1. Alshboul, Y., Wang, Y., & Nepali, R. K. (2015). Big data lifecycle: Threats and security model. In 2015, Twenty-first Americas Conference on Information Systems, Puerto Rico 2015.
2. Bisk. (2017). “What is big data?” Business intelligence by Villanova University. Retrieved on May 22, 2017.
3. Boyd, D., & Crawford, K. (2011). Six provocations for big data. In Social Science Research Network: A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society.
https://doi.org/10.2139/ssrn.1926431.2011
.
4. Community cleverness required. (2008). Nature, 455(7209), 1.
https://doi.org/10.1038/455001a
. PMID 18769385.2008.
5. Dan, S. (2016) Comparing the top big data security analytics tools. At
http://searchsecurity.techtarget.com/feature/Comparing-the-top-big-data-security-analytics-tools
. Accessed on May 16, 2017.