The idea behind the proposed framework is to
integrate reuse decisions made on the basis of
VarMeR’s behavioral analysis of software artifacts
with privacy considerations. More concretely, we
demonstrated how taking privacy considerations
explicitly into account can affect product-line ability
decisions. This raises several interesting challenges
for future research. First of all, we proposed the
notion of privacy level meta-data – what it should
include, and how it should be represented is a
challenging question, in light of the fact that more and
more privacy design patterns for software developers
are emerging. We intentionally left the notion of
privacy levels in this paper very abstract to open the
door for discussions on the nature of this metadata.
Secondly, we envision the extension of VarMeR
approach to the setting of software search and
integration decisions, where again privacy
considerations can be an important factor. To this
end, a query language is needed to support querying
a repository of software components and
recommending on the most suitable ones in terms of
behavioral similarity and privacy considerations.
To summarize, our goal here was to bring to
attention the fact that privacy considerations matter
for reuse decisions, and reuse decisions affect privacy
compliance. This circle deserves further discussion,
which will hopefully be started by this position paper.
REFERENCES
Assunção, W. K., Lopez-Herrejon, R. E., Linsbauer, L.,
Vergilio, S. R., & Egyed, A. (2017). Reengineering
legacy applications into software product lines: a
systematic mapping. Empirical Software Engineering,
22(6), 2972-3016.
Berger, C., Rendel, H. and Rumpe, B. (2014). Measuring
the Ability to Form a Product Line from Existing
Products. Proceedings of the Fourth International
Workshop on Variability Modelling of Software-
intensive Systems (VaMoS).
Cavoukian, A. (2011). Privacy by design in law, policy and
practice. A white paper for regulators, decision-makers
and policy-makers.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J-
M., Le Métayer, D., Tirtea, R., Schiffner, S. (2015).
Privacy and Data Protection by Design - from policy to
engineering. CoRR, abs/1501.03726, arXiv.org/
D’Errico, M., & Pearson, S. (2015, March). Towards a
formalised representation for the technical enforcement
of privacy level agreements. In 2015 IEEE
International Conference on Cloud Engineering (IC2E)
(pp. 422-427). IEEE.
Diamantopoulou, V., Angelopoulos, K., Pavlidis, M., &
Mouratidis, H. (2017). A Metamodel for GDPR-based
Privacy Level Agreements. In ER Forum/Demos (pp.
285-291).
Feltus, C., Grandry, E., Kupper, T., & Colin, J. N. (2017).
Model-driven Approach for Privacy Management in
Business Ecosystem. In MODELSWARD (pp. 392-
400).
Gürses, S., Troncoso, C. & Diaz, C. (2011). Engineering
privacy by design. In Conference on Computers,
Privacy & Data Protection (CPDP 2011).
Hoepman, J. H. (2014, June). Privacy design strategies. In
IFIP International Information Security Conference
(pp. 446-459). Springer, Berlin, Heidelberg.
Lim, W. C. (1994). Effects of reuse on quality, productivity,
and economics. IEEE software, (5), 23-30.
Mihalcea, R., Corley, C., and Strapparava, C. (2006).
Corpus-based and knowledge-based measures of text
semantic similarity. American Association for Artificial
Intelligence (AAAI’06), pp. 775-780.
Rattan, D., Bhatia, R., and Singh, M. (2013). Software
clone detection: A systematic review. Information and
Software Technology, 55(7), 1165-1199.
Reinhartz-Berger, I., Zamansky, A., & Kemelman, M.
(2015). Analyzing variability of cloned artifacts: formal
framework and its application to requirements. In
International Conference on Enterprise, Business-
Process and Information Systems Modeling (pp. 311-
325). Springer, Cham.
Reinhartz-Berger, I., & Zamansky, A. (2018). A Behavior-
Based Framework for Assessing Product Line-Ability.
In International Conference on Advanced Information
Systems Engineering (pp. 571-586). Springer, Cham.
Tom, J., Sing, E., & Matulevičius, R. (2018, September).
Conceptual Representation of the GDPR: Model and
Application Directions. In International Conference on
Business Informatics Research (pp. 18-28). Springer,
Cham.
Velasquez, M., & Hester, P. T. (2013). An analysis of multi-
criteria decision making methods. International
Journal of Operations Research, 10(2), 56-66.
Zamansky, A., & Reinhartz-Berger, I. (2017). Visualizing
Code Variabilities for Supporting Reuse Decisions. In
Symposium on Conceptual Modelling Education (pp.
25-34).