2019
DOI: 10.1007/s10270-019-00718-z
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhanced BPMN: enabling data privacy analysis in business processes models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 26 publications
0
26
0
1
Order By: Relevance
“…Caramujo et al [19] target privacy policies from the web and mobile applications, and propose a domain-specific language along with model transformations for specifying privacypolicy models. Pullonen and Matulevicius [20] present a multilevel model to be used as an extension of the Business Process Model and Notation (BPMN) to enable the visualization, analysis, and communication of the privacy-policy characteristics of business processes. Tom et al [32] present a preliminary GDPR model aimed at providing a simple, visual overview so that process implementers can better understand the associations between different entities in the GDPR.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Caramujo et al [19] target privacy policies from the web and mobile applications, and propose a domain-specific language along with model transformations for specifying privacypolicy models. Pullonen and Matulevicius [20] present a multilevel model to be used as an extension of the Business Process Model and Notation (BPMN) to enable the visualization, analysis, and communication of the privacy-policy characteristics of business processes. Tom et al [32] present a preliminary GDPR model aimed at providing a simple, visual overview so that process implementers can better understand the associations between different entities in the GDPR.…”
Section: Related Workmentioning
confidence: 99%
“…As we discuss in more detail in Section VII, existing modelbased approaches for compliance verification have one of the following limitations as far as the GDPR is concerned: they (1) have a different focus than the GDPR, e.g., [5], (2) present guidelines only for the manual application of the GDPR, e.g., [18], or (3) focus exclusively on specific GDPR use cases, e.g., [19], [20]. To the best of our knowledge, there are no proposals in the literature aimed at providing a holistic modelbased representation of the GDPR.…”
Section: Introductionmentioning
confidence: 99%
“…Data privacy violations can be prevented if privacy requirements are properly elicited during the early stages of software development, that is, in the specification phase of functional and non-functional requirements. Although much work has been developed proposing methodologies for privacy requirements' elicitation [4][5][6][7][8][9][10][11][12], we found few works in the literature that have conducted empirical studies to describe how the software industry faces problems related to software development teams perceptions of system privacy [3,13,14], as well as what knowledge these professionals have, in order to perform correct implementations of these requirements along with the compliance with current legislation [13].…”
Section: Introductionmentioning
confidence: 99%
“…Caramujo et al [7] target privacy policies from the web and mobile applications, and propose a domain-specific language along with model transformations for specifying privacy-policy models. Similarly, Pullonen et al [28] present a multi-level model to be used as an extension of the Business Process Model and Notation to enable the visualization, analysis, and communication of the privacy-policy characteristics of business processes. Finally, Kumar and Shyamasundar [29] explore the suitability of information-flow controls as a tool for specifying and enforcing privacy-policy requirements.…”
Section: Related Workmentioning
confidence: 99%