Al-Ruithe, M., Mthunzi, S. Benkhelifa, E. Data governance
for security in IoT & cloud converged environments.
2016 IEEE/ACS 13th International Conference of
Computer Systems and Applications (AICCSA), Nov. 29
2016-Dec. 2 2016 2016. 1-8.
Banerjee, S., Hemphill, T. Longstreet, P. 2018. Wearable
devices and healthcare: Data sharing and privacy. The
Information Society, 34, 49-57.
Banerjee, T. Sheth, A. 2017. IoT Quality Control for Data
and Application Needs. IEEE Intelligent Systems, 32,
68-73.
Cha, S., Hsu, T., Xiang, Y. Yeh, K. 2018. Privacy
Enhancing Technologies in the Internet of Things:
Perspectives and Challenges. IEEE Internet of Things
Journal, 1-1.
Copie, A., Fortis, T., Munteanu, V. I. Negru, V. From
Cloud Governance to IoT Governance. 2013 27th
International Conference on Advanced Information
Networking and Applications Workshops, 25-28 March
2013 2013. 1229-1234.
Council, E. 2015. EDMC DCAM version 1.0. Sl: sn.
Dasgupta, A. Gill, A. Q. 2017. Fog Computing Challenges:
A Systematic Review. Australasian Conference on
Information Systems,. Hobart.
Dasgupta, A., Gill, A. Q. Hussain, F. 2019. Privacy of IoT-
Enabled Smart Home Systems. IoT and Smart Home
Automation. IntechOpen.
Dastjerdi, A. V. Buyya, R. 2016. Fog Computing: Helping
the Internet of Things Realize Its Potential. Computer,
49, 112-116.
Dhillon, G., Carter, L. Abed, J. 2016. Defining Objectives
For Securing The Internet Of Things: A Value-Focused
Thinking Approach.
Dimick, C. 2013. Governance Apples and Oranges. Journal
of AHIMA, 84, 60-62.
Drechsler, A. 2015. Designing to inform: toward
conceptualizing practitioner audiences for socio-
technical artifacts in design science research in the
information systems discipline. Informing Science: the
International Journal of an Emerging Transdiscipline,
18, 31-45.
Egelstaff, R. Wells, M. 2013. Data governance frameworks
and change management. Studies In Health Technology
And Informatics, 193, 108-119.
Fuentes, J. M. d., Gonzalez-Manzano, L., Solanas, A.
Veseli, F. 2018. Attribute-Based Credentials for
Privacy-Aware Smart Health Services in IoT-Based
Smart Cities. Computer, 51, 44-53.
Gantait, A., Patra, J. Mukherjee, A. 2018. Defining your
IoT governance practices
[Online]. IBM. Available:
https://www.ibm.com/developerworks/library/iot-
governance-01 [Accessed 2018].
Gartner 2016a. Data Risks in the Internet of Things
Demand Extensive Information Governance.
Gartner 2016b. Organizing for Big Data Through Better
Process and Governance.
Gehrmann, M. 2012. Combining ITIL, COBIT and
ISO/IEC27002 for structuring comprehensive
information technology for management in organiza-
tions. Navus: Revista de Gestão e Tecnologia, 2, 66-77.
Gill, A., Bunker, D. Seltsikas, P. 2015. Moving Forward:
Emerging Themes in Financial Services Technologies'
Adoption. CAIS, 36, 12.
Gill, A. Q., Phennel, N., Lane, D. Phung, V. L. 2016. IoT-
enabled emergency information supply chain
architecture for elderly people: The Australian context.
Information Systems, 58, 75-86.
Government, A. 2019. Seven Steps to Securing Your Smart
Health Devices. In: AGENCY, D. H. (ed.).
Hevner, A. Chatterjee, S. 2010. Design science research in
information systems. Design research in information
systems. Springer.
Ibrahim Alhassan, D. S. M. D. 2016. Data governance
activities: an analysis of the literature. Journal of
Decision Systems.
IERC, E. R. C. 2015. IoT Governance, Privacy and Security
Issues.
Infotech, I. 2016. Assessing and implementing a Data
Governance program [Online]. Available: http://doc
player.net/11775196-Assessing-and-implementing-a-
data-governance-program-in-an-organization.html?
[Accessed August 2018].
IOTAlliance 2017. Internet of Things Security Guideline.
Janne J. Korhonen, Ilkka Melleri, Kari Hiekkanen
Helenius, M. 2013. Designing Data Governance
Structure: An Organizational Perspective. GSTF
Journal on Computing (JoC), 2.
Juiz, C. Toomey, M. 2015. To govern IT, or not to govern
IT? Commun. ACM, 58, 58-64.
Karahoca, A., Karahoca, D. Aksöz, M. 2018. Examining
intention to adopt to internet of things in healthcare
technology products. Kybernetes, 47, 742-770.
Kontzer, T. 2006. An End To Data Anarchy.
InformationWeek, 73-75.
Korhonen, J. J., Lapalme, J., McDavid, D. Gill, A. Q.
Adaptive enterprise architecture for the future: Towards
a reconceptualization of EA. 2016 IEEE 18th
Conference on Business Informatics (CBI), 2016. IEEE,
272-281.
Kuechler, B. Vaishnavi, V. 2008. On theory development
in design science research: anatomy of a research
project. European Journal of Information Systems, 17,
489-504.
Linares-Vásquez, M., Bavota, G. Escobar-Velásquez, C.
An empirical study on android-related vulnerabilities.
2017 IEEE/ACM 14th International Conference on
Mining Software Repositories (MSR), 2017. IEEE, 2-
13.
March, S. Smith, G. 1995. Design and Natural Science
Research on Information Technology.
Merkus, J. R. 2015. Data Governance Maturity Model.
Open Universiteit Nederland.
Mosley, M., Brackett, M. H., Earley, S. Henderson, D.
2010. DAMA guide to the data management body of
knowledge, Technics Publications.
Panian, Z. 2010. Some Practical Experiences in Data
Governance. World Academy of Science, Engineering
and Technology
Peterson, R. 2004. Crafting information technology gover-
nance. Information systems management, 21, 7-22.