SlideShare a Scribd company logo
www.cin.ufpe.br/~ler
Laboratório de Engenharia
de Requisitos
Universidade
Federal de
Pernambuco
Modeling Languages to Support Privacy
Requirements: Results from a Systematic
Literature Review
Mariana Peixoto and Carla Silva
{mmp2, ctlls}@cin.ufpe.br
08/2018
Outline
n  Problem Characterization
n  Research methodology
n  Results
n  Future Work
2
Problem Characterization
n  Is necessary address the privacy issues since the early
stages of development, ie the Requirements Engineering
phase [Kalloniatis et al., 2008; Omoronyia et al., 2012; Tun et
al., 2012].
n  There is a need for systematic approaches for reasoning,
modeling and analyzing privacy from the early stages of the
software development [Webster et al., 2005].
n  Privacy is a multifaceted concept, comes in many forms, relating to
what one wishes to keep private [Kalloniatis et al., 2008; Gharib et
al., 2017]. This has resulted in much confusion among designers
and stakeholders, and has led in turn to wrong design decisions
[Gharib et al., 2017].
3
Problem Characterization
n  Motivated by this scenario, we perform a Systematic
Literature Review to investigate requirements modeling
languages for privacy and provides an extensive analysis
of them.
¨  This SLR focuses on approaches that consider privacy, by
explicitly representing and analyzing privacy concepts in a
requirements model.
4
Research Methodology
5
Fig 1. SLR Process adapted from Kitchenham and Charters (2007).
Research Methodology
n  What are the modeling languages used to modeling and
analysis of privacy requirements?
¨  SRQ1 - What modeling languages capture privacy concepts?
Is it an extension of existing language? The language has tool
support?
¨  SRQ2 - What are the benefits and limitations reported in the
use of the modeling languages?
¨  SRQ3 - What are the privacy concepts captured by modeling
languages?
¨  SRQ4 - What are the modeling elements used to capture
privacy concepts and their relationships?
¨  SRQ5 – Do these languages support requirements analysis?
What are the methods of analysis used?
¨  SRQ6 - Are the modeling languages concerned with cognitive
understanding aspects?
6
Research Methodology
Search Strategy: automatic search and snowball
method
n  Search String: (“privacy”) AND (“requirements
engineering”) AND (“modeling” OR “modelling” OR
“model” OR “language” OR “notation)
n  Search Engines:
¨  IEEExplore
¨  ACM Digital Library
¨  Science Direct
¨  Scopus
¨  Compendex
¨  Springer
7
SLR Preliminary Results
8
Inclusion Criteria Exclusion Criteria
I1 Primary Studies E1 Studies that are not focused on
Requirements Engineering
I2 Peer-reviewed studies E2 Duplicate studies (only one copy of each
study was included)
I3 Studies that present privacy
representation in some visual language
E3 Redundant paper of same author
I4 Original studies in languages: English,
Portuguese or Spanish
E4 Studies not available
I5 Studies published in any year E5 Incomplete studies (short papers (≤ 3
pages)
E6 Presentations, reports, dissertations,
theses, secondary studies, tertiary and
meta-analysis, gray literature.
E7 Studies that do not capture privacy
concepts
E8 Studies irrelevant to the research
questions
Table 1. Selection Criteria.
Research Methodology
Selection Procedure
n  Step 1: reading titles, abstracts and keywords;
considering the inclusion and exclusion criteria.
n  Step 2: reading introduction and conclusion; considering
the inclusion and exclusion criteria.
n  Step 3: the studies included are fully read; excluding
irrelevant papers for the research questions.
9
Research Methodology
10
Data Description
Identifier (ID) Unique identifier for each paper
Year, Affiliations, List of Authors, Title,
Abstract and Keywords
Source IEEE, ACM, Scopus, Science Direct, Ei
COMPENDEX and Springer
Application context Industrial, academic, both
Study Type Journal, conference, symposium,
workshop, book chapter
Research Type (based on Wieringa et
al., 2006)
Evaluation research, validation research,
solution proposal, philosophical papers,
experience papers, opinion papers
Evaluation Method (based on
Easterbrook et al., 2008 )
Controlled experiment, case study, survey,
ethnography, action research, illustrative
scenario, not applicable
Application Domain Any domain. For example, Health Care
Research Questions Answer to each research question
Table 2. Data Extraction.
Research Methodology
Quality Assessment
n  To verify the quality, the studies were classified
according to Wieringa (2005):
¨  Validation Research
¨  Evaluation Research
¨  Experience Papers
¨  Opinion Papers
¨  Philosophical Papers
¨  Solution Proposal
11
12
Quality Assessment
Question Eva Val Sol Phi Exp Opi
QA1- Are the proposed concepts/relations clearly defined? (Gharib et al.,
2017).
x x x x x x
QA2- Does the work propose sufficient concepts/relations to deal with privacy
aspects? (Gharib et al., 2017).
x x x x x x
QA3- Is the problem clearly stated? (Wieringa, 2006). x x x
QA4- Is the research method clearly stated? (Wieringa, 2006). x x
QA5- Is there an adequate description of the context? (Dyba and Dingsoyr,
2008).
x x
QA6- Was the data collected in a way that addressed the research issue?
(Dyba and Dingsoyr, 2008).
x x
QA7- Was the data analysis sufficiently rigorous? (Dyba and Dingsoyr, 2008). x x
QA8- Is there a clear statement of findings? (Dyba and Dingsoyr, 2008). x x
QA9- Was there a control group with which to compare treatments? (Dyba and
Dingsoyr, 2008).
x
QA10- Is the technique novel, or is the application of the techniques to this
kind of problem novel? (Wieringa, 2006).
x
QA11- Is the technique argued? (Wieringa, 2006). x
QA12- Is the broader relevance of this novel technique argued? (Wieringa,
2006).
x
QA13- Is there sufficient discussion of related work? (Wieringa, 2006). x
QA14- Is the conceptual framework original? (Wieringa, 2006). x
QA15- Is it argued? (Wieringa, 2006). x
QA16- Is the experience original? (Wieringa, 2006). x
QA17- Is the report about it sound? (Wieringa, 2006). x
QA18- Is the report relevant for practitioners? (Wieringa, 2006). x
QA19- Is the stated position argued? (Wieringa, 2006). x
QA20- Is the opinion Innovating? (Wieringa, 2006). x
Table 3. Quality Assessment
Research Methodology
Quality Assessment
n  To verify the quality, the studies were classified
according to Wieringa (2005):
¨  Validation Research (less than 4.5 of 9.0)
¨  Evaluation Research (less than 3.5 of 8.0)
¨  Experience Papers (less than 2.5 of 5.0)
¨  Opinion Papers (less than 2.5 of 5.0)
¨  Philosophical Papers (less than 2.5 of 4.0)
¨  Solution Proposal (less than 2.5 of 7.0)
13
Research Methodology
Threats to validity
n  This review was conducted by only one researcher and
one advisor. To reduce the bias in this case, a structured
data extraction approach was used, as indicated by
Cruzes and Dyba (2011).
n  The search string used for the automatic search may not
include all the existing synonyms for the terms present in
the expression "Modeling languages that support privacy
requirements" and thus be insufficient to capture all area
studies. To reduce this bias the snowball search was
performed.
14
SLR Results
15
Fig 2. SLR Results.
SLR Results
16
ID Title Authors
ACM7 Distilling Privacy Requirements for Mobile
Applications
Thomas, K; Bandara, A. K.;
Price, B.A.; Nuseibeh, B.
(2014)
ACM8 Elaborating Security Requirements by
Construction of Intentional Anti-Models
Lamsweerde, A.V. (2004)
ACM17 Legal Goal-oriented Requirement Language
(Legal GRL) for Modeling Regulations
Ghanavati, S.; Amyot, D.;
Rifaut, A. (2014)
COMPEDEX9 Designing privacy-aware personal health record
systems
Samavi, R.; Topaloglou, T.
(2008)
IEEE18 Compliance Analysis Based on a Goal-oriented
Requirement Language Evaluation Methodology
Ghanavati, S.; Amyot D.;,
Peyton, L. (2009)
IEEE30 Goal-oriented compliance with multiple
regulations
Ghanavati, S.; Rifaut;, A.;
Dubois, E.; Amyot, D. (2014)
IEEE48 Requirements engineering patterns for the
modeling of Online Social Networks features
Bouraga, S.; Jureta, I.;
Faulkner, S. (2014)
... .... ...
Table 4. Selected Papers
SLR Results
n  Overview Results
17
Fig 3. Publication year.
1
6
4
3 3
2
5
4
2
4
3 3
9
3
4
2
0
1
2
3
4
5
6
7
8
9
10
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
SLR Results
n  Overview Results
18
Fig 4. Authors nationalities.
1	
  
6	
  
1	
  
17	
  
1	
  
1	
  
1	
  
1	
  
9	
  
2	
  
1	
  
2	
  
17	
  
1	
  
3	
  
2	
  
2	
  
1	
  
3	
  
13	
  
1	
  
0	
   2	
   4	
   6	
   8	
   10	
   12	
   14	
   16	
   18	
  
Australia
Belgium
Brazil
Canada
Chile
China
Cyprus
France
Germany
Greece
India
Ireland
Italy
Japan
Luxembourg
Netherlands
Norway
Saudi Arabia
Spain
UK
USA
SLR Results
n  Overview Results
19
Table 5. Paper type x context.
Application Context
Study Type Academic Academic/Industrial
Total
Conference 24 0 24
Journal 17 4 21
Symposium 2 0 2
Workshop 11 0 11
Total 54 (93.1%) 4 (6.8%) 58 (100%)
SLR Results
n  Overview Results
20
Table 6. Research type.
Research Type Frequency Percentage
Solution Proposal 48 82.8
Evaluation
Research 7 12.1
Validation
Research 3 5.2
Total 58 100.0
SLR Results
n  Overview Results
21
Table 7. Evaluation method
Evaluation Method	

 Frequency	

 Percentage	

Case study	

 13	

 22.4	

Case study and Survey	

 1	

 1.7	

Controlled Experiment	

 3	

 5.2	

Illustrative Scenario	

 35	

 60.3	

Not Applicable	

 5	

 8.6	

Survey	

 1	

 1.7	

Total	

 58	

 100.0
SLR Results
22
Table 8 Application Domain
Application Domain	

 Frequency	

 Percentage	

Business Process Management	

 1	

 1.7	

Cloud Computing Systems	

 2	

 3.4	

Context-sensitive systems	

 1	

 1.7	

General	

 32	

 55.2	

Health Care	

 5	

 8.6	

Internet Services	

 1	

 1.7	

Legal Regulations	

 6	

 10.3	

Mobile Applications	

 2	

 3.4	

Online Social Networks	

 1	

 1.7	

Public Key Infrastructures	

 1	

 1.7	

Security Policies	

 1	

 1.7	

Smart Grids	

 1	

 1.7	

Socio-Technical Systems	

 3	

 5.2	

Web of Things	

 1	

 1.7	

Total	

 58	

 100.0
23
Table 9. Languages used for privacy.
Language Frequency Percentage
UML4PF 1 1.4
BPMN 1 1.4
CORAS Risk Modeling 1 1.4
Data Flow Diagrams 1 1.4
Goal/Agent Modeling 8 11.4
GRL 3 4.3
i-Star 9 12.9
KAOS 1 1.4
Legal GRL 2 2.9
Misuse Cases 4 5.7
NFR Framework 3 4.3
Problem Frames 5 7.1
SecBPMN-ml 1 1.4
Secure Tropos 6 8.6
Security-Aware Tropos 1 1.4
SI* modelling 3 4.3
STS-ml 2 2.9
Threat Model 2 2.9
Threat Tree 1 1.4
Tropos 6 8.6
UML 3 4.3
UMLsec 3 4.3
Use Case Maps 2 2.9
User Requirements Notation 1 1.4
Total 70 100.0
SLR Results
What modeling languages capture privacy concepts?
24
Fig 5. Taxonomy of privacy modeling languages.
SLR Results
Is it an extension of existing language?
n  44 (75.9%) studies used an existing language;
n  14 (24.1%) studies proposed an extension of an existing
language;
n  It was not possible to observe the proposal of no new
language.
25
SLR Results
The language has tool support?
26
Table 10. Paper Whose has Tool Support.
ID	

 Tool Name	

ACM7	

 Customized OpenArgue	

ACM17/ IEEE18/ IEEE30/
SCOPUS6/ SPRINGER119/
SPRINGER277	

Extended tool support (jUCMNav)	

SPRINGER183/ SPRINGER420/
SPRINGER23	

UMLsec tool	

SPRINGER23	

 Used Secure Tropos tool	

SPRINGER160	

 Toolset for modeling in SecBPMN-ml	

IEEE58/SPRINGER302	

 Extended/Used UML profile	

SCOPUS20	

 Used CREE-tool	

SCIENCE27	

 Tool developed using	

the Open Models Initiative Platform
SLR Results
What are the privacy concepts captured by modeling languages?
Privacy Concepts Catalog
Private/ Public/ Semi Public/ Owner/ Third Party/ Personal
Information/ Privacy Mechanism- goals/ Safeguards/ Awareness –
Necessity to know/ Openness/ Consent/ Accuracy/ Agreement/
Obligation/ Socialization/ Intentionality/ Non Repudiation/
Availability/ Permission/ Collect/ Disclosure/ Use/ Access Control/
Autonomy/ Vulnerability/ Confidentiality/ Intervenability/
Dectectability/ Integrity/ Unobservability/ Unlikability/ Anonymity/
Pseudonymity/ Authorization/ Authentication/ Opportunity/ Strength/
Weakness/ Conflict/ Trust/ Constraint/ Assurance/ Measure/ Privacy
Threats/ Harms/ Exposure/ Surveillance/ Aggregation/
Misinformation/ Power Imbalance/ Contextl/ Intrusion/ Identification/
Accountability/ Compliance/ Auditability/ Processor/ Privacy policy/
Privacy Preferences
27
SLR Results
What are the privacy concepts captured by modeling languages?
n  UML is used to support Personal Information, Awareness,
Consent, Obligation, Non Repudiation, Disclosure, Access
Control, Confidentiality, Integrity, Anonymity, Authorization and
Harms.
n  NFR Framework is used to support, Privacy Mechanism,
Awareness, Socialization, Intentionality, Permission,
Autonomy, Vulnerability, Confidentiality, Anonymity, Conflict,
Trust, Privacy Threats in COMPEDEX9, SCIENCE178 and
SNOW115.
28
SLR Preliminary Results
What are the modeling elements used to capture privacy
concepts and their relationships?
29
Concept <Element; Relationships (ID)>
Private <Resource; Dependency (IEEE48)>
Public <Resource; Dependency (IEEE48)>
Semi-Public <Resource; Dependency (IEEE48)>
Owner <Owner; Dependency (SNOW122)
Third Party <Goal; Decomposition link (ACM17)>
Personal Information <Resource; Dependency (COMPEDEX9/IEEE48/SNOW123), part of
(SCOPUS31), Trust relation, Owner relation, Permission relation
(SCOPUS30)>, <Goal; Contribution Link (IEEE18/SNOW7), Goal
decomposition (SNOW46), Dependency (SCIENCE323/SCIENCE332)>,
<Softgoal; Decomposition Link (IEEE30), Strategic Dependencies
(IEEE53), Association (SCIENCE40)>, < Stereotype; Extension
(IEEE58)>, <Document; Contribution link SNOW122)>
Table 11. Modeling elements and relationships.
SLR Preliminary Results
What are the modeling elements used to capture privacy concepts
and their relationships?
30Fig 6. SLR Modeling Elements Results.
SLR Preliminary Results
Do these languages support requirements analysis? What are the
methods of analysis used?
n  48 (82.8%) do support analysis and 10 (17.2%) don’t.
31
Fig 7. Requirements Analysis Methods.
SLR Results
Do these languages support requirements analysis? What are the
methods of analysis used?
32
ID Requirements Analysis Techniques Supported Concept
SNOW115 Privacy and Transparency Together Analysis: Aims to
analyze how privacy would impact Transparency and
vice versa.
Third Party, Personal Information, Privacy
Mechanism, Awareness, Socialization, Collect,
Use, Anonymity and Trust
IEEE53/
SNOW123
Attacker Analysis: Aims to identify potential system
abusers and their malicious intents
Personal Information, Privacy Mechanism,
Awareness, Consent, Collect, Disclosure,
Access Control, Confidentiality, Authorization,
Authentication, Trust, Constraint, Assurance and
Privacy Threats
SNOW122 Consistency Analysis: Aims to verify whether the
diagram built by the designer is consistent and valid.
Owner, Personal Information, Availability,
Confidentiality, Integrity, Authorization and
Privacy Threats
IEEE53 Countermeasure Analysis: System designers make
decisions on how to protect security and privacy from
potential attackers and vulnerabilities
Personal Information, Awareness, Disclosure,
Access Control, Confidentiality, Authorization,
Trust and Privacy Threats
Table 12. Requirements Analysis Techniques X Supported Concept
.
SLR Results
Are the modeling languages concerned with cognitive
understanding aspects?
n  only one study!
¨  They conducted a study in two countries with 152 participants in which
they assessed the effectiveness of graphical representations with
respect to extraction correct information about risks.
33
SLR Results - Quality Assessment
n  Evaluation research: 7 papers just one received maximum
score, quality 80 ;
n  Validation research: 3 papers (two studies received 80) from a
maximum of 90;
n  Solution proposal: 48 papers just three received maximum
score, quality 70.
34
Future Work
n  Concepts Validation
n  Conceptual Model
n  Framework of Privacy Capabilities
35
Main References
n  Gharib, M., Giorgini, P., Mylopoulos, J. (2017) Towards an
Ontology for Privacy Requirements via a Systematic Literature
Review. In: Mayr H., Guizzardi G., Ma H., Pastor O. (eds)
Conceptual Modeling. LNCS, vol 10650. Springer, pages 193–
208.
n  Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M.,
Sherman, S., & Balissa, A. (2018) Privacy by designers:
software developers’ privacy mindset. Empirical Software
Engineering, pages 259-289.
n  Kitchenham, B., Charters, S. Guidelines for performing
Systematic Literature Reviews in Software Engineering.
Technical Report, EBSE-2007-01, Software Engineering Group,
School of Computer Science and Mathematics. Keele
University, Keele, UK.
n  Privacy in RE: https://sites.google.com/cin.ufpe.br/
privacyconcepts/home
36
www.cin.ufpe.br/~ler
Laboratório de Engenharia
de Requisitos
Universidade
Federal de
Pernambuco
Modeling Languages to Support Privacy
Requirements: Results from a Systematic
Literature Review
Mariana Peixoto and Carla Silva
{mmp2, ctlls}@cin.ufpe.br
08/2018

More Related Content

What's hot

ICPC12a.ppt
ICPC12a.pptICPC12a.ppt
ICPC12a.ppt
Ptidej Team
 
Testing Scientific Thinking Skills protocol
Testing Scientific Thinking Skills protocolTesting Scientific Thinking Skills protocol
Testing Scientific Thinking Skills protocol
jdomen44
 
NAACL HLT 2010 d-Confidence
NAACL HLT 2010 d-ConfidenceNAACL HLT 2010 d-Confidence
NAACL HLT 2010 d-Confidence
NunoEscudeiro
 
Experiments on Pattern-based Ontology Design
Experiments on Pattern-based Ontology DesignExperiments on Pattern-based Ontology Design
Experiments on Pattern-based Ontology Design
evabl444
 
An analysis on team heterogeneity outcomes and gender gap at PoliMi
An analysis on team heterogeneity outcomes and gender gap at PoliMiAn analysis on team heterogeneity outcomes and gender gap at PoliMi
An analysis on team heterogeneity outcomes and gender gap at PoliMi
NECST Lab @ Politecnico di Milano
 
楊意涵 9922606 how computers facilitate english foreign language learners acquire
楊意涵 9922606 how computers facilitate english foreign language learners acquire楊意涵 9922606 how computers facilitate english foreign language learners acquire
楊意涵 9922606 how computers facilitate english foreign language learners acquire
Joanna Yang
 
Qualitative data analysis in design research
Qualitative data analysis in design researchQualitative data analysis in design research
Qualitative data analysis in design research
Eva Durall
 
RESEARCH in software engineering
RESEARCH in software engineeringRESEARCH in software engineering
RESEARCH in software engineering
Ivano Malavolta
 
Selecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software EngineeringSelecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software Engineering
Daniel Cukier
 
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha A_Palalas C_G...
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha  A_Palalas C_G...DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha  A_Palalas C_G...
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha A_Palalas C_G...
Agnieszka (Aga) Palalas, Ed.D.
 
Mapping the systematic literature studies about software ecosystems
Mapping the systematic literature studies about software ecosystemsMapping the systematic literature studies about software ecosystems
Mapping the systematic literature studies about software ecosystems
Technological Ecosystems for Enhancing Multiculturality
 
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
Vitomir Kovanovic
 
Ph d sem_1@iitm
Ph d sem_1@iitmPh d sem_1@iitm
Ph d sem_1@iitm
Vinu Ev
 
[13 - B] Experiment reporting
[13 - B] Experiment reporting[13 - B] Experiment reporting
[13 - B] Experiment reporting
Ivano Malavolta
 
Multimodal behavior signal analysis and interpretation for young kids with ASD
Multimodal behavior signal analysis and interpretation for young kids with ASDMultimodal behavior signal analysis and interpretation for young kids with ASD
Multimodal behavior signal analysis and interpretation for young kids with ASD
diannepatricia
 

What's hot (15)

ICPC12a.ppt
ICPC12a.pptICPC12a.ppt
ICPC12a.ppt
 
Testing Scientific Thinking Skills protocol
Testing Scientific Thinking Skills protocolTesting Scientific Thinking Skills protocol
Testing Scientific Thinking Skills protocol
 
NAACL HLT 2010 d-Confidence
NAACL HLT 2010 d-ConfidenceNAACL HLT 2010 d-Confidence
NAACL HLT 2010 d-Confidence
 
Experiments on Pattern-based Ontology Design
Experiments on Pattern-based Ontology DesignExperiments on Pattern-based Ontology Design
Experiments on Pattern-based Ontology Design
 
An analysis on team heterogeneity outcomes and gender gap at PoliMi
An analysis on team heterogeneity outcomes and gender gap at PoliMiAn analysis on team heterogeneity outcomes and gender gap at PoliMi
An analysis on team heterogeneity outcomes and gender gap at PoliMi
 
楊意涵 9922606 how computers facilitate english foreign language learners acquire
楊意涵 9922606 how computers facilitate english foreign language learners acquire楊意涵 9922606 how computers facilitate english foreign language learners acquire
楊意涵 9922606 how computers facilitate english foreign language learners acquire
 
Qualitative data analysis in design research
Qualitative data analysis in design researchQualitative data analysis in design research
Qualitative data analysis in design research
 
RESEARCH in software engineering
RESEARCH in software engineeringRESEARCH in software engineering
RESEARCH in software engineering
 
Selecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software EngineeringSelecting Empirical Methods for Software Engineering
Selecting Empirical Methods for Software Engineering
 
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha A_Palalas C_G...
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha  A_Palalas C_G...DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha  A_Palalas C_G...
DBR (Design-Based Research) in mobile learning-Mlearn2013 Doha A_Palalas C_G...
 
Mapping the systematic literature studies about software ecosystems
Mapping the systematic literature studies about software ecosystemsMapping the systematic literature studies about software ecosystems
Mapping the systematic literature studies about software ecosystems
 
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
Towards Automated Classification of Discussion Transcripts: A Cognitive Prese...
 
Ph d sem_1@iitm
Ph d sem_1@iitmPh d sem_1@iitm
Ph d sem_1@iitm
 
[13 - B] Experiment reporting
[13 - B] Experiment reporting[13 - B] Experiment reporting
[13 - B] Experiment reporting
 
Multimodal behavior signal analysis and interpretation for young kids with ASD
Multimodal behavior signal analysis and interpretation for young kids with ASDMultimodal behavior signal analysis and interpretation for young kids with ASD
Multimodal behavior signal analysis and interpretation for young kids with ASD
 

Similar to Modeling language to support privacy requirements

Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
Joshua Penman
 
Privacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software DevelopmentPrivacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software Development
RequirementsEngineeringLaboratory
 
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
cahafner
 
Chapter 10Mixed Methods Procedures
Chapter 10Mixed Methods ProceduresChapter 10Mixed Methods Procedures
Chapter 10Mixed Methods Procedures
EstelaJeffery653
 
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
gerardkortney
 
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
odiliagilby
 
Denduang 606 Final Pp Ready
Denduang 606 Final Pp ReadyDenduang 606 Final Pp Ready
Denduang 606 Final Pp Ready
guesta536f75
 
Research-Designs.pdf for research for ed
Research-Designs.pdf for research for edResearch-Designs.pdf for research for ed
Research-Designs.pdf for research for ed
MikhaelaJaydAstao
 
Chapter 22 Evaluating a Research ReportEducational Research.docx
Chapter 22 Evaluating a Research ReportEducational Research.docxChapter 22 Evaluating a Research ReportEducational Research.docx
Chapter 22 Evaluating a Research ReportEducational Research.docx
cravennichole326
 
HUS 201 Chapter Eleven
HUS 201 Chapter ElevenHUS 201 Chapter Eleven
HUS 201 Chapter Eleven
BrittanyAga1
 
Indicators of study quality in systematic reviews of qualitative research to ...
Indicators of study quality in systematic reviews of qualitative research to ...Indicators of study quality in systematic reviews of qualitative research to ...
Indicators of study quality in systematic reviews of qualitative research to ...
Merlien Institute
 
Week 11Collection of Data – questionnaire and Instruments & .docx
Week 11Collection of Data – questionnaire and Instruments & .docxWeek 11Collection of Data – questionnaire and Instruments & .docx
Week 11Collection of Data – questionnaire and Instruments & .docx
jessiehampson
 
How to write a basic research proposal
How to write a basic research proposalHow to write a basic research proposal
How to write a basic research proposal
Mubashar Islam
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
willcoxjanay
 
Adapting E-Learning Situations for International Reuse
Adapting E-Learning Situations for International ReuseAdapting E-Learning Situations for International Reuse
Adapting E-Learning Situations for International Reuse
Richter Thomas
 
Introduction on Research Methodology_3_1.pdf
Introduction on Research Methodology_3_1.pdfIntroduction on Research Methodology_3_1.pdf
Introduction on Research Methodology_3_1.pdf
AntoniaRoberts5
 
Using phenomenography in educational technology research from 2003 to 2017: A...
Using phenomenography in educational technology research from 2003 to 2017: A...Using phenomenography in educational technology research from 2003 to 2017: A...
Using phenomenography in educational technology research from 2003 to 2017: A...
Sally Wan
 
Data Analytics.03. Data processing
Data Analytics.03. Data processingData Analytics.03. Data processing
Data Analytics.03. Data processing
Alex Rayón Jerez
 
Dealing with data 10092020
Dealing with data 10092020Dealing with data 10092020
Dealing with data 10092020
Rita Ndagire Kizito
 
Report on the First Knowledge Graph Reasoning Challenge 2018 -Toward the eXp...
Report on the First Knowledge Graph Reasoning Challenge  2018 -Toward the eXp...Report on the First Knowledge Graph Reasoning Challenge  2018 -Toward the eXp...
Report on the First Knowledge Graph Reasoning Challenge 2018 -Toward the eXp...
KnowledgeGraph
 

Similar to Modeling language to support privacy requirements (20)

Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
Evaluation2016_Session2667_Mapping_Programs_Roundtable_10272016_draft3_AEAtem...
 
Privacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software DevelopmentPrivacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software Development
 
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
Asia-Pacific LSP & Professional Communication, 2017: Developing research meth...
 
Chapter 10Mixed Methods Procedures
Chapter 10Mixed Methods ProceduresChapter 10Mixed Methods Procedures
Chapter 10Mixed Methods Procedures
 
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
 
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
· Assignment List· Week 7 - Philosophical EssayWeek 7 - Philos.docx
 
Denduang 606 Final Pp Ready
Denduang 606 Final Pp ReadyDenduang 606 Final Pp Ready
Denduang 606 Final Pp Ready
 
Research-Designs.pdf for research for ed
Research-Designs.pdf for research for edResearch-Designs.pdf for research for ed
Research-Designs.pdf for research for ed
 
Chapter 22 Evaluating a Research ReportEducational Research.docx
Chapter 22 Evaluating a Research ReportEducational Research.docxChapter 22 Evaluating a Research ReportEducational Research.docx
Chapter 22 Evaluating a Research ReportEducational Research.docx
 
HUS 201 Chapter Eleven
HUS 201 Chapter ElevenHUS 201 Chapter Eleven
HUS 201 Chapter Eleven
 
Indicators of study quality in systematic reviews of qualitative research to ...
Indicators of study quality in systematic reviews of qualitative research to ...Indicators of study quality in systematic reviews of qualitative research to ...
Indicators of study quality in systematic reviews of qualitative research to ...
 
Week 11Collection of Data – questionnaire and Instruments & .docx
Week 11Collection of Data – questionnaire and Instruments & .docxWeek 11Collection of Data – questionnaire and Instruments & .docx
Week 11Collection of Data – questionnaire and Instruments & .docx
 
How to write a basic research proposal
How to write a basic research proposalHow to write a basic research proposal
How to write a basic research proposal
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
Adapting E-Learning Situations for International Reuse
Adapting E-Learning Situations for International ReuseAdapting E-Learning Situations for International Reuse
Adapting E-Learning Situations for International Reuse
 
Introduction on Research Methodology_3_1.pdf
Introduction on Research Methodology_3_1.pdfIntroduction on Research Methodology_3_1.pdf
Introduction on Research Methodology_3_1.pdf
 
Using phenomenography in educational technology research from 2003 to 2017: A...
Using phenomenography in educational technology research from 2003 to 2017: A...Using phenomenography in educational technology research from 2003 to 2017: A...
Using phenomenography in educational technology research from 2003 to 2017: A...
 
Data Analytics.03. Data processing
Data Analytics.03. Data processingData Analytics.03. Data processing
Data Analytics.03. Data processing
 
Dealing with data 10092020
Dealing with data 10092020Dealing with data 10092020
Dealing with data 10092020
 
Report on the First Knowledge Graph Reasoning Challenge 2018 -Toward the eXp...
Report on the First Knowledge Graph Reasoning Challenge  2018 -Toward the eXp...Report on the First Knowledge Graph Reasoning Challenge  2018 -Toward the eXp...
Report on the First Knowledge Graph Reasoning Challenge 2018 -Toward the eXp...
 

Recently uploaded

What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 

Recently uploaded (20)

What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 

Modeling language to support privacy requirements

  • 1. www.cin.ufpe.br/~ler Laboratório de Engenharia de Requisitos Universidade Federal de Pernambuco Modeling Languages to Support Privacy Requirements: Results from a Systematic Literature Review Mariana Peixoto and Carla Silva {mmp2, ctlls}@cin.ufpe.br 08/2018
  • 2. Outline n  Problem Characterization n  Research methodology n  Results n  Future Work 2
  • 3. Problem Characterization n  Is necessary address the privacy issues since the early stages of development, ie the Requirements Engineering phase [Kalloniatis et al., 2008; Omoronyia et al., 2012; Tun et al., 2012]. n  There is a need for systematic approaches for reasoning, modeling and analyzing privacy from the early stages of the software development [Webster et al., 2005]. n  Privacy is a multifaceted concept, comes in many forms, relating to what one wishes to keep private [Kalloniatis et al., 2008; Gharib et al., 2017]. This has resulted in much confusion among designers and stakeholders, and has led in turn to wrong design decisions [Gharib et al., 2017]. 3
  • 4. Problem Characterization n  Motivated by this scenario, we perform a Systematic Literature Review to investigate requirements modeling languages for privacy and provides an extensive analysis of them. ¨  This SLR focuses on approaches that consider privacy, by explicitly representing and analyzing privacy concepts in a requirements model. 4
  • 5. Research Methodology 5 Fig 1. SLR Process adapted from Kitchenham and Charters (2007).
  • 6. Research Methodology n  What are the modeling languages used to modeling and analysis of privacy requirements? ¨  SRQ1 - What modeling languages capture privacy concepts? Is it an extension of existing language? The language has tool support? ¨  SRQ2 - What are the benefits and limitations reported in the use of the modeling languages? ¨  SRQ3 - What are the privacy concepts captured by modeling languages? ¨  SRQ4 - What are the modeling elements used to capture privacy concepts and their relationships? ¨  SRQ5 – Do these languages support requirements analysis? What are the methods of analysis used? ¨  SRQ6 - Are the modeling languages concerned with cognitive understanding aspects? 6
  • 7. Research Methodology Search Strategy: automatic search and snowball method n  Search String: (“privacy”) AND (“requirements engineering”) AND (“modeling” OR “modelling” OR “model” OR “language” OR “notation) n  Search Engines: ¨  IEEExplore ¨  ACM Digital Library ¨  Science Direct ¨  Scopus ¨  Compendex ¨  Springer 7
  • 8. SLR Preliminary Results 8 Inclusion Criteria Exclusion Criteria I1 Primary Studies E1 Studies that are not focused on Requirements Engineering I2 Peer-reviewed studies E2 Duplicate studies (only one copy of each study was included) I3 Studies that present privacy representation in some visual language E3 Redundant paper of same author I4 Original studies in languages: English, Portuguese or Spanish E4 Studies not available I5 Studies published in any year E5 Incomplete studies (short papers (≤ 3 pages) E6 Presentations, reports, dissertations, theses, secondary studies, tertiary and meta-analysis, gray literature. E7 Studies that do not capture privacy concepts E8 Studies irrelevant to the research questions Table 1. Selection Criteria.
  • 9. Research Methodology Selection Procedure n  Step 1: reading titles, abstracts and keywords; considering the inclusion and exclusion criteria. n  Step 2: reading introduction and conclusion; considering the inclusion and exclusion criteria. n  Step 3: the studies included are fully read; excluding irrelevant papers for the research questions. 9
  • 10. Research Methodology 10 Data Description Identifier (ID) Unique identifier for each paper Year, Affiliations, List of Authors, Title, Abstract and Keywords Source IEEE, ACM, Scopus, Science Direct, Ei COMPENDEX and Springer Application context Industrial, academic, both Study Type Journal, conference, symposium, workshop, book chapter Research Type (based on Wieringa et al., 2006) Evaluation research, validation research, solution proposal, philosophical papers, experience papers, opinion papers Evaluation Method (based on Easterbrook et al., 2008 ) Controlled experiment, case study, survey, ethnography, action research, illustrative scenario, not applicable Application Domain Any domain. For example, Health Care Research Questions Answer to each research question Table 2. Data Extraction.
  • 11. Research Methodology Quality Assessment n  To verify the quality, the studies were classified according to Wieringa (2005): ¨  Validation Research ¨  Evaluation Research ¨  Experience Papers ¨  Opinion Papers ¨  Philosophical Papers ¨  Solution Proposal 11
  • 12. 12 Quality Assessment Question Eva Val Sol Phi Exp Opi QA1- Are the proposed concepts/relations clearly defined? (Gharib et al., 2017). x x x x x x QA2- Does the work propose sufficient concepts/relations to deal with privacy aspects? (Gharib et al., 2017). x x x x x x QA3- Is the problem clearly stated? (Wieringa, 2006). x x x QA4- Is the research method clearly stated? (Wieringa, 2006). x x QA5- Is there an adequate description of the context? (Dyba and Dingsoyr, 2008). x x QA6- Was the data collected in a way that addressed the research issue? (Dyba and Dingsoyr, 2008). x x QA7- Was the data analysis sufficiently rigorous? (Dyba and Dingsoyr, 2008). x x QA8- Is there a clear statement of findings? (Dyba and Dingsoyr, 2008). x x QA9- Was there a control group with which to compare treatments? (Dyba and Dingsoyr, 2008). x QA10- Is the technique novel, or is the application of the techniques to this kind of problem novel? (Wieringa, 2006). x QA11- Is the technique argued? (Wieringa, 2006). x QA12- Is the broader relevance of this novel technique argued? (Wieringa, 2006). x QA13- Is there sufficient discussion of related work? (Wieringa, 2006). x QA14- Is the conceptual framework original? (Wieringa, 2006). x QA15- Is it argued? (Wieringa, 2006). x QA16- Is the experience original? (Wieringa, 2006). x QA17- Is the report about it sound? (Wieringa, 2006). x QA18- Is the report relevant for practitioners? (Wieringa, 2006). x QA19- Is the stated position argued? (Wieringa, 2006). x QA20- Is the opinion Innovating? (Wieringa, 2006). x Table 3. Quality Assessment
  • 13. Research Methodology Quality Assessment n  To verify the quality, the studies were classified according to Wieringa (2005): ¨  Validation Research (less than 4.5 of 9.0) ¨  Evaluation Research (less than 3.5 of 8.0) ¨  Experience Papers (less than 2.5 of 5.0) ¨  Opinion Papers (less than 2.5 of 5.0) ¨  Philosophical Papers (less than 2.5 of 4.0) ¨  Solution Proposal (less than 2.5 of 7.0) 13
  • 14. Research Methodology Threats to validity n  This review was conducted by only one researcher and one advisor. To reduce the bias in this case, a structured data extraction approach was used, as indicated by Cruzes and Dyba (2011). n  The search string used for the automatic search may not include all the existing synonyms for the terms present in the expression "Modeling languages that support privacy requirements" and thus be insufficient to capture all area studies. To reduce this bias the snowball search was performed. 14
  • 15. SLR Results 15 Fig 2. SLR Results.
  • 16. SLR Results 16 ID Title Authors ACM7 Distilling Privacy Requirements for Mobile Applications Thomas, K; Bandara, A. K.; Price, B.A.; Nuseibeh, B. (2014) ACM8 Elaborating Security Requirements by Construction of Intentional Anti-Models Lamsweerde, A.V. (2004) ACM17 Legal Goal-oriented Requirement Language (Legal GRL) for Modeling Regulations Ghanavati, S.; Amyot, D.; Rifaut, A. (2014) COMPEDEX9 Designing privacy-aware personal health record systems Samavi, R.; Topaloglou, T. (2008) IEEE18 Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology Ghanavati, S.; Amyot D.;, Peyton, L. (2009) IEEE30 Goal-oriented compliance with multiple regulations Ghanavati, S.; Rifaut;, A.; Dubois, E.; Amyot, D. (2014) IEEE48 Requirements engineering patterns for the modeling of Online Social Networks features Bouraga, S.; Jureta, I.; Faulkner, S. (2014) ... .... ... Table 4. Selected Papers
  • 17. SLR Results n  Overview Results 17 Fig 3. Publication year. 1 6 4 3 3 2 5 4 2 4 3 3 9 3 4 2 0 1 2 3 4 5 6 7 8 9 10 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
  • 18. SLR Results n  Overview Results 18 Fig 4. Authors nationalities. 1   6   1   17   1   1   1   1   9   2   1   2   17   1   3   2   2   1   3   13   1   0   2   4   6   8   10   12   14   16   18   Australia Belgium Brazil Canada Chile China Cyprus France Germany Greece India Ireland Italy Japan Luxembourg Netherlands Norway Saudi Arabia Spain UK USA
  • 19. SLR Results n  Overview Results 19 Table 5. Paper type x context. Application Context Study Type Academic Academic/Industrial Total Conference 24 0 24 Journal 17 4 21 Symposium 2 0 2 Workshop 11 0 11 Total 54 (93.1%) 4 (6.8%) 58 (100%)
  • 20. SLR Results n  Overview Results 20 Table 6. Research type. Research Type Frequency Percentage Solution Proposal 48 82.8 Evaluation Research 7 12.1 Validation Research 3 5.2 Total 58 100.0
  • 21. SLR Results n  Overview Results 21 Table 7. Evaluation method Evaluation Method Frequency Percentage Case study 13 22.4 Case study and Survey 1 1.7 Controlled Experiment 3 5.2 Illustrative Scenario 35 60.3 Not Applicable 5 8.6 Survey 1 1.7 Total 58 100.0
  • 22. SLR Results 22 Table 8 Application Domain Application Domain Frequency Percentage Business Process Management 1 1.7 Cloud Computing Systems 2 3.4 Context-sensitive systems 1 1.7 General 32 55.2 Health Care 5 8.6 Internet Services 1 1.7 Legal Regulations 6 10.3 Mobile Applications 2 3.4 Online Social Networks 1 1.7 Public Key Infrastructures 1 1.7 Security Policies 1 1.7 Smart Grids 1 1.7 Socio-Technical Systems 3 5.2 Web of Things 1 1.7 Total 58 100.0
  • 23. 23 Table 9. Languages used for privacy. Language Frequency Percentage UML4PF 1 1.4 BPMN 1 1.4 CORAS Risk Modeling 1 1.4 Data Flow Diagrams 1 1.4 Goal/Agent Modeling 8 11.4 GRL 3 4.3 i-Star 9 12.9 KAOS 1 1.4 Legal GRL 2 2.9 Misuse Cases 4 5.7 NFR Framework 3 4.3 Problem Frames 5 7.1 SecBPMN-ml 1 1.4 Secure Tropos 6 8.6 Security-Aware Tropos 1 1.4 SI* modelling 3 4.3 STS-ml 2 2.9 Threat Model 2 2.9 Threat Tree 1 1.4 Tropos 6 8.6 UML 3 4.3 UMLsec 3 4.3 Use Case Maps 2 2.9 User Requirements Notation 1 1.4 Total 70 100.0
  • 24. SLR Results What modeling languages capture privacy concepts? 24 Fig 5. Taxonomy of privacy modeling languages.
  • 25. SLR Results Is it an extension of existing language? n  44 (75.9%) studies used an existing language; n  14 (24.1%) studies proposed an extension of an existing language; n  It was not possible to observe the proposal of no new language. 25
  • 26. SLR Results The language has tool support? 26 Table 10. Paper Whose has Tool Support. ID Tool Name ACM7 Customized OpenArgue ACM17/ IEEE18/ IEEE30/ SCOPUS6/ SPRINGER119/ SPRINGER277 Extended tool support (jUCMNav) SPRINGER183/ SPRINGER420/ SPRINGER23 UMLsec tool SPRINGER23 Used Secure Tropos tool SPRINGER160 Toolset for modeling in SecBPMN-ml IEEE58/SPRINGER302 Extended/Used UML profile SCOPUS20 Used CREE-tool SCIENCE27 Tool developed using the Open Models Initiative Platform
  • 27. SLR Results What are the privacy concepts captured by modeling languages? Privacy Concepts Catalog Private/ Public/ Semi Public/ Owner/ Third Party/ Personal Information/ Privacy Mechanism- goals/ Safeguards/ Awareness – Necessity to know/ Openness/ Consent/ Accuracy/ Agreement/ Obligation/ Socialization/ Intentionality/ Non Repudiation/ Availability/ Permission/ Collect/ Disclosure/ Use/ Access Control/ Autonomy/ Vulnerability/ Confidentiality/ Intervenability/ Dectectability/ Integrity/ Unobservability/ Unlikability/ Anonymity/ Pseudonymity/ Authorization/ Authentication/ Opportunity/ Strength/ Weakness/ Conflict/ Trust/ Constraint/ Assurance/ Measure/ Privacy Threats/ Harms/ Exposure/ Surveillance/ Aggregation/ Misinformation/ Power Imbalance/ Contextl/ Intrusion/ Identification/ Accountability/ Compliance/ Auditability/ Processor/ Privacy policy/ Privacy Preferences 27
  • 28. SLR Results What are the privacy concepts captured by modeling languages? n  UML is used to support Personal Information, Awareness, Consent, Obligation, Non Repudiation, Disclosure, Access Control, Confidentiality, Integrity, Anonymity, Authorization and Harms. n  NFR Framework is used to support, Privacy Mechanism, Awareness, Socialization, Intentionality, Permission, Autonomy, Vulnerability, Confidentiality, Anonymity, Conflict, Trust, Privacy Threats in COMPEDEX9, SCIENCE178 and SNOW115. 28
  • 29. SLR Preliminary Results What are the modeling elements used to capture privacy concepts and their relationships? 29 Concept <Element; Relationships (ID)> Private <Resource; Dependency (IEEE48)> Public <Resource; Dependency (IEEE48)> Semi-Public <Resource; Dependency (IEEE48)> Owner <Owner; Dependency (SNOW122) Third Party <Goal; Decomposition link (ACM17)> Personal Information <Resource; Dependency (COMPEDEX9/IEEE48/SNOW123), part of (SCOPUS31), Trust relation, Owner relation, Permission relation (SCOPUS30)>, <Goal; Contribution Link (IEEE18/SNOW7), Goal decomposition (SNOW46), Dependency (SCIENCE323/SCIENCE332)>, <Softgoal; Decomposition Link (IEEE30), Strategic Dependencies (IEEE53), Association (SCIENCE40)>, < Stereotype; Extension (IEEE58)>, <Document; Contribution link SNOW122)> Table 11. Modeling elements and relationships.
  • 30. SLR Preliminary Results What are the modeling elements used to capture privacy concepts and their relationships? 30Fig 6. SLR Modeling Elements Results.
  • 31. SLR Preliminary Results Do these languages support requirements analysis? What are the methods of analysis used? n  48 (82.8%) do support analysis and 10 (17.2%) don’t. 31 Fig 7. Requirements Analysis Methods.
  • 32. SLR Results Do these languages support requirements analysis? What are the methods of analysis used? 32 ID Requirements Analysis Techniques Supported Concept SNOW115 Privacy and Transparency Together Analysis: Aims to analyze how privacy would impact Transparency and vice versa. Third Party, Personal Information, Privacy Mechanism, Awareness, Socialization, Collect, Use, Anonymity and Trust IEEE53/ SNOW123 Attacker Analysis: Aims to identify potential system abusers and their malicious intents Personal Information, Privacy Mechanism, Awareness, Consent, Collect, Disclosure, Access Control, Confidentiality, Authorization, Authentication, Trust, Constraint, Assurance and Privacy Threats SNOW122 Consistency Analysis: Aims to verify whether the diagram built by the designer is consistent and valid. Owner, Personal Information, Availability, Confidentiality, Integrity, Authorization and Privacy Threats IEEE53 Countermeasure Analysis: System designers make decisions on how to protect security and privacy from potential attackers and vulnerabilities Personal Information, Awareness, Disclosure, Access Control, Confidentiality, Authorization, Trust and Privacy Threats Table 12. Requirements Analysis Techniques X Supported Concept .
  • 33. SLR Results Are the modeling languages concerned with cognitive understanding aspects? n  only one study! ¨  They conducted a study in two countries with 152 participants in which they assessed the effectiveness of graphical representations with respect to extraction correct information about risks. 33
  • 34. SLR Results - Quality Assessment n  Evaluation research: 7 papers just one received maximum score, quality 80 ; n  Validation research: 3 papers (two studies received 80) from a maximum of 90; n  Solution proposal: 48 papers just three received maximum score, quality 70. 34
  • 35. Future Work n  Concepts Validation n  Conceptual Model n  Framework of Privacy Capabilities 35
  • 36. Main References n  Gharib, M., Giorgini, P., Mylopoulos, J. (2017) Towards an Ontology for Privacy Requirements via a Systematic Literature Review. In: Mayr H., Guizzardi G., Ma H., Pastor O. (eds) Conceptual Modeling. LNCS, vol 10650. Springer, pages 193– 208. n  Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., & Balissa, A. (2018) Privacy by designers: software developers’ privacy mindset. Empirical Software Engineering, pages 259-289. n  Kitchenham, B., Charters, S. Guidelines for performing Systematic Literature Reviews in Software Engineering. Technical Report, EBSE-2007-01, Software Engineering Group, School of Computer Science and Mathematics. Keele University, Keele, UK. n  Privacy in RE: https://sites.google.com/cin.ufpe.br/ privacyconcepts/home 36
  • 37. www.cin.ufpe.br/~ler Laboratório de Engenharia de Requisitos Universidade Federal de Pernambuco Modeling Languages to Support Privacy Requirements: Results from a Systematic Literature Review Mariana Peixoto and Carla Silva {mmp2, ctlls}@cin.ufpe.br 08/2018