pág. 5969
Han, S., Kim, J., & Lee, H. (2022). Real-time cyber threat detection using Twitter data: A hybrid
approach combining sentiment analysis and topic modeling. Computers & Security, 112,
102512.
Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science,
349(6245), 255–260. https://doi.org/10.1126/science.aaa8415
Katal, A., Wazid, M., & Goudar, R. H. (2013). Big data: Issues, challenges, tools and good practices. In
2013 Sixth International Conference on Contemporary Computing (pp. 404–409). IEEE.
https://doi.org/10.1109/IC3.2013.6612229
Khan, M., Kiah, M. L. M., Madani, S. A., Khan, S. U., & Buyya, R. (2022). A survey on Big Data
security and privacy issues. Journal of Cloud Computing, 11, 14.
Kshetri, N. (2021). COVID-19 and digital transformations in the global economy: The rise of cyber
risks. Journal of Global Information Technology Management, 24(2), 121–132.
Laney, D. (2001). 3D data management: Controlling data volume, velocity, and variety. META Group
Research Note, 6(70), 1.
Malleson, N., & Birkin, M. (2013). Towards victim-oriented crime modelling in an agent-based
simulation. Crime Prevention and Community Safety, 15(3), 188–203.
Mayer-Schönberger, V., & Cukier, K. (2013). Big Data: A revolution that will transform how we live,
work, and think. Houghton Mifflin Harcourt.
Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & PRISMA Group. (2009). Preferred reporting items
for systematic reviews and meta-analyses: The PRISMA statement. PLoS Medicine, 6(7),
e1000097.
Sarker, I. H. (2021). Machine learning: Algorithms, real-world applications and research directions. SN
Computer Science, 2(3), 160.
Srinivas, J., Das, A. K., & Kumar, N. (2020). Government regulations in cyber security: Framework,
standards and recommendations. Future Generation Computer Systems, 100, 636–650.
UNCTAD. (2021). Digital Economy Report 2021: Cross-border data flows and development. United
Nations Conference on Trade and Development.