Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Data Tampering

Modern Theories and Practices for Cyber Ethics and Security Compliance
The act of using authorized means to deliberately manipulate or modify data.
Published in Chapter:
Security and Ethical Concerns of Affective Algorithmic Music Composition in Smart Spaces
Abigail Wiafe (University of Eastern Finland, Finland) and Pasi Fränti (University of Eastern Finland, Finland)
DOI: 10.4018/978-1-7998-3149-5.ch012
Affective algorithmic composition systems are emotionally intelligent automatic music generation systems that explore the current emotions or mood of a listener and compose an affective music to alter the person's mood to a predetermined one. The fusion of affective algorithmic composition systems and smart spaces have been identified to be beneficial. For instance, studies have shown that they can be used for therapeutic purposes. Amidst these benefits, research on its related security and ethical issues is lacking. This chapter therefore seeks to provoke discussion on security and ethical implications of using affective algorithmic compositions systems in smart spaces. It presents issues such as impersonation, eavesdropping, data tempering, malicious codes, and denial-of-service attacks associated with affective algorithmic composition systems. It also discusses some ethical implications relating to intensions, harm, and possible conflicts that users of such systems may experience.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Blockchain Technology in Securitization in India
Data tampering is the act of deliberately modifying (destroying, manipulating, or editing) data through unauthorized channels.
Full Text Chapter Download: US $37.50 Add to Cart
Status and Future Trends of Multimedia Interactivity on the Web
The threats of data being altered in authorized ways, either accidentally or intentionally.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Fog Computing
It is an act of modifying data by illegitimate channels.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR