S. Miller and J. Weckert, Privacy, the Workplace and the Internet, Journal of Business Ethics, pp.255-265, 2000.

E. R. Eddy, D. L. Stone, and E. F. Stone-romero, THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES, Personnel Psychology, vol.8, issue.7, pp.335-358, 1999.
DOI : 10.2307/256087

M. Culnan, H. Smith, and R. Bies, Law Privacy and Organizations : The Corporate Obsession to know v. the individual right not to be known, The legalistic organization, pp.199-211, 1994.

G. R. Milne and M. E. Gordon, Direct mail privacy-efficiency trade-offs within an implied social contract framework, Journal of Public Policy & Marketing, vol.12, issue.2, pp.206-215, 1993.

S. J. Milberg, H. Smith, and S. J. Burke, Information Privacy: Corporate Management and National Regulation, Organization Science, vol.11, issue.1, pp.35-57, 2000.
DOI : 10.1287/orsc.11.1.35.12567

S. Dresner, Data protection roundup. Privacy Laws Bus, pp.2-8, 1996.

J. Noel, BPM and SOA: Better Together, White paper, IBM, 2005.

Q. Chen and M. Hsu, Inter-Enterprise Collaborative Business Process Management, International Conference on Data Engineering, pp.253-260, 2001.

M. Jafari, R. Safavi-naini, and N. P. Sheppard, Enforcing Purpose of User via workflows, 2009.

I. Chebbi and S. Tata, Workflow Abstraction for Privacy Preservation, Proceedings of the 2007 International Conference on Web Information Systems Engineering. LNCS, pp.166-177, 2007.
DOI : 10.1007/978-3-540-77010-7_17

URL : https://hal.archives-ouvertes.fr/hal-01328163

M. Chinosi and A. Trombetta, Integrating Privacy Policies into Business Processes, Journal of Research and Practice in Information Technology, vol.41, issue.2, pp.155-170, 2009.

P. Ashley, C. Powers, and M. Schunter, From privacy promises to privacy management, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, pp.43-50, 2002.
DOI : 10.1145/844102.844110

S. Bandhakavi, C. C. Zhang, and M. Winslett, Super-sticky and declassifiable release policies for flexible information dissemination control, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, pp.51-58, 2006.
DOI : 10.1145/1179601.1179609

M. C. Mont, S. Pearson, and P. Bramhall, Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.2003-2052, 2003.
DOI : 10.1109/DEXA.2003.1232051

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.7546

T. Grandison, M. Bilger, M. Graf, M. Swimmer, M. Schunter et al., Elevating the Discussion on Security Management: The Data Centric Paradigm, 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, pp.89-93, 2007.
DOI : 10.1109/BDIM.2007.375015