{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:12:49Z","timestamp":1763017969763,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:00:00Z","timestamp":1549324800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s41060-019-00176-2","type":"journal-article","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T05:33:09Z","timestamp":1549344789000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Problems with research methods in medical device big data analytics"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4333-4399","authenticated-orcid":false,"given":"Kenneth David","family":"Strang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,5]]},"reference":[{"issue":"1","key":"176_CR1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.procs.2016.09.119","volume":"100","author":"KA Salleh","year":"2016","unstructured":"Salleh, K.A., Janczewski, L.: Technical, organizational and environmental security and privacy issues of big data: a literature review. Proc. Comput. Sci. J. 100(1), 19\u201328 (2016)","journal-title":"Proc. Comput. Sci. J."},{"key":"176_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-018-0148-4","author":"D Berrar","year":"2018","unstructured":"Berrar, D., Dubitzky, W.: Should significance testing be abandoned in machine learning? Int. J. Data Sci. Anal. (2018). \nhttps:\/\/doi.org\/10.1007\/s41060-018-0148-4","journal-title":"Int. J. Data Sci. Anal."},{"issue":"1","key":"176_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40745-016-0096-6","volume":"4","author":"KD Strang","year":"2017","unstructured":"Strang, K.D., Sun, Z.: Scholarly big data body of knowledge: what is the status of privacy and security? Ann. Data Sci. 4(1), 1\u201317 (2017). \nhttps:\/\/doi.org\/10.1007\/s40745-016-0096-6","journal-title":"Ann. Data Sci."},{"key":"176_CR4","unstructured":"Sun, Z., Strang, K.D., Li, R.: Ten bigs of big data: a multidisciplinary framework. In: Proceedings of 10th ACM International Conference on Research and Practical Issues of Enterprise Information Systems, IFIP TC8 working group 8.9, Austria. pp. 550\u2013661 (2016)"},{"key":"176_CR5","volume-title":"Insights on Governance, Risk and Compliance: Big Data, Changing the Way Businesses Compete and Operate","author":"P Kessel","year":"2014","unstructured":"Kessel, P., et al.: Insights on Governance, Risk and Compliance: Big Data, Changing the Way Businesses Compete and Operate. Ernest and Young, London (2014)"},{"issue":"1","key":"176_CR6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.chb.2015.12.050","volume":"58","author":"MS Eastin","year":"2016","unstructured":"Eastin, M.S., et al.: Living in a big data world: predicting mobile commerce activity through privacy concerns. Comput. Hum. Behav. 58(1), 214\u2013220 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"6279","key":"176_CR7","first-page":"1274","volume":"351","author":"YA Montjoye de","year":"2016","unstructured":"de Montjoye, Y.A., Pentland, A.S.: Response to comment on \u201cUnique in the shopping mall: on the reidentifiability of credit card me tadata\u201d. Sci. J. 351(6279), 1274 (2016)","journal-title":"Sci. J."},{"issue":"5","key":"176_CR8","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/08874417.2016.1181497","volume":"56","author":"KD Strang","year":"2016","unstructured":"Strang, K.D., Sun, Z.: Analyzing relationships in terrorism big data using Hadoop and statistics. J. Comput. Inf. Syst. 56(5), 55\u201365 (2016). \nhttps:\/\/doi.org\/10.1080\/08874417.2016.1181497","journal-title":"J. Comput. Inf. Syst."},{"key":"176_CR9","doi-asserted-by":"crossref","unstructured":"Vajjhala, N.R., Strang, K.D., Sun, Z.: Statistical modeling and visualizing of open big data using a terrorism case study. In: Open Big Data Conference. IEEE, Rome, Italy (2015)","DOI":"10.1109\/FiCloud.2015.15"},{"issue":"3","key":"176_CR10","first-page":"1560","volume":"8","author":"BL Filkins","year":"2016","unstructured":"Filkins, B.L., et al.: Privacy and security in the era of digital health: what should translational researchers know and do about it? Am. J. Transl. Res. 8(3), 1560\u20131580 (2016)","journal-title":"Am. J. Transl. Res."},{"issue":"2","key":"176_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1142\/s1793005717002983","volume":"13","author":"NR Vajjhala","year":"2017","unstructured":"Vajjhala, N.R., Strang, K.D.: Measuring organizational-fit through socio-cultural big data. J. New Math. Nat. Comput. 13(2), 145\u2013158 (2017). \nhttps:\/\/doi.org\/10.1142\/s1793005717002983","journal-title":"J. New Math. Nat. Comput."},{"issue":"1","key":"176_CR12","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ins.2014.01.015","volume":"275","author":"CLP Chen","year":"2014","unstructured":"Chen, C.L.P., Zhang, C.Y.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. J. 275(1), 314\u2013317 (2014)","journal-title":"Inf. Sci. J."},{"key":"176_CR13","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.1057\/9781137484956","volume-title":"Palgrave Handbook of Research Design in Business and Management","author":"KD Strang","year":"2015","unstructured":"Strang, K.D.: Palgrave Handbook of Research Design in Business and Management. Palgrave Macmillan, New York (2015). ISBN 978-1-137-48495-6","ISBN":"https:\/\/id.crossref.org\/isbn\/9781137484956"},{"issue":"4","key":"176_CR14","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1504\/IJBIDM.2015.072211","volume":"10","author":"U Jovanovi","year":"2015","unstructured":"Jovanovi, U., Stimec, A., Vladusi, D.: Big-data analytics: a critical review and some future directions. Int. J. Bus. Intell. Data Min. 10(4), 337\u2013355 (2015)","journal-title":"Int. J. Bus. Intell. Data Min."},{"issue":"1","key":"176_CR15","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1111\/jlme.12214","volume":"43","author":"N Terry","year":"2015","unstructured":"Terry, N.: Navigating the incoherence of big data reform proposals. J. Law Med. Ethics 43(1), 44\u201347 (2015)","journal-title":"J. Law Med. Ethics"},{"key":"176_CR16","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1418631","author":"Z Sun","year":"2018","unstructured":"Sun, Z., Strang, K.D., Pambel, F.: Privacy and security in the big data paradigm. J. Comput. Inf. Syst. (2018). \nhttps:\/\/doi.org\/10.1080\/08874417.2017.1418631","journal-title":"J. Comput. Inf. Syst."},{"key":"176_CR17","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1111\/jlme.12040","volume":"41","author":"S Hoffman","year":"2013","unstructured":"Hoffman, S., Podgurski, A.: Big bad data: law, public health, and biomedical databases. J. Law Med. Ethics 41, 56\u201360 (2013)","journal-title":"J. Law Med. Ethics"},{"issue":"8","key":"176_CR18","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1002\/asi.23294","volume":"66","author":"H Ekbia","year":"2015","unstructured":"Ekbia, H., et al.: Big data, bigger dilemmas: a critical review. J. Assoc. Inf. Sci. Technol. 66(8), 1523\u20131545 (2015)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"2","key":"176_CR19","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","volume":"35","author":"A Gandomi","year":"2015","unstructured":"Gandomi, A., Haider, M.: Beyond the hype: big data concepts, methods, and analytics. Int. J. Inf. Manag. 35(2), 137\u2013144 (2015)","journal-title":"Int. J. Inf. Manag."},{"issue":"2","key":"176_CR20","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1504\/IJTMCC.2018.095608","volume":"4","author":"KD Strang","year":"2018","unstructured":"Strang, K.D.: Socio-cultural distrust of Internet information. Int. J. Trust Manag. Comput. Commun. 4(2), 95\u2013110 (2018)","journal-title":"Int. J. Trust Manag. Comput. Commun."},{"issue":"2","key":"176_CR21","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.giq.2016.04.002","volume":"33","author":"B Loenen van","year":"2016","unstructured":"van Loenen, B., Kulk, S., Ploeger, H.: Data protection legislation: a very hungry caterpillar: the case of mapping data in the European Union. Gov. Inf. Q. 33(2), 338\u2013345 (2016)","journal-title":"Gov. Inf. Q."},{"key":"176_CR22","doi-asserted-by":"publisher","first-page":"504","DOI":"10.4018\/4978-4011-5225-7119-4013.ch4027","volume-title":"Violent Extremism: Breakthroughs in Research and Practice","author":"ME Korstanje","year":"2019","unstructured":"Korstanje, M.E., Strang, K.D.: Comparing the socio-political ethics of fighting terrorism with extreme self-defense. In: IRMA (ed.) Violent Extremism: Breakthroughs in Research and Practice, pp. 504\u2013524. Information Resources Management Association, Hershey (2019). \nhttps:\/\/doi.org\/10.4018\/4978-4011-5225-7119-4013.ch4027"},{"issue":"11","key":"176_CR23","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","volume":"38","author":"N Kshetri","year":"2014","unstructured":"Kshetri, N.: Big datas impact on privacy, security and consumer welfare. Telecommun. Policy 38(11), 1134\u20131145 (2014)","journal-title":"Telecommun. Policy"},{"issue":"2","key":"176_CR24","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1177\/003335491513000211","volume":"130","author":"JH Thorpe","year":"2015","unstructured":"Thorpe, J.H., Gray, E.A.: Law and the Public\u2019s Health: big data and public health\u2014navigating privacy laws to maximize potential. Public Health Rep. 130(2), 171\u2013175 (2015)","journal-title":"Public Health Rep."},{"issue":"2","key":"176_CR25","first-page":"713","volume":"37","author":"M Zwart De","year":"2014","unstructured":"De Zwart, M., Humphreys, S., Van Dissel, B.: Surveillance, big data and democracy: lessons for Australia from the US and UK. Univ. N. S. W. Law J. 37(2), 713\u2013747 (2014)","journal-title":"Univ. N. S. W. Law J."},{"issue":"2","key":"176_CR26","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1057\/rm.2015.8","volume":"17","author":"KD Strang","year":"2015","unstructured":"Strang, K.D.: Exploring the relationship between global terrorist ideology and attack methodology. Risk Manag. J. 17(2), 65\u201390 (2015). \nhttps:\/\/doi.org\/10.1057\/rm.2015.8","journal-title":"Risk Manag. J."},{"key":"176_CR27","doi-asserted-by":"crossref","first-page":"455","DOI":"10.4018\/978-1-5225-0988-2.ch026","volume-title":"Violence and Society: Breakthroughs in Research and Practice","author":"KD Strang","year":"2017","unstructured":"Strang, K.D., Alamieyeseigha, S.: What and where are the risks of international terrorist attacks. In: IRMA (ed.) Violence and Society: Breakthroughs in Research and Practice, pp. 455\u2013476. Information Resources Management Association (IRMA), Hershey (2017)"},{"key":"176_CR28","first-page":"A12","volume-title":"Hacker Releases More Democratic Party Files, Renewing Fears of Russian Meddling","author":"E Lichtblau","year":"2016","unstructured":"Lichtblau, E., Weilandaug, N.: Hacker Releases More Democratic Party Files, Renewing Fears of Russian Meddling, p. A12. New York Times, New York City (2016)"},{"issue":"7","key":"176_CR29","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1016\/j.drudis.2013.12.004","volume":"19","author":"SJ Lusher","year":"2014","unstructured":"Lusher, S.J., et al.: Data-driven medicinal chemistry in the era of big data. Drug Discov. Today 19(7), 859\u2013868 (2014)","journal-title":"Drug Discov. Today"},{"key":"176_CR30","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1177\/003335491513000211","volume":"130","author":"JH Thorpe","year":"2015","unstructured":"Thorpe, J.H., Gray, E.A.: Law and the Public\u2019s Health: big data and public health\u2014navigating privacy laws to maximize potential. Public Health Rep. 130, 171 (2015)","journal-title":"Public Health Rep."},{"issue":"1","key":"176_CR31","first-page":"1","volume":"9","author":"ADA","year":"2015","unstructured":"ADA: Harnessing big data to help stop diabetes American Diabetes Association stragtegy. Am. J. Manag. Care 9(1), 1\u20134 (2015)","journal-title":"Am. J. Manag. Care"},{"key":"176_CR32","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1111\/jlme.12258","volume":"43","author":"MA Rothstein","year":"2015","unstructured":"Rothstein, M.A.: Ethical issues in big data health research: currents in contemporary bioethics. J. Law Med. Ethics 43, 425 (2015)","journal-title":"J. Law Med. Ethics"},{"key":"176_CR33","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.ijpe.2015.02.014","volume":"165","author":"RY Zhong","year":"2015","unstructured":"Zhong, R.Y., et al.: A big data approach for logistics trajectory discovery from RFID-enabled production data. Int. J. Prod. Econ. 165, 260\u2013272 (2015)","journal-title":"Int. J. Prod. Econ."},{"key":"176_CR34","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/0361526X.2014.879805","volume":"66","author":"S Vaidhyanathan","year":"2014","unstructured":"Vaidhyanathan, S., Bulock, C.: Knowledge and dignity in the era of big data. Ser. Libr. 66, 49 (2014)","journal-title":"Ser. Libr."},{"issue":"1\u20134","key":"176_CR35","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1080\/0361526X.2014.879805","volume":"66","author":"S Vaidhyanathan","year":"2014","unstructured":"Vaidhyanathan, S., Bulock, C.: Knowledge and dignity in the era of big data. Ser. Libr. 66(1\u20134), 49\u201364 (2014)","journal-title":"Ser. Libr."},{"issue":"6","key":"176_CR36","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1177\/0263775815595814","volume":"33","author":"A Leszczynski","year":"2015","unstructured":"Leszczynski, A.: Spatial big data and anxieties of control. Environ. Plan. D Soc. Space 33(6), 965\u2013984 (2015)","journal-title":"Environ. Plan. D Soc. Space"},{"issue":"2","key":"176_CR37","first-page":"49","volume":"56","author":"RM Hogarth","year":"2015","unstructured":"Hogarth, R.M., Soyer, E.: Using simulated experience to make sense of big data. MIT Sloan Manag. Rev. 56(2), 49\u201354 (2015)","journal-title":"MIT Sloan Manag. Rev."},{"key":"176_CR38","volume-title":"Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data","author":"P Zikopoulos","year":"2011","unstructured":"Zikopoulos, P., et al.: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw-Hill Osborne Media, New York (2011)"},{"issue":"2","key":"176_CR39","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1200\/JOP.2014.001308","volume":"10","author":"JC Ward","year":"2014","unstructured":"Ward, J.C.: Oncology reimbursement in the era of personalized medicine and big data. J. Oncol. Pract. 10(2), 83\u201386 (2014)","journal-title":"J. Oncol. Pract."},{"key":"176_CR40","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ins.2014.05.037","volume":"281","author":"Y Shen","year":"2014","unstructured":"Shen, Y., Zhang, Y.: Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming. Inf. Sci. 281, 201\u2013210 (2014)","journal-title":"Inf. Sci."},{"issue":"2","key":"176_CR41","doi-asserted-by":"crossref","first-page":"255","DOI":"10.24908\/ss.v12i2.4600","volume":"12","author":"M Otterlo van","year":"2014","unstructured":"van Otterlo, M.: Automated experimentation in Walden 3.0: the next step in profiling, predicting, control and surveillance. Surveill. Soc. 12(2), 255\u2013272 (2014)","journal-title":"Surveill. Soc."},{"issue":"1","key":"176_CR42","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al-Ameen","year":"2012","unstructured":"Al-Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93\u2013101 (2012)","journal-title":"J. Med. Syst."},{"issue":"12","key":"176_CR43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/2814340","volume":"58","author":"O Angiuli","year":"2015","unstructured":"Angiuli, O., Blitzstein, J., Waldo, J.: How to de-identify your data. Commun. ACM 58(12), 48\u201355 (2015)","journal-title":"Commun. ACM"},{"key":"176_CR44","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ins.2015.05.040","volume":"318","author":"H Wang","year":"2015","unstructured":"Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. 318, 48\u201350 (2015)","journal-title":"Inf. Sci."},{"key":"176_CR45","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MS.2014.47","volume":"31","author":"F Shull","year":"2014","unstructured":"Shull, F.: The true cost of mobility? IEEE Softw. 31, 5\u20139 (2014)","journal-title":"IEEE Softw."},{"key":"176_CR46","doi-asserted-by":"publisher","first-page":"e0195487","DOI":"10.1371\/journal.pone.0195487","volume":"13","author":"H Tahir","year":"2018","unstructured":"Tahir, H., Tahir, R., McDonald-Maier, K.: On the security of consumer wearable devices in the Internet of Things. PLoS One 13, e0195487 (2018). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0195487","journal-title":"PLoS One"},{"issue":"41","key":"176_CR47","first-page":"1","volume":"10","author":"B Brown","year":"2008","unstructured":"Brown, B.: HIPAA beyond HIPAA: ONCHIT, ONC, AHIC, HITSP, and CCHIT. J. Health Care Compliance 10(41), 1\u201321 (2008)","journal-title":"J. Health Care Compliance"},{"issue":"1","key":"176_CR48","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. J. 57(1), 1701\u20131818 (2010)","journal-title":"UCLA Law Rev. J."},{"issue":"1","key":"176_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijrcm.2015010101","volume":"4","author":"KD Strang","year":"2015","unstructured":"Strang, K.D., Alamieyeseigha, S.: What and where are the risks of international terrorist attacks: a descriptive study of the evidence. Int. J. Risk Conting. Manag. 4(1), 1\u201318 (2015). \nhttps:\/\/doi.org\/10.4018\/ijrcm.2015010101","journal-title":"Int. J. Risk Conting. Manag."},{"key":"176_CR50","volume-title":"IBM SPSS Statistics for Windows, Version 21","author":"IBM","year":"2013","unstructured":"IBM: IBM SPSS Statistics for Windows, Version 21. International Business Machines Corporation (IBM), Armonk (2013)"},{"issue":"1","key":"176_CR51","first-page":"145","volume":"7","author":"MP Couper","year":"2013","unstructured":"Couper, M.P.: Is the sky falling? New technology, changing media, and the future of surveys. Surv. Res. Methods J. 7(1), 145\u2013156 (2013)","journal-title":"Surv. Res. Methods J."},{"issue":"2","key":"176_CR52","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1257\/jep.28.2.3","volume":"28","author":"HR Varian","year":"2014","unstructured":"Varian, H.R.: Big data: new tricks for econometrics. J. Econ. Perspect. 28(2), 3\u201327 (2014)","journal-title":"J. Econ. Perspect."},{"key":"176_CR53","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2016","unstructured":"Al-Janabi, S., et al.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18, 113\u2013122 (2016)","journal-title":"Egypt. Inform. J."},{"issue":"3","key":"176_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijrcm.2013070101","volume":"2","author":"KD Strang","year":"2013","unstructured":"Strang, K.D.: Homeowner behavioral intent to evacuate after flood warnings. Int. J. Risk Conting. Manag. 2(3), 1\u201328 (2013). \nhttps:\/\/doi.org\/10.4018\/ijrcm.2013070101","journal-title":"Int. J. Risk Conting. Manag."},{"issue":"4","key":"176_CR55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jal.2012100101","volume":"2","author":"KD Strang","year":"2012","unstructured":"Strang, K.D.: Logistic planning with nonlinear goal programming models in spreadsheets. Int. J. Appl. Logist. 2(4), 1\u201314 (2012)","journal-title":"Int. J. Appl. Logist."},{"key":"176_CR56","first-page":"1203","volume":"343","author":"DM Lazer","year":"2014","unstructured":"Lazer, D.M., Kennedy, R., King, G., et al.: The parable of Google Flu: traps in big data analysis. Sci. J. 343, 1203 (2014)","journal-title":"Sci. J."},{"issue":"1","key":"176_CR57","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1093\/nsr\/nwt032","volume":"1","author":"J Fan","year":"2014","unstructured":"Fan, J., Han, F., Liu, H.: Challenges of big data analysis. Natl. Sci. Rev. J. 1(1), 293\u2013314 (2014)","journal-title":"Natl. Sci. Rev. J."},{"key":"176_CR58","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1057\/9781137484956_5","volume-title":"Palgrave Handbook of Research Design in Business and Management","author":"KD Strang","year":"2015","unstructured":"Strang, K.D.: Selecting research techniques for a method and strategy. In: Strang, K.D. (ed.) Palgrave Handbook of Research Design in Business and Management, pp. 63\u201380. Palgrave Macmillan, New York (2015)"},{"key":"176_CR59","volume-title":"Multivariate Data Analysis","author":"JF Hair","year":"2006","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., et al.: Multivariate Data Analysis, 6th edn. Prentice-Hall, Upper Saddle River (2006)","edition":"6"},{"issue":"5","key":"176_CR60","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1057\/jam.2012.14","volume":"13","author":"KD Strang","year":"2012","unstructured":"Strang, K.D.: Man versus math: behaviorist exploration of post-crisis non-banking asset management. J. Asset Manag. 13(5), 348\u2013467 (2012)","journal-title":"J. Asset Manag."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-019-00176-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-019-00176-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-019-00176-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,16]],"date-time":"2020-02-16T19:07:29Z","timestamp":1581880049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-019-00176-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,5]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1007\/s41060-019-00176-2","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"type":"print","value":"2364-415X"},{"type":"electronic","value":"2364-4168"}],"subject":[],"published":{"date-parts":[[2019,2,5]]},"assertion":[{"value":"18 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}