1 |
Chen, H., R.H.L. Chiang, and V.C. Storey, "Business Intelligence and Analytics : From Big Data to Big Impact," MIS Quarterty, Vol.36, No.4(2012), pp.1165-1188.
|
2 |
Ball, J., "NSA stores metadata of millions of web users for up to a year, secret files show," The Guardian, 30 September 2013.
|
3 |
Bascetta, C.A., "VA and Defense Health Care : Progress Made, but DoD Continues to Face Military Medical Surveillance System Challenges," GAO-02-337T, Jan. 24, 2002.
|
4 |
Clarke, L., X. Zheng-Bradley, R. Smith, E. Kulesha, C. Xiao, I. Toneva, B. Vaughan, D. Preuss, R. Leinonen, M. Shumway, S. Sherry, P. Flicek, and The 1000 Genomes Project Consortium, "The 1000 Genomes Project : data management and community access," Nature, Vol.9(2012), pp.459-462.
|
5 |
Conway, D., "What Data Visualization Should Do : Simple Small Truth," 2013, http://drewcon way.com/zia/2013/3/26/what-data-visualizati on-should-do-simple-small-truth. Accessed: 18 March, 2014.
|
6 |
Davenport, T.H., J.G. Harris, and R. Morison, "Analytics at Work; Smarter Decisions, Better Results," Havard Business Press, Massachusetts, 2010.
|
7 |
Dean, J. and S. Ghemawat, "MapReduce : simplified data processing on large clusters," Communications of the ACM, Vol.51, No.1 (2008), pp.107-113.
|
8 |
Edwards, John, "Why the Military Loves Big Data," BigDATA REPUBLIC, 2014, http://www.bigdatarepublic.com/author- .asp? sect ion_id=2759&doc _id =257612. Accessed : 18 March, 2014.
|
9 |
Gantz, J. and D. Reinsel, "Extracting Value from Chaos," IDC IVIEW, 2011, http://www.emc.com/collateral/analyst-reports/idc-e xtracting-value-from-chaos-ar.pdf. Accessed : 18 March, 2014.
|
10 |
Gantz, J. and D. Reinsel, "THE DIGITAL U NIVERSE IN 2020 : Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East," IDC IVIEW, 2012, http://idcdocserv.com/14 14. Accessed : 18 March, 2014.
|
11 |
Gartner, "Top 10 Strategic Technology Trens for 2013," Special Report, 2012, http://www. gartner.com/technology/research/top-10-te chnology-trends/.
|
12 |
Ginsberg, J., M.H. Mohebbi, R.S. Patel, L. Brammer, M.S. Smolinski, and L. Brilliant, "Detecting influenza epidemics using search engine query data," Nature, Vol.457(2009), pp.1012-1014.
DOI
ScienceOn
|
13 |
손미애, "합성환경 표현 및 교환명세(SEDRIS) 소개", 국방정책연구, 제59권(2003), pp.99-127.
|
14 |
Goldberg, D.E. and J.H. Holland, "Genetic Algorithms and Machine Learning," Machine Learning, Vol.3, No.2-3(1988), pp.95-99.
|
15 |
윤미영, 권정은, "빅데이터로 진화하는 세상", 한국정보화 진흥원, 2012. 5.
|
16 |
김현곤, "빅데이터 시대 전망과 국가 미래전략", 한국정보화진흥원, 2012. 10.
|
17 |
시로타 마코토, '빅데이터의 충격, 한빗미디어, 2013.
|
18 |
함유근, 채승병, "빅데이터, 경영을 바꾸다", 삼성경제연구소, 2013.
|
19 |
Anderson, C., "The end of theory : The data deluge makes the scientific method obsolete," WIRED, 2008 http://www.wired.com/scienc e/discoveries/magazine/16-07/pb_theory. Accessed : 18 March, 2014.
|
20 |
Wolfers, J., "Point Shaving : Corruption NCAA Basketball," American Economic Association, Vol.96, No.2(2006), pp.279-283.
DOI
ScienceOn
|
21 |
Vosen, S. and T. Schmidt, "Forecasting Private Consumption : Survey-Based Indicators vs. Google Trends," Journal of Forecasting, Vol.30(2011), pp.565-578.
DOI
ScienceOn
|
22 |
Wasserman, S. and K. Faust, "Social Network Analysis : Methods and Applications," Cambridg University Press, 1994.
|
23 |
Watson, R.T., M.-C. Boudreau, S. Li, and J. Levis, "Telematics at UPS : En route to energy informatics," MISQ Executive, Vol.9, No.1(2010), pp.1-11.
|
24 |
IBM Bisuness Analytics, "IBM SPSS Predective Analytics Aids Offender Management," 2011.
|
25 |
Graham, M., "Big data and the end of theory?," The Guardian, 2012. http://www.guardian.c o.uk/news/datablog/2012/mar/09/big-datatheory. Accessed : 18 March, 2014.
|
26 |
Jacobs, Melinda, "Click, click, click. Zynga and the gamification of clicking," The Italian Journal of Came Studies, Vol.1(2012), pp.1-6.
|
27 |
Gungor, V.C., D.Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G.P. Hancke, "Smart Grid and Smart Home," IEEE Industrial Electronics Magazine, Vol.12(2012), pp.18-34.
|
28 |
Han, J., M. Kamber, and J. Pei, "Data Mining : Concepts and Techniques," Elsevier, San Francisco, CA, 2006.
|
29 |
Insinna, V., "Air Force Uses Big Data to Glean Energy Saving," National Defense, July, 2013.
|
30 |
Krouse, W. and B. Elias, "Terrorist Watchlist checks and Air Passenger Prescreening", CRS Report for Congress, 2009.
|
31 |
Lavalle, S., M. S. Hopkins, E. Lesser, R., Shockley, and N. Kruschwitz, "Analytics : The New Path to Value," MIT Sloan Management Review, 2010.
|
32 |
Manyika, James, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. H. Byers, "Big data : The next frontier for innovation, competition, and productivity," McKinsey Global Institute, 2011, http://www.mckinsey.com/ mgi/publications/big_data/pdfs/MGI_big_d ata_exec_summary.pdf. Accessed : 18 March, 2014.
|
33 |
Obenshain, M.K., "Application of Data Mining Techniques to Healthcare Data," Infection Control and Hospital Epidemiology, Vol.25, No.8(2004), pp.690-695. http://www.jstor.org /stable/10.1086/502460. Accessed: 18 March, 2014.
DOI
ScienceOn
|
34 |
OSTP, Fact Sheet : Big Data Across the Federal Government, March 29, 2012.
|
35 |
Rubertone, M.V. and J.F. Brundage, "The Defense Medical Surveillance System and the Department of Defense Serum Repository : Glimpses of the Future of Public Health Surveillance," American Journal of Public Health, Vol.92, No.12(2002), pp.1900-1904.
DOI
|
36 |
조성우, "Big Data 시대의 기술", KT경제경영연구소, 2011.
|
37 |
The Economist, The Data Deluge, 25 Feb. 2010, pp.2-16.
|
38 |
The Guardian, http://www.theguardian.com /media/pda/2010/may/13/twitter-tweetmins ter-election, 2010.
|