scispace - formally typeset
Proceedings ArticleDOI

Assuring system data integrity-an overview

J.K. Akeson
- pp 217-221
TLDR
The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure.
Abstract
The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure. He starts out with a description of some techniques for detecting compromised data integrity resulting from both fraudulent (intended) and nonfraudulent (unintended) data corruption. Emphasis is placed on three general approaches: (1) building in system quality for preventing certain of these problems, (2) placing routines into data systems for detecting problems that cannot be prevented, and (3) designing functionality into these systems for recovering from compromised integrity. The author examines how selected system features and functionality are designed to help ensure data integrity. The role of the system in assuring data integrity is examined. >

read more

Citations
More filters
Journal ArticleDOI

Public network integrity/spl mdash/avoiding a crisis in trust

TL;DR: The paper offers a set of recommendations based on new network integrity measures and design objectives to prevent the recurrence of such failures and thereby avoid a possible crisis in the public's trust of the authors' stewardship.
Proceedings ArticleDOI

Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis

TL;DR: This paper presents the leveraging missing values method, using the Naive Bayes approach posterior to rule-based classifier to analyze the probability of corrupted and missing values in CDR which then consequently led to the discovery of useable record lies in rejected CDR.
Proceedings ArticleDOI

The Utilization of Blockchain Technology on Remote Audit to Ensure Audit Data Integrity in Detecting Potential Fraudulent Financial Reporting

TL;DR: In this article , the authors identify and navigate how blockchain assists auditors in performing remote audits, ensuring data integrity, detecting fraudulent financial reporting, elaborating on factors that influence the auditor's success in using blockchain, and identifying challenges auditors face during blockchain utilization in their remote audits.
References
More filters
Book

Introduction to the Theory of Error-Correcting Codes

Vera Pless
TL;DR: In this paper, a double-error-correcting BCH Code and a Finite Field of 16 Elements (FF16E) were proposed to correct the double error of the BCH code.
Journal ArticleDOI

Introduction to the theory of error-correcting codes, 3rd edition, by Vera Pless. Pp. 207. £38.95. 1998. ISBN 0 471 19047 0 (Wiley).

TL;DR: A Double--Error--Correcting BCH Code and a Finite Field of 16 Elements and a Group of a Code and Quadratic Residue (QR) Codes.
Journal ArticleDOI

Data base systems

TL;DR: Beginning with early data base concepts, this paper cites a selection of key references on hierarchical, network, and relational data bases.