Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3022198.3026326acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
poster

How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate

Published: 25 February 2017 Publication History

Abstract

New technologies continuously challenge people's information privacy, while privacy protection practices, such as Privacy-by-Design, did not become widespread engineering practices. The difficulty of designing privacy-preserving information systems highlights the need for studying developers' privacy decision-making processes, as the developers' communities are well coordinated and they are the ones who can promote or hinder privacy in the systems they design. We conducted an online survey (n=101), to understand the effectors on developers' professional privacy attitudes and practices. We investigate whether developer's privacy decision-making is shaped by several factors, including organizational (organizational privacy climate, business and legal contexts), professional (privacy knowledge) and personal (personal perceived privacy).

References

[1]
Barsade, S. G., Ramarajan, L., & Westen, D. (2009). Implicit affect in organizations. Research in organizational behavior, 29, 135--162
[2]
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295--316.
[3]
Gellman, R. (2014). Fair information practices: A basic history. Available at SSRN 2415020
[4]
Griffin, M. A., & Neal, A. (2000). Perceptions of safety at work: a framework for linking safety climate to safety performance, knowledge, and motivation. Journal of occupational health psychology, 5(3), 347.
[5]
Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., & Balissa, A. (2014, March). Are Designers Ready for Privacy by Design? Examining Perceptions of Privacy Among Information Systems Designers. In 2014 TPRC Conference Paper.
[6]
Rubinstein, I. S. and Good, N. (2013). Privacy by design: A counterfactual analysis of google and Facebook privacy incidents. Berkeley Tech. LJ, 28:1333.

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)Redesigning Privacy with User Feedback: The Case of Zoom Attendee Attention TrackingProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642594(1-14)Online publication date: 11-May-2024
  • (2024)Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by designInternational Journal of Information Security10.1007/s10207-024-00905-0Online publication date: 3-Sep-2024
  • Show More Cited By

Index Terms

  1. How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '17 Companion: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
    February 2017
    472 pages
    ISBN:9781450346887
    DOI:10.1145/3022198
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2017

    Check for updates

    Author Tags

    1. decision-making processes
    2. information systems developers
    3. organizational climate
    4. privacy

    Qualifiers

    • Poster

    Funding Sources

    • Israel Science Foundation (ISF)

    Conference

    CSCW '17
    Sponsor:
    CSCW '17: Computer Supported Cooperative Work and Social Computing
    February 25 - March 1, 2017
    Oregon, Portland, USA

    Acceptance Rates

    CSCW '17 Companion Paper Acceptance Rate 183 of 530 submissions, 35%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)34
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
    • (2024)Redesigning Privacy with User Feedback: The Case of Zoom Attendee Attention TrackingProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642594(1-14)Online publication date: 11-May-2024
    • (2024)Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by designInternational Journal of Information Security10.1007/s10207-024-00905-0Online publication date: 3-Sep-2024
    • (2023)The relationship between work professionalism and job satisfaction toward employee performance in mediating of organizational climateInternational Journal of Research in Business and Social Science (2147- 4478)10.20525/ijrbs.v12i2.238012:2(177-186)Online publication date: 25-Mar-2023
    • (2023)A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software DevelopmentACM Computing Surveys10.1145/358995155:14s(1-27)Online publication date: 4-Apr-2023
    • (2023)PARROTProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808807:1(1-37)Online publication date: 28-Mar-2023
    • (2023)“A method like this would be overkill”: Developers’ Perceived Issues with Privacy-preserving Computation Methods2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00145(1041-1048)Online publication date: 1-Nov-2023
    • (2023)Privacy Engineering in the Wild: Understanding the Practitioners’ Mindset, Organizational Aspects, and Current PracticesIEEE Transactions on Software Engineering10.1109/TSE.2023.329023749:9(4324-4348)Online publication date: Sep-2023
    • (2022)Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow ExplorationProceedings of the 2022 European Symposium on Usable Security10.1145/3549015.3555669(117-130)Online publication date: 29-Sep-2022
    • (2022)Developers’ Privacy Education: A game framework to stimulate secure coding behaviour2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta)10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00321(2255-2264)Online publication date: Dec-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media