C. Anderson, The End of Theory: The Data Deluge Makes the Scientific Method Obsolete' Wired Magazine 16:07, pp.16-23, 2008.

C. J. Bennett, The Privacy Advocates, 2008.

D. Boyd and K. Crawford, Six Provocations for Big Data, Proc. Symposium on the Dynamics of the Internet and Society, 2011.

R. Clarke, A Contingency Approach to the Software Generations, Database, vol.22, issue.3, pp.23-34, 1991.
DOI : 10.1145/126743.126749

R. Clarke, A Normative Regulatory Framework for Computer Matching, J. of Computer & Info. L, vol.133, 1995.

R. Clarke, Privacy impact assessment: Its origins and development, Computer Law & Security Review, vol.25, issue.2, pp.123-135, 2009.
DOI : 10.1016/j.clsr.2009.02.002

R. Clarke, Civil Society Must Publish Standards Documents, Proc. Human Choice & Computers (HCC9), IFIP World Congress, pp.180-184, 2010.
DOI : 10.1007/978-3-642-15479-9_18

URL : https://hal.archives-ouvertes.fr/hal-01054795

R. Clarke, What drones inherit from their ancestors, Computer Law & Security Review, vol.30, issue.3, pp.247-262, 2014.
DOI : 10.1016/j.clsr.2014.03.006

R. Clarke, Big data, big risks, Information Systems Journal, vol.46, issue.1, pp.77-90, 2016.
DOI : 10.1109/MC.2013.195

R. Clarke, Quality Assurance for Security Applications of Big Data, 2016 European Intelligence and Security Informatics Conference (EISIC), pp.17-19, 2016.
DOI : 10.1109/EISIC.2016.010

R. Clarke, Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives, Computer Law & Security Review, vol.32, issue.3, pp.403-418, 2016.
DOI : 10.1016/j.clsr.2016.01.009

R. Clarke and L. Bennett-moses, The regulation of civilian drones' impacts on public safety, Computer Law & Security Review, vol.30, issue.3, pp.263-285, 2014.
DOI : 10.1016/j.clsr.2014.03.007

S. Davies, Ideas for Change: Campaign principles that shift the world' The Privacy Surgeon, 2014.

W. S. Humphrey, Justifying a Process Improvement Proposal' SEI Interactive, 2000.

D. Laney, 3D Data Management: Controlling Data Volume, Velocity and Variety' Meta-Group, 2001.

S. Lavalle, E. Lesser, R. Shockley, M. S. Hopkins, and N. Kruschwitz, Big Data, Analytics and the Path From Insights to Value' Sloan Management Review (Winter 2011Re- search Feature, 2010.

A. Mcafee and E. Brynjolfsson, Big Data: The Management Revolution, Harvard Business Review, pp.61-68, 2012.

V. Mayer-schönberger and K. Cukier, Big data: A revolution that will transform how we live, work, and think, 2013.

H. Müller and J. Freytag, Problems, Methods and Challenges in Comprehensive Data Cleansing, 2003.

B. Piprani and D. Ernst, A Model for Data Quality Assessment, Proc. OTM Workshops, issue.5333, pp.750-759, 2008.
DOI : 10.1007/11915072_18

C. Raab and R. Clarke, United Kingdom ??? Inadequacies in the UK???s Data Science Ethical Framework, European Data Protection Law Review, vol.2, issue.4, pp.555-560, 2016.
DOI : 10.21552/EDPL/2016/4/13

M. Schroeck, R. Shockley, J. Smart, D. Romero-morales, and P. Tufano, Analytics : The real world use of big data' IBM Institute for Business Value, 2012.

G. Shanks and P. Darke, Understanding Data Quality in a Data Warehouse' The Australian, Computer Journal, vol.30, pp.122-128, 1998.

. Stilgherrian, Big data is just a big, distracting bubble, soon to burst' ZDNet, p.11, 2014.

. Stilgherrian, Why big data evangelists should be sent to re-education camps' ZDNet/why-big-data-evangelists-should-be- sent-to-re-education-camps-7000033862, 2014.

Y. Wand and R. Y. Wang, Anchoring data quality dimensions in ontological foundations, Communications of the ACM, vol.39, issue.11, pp.86-95, 1996.
DOI : 10.1145/240455.240479

R. Y. Wang and D. M. Strong, Beyond Accuracy: What Data Quality Means to Data Consumers, Journal of Management Information Systems, vol.1, issue.3, pp.5-33, 1996.
DOI : 10.2307/2490193

J. Widom, Research problems in data warehousing, Proceedings of the fourth international conference on Information and knowledge management , CIKM '95, 1995.
DOI : 10.1145/221270.221319

. Acknowledgements, This paper was developed from my opening keynote invited for the IFIP Summer School on Privacy and Identity Management, p.22, 2016.