Nguyen, Q. P., Low, B. K. H., and Jaillet, P. (2020). Varia-
tional bayesian unlearning. Advances in Neural Infor-
mation Processing Systems, 33:16025–16036.
Nguyen, Q. P., Oikawa, R., Divakaran, D. M., Chan, M. C.,
and Low, B. K. H. (2022). Markov chain monte carlo-
based machine unlearning: Unlearning what needs to
be forgotten. arXiv preprint arXiv:2202.13585.
Othon, M., Mile, S., de Melo, A., Junior, D. A., and Arruda,
A. (2019). Evaluation of the removal of anomalies in
data collected by sensors.
Otto, B. (2015). Quality and value of the data resource in
large enterprises. Information Systems Management,
32(3):234–251.
Pachpor, N. N. and Prasad, P. S. (2018). Improving the per-
formance of system in cloud by using selective dedu-
plication. In 2018 Second International Conference
on Electronics, Communication and Aerospace Tech-
nology (ICECA), pages 314–318. IEEE.
Pecherle, G., Gy
˝
orödi, C., Gy
˝
orödi, R., Andronic, B., and
Ignat, I. (2011). New method of detection and wiping
of sensitive information. In 2011 IEEE 7th Interna-
tional Conference on Intelligent Computer Communi-
cation and Processing, pages 145–148. IEEE.
Rashid, F., Miri, A., and Woungang, I. (2012). A secure data
deduplication framework for cloud environments. In
2012 Tenth Annual International Conference on Pri-
vacy, Security and Trust, pages 81–87. IEEE.
Reardon, J., Capkun, S., and Basin, D. (2012). Data node
encrypted file system: Efficient secure deletion for
flash memory. In 21st USENIX Security Symposium
(USENIX Security 12), pages 333–348.
Riduan, N. H. A., Foozy, C. F. M., Hamid, I. R. A.,
Shamala, P., and Othman, N. F. (2021). Data wip-
ing tool: Byteeditor technique. In 2021 3rd Interna-
tional Cyber Resilience Conference (CRC), pages 1–6.
IEEE.
Rose, S., Engel, D., Cramer, N., and Cowley, W. (2010).
Automatic keyword extraction from individual doc-
uments. Text mining: applications and theory, 1(1-
20):10–1002.
Sahri, M., Abdulah, S. N. H. S., Senan, M. F. E. M., Yusof,
N. A., Abidin, N. Z. B. Z., Azam, N. S. B. S., and
Ariffin, T. J. B. T. (2018). The efficiency of wiping
tools in media sanitization. In 2018 Cyber Resilience
Conference (CRC), pages 1–4. IEEE.
Sarkar, S., Banatre, J.-P., Rilling, L., and Morin, C. (2018).
Towards enforcement of the eu gdpr: enabling data
erasure. In 2018 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Comput-
ing and Communications (GreenCom) and IEEE Cy-
ber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData), pages 222–229. IEEE.
Steinbuss, S., Eitel, A., Jung, C., Brandstädter, R., Hossein-
zadeh, A., Bader, S., Kühnle, C., Birnstill, P., Brost,
G., Gall, Bruckner, F., Weißenberg, N., and Korth, B.
(2021). Usage control in the international data spaces.
Subha, S. (2009). An algorithm for secure deletion in flash
memories. In 2009 2nd IEEE International Confer-
ence on Computer Science and Information Technol-
ogy, pages 260–262. IEEE.
Tallon, P. P., Ramirez, R. V., and Short, J. E. (2013). The
information artifact in it governance: toward a theory
of information governance. Journal of Management
Information Systems, 30(3):141–178.
Tebernum, D., Altendeitering, M., and Howar, F. (2021).
DERM: A reference model for data engineering. In
Quix, C., Hammoudi, S., and van der Aalst, W. M. P.,
editors, Proceedings of the 10th International Confer-
ence on Data Science, Technology and Applications,
DATA 2021, Online Streaming, July 6-8, 2021, pages
165–175. SCITEPRESS.
Tebernum, D., Altendeitering, M., and Howar, F. (2023).
A survey-based evaluation of the data engineer-
ing maturity in practice. In press: INSTICC
Springer https://www.researchgate.net/publication/
367309981_A_Survey-based_Evaluation_of_the_
Data_Engineering_Maturity_in_Practice.
Thushara, M., Mownika, T., and Mangamuru, R. (2019).
A comparative study on different keyword extraction
algorithms. In 2019 3rd International Conference on
Computing Methodologies and Communication (IC-
CMC), pages 969–973. IEEE.
Trajanov, D., Zdraveski, V., Stojanov, R., and Kocarev, L.
(2018). Dark data in internet of things (iot): chal-
lenges and opportunities. In 7th Small Systems Simu-
lation Symposium, pages 1–8.
Van Bussel, G.-J. and Smit, N. (2014). Building a green
archiving model: archival retention levels, informa-
tion value chain and green computing. In Proceedings
of the 8th European Conference on IS Management
and Evaluation. ECIME, pages 271–277.
Wang, G. and Zhao, Y. (2008). A fast algorithm for data
erasure. In 2008 IEEE International Conference on
Intelligence and Security Informatics, pages 254–256.
IEEE.
Wang, R. Y. and Strong, D. M. (1996). Beyond accuracy:
What data quality means to data consumers. Journal
of management information systems, 12(4):5–33.
Wei, M., Grupp, L., Spada, F. E., and Swanson, S. (2011).
Reliably erasing data from {Flash-Based} solid state
drives. In 9th USENIX Conference on File and Storage
Technologies (FAST 11).
Xu, X., Gong, P., and Xu, J. (2014). Data folding: A new
data soft destruction algorithm. In 2014 Sixth Interna-
tional Conference on Wireless Communications and
Signal Processing (WCSP), pages 1–6. IEEE.
Žulj, S., Delija, D., and Sirovatka, G. (2020). Analysis of
secure data deletion and recovery with common digi-
tal forensic tools and procedures. In 2020 43rd Inter-
national Convention on Information, Communication
and Electronic Technology (MIPRO), pages 1607–
1610. IEEE.
DATA 2023 - 12th International Conference on Data Science, Technology and Applications
218