From: Secure big data ecosystem architecture: challenges and solutions
Filtration stage | Method | Assessment criteria |
---|---|---|
Stage-I | Classify related studies from investigated databases | All keywords inclusive (N = 175) |
Stage-II | Eliminate studies based on titles | Title = search term Include else exclude (N = 135) |
Stage-III | Eliminate studies based on abstracts | Abstract = big data ecosystem challenges Include else exclude (N = 92) |
Stage-IV | Retrieve and critically evaluate selected studies | Address security and privacy in big data ecosystem (N = 79) Yes = accepted No = rejected |