1. Misuse cases: use cases with hostile intent;Alexander;IEEE Softw.,2003
2. A problem-based approach for computer aided privacy threat identification;Beckers,2012
3. Comparing privacy requirements engineering approaches;Beckers,2012
4. Design for privacy in ubiquitous computing environments;Bellotti,1993
5. Exercising due diligence in legal requirements acquisition: a tool-supported, frame-based approach;Breaux,2009