{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:44:22Z","timestamp":1742975062738,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150310"},{"type":"electronic","value":"9783030150327"}],"license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-15032-7_48","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"571-583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Revealing Storage and Speed Transmission Emerging Technology of Big Data"],"prefix":"10.1007","author":[{"given":"Heru","family":"Susanto","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Didi","family":"Rosiyadi","sequence":"additional","affiliation":[]},{"given":"Chin Kang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"key":"48_CR1","unstructured":"Carr, N.G.: Does IT Matter? Information Technology and the Corrosion of Competitive Advantage (2004). \n                  https:\/\/books.google.com.bn\/books?id=XMqlN3RKpcYC&printsec=frontcover&dq=information+technology+competitive+world&hl=en&sa=X&ved=0ahUKEwix2I-u_JTLAhXWBY4KHSOqDP0Q6AEIGjAA#v=onepage&q=information%20technology%20competitive%20world&f=false\n                  \n                . Accessed 24 Feb 2016"},{"key":"48_CR2","unstructured":"Management Study Guide: Emerging Trends in Information Technology (2016). \n                  http:\/\/www.managementstudyguide.com\/emerging-trends-in-information-technology.htm\n                  \n                . Accessed 20 Feb 2016"},{"key":"48_CR3","unstructured":"Davis, J.: Big Data Predictions for 2016. InformationWeek, 4 January 2016. \n                  http:\/\/www.informationweek.com\/big-data\/big-data-analytics\/big-data-predictions-for-2016\/d\/d-id\/1323671\n                  \n                . Accessed 20 Feb 2016"},{"key":"48_CR4","unstructured":"Hinchcliffe, D.: The \u201cBig Five\u201d IT Trends of the Next Half Decade: Mobile, Social, Cloud, Consumerization and Big Data. ZDNet, 2 October 2011. \n                  http:\/\/www.zdnet.com\/article\/the-big-five-it-trends-of-the-next-half-decade-mobile-social-cloud-consumerization-and-big-data\/\n                  \n                . Accessed 24 Feb 2016"},{"key":"48_CR5","unstructured":"Filho, L.A.M.M., Ramos, A.S.M.: The perception of managers on the impacts of the internet in Brazilian hotels: an exploratory study. In: Kamel, S. (ed.) Managing Globally with Information Technology, pp. 244\u2013259 (2003). \n                  https:\/\/books.google.com.bn\/books?id=3sb5PUqBAiMC&pg=PA245&dq=importance+of+information+technology&hl=en&sa=X&ved=0ahUKEwjLxJXFm5XLAhWXWo4KHeObBA0Q6AEIGjAA#v=onepage&q=importance%20of%20information%20technology&f=false\n                  \n                . Accessed 23 Feb 2016"},{"key":"48_CR6","unstructured":"Frenzel, C.W., Frenzel, J.C.: Management of Information Technology (2004). \n                  https:\/\/books.google.com.bn\/books?id=nQgLAAAAQBAJ&pg=PA49&dq=information+technology+importance&hl=en&sa=X&ved=0ahUKEwiXmt_FoZXLAhVQjo4KHeK0C6oQ6AEIJTAC#v=onepage&q=information%20technology%20importance&f=false\n                  \n                . Accessed 23 Feb 2016"},{"key":"48_CR7","unstructured":"Schonberger, V.M., Cukier, K.: Big Data: A Revolution That Will Transform How We Live, Work, and Think (2013). \n                  https:\/\/books.google.com.bn\/books?id=HpHcGAkFEjkC&printsec=frontcover&dq=big+data+prediction+2016&hl=en&sa=X&ved=0ahUKEwitmu7GhpXLAhWJBI4KHXDoBQsQ6AEIPTAD#v=snippet&q=importance&f=false\n                  \n                . Accessed 22 Feb 2016"},{"key":"48_CR8","unstructured":"TechTarget: Information Technology (IT) (2016). \n                  http:\/\/searchdatacenter.techtarget.com\/definition\/IT\n                  \n                . Accessed 20 Feb 2016"},{"key":"48_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781315232355","volume-title":"Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard","author":"H Susanto","year":"2018","unstructured":"Susanto, H., Almunawar, M.N.: Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard. CRC Press, Boca Raton (2018)"},{"key":"48_CR10","unstructured":"Quinonez, N.: The Importance of Information Technology and Its Disadvantages (2014). \n                  https:\/\/blog.udemy.com\/importance-of-information-technology\/\n                  \n                . Accessed 17 Feb 2016"},{"key":"48_CR11","unstructured":"Butt, A.A.: The Role of Information Technology in Business Success (2015). \n                  https:\/\/www.linkedin.com\/pulse\/role-information-technology-business-success-abid-afzal-butt\n                  \n                . Accessed 17 Feb 2016"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Susanto, H.: Electronic health system: sensors emerging and intelligent technology approach. In: Smart Sensors Networks, pp. 189\u2013203 (2017)","DOI":"10.1016\/B978-0-12-809859-2.00012-7"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Susanto, H., Chen, C.K.: Macromolecules visualization through bioinformatics: an emerging tool of informatics. In: Applied Physical Chemistry with Multidisciplinary Approaches, p. 383 (2018)","DOI":"10.1201\/9781315169415-17"},{"key":"48_CR14","unstructured":"Koscielniak, H., Puto, A.: BIG DATA in decision making processes of enterprises. Proc. Comput. Sci. 65, 1052\u20131058 (2015). \n                  http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050915028835\n                  \n                . Accessed 18 Feb 2016"},{"key":"48_CR15","unstructured":"Schmarzo, B.: Driving Business Strategies with Data Science Big Data MBA (2016). \n                  https:\/\/books.google.com.bn\/books?id=tI8gCwAAQBAJ&pg=PA66&dq=experience+with+big+data&hl=en&sa=X&ved=0ahUKEwjpoOS44pXLAhUCGI4KHU1NB38Q6AEIKzAD#v=onepage&q=experience%20with%20big%20data&f=false\n                  \n                . Accessed 24 Feb 2016"},{"key":"48_CR16","unstructured":"Kudyba, S.: Big Data, Mining, and Analytics: Components of Strategic Decision Making (2014). \n                  https:\/\/books.google.com.bn\/books?id=nuoxAwAAQBAJ&pg=PA160&dq=experience+with+big+data&hl=en&sa=X&ved=0ahUKEwjpoOS44pXLAhUCGI4KHU1NB38Q6AEISjAI#v=onepage&q=experience%20with%20big%20data&f=false\n                  \n                . Accessed 24 Feb 2016"},{"key":"48_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.bdr.2015.04.001","volume":"2","author":"OY Al-Jarrah","year":"2015","unstructured":"Al-Jarrah, O.Y., Karagiannidis, G.K., Muhaidat, S., Taha, K., Yoo, P.D.: Efficient machine learning for big data: a review. Big Data Res. 2, 87\u201393 (2015). Big Data, Analytics, and High-Performance Computing","journal-title":"Big Data Res."},{"key":"48_CR18","unstructured":"Somro, T.R., Thavet, N.: Big data challenges. J. Comput. Eng. Inf. Technol. 5 (2015). \n                  https:\/\/www.researchgate.net\/profile\/Tariq_Soomro\/publication\/282281171_Big_Data_Challenges\/links\/560a53c908ae4d86bb137402.pdf\n                  \n                . Accessed 20 Feb 2015"},{"issue":"2","key":"48_CR19","doi-asserted-by":"publisher","first-page":"e4255","DOI":"10.1002\/cpe.4255","volume":"30","author":"JC Liu","year":"2018","unstructured":"Liu, J.C., Leu, F.Y., Lin, G.L., Susanto, H.: An MFCC-based text-independent speaker identification system for access control. Concurr. Comput.: Pract. Exp. 30(2), e4255 (2018)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"48_CR20","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.jnca.2015.08.014","volume":"58","author":"FY Leu","year":"2015","unstructured":"Leu, F.Y., Liu, C.Y., Liu, J.C., Jiang, F.C., Susanto, H.: S-PMIPv6: an intra-LMA model for IPv6 mobility. J. Netw. Comput. Appl. 58, 180\u2013191 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"48_CR21","unstructured":"Susanto, H.: Biochemistry apps as enabler of compound and dna computational: next-generation computing technology. In: Applied Chemistry and Chemical Engineering, Volume 4: Experimental Techniques and Methodical Developments, p. 181 (2017)"},{"key":"48_CR22","unstructured":"McGuire T., Manyika J., Chui M.: Why Big Data is the new competitive advantage. Ivey Bus. J. (2012). \n                  https:\/\/iveybusinessjournal.com\/publication\/why-big-data-is-the-new-competitive-advantage\/"},{"key":"48_CR23","unstructured":"Thibodeau, P.: New job realities ahead for IT workers (2016). \n                  http:\/\/www.computerworld.com\/article\/3023343\/it-careers\/new-job-realiities-ahead-for-it-workers.html\n                  \n                . Accessed 25 Feb 2016"},{"key":"48_CR24","unstructured":"Riahi, A., Riahi, S.: The big data revolution, issues and applications. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5 (2015). \n                  http:\/\/www.ijarcsse.com\/docs\/papers\/Volume_5\/8_August2015\/V5I8-0231.pdf\n                  \n                . Accessed 25 Feb 2016"},{"key":"48_CR25","doi-asserted-by":"crossref","unstructured":"Almunawar, M.N., Anshari, M., Susanto, H., Chen, C.K.:. How people choose and use their smartphones. In: Management Strategies and Technology Fluidity in the Asian Business Sector, pp. 235\u2013252. IGI Global (2018)","DOI":"10.4018\/978-1-5225-4056-4.ch014"},{"key":"48_CR26","doi-asserted-by":"crossref","unstructured":"Rosiyadi, D., Horng, S.J., Lestriandoko, N.H.: A resistant digital image watermarking scheme based on masking model. In: International Carnahan Conference on Security Technology, ICCST (2015)","DOI":"10.1109\/CCST.2015.7389701"},{"key":"48_CR27","doi-asserted-by":"crossref","unstructured":"Lestriandoko, N.H., Juhana T., Munir, R.: Security System for Surveillance Radar Network Communication Using Chaos Algorithm (2015). \n                  https:\/\/www.researchgate.net\/publication\/283518322_Security_system_for_surveillance_radar_network_communication_using_chaos_algorithm","DOI":"10.1109\/TSSA.2014.7065947"},{"key":"48_CR28","unstructured":"Hitachi Data Systems: Solve the Top 6 enterprise Storage Issues (2014). \n                  https:\/\/www.hds.com\/assets\/pdf\/hitachi-white-paper-solve-the-top-six-enterprise-storage-issues.pdf\n                  \n                . Accessed 23 Feb 2016"},{"key":"48_CR29","unstructured":"Indeed: Hitachi Data Systems (2016). \n                  http:\/\/www.indeed.com\/hire\/case-study\/hitachi-data-systems\n                  \n                . Accessed 19 Feb 2016"},{"key":"48_CR30","unstructured":"Eidelson, J.: Bloomberg. The Tech Worker Shortage Doesn\u2019t Really Exist, 24 November 2014. \n                  http:\/\/www.bloomberg.com\/bw\/articles\/2014-11-24\/the-tech-worker-shortage-doesnt-really-exist\n                  \n                . Accessed 25 Feb 2016"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15032-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:32:26Z","timestamp":1558150346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15032-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"ISBN":["9783030150310","9783030150327"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15032-7_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}