Amado, A., Cortez, P., Rita, P., & Moro, S. (2018). Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis. European Research on Management and Business Economics, 24(1), 1–7. https://doi.org/10.1016/j.iedeen.2017.06.00210.1016/j.iedeen.2017.06.002
Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in Big data security and privacy: A review. Security and Privacy, 1(4), e13. https://doi.org/10.1002/spy2.1310.1002/spy2.13
Cadwalladr, Carole; Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Cheng, L., Liu, F., & Yao, D. D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1–14. https://doi.org/10.1002/widm.121110.1002/widm.1211
Dilshad, R. M., & Latif, M. I. (2013). Focus Group Interview as a Tool for Qualitative Research: An Analysis. Pakistan Journal of Social Science, 33(1), 191–198. Retrieved from https://www.bzu.edu.pk/PJSS/Vol33No12013/PJSS-Vol33-No1-16.pdf
Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & Koutbi, M. El. (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time. Procedia Computer Science, 151(2018), 1004–1009. https://doi.org/10.1016/j.procs.2019.04.14110.1016/j.procs.2019.04.141
Hu, H., Myers, S., Colizza, V., & Vespignani, A. (2009). WiFi networks and malware epidemiology. Proceedings of the National Academy of Sciences of the United States of America, 106(5), 1318–1323. https://doi.org/10.1073/pnas.081197310610.1073/pnas.0811973106
Idzalika, R., Pramestri, Z., Amin, I., Riyadi, Y., & Hodge, G. (2014). Big Data for Population and Social Policies. Pulselabjakarta.Org. Retrieved from https://pulselabjakarta.org/assets/uploadworks/2019-01-24-08-58-31.pdf
Knight, S. R., Ots, R., Maimbo, M., Drake, T. M., Fairfield, C. J., & Harrison, E. M. (2019). Systematic review of the use of big data to improve surgery in low- and middle-income countries. The British Journal of Surgery, 106(2), e62–e72. https://doi.org/10.1002/bjs.1105210.1002/bjs.11052
Kozlowska, I. (2018). Facebook and Data Privacy in the Age of Cambridge Analytica. Retrieved September 28, 2019, from The Henry M Jackson School of International Studies website: https://jsis.washington.edu/news/facebook-data-privacy-age-cambridge-analytica/
Lapowsky, I. (2019, March). In Latest Facebook Data Exposure, History Repeats Itself. Retrieved from https://www.wired.com/story/facebook-apps-540-million-records/
Nyumba, T. O., Wilson, K., Derrick, C. J., & Mukherjee, N. (2018). The use of focus group discussion methodology: Insights from two decades of application in conservation. Methods in Ecology and Evolution, 9(1), 20–32. https://doi.org/10.1111/2041-210X.1286010.1111/2041-210X.12860
Permatasari, A., & Kartikowati, M. (2018). The influence of website design on customer online trust and perceived risk towards purchase intention: A case of O2O commerce in Indonesia. International Journal of Business and Globalisation, 21(1), 74–86. https://doi.org/10.1504/IJBG.2018.09409710.1504/IJBG.2018.094097
Portela, J., Villalba, L. G., Trujillo, A. S., Orozco, A. S., & Kim, T.-H. (2016). Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors, 16(11), 1832. https://doi.org/10.3390/s1611183210.3390/s16111832
Ronquillo, J. G., Winterholler, J. E., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open, 1(1), 15–19. https://doi.org/10.1093/jamiaopen/ooy01910.1093/jamiaopen/ooy019
Saldana, J. (2009). The Coding Manual for Qualitative Researchers (First Edit). Retrieved from http://www.ghbook.ir/index.php?name=گنهر ف و ه نا سر یا ه نیون&option=com_dbook&task=readonline&book_id=13650&page=73&chkhashk=ED9C94 91B4&Itemid=218&lang=fa&tmpl=component
Saqr, M. (2017). Big data and the emerging ethical challenges. International Journal of Health Sciences, 11(4), 1–2. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/29085259%0Ahttp://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=PMC5654190
Statista. (2019). Share of internet users in Indonesia in 2019, by age group. Retrieved September 18, 2019, from Statista Research Department website: https://www.statista.com/statistics/997264/share-of-internet-users-by-age-group-indonesia/
Webb, K. (2019, July 18). The Russian Photo App That Makes You Look Old Is Probably Keeping Your Data. Retrieved from https://www.sciencealert.com/viral-russian-app-that-makes-you-look-old-is-probably-keeping-your-data
Wong, E. (2019, March 18). How Indonesians Embrace the Digital World. The Jakarta Post. Retrieved from https://www.thejakartapost.com/academia/2019/03/18/how-indonesians-embrace-the-digital-world.html