REFERENCES
Akinsola, J. E., Ogunbanwo, A. S., Okesola, O. J., Odun-
Ayo, I. J., Ayegbusi, F. D., and Adebiyi, A. A. (2020).
Comparative analysis of software development life cy-
cle models (sdlc). In Intelligent Algorithms in Soft-
ware Engineering: Proceedings of the 9th Computer
Science On-line Conference 2020, Volume 1 9, pages
310–322. Springer.
Anthonysamy, P., Rashid, A., and Chitchyan, R. (2017).
Privacy requirements: Present & future. In 2017
IEEE/ACM 39th International Conference on Soft-
ware Engineering: Software Engineering in Society
Track (ICSE-SEIS), pages 13–22.
Borking, J. and Raab, C. (2001). Laws, pets and other tech-
nologies for privacy protection. Journal of Informa-
tion, Law and Technology, 2001.
Boteju, M., Ranbaduge, T., Vatsalan, D., and Arachchilage,
N. A. G. (2023). SoK: Demystifying privacy enhanc-
ing technologies through the lens of software develop-
ers. arXiv preprint arXiv:2401.00879.
Braun, V. and Clarke, V. (2006). Using thematic analysis
in psychology. Qualitative research in psychology,
3(2):77–101.
Cavoukian, A. (2009). Privacy by design: The 7 founda-
tional principles. Information and privacy commis-
sioner of Ontario, Canada, 5:12.
Cysneiros, L. M. and do Prado Leite, J. C. S. (2020). Non-
functional requirements orienting the development of
socially responsible software. In Enterprise, Business-
Process and Information Systems Modeling: 21st In-
ternational Conference, BPMDS 2020, 25th Interna-
tional Conference, EMMSAD 2020, Held at CAiSE
2020, Grenoble, France, June 8–9, 2020, Proceedings
21, pages 335–342. Springer.
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., and
Joosen, W. (2011). A privacy threat analysis frame-
work: supporting the elicitation and fulfillment of
privacy requirements. Requirements Engineering,
16(1):3–32.
Diamantopoulou, V., Androutsopoulou, A., Gritzalis, S.,
and Charalabidis, Y. (2018). An assessment of privacy
preservation in crowdsourcing approaches: Towards
gdpr compliance. In 2018 12th International Confer-
ence on Research Challenges in Information Science
(RCIS), pages 1–9.
Diamantopoulou, V., Kalloniatis, C., Gritzalis, S., and
Mouratidis, H. (2017). Supporting privacy by de-
sign using privacy process patterns. In De Capitani di
Vimercati, S. and Martinelli, F., editors, ICT Sys-
tems Security and Privacy Protection, pages 491–505,
Cham. Springer International Publishing.
Glaser, B. G. (1965). The constant comparative method of
qualitative analysis. Social problems, 12(4):436–445.
G
¨
urses, S. and Del Alamo, J. M. (2016). Privacy engineer-
ing: Shaping an emerging field of research and prac-
tice. IEEE Security & Privacy, 14(2):40–46.
Hoffmann, M., Heikkinen, S., Hornung, G., Thuvesson,
H., and Schnabel, C. (2008). Privacy-enhanced per-
sonalisation in ambient environments. In 2008 IEEE
19th International Symposium on Personal, Indoor
and Mobile Radio Communications, pages 1–6.
ICO (2023). Privacy enhancing technologies (PETs). Infor-
mation Commissioner’s Office, United Kingdom.
Kalloniatis, C., Kavakli, E., and Gritzalis, S. (2008). Ad-
dressing privacy requirements in system design: The
pris method. Requir. Eng., 13:241–255.
Kitchenham, B. A., Budgen, D., and Brereton, P. (2015).
Evidence-Based Software Engineering and Systematic
Reviews. Chapman & Hall/CRC.
Klymenko, O., Kosenkov, O., Meisenbacher, S., Elahi-
doost, P., Mendez, D., and Matthes, F. (2022). Under-
standing the implementation of technical measures in
the process of data privacy compliance: A qualitative
study. In Proceedings of the 16th ACM/IEEE Interna-
tional Symposium on Empirical Software Engineering
and Measurement, pages 261–271.
Klymenko, O., Meisenbacher, S., and Matthes, F. (2023).
Identifying practical challenges in the implementation
of technical measures for data privacy compliance.
AMCIS 2023 Proceedings. 2.
Kostova, B., G
¨
urses, S., and Troncoso, C. (2020). Pri-
vacy engineering meets software engineering. On the
challenges of engineering privacy by design. arXiv
preprint arXiv:2007.08613.
Laplante, P. A. and Kassab, M. (2022). Requirements engi-
neering for software and systems. Auerbach Publica-
tions.
Li, C. and Palanisamy, B. (2019). Privacy in internet of
things: From principles to technologies. IEEE Inter-
net of Things Journal, 6(1):488–505.
Martin, Y.-S. and Kung, A. (2018). Methods and tools for
gdpr compliance through privacy and data protection
engineering. In 2018 IEEE European symposium on
security and privacy workshops (EuroS&PW), pages
108–111. IEEE.
Mart
´
ın Garc
´
ıa, Y. S. and
´
Alamo Ramiro, J. M. d. (2017).
A metamodel for privacy engineering methods. In
CEUR Workshop Proceedings.
Meis, R. and Heisel, M. (2017). Pattern-based represen-
tation of privacy enhancing technologies as early as-
pects. In Lopez, J., Fischer-H
¨
ubner, S., and Lambri-
noudakis, C., editors, Trust, Privacy and Security in
Digital Business, pages 49–65, Cham. Springer Inter-
national Publishing.
Stallings, W. (2019). Information privacy engineering and
privacy by design: Understanding privacy threats,
technology, and regulations based on standards and
best practices. Addison-Wesley Professional.
Vrakas, N., Kalloniatis, C., Tsohou, A., and Lambri-
noudakis, C. (2010). Privacy requirements engineer-
ing for trustworthy e-government services. In Ac-
quisti, A., Smith, S. W., and Sadeghi, A.-R., editors,
Trust and Trustworthy Computing, pages 298–307,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Zave, P. (1997). Classification of research efforts in require-
ments engineering. ACM Computing Surveys (CSUR),
29(4):315–321.
ICEIS 2024 - 26th International Conference on Enterprise Information Systems
52