Proceedings ArticleDOI
Assuring system data integrity-an overview
J.K. Akeson
- pp 217-221
TLDR
The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure.Abstract:
The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure. He starts out with a description of some techniques for detecting compromised data integrity resulting from both fraudulent (intended) and nonfraudulent (unintended) data corruption. Emphasis is placed on three general approaches: (1) building in system quality for preventing certain of these problems, (2) placing routines into data systems for detecting problems that cannot be prevented, and (3) designing functionality into these systems for recovering from compromised integrity. The author examines how selected system features and functionality are designed to help ensure data integrity. The role of the system in assuring data integrity is examined. >read more
Citations
More filters
Journal ArticleDOI
Public network integrity/spl mdash/avoiding a crisis in trust
TL;DR: The paper offers a set of recommendations based on new network integrity measures and design objectives to prevent the recurrence of such failures and thereby avoid a possible crisis in the public's trust of the authors' stewardship.
Proceedings ArticleDOI
Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis
TL;DR: This paper presents the leveraging missing values method, using the Naive Bayes approach posterior to rule-based classifier to analyze the probability of corrupted and missing values in CDR which then consequently led to the discovery of useable record lies in rejected CDR.
Proceedings ArticleDOI
The Utilization of Blockchain Technology on Remote Audit to Ensure Audit Data Integrity in Detecting Potential Fraudulent Financial Reporting
TL;DR: In this article , the authors identify and navigate how blockchain assists auditors in performing remote audits, ensuring data integrity, detecting fraudulent financial reporting, elaborating on factors that influence the auditor's success in using blockchain, and identifying challenges auditors face during blockchain utilization in their remote audits.
References
More filters
Book
Introduction to the Theory of Error-Correcting Codes
TL;DR: In this paper, a double-error-correcting BCH Code and a Finite Field of 16 Elements (FF16E) were proposed to correct the double error of the BCH code.
Journal ArticleDOI
Introduction to the theory of error-correcting codes, 3rd edition, by Vera Pless. Pp. 207. £38.95. 1998. ISBN 0 471 19047 0 (Wiley).
TL;DR: A Double--Error--Correcting BCH Code and a Finite Field of 16 Elements and a Group of a Code and Quadratic Residue (QR) Codes.
Journal ArticleDOI
Data base systems
R. Ashany,Michael Adamowicz +1 more
TL;DR: Beginning with early data base concepts, this paper cites a selection of key references on hierarchical, network, and relational data bases.