Table 6.
Classification elements for the identified technologies.
Characteristics | Description |
Security | Cloud (CLO), Tokenization (TO), Data Classification (DC), Multiple-Factors Authentication (M-F) |
Destruction | Overwriting (OV), Degaussing (DE), Physical destruction (PD) |
Voluntary access | Optional (OP), Required (RE), Compulsory (CO) |
Time span | Real-time data (RTD), Batch Processing (BP) |
Storage | Local (LO), External (EX) |
Source: The authors.