Sei sulla pagina 1di 2

Big Data & Cyber Security

Tentative Schedule

Day
February
24-25

March 23

Topic
Introduction: what are big data;
the importance and potential of
big data in social sciences;
datafication; messiness;
(im)precision;
causation/correlation;
describing/predicting
Big data and the social sciences

March 910

Introduction to cyber security


issues & cyber terrorism

March
16-17

Privacy/personal data Businessintelligence

Compulsory Readings
- Mayer-Schonberger & Cukier [chapters 1-5]

Additional Readings
- Boyd D. and Crawford K. (2012) Critical questions for big data.
Information, Communication & Society, 15(5): 662-679.
- de Fortuny E.J., Martens D. & Provost F. (2013) Predictive modelling
with big data: Is bigger really better?, in Big Data, 1(4): 215-226.
- Kitchin R. (2014) Big data, new epistemologies and paradigm shifts, Big
Data & Society, April-June: 1-12.

Instructor
A&G

Room
Aula 6

- Burrows, R. & Savage, M. (2014) After the crisis? Big data


and the methodological challenges of empirical sociology, Big
Data & Society, April-June: 1-6.
- Pentland A (2012) Reinventing society in the wake of big data.
Edge, 30 August 2012. Available at:
https://edge.org/conversation/alex_sandy_pentland-reinventingsociety-in-the-wake-of-big-data

- Billari F., DAmuri F. e Marcucci J. (2013) Forecasting births using google.


Paper presented at PAA Annual Meeting, New Orleans.
- Blumenstock J.E. (2012) Inferring patterns of internal migration from
mobile phone call records: evidence form Rwanda, In Information
Technology for Development, 18(2): 107-125.
- Bond, R. M., Fariss, C. J., Jones, J. J., Kramer, A. D., Marlow, C., Settle, J.
E., & Fowler, J. H. (2012). A
61-million-person experiment in social influence and political mobilization.
Nature, 489(7415),
295-298. doi: 10.1038/nature11421
- Curini, L. Iacus, S. e Canova, L. (2015) Measuring idiosincratic happiness
through the analysis of twitter: An application to the Italian case, in Social
Indicators Research, 121(2): 525-542.
- Staiano, J. et al. (2012) Friends don't lie. Inferring personality traits from
social network structure in ACM UbiComp.
- State B., Rodriguez M., Helbing D. and Zagheni E. (2014) Migration of
Professionals to the US. Evidence from LinkedIn Data. Proceedings of
SocInfo 2014. Springer's Lecture Note Series in Computer Science, 531-543
- Sudhahar, S. Veltri G.A. and Cristianini A. (2015) Automated analysis of
US presidential elections using big data and network analysis, Big Data &
Society, January-June: 1-28.
- Singh V.K., Freeman L., Lepri, B. & Pentland A. (2013) Classifying
spending behavior using socio-mobile data, Human 2(2): 99-111.
- Hjortdal, M. (2011). China's use of cyber warfare: Espionage meets
strategic deterrence. Journal of Strategic Security, 4(2), 1-24.
doi:http://dx.doi.org/10.5038/1944-0472.4.2.1

Aula 6

Aula 6

- Tucker, P. (2013). MAPPING THE FUTURE WITH BIG DATA. The


Futurist, 47(4), 14-18.
- Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business Intelligence and
Analytics: From Big Data to Big Impact. MIS quarterly, 36(4), 1165-1188.
http://hmchen.shidler.hawaii.edu/Chen_big_data_MISQ_2012.pdf

Aula 6

- Giacomello, G. (2014) Introduction: Security in Cyberspace,


in G. Giacomello (ed.) Security in Cyberspace: Targeting
Nations, Infrastructures, Individuals, New York: Bloomsbury,
pp.1-19.
- Klein, J. J. (2015). Deterring and dissuading cyberterrorism.
Journal of Strategic Security, 8(4), n/a.
doi:http://dx.doi.org/10.5038/1944-0472.8.4.1460
- Glennon, M. J. (2012). State-level cybersecurity, Policy
Review, (171), 85-102.
- Deibert, R. (2015). CYBERSPACE UNDER SIEGE. Journal
of Democracy, 26(3), 64-78.
- McNeely, C. L., & Hahm, J. (2014). The big (data) bang:
Policy, prospects, and challenges. Review of Policy Research,
31(4), 304-310. doi:http://dx.doi.org/10.1111/ropr.12082

April 6-7

Critical Infrastructures

April 13

(big data in numbers)


Coding vs meaning; variable
types; describing a distribution
(frequencies, %, means, median,
mode variance, SD)
Graphic representations
Introduction to KNIME
(interface)
Basic statistics & graphs with
KNIME
Analysis of relations & Data
reduction techniques with
KNIME
In class exercise with KNIME
Data retrieval
Wrapping up

April 14
April 2021
April 2728
May 4-5
May 1112

- Meyers, C., Powers, S., & Faissol, D. (2009). Taxonomies of


cyber adversaries and attacks: a survey of incidents and
approaches. Lawrence Livermore National Laboratory (April
2009), 7. https://e-reports-ext.llnl.gov/pdf/379498.pdf
- Yusta, J. M., Correa, G. J., & Lacal-Arantegui, R. (2011).
Methodologies and applications for critical infrastructure
protection: State-of-the-art. Energy Policy, 39(10), 6100-6119.

- Berthold M.R., Borgelt C., Hoeppner F., Klawonn F. (2010)


Guide to intelligent data analysis. Springer. [selected chapters to
be communicated]
- Leventhal B. (2010) An introduction to data mining and other
techniques for advanced analytics, Journal of Direct, Data and
Digital Marketing Practice, 12(2): 137-153.
- KNIME Quickstart Guide

- Giacomello, G. (2013) Cybersecurity and Critical Information


Infrastructures, ISPI Analysis n. 201 , October,
<www.ispionline.it/it/pubblicazione/cybersecurity-and-critical-informationinfrastructures-9315>.

Aula 6

Aula 6

LAB

LAB

LAB

G
A&G

LAB
LAB
(Mizzau
@ SPS
Dept)

Potrebbero piacerti anche