Environmental factors describe the context that surrounds the company and affects the adoption of security and privacy practices in the development process. | Laws, regulations, and industry standards:• Development platforms’ policies; | [12, 13, 16, 22, 26, 31, 51, 68, 82, 100, 105, 108] |
| Perceived social norms and user expectations about privacy and security | [12, 13, 16, 22, 57, 60] |
| Competition and reputation | [7, 60, 111] |
Organizational factors are aspects pertinent to the company. | The proliferation of privacy/security knowledgewithin the organization:• Privacy/security education and training; • Role of privacy/security champions; • Q&A and code sharing websites; • Media and other resources. | [2, 3, 8, 11, 15, 17, 22, 30, 58, 59, 60, 70, 77, 79, 98, 99, 103, 105, 112, 117, 132] |
| Privacy and security culture:• Organizational security culture; • Organizational privacy culture. | [7, 8, 12, 16, 57, 60, 70, 112, 126, 132] |
| Organizational maturity | [26, 60, 89, 100, 100] |
| Financial and human resources | [7, 11, 12, 14, 47, 53, 60, 70, 74, 94, 108, 112, 132, 137] |
| Management support | [7, 12, 47, 49, 57, 59, 63, 64, 69, 70, 74] |
| Organizational incentives | [7, 13, 22, 32, 57, 59, 64, 70, 109] |
| Organizational team structure: | [1, 5, 11, 12, 16, 20, 31, 43, 47, 49, 54, 58, 59, 70, 74, 82, 100, 101, 110, 112, 126, 132, 136] |
Process-related factors are the ones that can have an impact throughout the process (e.g., internal organizational documentation), or at a specific stage of the software development lifecycle. | Internal organizational documentation and procedures: | [7, 8, 9, 11, 15, 16, 17, 26, 28, 31, 32, 36, 47, 52, 54, 57, 60, 70, 74, 79, 101, 103, 107, 109, 112, 112, 126, 132, 133] |
| Requirements stage factors:• Difficulties with defining privacy and security concepts and requirements; • Tension between privacy/security and other technical and system requirements. | [7, 13, 15, 16, 19, 22, 25, 31, 51, 54, 57, 60, 62, 66, 70, 73, 76, 79, 82, 84, 89, 91, 100, 101, 103, 108, 110, 126, 131, 136] |
| Implementation stage factors:• Difficulties with translating requirements into practice; • Tension between privacy/security and time priorities; • Usability issues of privacy and security tools. | [7, 8, 10, 11, 12, 16, 22, 23, 31, 38, 39, 41, 47, 48, 54, 57, 60, 70, 72, 73, 74, 79, 91, 94, 100, 101, 102, 103, 107, 110, 112, 126, 128, 131, 132, 134, 135] |
| Review and evaluation stage factors:• Evaluation process and metrics. | [11, 12, 16, 23, 26, 31, 54, 60, 66, 73, 79, 92, 103, 105, 110, 114, 126, 132, 134] |
Product-related factors are pertinent to the type of software product, its target audience, and its economic potential. | Relevance/importance of privacy/security for the product | [7, 11, 13, 22, 26, 31, 57, 60, 93, 100, 132] |
| Tensions between privacy/security and business priorities | [11, 16, 26, 31, 54, 57, 74, 78, 101, 112, 124] |
| Competitive advantage | [13, 26, 31, 51, 54, 60, 61, 67, 70, 74, 100, 105, 110, 112] |
Personal factors include developers’ personal characteristics and backgrounds. | Position and role:• Perceived personal responsibility; | [7, 11, 12, 16, 20, 26, 30, 31, 51, 57, 70, 74, 76, 79, 98, 100, 104, 108, 109, 110, 112, 115, 132] |
| Privacy expertise and knowledge | [2, 7, 11, 13, 14, 16, 17, 22, 33, 34, 40, 56, 58, 59, 60, 70, 75, 79, 82, 100, 101, 103, 106, 112, 123] |
| Instrumental privacy/security attitudes | [4, 7, 8, 16, 25, 59, 70, 74, 79, 100, 103, 112, 130] |
| Experimental privacy/security attitudes | [7, 16, 17, 59, 112] |
| Prior experiences with privacy/security violations in the software development context | [7, 8, 132] |
| Personality traits | [45, 56, 58, 59, 71, 112, 129] |