{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:40:29Z","timestamp":1770352829632,"version":"3.49.0"},"reference-count":57,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T00:00:00Z","timestamp":1745625600000},"content-version":"vor","delay-in-days":115,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004052","name":"King Abdullah University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The COVID-19 pandemic has reshaped the way people work, normalizing the practice of working from home. However, work from home (WFH) can cause a blurring of personal and professional boundaries, surfacing new privacy issues, especially when workers take work meetings from their homes. As WFH arrangements are now standard practice in many organizations, addressing the associated privacy concerns should be a key part of creating healthy work environments for workers. To this end, we conducted a scenario-based survey with 214 US-based workers who currently work from home regularly. Our results suggest that privacy invasions are commonly experienced while working from home and cause discomfort to many workers. However, only a minority said that the discomfort escalated to cause harm to them or others and that the harm was almost always minor and psychological. While scenarios that restrict worker autonomy (prohibit turning off camera or microphone) are the least experienced scenarios, they are associated with the highest reported discomfort. In addition, participants reported measures that violated or would violate their employer\u2019s autonomy-restricting rules to protect their privacy. We also find that conference tool settings that can prevent privacy invasions are not widely used compared to manual privacy-protective measures. Our findings provide a better understanding of the privacy challenges landscape that WFH workers face and how they address them, providing useful insights to organizations\u2019 policymakers and technology designers for areas of improvements, to provide healthier work environments to workers.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf010","type":"journal-article","created":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T08:31:53Z","timestamp":1745656313000},"source":"Crossref","is-referenced-by-count":1,"title":["Work from home and privacy challenges: what do workers face and what are they doing about it?"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7673-3102","authenticated-orcid":false,"given":"Eman","family":"Alashwali","sequence":"first","affiliation":[{"name":"King Abdulaziz University , Information Systems Dept., Al Sulaimaniyah, P.O Box 80200, Jeddah 21589 ,","place":["Saudi Arabia"]},{"name":"King Abdullah University of Science and Technology , Ibn Rushd Program, Thuwal 23955-6900 ,","place":["Saudi Arabia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9741-1011","authenticated-orcid":false,"given":"Joanne","family":"Peca","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University , CyLab Security and Privacy Institute, 4720 Forbes Ave, Pittsburgh, PA 15213 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7998-0678","authenticated-orcid":false,"given":"Mandy","family":"Lanyon","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University , CyLab Security and Privacy Institute, 4720 Forbes Ave, Pittsburgh, PA 15213 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2125-0124","authenticated-orcid":false,"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University , CyLab Security and Privacy Institute, 4720 Forbes Ave, Pittsburgh, PA 15213 ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,4,26]]},"reference":[{"key":"2025042604314916200_bib1","article-title":"One Platform to Connect | Zoom","author":"Zoom Communications, Inc.","year":"2025"},{"key":"2025042604314916200_bib2","article-title":"Video Conferencing, Meetings, Calling | Microsoft Teams","author":"Microsoft","year":"2025"},{"key":"2025042604314916200_bib3","article-title":"Coronavirus Disease (COVID-19)","author":"World Health Organization","year":"2024"},{"key":"2025042604314916200_bib4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3487567","article-title":"A Tale of Two Cities: software developers Working from Home During the COVID-19 pandemic","volume":"31","author":"Ford","year":"2021","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"2025042604314916200_bib5","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1177\/15394492211033830","article-title":"Negotiating time and space when Working From Home: experiences during COVID-19","volume":"41","author":"Fukumura","year":"2021","journal-title":"OTJR: Occup Ther J Res"},{"key":"2025042604314916200_bib6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3390\/laws11020029","article-title":"Employment-at-will in the United States and the challenges of remote work in the time of COVID-19","volume":"11","author":"Varner","year":"2022","journal-title":"Laws"},{"key":"2025042604314916200_bib7","article-title":"Viral \u201cBBC Dad\u201d returns to discuss Working From Home: \u201cJust Really, Really Tough\u201d","author":"Chappell","year":"2020"},{"key":"2025042604314916200_bib8","article-title":"Children Interrupt BBC News Interview\u2014BBC News","author":"News","year":"2017"},{"key":"2025042604314916200_bib9","doi-asserted-by":"crossref","first-page":"111552","DOI":"10.1016\/j.jss.2022.111552","article-title":"Work-From-Home is here to stay: call for flexibility in post-pandemic work policies","volume":"195","author":"Smite","year":"2023","journal-title":"J Syst Softw"},{"key":"2025042604314916200_bib10","article-title":"The companies sticking to fully remote work","author":"Christian","year":"2023"},{"key":"2025042604314916200_bib11","article-title":"The companies doubling down on remote work","author":"Lufkin","year":"2022"},{"key":"2025042604314916200_bib12","article-title":"SWAA March 2024 updates","author":"Barrero","year":"2024"},{"key":"2025042604314916200_bib13","article-title":"Bureau of labor statistics data\u2013databases, tables, and calculators by subject","author":"US Bureau of Labor Statistics","year":"2023"},{"key":"2025042604314916200_bib14","article-title":"Don\u2019t Abandon the Water Cooler Yet: Flexible Work Arrangements and the Unique Effect of Face-to-Face Informal Communication on Idea Generation and Innovation","author":"McAlpine","year":"2018"},{"key":"2025042604314916200_bib15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/21582440211058193","article-title":"Perceived stress, work-related burnout, and Working From Home before and during COVID-19: an examination of workers in the United States","volume":"11","author":"Hayes","year":"2021","journal-title":"SAGE Open"},{"key":"2025042604314916200_bib16","first-page":"222","article-title":"Teleworking: evolution and trends in USA, EU and Romania","volume":"12","author":"Chiru","year":"2017","journal-title":"Econ Manage Financ Mar"},{"key":"2025042604314916200_bib17","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1080\/01930826.2020.1760569","article-title":"Working from Home: how we managed our team remotely with technology","volume":"60","author":"Rysavy","year":"2020","journal-title":"J Libr Admin"},{"key":"2025042604314916200_bib18","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1111\/ntwe.12173","article-title":"New technology, work and employment in the era of COVID-19: reflecting on legacies of research","volume":"35","author":"Hodder","year":"2020","journal-title":"New Technology, Work and Employment"},{"key":"2025042604314916200_bib19","article-title":"Google Meet","author":"Google","year":"2025"},{"key":"2025042604314916200_bib20","article-title":"Bosses Panic-buy spy software to keep tabs on remote workers","author":"Mosendz","year":"2020"},{"key":"2025042604314916200_bib21","first-page":"1","article-title":"On the clock and at home: Post-COVID-19 employee monitoring in the workplace","volume":"43","author":"Nguyen","year":"2020","journal-title":"People and Strategy"},{"key":"2025042604314916200_bib22","first-page":"4","article-title":"Workplace surveillance outside the workplace: an analysis of E-monitoring remote employees","volume":"15","author":"Vatcha","year":"2020","journal-title":"Ischannel"},{"key":"2025042604314916200_bib23","article-title":"Your boss is watching you: Work-From-Home boom leads to more surveillance","author":"Allyn","year":"2020"},{"key":"2025042604314916200_bib24","doi-asserted-by":"publisher","first-page":"zmad007","DOI":"10.1093\/jcmc\/zmad007","article-title":"Surveillance and the future of work: exploring employees\u2019 attitudes toward monitoring in a post-COVID workplace","volume":"28","author":"Vitak","year":"2023","journal-title":"J Comput-Mediat Commun"},{"key":"2025042604314916200_bib25","doi-asserted-by":"publisher","first-page":"e247","DOI":"10.1002\/itl2.247","article-title":"COVID-19 pandemic cybersecurity issues","volume":"4","author":"Pranggono","year":"2021","journal-title":"Internet Techn Lett"},{"key":"2025042604314916200_bib26","doi-asserted-by":"publisher","first-page":"4018","DOI":"10.3390\/s23084018","article-title":"Information security threats and working from home culture: taxonomy, risk assessment and solutions","volume":"23","author":"Kotak","year":"2023","journal-title":"Sensors"},{"key":"2025042604314916200_bib27","doi-asserted-by":"publisher","first-page":"102248","DOI":"10.1016\/j.cose.2021.102248","article-title":"Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic","volume":"105","author":"Lallie","year":"2021","journal-title":"Comput Secur"},{"key":"2025042604314916200_bib28","first-page":"1452","article-title":"A first look at zoombombing","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"Ling","year":"2021"},{"key":"2025042604314916200_bib29","doi-asserted-by":"publisher","first-page":"21582440211031879","DOI":"10.1177\/21582440211031879","article-title":"How phishers exploit the coronavirus pandemic: a content analysis of COVID-19 themed phishing emails","volume":"11","author":"Akdemir","year":"2021","journal-title":"Sage Open"},{"key":"2025042604314916200_bib30","doi-asserted-by":"publisher","first-page":"103158","DOI":"10.1016\/j.cose.2023.103158","article-title":"The development of phishing during the COVID-19 pandemic: an analysis of over 1100 targeted domains","volume":"128","author":"Hoheisel","year":"2023","journal-title":"Comput Secur"},{"key":"2025042604314916200_bib31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558006","article-title":"The evolving menace of ransomware: a comparative analysis of pre-pandemic and mid-pandemic attacks","volume":"4","author":"Lang","year":"2023","journal-title":"Digital Threats"},{"key":"2025042604314916200_bib32","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1057\/s41284-021-00286-2","article-title":"Working From Home During COVID-19 crisis: a cyber security culture assessment survey","volume":"35","author":"Georgiadou","year":"2022","journal-title":"Secur J"},{"key":"2025042604314916200_bib33","article-title":"Beyond the office walls: understanding security and shadow security behaviours in a remote work context","volume-title":"Proceedings of the Symposioum in Usable Privacy and Security (SOUPS)","author":"Alromaih","year":"2024"},{"key":"2025042604314916200_bib34","doi-asserted-by":"publisher","first-page":"353","DOI":"10.5325\/jinfopoli.12.2022.0010","article-title":"An exploratory study of cybersecurity in Working From Home: problem or enabler?","volume":"12","author":"Bispham","year":"2022","journal-title":"J Inform Poli"},{"key":"2025042604314916200_bib35","first-page":"695","article-title":"Understanding privacy attitudes and concerns towards remote communications during the COVID-19 pandemic","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS)","author":"Emami-Naeini","year":"2021"},{"key":"2025042604314916200_bib36","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/3568444.3568468","article-title":"\u201cI Saw Your Partner Naked\u201d: exploring privacy challenges during video-based online meetings","volume-title":"Proceedings of the Conference on Mobile and Ubiquitous Multimedia","author":"Prange","year":"2022"},{"key":"2025042604314916200_bib37","first-page":"109","article-title":"Home Alone? Exploring the geographies of digitally-mediated privacy practices at home during the COVID-19 pandemic","volume-title":"Privacy Technologies and Policy","author":"Cheetham","year":"2024"},{"key":"2025042604314916200_bib38","doi-asserted-by":"publisher","first-page":"tyae001","DOI":"10.1093\/cybsec\/tyae001","article-title":"Cybersecurity when working From Home during COVID-19: considering the human factors","volume":"10","author":"Whitty","year":"2024","journal-title":"J Cybersecur"},{"key":"2025042604314916200_bib39","first-page":"354","article-title":"Understanding privacy decisions of homeworkers during video conferences","volume-title":"Proceedings of the User Modeling, Adaptation and Personalization","author":"Herder","year":"2022"},{"key":"2025042604314916200_bib40","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/3491140.3528284","article-title":"Picturing one\u2019s self: camera use in zoom classes during the COVID-19 pandemic","volume-title":"Proceedings of the ACM Conference on Learning @ Scale","author":"Li","year":"2022"},{"key":"2025042604314916200_bib41","doi-asserted-by":"publisher","first-page":"3565","DOI":"10.1002\/ece3.7123","article-title":"Why students do not turn on their video cameras during online classes and an equitable and inclusive plan to encourage them to do so","volume":"11","author":"Castelli","year":"2021","journal-title":"Academic Practice in Ecology and Evolution"},{"key":"2025042604314916200_bib42","first-page":"653","article-title":"Virtual classrooms and real harms: remote learning at U.S. Universities","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS)","author":"Cohney","year":"2021"},{"key":"2025042604314916200_bib43","first-page":"135","article-title":"Spying through virtual backgrounds of video calls","volume-title":"Proceedings of the Workshop on Artificial Intelligence and Security","author":"Hilgefort","year":"2021"},{"key":"2025042604314916200_bib44","article-title":"Qualtrics XM | The Leading Experience Management Software","author":"Qualtrics","year":"2024"},{"key":"2025042604314916200_bib45","doi-asserted-by":"publisher","first-page":"010502","DOI":"10.11613\/BM.2021.010502","article-title":"Sample size, power and effect size revisited: simplified and practical approaches in pre-clinical, clinical and laboratory studies","volume":"31","author":"Serdar","year":"2021","journal-title":"Biochem Med (Zagreb)"},{"key":"2025042604314916200_bib46","article-title":"G*Power statistical power analyses for mac and windows","author":"Buchner","year":"2024"},{"key":"2025042604314916200_bib47","article-title":"Prolific | easily collect high-quality data from real people","author":"Prolific","year":"2024"},{"key":"2025042604314916200_bib48","doi-asserted-by":"crossref","first-page":"143","DOI":"10.11613\/BM.2013.018","article-title":"The Chi-Square Test of Independence","volume":"23","author":"McHugh","year":"2013","journal-title":"Biochem Med"},{"key":"2025042604314916200_bib49","doi-asserted-by":"crossref","first-page":"152","DOI":"10.5395\/rde.2017.42.2.152","article-title":"Statistical notes for clinical researchers: chi-squared test and Fisher\u2019s exact test","volume":"42","author":"Kim","year":"2017","journal-title":"Restor Dent Endod"},{"key":"2025042604314916200_bib50","article-title":"Victims of identity theft, 2012","author":"The R Foundation","year":"2024"},{"key":"2025042604314916200_bib51","article-title":"Template analysis","author":"King","year":"2024"},{"key":"2025042604314916200_bib52","doi-asserted-by":"crossref","DOI":"10.4135\/978144627305013512755","article-title":"Doing template analysis: evaluating an end of life care service","volume-title":"SAGE Research Methods Cases Part 1","author":"Brooks","year":"2014"},{"key":"2025042604314916200_bib53","first-page":"1","article-title":"Reliability and inter-rater reliability in qualitative research: norms and guidelines for CSCW and HCI practice","volume":"3","author":"McDonald","year":"2019","journal-title":"Proc ACM Hum-Comput Interact"},{"key":"2025042604314916200_bib54","first-page":"161","article-title":"Surveys in Social Research","author":"de\u00a0Vaus","year":"2014","edition":"6"},{"key":"2025042604314916200_bib55","doi-asserted-by":"crossref","DOI":"10.1119\/perc.2019.pr.Van_Dusen","article-title":"Criteria for collapsing rating scale responses: a case study of the CLASS","volume-title":"Proceedings of the Physics Education Research Conference","author":"Dusen","year":"2020"},{"key":"2025042604314916200_bib56","article-title":"Managing workplace monitoring and surveillance","author":"SHRM","year":"2018"},{"key":"2025042604314916200_bib57","first-page":"367","article-title":"Replication: how well do my results generalize now? The external validity of online privacy and security surveys","volume-title":"Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS)","author":"Tang","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf010\/63013224\/tyaf010.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf010\/63013224\/tyaf010.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T08:31:58Z","timestamp":1745656318000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf010\/8120331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf010","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf010"}}