References
- Strang K, Sun Z. Big Data Paradigm: what is the Status of Privacy and Security?. Ann Data Sci (Springer). 2017;4(1):1–17. doi:10.1007/s40745-016-0096-6.
- Sun Z, Sun L, Strang K. Big data analytics services for enhancing usiness Intelligence. J Comput Inf Syst. 2016;1–8. doi:10.1080/08874417.2016.1220239,.
- Hubaux J-P, Juels A. Privacy is dead, long live privacy. Communications of the ACM. 2016;59(6):39–41.
- Goldfield NI. Big data—hype and promise. J Ambul Care Manage. 2014;37(3):195–96.
- Kambatla K, Kollias G, Kumar V, Grama A. Trends in big data analytics. J Parallel Distrib Comput. 2014;74(7):2561–73. doi:10.1016/j.jpdc.2014.01.003.
- Kim GH, Trimi S, Chung JH. Big data applications in the public sector. Commun ACM. 2014;57(3):78–85. doi:10.1145/2500873.
- Pence HE. What is big data and why is it important?. J Educ Technol Syst. 2015;43(2):159–71. doi:10.2190/ET.2143.2192.d].
- Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. J Big DataOpen Access. 2016;3(1):pp. doi:10.1186/s40537-016-0059-y,.
- Bohannon J. Credit card study blows holes in anonymity. Science. 2015;347(6221):468. doi:10.1126/science.347.6221.468.
- Eastin MS, Brinson NH, Doorey A, Wilcox G. Living in a big data world: predicting mobile commerce activity through privacy concerns. Comput Human Behav. 2016;58:214–20. doi:10.1016/j.chb.2015.12.050.
- Ekbia H. Big data, bigger dilemmas: A critical review. J Assoc Inf Sci Technol. 2015;66(8):et al. doi:10.1002/asi.23294.
- Gharabaghi K, Anderson-Nathe B. Big Data for Child and Youth Services?. Child Youth Serv. 2014;2014(7):193–95. doi:10.1080/0145935X.2014.955382.
- Kshetri N. Big data’s impact on privacy, security and consumer welfare. Telecomm Policy. 2014;38(11):1134–45. doi:10.1016/j.telpol.2014.10.002.
- Lichtblau E, Weilandaug N, “Hacker Releases More Democratic Party Files, Renewing Fears of Russian Meddling,” New York Times, pp. A12-A14, 2016, August 12.
- BBC. Massive ransomware infection hits computers in 99 countries. 2017 13 5 . [Online]. Available: http://www.bbc.com/news/technology-39901382. [Accessed 17 9 2017].
- Fu K, Kohno T, Lopresti D. Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. 2017. [Online]. Available: http://cra.org/ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT.pdf. [Accessed 15 4 2017].
- B. L. Filkins, J. Y. Kim and B. Roberts. Privacy and security in the era of digital health: what should translational researchers know and do about it?. Am J Transl Res. 2016;8(3):1560–80
- Hoffman S, Podgurski A. Big Bad Data: law, Public Health, and Biomedical Databases. J Law, Med Ethics. 2013;41:56–60. doi:10.1111/jlme.12040.
- Thorpe JH, Gray EA. Law and the Public’s Health. BIG DATA AND PUBLIC HEALTH: NAVIGATING PRIVACY LAWS TO MAXIMIZE POTENTIAL. Public Health Rep. 2015;130(2):171–75. doi:10.1177/003335491513000211.
- Booch G. The Human and Ethical Aspects of Big Data. IEEE Software. 2014;31(1):20–22. doi:10.1109/MS.2014.16.
- Leszczynski A. Spatial big data and anxieties of control. Environ Planning: Soc Space. 2015;33(6):965–84.
- ACM. the 2012 ACM Computing Classification System. 2012. [Online]. Available: https://www.acm.org/publications/class-2012. [Accessed 18 9 2017].
- Sun Z, Finnie G. Intelligent Techniques in E-Commerce: A Case-based Reasoning Perspective. Vol. 2004. Heidelberg Berlin: Springer-Verlag;2010.
- Laudon KG, Laudon KC. Management Information Systems: Managing the Digital Firm. 14th. Harlow, England: Pearson; 2016.
- Rothstein MA. Ethical Issues in Big Data Health Research: currents in Contemporary Bioethics. J Law, Med Ethics. 2015;43(2):425–29. doi:10.1111/jlme.12258.
- Soumitra SB, Kim H, Oluwaseyi OI. Privacy and security issues in mobile health: current research and future directions. Health Policy Technol. 2017. doi:10.1016/j.hlpt.2017.01.004,.
- Solove DJ. Introduction: privacy self-management and the consent dilemma. Harv Law Rev. 2013;126(7):1880–903.
- Henke N, Bughin J, “McKinsey Global Institute,” December 2016. [Online].
- Sun Z, Strang K, Firmin S. Business Analytics-Based Enterprise Information Systems. J Comput Inf Syst. 2017;57(2):169–78. doi:10.1080/08874417.2016.1183977,.
- Mayer-Schoenberger V, Cukier K. Big Data: A Revolution that Will Transform How We Live, Work, and Think. Boston, MA: Houghton Mifflin Harcourt Publishing Company;2013.
- McAfee A, Brynjolfsson E. Big data: the management revolution. Harv Bus Rev. 2012;61–68.
- Minelli M, Chambers M, Dhiraj A, Data B. Big Analytics: Emerging Business Intelligenceand Analytic Trends for Today’s Businesses. (Chinese Edition 2014). New York, NY: Elsevier; 2013.
- Wang H, Jiang X, Kambourakis G. Special issue on Security, Privacy and Trust in network-based Big Data. Inf Sci (Ny). 2015;318:48–50. doi:10.1016/j.ins.2015.05.040.
- Ou L, Qin Z, Yin H, Li K. Security and Privacy in Big Data (Chapter 12). Procedia Computer Science, Elsevier; 2016. pp. 285–308.
- Salleh KA, Janczewski L. Technical, organizational and environmental security and privacy issues of big data: A literature review. Procedia Comput Sci. 2016;100:19–28. doi:10.1016/j.procs.2016.09.119.
- IBM. The Four V’s of Big Data. 2015. [Online]. Available: http://www.ibmbigdatahub.com/infographic/four-vs-bigdata.
- Sun Z, Wang PP. A Mathematical Foundation of Big Data. J New Math Nat Comput. 2017;13(2):8–24.
- VajjhalaN, Strang K, Sun Z.. Statistical modeling and visualizing open big data using a terrorism case study. Proceedings of the International Conference on Open and Big Data (OBD 2015); 2015 Aug 24- 26; Rome, Italy: IEEE Press.
- Davis A. Using Technology to Protect Intimate Images and Help Build a Safe Community. 2017. [Online]. Available: https://newsroom.fb.com/news/2017/04/using-technology-to-protect-intimate-images-and-help-build-a-safe-community/. [Accessed 8 4 2017].
- Sun Z, Wang P, Strang K. A mathematical theory of big data. IEEE Transactions on Knowledge and Data Engineering; 2017, IEEE Computer Society, p. Under Review. 2017.
- Kumar B. An encyclopedic overview of ‘big data’ analytics. Int J Appl Eng Res. 2015;10(3):5681–705.
- Wikipedia. Cybercrime. 5 9 2017. [Online]. Available: https://en.wikipedia.org/wiki/Cybercrime. [Accessed 15 9 2017].
- Sathi A. Big data analytics: Disruptive technologies for changing the game. Boise, ID, USA: MC Press: IBM Corporation;2013.
- Chen H, Chiang R, Storey V. Business intelligence and analytics: from big data to big imppact. Mis Q. December 2012;36(4):1165–88.
- Betser J, Belanger D. Architecting the enterprise with big data analytics. In: Jay Liebowitz editor. Big Data and Business Analytics. Boca Raton, FL: CRC Press; 2013. p. 1–20.
- Chen CP, Zhang C-Y. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Inf Sci (Ny). 2014;275:314–47. doi:10.1016/j.ins.2014.01.015.
- Borne K. Top 10 Big Data Challenges – A Serious Look at 10 Big Data V’s. April 2014. [Online]. Available: https://www.mapr.com/blog/top-10-big-data-challenges-%E2%80%93-serious-look-10-big-data-v%E2%80%99s.
- Gartner. Big data. 2016. [Online]. Available: http://www.gartner.com/it-glossary/big-data/.
- Loshin D. Big Data Analytics: from Strategic Planning to Enterprise Integration woth Tools. Techniques, NoSQL and Graph. Amsterdam: Elsevier; 2013.
- Gandomi A, Haider M. Beyond the hype: big data concepts, methods, and analytics. Int J Inf Manage. 2015;35:137–44. doi:10.1016/j.ijinfomgt.2014.10.007.
- Dana M. “On Orbitz, Mac users steered to pricier hotels. Wall Streat J. August 23 2012. pp. 1-3. Available: https://www.wsj.com/articles/SB10001424052702304458604577488822667325882.
- Duhigg C. The power of habit: Why we do what we do in life and business. New York: Penguin Random House;2014.
- Zadeh LA. Fuzzy sets. Inf Control. 1965;8(3):338–53. doi:10.1016/S0019-9958(65)90241-X.
- Kantardzic M. Data Mining: Concepts, Models, Methods, and Algorithms. Hoboken, NJ: Wiley & IEEE Press;2011.
- Wikipedia. Weibull distribution. 2 9 2017. [Online]. Available: https://en.wikipedia.org/wiki/Weibull_distribution. [Accessed 18 9 2017].
- Cohen J, Cohen P, West SG, Aiken LS. Applied multiple regression/correlation analysis for the behavioral sciences. 3rd. Mahwah, NJ: Lawrence Erlbaum Associates; 2003.
- Wikipedia. Information security. 2017. [Online]. Available: https://www.wikipedia.com/wiki/Information_security. [Accessed 1 12 2017]