of functional requirements. Hence, changes in the
functional requirements generally imply a re-run of
our method and all collected information has to be
elicited again. To overcome this limitation, we could
enhance our method as follows. If a requirement is
removed from the mode, then all information flows
that originate from this requirement could be auto-
matically removed from the model by the tool. This
is possible due to the attribute origin (cf. Figure 3).
And if a requirement is added then we would have to
check whether this requirement introduces new rele-
vant domain knowledge, and whether the requirement
together with the new domain knowledge introduce
new information flows to the already elicited infor-
mation flows. In this way, the already collected in-
formation from the unchanged requirements could be
kept. Another limitation is that our proposed tool is
only a prototype implementation that needs to be fur-
ther analyzed for usability and user acceptance.
As future work, we want to support the generation
of PIA reports based on the elicited information. For
this, we will extend our tool support with the possibil-
ity to define templates that can be filled with the infor-
mation contained in the UML model and then be used
as part of a PIA report. We also want to extend our
proposed method with a privacy risk assessment and
to integrate a privacy threshold assessment that indi-
cates which level of detail the PIA shall have. Further-
more, we plan to empirically validate our method, the
tool support, and the outputs produced by our method.
REFERENCES
Beckers, K., Faßbender, S., Heisel, M., and Meis, R. (2014).
A problem-based approach for computer aided pri-
vacy threat identification. In Privacy Technologies
and Policy, LNCS 8319, pages 1–16. Springer.
Cavoukian, A. (2011). Privacy by de-
sign – the 7 foundational principles.
https://www.ipc.on.ca/images/resources/
7foundationalprinciples.pdf.
C
ˆ
ot
´
e, I., Hatebur, D., Heisel, M., and Schmidt, H. (2011).
UML4PF – a tool for problem-oriented requirements
analysis. In Proc. of RE, pages 349–350. IEEE Com-
puter Society.
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., and
Joosen, W. (2011). A privacy threat analysis frame-
work: supporting the elicitation and fulfillment of pri-
vacy requirements. RE.
European Commission (2012). Proposal for a regula-
tion of the european parliament and of the coun-
cil on the protection of individuals with regard
to the processing of personal data and on the
free movement of such data (general data pro-
tection regulation). http://eur-lex.europa.eu/legal-
content/EN/TXT/?uri=CELEX: 52012PC0011.
Howard, M. and Lipner, S. (2006). The Security Devel-
opment Lifecycle. Microsoft Press, Redmond, WA,
USA.
ISO/IEC (2011). ISO 29100 Information technology – Se-
curity techniques – Privacy Framework.
Jackson, M. (2001). Problem Frames. Analyzing and
structuring software development problems. Addison-
Wesley.
Kalloniatis, C., Kavakli, E., and Gritzalis, S. (2008). Ad-
dressing privacy requirements in system design: the
PriS method. RE, 13:241–255.
Liu, L., Yu, E., and Mylopoulos, J. (2003). Security and
privacy requirements analysis within a social setting.
In Requirements Engineering Conf., 2003. Proc.. 11th
IEEE Int., pages 151–161.
Meis, R. (2014). Problem-based consideration of privacy-
relevant domain knowledge. In Privacy and Identity
Management for Emerging Services and Technologies
8th IFIP Int. Summer School Revised Selected Papers,
IFIP AICT 421. Springer.
Oetzel, M. and Spiekermann, S. (2014). A systematic
methodology for privacy impact assessments: A de-
sign science approach. European Journal of Informa-
tion Systems, 23(2):126–150.
Omoronyia, I., Cavallaro, L., Salehie, M., Pasquale, L., and
Nuseibeh, B. (2013). Engineering adaptive privacy:
On the role of privacy awareness requirements. In
Proc. of the 2013 Int. Conf. on SE, ICSE ’13, pages
632–641, Piscataway, NJ, USA. IEEE Press.
Tancock, D., Pearson, S., and Charlesworth, A. (2010). A
privacy impact assessment tool for cloud computing.
In IEEE 2nd Int. Conf. on Cloud Computing Technol-
ogy and Science (CloudCom), pages 667–676.
Wright, D., Wadhwa, K., Hert, P. D., and Kloza, D. (2011).
A privacy impact assessment framework for data pro-
tection and privacy rights – Deliverable D1. Technical
report, PIAF consortium.
Yu, E. (1997). Towards modeling and reasoning support
for early-phase requirements engineering. In Proc. of
the 3rd IEEE Int. Symposium on RE, pages 226–235,
Washington, DC, USA. IEEE Computer Society.
ICSOFT-PT2015-10thInternationalConferenceonSoftwareParadigmTrends
52