“…Technique. Various modeling approaches includes Data Flow Diagrams [13], [35], [38], [51], [53], STS-ml (Socio-Technical Security Modeling Language) [46]- [48], SecBPMN2 [48], Secure Tropos (SecTro) [48], JTrust [48], Misuse Case Diagrams [29], [51], [52], UML diagram [37], [42], BPMN [37], [54], Goal modeling diagrams [55], Problem Frames [5], or TOGAF-based modeling [37]. Textual specifications [32], [36], NLP techniques [16], Questionnaires [30], [46], Co-creation tools [45] Functional requirements list [32], Privacy-related entities [36] Stakeholder goals Asset and Data Inventory Data processing analysis [23], Guided questionnaire [30], [50], Focus group discussions [25], Surveys, Interviews [4], [29] Assets and data inventory list [23], Data processing activities [44] Data audit forms [8], Current database, Data flow diagrams Model-based Approach Data Flow Diagrams [13], [51], STS-ml [46], SecBPMN2, Secure Tropos, JTrust, Misuse Case Diagrams [29], [52], UML, BPMN…”