Will They Use It or Not? Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies

Author:

Senarath Awanthika1,Grobler Marthie2,Arachchilage Nalin Asanka Gamagedara3

Affiliation:

1. University of New South Wales Australia

2. data61, Commonwealth Scientific and Industrial Research Organisation, Australia

3. La Trobe University Australia and University of New South Wales

Abstract

With the increasing concerns over privacy in software systems, there is a growing enthusiasm to develop methods to support the development of privacy aware software systems. Inadequate privacy in software system designs could result in users losing their sensitive data, such as health information and financial information, which may cause financial and reputation loss. Privacy Engineering Methodologies (PEMs) are introduced into the software development processes with the goal of guiding software developers to embed privacy into the systems they design. However, for PEMs to be successful it is imperative that software developers have a positive intention to use PEMs. Otherwise, developers may attempt to bypass the privacy methodologies or use them partially and hence develop software systems that may not protect user privacy appropriately. To investigate the factors that affect software developers’ behavioural intention to follow PEMs, in this article, we conducted a study with 149 software developers. Findings of the study show that the usefulness of the PEM to the developers’ existing work to be the strongest determinant that affects software developers’ intention to follow PEMs. Moreover, the compatibility of the PEM with their way of work and how the PEM demonstrates its results when used were also found to be significant. These findings provide important insights in understanding the behaviour of software developers and how they perceive PEMs. The findings could be used to assist organisations and researchers to deploy PEMs and design PEMs that are positively accepted by software developers.

Funder

Information Management and Technology Team of XXXX Australia

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference81 articles.

1. 2016. European Union Data Protection. Retrieved from: http://ec.europa.eu/justice/data-protection/data-collection. 2016. European Union Data Protection. Retrieved from: http://ec.europa.eu/justice/data-protection/data-collection.

2. Comparing the Usability of Cryptographic APIs

3. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users

Cited by 29 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Empowering IoT Developers with Privacy-Preserving End-User Development Tools;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2024-08-22

2. A natural language-based method to specify privacy requirements: an evaluation with practitioners;Requirements Engineering;2024-07-19

3. Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks;IEEE Communications Magazine;2024-06

4. Redesigning Privacy with User Feedback: The Case of Zoom Attendee Attention Tracking;Proceedings of the CHI Conference on Human Factors in Computing Systems;2024-05-11

5. Ensino da Adequação à LGPD no Desenvolvimento de Software através da Aprendizagem Ativa e Centrada no Discente;Anais do IV Simpósio Brasileiro de Educação em Computação (EDUCOMP 2024);2024-04-22

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3