{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:57:10Z","timestamp":1773385030881,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Not applicable","award":["Not applicable"],"award-info":[{"award-number":["Not applicable"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00779-021-01544-1","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T12:17:42Z","timestamp":1620044262000},"page":"879-892","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["I\u2019m all ears! Listening to software developers on putting GDPR principles into software development practice"],"prefix":"10.1007","volume":"25","author":[{"given":"Abdulrahman","family":"Alhazmi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0059-0376","authenticated-orcid":false,"given":"Nalin Asanka Gamagedara","family":"Arachchilage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"key":"1544_CR1","doi-asserted-by":"crossref","unstructured":"Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science. IEEE, pp 693\u2013702","DOI":"10.1109\/CloudCom.2010.66"},{"key":"1544_CR2","doi-asserted-by":"crossref","unstructured":"Van Kleek M, Liccardi I, Binns R, Zhao J, Weitzner DJ, Shadbolt N (2017) Better the devil you know: exposing the data sharing practices of smart phone apps. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp 5208\u20135220","DOI":"10.1145\/3025453.3025556"},{"issue":"1","key":"1544_CR3","first-page":"3554","volume":"1","author":"S Schwerin","year":"2018","unstructured":"Schwerin S (2018) Blockchain and privacy protection in the case of the European general data protection regulation (GDPR): a Delphi study. J Br Blockchain Asso 1(1):3554","journal-title":"J Br Blockchain Asso"},{"key":"1544_CR4","unstructured":"Pandit HJ, O\u2019Sullivan D, Lewis D (2018) GDPR data interoperability model. In 23rd EURAS Annual Standardisation Conference, Dublin, Ireland"},{"issue":"1","key":"1544_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1080\/0960085X.2018.1497929","volume":"28","author":"L Kappelman","year":"2019","unstructured":"Kappelman L, Johnson V, Torres R, Maurer C, McLean E (2019) A study of information systems issues, practices, and leadership in Europe. Eur J Inf Syst 28(1):26\u201342 Page 5074","journal-title":"Eur J Inf Syst"},{"key":"1544_CR6","doi-asserted-by":"crossref","unstructured":"Rajendran DPD, Rangaraja PS (2020) An e-ADR (elaborated action design research) approach towards game-based learning in cybersecurity incident detection and handling. In Proceedings of the 53rd Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2020.623"},{"key":"1544_CR7","doi-asserted-by":"crossref","unstructured":"Khan NA, Brohi SN, Zaman N (2020) Ten deadly cyber security threats amid COVID-19 pandemic","DOI":"10.36227\/techrxiv.12278792.v1"},{"key":"1544_CR8","unstructured":"Over 1\/3 of professionals are worried Zoom compromised their information. (2020, April 10). Blind Blog - Workplace Insights. https:\/\/www.teamblind.com\/blog\/index.php\/2020\/04\/10\/over-1-3-of-professionals-are-worried-zoom-compromised-their-information\/"},{"issue":"2","key":"1544_CR9","doi-asserted-by":"publisher","first-page":"205395172093809","DOI":"10.1177\/2053951720938091","volume":"7","author":"M Hu","year":"2020","unstructured":"Hu M (2020) Cambridge Analytica\u2019s black box. Big Data Soc 7(2):2053951720938091","journal-title":"Big Data Soc"},{"key":"1544_CR10","doi-asserted-by":"crossref","unstructured":"Senarath A, Arachchilage NA (2018) Why developers cannot embed privacy into software systems? An empirical investigation. In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, pp 211\u2013216","DOI":"10.1145\/3210459.3210484"},{"key":"1544_CR11","unstructured":"Schwab PK, Matschinske JO, Wahl AM, Meyer-Wegener K (2018) Towards query-driven data minimization. In LWDA, pp 335\u2013338"},{"key":"1544_CR12","doi-asserted-by":"publisher","first-page":"287","DOI":"10.21552\/EDPL\/2016\/3\/4","volume":"2","author":"JP Albrecht","year":"2016","unstructured":"Albrecht JP (2016) How the GDPR will change the world. Eur Data Prot L Rev 2:287\u2013289","journal-title":"Eur Data Prot L Rev"},{"issue":"4","key":"1544_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3364224","volume":"22","author":"A Senarath","year":"2019","unstructured":"Senarath A, Grobler M, Arachchilage NAG (2019) Will they use it or not? Investigating software developers\u2019 intention to follow privacy engineering methodologies. ACM Trans Privacy Secur (TOPS) 22(4):1\u201330","journal-title":"ACM Trans Privacy Secur (TOPS)"},{"key":"1544_CR14","first-page":"22","volume":"17","author":"C Cadwalladr","year":"2018","unstructured":"Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian 17:22","journal-title":"The Guardian"},{"key":"1544_CR15","doi-asserted-by":"crossref","unstructured":"Wachter S (2018) GDPR and the internet of things: guidelines to protect users\u2019 identity and privacy. Tillg\u00e4nglig online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm","DOI":"10.2139\/ssrn.3130392"},{"key":"1544_CR16","first-page":"1231","volume":"66","author":"LJ Trautman","year":"2016","unstructured":"Trautman LJ, Ormerod PC (2016) Corporate directors\u2019 and officers\u2019 cybersecurity standard of care: the Yahoo data breach. Am UL Rev 66:1231","journal-title":"Am UL Rev"},{"key":"1544_CR17","unstructured":"Li ZS, Werner C, Ernst N, Damian D (2020) GDPR compliance in the context of continuous integration. arXiv preprint arXiv:2002.06830"},{"key":"1544_CR18","doi-asserted-by":"crossref","unstructured":"Wijayarathna C, Grobler M, Arachchilage NA (2019) Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability. Behav Inform Technol 1\u201322","DOI":"10.1080\/0144929X.2019.1705393"},{"key":"1544_CR19","doi-asserted-by":"publisher","first-page":"101605","DOI":"10.1016\/j.cose.2019.101605","volume":"87","author":"A Senarath","year":"2019","unstructured":"Senarath A, Arachchilage NAG (2019) A data minimization model for embedding privacy into software systems. Comput Secu 87:101605","journal-title":"Comput Secu"},{"key":"1544_CR20","unstructured":"Senarath A, Arachchilage NAG (2018) Understanding software developers\u2019 approach towards implementing data minimization, The 4th Workshop on Security Information Workers (WSIW), 14th Symposium on Usability, Privacy, and Security (SOUPS \u201818), USENIX, on August 12 - 14, 2018, Baltimore, MD, USA"},{"issue":"2","key":"1544_CR21","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s12394-010-0055-x","volume":"3","author":"P Schaar","year":"2010","unstructured":"Schaar P (2010) Privacy by design. Identity Inf Soc 3(2):267\u2013274","journal-title":"Identity Inf Soc"},{"issue":"10","key":"1544_CR22","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1093\/comjnl\/bxu101","volume":"58","author":"T Takahashi","year":"2015","unstructured":"Takahashi T, Kadobayashi Y (2015) Reference ontology for cybersecurity operational information. Comput J 58(10):2297\u20132312","journal-title":"Comput J"},{"key":"1544_CR23","unstructured":"van der Linden D, Hadar I, Edwards M, Rashid A Data, data, everywhere: quantifying software developers\u2019 privacy attitudes."},{"issue":"3","key":"1544_CR24","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1080\/01972243.2019.1583296","volume":"35","author":"K Bednar","year":"2019","unstructured":"Bednar K, Spiekermann S, Langheinrich M (2019) Engineering privacy by design: are engineers ready to live up to the challenge? Inf Soc 35(3):122\u2013142","journal-title":"Inf Soc"},{"key":"1544_CR25","unstructured":"Danezis G, Domingo-Ferrer J, Hansen M, Hoepman JH, Metayer DL, Tirtea R, Schiffner S (2015) Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726"},{"key":"1544_CR26","doi-asserted-by":"crossref","unstructured":"Ayalon O, Toch E, Hadar I, Birnhack M (2017) How developers make design decisions about users\u2019 privacy: the place of professional communities and organizational climate. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp 135\u2013138","DOI":"10.1145\/3022198.3026326"},{"issue":"1","key":"1544_CR27","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10664-017-9517-1","volume":"23","author":"I Hadar","year":"2018","unstructured":"Hadar I, Hasson T, Ayalon O, Toch E, Birnhack M, Sherman S, Balissa A (2018) Privacy by designers: software developers\u2019 privacy mindset. Empir Softw Eng 23(1):259\u2013289","journal-title":"Empir Softw Eng"},{"key":"1544_CR28","doi-asserted-by":"crossref","unstructured":"Sheth S, Kaiser G, Maalej W (2014) Us and them: a study of privacy requirements across North America, Asia, and Europe. In Proceedings of the 36th International Conference on Software Engineering, pp 859\u2013870","DOI":"10.1145\/2568225.2568244"},{"key":"1544_CR29","doi-asserted-by":"crossref","unstructured":"Ayala-Rivera V, Pasquale L (2018) The grace period has ended: an approach to operationalize GDPR requirements. In 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, pp 136\u2013146","DOI":"10.1109\/RE.2018.00023"},{"key":"1544_CR30","doi-asserted-by":"crossref","unstructured":"Smith M, Dehlinger J (2014) Enabling static security vulnerability analysis in PHP applications for novice developers with SSVChecker. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, pp 278\u2013283","DOI":"10.1145\/2663761.2664213"},{"key":"1544_CR31","unstructured":"Shiralkar T, Grove B (2009) Guidelines for secure coding. atsec information security corporation, Technical Report"},{"key":"1544_CR32","doi-asserted-by":"crossref","unstructured":"Amaratunga D, Baldry D, Sarshar M, Newton R (2002) Quantitative and qualitative research in the built environment: application of \u201cmixed\u201d research approach. Work study","DOI":"10.1108\/00438020210415488"},{"issue":"e1","key":"1544_CR33","doi-asserted-by":"publisher","first-page":"e55","DOI":"10.1093\/jamia\/ocw100","volume":"24","author":"R Khajouei","year":"2017","unstructured":"Khajouei R, Zahiri Esfahani M, Jahani Y (2017) Comparison of heuristic and cognitive walkthrough usability evaluation methods for evaluating health information systems. J Am Med Inform Assoc 24(e1):e55\u2013e60","journal-title":"J Am Med Inform Assoc"},{"key":"1544_CR34","unstructured":"The 2020 stack overflow developer survey\u201365,000 Devs share their salaries, top programming languages, and more. (2020, May 29). freeCodeCamp.org. https:\/\/www.freecodecamp.org\/news\/stack-overflow-developer-survey-2020-programming-language-framework-salary-data\/"},{"key":"1544_CR35","doi-asserted-by":"crossref","unstructured":"Gong Y, Liu X (2001) Generic text summarization using relevance measure and latent semantic analysis. In Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval, pp 19\u201325","DOI":"10.1145\/383952.383955"},{"key":"1544_CR36","doi-asserted-by":"crossref","unstructured":"Charmaz K, Belgrave LL (2007) Grounded theory. The Blackwell encyclopedia of sociology","DOI":"10.1002\/9781405165518.wbeosg070"},{"key":"1544_CR37","doi-asserted-by":"crossref","unstructured":"Gasson S (2004) Rigor in grounded theory research: an interpretive perspective on generating theory from qualitative field studies. In The handbook of information systems research. IGI Global, pp 79\u2013102","DOI":"10.4018\/978-1-59140-144-5.ch006"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01544-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T08:50:51Z","timestamp":1744188651000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01544-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,1]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1544"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01544-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,1]]},"assertion":[{"value":"31 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}