{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:36:54Z","timestamp":1772642214961,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100023890","name":"Technische Universit\u00e4t Hamburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100023890","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Stack Overflow (SO) is a popular platform among developers seeking advice on various software-related topics, including privacy and security. As for many knowledge-sharing websites, the value of SO depends largely on users\u2019 engagement, namely their willingness to answer, comment or post\u00a0technical questions. Still, many of these questions (including cybersecurity-related ones) remain unanswered, putting the site\u2019s relevance and reputation into jeopardy. Hence, it is important to understand users\u2019 participation in privacy and security discussions to promote engagement and foster the exchange of such expertise. <jats:italic>Objective<\/jats:italic>:\u00a0Based on prior findings on online social networks, this work elaborates on the interplay between users\u2019 engagement and their privacy practices in SO. Particularly, it analyses developers\u2019 self-disclosure behaviour regarding profile visibility and their involvement in discussions related to privacy and security. <jats:italic>Method<\/jats:italic>:\u00a0We followed a mixed-methods approach by (i) analysing SO data from 1239 cybersecurity-tagged questions along with 7048 user profiles, and (ii) conducting an anonymous online survey (N=64). <jats:italic>Results<\/jats:italic>:\u00a0About 33% of the questions we retrieved had no answer, whereas more than 50% had no accepted answer. We observed that <jats:italic>proactive<\/jats:italic> users tend to disclose significantly less information in their profiles than <jats:italic>reactive<\/jats:italic> and <jats:italic>unengaged<\/jats:italic> ones. However, no correlations were found between these engagement categories and privacy-related constructs such as <jats:italic>perceived control<\/jats:italic> or <jats:italic>general privacy concerns<\/jats:italic>. <jats:italic>Implications<\/jats:italic>:\u00a0These findings contribute to (i) a better understanding of developers\u2019 engagement towards privacy and security topics, and (ii) to shape strategies promoting the exchange of cybersecurity expertise in SO.<\/jats:p>","DOI":"10.1007\/s13278-023-01171-z","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T07:02:43Z","timestamp":1703228563000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour"],"prefix":"10.1007","volume":"14","author":[{"given":"Nicol\u00e1s E.","family":"D\u00edaz Ferreyra","sequence":"first","affiliation":[]},{"given":"Melina","family":"Vidoni","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"1171_CR1","doi-asserted-by":"crossref","unstructured":"Acar Y, Fahl S, Mazurek ML (2016) You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In: Cybersecurity Development, pp 3\u20138. IEEE, Boston, MA, USA","DOI":"10.1109\/SecDev.2016.013"},{"key":"1171_CR2","doi-asserted-by":"crossref","unstructured":"Adaji I, Vassileva J (2016) Towards Understanding User Participation in Stack Overflow Using Profile Data. In: International Conference on Social Informatics, pp 3\u201313. Springer, USA","DOI":"10.1007\/978-3-319-47874-6_1"},{"issue":"2","key":"1171_CR3","first-page":"190","volume":"52","author":"A Ahmad","year":"2018","unstructured":"Ahmad A, Feng C, Ge S, Yousif A (2018) A survey on mining stack overflow: question and answering (Q&A) community. Data Technol Appl 52(2):190\u2013247","journal-title":"Data Technol Appl"},{"issue":"1","key":"1171_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-017-0091-8","volume":"7","author":"T Ahmed","year":"2017","unstructured":"Ahmed T, Srivastava A (2017) Understanding and evaluating the behavior of technical users: a study of developer interaction at StackOverflow. Human-Centric Comput Inf Sci 7(1):1\u201318","journal-title":"Human-Centric Comput Inf Sci"},{"key":"1171_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.3389\/frai.2019.00026","volume":"2","author":"E A\u00efmeur","year":"2019","unstructured":"A\u00efmeur E, Diaz Ferreyra NE, Hage H (2019) Manipulation and malicious personalization: Exploring the self-disclosure biases exploited by deceptive attackers on social media. Front Artif Intell 2:26","journal-title":"Front Artif Intell"},{"key":"1171_CR6","unstructured":"Assal H, Chiasson S (2018) Motivations and amotivations for software security. SOUPS Workshop on Security Information Workers (WSIW). USENIX Association. USENIX Association, USA, pp 1\u201312"},{"key":"1171_CR7","doi-asserted-by":"crossref","unstructured":"Assal H, Chiasson S (2019) \u2018Think secure from the beginning\u2019 A Survey with Software Developers. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp 1\u201313","DOI":"10.1145\/3290605.3300519"},{"key":"1171_CR8","doi-asserted-by":"crossref","unstructured":"Baltes S, Diehl S (2016) Worse than spam: Issues in sampling software developers. In: Proceedings of the 10th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp 1\u20136","DOI":"10.1145\/2961111.2962628"},{"issue":"4","key":"1171_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10072-8","volume":"27","author":"S Baltes","year":"2022","unstructured":"Baltes S, Ralph P (2022) Sampling in software engineering research: a critical review and guidelines. Empir Softw Eng 27(4):1\u201331","journal-title":"Empir Softw Eng"},{"issue":"2","key":"1171_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1002\/asi.20459","volume":"58","author":"T Buchanan","year":"2007","unstructured":"Buchanan T, Paine C, Joinson AN, Reips U-D (2007) Development of measures of online privacy concern and protection for use on the Internet. J Am Soc Inf Sci Technol 58(2):157\u2013165","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"8","key":"1171_CR11","doi-asserted-by":"publisher","first-page":"2289","DOI":"10.1016\/j.tele.2018.09.009","volume":"35","author":"TR Choi","year":"2018","unstructured":"Choi TR, Sung Y (2018) Instagram versus snapchat: self-expression and privacy concern on social media. Telemat inform 35(8):2289\u20132298","journal-title":"Telemat inform"},{"issue":"5","key":"1171_CR12","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1177\/0165551515590096","volume":"41","author":"AY Chua","year":"2015","unstructured":"Chua AY, Banerjee S (2015) Answers or no answers: studying question answerability in stack overflow. J Inf Sci 41(5):720\u2013731","journal-title":"J Inf Sci"},{"key":"1171_CR13","unstructured":"European Comission (2021) Proposal for a Regulation Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act). European Comission"},{"key":"1171_CR14","doi-asserted-by":"crossref","unstructured":"Fischer F, B\u00f6ttinger K, Xiao H, Stransky C, Acar Y, Backes M, Fahl S (2017) Stack Overflow Considered Harmful? The Impact of Copy &Paste on Android Application Security. In: Symposium on Security and Privacy (SP), pp 121\u2013136. IEEE, USA","DOI":"10.1109\/SP.2017.31"},{"key":"1171_CR15","doi-asserted-by":"crossref","unstructured":"Ford D, Harkins A, Parnin C (2017) Someone like me: How does peer parity influence participation of women on Stack Overflow? In: 2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp 239\u2013243. IEEE","DOI":"10.1109\/VLHCC.2017.8103473"},{"issue":"1","key":"1171_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3412845","volume":"30","author":"Z Gao","year":"2020","unstructured":"Gao Z, Xia X, Lo D, Grundy J (2020) Technical Q &A site answer recommendation via question boosting. ACM Trans Softw Eng Methodol (TOSEM) 30(1):1\u201334","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"1171_CR17","unstructured":"Garson GD (2012) Testing Statistical Assumptions. Statistical Publishing Associates, Asheboro, NC 27205 USA"},{"key":"1171_CR18","unstructured":"Garson GD (2014) Logistic Regression: Binary and Multinomial. Statistical Publishing Associates, Asheboro, NC 27205 USA"},{"key":"1171_CR19","unstructured":"Gliem JA, Gliem RR (2003) Calculating, interpreting, and reporting Cronbach\u2019s alpha reliability coefficient for Likert-type scales. In: 2003 Midwest Research to Practice Conference in Adult, Continuing, and Community Education"},{"issue":"1","key":"1171_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10664-017-9517-1","volume":"23","author":"I Hadar","year":"2018","unstructured":"Hadar I, Hasson T, Ayalon O, Toch E, Birnhack M, Sherman S, Balissa A (2018) Privacy by designers: software developers\u2019 privacy mindset. Empir Softw Eng 23(1):259\u2013289","journal-title":"Empir Softw Eng"},{"key":"1171_CR21","doi-asserted-by":"crossref","unstructured":"He J, Xu B, Yang Z, Han D, Yang C, Lo D (2022) Ptm4tag: sharpening tag recommendation of stack overflow posts with pre-trained models. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, pp 1\u201311","DOI":"10.1145\/3524610.3527897"},{"key":"1171_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260","volume":"107","author":"M Jozani","year":"2020","unstructured":"Jozani M, Ayaburi E, Ko M, Choo K-KR (2020) Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective. Comput Human Behav 107:106260","journal-title":"Comput Human Behav"},{"key":"1171_CR23","doi-asserted-by":"crossref","unstructured":"Kayes I, Kourtellis N, Bonchi F, Iamnitchi A (2015) Privacy Concerns vs. User Behavior in Community Question Answering. In: 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 681\u2013688. IEEE, Boston, MA, USA. IEEE","DOI":"10.1145\/2808797.2809422"},{"key":"1171_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.copsyc.2019.08.003","volume":"31","author":"NC Kr\u00e4mer","year":"2020","unstructured":"Kr\u00e4mer NC, Sch\u00e4wel J (2020) Mastering the challenge of balancing self-disclosure and privacy in social media. Curr Opin Psychol 31:67\u201371","journal-title":"Curr Opin Psychol"},{"issue":"1","key":"1171_CR25","first-page":"39","volume":"2","author":"H Krasnova","year":"2009","unstructured":"Krasnova H, G\u00fcnther O, Spiekermann S, Koroleva K (2009) Privacy concerns and identity in online social networks. Identity Inf Soc 2(1):39\u201363","journal-title":"Identity Inf Soc"},{"issue":"2","key":"1171_CR26","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1111\/apps.12108","volume":"67","author":"FYH Kung","year":"2018","unstructured":"Kung FYH, Kwok N, Brown DJ (2018) Are attention check questions a threat to scale validity? Appl Psychol 67(2):264\u2013283","journal-title":"Appl Psychol"},{"key":"1171_CR27","doi-asserted-by":"crossref","unstructured":"Lopez T, Tun T, Bandara A, Mark L, Nuseibeh B, Sharp H (2019) An Anatomy of Security Conversations in Stack Overflow. In: 41st International Conference on Software Engineering: Software Engineering in Society, pp 31\u201340. IEEE\/ACM, Canada","DOI":"10.1109\/ICSE-SEIS.2019.00012"},{"key":"1171_CR28","doi-asserted-by":"crossref","unstructured":"Lopez T, Tun TT, Bandara A, Levine M, Nuseibeh B, Sharp H (2018) An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement. In: 1st International Workshop on Security Awareness from Design to Deployment. SEAD \u201918. ACM, USA, pp 26\u201332","DOI":"10.1145\/3194707.3194713"},{"issue":"3","key":"1171_CR29","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the Kappa statistic. Biochem Med 22(3):276\u2013282","journal-title":"Biochem Med"},{"issue":"6","key":"1171_CR30","doi-asserted-by":"publisher","first-page":"0253010","DOI":"10.1371\/journal.pone.0253010","volume":"16","author":"I Moutidis","year":"2021","unstructured":"Moutidis I, Williams HT (2021) Community evolution on stack overflow. Plos one 16(6):0253010","journal-title":"Plos one"},{"key":"1171_CR31","doi-asserted-by":"crossref","unstructured":"Oliveira N, Muller M, Andrade N, Reinecke K (2018) The exchange in StackExchange: Divergences between Stack Overflow and its culturally diverse participants. In: Proceedings of the ACM on Human-Computer Interaction 2(CSCW), 1\u201322","DOI":"10.1145\/3274399"},{"issue":"1\u201388","key":"1171_CR32","first-page":"294","volume":"59","author":"E Parliament","year":"2016","unstructured":"Parliament E (2016) of the Council: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46. Official Journal of the European Union (OJ) 59(1\u201388):294 (European Comission)","journal-title":"Official Journal of the European Union (OJ)"},{"key":"1171_CR33","doi-asserted-by":"publisher","unstructured":"Ross A, Willson VL (2017) Independent Samples T-Test, pp 21\u201324. SensePublishers, Rotterdam. https:\/\/doi.org\/10.1007\/978-94-6351-086-8_5","DOI":"10.1007\/978-94-6351-086-8_5"},{"key":"1171_CR34","doi-asserted-by":"publisher","unstructured":"Ross A, Willson VL (2017b) One-Way Anova, pp 21\u201324. SensePublishers, Rotterdam. https:\/\/doi.org\/10.1007\/978-94-6351-086-8_5","DOI":"10.1007\/978-94-6351-086-8_5"},{"key":"1171_CR35","unstructured":"Sch\u00e4wel J (Nov 2019) How to raise users\u2019 awareness of online privacy. PhD thesis, University of Duisburg-Essen"},{"key":"1171_CR36","doi-asserted-by":"crossref","unstructured":"Seamons K (2022) Privacy-Enhancing Technologies. In: Modern Socio-Technical Perspectives on Privacy, pp 149\u2013170. Springer, Cham","DOI":"10.1007\/978-3-030-82786-1_8"},{"key":"1171_CR37","doi-asserted-by":"crossref","unstructured":"Senarath A, Arachchilage NAG (2018) Why Developers Cannot Embed Privacy into Software Systems? An Empirical Investigation. In: 22nd International Conference on Evaluation and Assessment in Software Engineering 2018, pp 211\u2013216. ACM, USA","DOI":"10.1145\/3210459.3210484"},{"key":"1171_CR38","doi-asserted-by":"crossref","unstructured":"Sengupta S, Haythornthwaite C (2020) Learning with comments: An analysis of comments and community on Stack Overflow. In: Proceedings of the 53rd Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2020.354"},{"key":"1171_CR39","doi-asserted-by":"crossref","unstructured":"Sirur S, Nurse JRC, Webb H (2018) Are we there yet? understanding the challenges faced in complying with the general data protection regulation (gdpr). In: 2nd International Workshop on Multimedia Privacy and Security. MPS \u201918. ACM, USA, pp 88\u201395","DOI":"10.1145\/3267357.3267368"},{"key":"1171_CR40","unstructured":"StackExchange: Stack Overflow Statistics. https:\/\/stackexchange.com\/sites"},{"key":"1171_CR41","unstructured":"StackExchange: How Many Developers Visit Stack Overflow? https:\/\/stackoverflow.co\/advertising\/audience\/"},{"key":"1171_CR42","unstructured":"StackOverflow: Stack Overflow Tag Explorer. https:\/\/stackoverflow.com\/tags"},{"key":"1171_CR43","unstructured":"StackOverflow: Stack Overflow Tag Explorer. https:\/\/stackoverflow.com\/help\/privileges\/suggest-tag-synonyms"},{"key":"1171_CR44","unstructured":"StackOverflow: Stack Overflow - Where Developers Learn, Share, and Build Careers. https:\/\/stackoverflow.com"},{"key":"1171_CR45","unstructured":"StackOverflow: The Overflow - Essays, Opinions, and Advice on the Act of Computer Programming from Stack Overflow. https:\/\/stackoverflow.blog"},{"key":"1171_CR46","doi-asserted-by":"publisher","unstructured":"Staddon J, Huffaker D, Brown L, Sedley A (2012) Are Privacy Concerns a Turn-off? Engagement and Privacy in Social Networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. SOUPS \u201912. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2335356.2335370","DOI":"10.1145\/2335356.2335370"},{"key":"1171_CR47","doi-asserted-by":"crossref","unstructured":"Tahaei M, Frik A, Vaniea K (2021) Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. In: Conference on Human Factors in Computing Systems, pp 1\u201315. ACM, USA","DOI":"10.1145\/3411764.3445768"},{"key":"1171_CR48","doi-asserted-by":"crossref","unstructured":"Tahaei M, Vaniea K, Saphra N (2020) Understanding Privacy-Related Questions on Stack Overflow. In: Conference on Human Factors in Computing Systems, pp 1\u201314. ACM, USA","DOI":"10.1145\/3313831.3376768"},{"issue":"2","key":"1171_CR49","first-page":"114","volume":"2022","author":"M Tahaei","year":"2022","unstructured":"Tahaei M, Li T, Vaniea K (2022) Understanding privacy-related advice on stack overflow. Proc Priv Enhanc Technol 2022(2):114\u2013131","journal-title":"Proc Priv Enhanc Technol"},{"issue":"7","key":"1171_CR50","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1080\/0144929X.2018.1474251","volume":"37","author":"AW Vargo","year":"2018","unstructured":"Vargo AW, Matsubara S (2018) Identity and performance in technical Q &A. Behav Inf Technol 37(7):658\u2013674","journal-title":"Behav Inf Technol"},{"key":"1171_CR51","doi-asserted-by":"crossref","unstructured":"Wang L, Wu B, Yang J, Peng S (2016) Personalized recommendation for new questions in community question answering. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp 901\u2013908. IEEE, Boston, MA, USA. IEEE","DOI":"10.1109\/ASONAM.2016.7752346"},{"key":"1171_CR52","doi-asserted-by":"crossref","unstructured":"Whitworth B, Ahmad A, Soegaard M, Dam R (2006) Encyclopedia of Human Computer Interaction. von C. Ghaoui. Hershey: Idea Group Reference. Kap. Socio-technical systems 1(1):533\u2013541","DOI":"10.4018\/978-1-59140-562-7.ch079"},{"key":"1171_CR53","doi-asserted-by":"crossref","unstructured":"Yang J, Tao K, Bozzon A, Houben G-J (2014) Sparrows and Owls: Characterisation of Expert Behaviour in Stack Overflow. In: International Conference on User Modeling. Adaptation, and Personalization. Springer, Denmark, pp 266\u2013277","DOI":"10.1007\/978-3-319-08786-3_23"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01171-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-023-01171-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01171-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T14:11:33Z","timestamp":1740492693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-023-01171-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1171"],"URL":"https:\/\/doi.org\/10.1007\/s13278-023-01171-z","relation":{},"ISSN":["1869-5469"],"issn-type":[{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"28 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"16"}}