Preface

**Section 5**

*by Adithya B. and Santhi G.*

*by Heru Susanto*

**II**

Applications **93**

**Chapter 6 95**

**Chapter 7 115**

DNA Computing Using Cryptographic and Steganographic Strategies

Revealing Cyber Threat of Smart Mobile Devices within Digital

Ecosystem: User Information Security Awareness

Data is one of the essential resources for an organization to perform well. We are living in an era that is highly data-driven. From decision-making processes to enhancing customer experiences, data is involved in almost all business activities. Out of all the Petabytes and Exabytes of data, it is the responsibility of organizations to get the most benefit out of all the volumes of data residing in humungous databases. This is where data integrity and quality are of utmost importance. Ensuring the integrity and quality of data enriches the insights of the business operations performed. However, confidentiality and safety have been a source of public concern. Quick modifications in technologies such as the Internet and electronic trade along with the implementation of more cultured schemes for gathering, assessing, and making use of private data have made confidentiality a key dispute among the public and government. The domain of data integrity is thus attracting much attention.

To easily differentiate the two terms, one can ask themselves the following questions. Data integrity answers the questions such as: When was the data created? What is its lifetime? Are the entries consistent? Data quality answers questions such as: Is the data relevant? Is the data complete? Is it unique? This quest will help one identify the key differences between the two techniques to be employed to churn the useful information from the large volumes of data.

Section 1 introduces and explains the concepts of data integrity and data quality. Section 2 includes two chapters: "Data Integrity Management for Laboratory of the Control of Lifecycle of Domestic Russian Tour Products" and "Analysis and Curation of the Database of a Colo-Rectal Cancer Screening Program." Section 3 includes one chapter on "Big Data Integration Solutions in Organizations: A Domain-Specific Analysis." Section 4 includes one chapter on "Quality of Information within Internet of Things Data." The final section includes two chapters: "DNA Computing Using Cryptographic and Steganographic Strategies" and "Revealing Cyber Threat of Smart Mobile Devices within Digital Ecosystem: User Information Security Awareness."

In writing this book, I have been fortunate to be assisted by technical experts in many of the subdisciplines that make up the field of data integrity and quality. First and foremost, praises and thanks to God, the almighty, for his showers of blessings throughout my efforts to complete this work. I would like to express my sincere gratitude to the management at Guru Nanak Institute of Technology for providing me with all sorts of support while I completed this book. I am indebted to the principal, vice-principal, and head of the Department of Computer Science & Engineering for their guidance and encouragement. I am also grateful to my colleagues at the GMR Institute of Technology.

I am extremely grateful to my parents for their love, prayers, and sacrifices and for educating and preparing me for my future. I am very much thankful to my wife J. Nandhini, my son B. S. Haarish Athithiya, and my daughter B.S Josita Varshini for their love, understanding, prayers, and continual support as I worked on this book. I also give special thanks to my friends who inspire me, and finally, I wish

to acknowledge the staff at IntechOpen, especially Author Service Manager Maja Bozicevic, without their continuous support and valuable suggestions we would not be able to finish this book project.

> **Dr. Santhosh Kumar Balan** Professor, Department of Computer Science and Engineering, Guru Nanak Institute of Technology, Hyderabad, Telangana, India

> > **1**

Section 1

Introduction

Section 1 Introduction

**3**

the results [1].

**Chapter 1**

Introductory Chapter: Data

The significance of data could be employed to escalate the income incision expenses or both. The data integrity related software is one of the numbers of an assessment tool for evaluating the information. It permits the users to assess the confidentiality of the information is rising regularly. Due to these diverse analyses are performed on confidentiality safeguarded data integrity the design of fresh scheme permits the mining data while attempting to safeguard the confidentiality of the users. Many of these schemes are intended for user's confidentiality but still, others are intended on the confidentiality of the organization. It is broadly termed as data exploration in repositories which is the significant mining of hidden, conventionally indefinite and probably needful data from the information in the repositories. The data exploration is required to make logic and usage of information. Even though the data exploration in repositories are regularly regarded as replacements, and it is crucially a segment of the data exploration process. Normally the data integrity, for instance, the information or the data exploration is the process of assessing information from diverse viewpoints and abstracting them into needful data from diverse angles, classification and abstraction of recognized

Precisely it is the process of locating synchronization or prototypes among dozens of domains in immense relational repositories. Though, it is relatively fresh domain the technology still remains the same. The organizations are making use of potent computers for straining through immense of supermarket scanner information and assess market trends over years. Therefore, the constant improvements in processing the computational power, disk storages and arithmetic software are significantly escalating the precision of the assessment while governing the expenses. The data integrity of fresh and potential prototypes in immense information sets is a domain in the ignition. The major feature is to enhance the safety for instance identification of interferences. The subsequent feature is the possible safety risks imposed on the opponent has its abilities. The confidentiality related risks have gained the care of multimedia, legislators, government firms, trade and confidential promoters. The data integration edges resume to develop, there are diverse prevailing issues examined. The assembly might choose to contemplate in relation to the planning and inaccuracy. These problems comprise but are not restricted to the quality of the information, interoperability and stealing of assignment and confidentiality. Along with the added features, the technologybased abilities are crucial where other features might also govern the victory of

Integrity and Quality

*Santhosh Kumar Balan*

**1. Introduction**

association.
