skip to main content
10.1145/3210459.3210484acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
short-paper

Why developers cannot embed privacy into software systems?: An empirical investigation

Published:28 June 2018Publication History

ABSTRACT

Pervasive use of software applications continue to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear instructions for software developers to embed privacy into software designs, those practices are yet to become a common practice among software developers. The difficulty of developing privacy preserving software systems highlights the importance of investigating software developers and the problems they face when they are asked to embed privacy into application designs. Software developers are the community who can put practices such as PbD into action. Therefore identifying the problems they face when embedding privacy into software applications and providing solutions to those problems are important to enable the development of privacy preserving software systems. This study investigates 36 software developers in a software design task with instructions to embed privacy in order to identify the problems they face. We derive recommendation guidelines to address the problems to enable the development of privacy preserving software systems.

References

  1. Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L Mazurek, and Christian Stransky. 2017. Comparing the usability of cryptographic apis. In Proceedings of the 38th IEEE Symposium on Security and Privacy.Google ScholarGoogle ScholarCross RefCross Ref
  2. Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In IEEE Cyber Security Development Conference, (IEEE Secdev). IEEE.Google ScholarGoogle Scholar
  3. Oshrat Ayalon, Eran Toch, Irit Hadar, and Michael Birnhack. 2017. How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 135--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sean W Brooks, Michael E Garcia, Naomi B Lefkovitz, Suzanne Lightman, and Ellen M Nadeau. 2017. An Introduction to Privacy Engineering and Risk Management in Federal Information Systems. NIST Interagency/Internal Report (NISTIR)-8062 (2017).Google ScholarGoogle Scholar
  5. Ann Cavoukian. 2009. Privacy by Design. The Answer to Overcoming Negative Externalities Arising from Poor Management of Personal Data. In Trust Economics Workshop London, England, June, Vol. 23. 2009.Google ScholarGoogle Scholar
  6. Ann Cavoukian, Scott Taylor, and Martin E Abrams. 2010. Privacy by Design: essential for organizational accountability and strong business practices. Identity in the Information Society 3, 2 (2010), 405--413.Google ScholarGoogle ScholarCross RefCross Ref
  7. Juliet M Corbin and Anselm Strauss. 1990. Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1 (1990), 3--21.Google ScholarGoogle Scholar
  8. George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, and Stefan Schiffner. 2015. Privacy and Data Protection by Design-from policy to engineering. European Union Agency for Network and Information Security (2015).Google ScholarGoogle Scholar
  9. Asunción Esteve. 2017. The business of personal data: Google, Facebook, and privacy issues in the EU and the USA. International Data Privacy Law 7, 1 (2017), 36--47.Google ScholarGoogle ScholarCross RefCross Ref
  10. The Canadian Express. 2018. Facebook's Zuckerberg admits mistakes in privacy scandal. (March 2018). Retrieved March 21, 2018 from https://www.columbiavalleypioneer.com/news/facebooks-zuckerberg-admits-mistakes-in-privacy-scandal/Google ScholarGoogle Scholar
  11. Graham R Gibbs. 2002. Qualitative data analysis: Explorations with NVivo. Open University.Google ScholarGoogle Scholar
  12. Tasha Glenn and Scott Monteith. 2014. Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports 16, 11 (2014), 494.Google ScholarGoogle Scholar
  13. Seda Gürses and Jose M del Alamo. 2016. Privacy Engineering: Shaping an Emerging Field of Research and Practice. IEEE Security & Privacy 14, 2 (2016), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2017. Privacy by designers: software developersâĂŹ privacy mindset. Empirical Software Engineering (2017), 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Shubham Jain and Janne Lindqvist. 2014. Should I Protect You? Understanding Developers' Behavior to Privacy-Preserving APIs. In Workshop on Usable Security (USEC 2014).Google ScholarGoogle ScholarCross RefCross Ref
  16. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. my data just goes everywhere:âĂİ user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association Berkeley, CA, 39--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Bonnie Kaplan. 2015. Selling health data: de-identification, privacy, and speech. Cambridge Quarterly of Healthcare Ethics 24, 3 (2015), 256--271.Google ScholarGoogle ScholarCross RefCross Ref
  18. Judy Kendall. 1999. Axial coding and the grounded theory controversy. Western journal of nursing research 21, 6 (1999), 743--757.Google ScholarGoogle Scholar
  19. Aniket Kittur, Ed H Chi, and Bongwon Suh. 2008. Crowdsourcing user studies with Mechanical Turk. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 453--456. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Joanne K Kumekawa. 2001. Health information privacy protection: crisis or common sense. Online Journal of Issues in Nursing 6, 3 (2001).Google ScholarGoogle Scholar
  21. Marie Caroline Oetzel and Sarah Spiekermann. 2014. A systematic methodology for privacy impact assessments: a design science approach. European Journal of Information Systems 23, 2 (2014), 126--150.Google ScholarGoogle ScholarCross RefCross Ref
  22. Inah Omoronyia, Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, and Bashar Nuseibeh. 2013. Engineering adaptive privacy: on the role of privacy awareness requirements. In Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, 632--641. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Anthony J Onwuegbuzie and Nancy L Leech. 2005. On becoming a pragmatic researcher: The importance of combining quantitative and qualitative research methodologies. International journal of social research methodology 8, 5 (2005), 375--387.Google ScholarGoogle ScholarCross RefCross Ref
  24. Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. (2010).Google ScholarGoogle Scholar
  25. Ashwini Rao, Florian Schaub, Norman Sadeh, Alessandro Acquisti, and Ruogu Kang. 2016. Expecting the unexpected: Understanding mismatched privacy expectations online. In Symposium on Usable Privacy and Security (SOUPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jeff Sedayao, Rahul Bhardwaj, and Nakul Gorade. 2014. Making big data, privacy, and anonymization work together in the enterprise: experiences and issues. In Big Data (BigData Congress), 2014 IEEE International Congress on. IEEE, 601--607. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Awanthika Senarath and Arachchilage NAG. 2017. Understanding Organizational Approach towards End User Privacy. Australasian Conference on Information Systems (2017).Google ScholarGoogle Scholar
  28. Swapneel Sheth, Gail Kaiser, and Walid Maalej. 2014. Us and them: a study of privacy requirements across North America, Asia, and Europe. In Proceedings of the 36th International Conference on Software Engineering. ACM, 859--870. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Daniel J Solove and Paul Schwartz. 2014. Information privacy law. Wolters Kluwer Law & Business.Google ScholarGoogle Scholar
  30. Sarah Spiekermann. 2012. The challenges of privacy by design. Commun. ACM 55, 7 (2012), 38--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Keerthi Thomas, Arosha K Bandara, Blaine A Price, and Bashar Nuseibeh. 2014. Distilling privacy requirements for mobile applications. In Proceedings of the 36th International Conference on Software Engineering. ACM, 871--882. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Leo R Vijayasarathy and Charles W Butler. 2016. Choice of software development methodologies: Do organizational, project, and team characteristics matter? IEEE Software 33, 5 (2016), 86--94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Dominik Wermke and Michelle Mazurek. 2017. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In Symposium on Usable Privacy and Security (SOUPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Richmond Y Wong, Deirdre K Mulligan, Ellen Van Wyk, James Pierce, and John Chuang. 2017. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks. Proceedings of the ACM on Human Computer Interaction 1, 2 (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Kim Wuyts, Riccardo Scandariato, and Wouter Joosen. 2014. LIND (D) UN privacy threat tree catalog. (2014).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    EASE '18: Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018
    June 2018
    223 pages
    ISBN:9781450364034
    DOI:10.1145/3210459

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 June 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate71of232submissions,31%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader