Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models