REFERENCES
Acquisti, A., Gritzalis, S., Lambrinoudakis, C., and
di Vimercati, S., editors (2008). Digital Privacy: The-
ory, Technologies, and Practices. New York: Auer-
bach Publications, 1st edition.
Alexander Rossnagel (2016). Datenschutz. Eine Zukunft
ohne Selbstbestimmung? Spektrum der Wissenschaft
Kompakt: Der digitale Mensch, pages 41–49.
Beckers, K., Schmidt, H., K
¨
uster, J., and Faßbender, S.
(2011). Pattern-based support for context establish-
ment and asset identification of the ISO 27000 in the
field of cloud computing. In 6th Intl. Conf. on Avail-
ability, Reliability and Security, pages 327–333.
Bhatia, J., Evans, M. C., and Breaux, T. D. (2019). Iden-
tifying incompleteness in privacy policy goals us-
ing semantic frames. Requirements Engineering,
24(3):291–313.
Brambilla, M., Campi, A., Ceri, S., and Quarteroni, S.
(2010). Semantic resource framework. In Search
Computing - Trends and Developments [outcome of
the 2nd SeCO Workshop on Search Computing], pages
73–84. Springer.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P.,
and Stal, M. (1996). Software Patterns. John Wiley &
Sons.
Cohn, M. (2004). User Stories Applied: For Agile Software
Development . Addison-Wesley, 1st edition.
da Silva, A. R., Caramujo, J., Monfared, S., Calado, P., and
Breaux, T. (2016). Improving the specification and
analysis of privacy policies. In Proceedings of the
18th International Conference on Enterprise Informa-
tion Systems - Volume 1: ICEIS,, pages 336–347. IN-
STICC, SciTePress.
Del-R
´
ıo-Ortega, A., Resinas Arias de Reyna, M.,
Dur
´
an Toro, A., and Ruiz-Cort
´
es, A. (2012). Defin-
ing Process Performance Indicators by Using Tem-
plates and Patterns. In Business Process Management,
volume 7481 of Lecture Notes in Computer Science,
pages 223–228. Springer.
European Commission (2016). Regulation 2016/679 of the
European General Data Protection Regulation. https:
//gdpr-info.eu. Accessed: 2018-03-02.
Ghazinour, K. and Albalawi, T. (2016). A usabil-
ity study on the privacy policy visualization model.
In IEEE 14th International Conference on Depend-
able, Autonomic and Secure Computing, 14th Intl.
Conf. on Pervasive Intelligence and Computing, 2nd
Intl. Conf. on Big Data Intelligence and Comput-
ing and Cyber Science and Technology Congress,
DASC/PiCom/DataCom/CyberSciTech, pages 578–
585.
Ghazinour, K., Majedi, M., and Barker, K. (2009). A model
for privacy policy visualization. In Proceedings of the
33rd Annual IEEE International Computer Software
and Applications Conference, COMPSAC, pages 335–
340.
Gol Mohammadi, N., Leicht, J., Ulfat-Bunyadi, N., and
Heisel, M. (2019). Privacy policy specification frame-
work for addressing end-users’ privacy requirements.
In Proc. of the 16th Intl. Conf. on Trust, Privacy
and Security in Digital Business - TrustBus 2019.
Springer.
Gol Mohammadi, N., Pampus, J., and Heisel, M. (2019).
Pattern-based incorporation of privacy preferences
into privacy policies:: Negotiating the conflicting
needs of service providers and end-users. In 24th
European Conference on Pattern Languages of Pro-
grams, EuroPLoP. ACM.
Hansen, M., Jensen, M., and Rost, M. (2015). Protection
goals for privacy engineering. In IEEE Symposium
on Security and Privacy Workshops, SPW, pages 159–
166.
IBM Corp. (2000). IBM P3P Policy Editor.
Jeanette Hofmann and Benjamin Bergemann (2016). Die
informierte Einwilligung: Ein Datenschutzphantom.
Spektrum der Wissenschaft Kompakt, “Der Digitale
Mensch”, pages 50–59.
Kelley, P. G., Bresee, J., Cranor, L. F., and Reeder, R. W.
(2009). A “nutrition label” for privacy. In Proceedings
of the 5th Symposium on Usable Privacy and Security,
SOUPS. ACM.
Kelley, P. G., Cesca, L., Bresee, J., and Cranor, L. F. (2010).
Standardizing privacy notices: an online study of the
nutrition label approach. In Proceedings of the 28th
International Conference on Human Factors in Com-
puting Systems, CHI, pages 1573–1582. ACM.
Pohl, K. (2010). Requirements Engineering: Fundamen-
tals, Principles, and Techniques. Springer Publishing
Company, Incorporated, 1st edition.
Pollmann, M. and Kipker, D. (2016). Informierte einwilli-
gung in der online-welt. Datenschutz und Daten-
sicherheit, 40(6):378–381.
Probst, T. and Hansen, M. (2013). Privacy protection goals
in privacy and data protection evaluations. Technical
report, Working paper, Unabh
¨
angiges Landeszentrum
f
¨
ur Datenschutz Schleswig-Holstein.
Reidenberg, J. R., Bhatia, J., Breaux, T. D., and Norton,
T. B. (2016). Ambiguity in privacy policies and the
impact of regulation. The Journal of Legal Studies,
45(S2):S163–S190.
Reidenberg, J. R., Breaux, T., Cranor, L. F., French, B.,
Grannis, A., Graves, J. T., Liu, F., McDonald, A., Nor-
ton, T. B., and Ramanath, R. (2015). Disagreeable
privacy policies: Mismatches between meaning and
users’ understanding. Berkeley Tech. LJ, 30:39.
Withall, S. (2007). Software Requirement Patterns. Mi-
crosoft Press, Redmond, WA, USA, 1st edition.
ENASE 2020 - 15th International Conference on Evaluation of Novel Approaches to Software Engineering
358