{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T15:53:53Z","timestamp":1778255633430,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["651.002.002"],"award-info":[{"award-number":["651.002.002"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P016448\/1"],"award-info":[{"award-number":["EP\/P016448\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FWO","award":["G0H6416N-FWOOPR2016009701"],"award-info":[{"award-number":["G0H6416N-FWOOPR2016009701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the Internet of Things (IoT) becoming increasingly prevalent in people\u2019s homes, new threats to residents are emerging such as the cyber-physical attack, i.e. a cyber-attack with physical consequences. In this study, we aimed to gain insights into how people experience and respond to cyber-physical attacks to their IoT devices. We conducted a naturalistic field experiment and provided 9 Dutch and 7 UK households, totalling 18 and 13 participants respectively, with a number of smart devices for use in their home. After a period of adaptation, simulated attacks were conducted, leading to events of varying noticeability (e.g., the light going on or off once or several times). After informing people simulated attacks had occurred, the attacks were repeated one more time. User experiences were collected through interviews and analysed with thematic analyses. Four relevant themes were identified, namely (1) the awareness of and concern about privacy and security risks was rather low, (2) the simulated attacks made little impression on the participants, (3) the participants had difficulties with correctly recognizing simulated attacks, and (4) when informed about simulated attacks taking place; participants noticed more simulated attacks and presented decision rules for them (but still were not able to identify and distinguish them well\u2014see Theme 3). The findings emphasise the need for training interventions and an intrusion detection system to increase detection of cyber-physical attacks.<\/jats:p>","DOI":"10.1007\/s00779-023-01774-5","type":"journal-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T02:01:27Z","timestamp":1695348087000},"page":"2243-2266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["User experiences with simulated cyber-physical attacks on smart home IoT"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3729-8392","authenticated-orcid":false,"given":"N. M. A.","family":"Huijts","sequence":"first","affiliation":[]},{"given":"A.","family":"Haans","sequence":"additional","affiliation":[]},{"given":"S.","family":"Budimir","sequence":"additional","affiliation":[]},{"given":"J. R. J.","family":"Fontaine","sequence":"additional","affiliation":[]},{"given":"G.","family":"Loukas","sequence":"additional","affiliation":[]},{"given":"A.","family":"Bezemskij","sequence":"additional","affiliation":[]},{"given":"A.","family":"Oostveen","sequence":"additional","affiliation":[]},{"given":"A.","family":"Filippoupolitis","sequence":"additional","affiliation":[]},{"given":"I.","family":"Ras","sequence":"additional","affiliation":[]},{"given":"W. A.","family":"IJsselsteijn","sequence":"additional","affiliation":[]},{"given":"E. B.","family":"Roesch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"1774_CR1","volume-title":"Cyber-physical attacks: a growing invisible threat","author":"G Loukas","year":"2015","unstructured":"Loukas G (2015) Cyber-physical attacks: a growing invisible threat. Elsevier, London"},{"key":"1774_CR2","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.cose.2018.07.011","volume":"78","author":"R Heartfield","year":"2018","unstructured":"Heartfield R, Loukas G, Budimir S et al (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398\u2013428. https:\/\/doi.org\/10.1016\/j.cose.2018.07.011","journal-title":"Comput Secur"},{"key":"1774_CR3","unstructured":"Gebel M (2019) A California woman says her family experienced \u2018sheer terror\u2019 after their Nest security camera was hacked, warning them of a North Korean missile attack. In: Business Insider. https:\/\/www.businessinsider.nl\/nest-camera-hacked-north-korea-missile-attack-2019-1?international=true&r=US. Accessed 19 Jun 2021"},{"key":"1774_CR4","unstructured":"Gibbs S (2014) Q&A: Who is watching my home webcam? The Guardian"},{"key":"1774_CR5","unstructured":"Noor P (2019) Ring hackers are reportedly watching and talking to strangers via in-home cameras. The Guardian"},{"key":"1774_CR6","unstructured":"Paul K (2019) Ring sued by man who claims camera was hacked and used to harass his kids. The Guardian"},{"key":"1774_CR7","unstructured":"Peterson H (2019) Wisconsin couple describes the chilling moment that a hacker cranked up their heat and started talking to them through a Google Nest camera in their kitchen. In: Business Insider. https:\/\/www.businessinsider.nl\/hacker-breaks-into-smart-home-google-nest-devices-terrorizes-couple-2019-9?international=true&r=US. Accessed 19 Jun 2021"},{"key":"1774_CR8","unstructured":"Weaver M (2014) UK moves to shut down Russian hackers streaming live British webcam footage. The Guardian"},{"key":"1774_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer (Long Beach Calif) 50:80\u201384. https:\/\/doi.org\/10.1109\/MC.2017.201","journal-title":"Computer (Long Beach Calif)"},{"key":"1774_CR10","doi-asserted-by":"publisher","unstructured":"Sheleme M, Sharma RR (2021) Cyber-attack and measuring its risk. IRO J Sustain Wirel Syst 3. https:\/\/doi.org\/10.36548\/jsws.2021.4.002","DOI":"10.36548\/jsws.2021.4.002"},{"key":"1774_CR11","doi-asserted-by":"publisher","unstructured":"Kumar Jain V, Gajrani J (2020) IoT security: a survey of issues, attacks and defences. Lecture Notes on Data Engineering and Communications Technologies 61:219\u2013236. https:\/\/doi.org\/10.1007\/978-981-33-4582-9_18","DOI":"10.1007\/978-981-33-4582-9_18"},{"key":"1774_CR12","doi-asserted-by":"publisher","unstructured":"Budimir S, Fontaine JRJ, Huijts NMA et al (2021) Emotional reactions to cybersecurity breach situations: scenario-based survey study. J Med Internet Res 2021;23(5):e24879 https:\/\/www.jmir.org\/2021\/5\/e24879 23:e24879. https:\/\/doi.org\/10.2196\/24879","DOI":"10.2196\/24879"},{"key":"1774_CR13","doi-asserted-by":"publisher","DOI":"10.1080\/10683160008410830","author":"A Beaton","year":"2000","unstructured":"Beaton A, Cook M, Kavanagh M, Herrington C (2000) The psychological impact of burglary. Psychol Crime Law. https:\/\/doi.org\/10.1080\/10683160008410830","journal-title":"Psychol Crime Law"},{"key":"1774_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1037\/h0099374","volume":"20","author":"MC Chung","year":"2014","unstructured":"Chung MC, Stedmon J, Hall R et al (2014) Posttraumatic stress reactions following burglary: The role of coping and personality. Traumatology (Tallahass Fla) 20:65\u201374. https:\/\/doi.org\/10.1037\/h0099374","journal-title":"Traumatology (Tallahass Fla)"},{"key":"1774_CR15","doi-asserted-by":"crossref","unstructured":"Oulasvirta A, Pihlajamaa A, Perki\u00f6 J et al (2012) Long-term effects of ubiquitous surveillance in the home. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp \u201912. ACM Press, New York, New York, USA, p 41","DOI":"10.1145\/2370216.2370224"},{"key":"1774_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1089\/cyber.2016.0338","volume":"20","author":"D Canetti","year":"2017","unstructured":"Canetti D, Gross M, Waismel-Manor I et al (2017) How cyberattacks terrorize: cortisol and personal insecurity jump in the wake of cyberattacks. Cyberpsychol Behav Soc Netw 20:72\u201377. https:\/\/doi.org\/10.1089\/cyber.2016.0338","journal-title":"Cyberpsychol Behav Soc Netw"},{"key":"1774_CR17","unstructured":"Symantec (2010) Norton. The cybercrime report: The Human Impact"},{"key":"1774_CR18","doi-asserted-by":"crossref","unstructured":"Braun V, Clarke V (2022) Thematic analysis: a practical guide. SAGE","DOI":"10.1007\/978-3-319-69909-7_3470-2"},{"key":"1774_CR19","unstructured":"Achenbach TM (1966) The Achenbach System of Empirically Based Assessemnt (ASEBA): development, findings, theory, and applications. University of Vermont Research Center for Children, Youth, & Families, Burlington, VT"},{"key":"1774_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706QP063OA","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3:77\u2013101. https:\/\/doi.org\/10.1191\/1478088706QP063OA","journal-title":"Qual Res Psychol"},{"key":"1774_CR21","doi-asserted-by":"crossref","unstructured":"Emami-Naeini P, Dixon H, Agarwal Y, Cranor LF (2019) Exploring how privacy and security factor into IoT device purchase behavior. In: Conference on Human Factors in Computing Systems - Proceedings","DOI":"10.1145\/3290605.3300764"},{"key":"1774_CR22","unstructured":"Tabassum M, Kosi\u0144ski T, Lipford HR (2019) \u201cI don\u2019t own the data\u201d: end user perceptions of smart home device data practices and risks. In: Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019"},{"key":"1774_CR23","unstructured":"Zeng E, Mare S, Roesner F (2017) End user security & privacy concerns with smart homes. USENIX Association"},{"key":"1774_CR24","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/J.COSE.2018.02.020","volume":"76","author":"R Heartfield","year":"2018","unstructured":"Heartfield R, Loukas G (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Comput Secur 76:101\u2013127. https:\/\/doi.org\/10.1016\/J.COSE.2018.02.020","journal-title":"Comput Secur"},{"key":"1774_CR25","volume-title":"Detection theory: a user\u2019s guide","author":"NA Macmillan","year":"2005","unstructured":"Macmillan NA, Creelman CD (2005) Detection theory: a user\u2019s guide, 2nd edn. Psychological Press, New York","edition":"2"},{"key":"1774_CR26","doi-asserted-by":"publisher","unstructured":"Lynn SK, Barrett LF (2014) \u201cUtilizing\u201d signal detection theory: Psychol Sci 25:1663\u20131673. https:\/\/doi.org\/10.1177\/0956797614541991","DOI":"10.1177\/0956797614541991"},{"key":"1774_CR27","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1177\/0018720816665025","volume":"58","author":"CI Canfield","year":"2016","unstructured":"Canfield CI, Fischhoff B, Davis A (2016) Quantifying phishing susceptibility for detection and behavior decisions. Hum Factors 58:1158\u20131172. https:\/\/doi.org\/10.1177\/0018720816665025","journal-title":"Hum Factors"},{"key":"1774_CR28","doi-asserted-by":"crossref","unstructured":"Schneiders E, Kanstrup AM (2021) Domestic robots and the dream of automation: Understanding human interaction and intervention. In: Conference on Human Factors in Computing Systems - Proceedings","DOI":"10.1145\/3411764.3445629"},{"issue":"6","key":"1774_CR29","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/08874417.2018.1543000","volume":"60","author":"MQ Aldossari","year":"2018","unstructured":"Aldossari MQ, Sidorova A (2018) Consumer acceptance of Internet of Things (IoT): smart home context. J Comput Inf Syst 60(6):507\u2013517. https:\/\/doi.org\/10.1080\/08874417.2018.1543000","journal-title":"J Comput Inf Syst"},{"key":"1774_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2904006","author":"MN Alraja","year":"2019","unstructured":"Alraja MN, Farooque MMJ, Khashab B (2019) The effect of security, privacy, familiarity, and trust on users\u2019 attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access. https:\/\/doi.org\/10.1109\/access.2019.2904006","journal-title":"IEEE Access"},{"key":"1774_CR31","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/J.CHB.2018.11.022","volume":"92","author":"D Kim","year":"2019","unstructured":"Kim D, Park K, Park Y, Ahn J-H (2019) Willingness to provide personal information: Perspective of privacy calculus in IoT services. Comput Human Behav 92:273\u2013281. https:\/\/doi.org\/10.1016\/J.CHB.2018.11.022","journal-title":"Comput Human Behav"},{"key":"1774_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274371","volume":"2","author":"J Lau","year":"2018","unstructured":"Lau J, Zimmerman B, Schaub F (2018) Alexa, are you listening? Proc ACM Hum Comput Interact 2:1\u201331. https:\/\/doi.org\/10.1145\/3274371","journal-title":"Proc ACM Hum Comput Interact"},{"key":"1774_CR33","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1080\/10447318.2018.1480121","volume":"35","author":"M Lee","year":"2019","unstructured":"Lee M (2019) An empirical study of home IoT services in South Korea: the moderating effect of the usage experience. Int J Hum Comput Interact 35:535\u2013547. https:\/\/doi.org\/10.1080\/10447318.2018.1480121","journal-title":"Int J Hum Comput Interact"},{"key":"1774_CR34","doi-asserted-by":"publisher","unstructured":"Shuhaiber A, Mashal I (2019) Understanding users\u2019 acceptance of smart homes. Technol Soc 58:101110. https:\/\/doi.org\/10.1016\/j.techsoc.2019.01.003","DOI":"10.1016\/j.techsoc.2019.01.003"},{"key":"1774_CR35","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/327","volume":"2","author":"S Zheng","year":"2018","unstructured":"Zheng S, Chetty M, Feamster N (2018) User perceptions of Privacy in Smart Homes. Proc ACM Hum-Comput Interact 2:20. https:\/\/doi.org\/10.1145\/327","journal-title":"Proc ACM Hum-Comput Interact"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-023-01774-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-023-01774-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-023-01774-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T16:12:18Z","timestamp":1703866338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-023-01774-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1774"],"URL":"https:\/\/doi.org\/10.1007\/s00779-023-01774-5","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"18 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}