2019
DOI: 10.1145/3364224
|View full text |Cite
|
Sign up to set email alerts
|

Will They Use It or Not? Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies

Abstract: With the increasing concerns over privacy in software systems, there is a growing enthusiasm to develop methods to support the development of privacy aware software systems. Inadequate privacy in software system designs could result in users losing their sensitive data, such as health information and financial information, which may cause financial and reputation loss. Privacy Engineering Methodologies (PEMs) are introduced into the software development processes with the goal of guiding software developers to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 58 publications
0
15
0
2
Order By: Relevance
“…In addition to design and code reviews, to incorporate privacy considerations into formal processes, our fndings suggest using verifed libraries that do not contain privacy threats as well as tools that help to annotate data sets, map data fows, and automate the detection of privacy threats. Such tools should be practically useful and efective, and save developers' time without introducing additional burden [61]. Since security tools are already commonly used in the organisations, the new privacy features can be incorporated into those existing tools to further facilitate adoption.…”
Section: Support the Capabilitiesmentioning
confidence: 99%
“…In addition to design and code reviews, to incorporate privacy considerations into formal processes, our fndings suggest using verifed libraries that do not contain privacy threats as well as tools that help to annotate data sets, map data fows, and automate the detection of privacy threats. Such tools should be practically useful and efective, and save developers' time without introducing additional burden [61]. Since security tools are already commonly used in the organisations, the new privacy features can be incorporated into those existing tools to further facilitate adoption.…”
Section: Support the Capabilitiesmentioning
confidence: 99%
“…Software applications, which are developed without the ability to preserve privacy, are likely to be affected by data breaches [4]. Previous research has revealed that software developers may not adhere to these data privacy principles when implementing privacy-preserving software systems [10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…We first identify three challenges that the agile and services shift in software engineering practices described in the previous Section II raises for methodological works and proposals for engineering privacy by design. A few recent studies show the impediments that software developers experience and/or express towards adopting privacy engineering methodologies in their work [48], [86], [87], [94]. Prominently, incompatibility between privacy engineering methodologies and usual development processes and a lack of demonstrable use are considered to be an obstacle to the adoption of privacy engineering methods [86], [87].…”
Section: A Challengesmentioning
confidence: 99%
“…A few recent studies show the impediments that software developers experience and/or express towards adopting privacy engineering methodologies in their work [48], [86], [87], [94]. Prominently, incompatibility between privacy engineering methodologies and usual development processes and a lack of demonstrable use are considered to be an obstacle to the adoption of privacy engineering methods [86], [87]. We analyze what privacy engineering methodological works face in the current agile and services software development practices and we identify the following challenges.…”
Section: A Challengesmentioning
confidence: 99%