Mobile app privacy in software engineering research: A systematic mapping study

F Ebrahimi, M Tushev, A Mahmoud - Information and Software Technology, 2021 - Elsevier
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …

Privacy by designers: software developers' privacy mindset

I Hadar, T Hasson, O Ayalon, E Toch… - Empirical Software …, 2018 - Springer
Privacy by design (PbD) is a policy measure that guides software developers to apply
inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is …

Privacy requirements: present & future

P Anthonysamy, A Rashid… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Software systems are increasingly open, handle large amounts of personal or other
sensitive data and are intricately linked with the daily lives of individuals and communities …

Why developers cannot embed privacy into software systems? An empirical investigation

A Senarath, NAG Arachchilage - Proceedings of the 22nd International …, 2018 - dl.acm.org
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …

[PDF][PDF] Contextual integrity through the lens of computer science

S Benthall, S Gürses, H Nissenbaum - Foundations and Trends® in …, 2017 - sbenthall.net
The theory of Privacy as Contextual Integrity (CI) defines privacy as appropriate information
flow according to norms specific to social contexts or spheres. CI has had uptake in different …

Us and them: a study of privacy requirements across North America, Asia, and Europe

S Sheth, G Kaiser, W Maalej - … of the 36th International Conference on …, 2014 - dl.acm.org
Data privacy when using online systems like Facebook and Amazon has become an
increasingly popular topic in the last few years. However, only a little is known about how …

Empirical evaluation of a privacy-focused threat modeling methodology

K Wuyts, R Scandariato, W Joosen - Journal of Systems and Software, 2014 - Elsevier
Privacy is a key issue in today's society. Software systems handle more and more sensitive
information concerning citizens. It is important that such systems are privacy-friendly by …

Integrating security and privacy in HCD-scrum

M Teresa Baldassarre, V Santa Barletta… - Proceedings of the 14th …, 2021 - dl.acm.org
Nowadays, software development must face the challenge of integrating security and
privacy elements from the earliest stages of any software development process. A correct …

Run-time threat models for systematic and continuous risk assessment

S Verreydt, DV Landuyt, W Joosen - Software and Systems Modeling, 2024 - Springer
Threat modeling involves systematically assessing the likelihood and potential impact of
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …

Understanding user privacy expectations: A software developer's perspective

AR Senarath, NAG Arachchilage - Telematics and Informatics, 2018 - Elsevier
Software developers are trained to develop and design software applications that provide
services to users. However, software applications sometimes collect users' data without their …