Understanding Privacy-Related Advice on Stack Overflow

Author:

Tahaei Mohammad1,Li Tianshi2,Vaniea Kami3

Affiliation:

1. University of Bristol

2. Carnegie Mellon University

3. University of Edinburgh

Abstract

Abstract Privacy tasks can be challenging for developers, resulting in privacy frameworks and guidelines from the research community which are designed to assist developers in considering privacy features and applying privacy enhancing technologies in early stages of software development. However, how developers engage with privacy design strategies is not yet well understood. In this work, we look at the types of privacy-related advice developers give each other and how that advice maps to Hoepman’s privacy design strategies. We qualitatively analyzed 119 privacy-related accepted answers on Stack Overflow from the past five years and extracted 148 pieces of advice from these answers. We find that the advice is mostly around compliance with regulations and ensuring confidentiality with a focus on the inform, hide, control, and minimize of the Hoepman’s privacy design strategies. Other strategies, abstract, separate, enforce, and demonstrate, are rarely advised. Answers often include links to official documentation and online articles, highlighting the value of both official documentation and other informal materials such as blog posts. We make recommendations for promoting the under-stated strategies through tools, and detail the importance of providing better developer support to handle third-party data practices.

Publisher

Privacy Enhancing Technologies Symposium Advisory Board

Subject

General Medicine

Reference69 articles.

1. [1] Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L Mazurek, and Christian Stransky. You Get Where You’re Looking for: The Impact of Information Sources on Code Security. In 2016 IEEE Symposium on Security and Privacy (SP), pages 289–305. IEEE, May 2016. 10.1109/SP.2016.25.10.1109/SP.2016.25

2. [2] Nitin Agrawal, Reuben Binns, Max Van Kleek, Kim Laine, and Nigel Shadbolt. Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, CHI ’21, New York, NY, USA, 2021. ACM. 10.1145/3411764.3445677.10.1145/3411764.3445677

3. [3] Sami Alkhatib, Jenny Waycott, George Buchanan, Marthie Grobler, and Shuo Wang. Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet! In 32nd Australian Conference on Human-Computer Interaction, OzCHI ’20, page 492–505, New York, NY, USA, 2020. ACM. 10.1145/3441000.3441049.10.1145/3441000.3441049

4. [4] Miltiadis Allamanis and Charles Sutton. Why, when, and what: Analyzing Stack Overflow questions by topic, type, and code. In 2013 10th Working Conference on Mining Software Repositories (MSR), pages 53–56. IEEE, May 2013. 10.1109/MSR.2013.6624004.10.1109/MSR.2013.6624004

5. [5] Majed Almansoori, Jessica Lam, Elias Fang, Kieran Mulligan, Adalbert Gerald Soosai Raj, and Rahul Chatterjee. How Secure Are Our Computer Systems Courses? In Proceedings of the 2020 ACM Conference on International Computing Education Research, ICER ’20, page 271–281, New York, NY, USA, 2020. ACM. 10.1145/3372782.3406266.10.1145/3372782.3406266

Cited by 21 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Investigating Data Protection Compliance Challenges;International Journal of Innovative Science and Research Technology (IJISRT);2024-09-11

2. “Track every move”: Analyzing developers’ privacy discourse in GitHub README files;New Media & Society;2024-08-28

3. SoK: Technical Implementation and Human Impact of Internet Privacy Regulations;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19

4. Encoding Privacy: Sociotechnical Dynamics of Data Protection Compliance Work;Proceedings of the CHI Conference on Human Factors in Computing Systems;2024-05-11

5. Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter;Proceedings of the CHI Conference on Human Factors in Computing Systems;2024-05-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3