Privacy by designers: software developers’ privacy mindset

Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers’ perceptions, interpretation and practices as to informational privacy (or data protection). To this end, we conducted in-depth interviews with 27 developers from different domains, who practice software design. Grounded analysis of the data revealed an interplay between several different forces affecting the way in which developers handle privacy concerns. Borrowing the schema of Social Cognitive Theory (SCT), we classified and analyzed the cognitive, organizational and behavioral factors that play a role in developers’ privacy decision making. Our findings indicate that developers use the vocabulary of data security to approach privacy challenges, and that this vocabulary limits their perceptions of privacy mainly to third-party threats coming from outside of the organization; that organizational privacy climate is a powerful means for organizations to guide developers toward particular practices of privacy; and that software architectural patterns frame privacy solutions that are used throughout the development process, possibly explaining developers’ preference of policy-based solutions to architectural solutions. Further, we show, through the use of the SCT schema for framing the findings of this study, how a theoretical model of the factors that influence developers’ privacy practices can be conceptualized and used as a guide for future research toward effective implementation of PbD.

[1]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[2]  Fernando Jaramillo,et al.  Bringing meaning to the sales job: The effect of ethical climate and customer demandingness , 2013 .

[3]  Eran Toch,et al.  Privacy Mindset, Technological Mindset , 2014 .

[4]  Lorrie Faith Cranor,et al.  The Privacy and Security Behaviors of Smartphone App Developers , 2014 .

[5]  S. Fienberg Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation , 2006, math/0609288.

[6]  A. Strauss,et al.  Grounded theory methodology: An overview. , 1994 .

[7]  Michael D. Myers,et al.  Qualitative Research in Information Systems , 1997, MIS Q..

[8]  Nigel Nicholson,et al.  The Absence Culture and Psychological Contract—Who's in Control of Absence? , 1985 .

[9]  Ira S. Rubinstein,et al.  Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .

[10]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[11]  Tim Menzies,et al.  Balancing Privacy and Utility in Cross-Company Defect Prediction , 2013, IEEE Transactions on Software Engineering.

[12]  Michael D. Myers,et al.  The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..

[13]  Walid Maalej,et al.  On lawful disclosure of personal user data: What should app developers do? , 2014, 2014 IEEE 7th International Workshop on Requirements Engineering and Law (RELAW).

[14]  Carolyn B. Seaman,et al.  Qualitative Methods in Empirical Studies of Software Engineering , 1999, IEEE Trans. Software Eng..

[15]  Mary Lacity,et al.  Understanding Qualitative Data: A Framework of Text Analysis Methods , 1994, J. Manag. Inf. Syst..

[16]  R L Brown,et al.  The use of a factor-analytic procedure for assessing the validity of an employee safety climate model. , 1986, Accident; analysis and prevention.

[17]  Marvin Ammori,et al.  Media Diversity and Online Advertising , 2013 .

[18]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[19]  Bashar Nuseibeh,et al.  Distilling privacy requirements for mobile applications , 2014, ICSE.

[20]  Thomas R. Shaw,et al.  The Moral Intensity of Privacy: An Empirical Study of Webmaster' Attitudes , 2003 .

[21]  Stoianov,et al.  Facial Recognition with Biometric Encryption in Match-on-Card Architecture for Gaming and Other Computer Applications , 2014 .

[22]  Deirdre K. Mulligan,et al.  Privacy in Europe: Initial Data on Governance Choices and Corporate Practices , 2013 .

[23]  Chris Argyris,et al.  Understanding organizational behavior , 1961 .

[24]  R. Suddaby From the Editors: What Grounded Theory is Not , 2006 .

[25]  R. Eisenberger,et al.  Perceived Organizational Support and Employee Diligence, Commitment, and Innovation , 1990 .

[26]  Omer Tene,et al.  Big Data for All: Privacy and User Control in the Age of Analytics , 2012 .

[27]  Miguel Castro,et al.  Better bug reporting with better privacy , 2008, ASPLOS 2008.

[28]  David Lo,et al.  kb-anonymity: a model for anonymized behaviour-preserving test and debugging data , 2011, PLDI '11.

[29]  Bashar Nuseibeh,et al.  Engineering adaptive privacy: On the role of privacy awareness requirements , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[30]  K D Burau,et al.  Organisational and occupational risk factors associated with work related injuries among public hospital employees in Costa Rica , 2005, Occupational and Environmental Medicine.

[31]  Avi Goldfarb,et al.  Comments on 'A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers' , 2011 .

[32]  Michelle Finneran Dennedy,et al.  The Privacy Engineer’s Manifesto , 2014, Apress.

[33]  Nicholas Berente,et al.  Institutional Contradictions and Loose Coupling: Postimplementation of NASA's Enterprise Information System , 2012, Inf. Syst. Res..

[34]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[35]  Nai-Chang Cheng,et al.  Programmer perceptions of knowledge-sharing behavior under social cognitive theory , 2010, Expert Syst. Appl..

[36]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[37]  Walid Maalej,et al.  Us and them: a study of privacy requirements across north america, asia, and europe , 2014, Software Engineering & Management.

[38]  Kynn K. Bartels,et al.  The Relationship between Ethical Climate and Ethical Problems within Human Resource Management , 1998 .

[39]  Sherif Ali Mohtady Mohamed,et al.  SAFETY CLIMATE IN CONSTRUCTION SITE ENVIRONMENTS , 2002 .

[40]  Cheri Ostroff,et al.  Organizational Climate and Culture: Reflections on the History of the Constructs in the Journal of Applied Psychology , 2017, The Journal of applied psychology.

[41]  R. A. Phillips,et al.  Exploratory analysis of the safety climate and safety behavior relationship. , 2004 .

[42]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..

[43]  Michael D Birnhack,et al.  Does Law Matter Online? Empirical Evidence on Privacy Law Compliance , 2009 .

[44]  Satish P. Deshpande,et al.  Ethical climate and the link between success and ethical behavior: An empirical investigation of a non-profit organization , 1996 .

[45]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[46]  L. Kool,et al.  Privacy by Design: an alternative to existing practice in safeguarding privacy , 2011 .

[47]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[48]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[49]  Coye Cheshire,et al.  Risky Business: Social Trust and Community in the Practice of Cybersecurity for Internet Infrastructure , 2017, HICSS.

[50]  Iván Székely,et al.  What Do IT Professionals Think About Surveillance , 2013 .

[51]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[52]  Patricia S. Abril,et al.  Blurred Boundaries: Social Media Privacy and the Twenty‐First‐Century Employee , 2012 .

[53]  Janne Lindqvist,et al.  Should I Protect You? Understanding Developers' Behavior to Privacy-Preserving APIs , 2014 .

[54]  David Lo,et al.  kbe-anonymity: test data anonymization for evolving programs , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[55]  Tim Menzies,et al.  Privacy and utility for defect prediction: Experiments with MORPH , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[56]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[57]  Deirdre K. Mulligan,et al.  Privacy on the Books and on the Ground , 2011 .

[58]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[59]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[60]  Rayid Ghani,et al.  Testing software in age of data privacy: a balancing act , 2011, ESEC/FSE '11.

[61]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[62]  B. Schneider,et al.  Organizational climate and culture. , 2009, Annual review of psychology.

[63]  Marc Langheinrich,et al.  Privacy and trust issues with invisible computers , 2005, CACM.

[64]  Kecheng Liu,et al.  Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..

[65]  Nicole Ozer,et al.  Putting Online Privacy Above the Fold: Building a Social Movement and Creating Corporate Change , 2012 .

[66]  Geoff Walsham,et al.  Doing interpretive research , 2006, Eur. J. Inf. Syst..

[67]  Oi-ling Siu,et al.  Safety climate and safety performance among construction workers in Hong Kong. The role of psychological strains as mediators. , 2004, Accident; analysis and prevention.

[68]  D. Zohar Safety climate in industrial organizations: theoretical and applied implications. , 1980, The Journal of applied psychology.

[69]  A. Bandura,et al.  Social Cognitive Theory of Organizational Management , 1989 .

[70]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[71]  D. Zohar,et al.  A multilevel model of safety climate: cross-level relationships between organization and group-level climates. , 2005, The Journal of applied psychology.

[72]  Gil Luria,et al.  Controlling for Quality: Climate, Leadership, and Behavior , 2008 .

[73]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .

[74]  Maarten H. Everts,et al.  Designing Privacy-by-Design , 2012, APF.

[75]  L R Murphy,et al.  Hospital safety climate and its relationship with safe work practices and workplace exposure incidents. , 2000, American journal of infection control.

[76]  U Varonen,et al.  The safety climate and its relationship to safety practices, safety of the work environment and occupational accidents in eight wood-processing companies. , 2000, Accident; analysis and prevention.

[77]  Chen Fu,et al.  Is Data Privacy Always Good for Software Testing? , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.

[78]  Bradley L. Kirkman,et al.  Taking Stock: A review of more than twenty years of research on empowerment at work , 2007 .

[79]  Scott Dick,et al.  A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations , 2009, TWEB.

[80]  Yolande E. Chan IT Value: The Great Divide Between Qualitative and Quantitative and Individual and Organizational Measures , 2000, J. Manag. Inf. Syst..

[81]  J. Shepard,et al.  Toward an understanding of ethical climate: Its relationship to ethical behavior and supervisory influence , 1994 .

[82]  Michelle Finneran Dennedy,et al.  The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value , 2014 .

[83]  D M DeJoy,et al.  Safety climate dimensions associated with occupational exposure to blood-borne pathogens in nurses. , 1999, American journal of industrial medicine.

[84]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[85]  Marc L. Resnick,et al.  Perceptions of Customer Service, Information Privacy, and Product Quality From Semiotic Design Features in an Online Web Store , 2003, Int. J. Hum. Comput. Interact..

[86]  Steven M. Bellovin,et al.  The Failure of Online Social Network Privacy Settings , 2011 .

[87]  A. Strauss,et al.  Basics of Qualitative Research , 1992 .

[88]  Eran Toch,et al.  Retrospective privacy: managing longitudinal privacy in online social networks , 2013, SOUPS.

[89]  D. Zohar A group-level model of safety climate: testing the effect of group climate on microaccidents in manufacturing jobs. , 2000, The Journal of applied psychology.