1Science Special online collection:Dealing with data[EB/OL].http://www.sciencemag.org/site/special/data/,2011.
2Surajit Chaudhuri.How Different Is Big Data?[C]//Proceedings of the 2012 IEEE 28th International Conference on Data Engineering.IEEE:2012.
3惠志斌.大数据时代个人信息安全保护[N].社会科学报,2013-04-11(003版).
4Tene 0, Polonetsky J. Big Data for All: Privacy and User Control in the Age of Analytics [ J]. Northwestern Journal of Technology andIntellectual Property, 2013 (5) : 239.
5MichaelK, Miller K W. Big Data; New Opportunities and New Challenges [Guest Editors’ Introduction] [J]. Computer, 2013 (6):22 -24.
7Csa. Csa Releases the Expanded Top Ten Big Data Security & Privacy Challenges [ EB/OL] . [2014 -05 -02] .https: //cloudsecurityalliance. org/media/news/csa relea ses the expanded top ten big data security privacy challenges/.
8CumbleyR, Church P. Is “Big Data” Creepy [J]. Computer Law & Security Review, 2013 (5): 601 -609.
9Hasan O, Habegger B, Brunie L, et al. A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESSUse Case [C]. Big Data (Big Data Congress), 2013 IEEE International Congress on. IEEE, 2013: 25 -30.
10"HBCO. SPOT円 RE. Mitigating the Security Risks of Big Data [EB/OL] . [2014-05 -02]. http: // spot-fire.tibco.com/blog/. p =20027.