Author:
Almeida Teixeira Gonçalo,Mira da Silva Miguel,Pereira Ruben
Abstract
Purpose
The digital paradigm people live in today, which drastically increased the consumption of data, is a threat to their privacy. To create a high level of privacy protection for its citizens, the European Union proposed the General Data Protection Regulation (GDPR), which introduces obligations for organizations regarding the storing, processing, collecting and disclosing of data. This paper aims to identify the critical success factors of GDPR implementation.
Design/methodology/approach
A systematic literature review was conducted by following a strict review protocol, where 32 documents were found relevant to perform the review and to answer to the proposed research questions.
Findings
The critical success factors of GDPR implementation were identified, including barriers and enablers. Furthermore, benefits of complying with GDPR were identified.
Research limitations/implications
As GDPR is a relatively recent subject, there are still few scientific papers about it. Therefore, the authors were unable to neither identify nor present a robust conclusion regarding specific topics, such as practical outcomes.
Originality/value
On the basis of the literature, the identified critical success factors may be useful for organizations as these can be better prepared to achieve compliance by prioritizing the enablers and avoiding the barriers.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Management Information Systems
Reference41 articles.
1. The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness,2018
2. Towards dealing with GDPR uncertainty,2016
3. Allen, D., Berg, A., Berg, C. and Potts, J. (2018), “Some economic consequences of the GDPR”, SSRN Electronic Journal, pp. 1-9, available at: http://dx.doi.org/10.2139/ssrn.3160404
4. GDPR compliance: your tech department’s next big opportunity;Computer Fraud & Security,2017
5. Joining the dots: how to approach compliance and data governance;Network Security,2019
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献