2Tene 0, Polonetsky J. Big Data for All: Privacy and User Control in the Age of Analytics [ J]. Northwestern Journal of Technology andIntellectual Property, 2013 (5) : 239.
3MichaelK, Miller K W. Big Data; New Opportunities and New Challenges [Guest Editors’ Introduction] [J]. Computer, 2013 (6):22 -24.
5Csa. Csa Releases the Expanded Top Ten Big Data Security & Privacy Challenges [ EB/OL] . [2014 -05 -02] .https: //cloudsecurityalliance. org/media/news/csa relea ses the expanded top ten big data security privacy challenges/.
6CumbleyR, Church P. Is “Big Data” Creepy [J]. Computer Law & Security Review, 2013 (5): 601 -609.
7Hasan O, Habegger B, Brunie L, et al. A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESSUse Case [C]. Big Data (Big Data Congress), 2013 IEEE International Congress on. IEEE, 2013: 25 -30.
8"HBCO. SPOT円 RE. Mitigating the Security Risks of Big Data [EB/OL] . [2014-05 -02]. http: // spot-fire.tibco.com/blog/. p =20027.
9Business Spectator. Big Data Mismanagement a Security Risk: McAfee [ EB/OL] . [2014 -05 -02] . http: //www. businessspectator. com. au/news/2013/6/19/technology/big data misman agement security risk mcafee.
10Cdrdenas A A, Manadhata P K, Rajan S P. Big Data Analytics for Security [J].IEEE Security & Privacy, 2013 (6) : 74 -76.