Author of the publication

Big Data: New Opportunities and New Challenges Guest editors' introduction.

, and . Computer, 46 (6): 22-24 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gamifying Precision-Guided Firearms: Bugs and Daffy wouldn't stand a chance.. IEEE Consumer Electronics Magazine, 5 (1): 99-101 (2016)Designing online/offline experiences with children in mind., , , and . ISTAS, page 1. IEEE, (2021)Public Interest Technology, Citizen Assemblies, and Performative Governance., , and . IEEE Technol. Soc. Mag., 40 (3): 6-9 (2021)Introducing Location-Based Services into Information Technology Curriculum: Reflections on Practice., and . ICMB, page 220-226. IEEE Computer Society, (2005)Privacy, Data Rights and Cybersecurity: Technology for Good in the Achievement of Sustainable Development Goals., , , and . ISTAS, page 1-13. IEEE, (2019)Edge Computing and IoT Data Breaches: Security, Privacy, Trust, and Regulation., and . IEEE Technol. Soc. Mag., 43 (1): 22-32 (March 2024)Beyond Mere Compliance of RFID Regulations by the Farming Community: A Case Study of the Cochrane Dairy Farm., and . ICMB, page 8. IEEE Computer Society, (2007)Security Risk Management: Building an Information Security Risk Management Program from the Ground Up.. Comput. Secur., 31 (2): 249-250 (2012)Constructing a visualization dashboard to improve educational standards in Arizona legislative districts., , , and . ISTAS, page 1-8. IEEE, (2021)Just-in-Time Transnational Organized Crime: Just Another Adaptive Supply Chain.. ISTAS, page 1-7. IEEE, (2022)