{"id":"https://openalex.org/W7116130349","doi":"https://doi.org/10.48550/arxiv.2512.14756","title":"Examining Software Developers' Needs for Privacy Enforcing Techniques: A survey","display_name":"Examining Software Developers' Needs for Privacy Enforcing Techniques: A survey","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7116130349","doi":"https://doi.org/10.48550/arxiv.2512.14756"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.14756","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.14756","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.14756","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Theophilou, Ioanna","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Theophilou, Ioanna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Kapitsaki, Georgia M.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kapitsaki, Georgia M.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.7465000152587891,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.7465000152587891,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.05849999934434891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.03500000014901161,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.7111999988555908},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.6678000092506409},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6207000017166138},{"id":"https://openalex.org/keywords/privacy-law","display_name":"Privacy law","score":0.5825999975204468},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.46050000190734863},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4526999890804291},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43650001287460327},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4244000017642975}],"concepts":[{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.7111999988555908},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.6678000092506409},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6207000017166138},{"id":"https://openalex.org/C141972696","wikidata":"https://www.wikidata.org/wiki/Q1247836","display_name":"Privacy law","level":4,"score":0.5825999975204468},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5572999715805054},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5284000039100647},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.46050000190734863},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4526999890804291},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43650001287460327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.426800012588501},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.40290001034736633},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.3698999881744385},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.36059999465942383},{"id":"https://openalex.org/C78524284","wikidata":"https://www.wikidata.org/wiki/Q6031155","display_name":"Information privacy law","level":4,"score":0.35359999537467957},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3255000114440918},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.30709999799728394},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2669999897480011},{"id":"https://openalex.org/C175968658","wikidata":"https://www.wikidata.org/wiki/Q839447","display_name":"Privacy laws of the United States","level":3,"score":0.2581999897956848},{"id":"https://openalex.org/C2778519782","wikidata":"https://www.wikidata.org/wiki/Q1974060","display_name":"Need to know","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C2781403167","wikidata":"https://www.wikidata.org/wiki/Q5153464","display_name":"Common Rule","level":4,"score":0.2574000060558319}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.14756","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.14756","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.14756","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.14756","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4080643653869629}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Data":[0],"privacy":[1,11,67,77,92,165,171,185,195],"legislation,":[2],"such":[3,54,69,108],"as":[4,70,109],"GDPR":[5],"and":[6,35,74,122,188],"CCPA/CPRA,":[7],"has":[8],"rendered":[9],"data":[10,39],"law":[12,30,36,93,186],"compliance":[13,40,94,118,187],"a":[14,133,158],"requirement":[15],"of":[16,26,66,143],"all":[17],"software":[18,57,82],"systems.":[19,58],"Developers":[20],"need":[21,112,159,193],"to":[22,28,52,113,115,190],"implement":[23],"various":[24],"kinds":[25],"functionalities":[27],"cover":[29,114],"needs,":[31],"including":[32],"user":[33],"rights":[34],"principles.":[37],"As":[38],"is":[41,48],"tightly":[42],"coupled":[43],"with":[44,140],"legal":[45],"knowledge,":[46],"it":[47],"not":[49,96],"always":[50],"easy":[51],"perform":[53],"integrations":[55],"in":[56,80,91,102,178],"Prior":[59],"studies":[60],"have":[61,75,95,148],"focused":[62],"on":[63],"developers'":[64],"understanding":[65,103],"principles,":[68],"Privacy":[71],"by":[72],"Design,":[73],"examined":[76,98,149],"techniques":[78],"used":[79],"the":[81,117,125,137,141],"industry.":[83],"Nevertheless,":[84],"emerging":[85],"developer":[86],"needs":[87,139],"that":[88,135],"can":[89,175],"assist":[90,176],"been":[97],"but":[99],"are":[100],"useful":[101],"what":[104],"development":[105,126,182],"automation":[106],"tools,":[107,163],"Generative":[110],"AI,":[111],"make":[116],"process":[119],"more":[120,161],"straightforward":[121],"seamless":[123],"within":[124,184],"process.":[127],"In":[128],"this":[129],"work,":[130],"we":[131,147],"present":[132],"survey":[134],"examines":[136],"above":[138],"participation":[142],"68":[144],"developers,":[145],"while":[146,164],"which":[150],"factors":[151],"affect":[152],"practitioners'":[153,168],"needs.":[154],"Most":[155],"developers":[156],"express":[157],"for":[160,170,194],"automated":[162],"experience":[166],"increases":[167],"concerns":[169],"tools.":[172],"Our":[173],"results":[174],"practitioners":[177],"better":[179],"positioning":[180],"their":[181],"activities":[183],"point":[189],"an":[191],"urgent":[192],"facilitators.":[196]},"counts_by_year":[],"updated_date":"2025-12-19T19:45:34.690201","created_date":"2025-12-19T00:00:00"}
