{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:49:16Z","timestamp":1771634956764,"version":"3.50.1"},"reference-count":51,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCS"],"published-print":{"date-parts":[[2022,7,4]]},"abstract":"<jats:p>Smart buildings are socio-technical systems that bring together building systems, IoT technology and occupants. A multitude of embedded sensors continually collect and share building data on a large scale which is used to understand and streamline daily operations. Much of this data is highly influenced by the presence of building occupants and could be used to monitor and track their location and activities. The combination of open accessibility to smart building data and the rapid development and enforcement of data protection legislation such as the GDPR and CCPA make the privacy of smart building occupants a concern. Until now, little if any research exists on occupant privacy in work-based or commercial smart buildings. This paper addresses this gap by conducting two user studies ( N = 81 and N = 40) on privacy concerns and preferences about smart buildings. The first study explores the perception of the occupants of a state-of-the-art commercial smart building, and the latter reflects on the concerns and preferences of a more general user group who do not use this building. Our results show that the majority of the participants are not familiar with the types of data being collected, that it is subtly related to them (only 19.75% of smart building residents (occupants) and 7.5% non-residents), nor the privacy risks associated with it. After being informed more about smart buildings and the data they collect, over half of our participants said that they would be concerned with how occupancy data is used. These findings show that despite the more public environment, there are similar levels of privacy concerns for some sensors to those living in smart homes. The participants called for more transparency in the data collection process and beyond, which means that better policies and regulations should be in place for smart building data.<\/jats:p>","DOI":"10.3233\/jcs-210035","type":"journal-article","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T17:21:27Z","timestamp":1655227287000},"page":"465-497","source":"Crossref","is-referenced-by-count":18,"title":["User Privacy Concerns in Commercial Smart Buildings1"],"prefix":"10.1177","volume":"30","author":[{"given":"Scott","family":"Harper","sequence":"first","affiliation":[{"name":"SRS, Newcastle University, Tyne and Wear, England"}]},{"given":"Maryam","family":"Mehrnezhad","sequence":"additional","affiliation":[{"name":"SRS, Newcastle University, Tyne and Wear, England"}]},{"given":"John","family":"Mace","sequence":"additional","affiliation":[{"name":"SRS, Newcastle University, Tyne and Wear, England"}]}],"member":"179","reference":[{"key":"10.3233\/JCS-210035_ref1","doi-asserted-by":"crossref","unstructured":"T. Mundt, F. Kr\u00fcger and T. Wollenberg, Who Refuses to Wash Hands? Privacy Issues in Modern House Installation Networks, in: BWCCA, 2012, pp. 271\u2013277.","DOI":"10.1109\/BWCCA.2012.51"},{"key":"10.3233\/JCS-210035_ref2","unstructured":"N. Saputro, A. Yurekli, K. Akkaya and S. Uluagac, Privacy Preservation for IoT Used in Smart Buildings, in: Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, 2016, pp. 129\u2013160."},{"key":"10.3233\/JCS-210035_ref3","doi-asserted-by":"publisher","DOI":"10.3390\/informatics6010007"},{"key":"10.3233\/JCS-210035_ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.044"},{"key":"10.3233\/JCS-210035_ref5","unstructured":"E. Zeng, S. Mare and F. Roesner, End user security and privacy concerns with smart homes, in: SOUPS, 2017, pp. 65\u201380."},{"issue":"2","key":"10.3233\/JCS-210035_ref6","doi-asserted-by":"publisher","first-page":"1718","DOI":"10.1109\/COMST.2018.2867288","article-title":"Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges","volume":"21","author":"Sookhak","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"10.3233\/JCS-210035_ref7","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.giq.2016.06.004","article-title":"Privacy concerns in smart cities","volume":"33","author":"Van Zoonen","year":"2016","journal-title":"Government Information Quarterly"},{"key":"10.3233\/JCS-210035_ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.52"},{"key":"10.3233\/JCS-210035_ref10","doi-asserted-by":"crossref","unstructured":"J.C. Mace, C. Morisset and L. Smith, A socio-technical ethical process for managing access to smart building data, in: Living in the Internet of Things, 2019.","DOI":"10.1049\/cp.2019.0135"},{"key":"10.3233\/JCS-210035_ref11","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.enbuild.2017.04.080","article-title":"Occupancy determination based on time series of CO2 concentration, temperature and relative humidity","volume":"147","author":"Szczurek","year":"2017","journal-title":"Energy and Buildings"},{"key":"10.3233\/JCS-210035_ref12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.apenergy.2017.04.082","article-title":"Experimental assessment of room occupancy patterns in an office building. Comparison of different approaches based on CO2 concentrations and computer power consumption","volume":"199","author":"D\u00edaz","year":"2017","journal-title":"Applied Energy"},{"key":"10.3233\/JCS-210035_ref13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.buildenv.2014.12.011","article-title":"CO2 based occupancy detection algorithm: Experimental analysis and validation for office and residential buildings","volume":"86","author":"Cal\u00ec","year":"2015","journal-title":"Building and Environment"},{"key":"10.3233\/JCS-210035_ref24","doi-asserted-by":"crossref","unstructured":"C. Chhetri and V.G. Motti, Eliciting privacy concerns for smart home devices from a user centered perspective, in: International Conference on Information, Springer, 2019, pp. 91\u2013101.","DOI":"10.1007\/978-3-030-15742-5_8"},{"key":"10.3233\/JCS-210035_ref25","unstructured":"M. Tabassum, T. Kosinski and H.R. Lipford, \u201cI don\u2019t own the data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks, in: Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 2019, pp. 435\u2013450."},{"key":"10.3233\/JCS-210035_ref26","unstructured":"N. Abdi, K.M. Ramokapane and J.M. Such, More than smart speakers: security and privacy perceptions of smart home personal assistants, in: SOUPS, 2019."},{"issue":"4","key":"10.3233\/JCS-210035_ref27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.2478\/popets-2019-0066","article-title":"\u201cWhat if?\u201d Predicting Individual Users\u2019 Smart Home Privacy Preferences and Their Changes","volume":"2019","author":"Barbosa","year":"2019","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"10.3233\/JCS-210035_ref28","unstructured":"P. Emami-Naeini, S. Bhagavatula, H. Habib, M. Degeling, L. Bauer, L.F. Cranor and N. Sadeh, Privacy expectations and preferences in an IoT world, in: SOUPS, 2017."},{"key":"10.3233\/JCS-210035_ref29","doi-asserted-by":"crossref","unstructured":"A. Prasad, R. Ruiz and T. Stablein, Understanding parents\u2019 concerns with smart device usage in the home, in: International Conference on Human-Computer Interaction, Springer, 2019, pp. 176\u2013190.","DOI":"10.1007\/978-3-030-22351-9_12"},{"issue":"CSCW","key":"10.3233\/JCS-210035_ref30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274469","article-title":"User perceptions of smart home IoT privacy","volume":"2","author":"Zheng","year":"2018","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"2","key":"10.3233\/JCS-210035_ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-020-2025-8","article-title":"Privacy concerns in the smart home context","volume":"2","author":"Guhr","year":"2020","journal-title":"SN Applied Sciences"},{"key":"10.3233\/JCS-210035_ref32","doi-asserted-by":"publisher","DOI":"10.3390\/buildings10090153"},{"issue":"8","key":"10.3233\/JCS-210035_ref33","doi-asserted-by":"publisher","first-page":"32","DOI":"10.5120\/ijca2015906622","article-title":"Internet of things (IoT) based smart environment integrating various business applications","volume":"128","author":"Vimal Jerald","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"9","key":"10.3233\/JCS-210035_ref34","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","article-title":"Data linkage in smart internet of things systems: A consideration from a privacy perspective","volume":"56","author":"Zheng","year":"2018","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"10.3233\/JCS-210035_ref35","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TASE.2016.2619720","article-title":"Occupancy detection via environmental sensing","volume":"15","author":"Jin","year":"2016","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"10.3233\/JCS-210035_ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.42"},{"issue":"12","key":"10.3233\/JCS-210035_ref37","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","article-title":"Privacy in the Internet of Things: threats and challenges","volume":"7","author":"Ziegeldorf","year":"2014","journal-title":"Security and Communication Networks"},{"issue":"4","key":"10.3233\/JCS-210035_ref38","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s12652-016-0438-4","article-title":"Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues","volume":"8","author":"L\u00f3pez","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"10.3233\/JCS-210035_ref39","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MSP.2007.323270","article-title":"Privacy in Video Surveillance [In the Spotlight]","volume":"24","author":"Cavailaro","year":"2007","journal-title":"IEEE Signal Processing Magazine"},{"key":"10.3233\/JCS-210035_ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2015.7122529"},{"key":"10.3233\/JCS-210035_ref41","doi-asserted-by":"publisher","DOI":"10.1061\/9780784480830.020"},{"key":"10.3233\/JCS-210035_ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503761"},{"issue":"3","key":"10.3233\/JCS-210035_ref43","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.clsr.2018.02.002","article-title":"Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR","volume":"34","author":"Wachter","year":"2018","journal-title":"Computer law & security review"},{"key":"10.3233\/JCS-210035_ref44","doi-asserted-by":"crossref","unstructured":"S. Harper, M. Mehrnezhad and J.C. Mace, User Privacy Concerns and Preferences in Smart Buildings, in: International Workshop on Socio-Technical Aspects in Security and Trust, Springer, 2020, pp. 85\u2013106.","DOI":"10.1007\/978-3-030-79318-0_5"},{"key":"10.3233\/JCS-210035_ref45","doi-asserted-by":"crossref","unstructured":"P. Morgner, C. M\u00fcller, M. Ring, B. Eskofier, C. Riess, F. Armknecht and Z. Benenson, Privacy implications of room climate data, in: European Symposium on Research in Computer Security, Springer, 2017, pp. 324\u2013343.","DOI":"10.1007\/978-3-319-66399-9_18"},{"key":"10.3233\/JCS-210035_ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858432"},{"key":"10.3233\/JCS-210035_ref47","doi-asserted-by":"publisher","DOI":"10.3390\/info9100251"},{"key":"10.3233\/JCS-210035_ref48","unstructured":"D. Tuzcuoglu, D. Yang, B. de Vries and A. Sungur, Social interaction in an office environment: A qualitative study after relocation to a smart office, in: Transdisciplinary Workplace Research Conference 2020, 2020."},{"key":"10.3233\/JCS-210035_ref50","doi-asserted-by":"crossref","unstructured":"K. Marky, A. Voit, A. St\u00f6ver, K. Kunze, S. Schr\u00f6der and M. M\u00fchlh\u00e4user, \u201cI don\u2019t know how to protect myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments, in: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, 2020, pp. 1\u201311.","DOI":"10.1145\/3419249.3420164"},{"key":"10.3233\/JCS-210035_ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_7"},{"issue":"12","key":"10.3233\/JCS-210035_ref52","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1016\/j.ijhcs.2013.09.002","article-title":"Guide to measuring privacy concern: Review of survey and observational instruments","volume":"71","author":"Preibusch","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"10.3233\/JCS-210035_ref53","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS quarterly"},{"issue":"4","key":"10.3233\/JCS-210035_ref54","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004","journal-title":"Information systems research"},{"issue":"3","key":"10.3233\/JCS-210035_ref55","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10207-017-0369-x","article-title":"Stealing PINs via mobile sensors: actual risk versus user perception","volume":"17","author":"Mehrnezhad","year":"2018","journal-title":"International Journal of Information Security"},{"key":"10.3233\/JCS-210035_ref56","doi-asserted-by":"crossref","unstructured":"K. Crager and A. Maiti, Information leakage through mobile motion sensors: User awareness and concerns, in: EuroUSEC, 2017.","DOI":"10.14722\/eurousec.2017.23013"},{"key":"10.3233\/JCS-210035_ref57","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC51268.2020.00019"},{"issue":"4","key":"10.3233\/JCS-210035_ref58","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1515\/popets-2017-0040","article-title":"Why Privacy Is All But Forgotten","volume":"2017","author":"Gro\u00df","year":"2017","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"2","key":"10.3233\/JCS-210035_ref59","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2012.52","article-title":"The menlo report","volume":"10","author":"Bailey","year":"2012","journal-title":"IEEE Security & Privacy"},{"key":"10.3233\/JCS-210035_ref61","doi-asserted-by":"crossref","unstructured":"Y. Yao, J.R. Basdeo, S. Kaushik and Y. Wang, Defending my castle: A co-design study of privacy mechanisms for smart homes, in: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019, pp. 1\u201312.","DOI":"10.1145\/3290605.3300428"},{"key":"10.3233\/JCS-210035_ref62","unstructured":"E. Zeng and F. Roesner, Understanding and Improving Security and Privacy in {Multi-User} Smart Homes: A Design Exploration and {In-Home} User Study, in: 28th USENIX Security Symposium (USENIX Security, Vol. 19, 2019, pp. 159\u2013176."},{"key":"10.3233\/JCS-210035_ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47539-0_22"},{"issue":"1","key":"10.3233\/JCS-210035_ref64","first-page":"83","article-title":"Safe at home: Towards a feminist critique of cybersecurity","volume":"15","author":"Slupska","year":"2019","journal-title":"St Antony\u2019s International Review"}],"container-title":["Journal of Computer Security"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCS-210035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:56:44Z","timestamp":1741672604000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCS-210035"}},"subtitle":[],"editor":[{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,7,4]]},"references-count":51,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jcs-210035","relation":{},"ISSN":["1875-8924","0926-227X"],"issn-type":[{"value":"1875-8924","type":"electronic"},{"value":"0926-227X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7,4]]}}}