Skip to main content

Table 1 Grouping of phases found in the literature

From: DaLiF: a data lifecycle framework for data-driven governments

P-(Phase)

Phases as found in the literature

Our Opted phase title

P1

Planning [49, 55, 60, 92, 92, 93, 125], conceptualize [149],plan [15, 17, 53, 55, 58, 84, 107, 109]

Planning

P2

Collection [10, 14, 28, 40, 42,43,44, 48, 52, 54, 60, 61, 86, 91, 107, 112,113,114, 127,128,129, 131, 133, 136, 141, 146, 152,153,154], collect [15, 53, 58, 134, 143], receive [17], acquisition [13, 117], retrieve [115, 121], produce [140], acquire [55, 63, 90, 97, 147], capture [84, 94, 126, 130, 135, 148], generation [26, 56, 95, 96, 118,119,120], create [47, 109,110,111, 116, 124, 149]

Collection

P3

Integration [17, 26, 109, 124, 126, 129, 130, 146, 148, 153, 155], integrate [15, 28, 116, 140, 156], aggregate [115, 120], Integration and filtering [141], Integration and enrichment [134], Integration, filtering and enrichment [10, 17, 60], filtering [121],pre-process [96, 97, 130, 143, 144], preparation [91, 127, 135],classification [61], data description [40, 42], Extraction [120], data selection 351, refinement [92, 93], enhancement [62], cleaning [28], datafication [26, 47, 107, 127, 129, 143]

Preparation

P4

Analysis [10, 14, 15, 17, 26, 53, 55, 60, 63, 91, 98, 107, 110, 111, 116, 121, 126,127,128,129,130,131, 133,134,135, 141, 146, 148, 149, 152, 153], rkanalytics [155], data modeling [23, 132], interpret and analysis [84], processing [40, 47, 94, 95, 109, 143], evaluate [140]

Analysis

P5

Visualization [10, 17, 26, 28, 60, 62, 91, 107, 116, 127, 129], presentation [154], knowledge creation [23, 132, 135],data exploration [110]

Visualization

P6

Storage [10, 13, 17, 23, 26, 47, 60, 62, 86, 88, 93, 94, 107, 109, 110, 113,114,115,116,117, 120, 121, 126,127,128,129,130,131,132,133, 135, 141, 143, 146, 149, 152,153,154], store [53, 58, 66, 90, 97, 111, 119, 124, 134, 142, 147, 148], retention [48], distributed storage [95, 96, 144], storing 161

Storage

P7

Access [49, 53, 58, 60, 85, 88, 90, 92, 93, 109, 127, 143], retrieve [124]

Access

P8

Share [26, 51, 66, 107, 111, 114, 116, 118, 119, 134, 135, 153], transfer [47, 86], sharing [61, 63],dissemination [42,43,44, 54, 94, 97], delivery [40, 120, 128], data interoperability [98], share [55, 134, 146, 148],publish and share [55, 61], Publish [49, 58, 109, 112, 126, 131, 143, 157], publication [28, 52, 61, 92, 93, 107], release and publish 94

Share/Publish

P9

Use [15, 26, 66, 90, 90, 111, 116, 118, 134, 135, 142], consumption [92] feedback [93] using [53], usage [10, 48, 119, 133, 143, 146, 148, 153], Reuse [28, 61, 84, 88, 107], exploit [85, 110], consume [114], application [130], use and re(use) [13, 49, 147], feedback [52, 140], review [48, 141]

Use, re(use), and feedback

P10

Governance [152], workflow control, and administration [112]

Governance

P11

Quality [13, 15, 60, 98, 133, 134, 141, 143]

Quality

P12

Protection [63, 143], security and protection [60],privacy [23, 97, 121, 154], privacy protection [132]

Protection

P13

Archive [51, 66, 86, 90, 109, 116, 131, 134, 147, 148, 152], archiving 157, 156,117,352,129, data masking [51, 94, 98, 119, 124, 141, 146, 153]

Archive

P14

Destruction [17, 48, 60, 90, 133, 146, 153] end of life [58, 116], destroy [111, 143], Delete [13, 66, 108, 124, 148], dispose [51, 113],termination [49], demise [140], destruct [142]

End of life