Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?