From: DaLiF: a data lifecycle framework for data-driven governments
P-(Phase) | Phases as found in the literature | Our Opted phase title |
---|---|---|
P1 | Planning [49, 55, 60, 92, 92, 93, 125], conceptualize [149],plan [15, 17, 53, 55, 58, 84, 107, 109] | Planning |
P2 | Collection [10, 14, 28, 40, 42,43,44, 48, 52, 54, 60, 61, 86, 91, 107, 112,113,114, 127,128,129, 131, 133, 136, 141, 146, 152,153,154], collect [15, 53, 58, 134, 143], receive [17], acquisition [13, 117], retrieve [115, 121], produce [140], acquire [55, 63, 90, 97, 147], capture [84, 94, 126, 130, 135, 148], generation [26, 56, 95, 96, 118,119,120], create [47, 109,110,111, 116, 124, 149] | Collection |
P3 | Integration [17, 26, 109, 124, 126, 129, 130, 146, 148, 153, 155], integrate [15, 28, 116, 140, 156], aggregate [115, 120], Integration and filtering [141], Integration and enrichment [134], Integration, filtering and enrichment [10, 17, 60], filtering [121],pre-process [96, 97, 130, 143, 144], preparation [91, 127, 135],classification [61], data description [40, 42], Extraction [120], data selection 351, refinement [92, 93], enhancement [62], cleaning [28], datafication [26, 47, 107, 127, 129, 143] | Preparation |
P4 | Analysis [10, 14, 15, 17, 26, 53, 55, 60, 63, 91, 98, 107, 110, 111, 116, 121, 126,127,128,129,130,131, 133,134,135, 141, 146, 148, 149, 152, 153], rkanalytics [155], data modeling [23, 132], interpret and analysis [84], processing [40, 47, 94, 95, 109, 143], evaluate [140] | Analysis |
P5 | Visualization [10, 17, 26, 28, 60, 62, 91, 107, 116, 127, 129], presentation [154], knowledge creation [23, 132, 135],data exploration [110] | Visualization |
P6 | Storage [10, 13, 17, 23, 26, 47, 60, 62, 86, 88, 93, 94, 107, 109, 110, 113,114,115,116,117, 120, 121, 126,127,128,129,130,131,132,133, 135, 141, 143, 146, 149, 152,153,154], store [53, 58, 66, 90, 97, 111, 119, 124, 134, 142, 147, 148], retention [48], distributed storage [95, 96, 144], storing 161 | Storage |
P7 | Access [49, 53, 58, 60, 85, 88, 90, 92, 93, 109, 127, 143], retrieve [124] | Access |
P8 | Share [26, 51, 66, 107, 111, 114, 116, 118, 119, 134, 135, 153], transfer [47, 86], sharing [61, 63],dissemination [42,43,44, 54, 94, 97], delivery [40, 120, 128], data interoperability [98], share [55, 134, 146, 148],publish and share [55, 61], Publish [49, 58, 109, 112, 126, 131, 143, 157], publication [28, 52, 61, 92, 93, 107], release and publish 94 | Share/Publish |
P9 | Use [15, 26, 66, 90, 90, 111, 116, 118, 134, 135, 142], consumption [92] feedback [93] using [53], usage [10, 48, 119, 133, 143, 146, 148, 153], Reuse [28, 61, 84, 88, 107], exploit [85, 110], consume [114], application [130], use and re(use) [13, 49, 147], feedback [52, 140], review [48, 141] | Use, re(use), and feedback |
P10 | Governance [152], workflow control, and administration [112] | Governance |
P11 | Quality | |
P12 | Protection [63, 143], security and protection [60],privacy [23, 97, 121, 154], privacy protection [132] | Protection |
P13 | Archive [51, 66, 86, 90, 109, 116, 131, 134, 147, 148, 152], archiving 157, 156,117,352,129, data masking [51, 94, 98, 119, 124, 141, 146, 153] | Archive |
P14 | Destruction [17, 48, 60, 90, 133, 146, 153] end of life [58, 116], destroy [111, 143], Delete [13, 66, 108, 124, 148], dispose [51, 113],termination [49], demise [140], destruct [142] | End of life |