Have a personal or library account? Click to login
Open Access
|Jul 2020

References

  1. Amado, A., Cortez, P., Rita, P., & Moro, S. (2018). Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis. European Research on Management and Business Economics, 24(1), 1–7. https://doi.org/10.1016/j.iedeen.2017.06.00210.1016/j.iedeen.2017.06.002
  2. Anshari, M., & Lim, S. A. (2017). E-Government with Big Data Enabled through Smartphone for Public Services: Possibilities and Challenges. International Journal of Public Administration, 40(13), 1143–1158. https://doi.org/10.1080/01900692.2016.124261910.1080/01900692.2016.1242619
  3. Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in Big data security and privacy: A review. Security and Privacy, 1(4), e13. https://doi.org/10.1002/spy2.1310.1002/spy2.13
  4. Bergagna, E., & Tartaglia, S. (2018). Self-esteem, social comparison, and facebook use. Europe’s Journal of Psychology, 14(4), 831–845. https://doi.org/10.5964/ejop.v14i4.159210.5964/ejop.v14i4.1592
  5. Cadwalladr, Carole; Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
  6. Cheng, L., Liu, F., & Yao, D. D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1–14. https://doi.org/10.1002/widm.121110.1002/widm.1211
  7. Dhawan, V., & Zanini, N. (2014). Big Data and Social Media Analytics. Research Matters: A Cambridge Assessment Publication., (18), 36–41.
  8. Dilshad, R. M., & Latif, M. I. (2013). Focus Group Interview as a Tool for Qualitative Research: An Analysis. Pakistan Journal of Social Science, 33(1), 191–198. Retrieved from https://www.bzu.edu.pk/PJSS/Vol33No12013/PJSS-Vol33-No1-16.pdf
  9. Esfahani, H. J., Tavasoli, K., & Jabbarzadeh, A. (2019). Big data and social media: A scientometrics analysis. International Journal of Data and Network Science, (January), 145–164. https://doi.org/10.5267/j.ijdns.2019.2.00710.5267/j.ijdns.2019.2.007
  10. Garcia-Rivadulla, S. (2016). Personalization vs. privacy: An inevitable trade-off? IFLA Journal, 42(3), 227–238. https://doi.org/10.1177/034003521666289010.1177/0340035216662890
  11. Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & Koutbi, M. El. (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time. Procedia Computer Science, 151(2018), 1004–1009. https://doi.org/10.1016/j.procs.2019.04.14110.1016/j.procs.2019.04.141
  12. Hu, H., Myers, S., Colizza, V., & Vespignani, A. (2009). WiFi networks and malware epidemiology. Proceedings of the National Academy of Sciences of the United States of America, 106(5), 1318–1323. https://doi.org/10.1073/pnas.081197310610.1073/pnas.0811973106
  13. Hussain, A., & Cambria, E. (2018). Semi-supervised learning for big social data analysis. Neurocomputing, 275, 1662–1673. https://doi.org/10.1016/j.neucom.2017.10.01010.1016/j.neucom.2017.10.010
  14. Idzalika, R., Pramestri, Z., Amin, I., Riyadi, Y., & Hodge, G. (2014). Big Data for Population and Social Policies. Pulselabjakarta.Org. Retrieved from https://pulselabjakarta.org/assets/uploadworks/2019-01-24-08-58-31.pdf
  15. Joglekar, P., & Pise, N. (2016). Solving Cyber Security Challenges using Big Data. International Journal of Computer Applications, 154(4), 9–12. https://doi.org/10.5120/ijca201691208010.5120/ijca2016912080
  16. Kantarcioglu, M., & Ferrari, E. (2019). Research Challenges at the Intersection of Big Data, Security and Privacy. Frontiers in Big Data, 2(February), 1–6. https://doi.org/10.3389/fdata.2019.0000110.3389/fdata.2019.00001
  17. Knight, S. R., Ots, R., Maimbo, M., Drake, T. M., Fairfield, C. J., & Harrison, E. M. (2019). Systematic review of the use of big data to improve surgery in low- and middle-income countries. The British Journal of Surgery, 106(2), e62–e72. https://doi.org/10.1002/bjs.1105210.1002/bjs.11052
  18. Kozlowska, I. (2018). Facebook and Data Privacy in the Age of Cambridge Analytica. Retrieved September 28, 2019, from The Henry M Jackson School of International Studies website: https://jsis.washington.edu/news/facebook-data-privacy-age-cambridge-analytica/
  19. Lapowsky, I. (2019, March). In Latest Facebook Data Exposure, History Repeats Itself. Retrieved from https://www.wired.com/story/facebook-apps-540-million-records/
  20. Li, Y., & Zhai, X. (2018). Review and Prospect of Modern Education using Big Data. Procedia Computer Science, 129, 341–347. https://doi.org/10.1016/j.procs.2018.03.08510.1016/j.procs.2018.03.085
  21. Liu, W., & Zhong, S. (2017). Web malware spread modelling and optimal control strategies. Scientific Reports, 7(February), 1–19. https://doi.org/10.1038/srep4230810.1038/srep42308
  22. Logica, B., & Magdalena, R. (2015). Using Big Data in the Academic Environment. Procedia Economics and Finance, 33(15), 277–286. https://doi.org/10.1016/s2212-5671(15)01712-810.1016/S2212-5671(15)01712-8
  23. Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2), 205395171454186. https://doi.org/10.1177/205395171454186110.1177/2053951714541861
  24. Mills, K. A. (2018). What are the threats and potentials of big data for qualitative research? Qualitative Research, 18(6), 591–603. https://doi.org/10.1177/146879411774346510.1177/1468794117743465
  25. Moro, S., Rita, P., & Vala, B. (2016). Predicting social media performance metrics and evaluation of the impact on brand building: A data mining approach. Journal of Business Research, 69(9), 3341–3351. https://doi.org/10.1016/j.jbusres.2016.02.01010.1016/j.jbusres.2016.02.010
  26. Mustofa, R. H. (2019). Coding Results from Focus Group Discussion (FGD) about Big Data.
  27. Nunes, M. B. (2018). Understanding Big Data for Industrial Innovation and Design: The Missing Information Systems Perspective. Journal of Data and Information Science, 2(4), 1–6. https://doi.org/10.1515/jdis-2017-001710.1515/jdis-2017-0017
  28. Nyumba, T. O., Wilson, K., Derrick, C. J., & Mukherjee, N. (2018). The use of focus group discussion methodology: Insights from two decades of application in conservation. Methods in Ecology and Evolution, 9(1), 20–32. https://doi.org/10.1111/2041-210X.1286010.1111/2041-210X.12860
  29. Permatasari, A., & Kartikowati, M. (2018). The influence of website design on customer online trust and perceived risk towards purchase intention: A case of O2O commerce in Indonesia. International Journal of Business and Globalisation, 21(1), 74–86. https://doi.org/10.1504/IJBG.2018.09409710.1504/IJBG.2018.094097
  30. Portela, J., Villalba, L. G., Trujillo, A. S., Orozco, A. S., & Kim, T.-H. (2016). Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors, 16(11), 1832. https://doi.org/10.3390/s1611183210.3390/s16111832
  31. Qiu, J. L. (2015). Reflections on Big Data: ‘Just because it is accessible does not make it ethical.’ Media, Culture and Society, 37(7), 1089–1094. https://doi.org/10.1177/016344371559410410.1177/0163443715594104
  32. Ronquillo, J. G., Winterholler, J. E., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open, 1(1), 15–19. https://doi.org/10.1093/jamiaopen/ooy01910.1093/jamiaopen/ooy019
  33. Saldana, J. (2009). The Coding Manual for Qualitative Researchers (First Edit). Retrieved from http://www.ghbook.ir/index.php?name=گنهر ف و ه نا سر یا ه نیون&option=com_dbook&task=readonline&book_id=13650&page=73&chkhashk=ED9C94 91B4&Itemid=218&lang=fa&tmpl=component
  34. Saqr, M. (2017). Big data and the emerging ethical challenges. International Journal of Health Sciences, 11(4), 1–2. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/29085259%0Ahttp://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=PMC5654190
  35. Statista. (2019). Share of internet users in Indonesia in 2019, by age group. Retrieved September 18, 2019, from Statista Research Department website: https://www.statista.com/statistics/997264/share-of-internet-users-by-age-group-indonesia/
  36. Strang, K. D., & Sun, Z. (2016). Meta-analysis of big data security and privacy: Scholarly literature gaps. Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016, (February), 4035–4037. https://doi.org/10.1109/BigData.2016.784110110.1109/BigData.2016.7841101
  37. Waterman, K., & Bruening, P. J. (2014). Big Data analytics: risks and responsibilities. International Data Privacy Law, 4(2), 89–95. https://doi.org/10.1093/idpl/ipu00210.1093/idpl/ipu002
  38. Webb, K. (2019, July 18). The Russian Photo App That Makes You Look Old Is Probably Keeping Your Data. Retrieved from https://www.sciencealert.com/viral-russian-app-that-makes-you-look-old-is-probably-keeping-your-data
  39. Wong, E. (2019, March 18). How Indonesians Embrace the Digital World. The Jakarta Post. Retrieved from https://www.thejakartapost.com/academia/2019/03/18/how-indonesians-embrace-the-digital-world.html
DOI: https://doi.org/10.2478/hjbpa-2020-0026 | Journal eISSN: 2067-9785 | Journal ISSN: 2457-5720
Language: English
Page range: 161 - 170
Submitted on: Dec 1, 2019
Accepted on: Dec 1, 2019
Published on: Jul 16, 2020
Published by: Association Holistic Research Academic (Hora)
In partnership with: Paradigm Publishing Services
Publication frequency: 3 times per year

© 2020 Rochman Hadi Mustofa, published by Association Holistic Research Academic (Hora)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.