{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T11:06:28Z","timestamp":1776942388198,"version":"3.51.4"},"reference-count":44,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2020,3,3]]},"DOI":"10.1080\/08874417.2017.1418631","type":"journal-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T21:27:07Z","timestamp":1518125227000},"page":"146-155","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":43,"title":["Privacy and security in the big data paradigm"],"prefix":"10.1080","volume":"60","author":[{"given":"Zhaohao","family":"Sun","sequence":"first","affiliation":[{"name":"Department of Business Studies, PNG University of Technology, Lae, Morobe, Papua New Guinea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kenneth David","family":"Strang","sequence":"additional","affiliation":[{"name":"Plattsburgh, School of Business & Economics, State University of New York, Queensbury, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisca","family":"Pambel","sequence":"additional","affiliation":[{"name":"Department of Business Studies, PNG University of Technology, Lae, Morobe, Papua New Guinea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-016-0096-6"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1220239"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Hubaux J-P, Juels A. Privacy is dead, long live privacy. Communications of the ACM. 2016;59(6):39\u201341.","DOI":"10.1145\/2834114"},{"issue":"3","key":"CIT0004","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1097\/JAC.0000000000000041","volume":"37","author":"Goldfield NI","year":"2014","journal-title":"J Ambul Care Manage"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.01.003"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/2500873"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.2190\/ET.2143.2192.d]"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0059-y"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1126\/science.347.6221.468"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.050"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23294"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/0145935X.2014.955382"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2014.10.002"},{"issue":"3","key":"CIT0017","first-page":"1560","volume":"8","author":"Filkins B. L.","year":"2016","journal-title":"Am J Transl Res"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1111\/jlme.12040"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1177\/003335491513000211"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.16"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1177\/0263775815595814"},{"key":"CIT0023","volume-title":"Intelligent Techniques in E-Commerce: A Case-based Reasoning Perspective","volume":"2004","author":"Sun Z","year":"2010"},{"key":"CIT0024","volume-title":"Management Information Systems: Managing the Digital Firm","author":"Laudon KG","year":"2016","edition":"14"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1111\/jlme.12258"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2017.01.004"},{"issue":"7","key":"CIT0027","first-page":"1880","volume":"126","author":"Solove DJ","year":"2013","journal-title":"Harv Law Rev"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1183977"},{"key":"CIT0030","volume-title":"Big Data: A Revolution that Will Transform How We Live, Work, and Think","author":"Mayer-Schoenberger V","year":"2013"},{"key":"CIT0031","first-page":"61","author":"McAfee A","year":"2012","journal-title":"Harv Bus Rev"},{"key":"CIT0032","volume-title":"and Analytic Trends for Today\u2019s Businesses","author":"Chambers M","year":"2014"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.05.040"},{"key":"CIT0034","first-page":"285","volume-title":"Procedia Computer Science","author":"Ou L","year":"2016"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.119"},{"issue":"2","key":"CIT0037","first-page":"8","volume":"13","author":"Sun Z","year":"2017","journal-title":"J New Math Nat Comput"},{"key":"CIT0040","unstructured":"Sun Z, Wang P, Strang K. A mathematical theory of big data. IEEE Transactions on Knowledge and Data Engineering; 2017, IEEE Computer Society, p. Under Review. 2017."},{"issue":"3","key":"CIT0041","first-page":"5681","volume":"10","author":"Kumar B","year":"2015","journal-title":"Int J Appl Eng Res"},{"key":"CIT0043","volume-title":"Big data analytics: Disruptive technologies for changing the game","author":"Sathi A","year":"2013"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.2307\/41703503"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1201\/b14700-2"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.015"},{"key":"CIT0049","unstructured":"Loshin D. Big Data Analytics: from Strategic Planning to Enterprise Integration woth Tools. Techniques, NoSQL and Graph. Amsterdam: Elsevier; 2013."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.007"},{"key":"CIT0051","author":"Dana M","year":"2012","journal-title":"Wall Streat J"},{"key":"CIT0052","volume-title":"The power of habit: Why we do what we do in life and business","author":"Duhigg C","year":"2014"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1002\/9781118029145"},{"key":"CIT0056","volume-title":"Applied multiple regression\/correlation analysis for the behavioral sciences","author":"Cohen J","year":"2003","edition":"3"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2017.1418631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T19:24:06Z","timestamp":1584386646000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2017.1418631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,8]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3,3]]}},"alternative-id":["10.1080\/08874417.2017.1418631"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2017.1418631","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}