“…A natural way to express these relationships among harms, feared events and privacy weaknesses is through harm trees. Harm trees are akin to attack trees in computer security [4,12,14,27,28,41,43,44,45,46,53]. The use of this type of trees is not new for privacy, even if very few papers have been published on this topic.…”