{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T02:22:58Z","timestamp":1778120578063,"version":"3.51.4"},"reference-count":44,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCS"],"published-print":{"date-parts":[[2022,2,14]]},"abstract":"<jats:p>Today, our environment and the objects therein are equipped with an increasing number of devices such as cameras, sensors, and actuators, which all together produce a huge amount of data. Furthermore, we observe that citizens generate data via social media applications running on their personal devices. Smart cities and societies are seeking for ways to exploit these vast amounts of data. In this paper, we argue that to take full advantage of these data, it is necessary to set up data governance properly, which includes defining, assigning, and allocating responsibilities. A proper setting up of data governance appears to be a challenging task since the data may be used irresponsibly, thoughtlessly and maliciously, resulting in many (un)wanted side effects such as violation of rules and regulations, human rights, ethical principles as well as privacy and security requirements. We elaborate on the key functionalities that should be included in the governance of a data ecosystem within smart cites, namely provisioning the required data quality and establishing trust, as well as a few organizational aspects that are necessary to support such a data governance. Realizing these data governance functionalities, among others, asks for making trade-offs among contending values. We provide a few solution directions for realizing these data governance functionalities and making trade-offs among them.<\/jats:p>","DOI":"10.3233\/scs-210119","type":"journal-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T12:15:28Z","timestamp":1644322528000},"page":"31-51","source":"Crossref","is-referenced-by-count":48,"title":["Data governance in smart cities: Challenges and solution directions"],"prefix":"10.1177","volume":"1","author":[{"given":"Sunil","family":"Choenni","sequence":"first","affiliation":[{"name":"Creating 010, Rotterdam University of Applied Sciences, Rotterdam, The Netherlands"},{"name":"Research and Documentation Centre (WODC), Dutch Ministry of Justice and Security, The Hague, The Netherlands"}]},{"given":"Mortaza S.","family":"Bargh","sequence":"additional","affiliation":[{"name":"Creating 010, Rotterdam University of Applied Sciences, Rotterdam, The Netherlands"},{"name":"Research and Documentation Centre (WODC), Dutch Ministry of Justice and Security, The Hague, The Netherlands"}]},{"given":"Tony","family":"Busker","sequence":"additional","affiliation":[{"name":"Research and Documentation Centre (WODC), Dutch Ministry of Justice and Security, The Hague, The Netherlands"}]},{"given":"Niels","family":"Netten","sequence":"additional","affiliation":[{"name":"Creating 010, Rotterdam University of Applied Sciences, Rotterdam, The Netherlands"},{"name":"Research and Documentation Centre (WODC), Dutch Ministry of Justice and Security, The Hague, The Netherlands"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/SCS-210119_ref1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10630732.2014.942092","article-title":"Smart cities: Definitions, dimensions, performance, and initiatives","volume":"22","author":"Albino","year":"2015","journal-title":"Journal of Urban Technology"},{"key":"10.3233\/SCS-210119_ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5646-6.ch025"},{"key":"10.3233\/SCS-210119_ref3","unstructured":"P.\u00a0Assun\u00e7\u00e3o, A zero trust approach to network security, in: Proceedings of the Digital Privacy and Security Conference, 2019."},{"key":"10.3233\/SCS-210119_ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15145-4_95-1"},{"key":"10.3233\/SCS-210119_ref6","unstructured":"M.S.\u00a0Bargh and S.\u00a0Choenni, On preserving privacy whilst integrating data in connected information systems, in: Proceedings of the International Conference on Cloud Security Management (ICCSM\u201913), 2013, pp.\u00a01\u20139."},{"key":"10.3233\/SCS-210119_ref7","doi-asserted-by":"crossref","unstructured":"M.S.\u00a0Bargh and S.\u00a0Choenni, Towards applying design-thinking for designing privacy-protecting information systems, in: Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS\u201919), Los Angeles, California, USA, 2019, pp.\u00a012\u201314, (Co-located with IEEE CIC 2019 & IEEE CogMI 2019).","DOI":"10.1109\/TPS-ISA48467.2019.00032"},{"issue":"3","key":"10.3233\/SCS-210119_ref11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1541880.1541883","article-title":"Methodologies for data quality assessment and improvement","volume":"41","author":"Batini","year":"2009","journal-title":"ACM computing surveys (CSUR)"},{"key":"10.3233\/SCS-210119_ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44999-5_36"},{"issue":"3","key":"10.3233\/SCS-210119_ref13","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11948-013-9511-y","article-title":"Protecting human health and security in digital Europe: How to deal with the \u2018privacy paradox\u2019?","volume":"20","author":"B\u00fcschel","year":"2014","journal-title":"Science and Engineering Ethics"},{"key":"10.3233\/SCS-210119_ref14","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Chen, L.\u00a0Yan, Z.\u00a0L\u00fc, Y.\u00a0Zhang, Y.\u00a0Guo, W.\u00a0Liu and J.\u00a0Xuan, Research on zero-trust security protection technology of power IoT based on blockchain, Journal of Physics: Conference Series 1769(1) (2021), 012039.","DOI":"10.1088\/1742-6596\/1769\/1\/012039"},{"key":"10.3233\/SCS-210119_ref15","unstructured":"S.\u00a0Choenni, M.S.\u00a0Bargh and N.\u00a0Netten, Naar een datagedreven samenleving: uitdagingen, in: Het Hoger Beroepsonderwijs in 2030: Toekomstverkenningen en Scenario\u2019s vanuit Hogeschool Rotterdam, 2020, available at: www.hr.nl\/hbo2030."},{"key":"10.3233\/SCS-210119_ref16","doi-asserted-by":"crossref","unstructured":"S.\u00a0Choenni, M.S.\u00a0Bargh, N.\u00a0Netten and S.\u00a0Van Den Braak, Using data analytics results in practice: Challenges and solution directions, in: Perspectives for Digital Social Innovation to Reshape the European Welfare Systems, IOS Press, 2021, pp.\u00a0182\u2013201.","DOI":"10.3233\/STPC200011"},{"key":"10.3233\/SCS-210119_ref17","doi-asserted-by":"crossref","unstructured":"S.\u00a0Choenni, M.S.\u00a0Bargh, C.\u00a0Roepan and R.\u00a0Meijer, Privacy and security in data collection by citizens, in: Smarter as the New Urban Agenda: A Comprehensive View of the 21st Century City, J.R.\u00a0Gil-Garcia, T.A.\u00a0Pardo and T.\u00a0Nam, eds, LNCS, Springer, 2016.","DOI":"10.1007\/978-3-319-17620-8_19"},{"key":"10.3233\/SCS-210119_ref18","doi-asserted-by":"crossref","unstructured":"S.\u00a0Choenni, N.\u00a0Netten and M.S.\u00a0Bargh, Exploiting big data for smart government: facing the challenges, in: Handbook of Smart Cities, J.C.\u00a0Augusto, ed., 2021.","DOI":"10.1007\/978-3-030-69698-6_82"},{"key":"10.3233\/SCS-210119_ref20","doi-asserted-by":"publisher","DOI":"10.3390\/data4010016"},{"issue":"3","key":"10.3233\/SCS-210119_ref21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MIC.2015.66","article-title":"Privacy governance in cyberspace","volume":"19","author":"Doneda","year":"2015","journal-title":"IEEE Internet Computing"},{"key":"10.3233\/SCS-210119_ref22","unstructured":"D.\u00a0Eke and O.J.\u00a0Ebohon, The role of data governance in the development of inclusive smart cities, in: Societal Challenges in the Smart Society, Including Proceedings of International Conference on the Ethical and Social Impact of ICT, M.A.\u00a0Oliva, J.P.\u00a0Borondo, K.\u00a0Murata and A.L.\u00a0Palma, eds, 2020, pp.\u00a0603\u2013619."},{"issue":"5","key":"10.3233\/SCS-210119_ref24","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/01972243.2010.511556","article-title":"Barriers to interorganizational information sharing in E-government: A stakeholder analysis","volume":"26","author":"Fedorowicz","year":"2010","journal-title":"Information Society"},{"issue":"4","key":"10.3233\/SCS-210119_ref25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/15536548.2009.10855873","article-title":"Security and privacy governance: Criteria for systems design","volume":"5","author":"Gayness Clark","year":"2009","journal-title":"Journal of Information Privacy and Security"},{"key":"10.3233\/SCS-210119_ref27","doi-asserted-by":"crossref","unstructured":"J.R.\u00a0Gil-Garcia, T.\u00a0Pardo and T.\u00a0Nam (Eds.), Smarter as the new urban agenda: A comprehensive view of the 21st century city, Vol.\u00a011, Springer, 2015.","DOI":"10.1007\/978-3-319-17620-8"},{"key":"10.3233\/SCS-210119_ref28","doi-asserted-by":"publisher","DOI":"10.31235\/osf.io\/9gy73"},{"issue":"4","key":"10.3233\/SCS-210119_ref29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2010.2048257","article-title":"Foundations for smarter cities","volume":"54","author":"Harrison","year":"2010","journal-title":"IBM Journal of Research and Development"},{"key":"10.3233\/SCS-210119_ref31","doi-asserted-by":"publisher","DOI":"10.4324\/9781351182409"},{"issue":"3","key":"10.3233\/SCS-210119_ref32","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2014.02.002","article-title":"Data quality management, data usage experience and acquisition intention of big data analytics","volume":"34","author":"Kwon","year":"2014","journal-title":"International Journal of Information Management"},{"key":"10.3233\/SCS-210119_ref33","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2012-000872"},{"key":"10.3233\/SCS-210119_ref34","doi-asserted-by":"publisher","DOI":"10.3390\/urbansci3030091"},{"key":"10.3233\/SCS-210119_ref35","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.future.2015.11.024","article-title":"A data quality in use model for big data","volume":"63","author":"Merino","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/SCS-210119_ref36","doi-asserted-by":"publisher","DOI":"10.1017\/9781108749978.011"},{"key":"10.3233\/SCS-210119_ref37","doi-asserted-by":"crossref","unstructured":"A.\u00a0Narayanan and V.\u00a0Shmatikov, Robust de-anonymization of large sparse datasets, in: Proceedings of IEEE Symposium on Security and Privacy, IEEE, 2008, pp.\u00a0111\u2013125.","DOI":"10.1109\/SP.2008.33"},{"key":"10.3233\/SCS-210119_ref38","unstructured":"NCSC, Bereid u voor op Zero Trust, Factsheet FS-2021-02, versie 1.0, Dutch National Cyber Security Centre, 17 August 2021."},{"key":"10.3233\/SCS-210119_ref39","doi-asserted-by":"crossref","unstructured":"H.\u00a0Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life, Stanford University Press, Stanford, CA, 2009.","DOI":"10.1515\/9780804772891"},{"key":"10.3233\/SCS-210119_ref40","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1098\/rsta.2017.0358","article-title":"Is privacy privacy?","volume":"376","author":"Nissim","year":"2018","journal-title":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences"},{"key":"10.3233\/SCS-210119_ref41","doi-asserted-by":"crossref","unstructured":"J.\u00a0Pan and Z.\u00a0Yang, Cybersecurity challenges and opportunities in the new edge computing+ IoT world, in: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018, pp.\u00a029\u201332.","DOI":"10.1145\/3180465.3180470"},{"key":"10.3233\/SCS-210119_ref42","unstructured":"R.\u00a0Price and G.\u00a0Shanks, A semiotic information quality framework, in: Proceedings of the International Conference on Decision Support Systems DSS04, 2004, pp.\u00a0658\u2013672."},{"key":"10.3233\/SCS-210119_ref43","doi-asserted-by":"publisher","DOI":"10.1111\/rego.12222"},{"key":"10.3233\/SCS-210119_ref45","doi-asserted-by":"publisher","first-page":"116","DOI":"10.5325\/jinfopoli.8.2018.0116","article-title":"Privacy as commons: Case evaluation through the governing knowledge commons framework","volume":"8","author":"Sanfilippo","year":"2018","journal-title":"Journal of Information Policy"},{"key":"10.3233\/SCS-210119_ref46","doi-asserted-by":"crossref","unstructured":"I.\u00a0Schieferdecker, N.\u00a0Tcholtchev, P.\u00a0L\u00e4mmel, R.\u00a0Scholz and E.\u00a0Lap, Towards an open data based ICT reference architecture for smart cities, in: Proceedings of Conference for e-Democracy and Open Government (CeDEM), IEEE, 2017, pp.\u00a0184\u2013193.","DOI":"10.1109\/CeDEM.2017.18"},{"key":"10.3233\/SCS-210119_ref47","unstructured":"G.\u00a0Shanks and P.\u00a0Darke, Understanding data quality in a data warehouse: A semiotic approach, in: Conference on Information Quality, University of Massachusetts Lowell, 1998, pp.\u00a0292\u2013309."},{"key":"10.3233\/SCS-210119_ref49","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipq003"},{"key":"10.3233\/SCS-210119_ref50","doi-asserted-by":"publisher","DOI":"10.3389\/fbuil.2020.00077"},{"issue":"11","key":"10.3233\/SCS-210119_ref51","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/240455.240479","article-title":"Anchoring data quality dimensions in ontological foundations","volume":"39","author":"Wand","year":"1996","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.3233\/SCS-210119_ref52","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","article-title":"Beyond accuracy: What data quality means to data consumers","volume":"12","author":"Wang","year":"1996","journal-title":"Journal of management information systems"},{"key":"10.3233\/SCS-210119_ref53","unstructured":"M.E.\u00a0Whitman and H.J.\u00a0Mattord, Principles of Information Security, Cengage Learning, 2011."},{"key":"10.3233\/SCS-210119_ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240704"}],"container-title":["Journal of Smart Cities and Society"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/SCS-210119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:58:38Z","timestamp":1777611518000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/SCS-210119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":44,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/scs-210119","relation":{},"ISSN":["2772-3585","2772-3577"],"issn-type":[{"value":"2772-3585","type":"electronic"},{"value":"2772-3577","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2,14]]}}}