Skip to main content

Table 1 Grouping of phases found in the literature

From: DaLiF: a data lifecycle framework for data-driven governments

P-(Phase) Phases as found in the literature Our Opted phase title
P1 Planning [49, 55, 60, 92, 92, 93, 125], conceptualize [149],plan [15, 17, 53, 55, 58, 84, 107, 109] Planning
P2 Collection [10, 14, 28, 40, 42,43,44, 48, 52, 54, 60, 61, 86, 91, 107, 112,113,114, 127,128,129, 131, 133, 136, 141, 146, 152,153,154], collect [15, 53, 58, 134, 143], receive [17], acquisition [13, 117], retrieve [115, 121], produce [140], acquire [55, 63, 90, 97, 147], capture [84, 94, 126, 130, 135, 148], generation [26, 56, 95, 96, 118,119,120], create [47, 109,110,111, 116, 124, 149] Collection
P3 Integration [17, 26, 109, 124, 126, 129, 130, 146, 148, 153, 155], integrate [15, 28, 116, 140, 156], aggregate [115, 120], Integration and filtering [141], Integration and enrichment [134], Integration, filtering and enrichment [10, 17, 60], filtering [121],pre-process [96, 97, 130, 143, 144], preparation [91, 127, 135],classification [61], data description [40, 42], Extraction [120], data selection 351, refinement [92, 93], enhancement [62], cleaning [28], datafication [26, 47, 107, 127, 129, 143] Preparation
P4 Analysis [10, 14, 15, 17, 26, 53, 55, 60, 63, 91, 98, 107, 110, 111, 116, 121, 126,127,128,129,130,131, 133,134,135, 141, 146, 148, 149, 152, 153], rkanalytics [155], data modeling [23, 132], interpret and analysis [84], processing [40, 47, 94, 95, 109, 143], evaluate [140] Analysis
P5 Visualization [10, 17, 26, 28, 60, 62, 91, 107, 116, 127, 129], presentation [154], knowledge creation [23, 132, 135],data exploration [110] Visualization
P6 Storage [10, 13, 17, 23, 26, 47, 60, 62, 86, 88, 93, 94, 107, 109, 110, 113,114,115,116,117, 120, 121, 126,127,128,129,130,131,132,133, 135, 141, 143, 146, 149, 152,153,154], store [53, 58, 66, 90, 97, 111, 119, 124, 134, 142, 147, 148], retention [48], distributed storage [95, 96, 144], storing 161 Storage
P7 Access [49, 53, 58, 60, 85, 88, 90, 92, 93, 109, 127, 143], retrieve [124] Access
P8 Share [26, 51, 66, 107, 111, 114, 116, 118, 119, 134, 135, 153], transfer [47, 86], sharing [61, 63],dissemination [42,43,44, 54, 94, 97], delivery [40, 120, 128], data interoperability [98], share [55, 134, 146, 148],publish and share [55, 61], Publish [49, 58, 109, 112, 126, 131, 143, 157], publication [28, 52, 61, 92, 93, 107], release and publish 94 Share/Publish
P9 Use [15, 26, 66, 90, 90, 111, 116, 118, 134, 135, 142], consumption [92] feedback [93] using [53], usage [10, 48, 119, 133, 143, 146, 148, 153], Reuse [28, 61, 84, 88, 107], exploit [85, 110], consume [114], application [130], use and re(use) [13, 49, 147], feedback [52, 140], review [48, 141] Use, re(use), and feedback
P10 Governance [152], workflow control, and administration [112] Governance
P11 Quality [13, 15, 60, 98, 133, 134, 141, 143] Quality
P12 Protection [63, 143], security and protection [60],privacy [23, 97, 121, 154], privacy protection [132] Protection
P13 Archive [51, 66, 86, 90, 109, 116, 131, 134, 147, 148, 152], archiving 157, 156,117,352,129, data masking [51, 94, 98, 119, 124, 141, 146, 153] Archive
P14 Destruction [17, 48, 60, 90, 133, 146, 153] end of life [58, 116], destroy [111, 143], Delete [13, 66, 108, 124, 148], dispose [51, 113],termination [49], demise [140], destruct [142] End of life