[Amado, A., Cortez, P., Rita, P., & Moro, S. (2018). Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis. European Research on Management and Business Economics, 24(1), 1–7. https://doi.org/10.1016/j.iedeen.2017.06.00210.1016/j.iedeen.2017.06.002]Search in Google Scholar
[Anshari, M., & Lim, S. A. (2017). E-Government with Big Data Enabled through Smartphone for Public Services: Possibilities and Challenges. International Journal of Public Administration, 40(13), 1143–1158. https://doi.org/10.1080/01900692.2016.124261910.1080/01900692.2016.1242619]Search in Google Scholar
[Bao, R., Chen, Z., & Obaidat, M. S. (2018). Challenges and techniques in Big data security and privacy: A review. Security and Privacy, 1(4), e13. https://doi.org/10.1002/spy2.1310.1002/spy2.13]Search in Google Scholar
[Bergagna, E., & Tartaglia, S. (2018). Self-esteem, social comparison, and facebook use. Europe’s Journal of Psychology, 14(4), 831–845. https://doi.org/10.5964/ejop.v14i4.159210.5964/ejop.v14i4.1592]Search in Google Scholar
[Cadwalladr, Carole; Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved from https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election]Search in Google Scholar
[Cheng, L., Liu, F., & Yao, D. D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1–14. https://doi.org/10.1002/widm.121110.1002/widm.1211]Search in Google Scholar
[Dhawan, V., & Zanini, N. (2014). Big Data and Social Media Analytics. Research Matters: A Cambridge Assessment Publication., (18), 36–41.]Search in Google Scholar
[Dilshad, R. M., & Latif, M. I. (2013). Focus Group Interview as a Tool for Qualitative Research: An Analysis. Pakistan Journal of Social Science, 33(1), 191–198. Retrieved from https://www.bzu.edu.pk/PJSS/Vol33No12013/PJSS-Vol33-No1-16.pdf]Search in Google Scholar
[Esfahani, H. J., Tavasoli, K., & Jabbarzadeh, A. (2019). Big data and social media: A scientometrics analysis. International Journal of Data and Network Science, (January), 145–164. https://doi.org/10.5267/j.ijdns.2019.2.00710.5267/j.ijdns.2019.2.007]Search in Google Scholar
[Garcia-Rivadulla, S. (2016). Personalization vs. privacy: An inevitable trade-off? IFLA Journal, 42(3), 227–238. https://doi.org/10.1177/034003521666289010.1177/0340035216662890]Search in Google Scholar
[Hammouchi, H., Cherqi, O., Mezzour, G., Ghogho, M., & Koutbi, M. El. (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time. Procedia Computer Science, 151(2018), 1004–1009. https://doi.org/10.1016/j.procs.2019.04.14110.1016/j.procs.2019.04.141]Search in Google Scholar
[Hu, H., Myers, S., Colizza, V., & Vespignani, A. (2009). WiFi networks and malware epidemiology. Proceedings of the National Academy of Sciences of the United States of America, 106(5), 1318–1323. https://doi.org/10.1073/pnas.081197310610.1073/pnas.0811973106]Search in Google Scholar
[Hussain, A., & Cambria, E. (2018). Semi-supervised learning for big social data analysis. Neurocomputing, 275, 1662–1673. https://doi.org/10.1016/j.neucom.2017.10.01010.1016/j.neucom.2017.10.010]Search in Google Scholar
[Idzalika, R., Pramestri, Z., Amin, I., Riyadi, Y., & Hodge, G. (2014). Big Data for Population and Social Policies. Pulselabjakarta.Org. Retrieved from https://pulselabjakarta.org/assets/uploadworks/2019-01-24-08-58-31.pdf]Search in Google Scholar
[Joglekar, P., & Pise, N. (2016). Solving Cyber Security Challenges using Big Data. International Journal of Computer Applications, 154(4), 9–12. https://doi.org/10.5120/ijca201691208010.5120/ijca2016912080]Search in Google Scholar
[Kantarcioglu, M., & Ferrari, E. (2019). Research Challenges at the Intersection of Big Data, Security and Privacy. Frontiers in Big Data, 2(February), 1–6. https://doi.org/10.3389/fdata.2019.0000110.3389/fdata.2019.00001]Search in Google Scholar
[Knight, S. R., Ots, R., Maimbo, M., Drake, T. M., Fairfield, C. J., & Harrison, E. M. (2019). Systematic review of the use of big data to improve surgery in low- and middle-income countries. The British Journal of Surgery, 106(2), e62–e72. https://doi.org/10.1002/bjs.1105210.1002/bjs.11052]Search in Google Scholar
[Kozlowska, I. (2018). Facebook and Data Privacy in the Age of Cambridge Analytica. Retrieved September 28, 2019, from The Henry M Jackson School of International Studies website: https://jsis.washington.edu/news/facebook-data-privacy-age-cambridge-analytica/]Search in Google Scholar
[Lapowsky, I. (2019, March). In Latest Facebook Data Exposure, History Repeats Itself. Retrieved from https://www.wired.com/story/facebook-apps-540-million-records/]Search in Google Scholar
[Li, Y., & Zhai, X. (2018). Review and Prospect of Modern Education using Big Data. Procedia Computer Science, 129, 341–347. https://doi.org/10.1016/j.procs.2018.03.08510.1016/j.procs.2018.03.085]Search in Google Scholar
[Liu, W., & Zhong, S. (2017). Web malware spread modelling and optimal control strategies. Scientific Reports, 7(February), 1–19. https://doi.org/10.1038/srep4230810.1038/srep42308]Search in Google Scholar
[Logica, B., & Magdalena, R. (2015). Using Big Data in the Academic Environment. Procedia Economics and Finance, 33(15), 277–286. https://doi.org/10.1016/s2212-5671(15)01712-810.1016/S2212-5671(15)01712-8]Search in Google Scholar
[Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2), 205395171454186. https://doi.org/10.1177/205395171454186110.1177/2053951714541861]Search in Google Scholar
[Mills, K. A. (2018). What are the threats and potentials of big data for qualitative research? Qualitative Research, 18(6), 591–603. https://doi.org/10.1177/146879411774346510.1177/1468794117743465]Search in Google Scholar
[Moro, S., Rita, P., & Vala, B. (2016). Predicting social media performance metrics and evaluation of the impact on brand building: A data mining approach. Journal of Business Research, 69(9), 3341–3351. https://doi.org/10.1016/j.jbusres.2016.02.01010.1016/j.jbusres.2016.02.010]Search in Google Scholar
[Mustofa, R. H. (2019). Coding Results from Focus Group Discussion (FGD) about Big Data.]Search in Google Scholar
[Nunes, M. B. (2018). Understanding Big Data for Industrial Innovation and Design: The Missing Information Systems Perspective. Journal of Data and Information Science, 2(4), 1–6. https://doi.org/10.1515/jdis-2017-001710.1515/jdis-2017-0017]Search in Google Scholar
[Nyumba, T. O., Wilson, K., Derrick, C. J., & Mukherjee, N. (2018). The use of focus group discussion methodology: Insights from two decades of application in conservation. Methods in Ecology and Evolution, 9(1), 20–32. https://doi.org/10.1111/2041-210X.1286010.1111/2041-210X.12860]Search in Google Scholar
[Permatasari, A., & Kartikowati, M. (2018). The influence of website design on customer online trust and perceived risk towards purchase intention: A case of O2O commerce in Indonesia. International Journal of Business and Globalisation, 21(1), 74–86. https://doi.org/10.1504/IJBG.2018.09409710.1504/IJBG.2018.094097]Search in Google Scholar
[Portela, J., Villalba, L. G., Trujillo, A. S., Orozco, A. S., & Kim, T.-H. (2016). Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors, 16(11), 1832. https://doi.org/10.3390/s1611183210.3390/s16111832]Search in Google Scholar
[Qiu, J. L. (2015). Reflections on Big Data: ‘Just because it is accessible does not make it ethical.’ Media, Culture and Society, 37(7), 1089–1094. https://doi.org/10.1177/016344371559410410.1177/0163443715594104]Search in Google Scholar
[Ronquillo, J. G., Winterholler, J. E., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open, 1(1), 15–19. https://doi.org/10.1093/jamiaopen/ooy01910.1093/jamiaopen/ooy019]Search in Google Scholar
[Saldana, J. (2009). The Coding Manual for Qualitative Researchers (First Edit). Retrieved from http://www.ghbook.ir/index.php?name=گنهر ف و ه نا سر یا ه نیون&option=com_dbook&task=readonline&book_id=13650&page=73&chkhashk=ED9C94 91B4&Itemid=218&lang=fa&tmpl=component]Search in Google Scholar
[Saqr, M. (2017). Big data and the emerging ethical challenges. International Journal of Health Sciences, 11(4), 1–2. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/29085259%0Ahttp://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=PMC5654190]Search in Google Scholar
[Statista. (2019). Share of internet users in Indonesia in 2019, by age group. Retrieved September 18, 2019, from Statista Research Department website: https://www.statista.com/statistics/997264/share-of-internet-users-by-age-group-indonesia/]Search in Google Scholar
[Strang, K. D., & Sun, Z. (2016). Meta-analysis of big data security and privacy: Scholarly literature gaps. Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016, (February), 4035–4037. https://doi.org/10.1109/BigData.2016.784110110.1109/BigData.2016.7841101]Search in Google Scholar
[Waterman, K., & Bruening, P. J. (2014). Big Data analytics: risks and responsibilities. International Data Privacy Law, 4(2), 89–95. https://doi.org/10.1093/idpl/ipu00210.1093/idpl/ipu002]Search in Google Scholar
[Webb, K. (2019, July 18). The Russian Photo App That Makes You Look Old Is Probably Keeping Your Data. Retrieved from https://www.sciencealert.com/viral-russian-app-that-makes-you-look-old-is-probably-keeping-your-data]Search in Google Scholar
[Wong, E. (2019, March 18). How Indonesians Embrace the Digital World. The Jakarta Post. Retrieved from https://www.thejakartapost.com/academia/2019/03/18/how-indonesians-embrace-the-digital-world.html]Search in Google Scholar