1. Data. “Data everywhere,” The Economist, Feb 2010. [Online]. Available:
http://www.economist.com/node/15557443
. Accessed 13-January-2015.
2. Fan, W., & Bifet, A. (2013). Mining big data: current status, and forecast to the future. ACM SIGKDD Explorations Newsletter, 14(2), 1–5.
3. Seifert, J. W. (2013). CRS report for congress: data mining and homeland security an overview August 27, 2008 - RL31798. Mannheim, W. Germany, Germany: Bibliographisches Institut AG.
4. Aggarwal, C. C., & Yu, P. S. (2008). An introduction to privacy-preserving data mining. In Privacy-Preserving Data Mining Models and Algorithms, ser. Advances in Database Systems (vol. 34, pp. 1–9). New York: Springer US.
5. “9 important elements to corporate data security policies that protect data privacy,” The Security Magazine, may 2016, [Online]. Available:
http://www.securitymagazine.com/articles/
. Accessed 18-February-2017.