-
1
-
-
84891695542
-
Protecting patient medical data
-
Birk, S.: Protecting patient medical data. Healthcare Executive 28(5), 20–28 (2013)
-
(2013)
Healthcare Executive
, vol.28
, Issue.5
, pp. 20-28
-
-
Birk, S.1
-
2
-
-
84994708196
-
Big Data and Business Intelligence for Management Accountants
-
Brands, K.: Big Data and Business Intelligence for Management Accountants. Strategic Finance 96(6), 64–65 (2014)
-
(2014)
Strategic Finance
, vol.96
, Issue.6
, pp. 64-65
-
-
Brands, K.1
-
3
-
-
85132852179
-
-
Brand, H.: Big data: adapt or die (2014), https://www.accountancylive.com/big-data-adapt-or-die (accessed June 15, 2014)
-
Brand, H.: Big data: adapt or die (2014), https://www.accountancylive.com/big-data-adapt-or-die (accessed June 15, 2014)
-
-
-
-
4
-
-
85132904355
-
Hackers outsmart pacemakers, fitbits: Worried yet?
-
(accessed June 14, 2014)
-
Carr, D.F.: Hackers outsmart pacemakers, fitbits: worried yet? InformationWeek (2013), http://www.informationweek.com/healthcare/security-and-privacy/hackers-outsmart-pacemakers-fitbits-worried-yet/d/d-id/1113000?image_number=3 (accessed June 14, 2014)
-
(2013)
Informationweek
-
-
Carr, D.F.1
-
5
-
-
85132930787
-
Information quality applied: Best practices for improving business information, Processes and Systems
-
English, L.P.: Information quality applied: best practices for improving business information, Processes and Systems. Wiley (2009)
-
(2009)
Wiley
-
-
English, L.P.1
-
6
-
-
85132867884
-
-
Forrester, Is your big data solution production-ready? (2013), http://www.itworld.com/data-center/417766/your-big-data-solution-production-ready (accessed June 15, 2014)
-
Forrester, Is your big data solution production-ready? (2013), http://www.itworld.com/data-center/417766/your-big-data-solution-production-ready (accessed June 15, 2014)
-
-
-
-
7
-
-
84890926068
-
Big data: Friend or foe of digital advertising? Five ways marketers should use digital big data to their advantage
-
Fulgoni, G.: Big data: friend or foe of digital advertising? Five ways marketers should use digital big data to their advantage. Journal of Advertising Research 53(4), 372–376 (2013)
-
(2013)
Journal of Advertising Research
, vol.53
, Issue.4
, pp. 372-376
-
-
Fulgoni, G.1
-
8
-
-
85132874398
-
Magic quadrant for data quality tools
-
accessed February 26, 2014
-
Gartner report, Magic quadrant for data quality tools (2013), http://www.gartner.com/technology/reprints.do?id=1-1LE6U4H&ct=131008&st=sg (accessed February 26, 2014)
-
(2013)
Gartner Report
-
-
-
9
-
-
84897562213
-
Big-data applications in the government sector
-
Kim, G.-H., Trimi, S., Chung, J.-H.: Big-data applications in the government sector. Communications of the ACM 57(3), 78–85 (2014)
-
(2014)
Communications of the ACM
, vol.57
, Issue.3
, pp. 78-85
-
-
Kim, G.-H.1
Trimi, S.2
Chung, J.-H.3
-
10
-
-
84900399014
-
Big data and management
-
George, G., Haas, M.R., Pentland, A.: Big data and management. Academy of Management Journal 57(2), 321–326 (2014)
-
(2014)
Academy of Management Journal
, vol.57
, Issue.2
, pp. 321-326
-
-
George, G.1
Haas, M.R.2
Pentland, A.3
-
13
-
-
85132927919
-
-
Grimes, R.: 5 signs you’ve been hit with an advanced persistent threat (2012), http://www.infoworld.com/d/security/5-signs-youve-been-hit-advanced-persistent-threat-20494 (accessed March 24, 2014)
-
Grimes, R.: 5 signs you’ve been hit with an advanced persistent threat (2012), http://www.infoworld.com/d/security/5-signs-youve-been-hit-advanced-persistent-threat-20494 (accessed March 24, 2014)
-
-
-
-
15
-
-
85132907979
-
Three guiding principles to improve data security and compliance: A holistic approach to data protection for a complex threat landscape
-
IBM Corporation. Three guiding principles to improve data security and compliance: A holistic approach to data protection for a complex threat landscape (2012)
-
(2012)
IBM Corporation
-
-
-
18
-
-
85132948439
-
-
McAffee, Needle in a datastack: the rise of big security data (2013), http://www.mcafee.com/us/about/news/2013/q2/20130617-01.aspx (accessed January 15, 2014)
-
McAffee, Needle in a datastack: the rise of big security data (2013), http://www.mcafee.com/us/about/news/2013/q2/20130617-01.aspx (accessed January 15, 2014)
-
-
-
-
19
-
-
85063421559
-
What’s the next big thing in big data? Bigger data
-
Lev-ram, M.: What’s the next big thing in big data? Bigger data. Fortune 169(8), 233–238 (2014)
-
(2014)
Fortune
, vol.169
, Issue.8
, pp. 233-238
-
-
Lev-Ram, M.1
-
20
-
-
85132846860
-
Seven sources of poor data quality
-
Mcknight, W.: Seven sources of poor data quality. Information Management 19(2), 32–33 (2009)
-
(2009)
Information Management
, vol.19
, Issue.2
, pp. 32-33
-
-
McKnight, W.1
-
21
-
-
84947214623
-
Big data: Next frontier for innovation, competition
-
McKinsey Global Institute, Big data: next frontier for innovation, competition, and productivity (2011)
-
(2011)
And Productivity
-
-
-
24
-
-
84880225734
-
Information systems success: The quest for the independent variables
-
Petter, S., DeLone, W., McLean, E.R.: Information systems success: the quest for the independent variables. Journal of Management Information Systems 29(4), 7–62 (2013)
-
(2013)
Journal of Management Information Systems
, vol.29
, Issue.4
, pp. 7-62
-
-
Petter, S.1
Delone, W.2
McLean, E.R.3
-
25
-
-
85132866660
-
-
Russom, P.: Integrating hadoop into business intelligence and datawarehousing. TWDI Research (2013), http://www.cloudera.com/content/dam/cloudera/Resources/PDF/TDWI%20Best%20Practices%20report%20-%20Hadoop%20foro%20BI%20and%20DW%20-%20April%202013.pdf (accessed February 15, 2014)
-
Russom, P.: Integrating hadoop into business intelligence and datawarehousing. TWDI Research (2013), http://www.cloudera.com/content/dam/cloudera/Resources/PDF/TDWI%20Best%20Practices%20report%20-%20Hadoop%20foro%20BI%20and%20DW%20-%20April%202013.pdf (accessed February 15, 2014)
-
-
-
-
26
-
-
84887792261
-
7 Top Information security trends for 2013
-
(accessed January 23, 2014)
-
Schwartz, M.J.: 7 Top Information security trends for 2013. InformationWeek (2012), http://www.darkreading.com/risk-management/7-top-information-security-trends-for-2013/d/d-id/1107955? (accessed January 23, 2014)
-
(2012)
Informationweek
-
-
Schwartz, M.J.1
-
27
-
-
84876840256
-
Leveraging digital technologies: How informa-tion quality leads to localized capabilities and customer service performance
-
Setia, P., Venkatesh, V., Joglekar, S.: Leveraging digital technologies: how informa-tion quality leads to localized capabilities and customer service performance. MIS Quarterly 37(2), 565-A4 (2013)
-
(2013)
MIS Quarterly
, vol.37
, Issue.2
, pp. 565-5A4
-
-
Setia, P.1
Venkatesh, V.2
Joglekar, S.3
-
28
-
-
85132908656
-
3 Big data security analytics techniques you can apply now to catch advanced persistent threats
-
Smith, R.F., Watson, B.: 3 Big data security analytics techniques you can apply now to catch advanced persistent threats. HP Enterprise Security (2013)
-
(2013)
HP Enterprise Security
-
-
Smith, R.F.1
Watson, B.2
-
30
-
-
85132891037
-
-
TDWI’s Data Quality Report, http://tdwi.org/research/2002/02/tdwis-data-quality-report.aspx (accessed March 2, 2014)
-
TDWI’s Data Quality Report, http://tdwi.org/research/2002/02/tdwis-data-quality-report.aspx (accessed March 2, 2014)
-
-
-
-
31
-
-
84869141956
-
-
accessed March 2, 2014
-
Verizon. 2013 Data Breach Investigations Report, http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf (accessed March 2, 2014)
-
(2013)
Data Breach Investigations Report
-
-
-
32
-
-
85127705211
-
-
accessed February 25, 2014
-
Woods, D.: Why data quality matters (2009), http://www.forbes.com/2009/08/31/software-engineers-enterprise-technology-cio-network-data.html (accessed February 25, 2014)
-
(2009)
Why Data Quality Matters
-
-
Woods, D.1
|