Prioritizing and Ranking the Big Data Information Security Risk Spectrum View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2017-05-09

AUTHORS

S. Vijayakumar Bharathi

ABSTRACT

Big data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed the characteristics, technology and business application of big data, less literature has addressed the information security risk assessment of big data, to which this paper contributes to. This research work shows a big data information security risk spectrum comprised of 25 well-defined risk factors into seven constructs that are prioritized and ranked. The unique contribution of the paper is the mix of analytic hierarchy process, one of the most popular multi-criteria decision-making methods with the Delphi technique, another popular group decision-making technique. The results state that new-age technology risk factors like data brokering, global exposure to personal data, lack of governance-based security design are the top three risk factors which are considered from the standpoint of security, privacy and governance in big data management. More... »

PAGES

183-201

References to SciGraph publications

  • 2015-03. Forecasting with Big Data: A Review in ANNALS OF DATA SCIENCE
  • 2016-05-27. Applications of Big Data Analytics Tools for Data Management in BIG DATA OPTIMIZATION: RECENT DEVELOPMENTS AND CHALLENGES
  • 2009-08-18. Assessing the relative contribution of the facets of agility to distributed systems development success: an Analytic Hierarchy Process approach in EUROPEAN JOURNAL OF INFORMATION SYSTEMS
  • 2016-03-16. Big data analytics in E-commerce: a systematic review and agenda for future research in ELECTRONIC MARKETS
  • 2011-04-19. Is traditional, open-source, or on-demand first choice? Developing an AHP-based framework for the comparison of different software models in office suites selection in EUROPEAN JOURNAL OF INFORMATION SYSTEMS
  • 2016-02-19. Assessing mutual funds’ corporate social responsibility: a multistakeholder-AHP based methodology in ANNALS OF OPERATIONS RESEARCH
  • 2015-01-29. Flexible Pricing Models for Cloud Computing Based on Group Decision Making Under Consensus in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2014-08-13. Modeling Flexible Supplier Selection Framework in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2014-10-24. Flexible Decision Modeling for Evaluating the Risks in Green Supply Chain Using Fuzzy AHP and IRP Methodologies in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2013-10-07. Key factors of seaport competitiveness based on the stakeholder perspective: An Analytic Hierarchy Process (AHP) model in MARITIME ECONOMICS & LOGISTICS
  • 2006-05-03. Developing and Implementing a Selection Model for Bedding Chain Retail Store Franchisee Using Delphi and Fuzzy AHP in QUALITY & QUANTITY
  • 2004-02-12. An Application of AHP on Transhipment Port Selection: A Global Perspective in MARITIME ECONOMICS & LOGISTICS
  • 2013-06-12. The big challenges of big data in NATURE
  • 2013-06-29. Ranking of Flexibility in Flexible Manufacturing System by Using a Combined Multiple Attribute Decision Making Method in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2014-07-23. Designing the Green Supply Chain Performance Optimisation Model in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2007-07-28. Prioritization of e-Government strategies using a SWOT-AHP analysis: the case of Turkey in EUROPEAN JOURNAL OF INFORMATION SYSTEMS
  • 2015-09-03. An Integer Linear Program for Integrated Supplier Selection: A Sustainable Flexible Framework in GLOBAL JOURNAL OF FLEXIBLE SYSTEMS MANAGEMENT
  • 2012-02-07. AHP-based resources and environment efficiency evaluation index system construction about the west side of Taiwan Straits in ANNALS OF OPERATIONS RESEARCH
  • 2015-08-30. The impact of big data on world-class sustainable manufacturing in THE INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY
  • 2013-06-15. Big Data: Unleashing information in JOURNAL OF SYSTEMS SCIENCE AND SYSTEMS ENGINEERING
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5

    DOI

    http://dx.doi.org/10.1007/s40171-017-0157-5

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1085382927


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India", 
              "id": "http://www.grid.ac/institutes/grid.444681.b", 
              "name": [
                "Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bharathi", 
            "givenName": "S. Vijayakumar", 
            "id": "sg:person.015046121770.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015046121770.70"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s40745-015-0029-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020485858", 
              "https://doi.org/10.1007/s40745-015-0029-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12525-016-0219-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000161886", 
              "https://doi.org/10.1007/s12525-016-0219-0"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-015-0093-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024985022", 
              "https://doi.org/10.1007/s40171-015-0093-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-014-0070-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005115159", 
              "https://doi.org/10.1007/s40171-014-0070-0"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-013-0038-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049987999", 
              "https://doi.org/10.1007/s40171-013-0038-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10479-016-2132-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034412878", 
              "https://doi.org/10.1007/s10479-016-2132-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1057/palgrave.ejis.3000679", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028107071", 
              "https://doi.org/10.1057/palgrave.ejis.3000679"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-30265-2_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004253977", 
              "https://doi.org/10.1007/978-3-319-30265-2_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00170-015-7674-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018510934", 
              "https://doi.org/10.1007/s00170-015-7674-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11518-013-5219-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025008907", 
              "https://doi.org/10.1007/s11518-013-5219-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1057/ejis.2009.25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035862341", 
              "https://doi.org/10.1057/ejis.2009.25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-015-0105-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031745301", 
              "https://doi.org/10.1007/s40171-015-0105-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10479-012-1072-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015528315", 
              "https://doi.org/10.1007/s10479-012-1072-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1057/ejis.2011.14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004829986", 
              "https://doi.org/10.1057/ejis.2011.14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1057/mel.2013.14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023326824", 
              "https://doi.org/10.1057/mel.2013.14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-014-0069-6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031964393", 
              "https://doi.org/10.1007/s40171-014-0069-6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1038/498255a", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042946700", 
              "https://doi.org/10.1038/498255a"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11135-006-9004-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017569184", 
              "https://doi.org/10.1007/s11135-006-9004-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1057/palgrave.mel.9100093", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014114555", 
              "https://doi.org/10.1057/palgrave.mel.9100093"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s40171-014-0081-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014768032", 
              "https://doi.org/10.1007/s40171-014-0081-x"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2017-05-09", 
        "datePublishedReg": "2017-05-09", 
        "description": "Big data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed the characteristics, technology and business application of big data, less literature has addressed the information security risk assessment of big data, to which this paper contributes to. This research work shows a big data information security risk spectrum comprised of 25 well-defined risk factors into seven constructs that are prioritized and ranked. The unique contribution of the paper is the mix of analytic hierarchy process, one of the most popular multi-criteria decision-making methods with the Delphi technique, another popular group decision-making technique. The results state that new-age technology risk factors like data brokering, global exposure to personal data, lack of governance-based security design are the top three risk factors which are considered from the standpoint of security, privacy and governance in big data management.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s40171-017-0157-5", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136225", 
            "issn": [
              "0972-2696", 
              "0974-0198"
            ], 
            "name": "Global Journal of Flexible Systems Management", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "18"
          }
        ], 
        "keywords": [
          "big data", 
          "information security risk assessment", 
          "big data management", 
          "security risk assessment", 
          "big data research", 
          "standpoint of security", 
          "group decision-making technique", 
          "business applications", 
          "research work", 
          "data management", 
          "security design", 
          "personal data", 
          "decision-making techniques", 
          "data research", 
          "decision-making method", 
          "multi-criteria decision-making method", 
          "analytic hierarchy process", 
          "privacy", 
          "research interest", 
          "hierarchy process", 
          "security", 
          "brokering", 
          "technology", 
          "technique", 
          "academia", 
          "data", 
          "risk spectrum", 
          "work", 
          "applications", 
          "design", 
          "industry", 
          "management", 
          "method", 
          "research", 
          "risk assessment", 
          "interest", 
          "process", 
          "less literature", 
          "results", 
          "Delphi technique", 
          "lack", 
          "contribution", 
          "unique contribution", 
          "constructs", 
          "literature", 
          "characteristics", 
          "standpoint", 
          "excitement", 
          "mix", 
          "governance", 
          "global exposure", 
          "assessment", 
          "factors", 
          "spectra", 
          "exposure", 
          "risk factors", 
          "paper"
        ], 
        "name": "Prioritizing and Ranking the Big Data Information Security Risk Spectrum", 
        "pagination": "183-201", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1085382927"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s40171-017-0157-5"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s40171-017-0157-5", 
          "https://app.dimensions.ai/details/publication/pub.1085382927"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-08-04T17:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/article/article_733.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s40171-017-0157-5"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'


     

    This table displays all metadata directly associated to this object as RDF triples.

    194 TRIPLES      21 PREDICATES      101 URIs      73 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s40171-017-0157-5 schema:about anzsrc-for:08
    2 anzsrc-for:0806
    3 schema:author Nbd00e8054b4c4e55940941fd70662bb9
    4 schema:citation sg:pub.10.1007/978-3-319-30265-2_8
    5 sg:pub.10.1007/s00170-015-7674-1
    6 sg:pub.10.1007/s10479-012-1072-y
    7 sg:pub.10.1007/s10479-016-2132-5
    8 sg:pub.10.1007/s11135-006-9004-z
    9 sg:pub.10.1007/s11518-013-5219-4
    10 sg:pub.10.1007/s12525-016-0219-0
    11 sg:pub.10.1007/s40171-013-0038-5
    12 sg:pub.10.1007/s40171-014-0069-6
    13 sg:pub.10.1007/s40171-014-0070-0
    14 sg:pub.10.1007/s40171-014-0081-x
    15 sg:pub.10.1007/s40171-015-0093-1
    16 sg:pub.10.1007/s40171-015-0105-1
    17 sg:pub.10.1007/s40745-015-0029-9
    18 sg:pub.10.1038/498255a
    19 sg:pub.10.1057/ejis.2009.25
    20 sg:pub.10.1057/ejis.2011.14
    21 sg:pub.10.1057/mel.2013.14
    22 sg:pub.10.1057/palgrave.ejis.3000679
    23 sg:pub.10.1057/palgrave.mel.9100093
    24 schema:datePublished 2017-05-09
    25 schema:datePublishedReg 2017-05-09
    26 schema:description Big data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed the characteristics, technology and business application of big data, less literature has addressed the information security risk assessment of big data, to which this paper contributes to. This research work shows a big data information security risk spectrum comprised of 25 well-defined risk factors into seven constructs that are prioritized and ranked. The unique contribution of the paper is the mix of analytic hierarchy process, one of the most popular multi-criteria decision-making methods with the Delphi technique, another popular group decision-making technique. The results state that new-age technology risk factors like data brokering, global exposure to personal data, lack of governance-based security design are the top three risk factors which are considered from the standpoint of security, privacy and governance in big data management.
    27 schema:genre article
    28 schema:isAccessibleForFree false
    29 schema:isPartOf N0f25c626583a4db2aa72700b0b212acc
    30 Nb8f1fee28b80427e908afdda57665f77
    31 sg:journal.1136225
    32 schema:keywords Delphi technique
    33 academia
    34 analytic hierarchy process
    35 applications
    36 assessment
    37 big data
    38 big data management
    39 big data research
    40 brokering
    41 business applications
    42 characteristics
    43 constructs
    44 contribution
    45 data
    46 data management
    47 data research
    48 decision-making method
    49 decision-making techniques
    50 design
    51 excitement
    52 exposure
    53 factors
    54 global exposure
    55 governance
    56 group decision-making technique
    57 hierarchy process
    58 industry
    59 information security risk assessment
    60 interest
    61 lack
    62 less literature
    63 literature
    64 management
    65 method
    66 mix
    67 multi-criteria decision-making method
    68 paper
    69 personal data
    70 privacy
    71 process
    72 research
    73 research interest
    74 research work
    75 results
    76 risk assessment
    77 risk factors
    78 risk spectrum
    79 security
    80 security design
    81 security risk assessment
    82 spectra
    83 standpoint
    84 standpoint of security
    85 technique
    86 technology
    87 unique contribution
    88 work
    89 schema:name Prioritizing and Ranking the Big Data Information Security Risk Spectrum
    90 schema:pagination 183-201
    91 schema:productId N8ae5469cb6844ff3b8f077f2f9ae4128
    92 Nb5e0efa5a5ce49caaaa6bec20d0ab15b
    93 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085382927
    94 https://doi.org/10.1007/s40171-017-0157-5
    95 schema:sdDatePublished 2022-08-04T17:05
    96 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    97 schema:sdPublisher Nccc91e0956734ba7ab497025c59d6d0f
    98 schema:url https://doi.org/10.1007/s40171-017-0157-5
    99 sgo:license sg:explorer/license/
    100 sgo:sdDataset articles
    101 rdf:type schema:ScholarlyArticle
    102 N0f25c626583a4db2aa72700b0b212acc schema:issueNumber 3
    103 rdf:type schema:PublicationIssue
    104 N8ae5469cb6844ff3b8f077f2f9ae4128 schema:name doi
    105 schema:value 10.1007/s40171-017-0157-5
    106 rdf:type schema:PropertyValue
    107 Nb5e0efa5a5ce49caaaa6bec20d0ab15b schema:name dimensions_id
    108 schema:value pub.1085382927
    109 rdf:type schema:PropertyValue
    110 Nb8f1fee28b80427e908afdda57665f77 schema:volumeNumber 18
    111 rdf:type schema:PublicationVolume
    112 Nbd00e8054b4c4e55940941fd70662bb9 rdf:first sg:person.015046121770.70
    113 rdf:rest rdf:nil
    114 Nccc91e0956734ba7ab497025c59d6d0f schema:name Springer Nature - SN SciGraph project
    115 rdf:type schema:Organization
    116 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    117 schema:name Information and Computing Sciences
    118 rdf:type schema:DefinedTerm
    119 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    120 schema:name Information Systems
    121 rdf:type schema:DefinedTerm
    122 sg:journal.1136225 schema:issn 0972-2696
    123 0974-0198
    124 schema:name Global Journal of Flexible Systems Management
    125 schema:publisher Springer Nature
    126 rdf:type schema:Periodical
    127 sg:person.015046121770.70 schema:affiliation grid-institutes:grid.444681.b
    128 schema:familyName Bharathi
    129 schema:givenName S. Vijayakumar
    130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015046121770.70
    131 rdf:type schema:Person
    132 sg:pub.10.1007/978-3-319-30265-2_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004253977
    133 https://doi.org/10.1007/978-3-319-30265-2_8
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/s00170-015-7674-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018510934
    136 https://doi.org/10.1007/s00170-015-7674-1
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/s10479-012-1072-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1015528315
    139 https://doi.org/10.1007/s10479-012-1072-y
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/s10479-016-2132-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034412878
    142 https://doi.org/10.1007/s10479-016-2132-5
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/s11135-006-9004-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1017569184
    145 https://doi.org/10.1007/s11135-006-9004-z
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/s11518-013-5219-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025008907
    148 https://doi.org/10.1007/s11518-013-5219-4
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/s12525-016-0219-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000161886
    151 https://doi.org/10.1007/s12525-016-0219-0
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/s40171-013-0038-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049987999
    154 https://doi.org/10.1007/s40171-013-0038-5
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/s40171-014-0069-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031964393
    157 https://doi.org/10.1007/s40171-014-0069-6
    158 rdf:type schema:CreativeWork
    159 sg:pub.10.1007/s40171-014-0070-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005115159
    160 https://doi.org/10.1007/s40171-014-0070-0
    161 rdf:type schema:CreativeWork
    162 sg:pub.10.1007/s40171-014-0081-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1014768032
    163 https://doi.org/10.1007/s40171-014-0081-x
    164 rdf:type schema:CreativeWork
    165 sg:pub.10.1007/s40171-015-0093-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024985022
    166 https://doi.org/10.1007/s40171-015-0093-1
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/s40171-015-0105-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031745301
    169 https://doi.org/10.1007/s40171-015-0105-1
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/s40745-015-0029-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020485858
    172 https://doi.org/10.1007/s40745-015-0029-9
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1038/498255a schema:sameAs https://app.dimensions.ai/details/publication/pub.1042946700
    175 https://doi.org/10.1038/498255a
    176 rdf:type schema:CreativeWork
    177 sg:pub.10.1057/ejis.2009.25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035862341
    178 https://doi.org/10.1057/ejis.2009.25
    179 rdf:type schema:CreativeWork
    180 sg:pub.10.1057/ejis.2011.14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004829986
    181 https://doi.org/10.1057/ejis.2011.14
    182 rdf:type schema:CreativeWork
    183 sg:pub.10.1057/mel.2013.14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023326824
    184 https://doi.org/10.1057/mel.2013.14
    185 rdf:type schema:CreativeWork
    186 sg:pub.10.1057/palgrave.ejis.3000679 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028107071
    187 https://doi.org/10.1057/palgrave.ejis.3000679
    188 rdf:type schema:CreativeWork
    189 sg:pub.10.1057/palgrave.mel.9100093 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014114555
    190 https://doi.org/10.1057/palgrave.mel.9100093
    191 rdf:type schema:CreativeWork
    192 grid-institutes:grid.444681.b schema:alternateName Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India
    193 schema:name Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India
    194 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...