{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T20:39:23Z","timestamp":1775594363840,"version":"3.50.1"},"reference-count":93,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,11,7]]},"abstract":"<jats:p>\n            Security and privacy (S&amp;P) perspectives of people in a multi-user home are a growing area of research, with many researchers reflecting on the complicated power imbalance and challenging access control issues of the devices involved. However, these studies primarily focused on the multi-user scenarios in traditional family home settings, leaving other types of multi-user home environments, such as homes shared by co-habitants without a familial relationship, under-studied. This paper closes this research gap via quantitative and qualitative analysis of results from an online survey and qualitative content analysis of sampled online posts on Reddit. The study explores the complex roles of shared home users, which depend on various factors unique to the shared home environment, e.g., who owns what home devices, how home devices are used by multiple users, and more complicated relationships between the landlord and people in the shared home and among co-habitants. Half (50.7%) of our survey participants thought that devices in a shared home are less secure than in a traditional family home. This perception was found statistically significantly associated with factors such as the fear of devices being tampered with in their absence and (lack of) trust in other co-habitants and their visitors. We observed cyber-physical threats being a prominent topic discussed in Reddit posts. Our study revealed new user types and user relationships in a multi-user environment such as\n            <jats:italic toggle=\"yes\">ExternalPrimary-InternalPrimary<\/jats:italic>\n            while analysing the landlord and shared home resident relationship with regard to shared home device use. Based on the results of the online survey and the Reddit data, we propose a threat actor model for shared home environments, which has a focus on possible malicious behaviours of current and past co-habitants of a shared home, as a special type of insider threat in a home environment. We also recommend further research to understand the complex roles co-habitants can play in navigating and adapting to a shared home environment's security and privacy landscape.\n          <\/jats:p>","DOI":"10.1145\/3686907","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T15:52:40Z","timestamp":1731081160000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security and Privacy Perspectives of People Living in Shared Home Environments"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1272-077X","authenticated-orcid":false,"given":"Nandita","family":"Pattnaik","sequence":"first","affiliation":[{"name":"University of Kent, Canterbury, Kent, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5628-7328","authenticated-orcid":false,"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, Kent, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4118-1680","authenticated-orcid":false,"given":"Jason R.C.","family":"Nurse","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, Kent, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0067"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.7575\/aiac.ijels.v.5n.2p.9"},{"key":"e_1_2_1_4_1","unstructured":"Irwin Altman. 1975. The environment and social behavior: privacy personal space territory and crowding. (1975)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540--4560.1977.tb01883.x"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539737"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 18th Symposium on Usable Privacy and Security","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships. In Proceedings of the 18th Symposium on Usable Privacy and Security. USENIX Association. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/bernd"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance. In Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of CI Symposium 2019","author":"Bernd Julia","year":"2019","unstructured":"Julia Bernd, Alisa Frik, Maritza Johnson, and Nathan Malkin. 2019. Smart Home Bystanders: Further Complexifying a Complex Context. In Proceedings of CI Symposium 2019. PrivaCI, 6 pages. https:\/\/privaci.info\/symposium2\/papers_and_slides\/Sub_Bernd_et_al_Bystanders_CI_2019.pdf"},{"key":"e_1_2_1_10_1","unstructured":"Nicola Bleu. 2023. 23 Reddit Statistics For 2023: Users Revenue And Growth. https:\/\/startupbonsai.com\/reddit-statistics\/"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--10--5251--4_103"},{"key":"e_1_2_1_12_1","unstructured":"BT. 2020. 83% of UK consumers are planning to gift a connected device as families get set for Christmas according to study by BT Full Fibre. https:\/\/newsroom.bt.com\/83-of-uk-consumers-are-planning-to-gift-a-connected-device-as-families-get-set-for-christmas-according-to-study-by-bt-full-fibre\/"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/02673037.2020.1803801"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 18th Symposium on Usable Privacy and Security. USENIX Association, 671--685","author":"Chen Jiayi","year":"2022","unstructured":"Jiayi Chen, Urs Hengartner, and Hassan Khan. 2022. Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. In Proceedings of the 18th Symposium on Usable Privacy and Security. USENIX Association, 671--685. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/chen"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajpy.12238"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security. USENIX Association, 97--115","author":"Das Sauvik","year":"2019","unstructured":"Sauvik Das, Laura A. Dabbish, and Jason I. Hong. 2019. A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. In Proceedings of the 15th Symposium on Usable Privacy and Security. USENIX Association, 97--115. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/das"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 10th Symposium On Usable Privacy and Security. USENIX Association, 143--157","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The Effect of Social Influence on Security Sensitivity. In Proceedings of the 10th Symposium On Usable Privacy and Security. USENIX Association, 143--157. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/das"},{"key":"e_1_2_1_21_1","volume-title":"Communities & Local Government, UK Government.","author":"Department for Levelling Up","year":"2019","unstructured":"Department for Levelling Up, Housing and Communities and Ministry of Housing, Communities & Local Government, UK Government. 2019. Guidance Landlord and tenant rights and responsibilities in the private rented sector. https:\/\/www.gov.uk\/government\/publications\/landlord-and-tenant-rights-and-responsibilities-in-the-private-rented-sector\/landlord-and-tenant-rights-and-responsibilities-in-the-private-rented-sector#landlords-rights-responsibilities-and-advice"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382900"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/14649365.2020.1744704"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_2_1_25_1","volume-title":"Housing in London","author":"Authority Greater London","year":"2022","unstructured":"Greater London Authority. 2022. Housing in London 2022. https:\/\/data.london.gov.uk\/housing\/housing-in-london\/"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.12.018"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Assocaition, 255--272","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In Proceedings of the 27th USENIX Security Symposium. USENIX Assocaition, 255--272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROSP51992.2021.00014"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.011"},{"key":"e_1_2_1_30_1","volume-title":"Consuming Technologies","author":"Hirsch Eric","unstructured":"Eric Hirsch and Roger Silverstone. 2003. Information and communication technologies and the moral economy of the household. In Consuming Technologies. Routledge, 25--40."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/02673037.2013.873116"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.7275\/j18t-c009"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450324"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.29311\/for(e)dialogue.v1i1.532"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_2_1_40_1","unstructured":"Stephanie Kramer. 2020. With billions confined to their homes worldwide which living arrangements are most common? https:\/\/www.pewresearch.org\/short-reads\/2020\/03\/31\/with-billions-confined-to-their-homes-worldwide-which-living-arrangements-are-most-common\/"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS52051.2020.9340199"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","unstructured":"George Loukas. 2015. Cyber-Physical Attacks: A Growing Invisible Threat. Butterworth-Heinemann.","DOI":"10.1016\/B978-0-12-801290-1.00007-2"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/14649365.2018.1466355"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/14649365.2022.2065693"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0115"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445114"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00089"},{"key":"e_1_2_1_59_1","unstructured":"Becky Mortan. 2022. Over-50s turn to house-shares to beat rising rents. https:\/\/www.bbc.co.uk\/news\/business-62344571"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/14036096.2018.1465994"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diggeo.2023.100060"},{"key":"e_1_2_1_62_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review, Vol. 79, 1 (2004), 119--158. https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10","journal-title":"Washington Law Review"},{"key":"e_1_2_1_63_1","volume-title":"2017 International Journal of Research in Modern Engineering and Emerging Technology","volume":"5","author":"Parikh Tushar P","year":"2017","unstructured":"Tushar P Parikh and Ashok R Patel. 2017. Cyber security: Study on attack, threat, vulnerability. 2017 International Journal of Research in Modern Engineering and Emerging Technology, Vol. 5, 6 (2017)."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.09.001"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 14th Symposium on Usable Privacy and Security. USENIX Association, 83--102","author":"Park Cheul Young","year":"2018","unstructured":"Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. In Proceedings of the 14th Symposium on Usable Privacy and Security. USENIX Association, 83--102. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/park"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376450"},{"key":"e_1_2_1_67_1","volume-title":"Comput. Surveys","volume":"55","author":"Pattnaik Nandita","year":"2023","unstructured":"Nandita Pattnaik, Shujun Li, and Jason R. C. Nurse. 2023. A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. Comput. Surveys, Vol. 55, 9, Article 180 (2023), 38 pages."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579595"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305121101900"},{"key":"e_1_2_1_70_1","unstructured":"Reddit. 2023. Data API Terms. https:\/\/www.redditinc.com\/policies\/data-api-terms"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/17470161231210542"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/02673037.2023.2176830"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfab018"},{"key":"e_1_2_1_74_1","first-page":"83","article-title":"Safe at home: Towards a feminist critique of cybersecurity","volume":"15","author":"Slupska Julia","year":"2019","unstructured":"Julia Slupska. 2019. Safe at home: Towards a feminist critique of cybersecurity. St Antony's International Review, Vol. 15, 1 (2019), 83--100. https:\/\/www.jstor.org\/stable\/27027755","journal-title":"St Antony's International Review"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Julia Slupska and Leonie Maria Tanczer. 2021. Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald. https:\/\/doi.org\/10.1108\/978--1--83982--848--520211049","DOI":"10.1108\/978--1--83982--848--520211049"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0271034"},{"key":"e_1_2_1_77_1","volume-title":"Average number of devices residents have access to in UK households","year":"2020","unstructured":"Statista. 2021. Average number of devices residents have access to in UK households in 2020, by device. https:\/\/www.statista.com\/study\/41673\/connected-devices-in-the-united-kingdom-uk\/"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0033"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555159"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10901-020-09778-w"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102220"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--42504--3_27"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1068\/a130069p"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthplace.2019.102191"},{"key":"e_1_2_1_86_1","volume-title":"International management review","author":"Williams Michael","year":"2019","unstructured":"Michael Williams and Tami Moser. 2019. The art of coding and thematic exploration in qualitative research. International management review, Vol. 15, 1 (2019), 45--55."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833757"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_2_1_90_1","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security. USENIX Association, 65--80","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the 13th Symposium on Usable Privacy and Security. USENIX Association, 65--80. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 28th USENIX Security Symposium. USENIX Association, 159--176","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In Proceedings of the 28th USENIX Security Symposium. USENIX Association, 159--176. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.7916\/stlr.v21i1.5763"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0015"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686907","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:51:49Z","timestamp":1755737509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686907"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":93,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2024,11,7]]}},"alternative-id":["10.1145\/3686907"],"URL":"https:\/\/doi.org\/10.1145\/3686907","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"2024-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}