<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards a Catalog of Privacy Related Concepts</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Joa~o Araujo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Helton Maia Universidade Federal do Rio Grande do Norte Brazil</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mariana Peixoto, Carla Silva Universidade Federal de Pernambuco Brazil</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universidade Nova de Lisboa Portugal</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <abstract>
        <p>[Context and motivation] Data from software systems often captures a large amount of personal information and can be used for purposes other than initially intended. Therefore, the Requirements Engineering community has been recognizing the need for approaches to consider privacy concerns from the early activities of the software development process. [Question/problem] However, there is much confusion regarding privacy among people involved in Software Engineering because there is not a uni ed view of how to consider privacy in software development. [Principal ideas/results] Motivated by this situation, we conducted a Systematic Literature Review to investigate how modeling languages address privacy related concepts. As a result, we developed a catalog of privacy related concepts considered by modeling languages and a conceptual model to show how these concepts relate to each other. [Contribution] This paper contributes to the state of art by presenting a basis to standardize privacy in the Requirements Engineering eld and help developers in understanding privacy.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Much of the information available in daily life has been digitized to facilitate quick and easy access. E-services,
for example, are relying on stored data for identifying customers, their preferences, and transactions [DWS+11,
KKG08]. These data often reveal large quantities of personal information and the exposure of such information
in an unregulated way may threaten user privacy. Thus, privacy concerns should be considered earlier when
developing software systems [OCS+13]. Users' privacy can be de ned as the right to determine when, how, and
to what purpose information about them is communicated to others [KKG08].</p>
      <p>Gharib et al. [GGM17] state that privacy violations can be avoided if privacy requirements are discovered
adequately during the Requirements Engineering (RE) phase when developing a privacy-sensitive system.</p>
      <p>Privacy is a multifaceted concept, as well as it can often be vague and elusive. It can represent many
conditions, relating to what one wishes to keep private [KKG08, GGM17]. Nevertheless, despite several e orts
made to clarify privacy related concepts by linking them to more re ned ones, there is no consensus on the
de nition of these concepts or which of them should be used to analyze privacy requirements when developing a
privacy-sensitive system [Bec12, GGM17]. This situation has resulted in much confusion among designers and
stakeholders and has led, in turn, to wrong design decisions [GGM17].</p>
      <p>The problem increases because many developers do not have su cient knowledge and understanding about
privacy, nor do they su ciently know how to develop software with privacy [HHA+18]. In addition, RE studies
often consider privacy as a general non-functional requirement, without speci c approaches to deal/address how
it can be met, or as a security requirement [Bec12, GGM17]. Privacy and security are not opposites nor equals
but they are related because a security failure can lead to a privacy violation. However, privacy violations can
also happen without security failure when, for example, a personal data is disclosed to third parties without the
consent of the data owner.</p>
      <p>In this context, a better understanding of privacy related concepts (i.e., concepts to be considered when
developing a system that needs privacy), and their interrelationships, would be a major step towards providing
developers with more knowledge to elicit privacy requirements and, consequently, improving the quality of
systems that need privacy [GGM17]. Motivated by this scenario, in this paper, we take a step to address this
issue by creating a knowledge basis for privacy. For this purpose, we present part of the results of a Systematic
Literature Review (SLR) aimed at investigating the privacy related concepts addressed by requirements modeling
languages. These results comprise the creation of a conceptual model describing privacy related concepts and
how they relate to each other, and a catalog de ning such concepts.</p>
      <p>This paper is organized as follows. Section 2 presents the SLR research protocol. Section 3 details the
conceptual model and the catalog of privacy related concepts. Section 4 presents conclusions and future directions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Systematic Literature Review</title>
      <p>The SLR followed the procedures indicated by Kitchenham and Charters [KC07]. SLR planning includes the
speci cation of the research questions and the development of the review protocol, followed by SLR conducting
and SLR reporting, which, in turn, presents the results obtained.</p>
      <p>The SLR was motivated by the need to discover what privacy related concepts are captured by modeling
languages and whether there is a consensus on these concepts among the languages. Therefore, this research is
of an exploratory type on privacy in RE. This SLR focuses on approaches that explicitly represent and analyze
privacy related concepts by using a visual requirements modeling language. The detailed protocol that guided
this research is presented in: supplementarymaterial.link.</p>
      <p>Specifying the research questions is the most important part of any SLR [KC07]. Considering the stage of
planning, this SLR answered the following Research Questions (RQs) to address the SLR motivation.</p>
      <p>RQ1: What are the languages used for the modeling and analysis of privacy requirements? (This question
aims to identify the modeling languages able to capture privacy related concepts. These languages will serve as
theoretical sources of the concepts that compose the privacy catalog).</p>
      <p>RQ2: What are the privacy related concepts captured by the modeling languages? (This question intends to
identify what concepts are supported by the selected modeling languages to capture privacy concerns and how
they relate to each other. These inputs will support the creation of a catalog and a conceptual model on privacy).</p>
      <p>We considered two types of search: automatic and snowball. For the identi cation of the primary studies
through the automatic search, we developed the following search string, containing relevant synonyms to cover
the RQs: (privacy) AND (\requirements engineering") AND (modeling OR modelling OR model OR language
OR notation).</p>
      <p>The automatic search1 selection process occurred in three steps. Step 1: reading titles, abstracts, and
keywords, considering the inclusion and exclusion criteria. Step 2: reading introduction and conclusion, considering
the inclusion and exclusion criteria. Step 3: the studies included are fully read, excluding irrelevant papers for
the research questions.</p>
      <p>The snowball selection process started at the end of the automatic search selection process. That is, we used
the studies that were not excluded in step 3 (automatic search selection) as a source to look for new studies.</p>
      <p>11- IEEExplore: ieeexplore.ieee.org; 2- ACM Digital library: dl.acm.org; 3- Scopus: www.scopus.com; 4- Science Direct:
www.sciencedirect.com; 5- Ei Compendex: www.engineeringvillage.com; 6- Springer: www.springer.com.</p>
      <p>From this, the titles that contained any term of the automatic search string were captured and participated in
three selection stages: Step 1, Step 2, and Step 3 (similarly to the automatic search selection process).</p>
      <p>As a result, we found 1352 titles, 1229 from automatic search, and 123 titles from snowball search. After
applying the selection process of three stages (previously explained), and the quality assessment, we extracted
data of 58 papers: 46 from automatic search and 12 from snowball search. The quality assessment is presented
in: supplementarymaterial.link.
3</p>
    </sec>
    <sec id="sec-3">
      <title>A Catalog of Privacy Related Concepts</title>
      <p>The rst RQ was concerned with the modeling languages that capture privacy related concepts. In Table 1 we
present, in descending order of frequency in the selected papers, an overview of the modeling languages found in
the SLR and the number of concepts supported by each language. We observed that, 44 (75.9%) studies used an
existing language \as-is" and 14 (24.1%) studies proposed an extension of an existing language. Finally, we did
not nd the proposal of any new language. From the 58 selected studies, 21 (36.2%) have tool support (only one
tool took privacy into consideration). Identifying these modeling languages is important because they served as
sources to create the privacy catalog and we can still observe the ranking of the languages supporting the higher
number of privacy related concepts, such as iStar, Secure Tropos and Problem Frames.</p>
      <sec id="sec-3-1">
        <title>Language (Concepts*)</title>
        <p>iStar (36)</p>
        <p>
          Tropos (
          <xref ref-type="bibr" rid="ref8">19</xref>
          )
Problem Frames (30)
NFR Framework (
          <xref ref-type="bibr" rid="ref1">12</xref>
          )
        </p>
        <p>SI* modelling (8)</p>
        <p>
          GRL(
          <xref ref-type="bibr" rid="ref6">13</xref>
          )
Threat Model (4)
Use Case Maps (7)
SecBPMN-ml (9)
        </p>
        <p>UML4PF (1)
Data Flow Diagrams (5)</p>
        <p>KAOS (4)</p>
        <p>To answer RQ2, we present a privacy conceptual model to provide a better understanding of how the concepts
relate to each other. According to Da Silva [DS15], a conceptual model can help others to have a broad vision
and a better understanding of the domain and its key concepts and terminologies. In Figure 1, the conceptual
model is represented with UML (Uni ed Modeling Language) class diagram and each concept is described in
natural language to compose the catalog.</p>
        <p>Three steps were followed to design the catalog and the conceptual model. In the rst step, we extract on
the papers the concepts related to privacy (for example, Awareness/Necessity to know/ Know). From a set of
correlated concepts, a single category was derived (for example, only Awareness). In the second step, we observed
what are the relationships between categories (for example, Awareness is a Privacy Mechanism). Finally, in the
third step, we create the relation between the categories (for example, relations between Awareness and Privacy
mechanism is a generalization relationship).</p>
        <p>In the conceptual model, an Owner/ controller has associations with Third Party and Processor. The Owner/
controller has zero or more Personal Information. This Personal Information can be specialized in Private, Public
or Semi-Public. Personal Information has zero or more associations with Collect, Use, Retention, Disclosure and
Privacy Mechanisms.</p>
        <p>Privacy Mechanism can be specialized in Safeguards, Awareness, Permission/Consent, Accuracy, Agreement,
Obligation, Socialization, Intentionality, Non Repudiation, Availability, Access Control, Autonomy, Con
dentiality, Intervenability, Detectability, Integrity, Unlinkability, Pseudonymity, Anonymity, Authentication,
Authorization, Assurance, Accountability, and Auditability. Privacy mechanism has an association with Risk, Trust,
Context and Constraint. If a constraint is broken, can result in a privacy violation. Constraint has zero or more
Privacy Preference and zero or more Compliance with one or more Privacy Policy.</p>
        <p>Privacy Mechanism has to deal with Risks that a system must take into account to assure the end user's
privacy. Therefore, one or more Privacy Mechanism is associated with one or more Privacy Risk.</p>
        <p>Privacy Risk is a scenario that involves, Privacy Threat, Vulnerability, and Harm. Privacy Threat can be
seen as violation that are likely to happen. Privacy Threat can be specialized in Aggregation, Power Imbalance,
Identi cation, Misinformation, Intrusion, Exposure, or Surveillance. It is important to make it clear that Privacy
Threat types can be much more than we were able to nd in the selected papers.</p>
        <p>An example of a Privacy Risk scenario could be a Privacy Threat that is the exposure of the user's address,
which can be a menace to the user's safety Vulnerability because somebody can use such information to cause
any Harm to the people living in the exposed address.</p>
        <p>We developed the catalog of privacy related concepts, beyond the conceptual model presented in Figure 1,
as a source of knowledge for developers. The descriptions of the catalog concepts were based on the de nitions
presented in the papers found in the SLR.</p>
        <p>In Table 2, we present a clipping of the catalog that contains each concept and its description. In addition,
the specializations of privacy mechanism contain more details (context and bene t) as the template used by
Ayala-Rivera and Pasquale [ARP18]. The complete explanation of the catalog can be found in:
supplementarymaterial.link.</p>
        <sec id="sec-3-1-1">
          <title>De nition</title>
          <p>Exposure of information to individuals who are not supposed to have access to it.
An attacker or a malicious user might exploit fragility and get access.
This occurs when there is a vulnerability exploit in the system.</p>
          <p>Associate with a threat. When privacy violation occurs to a user.
A threat poses potential loss or indicates problems that can put personal
information at risk.</p>
          <p>Exposure: Personal/sensitive information received by unintended recipients.
Surveillance: It refers to requests for information about a user. Aggregation:
It combines datasets to produce a new type of information without the user's
consent. Misinformation: Inaccurate or insu cient level of information about a user
is transmitted. Power Imbalance: Third Party uses the information to control a
user. Intrusion: It occurs when the third party disturbs the user's tranquility.
Identi cation: The user's personal information is revealed.</p>
          <p>It refers to appropriate privacy protection mechanisms.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Not being able to deny the authorship of an action. It occurs when it is possible to provide proof of the origin of an action performed. It prevents someone from denying that performed an action. For example, provide digital signatures.</title>
          <p>It prevents repudiation of authorship of an action. It can provide a basis for trust
between users.</p>
          <p>It implies the protection of the information.</p>
          <p>Guarantee that private information will not be disclosed to unauthorized parties
(e.g., individuals, programs, processes, devices, or other systems). For example,
when the system limits access to personal information.</p>
          <p>For legal purposes, ensure the security of personal data.</p>
          <p>The owner of the information has the independence to make decisions.</p>
          <p>This occurs when the system allows the owner of the information to decide on
his/her actions freely. For example, the system may present a consent decision
option and show that the user will not be punished depending on their choice
(e.g., deny access to a feature when the user does not allow the system to access
certain information).</p>
          <p>The user can be con dent in her/his decision making.</p>
          <p>It occurs when the user is aware of the information he/she is supplying to the
system and the consequences of his/her act of sharing.</p>
          <p>When the system itself can support users in privacy-aware decisions. For
example, presenting mechanisms with explanatory options about what information is
collected and how it will be used.</p>
          <p>Users should be clearly informed and educated about the consequences of sharing
data.</p>
          <p>It refers to the user giving consent for some action.</p>
          <p>When the system itself may ask the user to show consent to perform an action.</p>
          <p>For example, the system submits an explicit consent request.</p>
          <p>Users can have real control over their data.
This paper presented part of the results of a SLR which identi ed twenty-four modeling languages used to
capture privacy related concepts. Then, these privacy related concepts were captured to de ne a catalog and a
conceptual model that contribute to create the basis to standardize privacy related concepts. They can be used,
for example, to evaluate modeling languages regarding their support to privacy concerns [PS18].</p>
          <p>This work is a step further in relation to other studies, such as the privacy ontology proposed by Gharib et al.
[GGM17], because besides presenting the privacy related concepts and their relationships, we present a detailed
catalog that can be used as a privacy guide for developers.</p>
          <p>As ongoing research, we are working on the evolution and evaluation of a requirements speci cation method
created from the concepts of the privacy conceptual model. This method is called PCM (Privacy Criteria
Method) and aims at guiding the identi cation and speci cation of privacy requirements earlier in the software
development life-cycle [PSL+19]. The privacy catalog is part of PCM and its purpose is to serve as a source of
knowledge to make it easier the use of the method by developers who do not know much about privacy.
4.0.1</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Acknowledgements</title>
        <p>This study was nanced in part by the Coordenac~ao de Aperfeicoamento de Pessoal de N vel Superior - Brasil
(CAPES) - Finance Code 001, and NOVA LINCS Research Laboratory (Ref. UID/CEC/04516/2019).
[ARP18]
[DS15]</p>
        <p>Vanessa Ayala-Rivera and Liliana Pasquale. The Grace Period Has Ended: An Approach to
Operationalize GDPR Requirements. In 2018 IEEE International Requirements Engineering Conference
(RE), pages 136{146. IEEE, 2018.</p>
        <p>Kristian Beckers. Comparing privacy requirements engineering approaches. In 2012 Seventh Intl.
Conference on Availability, Reliability and Security, pages 574{581. IEEE, 2012.</p>
        <p>Alberto Rodrigues Da Silva. Model-driven engineering: A survey supported by the uni ed conceptual
model. Computer Languages, Systems &amp; Structures, 43:139{155, 2015.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Bec12] [DWS+11]
          <string-name>
            <surname>Mina</surname>
            <given-names>Deng</given-names>
          </string-name>
          , Kim Wuyts, Riccardo Scandariato, Bart Preneel, and
          <string-name>
            <given-names>Wouter</given-names>
            <surname>Joosen</surname>
          </string-name>
          .
          <article-title>A privacy threat analysis framework: supporting the elicitation and ful llment of privacy requirements</article-title>
          .
          <source>Requirements Engineering</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ):3{
          <fpage>32</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [GGM17]
          <string-name>
            <given-names>Mohamad</given-names>
            <surname>Gharib</surname>
          </string-name>
          , Paolo Giorgini,
          <string-name>
            <surname>and John Mylopoulos. Towards</surname>
          </string-name>
          <article-title>an ontology for privacy requirements via a systematic literature review</article-title>
          .
          <source>In Intl. Conference on Conceptual Modeling</source>
          , pages
          <volume>193</volume>
          {
          <fpage>208</fpage>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [HHA+18]
          <string-name>
            <surname>Irit</surname>
            <given-names>Hadar</given-names>
          </string-name>
          , Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack,
          <article-title>So a Sherman, and Arod Balissa. Privacy by designers: software developers' privacy mindset</article-title>
          .
          <source>Empirical Software Engineering</source>
          ,
          <volume>23</volume>
          (
          <issue>1</issue>
          ):
          <volume>259</volume>
          {
          <fpage>289</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [KC07]
          <article-title>Barbara Kitchenham and Stuart Charters. Guidelines for performing systematic literature reviews in software engineering version 2.3</article-title>
          . Engineering,
          <volume>45</volume>
          (4ve):
          <fpage>1051</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [KKG08]
          <string-name>
            <given-names>Christos</given-names>
            <surname>Kalloniatis</surname>
          </string-name>
          , Evangelia Kavakli, and
          <string-name>
            <given-names>Stefanos</given-names>
            <surname>Gritzalis</surname>
          </string-name>
          .
          <article-title>Addressing privacy requirements in system design: the pris method</article-title>
          .
          <source>Requirements Engineering</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ):
          <volume>241</volume>
          {
          <fpage>255</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [OCS+13]
          <string-name>
            <surname>Inah</surname>
            <given-names>Omoronyia</given-names>
          </string-name>
          , Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, and
          <string-name>
            <given-names>Bashar</given-names>
            <surname>Nuseibeh</surname>
          </string-name>
          .
          <article-title>Engineering adaptive privacy: on the role of privacy awareness requirements</article-title>
          .
          <source>In 2013 35th International Conference on Software Engineering (ICSE)</source>
          , pages
          <fpage>632</fpage>
          {
          <fpage>641</fpage>
          . IEEE,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [PS18]
          <string-name>
            <given-names>Mariana</given-names>
            <surname>Peixoto</surname>
          </string-name>
          and
          <string-name>
            <given-names>Carla</given-names>
            <surname>Silva</surname>
          </string-name>
          .
          <article-title>Specifying privacy requirements with goal-oriented modeling languages</article-title>
          .
          <source>In 32nd Brazilian Symposium on Software Engineering (SBES)</source>
          , pages
          <fpage>112</fpage>
          {
          <fpage>121</fpage>
          . ACM,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [PSL+19]
          <string-name>
            <surname>Mariana</surname>
            <given-names>Peixoto</given-names>
          </string-name>
          , Carla Silva, Ricarth Lima, Jo~ao Araujo, Tony Gorschek, and
          <string-name>
            <given-names>Jean</given-names>
            <surname>Silva</surname>
          </string-name>
          . PCM Tool:
          <article-title>Privacy Requirements Speci cation in Agile Software Development</article-title>
          .
          <source>In Extended Proc. of the 10th Brazilian Software Conference: Theory and Practice (CBSoft'19)</source>
          , pages
          <fpage>108</fpage>
          {
          <fpage>113</fpage>
          .
          <string-name>
            <surname>SBC</surname>
          </string-name>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>