-
1
-
-
81055138684
-
Big Data: The Next Frontier for Innovation, Competition, and Productivity
-
McKinsey Global Institute,
-
McKinsey Global Institute, "Big Data: The Next Frontier for Innovation, Competition, and Productivity," June 2011.
-
(2011)
-
-
-
2
-
-
84886982214
-
Research Note: Analytics Pays Back $10.66 for Every Dollar Spent
-
Nucleus Research, Document L122, November
-
Nucleus Research, "Research Note: Analytics Pays Back $10.66 for Every Dollar Spent," Document L122, November 2011, http://nucleusresearch.com/research/notes-and-reports/ analytics-pays-back-10-dot-66-for-every-dollar-spent/.
-
(2011)
-
-
-
3
-
-
84886970243
-
Total Economic Impact of IBM 's Netezza Data Warehouse Appliance with Advanced Analytics
-
IBM Data Management and Forrester Consulting,
-
IBM Data Management and Forrester Consulting, "Total Economic Impact of IBM 's Netezza Data Warehouse Appliance with Advanced Analytics," August 2011, http://ibmdatamag.com/2012/03/the-total-economic-impact-of-ibms-netezza-data-warehouse-appliance-withadvanced- analytics/.
-
(2011)
-
-
-
4
-
-
84886977620
-
ROI Case Study: IBM Smarter Commerce: Netezza MediaMath
-
Nucleus Research , Document L112, October
-
Nucleus Research, ROI Case Study: IBM Smarter Commerce: Netezza MediaMath, Document L112, October 2011, www-01.ibm.com/software/success/cssdb.nsf/CS/JHUN-8N748 A?OpenDocument&Site=default&cty=en_us.
-
(2011)
-
-
-
6
-
-
84886976976
-
8TH Annual Card Issuers' Safety Scorecard: Proliferation of Alerts Lead to Quicker Detection Time and Lower Fraud Costs
-
Javelin Strategy & Research,
-
Javelin Strategy & Research, "8TH Annual Card Issuers' Safety Scorecard: Proliferation of Alerts Lead to Quicker Detection Time and Lower Fraud Costs," June 2012, www.javelinstrategy.com/brochure/254.
-
(2012)
-
-
-
7
-
-
85025693764
-
2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier
-
Javelin Strategy & Research
-
Javelin Strategy & Research, "2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier," February 2012, https://www.javelinstrategy.com/news/1314/92/ Identity-Fraud-Rose-13-Percent-in-2011-According-to-New-Javelin-Strategy-Research- Report/d,pressRoomDetail.
-
(2012)
-
-
-
8
-
-
84886958227
-
-
Vendor content published by Experian on, January 5,
-
Vendor content published by Experian on BankersOnline.com , January 5, 2009.
-
(2009)
-
-
-
9
-
-
84886975374
-
The BlackBerry, Trying to Avoid the Hall of Fallen Giants
-
New York Times, January 28,
-
Sam Grobart and Ian Austen, "The BlackBerry, Trying to Avoid the Hall of Fallen Giants," New York Times, January 28, 2012.
-
(2012)
-
-
Grobart, S.1
Austen, I.2
-
10
-
-
84886988758
-
A New Approach: Rapid Fire Business Intelligence
-
Tableau Software, January
-
Chris Stolte, Dan Jewett, and Pat Hanrahan, "A New Approach: Rapid Fire Business Intelligence," Tableau Software, January 2011, www.tableausoftware.com/whitepapers/ rapid-fire-business-intelligence.
-
(2011)
-
-
Stolte, C.1
Jewett, D.2
Hanrahan, P.3
-
11
-
-
84886980608
-
We Did It Again! Another First-Business Analyst Direct Access to Hadoop Data
-
Teradata Aster Data Blog, June
-
Tasso Argyros, "We Did It Again! Another First-Business Analyst Direct Access to Hadoop Data," Teradata Aster Data Blog, June 2012, www.asterdata.com/blog/2012/06/12/ we-did-it-again-another-first-business-analyst-direct-access-to-hadoop-data-3/.
-
(2012)
-
-
Argyros, T.1
-
12
-
-
19744369801
-
-
(Cambridge, MA: Harvard Business School Press, ).
-
W. Chan Kim and Renée Mauborgne, Blue Ocean Strategy (Cambridge, MA: Harvard Business School Press, 2005).
-
(2005)
Blue Ocean Strategy
-
-
Kim, W.C.1
Mauborgne, R.2
-
13
-
-
84886985877
-
Software as a Service BI (SaaS BI)
-
SearchBusinessAnalytics, June
-
Margaret Rouse, "Software as a Service BI (SaaS BI)," SearchBusinessAnalytics, June 2012, http://searchbusinessanalytics.techtarget.com/definition/Software-as-a-Service-BI-SaaS-BI.
-
(2012)
-
-
Rouse, M.1
-
14
-
-
84886955460
-
Interactive Dynamics for Visual Analysis
-
February 12, ACM Queue,
-
Jeffrey Heer and Ben Shneiderman, "Interactive Dynamics for Visual Analysis," February 12, 2012, ACM Queue, http://queue.acm.org/detail.cfm?id=2146416.
-
(2012)
-
-
Heer, J.1
Shneiderman, B.2
-
15
-
-
0034060464
-
Tools for Visualizing Properties of Spatial and Temporal Periodicity in Geographic Data
-
Robert M Edsall, Mark Harrower, and Jeremy L. Mennis, "Tools for Visualizing Properties of Spatial and Temporal Periodicity in Geographic Data," Computers & Geosciences 26 (2000): 109-118, http://astro.temple.edu/~jmennis/pubs/mennis_cg00.pdf.
-
(2000)
Computers & Geosciences
, vol.26
, pp. 109-118
-
-
Edsall, R.M.1
Harrower, M.2
Mennis, J.L.3
-
16
-
-
78049442821
-
Ensemble Methods in Data Mining: Improving Accuracy through Combining Predictions
-
February 24
-
Giovanni Seni, John Elder, and Robert Grossman, "Ensemble Methods in Data Mining: Improving Accuracy through Combining Predictions," Morgan and Claypool Publishers, February 24, 2010, www.morganclaypool.com/doi/pdf/10.2200/S00240ED1V01Y200912DMK002.
-
(2010)
Morgan and Claypool Publishers
-
-
Seni, G.1
Elder, J.2
Grossman, R.3
-
17
-
-
84886977018
-
Do Not Track: 7 Key Facts
-
February 24,
-
Mathew J. Schwartz, "Do Not Track: 7 Key Facts," InformationWeek , February 24, 2012, www.informationweek.com/security/privacy/do-not-track-7-key-facts/232601425.
-
(2012)
InformationWeek
-
-
Schwartz, M.J.1
-
18
-
-
84886961742
-
-
Adapted from both International Safe Harbor Privacy Principles and Andrew Reiskind 's interview for this book.
-
-
-
-
19
-
-
84861393010
-
Whitehouse Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting innovation in the Global Digital Economy
-
February
-
Barack Obama, "Whitehouse Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting innovation in the Global Digital Economy," February 2012.
-
(2012)
-
-
Obama, B.1
-
20
-
-
84886971991
-
Consumer Privacy Bill of Rights
-
February 23,
-
"Consumer Privacy Bill of Rights," CNNMoneyTech , February 23, 2012, money.cnn.com/ 2012/02/22/technology/bill_of_rights_privacy/index.htm.
-
(2012)
CNNMoneyTech
-
-
-
21
-
-
84885773420
-
Google Will Pay $22.5 Million to Settle FTC Charges It Misrepresented Privacy Assurances to Users of Apple 's Safari Internet Browser
-
Federal Trade Commission, FTC Press Release: 08/09/2012,
-
Federal Trade Commission, "Google Will Pay $22.5 Million to Settle FTC Charges It Misrepresented Privacy Assurances to Users of Apple 's Safari Internet Browser," FTC Press Release: 08/09/2012, www.ftc.gov/opa/2012/08/google.shtm.
-
(2012)
-
-
-
22
-
-
44649200414
-
A Contextual Method for Evaluating Privacy Preferences
-
Policies and Research in Identity Management (Berlin: Springer,
-
Caroline Sheedy and Ponnurangam Kumaraguru. "A Contextual Method for Evaluating Privacy Preferences," in IFIP International Federation for Information Processing , vol. 261, Policies and Research in Identity Management (Berlin: Springer, 2008), 139-146.
-
(2008)
IFIP International Federation for Information Processing
, vol.261
, pp. 139-146
-
-
Sheedy, C.1
Kumaraguru, P.2
-
23
-
-
84893087533
-
Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites
-
Short Paper, School of Computer Science, Carnegie Mellon University,
-
Yang Wang, Gregory Norcie, and Lorrie Faith Cranor, "Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites," Short Paper, School of Computer Science, Carnegie Mellon University, 2011, www.cs.cmu.edu/~yangwan1/papers/TRUST2011-%C2%AD-AuthorCopy.pdf .
-
(2011)
-
-
Wang, Y.1
Norcie, G.2
Cranor, L.F.3
-
24
-
-
84886989487
-
A Middleware Approach for Managing Privacy of Outsourced Personal Data
-
Department of Computer Science, University of California-Irvine,
-
Sharad Mehrotra and Bijit Hore, "A Middleware Approach for Managing Privacy of Outsourced Personal Data," Department of Computer Science, University of California-Irvine, 2009, www.utdallas.edu/~jxr061100/papers/nsf2009das_submission_12.pdf
-
(2009)
-
-
Mehrotra, S.1
Hore, B.2
|