Reference Hub1
Security Threats for Big Data: An Empirical Study

Security Threats for Big Data: An Empirical Study

Muhammad Nazrul Islam, Tarannum Zaki, Md. Sami Uddin, Md. Mahedi Hasan
ISSN: 1935-5661|EISSN: 1935-567X|EISBN13: 9781522543275|DOI: 10.4018/IJICTHD.2018100101
Cite Article Cite Article

MLA

Islam, Muhammad Nazrul, et al. "Security Threats for Big Data: An Empirical Study." IJICTHD vol.10, no.4 2018: pp.1-18. http://doi.org/10.4018/IJICTHD.2018100101

APA

Islam, M. N., Zaki, T., Uddin, M. S., & Hasan, M. M. (2018). Security Threats for Big Data: An Empirical Study. International Journal of Information Communication Technologies and Human Development (IJICTHD), 10(4), 1-18. http://doi.org/10.4018/IJICTHD.2018100101

Chicago

Islam, Muhammad Nazrul, et al. "Security Threats for Big Data: An Empirical Study," International Journal of Information Communication Technologies and Human Development (IJICTHD) 10, no.4: 1-18. http://doi.org/10.4018/IJICTHD.2018100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the advancement of modern science and technology, data emerging from different fields are escalating gradually. Recently, with this huge amount of data, Big Data has become a source of immense opportunities for large scale organizations related to various business sectors as well as to information technology (IT) professionals. Hence, one of the biggest challenges of this context is the security of this big set of data in different ICT based organizations. The fundamental objective of this article is to explore how big data may create security challenges in email communication. As an outcome, this article first shows that big data analysis helps to understand the behavior or interest of email users, which in turn can help phishers to create the phishing sites or emails that result in IT security threat; second, the article finds that phishing e-mail generation based on the (email) users' behavior can break an organization's IT security; and finally, a framework was proposed that would help to enhance the security of email communication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.