References
- 공효순.송은지 (2013). "빅 데이터를 이용한 호텔기업 CRM 및 보안에 관한 연구". 융합보안논문지, 13(4): 69-75.
- 김기문.박충신.김준석.이호근.임건신 (2005). "경영정보학연구의 연구 다양성 평가". 경영정보학연구. 15(2): 149-170.
- 김병철 (2013). “빅 데이터 보안 기술 및 대응방안 연구”. The Journal of Digital Policy & Management, 11(10): 445-451.
- 수브르더 비스워스.유진호.정철용 (2013). "AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구". 한국전자거래학회지, 18(4): 301-314. https://doi.org/10.7838/jsebs.2013.18.4.301
- 유영성.이명수 (2014). "빅데이터와 사회안전". 이슈 & 진단, 135: 1-25.
- 이승하.강승원.김기홍.방세중 (2014). "보안 로그/이벤트 수집을 위한 Big Data ETL 모델 설계". 한국통신학회 종합학술 발표회 논문집(하계) 2014: 886-887.
- 이종옥.신성희.김홍근.황경태 (2012). "IT 서비스 관리(ITSM) 분야의 연구 프레임워크 및 연구 동향 분석". 정보화정책, 19(1): 3-24.
- 이지은.김창재.이남용 (2014). "빅데이터 처리 프로세스에 따른 빅데이터 위험요인 분석". 한국IT서비스학회지, 13(2): 185-194. https://doi.org/10.9716/kits.2014.13.2.185
- 조영복.양일권.이상호 (2012). "ID 기반의 빅 데이터 정보보호 방안". 2012 중소기업정보기술융합학회 추계학술대회 논문집, 2(1): 18-21.
- 최주영.김명주 (2015)." 빅데이터 서비스의 보안품질평가 모델에 관한 연구". 2015년도 한국인터넷정보학회 춘계학술발표대회 논문집, 145-146.
- 홍진근 (2013). “미정부의 빅데이터를 위한 보안정책”. The Journal of Digital Policy & Management, 11(10): 403-409.
- 홍진근 (2013). “빅데이터 환경에서 미국 커버로스 인증 적용 정책”. The Journal of Digital Policy & Management, 11(11): 435-441.
- 황경태 (2011), 정보시스템 감사: IT 거버넌스의 핵심수단, 탑북스.
- Kang, B. S., Cho, J., Yun, S. & Lee, K. H. (2015). A Study on SmartGrid Security Monitoring Based on Big Data Platform. 중소기업융합학회 국제학술대회 논문집, 2(1): 49-50.
- Abawajy, J. H., Kelarev, A. & Chowdhury, M. (2014). “Large Iterative Multitier Ensemble Classifiers for Security of Big Data“. IEEE Transactions on Emerging Topics in Computing, 2(3): 352-363. https://doi.org/10.1109/TETC.2014.2316510
- Adluru, P., Datla, S. S. & Zhang, X. (2015). "Hadoop Eco System for Big Data Security and Privacy". 2015 IEEE Long Island Systems, Applications and Technology Conference, 1-6.
- Ahmed, E. S. A. & Saeed, R. A. (2014). “A Survey of Big Data Cloud Computing Security”. International Journal of Computer Science and Software Engineering, 3(1): 78-85.
- Ahmed, W. & Hashmi, M. U. (2013). “Security Visualization on Big Data”. Journal of Independent Studies and Research, 11(2): 18-22.
- Alavi, M., & Carlson, P. (1992). "A Review of MIS Research and Disciplinary Development". Journal of Management Information Systems, 8(4), 45-62. https://doi.org/10.1080/07421222.1992.11517938
- Aradau, C. & Blanke, T. (2015). "The (Big) Data-security Assemblage: Knowledge and Critique". Big Data & Society, 2(2), 1-12.
- Bardi, A., Manghi, P. & Zoppi, F. (2014). "Coping with Interoperability and Sustainability in Cultural Heritage Aggregative Data Infrastructures. International Journal of Metadata, Semantics and Ontologies, 9(2), 138-154. https://doi.org/10.1504/IJMSO.2014.060341
- Bertino, E. (2015). "Big Data-Security and Privacy". 2015 IEEE International Congress on Big Data, 757-761.
- Blobel, B., Lopez, D. M. & Gonzalez, C. (2016). "Patient Privacy and Security Concerns on Big Data for Personalized Medicine". Health and Technology, 1-7.
- Bowers, K. D., Hart, C., Juels, A. & Triandopoulos, N. (2013). "Securing the Data in Big Data Security Analytics". IACR Cryptology ePrint Archive, 1-14.
- Chen, Y. (2015). "When the Cloud Meets Big Data: Security Challenges and Solutions", Doctoral Dissertation, Indiana University.
- Choi, S. H., Kim, J. S. & Kwak, J. (2015). "A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment". Proceedings of the International Conference on Security and Management, 137-139.
- Cuzzocrea, A. (2014). "Privacy and Security of Big Data: Current Challenges and Future Research Perspectives". Proceedings of the First International Workshop on Privacy and Security of Big Data, 45-47.
- Cuzzocrea, A. (2014). "PSBD 2014: Overview of the 1st International Workshop on Privacy and Security of Big Data". Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, 2100-2101.
- Feng, X., Onafeso, B. & Liu, E. (2015). " Investigating Big Data Healthcare Security Issues with Raspberry Pi". 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2329-2334.
- Gangawane, A.A. & Dvei, A. (2015) "Big Data Security Issues and Challenges in Cloud Computing", Asian Journal of Convergence in Technology, 1(6): 1-5.
- Grant, E. S. & Mohammad, A. F. (2014). "Use of SOA 3.0 in Private Cloud Security Gateway Service Design: In the Era of Big Data". International Conference on Computer Games, Multimedia & Allied Technology, 94-97.
- Gupta, A., Verma, A., Kalra, P. & Kumar, L. (2014). "Big Data: A Security Compliance Model". 2014 Conference on IT in Business, Industry and Government, 1-5.
- Hsu, C., Zeng, B. & Zhang, M. (2014). “A Novel Group Key Transfer for Big Data Security”. Applied Mathematics and Computation, 249: 436-443. https://doi.org/10.1016/j.amc.2014.10.051
- Inukollu, V. N., Arsi, S. & Ravuri, S. R. (2014). “Security Issues Associated with Big Data in Cloud Computing”. International Journal of Network Security & Its Applications, 6(3): 45-56. https://doi.org/10.5121/ijnsa.2014.6304
- Islam, M. R. & Islam, M. E. (2014). "An Approach to Provide Security to Unstructured Big Data". 2014 8th International Conference on Software, Knowledge, Information Management and Applications, 1-5.
- Kalibjian, J. (2013). "Big Data Management and Security Application to Telemetry Data Products". Proceedings of International Telemetering Conference, 1-8.
- Kaushik, M. & Jain, A. (2014). "Challenges to Big Data Security and Privacy". International Journal of Computer Science and Information Technologies, 5(3): 3042-3043.
- Kim, S. H., Eom, J. H. & Chung, T. M. (2013a). "Big Data Security Hardening Methodology Using Attributes Relationship". 2013 International Conference on Information Science and Applications (ICISA), 1-2.
- Kim, S. H., Kim, N. U. & Chung, T. M. (2013b). "Attribute Relationship Evaluation Methodology for Big Data Security", 2013 International Conference on IT Convergence and Security, 1-4
- Koushikaa, M., Habipriya, S., Aravinth, S. S., Karthikeyan, T. & Kumar, V. (2014). “A Public Key Cryptography Security System For Big Data”. International Journal for Innovative Research in Science and Technology, 1(6): 311-313.
- Kupwade Patil, H. & Seshadri, R. (2014). "Big Data Security and Privacy Issues in Healthcare". 2014 IEEE International Congress on Big Data, 762-765.
- Kshetri, N. (2014). "Big Data's Impact on Privacy, Security and Consumer Welfare". Telecommunications Policy, 38(11): 1134-1145. https://doi.org/10.1016/j.telpol.2014.10.002
- Lafuente, G. (2015). “The Big Data Security Challenge”. Network Security, 2015(1): 12-14. https://doi.org/10.1016/S1353-4858(15)70009-7
- Lan, L. & Jun, L. (2013). "Some Special Issues of Network Security Monitoring on Big Data Environments" . 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, 10-15.
- Li, S., Zhang, T., Gao, J. & Park, Y. (2015). "A Sticky Policy Framework for Big Data Security". 2015 IEEE First International Conference on Big Data Computing Service and Applications, 130-137.
- Liang, Q., Ren, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (2015). “Security in Big Data”. Security and Communication Networks, 8(14): 2383-2385. https://doi.org/10.1002/sec.1332
- Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y. & Yang, H. (2013). "Next Big Thing in Big Data: The Security of the ICT Supply Chain". 2013 International Conference on Social Computing, 1066-1073.
- Marchal, S., Jiang, X., State, R. & Engel, T. (2014). "A Big Data Architecture for Large Scale Security Monitoring". 2014 IEEE International Congress on Big Data, 56-63.
- Matturdi, B., Xianwei, Z., Shuai, L. & Fuhong, L. (2014). “Big Data Security and Privacy: a Review”. China Communications, 11(14): 135-145. https://doi.org/10.1109/CC.2014.7085614
- Mell, P. (2012). "Big Data Technology and Implications for Security Research". Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 15-16.
- Mittal, S. & Varshney, S. (2015). “Big Data: Information Security and Privacy”. International Journal of Software and Web Sciences, 1(1): 29-32.
- Murthy, P. K. (2014). "Top Ten Challenges in Big Data Security and Privacy". 2014 IEEE International Test Conference, 1.
- Paryasto, M., Alamsyah, A. & Rahardjo, B. (2014). "Big-data Security Management Issues". 2014 2nd International Conference on Information and Communication Technology. 59-63.
- Shao, P. & Y. Wang & X. Tao (2010). "A Comparative Study on MIS Research at Mainland China and Abroad(2002-2007)." International Journal of Management Science, 16(2): 39-51.
- Sharma, P. P. & Navdeti, C. P. (2014). "Securing Big Data Hadoop: a Review of Security Issues, Threats and Solution" . International Journal of Computer Science and Information Technologies, 5 (2): 2126-2131
- Shen, Y. & Thonnard, O. (2014). "Mr-TRIAGE: Scalable Multi-criteria Clustering for Big Data Security Intelligence Applications". 2014 IEEE International Conference on Big Data, 627-635.
- Singh, J. (2014). "Real Time Big Data Analytic: Security Concern and Challenges with Machine Learning Algorithm". 2014 Conference on IT in Business, Industry and Government, 1-4.
- Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S. & Hu, J. (2014). “Enhancing Big Data Security with Collaborative Intrusion Detection”. IEEE Cloud Computing, 1(3): 27-33. https://doi.org/10.1109/MCC.2014.53
- Tankard, C. (2012). “Big Data Security”. Network Security, 2012(7): 5-8. https://doi.org/10.1016/S1353-4858(12)70063-6
- Telang, R. (2014). "Privacy and Security Policy Infrastructure for Big Data", A Journal of Law and Policy for the Information Society, 10(3): 783-798.
- Thayananthan, V. & Albeshri, A. (2015). “Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center”. Procedia Computer Science, 50: 149-156. https://doi.org/10.1016/j.procs.2015.04.077
- Thuraisingham, B. (2015). "Big Data Security and Privacy". Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 279-280.
- Toshniwal, R., Dastidar, K. G. & Nath, A. (2015). “Big Data Security Issues and Challenges”. International Journal of Innovative Research in Advanced Engineering, 2(2): 15-20.
- Van Ginkel, W. (2013). "Holistic Approach Needed for Big Data Security", Internal Auditor, 70(1): 17.
- Vessey, Iris, Ramesh, V. & Glass, R.L. (2002). "Research in Information Systems: An Empirical Study of Diversity in the Discipline and Its Journals."Journal of Management Information Systems, 19(2): 129-174. https://doi.org/10.1080/07421222.2002.11045721
- Vidyavathi, B. M. (2015). “Security Challenges in Big Data: Review”. International Journal of Advanced Research in Computer Science, 6(6): 199-201.
- Vivekanand, M. & Vidyavathi, B. M. (2015). “Security Challenges in Big Data: Review”. International Journal of Advanced Research in Computer Science, 6(6): 199-202.
- Wang, H., Jiang, X. & Kambourakis, G. (2015). “Special Issue on Security, Privacy and Trust in Network-based Big Data”. Information Sciences, 318: 48-50. https://doi.org/10.1016/j.ins.2015.05.040
- Yadav, G. & Dalal, S. (2015). “Improvisation of Network Security using Encryption Technique for Big Data Technology”. International Journal of Computer Applications, 124(11): 27-30. https://doi.org/10.5120/ijca2015905647