Article

Building a Culture of Data Integrity in Your Organization

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Establishing a culture of data integrity within an organization is paramount in today's data-driven world. This paper explores the importance of cultivating such a culture, emphasizing its role in fostering trust, compliance, and data-driven decision-making. It delves into the challenges organizations face in maintaining data integrity and provides practical strategies for building and sustaining this culture. By drawing insights from case studies and industry best practices, this research offers a roadmap for organizations to embrace data integrity as a core value, ensuring that data is accurate, reliable, and a foundation for strategic success.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in which implantable medical devices (IMDs) and body area networks (BANs) have made it possible to continuously and automatically manage and treat a number of health conditions. In this work, we survey publications aimed at improving security and privacy in IMDs and health-related BANs, providing clear definitions and a comprehensive overview of the problem space. We analyze common themes, categorize relevant results, and identify trends and directions for future research. We present a visual illustration of this analysis that shows the progression of IMD/BAN research and highlights emerging threats. We identify three broad research categories aimed at ensuring the security and privacy of the telemetry interface, software, and sensor interface layers and discuss challenges researchers face with respect to ensuring reproducibility of results. We find that while the security of the telemetry interface has received much attention in academia, the threat of software exploitation and the sensor interface layer deserve further attention. In addition, we observe that while the use of physiological values as a source of entropy for cryptographic keys holds some promise, a more rigorous assessment of the security and practicality of these schemes is required.
The Synergy between Business Process and Big Data
  • S Duggineni
Duggineni, S. (2023). The Synergy between Business Process and Big Data. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-133. DOI: doi. org/10.47363/JAICC/2023 (2), 125, 2-7.
Information Cartography: Using GIS for visualizing non-spatial data
  • L J Old
Old, L. J. (2002, July). Information Cartography: Using GIS for visualizing non-spatial data. In Proceedings, ESRI International Users' Conference, San Diego, CA.
Data Analytics in Modern Business Intelligence
  • S Duggineni
Duggineni, S. (2023). Data Analytics in Modern Business Intelligence. Journal of Marketing & Supply Chain Management. SRC/JMSCM-123. DOI: doi. org/10.47363/JMSCM/2023 (2), 114, 2-4.
Application of Spatial Metaphors in Cartography to Visualization of Documentary Information: Information Cartography
  • L J Old
Old, L. J. (2002). Application of Spatial Metaphors in Cartography to Visualization of Documentary Information: Information Cartography. PhD Qualifying Exam, Indiana University, Indiana.
Monitoring Framework for Clinical ETL processes and associated performance resources
  • M A M Da Costa Santos
da Costa Santos, M. A. M. (2020). Monitoring Framework for Clinical ETL processes and associated performance resources.
Enhancing Data Integrity through Data Governance in Clinical Trials: A Computational Approach
  • H Daniel
Daniel, H. (2023). Enhancing Data Integrity through Data Governance in Clinical Trials: A Computational Approach. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 7(3), 31-56.