Ontology type: schema:ScholarlyArticle
2017-05-09
AUTHORS ABSTRACTBig data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed the characteristics, technology and business application of big data, less literature has addressed the information security risk assessment of big data, to which this paper contributes to. This research work shows a big data information security risk spectrum comprised of 25 well-defined risk factors into seven constructs that are prioritized and ranked. The unique contribution of the paper is the mix of analytic hierarchy process, one of the most popular multi-criteria decision-making methods with the Delphi technique, another popular group decision-making technique. The results state that new-age technology risk factors like data brokering, global exposure to personal data, lack of governance-based security design are the top three risk factors which are considered from the standpoint of security, privacy and governance in big data management. More... »
PAGES183-201
http://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5
DOIhttp://dx.doi.org/10.1007/s40171-017-0157-5
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1085382927
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India",
"id": "http://www.grid.ac/institutes/grid.444681.b",
"name": [
"Symbiosis Centre for Information Technology (SCIT), Symbiosis International University (SIU), P-15, Pune Infotech Park, Hinjewadi Phase I, 411057, Pune, Maharashtra, India"
],
"type": "Organization"
},
"familyName": "Bharathi",
"givenName": "S. Vijayakumar",
"id": "sg:person.015046121770.70",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015046121770.70"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/s40745-015-0029-9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020485858",
"https://doi.org/10.1007/s40745-015-0029-9"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s12525-016-0219-0",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1000161886",
"https://doi.org/10.1007/s12525-016-0219-0"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-015-0093-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1024985022",
"https://doi.org/10.1007/s40171-015-0093-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-014-0070-0",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1005115159",
"https://doi.org/10.1007/s40171-014-0070-0"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-013-0038-5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1049987999",
"https://doi.org/10.1007/s40171-013-0038-5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10479-016-2132-5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1034412878",
"https://doi.org/10.1007/s10479-016-2132-5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1057/palgrave.ejis.3000679",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028107071",
"https://doi.org/10.1057/palgrave.ejis.3000679"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-30265-2_8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004253977",
"https://doi.org/10.1007/978-3-319-30265-2_8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00170-015-7674-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1018510934",
"https://doi.org/10.1007/s00170-015-7674-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11518-013-5219-4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025008907",
"https://doi.org/10.1007/s11518-013-5219-4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1057/ejis.2009.25",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1035862341",
"https://doi.org/10.1057/ejis.2009.25"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-015-0105-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1031745301",
"https://doi.org/10.1007/s40171-015-0105-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10479-012-1072-y",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1015528315",
"https://doi.org/10.1007/s10479-012-1072-y"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1057/ejis.2011.14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004829986",
"https://doi.org/10.1057/ejis.2011.14"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1057/mel.2013.14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1023326824",
"https://doi.org/10.1057/mel.2013.14"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-014-0069-6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1031964393",
"https://doi.org/10.1007/s40171-014-0069-6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1038/498255a",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042946700",
"https://doi.org/10.1038/498255a"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11135-006-9004-z",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017569184",
"https://doi.org/10.1007/s11135-006-9004-z"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1057/palgrave.mel.9100093",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1014114555",
"https://doi.org/10.1057/palgrave.mel.9100093"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s40171-014-0081-x",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1014768032",
"https://doi.org/10.1007/s40171-014-0081-x"
],
"type": "CreativeWork"
}
],
"datePublished": "2017-05-09",
"datePublishedReg": "2017-05-09",
"description": "Big data research brings in a lot of research interest and excitement from both industry and academia. While several research works have addressed the characteristics, technology and business application of big data, less literature has addressed the information security risk assessment of big data, to which this paper contributes to. This research work shows a big data information security risk spectrum comprised of 25 well-defined risk factors into seven constructs that are prioritized and ranked. The unique contribution of the paper is the mix of analytic hierarchy process, one of the most popular multi-criteria decision-making methods with the Delphi technique, another popular group decision-making technique. The results state that new-age technology risk factors like data brokering, global exposure to personal data, lack of governance-based security design are the top three risk factors which are considered from the standpoint of security, privacy and governance in big data management.",
"genre": "article",
"id": "sg:pub.10.1007/s40171-017-0157-5",
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1136225",
"issn": [
"0972-2696",
"0974-0198"
],
"name": "Global Journal of Flexible Systems Management",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "18"
}
],
"keywords": [
"big data",
"information security risk assessment",
"big data management",
"security risk assessment",
"big data research",
"standpoint of security",
"group decision-making technique",
"business applications",
"research work",
"data management",
"security design",
"personal data",
"decision-making techniques",
"data research",
"decision-making method",
"multi-criteria decision-making method",
"analytic hierarchy process",
"privacy",
"research interest",
"hierarchy process",
"security",
"brokering",
"technology",
"technique",
"academia",
"data",
"risk spectrum",
"work",
"applications",
"design",
"industry",
"management",
"method",
"research",
"risk assessment",
"interest",
"process",
"less literature",
"results",
"Delphi technique",
"lack",
"contribution",
"unique contribution",
"constructs",
"literature",
"characteristics",
"standpoint",
"excitement",
"mix",
"governance",
"global exposure",
"assessment",
"factors",
"spectra",
"exposure",
"risk factors",
"paper"
],
"name": "Prioritizing and Ranking the Big Data Information Security Risk Spectrum",
"pagination": "183-201",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1085382927"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s40171-017-0157-5"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s40171-017-0157-5",
"https://app.dimensions.ai/details/publication/pub.1085382927"
],
"sdDataset": "articles",
"sdDatePublished": "2022-08-04T17:05",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/article/article_733.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s40171-017-0157-5"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s40171-017-0157-5'
This table displays all metadata directly associated to this object as RDF triples.
194 TRIPLES
21 PREDICATES
101 URIs
73 LITERALS
6 BLANK NODES