Interpretation. The different causes and
problems identified in the literature were grouped
based on the content analysis technique, which has
subjective characteristics, that is, different
researchers could find different categories.
Technological Evolution. The evolution of
information technologies can change the importance
of the causes and problems identified in this research
.
6.3 Contributions
The research contributed to the field of data privacy,
as it identified the problems and causes of data
privacy reported in the literature, elaborating a
summary of them, which allows new studies to
address the problems and causes most highlighted in
the literature.
The research contributed to managerial and
organizational practices through the identification
and association of causes and problems. From this
association, organizations can prioritize data privacy
protection actions in ISBDA in order to optimize
efforts and minimize risks. Among the four main
causes identified, two are related to management
aspects. This draws attention for organizations to
consider not only the use of technology but also
information security management practices.
6.4 Proposals
This research had an exploratory approach and
associated data privacy problems with their causes.
On the other hand, it did not describe how the causes
contribute to the problems, nor did it propose the
adoption of technical or managerial solutions to the
problems. Therefore, the next steps of the research
aim to identify a set of solutions and good practices
that address the causes of the problems identified in
this research.
REFERENCES
Ahmadian, A. S., Strüber, D., Riediger, V., & Jürjens, J.
(2018). Supporting privacy impact assessment by
model-based privacy analysis. Proceedings of the ACM
Symposium on Applied Computing, 1467–1474.
https://doi.org/10.1145/3167132.3167288
Ayabe, F. (2021). Fatores críticos de sucesso para
terceirização de tecnologia da informação no setor
público brasileiro. https://teses.usp.br/teses/dispo
niveis/100/100131/tde-16102018-102401/en.php
Bardin, L. (2011). Análise de conteúdo (Issue 70).
Barker, K., Askari, M., Banerjee, M., Ghazinour, K.,
MacKas, B., Majedi, M., Pun, S., & Williams, A. (2009).
A data privacy taxonomy. Lecture Notes in Computer
Science, 5588 LNCS, 42–54. https://doi.
org/10.1007/978-3-642-02843-4_7
Brasil. (2018). Lei Geral de Proteção de Dados Pessoais.
Diário Oficial Da União. http://www.planalto.gov.
br/ccivil_03/_ato2015-2018/2018/lei/l13709.htm
Cavoukian, A. (2012). Privacy by design [leading edge].
IEEE Technology and Society Magazine, 31(4), 18–19.
https://doi.org/10.1109/MTS.2012.2225459
Chen, D., & Zhao, H. (2012). Data security and privacy
protection issues in cloud computing. ICCSEE 2012,
1(973), 647–651. https://doi.org/10.1109/ICCSEE
.2012.193
Colesky, M., Hoepman, J. H., & Hillen, C. (2016). A Critical
Analysis of Privacy Design Strategies. IEEE SPW 2016,
33–40. https://doi.org/10.1109/SPW.2016.23
Conger, S., Loch, K. D., & Helft, B. L. (1995). Ethics and
information technology use: a factor analysis of attitudes
to computer use. Information Systems Journal, 5(3),
161–183. https://doi.org/10.1111/j.1365-2575.1995.tb00
106.x
Constantiou, I. D., & Kallinikos, J. (2015). New games, new
rules: Big data and the changing context of strategy.
Journal of Information Technology, 30(1), 44–57.
Cooper, A. (2012). What is “Analytics”? Definition and
Essential Characteristics. CETIS Analytics Series, 1(5),
1–10. http://publications.cetis.ac.uk/2012/521
Creswell, J. W., & Creswell, J. D. (2021). Projeto de
pesquisa: Métodos qualitativo, quantitativo e misto.
Penso.
Delbecq, A. L., Gustafson, D. H., & Van De Ven, A. H.
(1985). Group Techniques for Program Planning: A
Guide to Nominal Group and Delphi Processes.
https://doi.org/10.1177/105960117600100220
Fan, J., Han, F., & Liu, H. (2014). Challenges of Big Data
analysis. National Science Review, 1(2), 293–314.
https://doi.org/10.1093/nsr/nwt032
Gandomi, A., & Haider, M. (2015). Beyond the hype: Big
data concepts, methods, and analytics. International
Journal of Information Management, 35(2), 137–144.
https://doi.org/10.1016/j.ijinfomgt.2014.10.007
Google. (n.d.).
Google Trends. https://trends.google.
com/trends/explore?date=today 5-y&q=Big Data, Data
Analytics
Google. (2020). Google Translator. http://translate.
google.com/
Hasson, F., Keeney, S., & McKenna, H. (2000). Research
guidelines for the Delphi survey technique. Journal of
Advanced Nursing, 32(4), 1008-1015.
Hartzog, W. (2018). The Case Against Idealising Control.
European Data Protection Law Review, 4(4), 423–432.
https://doi.org/10.21552/edpl/2018/4/5
Hsu, C. C., & Sandford, B. A. (2007). The Delphi
technique: Making sense of consensus. Practical
Assessment, Research and Evaluation, 12(10), 1-8.
IMD World Digital. (2020). IMD World Digital
Competitiveness Ranking 2020. IMD World
Competitiveness Center, 180.