{"id":"https://openalex.org/W4413531259","doi":"https://doi.org/10.32604/cmc.2025.068137","title":"Redefining the Programmer: Human-AI Collaboration, LLMs, and Security in Modern Software Engineering","display_name":"Redefining the Programmer: Human-AI Collaboration, LLMs, and Security in Modern Software Engineering","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413531259","doi":"https://doi.org/10.32604/cmc.2025.068137"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068137","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068137","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068137","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106689764","display_name":"Elyson De La Cruz","orcid":"https://orcid.org/0009-0006-5599-506X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Elyson De La Cruz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112472441","display_name":"Hanh Le","orcid":"https://orcid.org/0009-0007-8172-0809"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanh Le","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093821190","display_name":"Karthik Meduri","orcid":"https://orcid.org/0009-0007-6056-7577"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Karthik Meduri","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093821191","display_name":"Geeta Sandeep Nadella","orcid":"https://orcid.org/0000-0001-7126-5186"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Geeta Sandeep Nadella","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5018504651","display_name":"Hari Gonaygunta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hari Gonaygunta","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5106689764"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.4953,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94823516,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"85","issue":"2","first_page":"3569","last_page":"3582"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.926800012588501,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.926800012588501,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.8724478483200073},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4684460461139679},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42410755157470703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4132528305053711},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4097209870815277},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3675755262374878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29547345638275146},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15783077478408813},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14803224802017212},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.060715675354003906}],"concepts":[{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.8724478483200073},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4684460461139679},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42410755157470703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4132528305053711},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4097209870815277},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3675755262374878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29547345638275146},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15783077478408813},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14803224802017212},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.060715675354003906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.068137","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068137","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068137","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068137","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1976732164","https://openalex.org/W2578740911","https://openalex.org/W3045285896","https://openalex.org/W3091567686","https://openalex.org/W3094233077","https://openalex.org/W3128172745","https://openalex.org/W3159096324","https://openalex.org/W3190357239","https://openalex.org/W3198525581","https://openalex.org/W4210615033","https://openalex.org/W4285392457","https://openalex.org/W4321381797","https://openalex.org/W4386003176","https://openalex.org/W4386099272","https://openalex.org/W4398166765","https://openalex.org/W4399142562","https://openalex.org/W4400488941","https://openalex.org/W4401911562","https://openalex.org/W4403466452","https://openalex.org/W4403606135","https://openalex.org/W4405022523","https://openalex.org/W4406602186","https://openalex.org/W4406911631","https://openalex.org/W4406947263","https://openalex.org/W4407084737","https://openalex.org/W4408009987"],"related_works":["https://openalex.org/W2379153735","https://openalex.org/W2046172023","https://openalex.org/W2972896947","https://openalex.org/W2170146914","https://openalex.org/W2355105570","https://openalex.org/W2083974823","https://openalex.org/W2072751097","https://openalex.org/W4237177615","https://openalex.org/W2015567081","https://openalex.org/W2289257917"],"abstract_inverted_index":{"The":[0],"rapid":[1],"integration":[2],"of":[3,20,45,102,124,155,191],"artificial":[4],"intelligence":[5],"(AI)":[6],"into":[7,25,208],"software":[8,200,226],"development,":[9],"driven":[10],"by":[11,58,78],"large":[12],"language":[13],"models":[14],"(LLMs),":[15],"is":[16],"reshaping":[17],"the":[18,42,98,137,144,152,189,225],"role":[19],"programmers":[21],"from":[22],"traditional":[23],"coders":[24],"strategic":[26],"collaborators":[27],"within":[28],"Industry":[29],"4.0":[30],"ecosystems.":[31],"This":[32],"qualitative":[33],"study":[34,145],"employs":[35],"a":[36,53],"hermeneutic":[37],"phenomenological":[38],"approach":[39],"to":[40,75,118,218],"explore":[41],"lived":[43],"experiences":[44],"Information":[46],"Technology":[47],"(IT)":[48],"professionals":[49],"as":[50],"they":[51],"navigate":[52],"dynamic":[54],"technological":[55],"landscape":[56],"marked":[57],"intelligent":[59,216],"automation,":[60],"shifting":[61],"professional":[62],"identities,":[63],"and":[64,87,100,113,151,180,188,211,222],"emerging":[65],"ethical":[66,89],"concerns.":[67],"Findings":[68],"indicate":[69],"that":[70,106,183],"developers":[71,210],"are":[72],"actively":[73],"adapting":[74],"AI-augmented":[76],"environments":[77,161],"engaging":[79],"in":[80,160,199],"continuous":[81],"upskilling,":[82],"prompt":[83],"engineering,":[84],"interdisciplinary":[85],"collaboration,":[86],"heightened":[88],"awareness.":[90],"However,":[91],"participants":[92],"also":[93],"voiced":[94],"growing":[95],"concerns":[96],"about":[97],"reliability":[99],"security":[101],"AI-generated":[103],"code,":[104],"noting":[105],"these":[107],"tools":[108,164],"can":[109,213],"introduce":[110],"hidden":[111],"vulnerabilities":[112],"reduce":[114],"critical":[115],"engagement":[116],"due":[117],"automation":[119],"bias.":[120],"Many":[121],"described":[122],"instances":[123],"flawed":[125],"logic,":[126],"insecure":[127],"patterns,":[128],"or":[129],"syntactically":[130],"correct":[131],"but":[132],"contextually":[133],"inappropriate":[134],"suggestions,":[135],"underscoring":[136],"need":[138,174],"for":[139,175],"rigorous":[140],"human":[141,192],"oversight.":[142],"Additionally,":[143],"reveals":[146],"anxieties":[147],"around":[148],"job":[149],"displacement":[150],"gradual":[153],"erosion":[154],"fundamental":[156],"coding":[157],"skills,":[158],"particularly":[159],"where":[162],"AI":[163,195],"dominate":[165],"routine":[166],"development":[167,227],"tasks.":[168],"These":[169],"findings":[170],"highlight":[171],"an":[172],"urgent":[173],"educational":[176],"reforms,":[177],"industry":[178],"standards,":[179],"organizational":[181],"policies":[182],"prioritize":[184],"both":[185],"technical":[186],"robustness":[187],"preservation":[190],"expertise.":[193],"As":[194],"becomes":[196],"increasingly":[197],"embedded":[198],"engineering":[201],"workflows,":[202],"this":[203],"research":[204],"offers":[205],"timely":[206],"insights":[207],"how":[209],"organizations":[212],"responsibly":[214],"integrate":[215],"systems":[217],"promote":[219],"accountability,":[220],"resilience,":[221],"innovation":[223],"across":[224],"lifecycle.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
