1. University Courseware: Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308. In Section I.A.1, "Design Principles," the paper, a foundational text often cited in university security courses (e.g., MIT), implicitly addresses integrity by discussing mechanisms to prevent unauthorized modification of data, which is the root of the inconsistency described. (DOI: https://doi.org/10.1109/PROC.1975.9939)
2. Academic Publication: Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in Computing (3rd ed.). Prentice Hall. In Chapter 1, Section 1.2, "The Meaning of Computer Security," integrity is defined as ensuring data is not modified improperly. The scenario's price change is a form of improper data modification, whether accidental or malicious.
3. Official Vendor/Government Documentation: National Institute of Standards and Technology (NIST). (2021). Special Publication 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. In Appendix F, "Security Control Baselines," the Integrity (SI) control family is dedicated to protecting the integrity of information and systems. The scenario directly relates to control SI-7, "Software, Firmware, and Information Integrity," which aims to detect unauthorized changes to information. (DOI: https://doi.org/10.6028/NIST.SP.800-53r5)