{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:41:00Z","timestamp":1651884060617},"reference-count":34,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4,1]]},"abstract":"<p>Big Data refers to data volumes in the range of exabytes (1018th) requiring processing from distributed on-line storage systems with thousands of processors, mainframes or supercomputers where processing speed is measured in GFLOPS. The rate at which data are being collected are accelerating and will approach the zettabyte\/year range. Other attributes of Bi Data are also concurrently expanding including variety\/variability, velocity, value, and vital concerns for veracity. Storage and data transport technology issues may be solvable in the near-term. However, these communication, quantity management, and processing technologies also represent long-term challenges that require research, paradigms and analytical practices. This paper extends the authors' previous analysis of the issues and challenges with Big Data. It presents a table that contrasts their previous research finding and projects with the state of Big Data today, and their projections of what managers and decision makers will (or should) seek to accomplish as the Big Data universe continues to expand and evolve.<\/p>","DOI":"10.4018\/ijssoe.2017040101","type":"journal-article","created":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T14:24:26Z","timestamp":1506954266000},"page":"1-23","source":"Crossref","is-referenced-by-count":1,"title":["Big Data"],"prefix":"10.4018","volume":"7","author":[{"given":"Stephen H.","family":"Kaisler","sequence":"first","affiliation":[{"name":"SHK & Associates, Laurel, MD, USA"}]},{"given":"William H.","family":"Money","sequence":"additional","affiliation":[{"name":"Baker School of Business, The Citadel, Charleston, SC, USA"}]},{"given":"Frank","family":"Armour","sequence":"additional","affiliation":[{"name":"American University, Washington, DC, USA"}]},{"given":"J. Alberto","family":"Espinosa","sequence":"additional","affiliation":[{"name":"American University, Washington, DC, USA"}]}],"member":"2432","reference":[{"key":"IJSSOE.2017040101-0","author":"I.Ayres","year":"2007","journal-title":"Supercrunchers"},{"key":"IJSSOE.2017040101-1","unstructured":"Boyd, D., & Craford, K. (2011). Six Provocations for Big Data. In A Decade in Internet Time:Symposium on the Dynamics of the Internet and Society, Oxford Internet Institute."},{"key":"IJSSOE.2017040101-2","doi-asserted-by":"publisher","DOI":"10.5334\/dsj-2015-002"},{"key":"IJSSOE.2017040101-3","unstructured":"Choucri, N. et al. (2006, January). Understanding and Modeling State stability: Exploiting System Dynamics (No. 4574-06). MIT Sloan Research Papers."},{"key":"IJSSOE.2017040101-4","unstructured":"Cioffi-Revilla, C. (1998). Politics and Uncertainty: Theory, Models and Applications. Cambridge University Press."},{"key":"IJSSOE.2017040101-5","doi-asserted-by":"crossref","unstructured":"Collier, P., & Hoeffler, A. (2000). Greed and Grievance in Civil War (Policy Research Working Paper No. 2355). World Bank.","DOI":"10.1596\/1813-9450-2355"},{"key":"IJSSOE.2017040101-6","unstructured":"Felten, E. (2010). Needle in a Haystack Problems. Retrieved from https:\/\/freedom-to-tinker.com\/blog\/felten\/needle-haystack-problems\/"},{"key":"IJSSOE.2017040101-7","unstructured":"Fox, B. (2011). Leveraging Big Data for Big Impact. Health Management Technology. Retrieved from http:\/\/www.healthmgttech.com\/"},{"key":"IJSSOE.2017040101-8","unstructured":"Gantz, J. & Reinsel, E. (2011). Extracting Value from Chaos. IDC\u2019s Digital Universe Study."},{"key":"IJSSOE.2017040101-9","doi-asserted-by":"crossref","unstructured":"Gao, J., Xie, C., & Tao, C. (2016). Big Data Validation and Quality Assurance \u2013 Issues, Challenges, and Needs. In Proceedings of the IEEE 10th IEEE International Symposium on Service-Oriented System Engineering, University of Oxford, UK.","DOI":"10.1109\/SOSE.2016.63"},{"key":"IJSSOE.2017040101-10","author":"M.Gladwell","year":"2000","journal-title":"The Tipping Point: How Little Things can Make a Big Difference"},{"key":"IJSSOE.2017040101-11","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"IJSSOE.2017040101-12","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536632"},{"key":"IJSSOE.2017040101-13","unstructured":"JASON. (2008). Data Analysis Challenges. The Mitre Corporation, McLean, VA."},{"key":"IJSSOE.2017040101-14","year":"2013","journal-title":"Technical Challenges of Exascale Computing"},{"key":"IJSSOE.2017040101-15","unstructured":"Kaisler, S. 2012. \u201cAdvanced Analytics\u201d, CATALYST Technical Report, i_SW Corporation, Arlington, VA"},{"key":"IJSSOE.2017040101-16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.645"},{"key":"IJSSOE.2017040101-17","doi-asserted-by":"crossref","unstructured":"Kaisler, S., Armour, F., Money, W., & Espinosa, A. (2014). Advanced Analytics: Issues and Challenges. In Proceedings of the47th Hawai\u2019i International Conference on System Sciences, Hilton Waikoloa, The Big Island, HI.","DOI":"10.1109\/HICSS.2014.98"},{"key":"IJSSOE.2017040101-18","article-title":"Quantitative and Computational Social Sciences Tutorial","author":"S.Kaisler","year":"2007)","journal-title":"40th Hawai\u2019i International Conference on System Sciences"},{"key":"IJSSOE.2017040101-19","doi-asserted-by":"crossref","unstructured":"Kaisler, S., Money, W., & Cohen, S. J. (2012). A Decision Framework for Cloud Computing. In Proceedings of the45th Hawai\u2019i International Conference on System Sciences, Grand Wailea, Maui, HI, Jan 4-7.","DOI":"10.1109\/HICSS.2012.52"},{"key":"IJSSOE.2017040101-20","unstructured":"Kang, U. (2012). Mining Tera-scale Graphs with MapReduce: Theory, Engineering, and Discoveries [PhD. Thesis]. Computer Science, Carnegie-Mellon University, Pittsburgh, PA."},{"key":"IJSSOE.2017040101-21","author":"R.Nisbett","year":"2003","journal-title":"Geography of Thought: How Asians and Westerners Think Differently \u2026 and Why"},{"key":"IJSSOE.2017040101-22","article-title":"\u201cStrategic Automated Discovery System (STRADS)\u201d, published","author":"C.Oresky","year":"1990","journal-title":"Knowledge Based Simulation: Methodology and Application"},{"key":"IJSSOE.2017040101-23","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"IJSSOE.2017040101-24","doi-asserted-by":"publisher","DOI":"10.5711\/morj.8.1.5"},{"key":"IJSSOE.2017040101-25","unstructured":"Ritchey, T. (2005). Wicked Problems: Structuring Social Messes with Morphological Analysis. Swedish Morphological Society. Retrieved from http:\/\/www.swemorph.com\/wp.html"},{"key":"IJSSOE.2017040101-26","doi-asserted-by":"publisher","DOI":"10.1007\/BF01405730"},{"key":"IJSSOE.2017040101-27","unstructured":"Satter, R. (2013) The Big Story, Retrieved October 29, 2013 from http:\/\/bigstory.ap.org\/article\/uk-firm-must-stop-tracking-people-trash-cans"},{"key":"IJSSOE.2017040101-28","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076453"},{"key":"IJSSOE.2017040101-29","author":"S.Struhl","year":"2015","journal-title":"Text Analytics and Finding the Needle in the Haystack"},{"key":"IJSSOE.2017040101-30","author":"N.Taleb","year":"2010","journal-title":"The Black Swan: The Impact of the Highly Improbable"},{"key":"IJSSOE.2017040101-31","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518099"},{"key":"IJSSOE.2017040101-32","unstructured":"Wikipedia. (n. d.). List of Cognitive Biases. Retrieved from https:\/\/en.wikipedia.org\/wiki\/List_of_cognitive_biases"},{"key":"IJSSOE.2017040101-33","unstructured":"Zhang, Y. (2008). Constraint Solver Techniques for Implementing Precise and Scalable Static Program Analysis. Technical University of Denmark."}],"container-title":["International Journal of Systems and Service-Oriented Engineering"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=190410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:05:20Z","timestamp":1651881920000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSSOE.2017040101"}},"subtitle":["The Path to Maturity"],"short-title":[],"issued":{"date-parts":[[2017,4,1]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijssoe.2017040101","relation":{},"ISSN":["1947-3052","1947-3060"],"issn-type":[{"value":"1947-3052","type":"print"},{"value":"1947-3060","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,1]]}}}