... Type Papers [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50] Evaluation 14 [51], [52], [27], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [3], [64], [65], [66], [67], [68], [69], [70] Solution Proposal 21 [71] , [72], [73], [74], [75], [76], [77] Validation 7 [78], [13], [79], [80], [81], [82], [83], [84], [85], [86], [87], [2], [4], [12] Philosophical 14 Fig. 2. Privacy Engineering Methodologies taxonomy methodologies, with SQUARE as a prime example. The motivation behind this separation between the two categories is stemmed from the perceived overlapping between security, data protection, and privacy between researchers. ...