From: Secure big data ecosystem architecture: challenges and solutions
Challenge | Study | Frequency | Percentage |
---|---|---|---|
Inference | s9, s12, s16, s19, s21, s24, s28, s35, s40, s51, s52, s57, s58, s59, s64, s73, s79 | 17 | 22 |
Lack of consent | s7, s8, s9, s19, s24, s24, s29, s30, s50, s52, s56, s57, s59, s69 | 14 | 18 |
Social misuse of knowledge | s9, s18, s19, s24, s28, s44, s52, s64, s69 | 9 | 11 |
Diverse data sources | s2, s5, s8, s12, s28, s35, s36, s37, s38, s51, s55, s76 | 13 | 17 |
Multiple uses of data | s9, s13, s19, s24, s29, s30, s52, s56 | 8 | 10 |
Storage and processing | s13, s28, s63 | 2 | 3 |
Technology gap | s13, s24, s36, s38 | 4 | 5 |
Agreed data usage | s19, s29, s30 | 3 | 4 |
Unauthorized Access | s15, s21, s24, s26, s30, s33 | 6 | 8 |
Lack of governance | s1, s19, s21, s24, s25, s28, s29, s31, s38, s44, s61 | 11 | 14 |
Data provenance | s24, s26, s28, s33, s36, s40, s48, s54, s55, s57 | 9 | 12 |