{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:17:43Z","timestamp":1769282263599,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FL190100035"],"award-info":[{"award-number":["FL190100035"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3756681.3757035","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:04Z","timestamp":1766565004000},"page":"684-689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["How Are We Doing With Using AI-Based Programming Assistants For Privacy-Related Code Generation? The Developers' Experience"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1363-8786","authenticated-orcid":false,"given":"Kashumi","family":"Madampe","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4928-7076","authenticated-orcid":false,"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9192-0993","authenticated-orcid":false,"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2017.3"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"David\u00a0L Baumer Julia\u00a0B Earp and JC Poindexter. 2004. Internet privacy law: a comparison between the United States and the European Union. Computers & Security 23 5 (2004) 400\u2013412.","DOI":"10.1016\/j.cose.2003.11.001"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Christian Bird Denae Ford Thomas Zimmermann Nicole Forsgren Eirini Kalliamvakou Travis Lowdermilk and Idan Gazit. 2023. Taking Flight with Copilot. Commun. ACM 66 6 (2023). 10.1145\/3589996","DOI":"10.1145\/3589996"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Javier C\u00e1mara Javier Troya Lola Burgue\u00f1o and Antonio Vallecillo. 2023. On the assessment of generative AI in modeling tasks: an experience report with ChatGPT and UML. Software and Systems Modeling 22 3 (2023). 10.1007\/s10270-023-01105-5","DOI":"10.1007\/s10270-023-01105-5"},{"key":"e_1_3_3_2_6_2","unstructured":"Ruijia Cheng Ruotong Wang Thomas Zimmermann Microsoft Research and Denae Ford. 2022. \"It would work for me too\": How Online Communities Shape Software Developers\u2019 Trust in AI-Powered Code Generation Tools. (12 2022). https:\/\/arxiv.org\/abs\/2212.03491v2"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Zack Delile Sean Radel Joe Godinez Garrett Engstrom Theo Brucker Kenzie Young and Sepideh Ghanavati. 2023. Evaluating Privacy Questions From Stack Overflow: Can ChatGPT Compete? (6 2023). https:\/\/arxiv.org\/abs\/2306.11174v1","DOI":"10.1109\/REW57809.2023.00048"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00106"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00055"},{"key":"e_1_3_3_2_10_2","unstructured":"General Data Protection Regulation. [n. d.]. Art. 4 GDPR Definitions. https:\/\/gdpr-info.eu\/art-4-gdpr\/"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Maanak Gupta CharanKumar Akiri Kshitiz Aryal Eli Parker and Lopamudra Praharaj. 2023. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access (2023).","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Fatima Hussain Rasheed Hussain Brett Noye and Salah Sharieh. 2020. Enterprise API security and GDPR compliance: Design and implementation perspective. IT professional 22 5 (2020) 81\u201389.","DOI":"10.1109\/MITP.2020.2973852"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion55297.2022.9793778"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544902.3546234"},{"key":"e_1_3_3_2_15_2","unstructured":"Jenny\u00a0T. Liang Chenyang Yang and Brad\u00a0A. Myers. 2023. Understanding the Usability of AI Programming Assistants. (3 2023)."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Arghavan Moradi\u00a0Dakhel Vahid Majdinasab Amin Nikanjam Foutse Khomh Michel\u00a0C. Desmarais and Zhen Ming\u00a0(Jack) Jiang. 2023. GitHub Copilot AI pair programmer: Asset or Liability? Journal of Systems and Software 203 (2023). 10.1016\/j.jss.2023.111734","DOI":"10.1016\/j.jss.2023.111734"},{"key":"e_1_3_3_2_17_2","unstructured":"Hussein Mozannar Gagan Bansal Adam Fourney and Eric Horvitz. 2022. Reading Between the Lines: Modeling User Behavior and Costs in AI-Assisted Programming. (10 2022)."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528470"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.22"},{"key":"e_1_3_3_2_20_2","first-page":"315","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Oliveira Daniela\u00a0Seabra","year":"2018","unstructured":"Daniela\u00a0Seabra Oliveira, Tian Lin, Muhammad\u00a0Sajidur Rahman, Rad Akefirad, Donovan Ellis, Eliany Perez, Rahul Bobhate, Lois\u00a0A DeLong, Justin Cappos, and Yuriy Brun. 2018. { API} blindspots: Why experienced developers write vulnerable code. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 315\u2013328."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Hammond Pearce Baleegh Ahmad Benjamin Tan Brendan Dolan-Gavitt and Ramesh Karri. 2022. Asleep at the Keyboard? Assessing the Security of GitHub Copilot\u2019s Code Contributions. Proceedings - IEEE Symposium on Security and Privacy 2022-May (2022) 754\u2013768. 10.1109\/SP46214.2022.9833571","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"e_1_3_3_2_22_2","unstructured":"Sida Peng Eirini Kalliamvakou Peter Cihon and Mert Demirer. 2023. The Impact of AI on Developer Productivity: Evidence from GitHub Copilot. (2 2023)."},{"key":"e_1_3_3_2_23_2","unstructured":"Advait Sarkar Andrew\u00a0D. Gordon Carina Negreanu Christian Poelitz Sruti\u00a0Srinivasa Ragavan and Ben Zorn. 2022. What is it like to program with artificial intelligence? (8 2022)."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2019.00034"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Awanthika Senarath and Nalin\u00a0A.G. Arachchilage. 2018. Why developers cannot embed privacy into software systems?: An empirical investigation. ACM International Conference Proceeding Series Part F1377 (6 2018). 10.1145\/3210459.3210484","DOI":"10.1145\/3210459.3210484"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Awanthika Senarath and Nalin Asanka\u00a0Gamagedara Arachchilage. 2019. A data minimization model for embedding privacy into software systems. Computers and Security 87 (2019). 10.1016\/j.cose.2019.101605","DOI":"10.1016\/j.cose.2019.101605"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Awanthika\u00a0R Senarath and Nalin Asanka\u00a0Gamagedara Arachchilage. 2018. Understanding user privacy expectations: A software developer\u2019s perspective. Telematics and Informatics 35 7 (10 2018) 1845\u20131862. 10.1016\/J.TELE.2018.05.012","DOI":"10.1016\/J.TELE.2018.05.012"},{"key":"e_1_3_3_2_28_2","volume-title":"Basics of qualitative research techniques.","author":"Strauss Anselm","year":"1998","unstructured":"Anselm Strauss and Juliet Corbin. 1998. Basics of qualitative research techniques."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Ningzhi Tang Meng Chen Zheng Ning Aakash Bansal Yu Huang Collin McMillan and Toby Jia-Jun Li. 2023. An Empirical Study of Developer Behaviors for Validating and Repairing AI-Generated Code. (9 2023). 10.1184\/R1\/22223533.v1","DOI":"10.1184\/R1\/22223533.v1"},{"key":"e_1_3_3_2_30_2","unstructured":"Haoye Tian Weiqi Lu Tsz\u00a0On Li Xunzhu Tang Shing-Chi Cheung Jacques Klein and Tegawend\u00e9\u00a0F. Bissyand\u00e9. 2023. Is ChatGPT the Ultimate Programming Assistant \u2013 How far is it? (4 2023)."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519665"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3558489.3559072"}],"event":{"name":"EASE '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE '25"},"container-title":["Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756681.3757035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:42:00Z","timestamp":1766565720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756681.3757035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":31,"alternative-id":["10.1145\/3756681.3757035","10.1145\/3756681"],"URL":"https:\/\/doi.org\/10.1145\/3756681.3757035","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}