Comparative Study of Data Deduplication Strategies. (2018). 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Secure Cyber Computing and Communication (ICSCCC), 2018 First International Conference On, 68. Retrieved from https://ieeexplore.ieee.org/document/8703363?arnumber=8703363 Patricia C. Franks. (2015). New Technologies, New Challenges: Records Retention and Disposition in a Cloud Environment, 39(2), 191–209. Retrieved from: http://eds.a.ebscohost.com/eds/pdfviewer/pdfviewer?vid=18&sid=73312ccd-f875-4af5-9c62-d1adf1d7c39c%40sessionmgr4008 Schmidt, P. J., Wood, J. T., & Grabski, S. V. (2016). Business in the Cloud: Research Questions on Governance, Audit, and Assurance. Journal of Information Systems, 30(3), 173–189. https://doi.org/10.2308/isys-51494 F. Md Ajis and S. Hajar Baharin, “Dark Data Management as frontier of Information Governance,” 2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE), Malaysia, 2019, pp. 34-37. Retrieved from https://ieeexplore.ieee.org/document/8743915?arnumber=8743915 Shetty, Sony (2017). How to Tackle Dark Data”. Retrieved from https://www.gartner.com/smarterwithgartner/how-to-tackle-dark-data/