References
[1]. Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: a technological perspective
and review. Journal of Big Data, 3(1), 25.
[2]. Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed
network: using trail re-identification to evaluate and design anonymity protection systems.
Journal of biomedical informatics, 37(3), 179-192.
[3]. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., & Guo, S. (2016). Protection of big data
privacy. IEEE access, 4, 1821-1834.
[4]. Grahan Greenleaf. (2010). Comparative study on different approaches to privacy challenges, in
particular in the light of technological developments. Retrieved from
http://ec.europa.eu/justice/dataprotection/document/studies/files/new_privacy_challenges/final_report_country_report_b3_hong
_kong.pdf. Retrieved on May 9, 2017.
[5]. Jeremy M. Mittman. (2014). Singapore issues new regulations in advance of data protection law
entering into force. Retrieved from
http://privacylaw.proskauer.com/2014/06/articles/international/singapore-issues-newregulations-in-advance-of-data-protection-law-entering-into-force/.
Retrieved on May 10, 2017.
[6]. Data security and cybercrime in Italy. Lexology. Retrieved from
http://www.lexology.com/library/detail.aspx?g=ed4fa22f-e1de-4333-9ba7-15698e038aff.
Retrieved on May 10, 2017
[7]. Online privacy law: United Kingdom. Library of Congress. Retrieved from
https://www.loc.gov/law/help/online-privacy-law/uk.php. Retrieved on May 10, 2017.
[8]. Danny Bradbury. (2015). Security and privacy concerns raised around internet of things.
Retrieved from http://www.itworldcanada.com/article/what-canadians-can-learn-from-ftcsinternet-of-things-report/101687.
Retrieved on May 10, 2017.
[9]. Big data, privacy and security. (nd). The Netherlands Scientific Council for Government Policy.
Retrieved from https://english.wrr.nl/topics/big-data-privacy-and-security. Retrieved on May 10,
2017.
[10]. Rainier, A.R. & Crisostomo, S. (2017). Privacy body probes new COMELEC data breach.
Retrieved from http://www.philstar.com/headlines/2017/02/21/1674297/privacy-body-probesnew-comelec-data-breach.
Retrieved on May 10, 2017.
[11]. Data protection. (nd). Privacy International. Retrieved from
https://www.privacyinternational.org/node/44. Retrieved on May 10, 2017.
[12]. Data privacy day - January 28, 2017. (nd). Mississippi Department of Information Technology
Services. Retrieved from http://www.its.ms.gov/services/pages/january-28th-is-national-dataprivacy-day.aspx.
Retrieved on May 10, 2017
[13]. Data privacy act of 2012. (nd). National Privacy Commission. Retrieved from
https://privacy.gov.ph/wp-content/uploads/DPA-of-2012.pdf. Retrieved on May 11, 2017.
[14]. Information. (nd). YOUR Dictionary. Retrieved from
http://www.yourdictionary.com/information. Retrieved on May 13, 2017
[15]. Communication privacy management theory. Revolvy. Retrieved from
https://www.revolvy.com/main/index.php?s=Communication%20privacy%20management%20th
eory. Retrieved on May 16, 2017.
[16]. Data privacy Day. Energy.gov. Retrieved from https://energy.gov/cio/data-privacy-day.
Retrieved on June 5, 2017.
[17]. Data Privacy Act of 2012. National Privacy Commission. Retrieved from
https://privacy.gov.ph/data-privacy-act-primer/. Retrieved on June 7, 2017.
[18]. Data Privacy and Cybersecurity. (n.d.) Andrews Kurth. Retrieved from
https://www.andrewskurth.com/assets/pdf/marea_240.pdf. Retrieved on June 10, 2017.
[19]. Thomson, L. L. (2013). Health Care Data Breaches and Information Security. In American Bar
Association (pp. 253-267).
[20]. Sen, J. (2013). Security and privacy issues in cloud computing. Architectures and Protocols for
Secure Information Technology Infrastructures, 1-45.
[21]. Koops, B. J. (2014). The trouble with European data protection law. International Data Privacy
Law, 4(4), 250-261.
[22]. Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth. (1996). From Data Mining to
Knowledge Discovery in Databases. Retrieved from
https://ww.csd.uwo.ca/faculty/ling/cs435/fayyad.pdf Retrieved on June 14, 2017.
[23]. Hau, D. (2003). Unauthorized Access - Threats, Risk, and Control. Retrieved from
https://www.giac.org/paper/gsec/3161/unauthorized-access-threats-risk-control/105264.
Retrieved on June 20, 2017
[24]. Priyadharsini, C and Thanamani, A.S. (2014). An Overview of Knowledge Discovery Database
and Data mining Techniques
[25]. UNESCO. (nd). Access to Information. Retrieved from http://en.unesco.org/themes/accessinformation.
Retrieved on July 24, 2017.