3,060
Views
22
CrossRef citations to date
0
Altmetric
Articles

Privacy and security in the big data paradigm

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Arun Amaithi Rajan & Vetriselvi V. (2023) Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud. Journal of Computer Information Systems 0:0, pages 1-21.
Read now
Janine L. Spears & Ali Padyab. (2023) Privacy risk in contact tracing systems. Behaviour & Information Technology 42:2, pages 174-195.
Read now
Brian Cusack & Eghbal Ghazizadeh. (2021) Formulating Knowledge-Based Cloud Identity Selection. Journal of Computer Information Systems 61:3, pages 207-218.
Read now
Aaron Zimba, Zhaoshun Wang, Mwenge Mulenga & Nickson Herbert Odongo. (2020) Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security. Journal of Computer Information Systems 60:4, pages 297-308.
Read now
Angela M. Lee & Ori Tenenboim. (2020) How did Americans Really Think About the Apple/FBI Dispute? A Mixed-method Study. Journalism Practice 14:4, pages 483-498.
Read now

Articles from other publishers (16)

Kumar Rahul, Rohitash Kumar Banyal & Neeraj Arora. (2023) A systematic review on big data applications and scope for industrial processing and healthcare sectors. Journal of Big Data 10:1.
Crossref
Kenneth David Strang. 2023. Handbook of Research on Driving Socioeconomic Development With Big Data. Handbook of Research on Driving Socioeconomic Development With Big Data 22 43 .
Kenneth David Strang. 2022. Health Informatics and Patient Safety in Times of Crisis. Health Informatics and Patient Safety in Times of Crisis 23 44 .
Kenneth David Strang. (2022) Resistance, diseconomies, and abnormal AI behavior in HRM: a real-time big data action research experiment at a pharmaceutical. Human-Intelligent Systems Integration 4:3-4, pages 35-52.
Crossref
Rémi Gosselin, Loïc Vieu, Faiza Loukil & Alexandre Benoit. (2022) Privacy and Security in Federated Learning: A Survey. Applied Sciences 12:19, pages 9901.
Crossref
Xiangjun Li, Xuewen Zhao, Huijuan Zhang & Jideng Han. (2022) Grid Adaptive Bucketing Algorithm Based on Differential Privacy. Mobile Information Systems 2022, pages 1-16.
Crossref
Ziye Tang. (2022) Big Data Analysis and Modeling of Higher Education Reform Based on Cloud Computing Technology. Security and Communication Networks 2022, pages 1-11.
Crossref
Yoosang Park, Jonghyeok Mun, Jongsun Choi, Jaeyoung Choi & Hoda Kim. (2020) A method to generate context information sets from analysis results with a unified abstraction model based on an extension of data enrichment scheme. Concurrency and Computation: Practice and Experience 33:19.
Crossref
Madhu Sharma Gaur, Sanjeev Kumar, Navneet K Gaur & Prem Sagar Sharma. (2021) Persuasive Factors and Weakness for Security Vulnerabilities in BIG IOT Data in Healthcare Solution. Journal of Physics: Conference Series 2007:1, pages 012046.
Crossref
Raphaël Maucuer, Alexandre Renaud, Yuliya Snihur & Neva Bojovic. (2021) Business Models in the Information Systems Literature: State of the Art and Research Perspectives. Systèmes d'information & management Volume 25:4, pages 5-28.
Crossref
Selvakumar Samuel, Kesava Pillai Rajadorai & Vazeerudeen Abdul Hameed. 2021. Privacy and Security Issues in Big Data. Privacy and Security Issues in Big Data 17 32 .
Inda Kreso, Amra Kapo & Lejla Turulja. (2020) Data mining privacy preserving: Research agenda. WIREs Data Mining and Knowledge Discovery 11:1.
Crossref
Teng Wang, Xuefeng Zhang, Jingyu Feng & Xinyu Yang. (2020) A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis. Sensors 20:24, pages 7030.
Crossref
Kenneth David Strang. (2019) Problems with research methods in medical device big data analytics. International Journal of Data Science and Analytics 9:2, pages 229-240.
Crossref
Florian Lemke, Kuldar Taveter, Regina Erlenheim, Ingrid Pappel, Dirk Draheim & Marijn Janssen. 2020. Electronic Governance and Open Society: Challenges in Eurasia. Electronic Governance and Open Society: Challenges in Eurasia 152 164 .
Tianlong Gu, Hanyi Chen, Liang Chang & Long Li. (2019) Intrusion detection system based on improved abc algorithm with tabu search. IEEJ Transactions on Electrical and Electronic Engineering 14:11, pages 1652-1660.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.