{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T12:10:36Z","timestamp":1771503036957,"version":"3.50.1"},"reference-count":152,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T00:00:00Z","timestamp":1610928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T00:00:00Z","timestamp":1610928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10257-020-00500-5","type":"journal-article","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T20:11:02Z","timestamp":1611000662000},"page":"313-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context: a systematic mapping study"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0147-9167","authenticated-orcid":false,"given":"Georgios","family":"Georgiadis","sequence":"first","affiliation":[]},{"given":"Geert","family":"Poels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,18]]},"reference":[{"key":"500_CR1","doi-asserted-by":"publisher","unstructured":"Ahlemann F, Stettiner E, Messerschmidt M, Legner C (2012) Strategic enterprise architecture management. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-24223-6","DOI":"10.1007\/978-3-642-24223-6"},{"key":"500_CR2","doi-asserted-by":"publisher","unstructured":"Aiken P, Gorman M (2013) The case for the chief data officer: recasting the C-suite to leverage your most valuable asset. Elsevier, Burlington. https:\/\/doi.org\/10.1016\/C2012-0-02692-0","DOI":"10.1016\/C2012-0-02692-0"},{"key":"500_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.csi.2017.01.004","volume":"54","author":"J Akoka","year":"2017","unstructured":"Akoka J, Comyn-Wattiau I, Laoufi N (2017) Research on Big Data\u2014systematic mapping study. Comput Stand Inter 54:105\u2013115. https:\/\/doi.org\/10.1016\/j.csi.2017.01.004","journal-title":"Comput Stand Inter"},{"key":"500_CR4","doi-asserted-by":"publisher","unstructured":"Aldea A, Iacob M-E, Wombacher A, Marlon H, Franck T (2018) Enterprise architecture 4.0\u2014a vision, an approach and software tool support. In: 2018 IEEE 22nd international enterprise distributed object computing conference (EDOC), 2018. pp 1\u201310. https:\/\/doi.org\/10.1109\/EDOC.2018.00011","DOI":"10.1109\/EDOC.2018.00011"},{"key":"500_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.bushor.2017.01.002","volume":"60","author":"A Alharthi","year":"2017","unstructured":"Alharthi A, Krotov V, Bowman M (2017) Addressing barriers to big data. Bus Horiz 60:285\u2013292. https:\/\/doi.org\/10.1016\/j.bushor.2017.01.002","journal-title":"Bus Horiz"},{"key":"500_CR6","doi-asserted-by":"publisher","first-page":"3629","DOI":"10.1109\/access.2019.2923270","volume":"8","author":"F Amalina","year":"2020","unstructured":"Amalina F, Targio Hashem IA, Azizul ZH, Fong AT, Firdaus A, Imran M, Anuar NB (2020) Blending big data analytics: review on challenges and a recent study. IEEE Access 8:3629\u20133645. https:\/\/doi.org\/10.1109\/access.2019.2923270","journal-title":"IEEE Access"},{"key":"500_CR7","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.im.2005.07.002","volume":"43","author":"T Anthony Byrd","year":"2006","unstructured":"Anthony Byrd T, Lewis BR, Bryan RW (2006) The leveraging influence of strategic alignment on IT investment: an empirical examination. Inf Manage 43:308\u2013321. https:\/\/doi.org\/10.1016\/j.im.2005.07.002","journal-title":"Inf Manage"},{"key":"500_CR8","doi-asserted-by":"publisher","unstructured":"Basso T, Matsunaga R, Moraes R, Antunes N (2016) Challenges on anonymity, privacy, and big data. In: 2016 Seventh Latin-American symposium on dependable computing (LADC), 19\u201321 October. IEEE, pp 164\u2013171. https:\/\/doi.org\/10.1109\/ladc.2016.34","DOI":"10.1109\/ladc.2016.34"},{"key":"500_CR9","unstructured":"BBC (2017) Equifax says almost 400,000 Britons hit in data breach. https:\/\/www.bbc.com\/news\/technology-41286638. Accessed 15 September 2017"},{"key":"500_CR10","doi-asserted-by":"publisher","unstructured":"Beckett P (2017) GDPR compliance: your tech department\u2019s next big opportunity, vol 2017. Elsevier, Amsterdam. https:\/\/doi.org\/10.1016\/S1361-3723(17)30041-6","DOI":"10.1016\/S1361-3723(17)30041-6"},{"key":"500_CR11","doi-asserted-by":"publisher","unstructured":"Bernard S, Ho SM (2010) Enterprise architecture as context and method for designing and implementing information security and data privacy controls in Government Agencies. In: Saha P (ed) Advances in government enterprise rchitecture. IGI Global, pp 340\u2013370. https:\/\/doi.org\/10.4018\/978-1-60566-068-4.ch015","DOI":"10.4018\/978-1-60566-068-4.ch015"},{"key":"500_CR12","doi-asserted-by":"publisher","unstructured":"Bertino E, Kundu A, Sura Z (2019) Data transparency with blockchain and AI ethics. ACM J Data Inf Qual 11. https:\/\/doi.org\/10.1145\/3312750","DOI":"10.1145\/3312750"},{"key":"500_CR13","doi-asserted-by":"publisher","unstructured":"Bertot JC, Choi H (2013) Big Data and e-Government: issues, policies, and recommendations. In: 14th Annual international conference on digital government research, pp 1\u201310. https:\/\/doi.org\/10.1145\/2479724.2479730","DOI":"10.1145\/2479724.2479730"},{"key":"500_CR14","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.clsr.2008.09.001","volume":"24","author":"MD Birnhack","year":"2008","unstructured":"Birnhack MD (2008) The EU data protection directive: an engine of a global regime. Comput Law Security Rev 24:508\u2013520. https:\/\/doi.org\/10.1016\/j.clsr.2008.09.001","journal-title":"Comput Law Security Rev"},{"key":"500_CR15","doi-asserted-by":"publisher","unstructured":"Blanco-Lain\u00e9 G, Sottet JS, Dupuy-Chessa S (2020) Using an enterprise architecture model for GDPR compliance principles. In: 12th IFIP conference on practice of entreprise modeling (POEM), 2020. Springer International Publishing, Berlin, pp 199\u2013214. https:\/\/doi.org\/10.1007\/978-3-030-35151-9_13","DOI":"10.1007\/978-3-030-35151-9_13"},{"key":"500_CR16","unstructured":"Borasi P, Khan S, Kumar V (2020) Europe Big Data and business analytics market size & share. https:\/\/www.alliedmarketresearch.com\/europe-big-data-and-business-analytics-market-A06533. Accessed 05 June 2020"},{"key":"500_CR17","unstructured":"Bracy J (2017) The Equifax breach, response, and fallout. https:\/\/iapp.org\/news\/a\/equifax-data-breach-affects-143-million-consumers\/."},{"key":"500_CR18","doi-asserted-by":"publisher","unstructured":"Burmeister F, Drews P, Schirmer I (2019) A privacy-driven enterprise architecture meta-model for supporting compliance with the general data protection regulation. In: 52nd Hawaii international conference on system sciences, pp 6052\u20136061. https:\/\/doi.org\/10.24251\/hicss.2019.729","DOI":"10.24251\/hicss.2019.729"},{"key":"500_CR19","doi-asserted-by":"publisher","unstructured":"Burmeister F, Huth D, Drews P, Schirmer I, Matthes F (2020) Enhancing information governance with enterprise architecture management: design principles derived from benefits and barriers in the GDPR implementation. In: 53rd Hawaii international conference on system sciences, pp 5593\u20135602. https:\/\/doi.org\/10.24251\/hicss.2020.688","DOI":"10.24251\/hicss.2020.688"},{"key":"500_CR20","unstructured":"Cagle K (2015) Understanding the Big Data life-cycle. https:\/\/www.linkedin.com\/pulse\/four-keys-big-data-life-cycle-kurt-cagle\/. Accessed 10 February 2016"},{"key":"500_CR21","doi-asserted-by":"publisher","unstructured":"Campisi P, Maiorana E, Neri A (2009) Privacy protection in social media networks a dream that can come true? In: 2009 16th International conference on digital signal processing. IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/icdsp.2009.5201125","DOI":"10.1109\/icdsp.2009.5201125"},{"key":"500_CR22","unstructured":"Capgemini (2019) Championing data protection and privacy: a source of competitive advantage in the digital century. https:\/\/www.capgemini.com\/be-en\/research-reports\/championing-data-protection-and-privacy\/"},{"key":"500_CR23","doi-asserted-by":"publisher","unstructured":"Chao DF (2018) Sustainability for the Holistic ecosystem: regulation guide designing for the prevalent technology development of China emerging communications: Big Data, IoT, 5G etc. In: 2018 IEEE International symposium on innovation and entrepreneurship (TEMS-ISIE), 2018. IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/TEMS-ISIE.2018.8478529","DOI":"10.1109\/TEMS-ISIE.2018.8478529"},{"key":"500_CR24","volume-title":"Constructing grounded theory. A practical guide through qualitative analysis","author":"K Charmaz","year":"2006","unstructured":"Charmaz K (2006) Constructing grounded theory. A practical guide through qualitative analysis. SAGE Publications Ltd, CA"},{"key":"500_CR25","doi-asserted-by":"publisher","unstructured":"Chen H, Yan Z (2016) Security and privacy in big data lifetime: a review. In: 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC (SpaCCS). Springer International Publishing, Berlin, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-319-49145-5_1","DOI":"10.1007\/978-3-319-49145-5_1"},{"key":"500_CR26","doi-asserted-by":"publisher","unstructured":"Chibba M, Cavoukian A (2015) Privacy, consumer trust and big data: privacy by design and the 3 C'S. In: 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015), 2015. pp 1\u20135. https:\/\/doi.org\/10.1109\/Kaleidoscope.2015.7383624","DOI":"10.1109\/Kaleidoscope.2015.7383624"},{"key":"500_CR27","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford K, Schultz J (2014) Big data and due process: toward a framework to redress predictive privacy harms. BCL Rev 55:93","journal-title":"BCL Rev"},{"key":"500_CR28","unstructured":"Crowd Research Partners (2018) GDPR compliance report. https:\/\/crowdresearchpartners.com\/portfolio\/gdpr-compliance-report\/"},{"key":"500_CR29","unstructured":"CSC (2020) Cyberspace Solarium Commission White Paper #1: Cybersecurity Lessons From The Pandemic. Cyberspace Solarium Commission, https:\/\/www.solarium.gov\/public-communications\/pandemic-white-paper"},{"key":"500_CR30","first-page":"243","volume":"9","author":"MJ Culnan","year":"2010","unstructured":"Culnan MJ, McHugh PJ, Zubillaga JI (2010) How large U.S. companies can use twitter and other social media to gain business value. MIS Quart Executive 9:243\u2013259","journal-title":"MIS Quart Executive"},{"key":"500_CR31","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.techsoc.2018.03.005","volume":"54","author":"M Cuquet","year":"2018","unstructured":"Cuquet M, Fensel A (2018) The societal impact of big data: a research roadmap for Europe. Technol Soc 54:74\u201386. https:\/\/doi.org\/10.1016\/j.techsoc.2018.03.005","journal-title":"Technol Soc"},{"key":"500_CR32","volume-title":"DAMA-DMBOK: Data Management Body of Knowledge","author":"DAMA","year":"2017","unstructured":"DAMA (2017) DAMA-DMBOK: Data Management Body of Knowledge, 2nd edn. Dama International, WA","edition":"2"},{"key":"500_CR33","unstructured":"Deloitte (2020) Privacy and Data Protection in the age of COVID-19. https:\/\/www2.deloitte.com\/be\/en\/pages\/risk\/articles\/privacy-and-data-protection-in-the-age-of-covid-19.html"},{"key":"500_CR34","doi-asserted-by":"publisher","unstructured":"Demchenko Y, Laat Cd, Membrey P (2014) Defining architecture components of the Big Data Ecosystem. In: 2014 International conference on collaboration technologies and systems (CTS), 2014, pp 104\u2013112. https:\/\/doi.org\/10.1109\/CTS.2014.6867550","DOI":"10.1109\/CTS.2014.6867550"},{"key":"500_CR35","unstructured":"EC (2000) Charter of Fundamental Rights of the European Union vol C. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:12012P\/TXT"},{"key":"500_CR36","unstructured":"EC (2018) Ethics and data protection. https:\/\/ec.europa.eu\/info\/sites\/info\/files\/5._h2020_ethics_and_data_protection_0.pdf"},{"key":"500_CR37","unstructured":"EDPS (2016) EDPS Opinion on coherent enforcement of fundamental rights in the age of big data. https:\/\/edps.europa.eu\/data-protection\/our-work\/publications\/opinions\/big-data_en"},{"key":"500_CR38","unstructured":"EDPS (2018) Ethics: European Data Protection Supervisor. https:\/\/edps.europa.eu\/data-protection\/our-work\/ethics_en. Accessed 10 March 2018"},{"key":"500_CR39","unstructured":"EESC (2017) The Ethics of Big Data: Balancing Economic Benefits and Ethical Questions of Big Data in the EU Policy Context. https:\/\/www.eesc.europa.eu\/en\/our-work\/publications-other-work\/publications\/ethics-big-data"},{"key":"500_CR40","unstructured":"EP (1995) Directive 95\/46\/EC. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A31995L0046"},{"key":"500_CR41","doi-asserted-by":"publisher","first-page":"404","DOI":"10.2307\/4131441","volume":"49","author":"SK Ethiraj","year":"2004","unstructured":"Ethiraj SK, Levinthal D (2004) Bounded rationality and the search for organizational architecture: an evolutionary perspective on the design of organizations and their evolvability. Admin Sci Quart 49:404\u2013437","journal-title":"Admin Sci Quart"},{"key":"500_CR42","unstructured":"EU (2016) (EU) 2016\/679 GDPR. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"500_CR43","doi-asserted-by":"publisher","unstructured":"Favaretto M, De Clercq E, Elger BS (2019) Big Data and discrimination: perils, promises and solutions. A systematic review. J Big Data 6. https:\/\/doi.org\/10.1186\/s40537-019-0177-4","DOI":"10.1186\/s40537-019-0177-4"},{"key":"500_CR44","unstructured":"Fritsch L, Abie H (2008) Towards a research road map for the management of privacy risks in information systems. In: SICHERHEIT 2008 Gesellschaft f\u00fcr Informatik eV (GI)."},{"key":"500_CR45","doi-asserted-by":"publisher","unstructured":"Gahi Y, Guennoun M, Mouftah HT (2016) Big data nalytics: Security and privacy challenges. In: 2016 IEEE symposium on computers and communication (ISCC), Messina, 2016. IEEE, pp 952\u2013957. https:\/\/doi.org\/10.1109\/ISCC.2016.7543859","DOI":"10.1109\/ISCC.2016.7543859"},{"key":"500_CR46","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","volume":"35","author":"A Gandomi","year":"2015","unstructured":"Gandomi A, Haider M (2015) Beyond the hype: Big data concepts, methods, and analytics. Int J Inf Manage 35:137\u2013144. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.10.007","journal-title":"Int J Inf Manage"},{"key":"500_CR47","unstructured":"Gartner (2017) Gartner says organizations are unprepared for the 2018 European Data Protection Regulation. https:\/\/www.gartner.com\/newsroom\/id\/3701117. Accessed 10 May 2017"},{"key":"500_CR48","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.clsr.2017.12.003","volume":"34","author":"R Gellert","year":"2018","unstructured":"Gellert R (2018) Understanding the notion of risk in the general data protection regulation. Comput Law Security Rev 34:279\u2013288. https:\/\/doi.org\/10.1016\/j.clsr.2017.12.003","journal-title":"Comput Law Security Rev"},{"key":"500_CR49","unstructured":"Gomez A (2017) Fundamental rights implications of big data: privacy, data protection, non-discrimination, security and law-enforcement. Committee on Civil Liberties, Justice and Home Affairs, https:\/\/www.europarl.europa.eu\/doceo\/document\/A-8-2017-0044_EN.html"},{"key":"500_CR50","doi-asserted-by":"publisher","unstructured":"Gong Y, Janssen M (2017) Enterprise architectures for supporting the adoption of big data. In: Hinnant CC, Ojo A (eds) 2017\u201318th Annual international conference on digital government research, NY, 2017. ACM, New York, pp 505\u2013510. https:\/\/doi.org\/10.1145\/3085228.3085275","DOI":"10.1145\/3085228.3085275"},{"key":"500_CR51","doi-asserted-by":"publisher","first-page":"37","DOI":"10.4067\/S0718-18762021000100104","volume":"16","author":"Y Gong","year":"2020","unstructured":"Gong Y, Janssen M (2020) Roles and capabilities of enterprise architecture in big data analytics technology adoption and implementation. J Theor Appl Electronic Commerce Res 16:37\u201351. https:\/\/doi.org\/10.4067\/S0718-18762021000100104","journal-title":"J Theor Appl Electronic Commerce Res"},{"key":"500_CR52","unstructured":"Guggenheim (2016) Technological Innovation Portfolio , Series 11. https:\/\/www.guggenheiminvestments.com\/uit\/trust\/atec011"},{"key":"500_CR53","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12394-010-0073-8","volume":"3","author":"S G\u00fcrses","year":"2010","unstructured":"G\u00fcrses S (2010) PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. Identity Inf Soc 3:539\u2013563. https:\/\/doi.org\/10.1007\/s12394-010-0073-8","journal-title":"Identity Inf Soc"},{"key":"500_CR54","volume-title":"Ethical dimensions of GDPR: commentary on the general data protection regulation","author":"H Hijmans","year":"2018","unstructured":"Hijmans H, Raab CD (2018) Ethical dimensions of GDPR: commentary on the general data protection regulation. Edward Elgar Publishing, UK"},{"key":"500_CR55","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s11673-017-9810-0","volume":"14","author":"S Holm","year":"2017","unstructured":"Holm S, Ploug T (2017) Big Data and health research\u2014the governance challenges in a mixed data. Econ Bioethical Inquiry 14:515\u2013525. https:\/\/doi.org\/10.1007\/s11673-017-9810-0","journal-title":"Econ Bioethical Inquiry"},{"key":"500_CR57","doi-asserted-by":"publisher","unstructured":"Huth D, Tanakol A, Matthes F (2019) Using enterprise architecture models for creating the record of processing activities (Art. 30 GDPR). In: 2019 IEEE 23rd International enterprise distributed object computing conference (EDOC), France, 2019. IEEE, pp 98\u2013104. https:\/\/doi.org\/10.1109\/EDOC.2019.00021","DOI":"10.1109\/EDOC.2019.00021"},{"key":"500_CR56","doi-asserted-by":"publisher","unstructured":"Huth D, Burmeister F, Matthes F, Schirmer I (2020) Empirical results on the collaboration between enterprise architecture and data protection management during the implementation of the GDPR. In: 2020 Hawaii international conference on system sciences (HICSS), 2020. https:\/\/doi.org\/10.24251\/HICSS.2020.715","DOI":"10.24251\/HICSS.2020.715"},{"key":"500_CR58","unstructured":"Ibraimova A (2017) How does the GDPR apply to Big Data? http:\/\/www.iptechblog.com\/2017\/03\/how-does-the-gdpr-apply-to-big-data\/. Accessed 20 April 2018"},{"key":"500_CR59","unstructured":"IDC (2019) Worldwide Public Cloud Services Spending Forecast to Reach $160 Billion This Year, According to IDC. https:\/\/www.businesswire.com\/news\/home\/20190228005137\/en\/Worldwide-Public-Cloud-Services-Spending-Forecast-Reach. 28 February 2019"},{"key":"500_CR60","unstructured":"ISACA (2013) COBIT 5: Enabling Information. www.isaca.org"},{"key":"500_CR61","unstructured":"ISACA (2018) GDPR: The end of the beginning. www.isaca.org"},{"key":"500_CR62","unstructured":"ITRC (2019) 2018 Annual data breach year-end review. https:\/\/www.idtheftcenter.org\/2018-data-breaches\/"},{"key":"500_CR63","doi-asserted-by":"publisher","unstructured":"Jalali S, Wohlin C (2012) Systematic literature studies: database searches vs . backward snowballing 2012 ACM-IEEE international symposium on empirical software engineering and measurement (ESEM), pp 29\u201338. https:\/\/doi.org\/10.1145\/2372251.2372257","DOI":"10.1145\/2372251.2372257"},{"key":"500_CR64","doi-asserted-by":"publisher","unstructured":"Jensen M (2013) Challenges of privacy protection in Big Data analytics. In: 2013 IEEE International congress on Big Data, Santa Clara, CA, 2013. IEEE, pp 235\u2013238. https:\/\/doi.org\/10.1109\/BigData.Congress.2013.39","DOI":"10.1109\/BigData.Congress.2013.39"},{"key":"500_CR65","doi-asserted-by":"publisher","unstructured":"Joo MH, Yoon SP, Kim SY, Kwon HY (2017) Research on distribution of responsibility for de-identification policy of personal information. In: 2017 18th Annual international conference on digital government research, 2017. pp 74\u201383. https:\/\/doi.org\/10.1145\/3085228.3085243","DOI":"10.1145\/3085228.3085243"},{"key":"500_CR66","doi-asserted-by":"publisher","first-page":"S46","DOI":"10.1080\/10999922.2018.1448218","volume":"20","author":"CL Jurkiewicz","year":"2018","unstructured":"Jurkiewicz CL (2018) Big Data, big concerns: ethics in the digital age. Public Integrity 20:S46\u2013S59. https:\/\/doi.org\/10.1080\/10999922.2018.1448218","journal-title":"Public Integrity"},{"key":"500_CR67","doi-asserted-by":"publisher","unstructured":"Kaisler S, Armour F, Espinosa JA, Money W (2013) Big Data: issues and challenges moving forward. In: 2013 46th Hawaii international conference on system sciences, Wailea, Maui, HI, 2013. IEEE, pp 995\u20131004. https:\/\/doi.org\/10.1109\/hicss.2013.645","DOI":"10.1109\/hicss.2013.645"},{"key":"500_CR68","doi-asserted-by":"publisher","unstructured":"Kappelman L, McGinnis T, Pettite A, Sidorova A, McGinnis T (2008) Enterprise architecture: charting the territory for Academic Research. In: 2008 Americas Conference on Information Systems (AMCIS). Boca Raton, pp 96\u2013110. https:\/\/doi.org\/10.1201\/9781439811146","DOI":"10.1201\/9781439811146"},{"key":"500_CR69","doi-asserted-by":"publisher","unstructured":"Kearny C, Gerber A, Van Der Merwe A (2016) Data-driven enterprise architecture and the TOGAF ADM phases. In: 2016 IEEE International conference on systems, man, and cybernetics (SMC), 2016. IEEE, pp 4603\u20134608. https:\/\/doi.org\/10.1109\/SMC.2016.7844957","DOI":"10.1109\/SMC.2016.7844957"},{"key":"500_CR70","doi-asserted-by":"publisher","unstructured":"Kehrer S, Jugel D, Categorizing ZA (2016a) Requirements for Enterprise Architecture Management in Big Data Literature. In: (2016) IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW), Vienna. IEEE. https:\/\/doi.org\/10.1109\/EDOCW.2016.7584352","DOI":"10.1109\/EDOCW.2016.7584352"},{"key":"500_CR71","unstructured":"Kehrer S, Jugel D, Zimmermann A (2016b) A systematic literature review of big data literature for EA evolution. 2016 Digital Enterprise Computing (DEC). Oblingen, Germany. LNI. Gesellschaft f\u00fcr Informatik e.V., pp 209\u2013220"},{"key":"500_CR72","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.clsr.2014.07.006","volume":"30","author":"R Kemp","year":"2014","unstructured":"Kemp R (2014) Legal aspects of managing Big Data. Comput Law Security Rev 30:482\u2013491. https:\/\/doi.org\/10.1016\/j.clsr.2014.07.006","journal-title":"Comput Law Security Rev"},{"key":"500_CR73","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6","author":"A Khajeh-Hosseini","year":"2010","unstructured":"Khajeh-Hosseini A, Sommerville I, Sriram I (2010) Research challenges for enterprise cloud. Comput J Internet Serv Appl. https:\/\/doi.org\/10.1007\/s13174-010-0007-6","journal-title":"Comput J Internet Serv Appl"},{"key":"500_CR74","doi-asserted-by":"publisher","unstructured":"King N, Brooks J, Tabari S (2018) Template analysis in business and management research. In: Qualitative methodologies in organization studies, vol II: Methods and possibilities. Palgrave Macmillan, Cham, pp 179\u2013206. https:\/\/doi.org\/10.1007\/978-3-319-65442-3_8","DOI":"10.1007\/978-3-319-65442-3_8"},{"key":"500_CR75","first-page":"1","volume":"33","author":"B Kitchenham","year":"2004","unstructured":"Kitchenham B (2004) Procedures for performing systematic reviews. Keele University, UK 33:1\u201326","journal-title":"Keele University, UK"},{"key":"500_CR76","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.infsof.2010.12.011","volume":"53","author":"B Kitchenham","year":"2011","unstructured":"Kitchenham B, Budgen D, Brereton OP (2011) The value of mapping studies \u2013 a participant-observer case study. Inf Softw Technol 53:638\u2013651. https:\/\/doi.org\/10.1016\/j.infsof.2010.12.011","journal-title":"Inf Softw Technol"},{"key":"500_CR77","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.infsof.2010.12.011","volume":"53","author":"B Kitchenham","year":"2011","unstructured":"Kitchenham B, Budgen D, Pearl Brereton O (2011) Using mapping studies as the basis for further research\u2014a participant-observer case study. Inf Softw Technol 53:638\u2013651. https:\/\/doi.org\/10.1016\/j.infsof.2010.12.011","journal-title":"Inf Softw Technol"},{"key":"500_CR78","doi-asserted-by":"publisher","unstructured":"Kitchenham B, Dyba T, Jorgensen M (2004) Evidence-based software engineering. In: 26th International conference on software engineering, Edinburgh, UK, 2004. pp 273\u2013281. https:\/\/doi.org\/10.1109\/ICSE.2004.1317449","DOI":"10.1109\/ICSE.2004.1317449"},{"key":"500_CR79","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technol 51:7\u201315. https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","journal-title":"Inf Softw Technol"},{"key":"500_CR80","doi-asserted-by":"publisher","unstructured":"Kotusev S, Singh M, Storey I (2015) Consolidating enterprise architecture management research. In: 2015 48th Hawaii international conference on system sciences, Kauai, HI, 2015. IEEE, pp 4069\u20134078. https:\/\/doi.org\/10.1109\/HICSS.2015.489","DOI":"10.1109\/HICSS.2015.489"},{"key":"500_CR81","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","volume":"38","author":"N Kshetri","year":"2014","unstructured":"Kshetri N (2014) Big data\u2019s impact on privacy, security and consumer welfare. Telecommun Policy 38:1134\u20131145. https:\/\/doi.org\/10.1016\/j.telpol.2014.10.002","journal-title":"Telecommun Policy"},{"key":"500_CR82","unstructured":"Kuneva M (2009) Keynote Speech\u2014Roundtable on online data collection, targeting and profiling. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/SPEECH_09_156. Accessed 11 May 2017"},{"key":"500_CR83","unstructured":"Kunz T, Selzer A, Waldmann U (2014) On the measurement of data protection compliance of cloud services. In: Gesellschaft fur Informatik (GI), 2014. GI-Jahrestagung, pp 289\u2013296"},{"key":"500_CR84","doi-asserted-by":"publisher","unstructured":"Lagerstr\u00f6m R, Sommestad T, Buschle M, Ekstedt M (2011) Enterprise architecture management's impact on information technology success. In: 2011 44th Hawaii International Conference On System Sciences, Kauai, HI, 2011. IEEE, pp 1\u201310. https:\/\/doi.org\/10.1109\/HICSS.2011.187","DOI":"10.1109\/HICSS.2011.187"},{"key":"500_CR85","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.bushor.2017.01.004","volume":"60","author":"I Lee","year":"2017","unstructured":"Lee I (2017) Big data: dimensions, evolution, impacts, and challenges. Bus Horizons 60:293\u2013303. https:\/\/doi.org\/10.1016\/j.bushor.2017.01.004","journal-title":"Bus Horizons"},{"key":"500_CR86","doi-asserted-by":"publisher","unstructured":"Li P, Guo S (2014) Load balancing for privacy-preserving access to big data in cloud. In: 2014 IEEE Conference on computer communications workshops (INFOCOM WKSHPS), Toronto, ON, 2014. IEEE, pp 524\u2013528. https:\/\/doi.org\/10.1109\/INFCOMW.2014.6849286","DOI":"10.1109\/INFCOMW.2014.6849286"},{"key":"500_CR87","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.future.2017.03.033","volume":"72","author":"Q Liu","year":"2017","unstructured":"Liu Q, Srinivasan A, Hu J, Wang G (2017) Preface: security and privacy in big data clouds. Future Generation Comput Syst 72:206\u2013207. https:\/\/doi.org\/10.1016\/j.future.2017.03.033","journal-title":"Future Generation Comput Syst"},{"key":"500_CR88","unstructured":"Ln\u011bni\u010dka M et al. (2017) Components of Big Data analytics for strategic management of enterprise architecture. In: 2017 12th International conference on strategic management and its support by information systems, 2017, pp 398\u2013406"},{"key":"500_CR89","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10257-012-0211-y","volume":"12","author":"J L\u00f6he","year":"2014","unstructured":"L\u00f6he J, Legner C (2014) Overcoming implementation challenges in enterprise architecture management: a design theory for architecture-driven IT Management (ADRIMA). Inf Syst E-Bus Manage 12:101\u2013137. https:\/\/doi.org\/10.1007\/s10257-012-0211-y","journal-title":"Inf Syst E-Bus Manage"},{"key":"500_CR90","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1111\/j.1083-6101.2012.01576.x","volume":"17","author":"K Lovejoy","year":"2012","unstructured":"Lovejoy K, Saxton GD (2012) Information, community, and action: how nonprofit organizations use social media. J Comput-Mediated Commun 17:337\u2013353. https:\/\/doi.org\/10.1111\/j.1083-6101.2012.01576.x","journal-title":"J Comput-Mediated Commun"},{"key":"500_CR91","doi-asserted-by":"publisher","unstructured":"Mansfield-Devine S (2017) Data governance: going beyond compliance vol 2017. Elsevier Ltd. Amsterdam. https:\/\/doi.org\/10.1016\/S1361-3723(17)30052-0","DOI":"10.1016\/S1361-3723(17)30052-0"},{"key":"500_CR92","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.clsr.2014.09.004","volume":"30","author":"A Mantelero","year":"2014","unstructured":"Mantelero A (2014) The future of consumer data protection in the E.U. Re-thinking the \u201cnotice and consent\u201d paradigm in the new era of predictive analytics. Comput Law Security Rev 30:643\u2013660. https:\/\/doi.org\/10.1016\/j.clsr.2014.09.004","journal-title":"Comput Law Security Rev"},{"key":"500_CR93","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.clsr.2017.05.011","volume":"33","author":"A Mantelero","year":"2017","unstructured":"Mantelero A (2017) Regulating big data. The guidelines of the Council of Europe in the context of the European data protection framework. Comput Law Security Rev 33:584\u2013602. https:\/\/doi.org\/10.1016\/j.clsr.2017.05.011","journal-title":"Comput Law Security Rev"},{"key":"500_CR94","unstructured":"Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Roxburgh C, Hung Byers A (2011) Big data: the next frontier for innovation , competition , and productivity. https:\/\/www.mckinsey.com\/business-functions\/mckinsey-digital\/our-insights\/big-data-the-next-frontier-for-innovation"},{"key":"500_CR95","unstructured":"McKInsey (2016) How companies are using big data and analytics. https:\/\/www.mckinsey.com\/business-functions\/mckinsey-analytics\/our-insights\/how-companies-are-using-big-data-and-analytics"},{"key":"500_CR96","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1093\/medlaw\/fwz016","volume":"28","author":"A McMahon","year":"2020","unstructured":"McMahon A, Buyx A, Prainsack B (2020) Big Data governance needs more collective responsibility: the role of harm mitigation in the governance of data use in medicine and beyond. Med Law Rev 28:155\u2013182. https:\/\/doi.org\/10.1093\/medlaw\/fwz016","journal-title":"Med Law Rev"},{"key":"500_CR97","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1287\/mnsc.46.4.513.12060","volume":"46","author":"H Mendelson","year":"2003","unstructured":"Mendelson H (2003) Organizational architecture and success in the information technology. Ind Manage Sci 46:513\u2013529. https:\/\/doi.org\/10.1287\/mnsc.46.4.513.12060","journal-title":"Ind Manage Sci"},{"key":"500_CR98","unstructured":"Mikkelsen D, Soller H, Strandell-jansson M, Wahlers M (2019) GDPR compliance since May 2018: a continuing challenge. https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/gdpr-compliance-after-may-2018-a-continuing-challenge"},{"key":"500_CR99","unstructured":"Minerva R, Biru A, Rotondi D (2015) Towards a definition of the Internet of Things (IoT). https:\/\/iot.ieee.org\/images\/files\/pdf\/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf"},{"key":"500_CR100","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.clsr.2018.01.002","volume":"34","author":"M Mourby","year":"2018","unstructured":"Mourby M et al (2018) Are \u2018pseudonymised\u2019 data always personal data? Implications of the GDPR for administrative data research in the UK. Comput Law Security Rev 34:222\u2013233. https:\/\/doi.org\/10.1016\/j.clsr.2018.01.002","journal-title":"Comput Law Security Rev"},{"key":"500_CR101","unstructured":"Moyer L (2017) Equifax shares sink as Massachusetts prepares lawsuit over breach. https:\/\/www.cnbc.com\/2017\/09\/13\/equifax-shares-sink-9-percent-as-massachusetts-prepares-lawsuit-over-breach.html. Accessed 20 August 2018"},{"key":"500_CR102","doi-asserted-by":"publisher","first-page":"22965","DOI":"10.1109\/ACCESS.2017.2765539","volume":"5","author":"P Murmann","year":"2017","unstructured":"Murmann P, Fischer-H\u00fcbner S (2017) Tools for achieving usable ex post transparency: a survey. IEEE. Access 5:22965\u201322991. https:\/\/doi.org\/10.1109\/ACCESS.2017.2765539","journal-title":"Access"},{"key":"500_CR103","volume-title":"Organizational architecture: designs for changing organizations","author":"DA Nadler","year":"1992","unstructured":"Nadler DA, Gerstein MS, Shaw RB (1992) Organizational architecture: designs for changing organizations. Jossey-Bass Inc Pub, San Francisco"},{"key":"500_CR104","unstructured":"Newman D, Logan D (2006) Governance is an essential building block for enterprise information management. https:\/\/www.gartner.com\/en\/documents\/492444\/governance-is-an-essential-building-block-for-enterprise-"},{"key":"500_CR105","doi-asserted-by":"publisher","unstructured":"NIST (2013) Security and privacy controls for Federal information systems and organizations, vol 800. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r4.pdf. https:\/\/doi.org\/10.6028\/NIST.SP.800-53r4","DOI":"10.6028\/NIST.SP.800-53r4"},{"key":"500_CR106","unstructured":"Olaitan O, Herselman M, Wayi N (2016) Taxonomy of literature to justify data governance as a prerequisite for information governance. In: 28th Annual conference of the Southern African Institute of Management Scientists (SAIMS), Pretoria, South Africa, 2016, pp 586\u2013605"},{"key":"500_CR107","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1016\/j.sbspro.2015.06.147","volume":"195","author":"H \u00d6zk\u00f6se","year":"2015","unstructured":"\u00d6zk\u00f6se H, Ar\u0131 ES, Gencer C (2015) Yesterday, today and tomorrow of Big Data. Procedia Soc Behav Sci 195:1042\u20131050. https:\/\/doi.org\/10.1016\/j.sbspro.2015.06.147","journal-title":"Procedia Soc Behav Sci"},{"key":"500_CR108","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.electstud.2016.04.014","volume":"44","author":"O Parnet","year":"2016","unstructured":"Parnet O, Benoit K, Nulty P, Theocharis Y, Popa SA (2016) Social media and political communication in the 2014 elections to the European Parliament. Electoral Stud 44:429\u2013444. https:\/\/doi.org\/10.1016\/j.electstud.2016.04.014","journal-title":"Electoral Stud"},{"key":"500_CR109","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.112","author":"HK Patil","year":"2014","unstructured":"Patil HK, Seshadri R, (2014) Big Data security and privacy issues in healthcare. In: (2014) IEEE International congress on Big Data, Anchorage, AK, 2014. IEEE. https:\/\/doi.org\/10.1109\/BigData.Congress.2014.112","journal-title":"IEEE"},{"key":"500_CR110","doi-asserted-by":"publisher","unstructured":"Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE second international conference on cloud computing technology and science, Indianapolis, IN, 2010. IEEE, pp 693\u2013702. https:\/\/doi.org\/10.1109\/CloudCom.2010.66","DOI":"10.1109\/CloudCom.2010.66"},{"key":"500_CR111","doi-asserted-by":"publisher","unstructured":"Petersen K, Feldt R, Mujtaba S, Mattson M (2008) Systematic mapping studies in software engineering. In: 2008 12th International conference on evaluation and assessment in software engineering (EASE), Italy, 2008. BCS Learning & Development Ltd, pp 68\u201377. https:\/\/doi.org\/10.1142\/S0218194007003112","DOI":"10.1142\/S0218194007003112"},{"key":"500_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1\u201318. https:\/\/doi.org\/10.1016\/j.infsof.2015.03.007","journal-title":"Inf Softw Technol"},{"key":"500_CR113","unstructured":"Ponemon Institute LC (2018) 2018 Cost of data breach study, global overview. https:\/\/www.illusivenetworks.com\/"},{"key":"500_CR114","unstructured":"PrivacyRightsClearinghouse (2017) Data breaches. https:\/\/www.privacyrights.org\/data-breaches"},{"key":"500_CR115","unstructured":"Radeke F (2010) Awaiting explanation in the field of enterprise architecture management. In, (2010) Americas conference on information systems (AMCIS). Lima, Peru 2010:442"},{"key":"500_CR116","unstructured":"Radeke F (2011) Toward understanding enterprise architecture management\u2019s role in strategic change: antecedents, processes, outcomes. In: 10th International conference on Wirtschaftsinformatik, WI, 2011, p 62"},{"key":"500_CR117","unstructured":"Robinson N, Graux H, Botterman M, Valeri L (2009) Review of the European data protection directive. https:\/\/ico.org.uk\/media\/about-the-ico\/documents\/1042349\/review-of-eu-dp-directive.pdf"},{"key":"500_CR118","unstructured":"Rozehnal P, Novak V (2018) The core of enterprise architecture as a management tool: GDPR implementation case study 2018 26th interdisciplinary information management talks, pp 359\u2013366"},{"key":"500_CR119","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2157659","author":"I Rubinstein","year":"2012","unstructured":"Rubinstein I (2012) Big data: the end of privacy or a new beginning? Int Data Privacy Law. https:\/\/doi.org\/10.2139\/ssrn.2157659","journal-title":"Int Data Privacy Law"},{"key":"500_CR120","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.2139\/ssrn.2128146","volume":"28","author":"I Rubinstein","year":"2013","unstructured":"Rubinstein I, Good N (2013) Privacy by design: a counterfactual analysis of Google and Facebook privacy incidents. Berkeley Technol Law J 28:1333\u20131413. https:\/\/doi.org\/10.2139\/ssrn.2128146","journal-title":"Berkeley Technol Law J"},{"key":"500_CR121","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.procs.2016.09.119","volume":"100","author":"KA Salleh","year":"2016","unstructured":"Salleh KA, Janczewski L (2016) Technological, organizational and environmental security and privacy issues of Big Data: a literature review. Proc Comput Sci 100:19\u201328. https:\/\/doi.org\/10.1016\/j.procs.2016.09.119","journal-title":"Proc Comput Sci"},{"key":"500_CR122","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10676-019-09502-5","volume":"21","author":"JS Saltz","year":"2019","unstructured":"Saltz JS, Dewar N (2019) Data science ethical considerations: a systematic literature review and proposed project framework. Ethics Inf Technol 21:197\u2013208. https:\/\/doi.org\/10.1007\/s10676-019-09502-5","journal-title":"Ethics Inf Technol"},{"key":"500_CR123","doi-asserted-by":"crossref","unstructured":"Sampson F (2014) 7 Rights of Individuation: the need for greater protection of individual rights in Big Data. Paper presented at the 2014 IEEE\/ACM 7th International Conference on Utility and Cloud Computing, London","DOI":"10.1109\/UCC.2014.109"},{"key":"500_CR124","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/S0263-2373(03)00078-1","volume":"21","author":"C Sauer","year":"2003","unstructured":"Sauer C, Willcocks L (2003) Establishing the business of the future: the role of organizational architecture and information technologies. Euro Manage J 21:497\u2013508. https:\/\/doi.org\/10.1016\/S0263-2373(03)00078-1","journal-title":"Euro Manage J"},{"key":"500_CR125","doi-asserted-by":"crossref","unstructured":"Sauer C, Willcocks L (2004) Strategic alignment revisited: connecting organizational architecture and IT infrastructure. Paper presented at the 2004 37th Hawaii International Conference on System Sciences, Big Island, HI","DOI":"10.1109\/HICSS.2004.1265563"},{"key":"500_CR126","unstructured":"Shirer M (2016) Double-digit growth forecast for the Worldwide big data and business analytics market through 2020 led by banking and manufacturing investments, according to IDC. https:\/\/www.businesswire.com\/news\/home\/20161003005030\/en\/Double-Digit-Growth-Forecast-for-the-Worldwide-Big-Data-and-Business-Analytics-Market-Through-2020-Led-by-Banking-and-Manufacturing-Investments-According-to-IDC."},{"key":"500_CR127","unstructured":"Shirer M, Goepfert J (2019) IDC Forecasts revenues for Big Data and business analytics solutions will reach $189.1 Billion This Year with Double-Digit Annual Growth Through 2022. https:\/\/www.businesswire.com\/news\/home\/20190404005662\/en\/IDC-Forecasts-Revenues-for-Big-Data-and-Business-Analytics-Solutions-Will-Reach-189.1-Billion-This-Year-with-Double-Digit-Annual-Growth-Through-2022#:~:text=By%202022%2C%20IDC%20expects%20worldwide,Data%20and%20Analytics%20Spending%20Guide. Accessed 05 April 2019"},{"key":"500_CR128","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10257-013-0213-4","volume":"12","author":"D Simon","year":"2014","unstructured":"Simon D, Fischbach K, Schoder D (2014) Enterprise architecture management and its role in corporate strategic management. Inf Syst E-Bus Manage 12:5\u201342. https:\/\/doi.org\/10.1007\/s10257-013-0213-4","journal-title":"Inf Syst E-Bus Manage"},{"key":"500_CR129","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2012.6227909","author":"M Smith","year":"2012","unstructured":"Smith M, Szongott C, Henne B, Von Voigt G (2012) Big data privacy issues in public social media. In: 6th IEEE International conference on digital ecosystems and technologies (DEST), Campione d\u2019Italia, 2012. IEEE. https:\/\/doi.org\/10.1109\/DEST.2012.6227909","journal-title":"IEEE"},{"key":"500_CR130","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.2307\/3481326","volume":"90","author":"DJ Solove","year":"2002","unstructured":"Solove DJ (2002) Conceptualizing privacy. California Law Rev 90:1087\u20131155. https:\/\/doi.org\/10.2307\/3481326","journal-title":"California Law Rev"},{"key":"500_CR131","doi-asserted-by":"publisher","unstructured":"Spiekermann S (2012) The challenges of privacy by design, vol 55. ACM, New York. https:\/\/doi.org\/10.1145\/2209249.2209263","DOI":"10.1145\/2209249.2209263"},{"key":"500_CR132","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, Acquisti A, B\u00f6hme R, Hui KL (2015) The challenges of personal data markets and privacy. Electron Markets 25:161\u2013167. https:\/\/doi.org\/10.1007\/s12525-015-0191-0","journal-title":"Electron Markets"},{"key":"500_CR133","doi-asserted-by":"publisher","unstructured":"Suresh J (2014) Bird's eye view on big data management. In: 2014 Conference on IT in business, industry and government (CSIBIG), Indore, 2014. IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/CSIBIG.2014.7056930","DOI":"10.1109\/CSIBIG.2014.7056930"},{"key":"500_CR134","doi-asserted-by":"publisher","unstructured":"Tan Q, Pivot F (2015) Big Data privacy: changing perception of privacy. In: 2015 IEEE International conference on smart city\/SocialCom\/SustainCom (SmartCity), Chengdu, 2015. IEEE, pp 860\u2013865. https:\/\/doi.org\/10.1109\/SmartCity.2015.176","DOI":"10.1109\/SmartCity.2015.176"},{"key":"500_CR135","first-page":"63","volume":"64","author":"O Tene","year":"2011","unstructured":"Tene O, Polonetsky J (2011) Privacy in the age of big data: a time for big decisions. Stanford Law Rev Online 64:63\u201369","journal-title":"Stanford Law Rev Online"},{"key":"500_CR136","unstructured":"Tene O, Polonetsky J (2012) Big Data for all: privacy and user control in the age of analytics. Northwestern J Technol Intellectual Property, 11"},{"key":"500_CR137","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.giq.2015.05.001","volume":"32","author":"N Thompson","year":"2015","unstructured":"Thompson N, Ravindran R, Nicosia S (2015) Government data does not mean data governance: lessons learned from a public sector application audit. Govern Inf Quart 32:316\u2013322. https:\/\/doi.org\/10.1016\/j.giq.2015.05.001","journal-title":"Govern Inf Quart"},{"key":"500_CR138","doi-asserted-by":"crossref","unstructured":"Thuraisingham B (2015) Big Data Security and Privacy. Paper presented at the 2015 5th ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Texas, USA,","DOI":"10.1145\/2699026.2699136"},{"key":"500_CR139","doi-asserted-by":"publisher","unstructured":"Tse D, Chow C, Ly T, Tong C, Tam K (2018) The challenges of Big Data governance in healthcare. In: 2018 17th IEEE International conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE), New York, NY, 2018. IEEE, pp 1632\u20131636. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00240","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00240"},{"key":"500_CR140","unstructured":"UN (1948) Universal declaration of human rights. https:\/\/www.un.org\/en\/universal-declaration-human-rights\/"},{"key":"500_CR141","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/13600834.2015.1009714","volume":"24","author":"B van der Sloot","year":"2015","unstructured":"van der Sloot B (2015) How to assess privacy violations in the age of Big Data? Analysing the three different tests developed by the ECtHR and adding for a fourth one. Inf Commun Technol Law 24:74\u2013103. https:\/\/doi.org\/10.1080\/13600834.2015.1009714","journal-title":"Inf Commun Technol Law"},{"key":"500_CR142","doi-asserted-by":"publisher","unstructured":"Vanauer M, B\u00f6hle C, Hellingrath B (2015) Guiding the introduction of big data in organizations: a methodology with business- and data-driven ideation and enterprise architecture management-based implementation. In: 2015 48th Hawaii international conference on system sciences, Kauai, HI, 2015. IEEE, pp 908\u2013917. https:\/\/doi.org\/10.1109\/HICSS.2015.113","DOI":"10.1109\/HICSS.2015.113"},{"key":"500_CR143","doi-asserted-by":"publisher","unstructured":"Vanhoorelbeke F, Snoeck M, Serral E (2020) Identifying the challenges and requirements of enterprise architecture frameworks for IoT systems. Research Challenges in Information Science, pp 576\u2013581. https:\/\/doi.org\/10.1007\/978-3-030-50316-1_41","DOI":"10.1007\/978-3-030-50316-1_41"},{"key":"500_CR144","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107415324.004","author":"R Wagter","year":"2005","unstructured":"Wagter R, Van den Berg M, Luijpers J, Van Steenbergen M (2005) Dynamic enterprise architecture how to make it work. Cambridge University Press, Cambridge. https:\/\/doi.org\/10.1017\/CBO9781107415324.004","journal-title":"Cambridge University Press, Cambridge"},{"key":"500_CR145","doi-asserted-by":"publisher","first-page":"911","DOI":"10.2307\/3479272","volume":"56","author":"AF Westin","year":"1968","unstructured":"Westin AF (1968) Privacy and freedom. Washington Lee Law Rev 56:911\u2013914. https:\/\/doi.org\/10.2307\/3479272","journal-title":"Washington Lee Law Rev"},{"key":"500_CR146","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s00766-005-0021-6","volume":"11","author":"R Wieringa","year":"2006","unstructured":"Wieringa R, Maiden N, Mead N, Rolland C (2006) Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requirements Eng 11:102\u2013107. https:\/\/doi.org\/10.1007\/s00766-005-0021-6","journal-title":"Requirements Eng"},{"key":"500_CR147","unstructured":"Willemsen B, Bhajanka P (2017) The Four Do's and Don'ts of implementing your privacy program. https:\/\/www.onetrust.com\/blog\/gartner-report-four-dos-donts-implementing-privacy-program\/. Accessed 26 August 2018"},{"key":"500_CR148","doi-asserted-by":"publisher","unstructured":"Winter R, Schelp J (2008) Enterprise architecture governance: the need for a business-to-IT Approach, pp 548\u2013552. https:\/\/doi.org\/10.1145\/1363686.1363820","DOI":"10.1145\/1363686.1363820"},{"key":"500_CR149","doi-asserted-by":"publisher","unstructured":"Wi\u00dfotzki M, Ko\u00e7 H, Weichert T, Sandkuhl K (2013) Development of an enterprise architecture management capability catalog. In: Kobyli\u0144ski A, Sobczak A (eds) Perspectives in business informatics research (BIR). Springer, Berlin, pp 112\u2013126. https:\/\/doi.org\/10.1007\/978-3-642-40823-6_10","DOI":"10.1007\/978-3-642-40823-6_10"},{"key":"500_CR150","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1016\/j.jss.2013.04.076","volume":"86","author":"C Wohlin","year":"2013","unstructured":"Wohlin C, Runeson P, da Mota Silveira Neto PA, Engstr\u00f6m E, do Carmo Machado I, de Almeida ES, (2013) On the reliability of mapping studies in software engineering. J Syst Softw 86:2594\u20132610. https:\/\/doi.org\/10.1016\/j.jss.2013.04.076","journal-title":"J Syst Softw"},{"key":"500_CR151","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.clsr.2010.11.004","volume":"27","author":"R Wong","year":"2011","unstructured":"Wong R (2011) Data protection: the future of privacy. Comput Law Security Rev 27:53\u201357. https:\/\/doi.org\/10.1016\/j.clsr.2010.11.004","journal-title":"Comput Law Security Rev"},{"key":"500_CR152","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu S (2016) Big privacy: challenges and opportunities of privacy study in the age of Big Data. IEEE Access 4:2751\u20132763. https:\/\/doi.org\/10.1109\/ACCESS.2016.2577036","journal-title":"IEEE Access"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-020-00500-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10257-020-00500-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-020-00500-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:08:20Z","timestamp":1744182500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10257-020-00500-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,18]]},"references-count":152,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s10257-020-00500-5","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,18]]},"assertion":[{"value":"19 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}