Consumer research insights and considerations for policymakers, 2014. ,
Computer-Aided Identification and Validation of Privacy Requirements, Information, vol.7, issue.2, 2016. ,
DOI : 10.1007/s00766-003-0183-z
URL : http://www.mdpi.com/2078-2489/7/2/28/pdf
Problem Frames. Analyzing and structuring software development problems, 2001. ,
Problem-Based Consideration of Privacy-Relevant Domain Knowledge, Privacy and Identity Management for Emerging Services and Technologies. IFIP AICT 421, 2014. ,
DOI : 10.1007/978-3-642-55137-6_12
URL : https://hal.archives-ouvertes.fr/hal-01276068
Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis, Software Technologies -10th International Joint Conference, ICSOFT 2015, Revised Selected Papers, pp.79-98, 2016. ,
DOI : 10.1007/978-3-319-30142-6_5
Protection Goals for Privacy Engineering, 2015 IEEE Security and Privacy Workshops, pp.159-166, 2015. ,
DOI : 10.1109/SPW.2015.13
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163220
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010. ,
A Taxonomy of Requirements for the Privacy Goal Transparency, Trust, Privacy, and Security in Digital Business, pp.195-209, 2015. ,
DOI : 10.1007/978-3-319-22906-5_15
Understanding the Privacy Goal Intervenability, Trust, Privacy, and Security in Digital Business, pp.79-94, 2016. ,
DOI : 10.3390/info7020028
Multilateral Privacy Requirements Analysis in Online Social Network Services, 2010. ,
An integrated approach to safety and security based on systems theory, Communications of the ACM, vol.57, issue.2, pp.31-35, 2014. ,
DOI : 10.1145/2556938
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.16-19, 2011. ,
DOI : 10.1109/32.142871
The state of the art in privacy impact assessment, Computer Law & Security Review, vol.28, issue.1, pp.54-61, 2012. ,
DOI : 10.1016/j.clsr.2011.11.007
A systematic methodology for privacy impact assessments: a design science approach, European Journal of Information Systems, vol.54, issue.8, pp.126-150, 2014. ,
DOI : 10.1007/978-94-007-2543-0
A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation, Privacy Technologies and Policy -4th Annual Privacy Forum, pp.21-37, 2016. ,
DOI : 10.1007/s11623-012-0154-y
A Data Protection Impact Assessment Methodology for Cloud, Privacy Technologies and Policy -3rd Annual Privacy Forum, pp.60-92, 2015. ,
DOI : 10.1007/978-3-319-31456-3_4
An extensible pattern-based library and taxonomy of security threats for distributed systems, Computer Standards & Interfaces, vol.36, issue.4, pp.734-747, 2014. ,
DOI : 10.1016/j.csi.2013.12.008