed by integrity constraints. Not to be confused with namesake issues related to data security, serializability of concurrent transactions or sound failure recovery.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing Security Issues of Sensitive Data
State of maintaining the accuracy, trustworthy of data on the other hand protecting data being modified change by unauthorized people.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Risks in Romanian Companies
The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Security Measures for Mobile Ad-Hoc Networks (MANETs)
This is another basic security requirement. Integrity guarantees the correctness of the data transferring between two communicating parties, or their location information.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Security Issues in VANETS for E-Business
Ensures that only authorized parties modify system assets and transmitted information. Modification includes writing, changing, changing status, deleting, creating, and the delaying or replaying of transmitted messages.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Risk Management
The protection of information against unauthorized modification and masquerade.
Full Text Chapter Download: US $37.50 Add to Cart
A Virtual Community for Mobile Agents
Regarding the protection of data or program code from being modified by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
The Informational Value of the Profit and Loss Account in Line With International Accounting Standards
The prohibition amendment—by deleting or adding—or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology for Records Management in Botswana and Zimbabwe
A document has integrity when nothing therein has been altered, added or deleted; it represents exactly what was created by its author. Integrity means that records are complete and authentic.
Full Text Chapter Download: US $37.50 Add to Cart
E-Commerce: The Benefits, Security Risks, and Countermeasures
One of the primary security properties that protects information from unauthorized modification.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Within an E-Learning Environment
Ensures that information is still in its original form and that no tampering or alteration has taken place.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
External Auditors Discover Management Breach of Trust: Evidence From Mexico
Encompasses the principles to enhance the quality of being honest, establishing a moral and acceptable pattern of behavior, being eager to defend and refusing to be negatively influenced. Professionals must be strong enough to keep moral values from any bad influence in life.
Full Text Chapter Download: US $37.50 Add to Cart
Proactive Information Security Strategy for a Secure Business Environment
The prohibition amendment—by deleting or adding—or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.
Full Text Chapter Download: US $37.50 Add to Cart
Defining Integrity for Individuals and Organizations: A Cognitive-Linguistic Modeling Approach
The active process of linking moral reasoning, judgment, and action in a consistent way across cases, reflecting its root meaning, wholeness.
Full Text Chapter Download: US $37.50 Add to Cart
Perspectives of Blockchain in Cybersecurity: Applications and Future Developments
A principle of cybersecurity which dictates that data should be insured to be both accurate and untampered with, from any unauthorized entities.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity of Industrial Internet of Things
A set of principles and metrics that assures the sensitive data is trustworthy and accurate.
Full Text Chapter Download: US $37.50 Add to Cart
Institutionalizing Academic Integrity: The Present Need
Quality of being honest and having strong moral principles; ethical sense of right and wrong.
Full Text Chapter Download: US $37.50 Add to Cart
Professional Integrity for Educational Quality in Management Sciences
Integrity means the totality of a person, including the physical dimension, that is, the body. As a human value, integrity is a personal choice and a commitment to consistency with honoring ethics, values and principles. The moral dimension, including the way of being and the values. In general, the concept applies to human rights, but also to the values that a person may have. In ethics, integrity considers the veracity and transparency of personal actions, therefore, is opposed to falsehood or deception.
Full Text Chapter Download: US $37.50 Add to Cart
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Quality of an IS reflecting the logical correctness and reliability of the OS; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Note that, in a formal security mode, integrity is interpreted more narrowly to mean protection against unauthorized modification or destruction of information (Harris, 2002 AU15: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR