G. Privacy, Consumer research insights and considerations for policymakers, 2014.

R. Meis and M. Heisel, Computer-Aided Identification and Validation of Privacy Requirements, Information, vol.7, issue.2, 2016.
DOI : 10.1007/s00766-003-0183-z

URL : http://www.mdpi.com/2078-2489/7/2/28/pdf

M. Jackson, Problem Frames. Analyzing and structuring software development problems, 2001.

R. Meis, Problem-Based Consideration of Privacy-Relevant Domain Knowledge, Privacy and Identity Management for Emerging Services and Technologies. IFIP AICT 421, 2014.
DOI : 10.1007/978-3-642-55137-6_12

URL : https://hal.archives-ouvertes.fr/hal-01276068

R. Meis and M. Heisel, Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis, Software Technologies -10th International Joint Conference, ICSOFT 2015, Revised Selected Papers, pp.79-98, 2016.
DOI : 10.1007/978-3-319-30142-6_5

M. Hansen, M. Jensen, and M. Rost, Protection Goals for Privacy Engineering, 2015 IEEE Security and Privacy Workshops, pp.159-166, 2015.
DOI : 10.1109/SPW.2015.13

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163220

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, pp.0-34, 2010.

R. Meis, M. Heisel, and R. Wirtz, A Taxonomy of Requirements for the Privacy Goal Transparency, Trust, Privacy, and Security in Digital Business, pp.195-209, 2015.
DOI : 10.1007/978-3-319-22906-5_15

R. Meis and M. Heisel, Understanding the Privacy Goal Intervenability, Trust, Privacy, and Security in Digital Business, pp.79-94, 2016.
DOI : 10.3390/info7020028

F. S. Gürses, Multilateral Privacy Requirements Analysis in Online Social Network Services, 2010.

W. Young and N. G. Leveson, An integrated approach to safety and security based on systems theory, Communications of the ACM, vol.57, issue.2, pp.31-35, 2014.
DOI : 10.1145/2556938

M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.16-19, 2011.
DOI : 10.1109/32.142871

D. Wright, The state of the art in privacy impact assessment, Computer Law & Security Review, vol.28, issue.1, pp.54-61, 2012.
DOI : 10.1016/j.clsr.2011.11.007

M. Oetzel and S. Spiekermann, A systematic methodology for privacy impact assessments: a design science approach, European Journal of Information Systems, vol.54, issue.8, pp.126-150, 2014.
DOI : 10.1007/978-94-007-2543-0

F. Bieker, M. Friedewald, M. Hansen, H. Obersteller, and M. Rost, A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation, Privacy Technologies and Policy -4th Annual Privacy Forum, pp.21-37, 2016.
DOI : 10.1007/s11623-012-0154-y

R. Alnemr, E. Cayirci, L. D. Corte, A. Garaga, R. Leenes et al., A Data Protection Impact Assessment Methodology for Cloud, Privacy Technologies and Policy -3rd Annual Privacy Forum, pp.60-92, 2015.
DOI : 10.1007/978-3-319-31456-3_4

A. V. Uzunov and E. B. Fernandez, An extensible pattern-based library and taxonomy of security threats for distributed systems, Computer Standards & Interfaces, vol.36, issue.4, pp.734-747, 2014.
DOI : 10.1016/j.csi.2013.12.008