{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:41:23Z","timestamp":1760143283678,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"UK EPSRC","award":["EP\/S035362\/1"],"award-info":[{"award-number":["EP\/S035362\/1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors during a cyberattack, there is no unified consensus on how to influence them in order to minimize the attack\u2019s impact and expedite recovery. Public perceptions can affect the success and sustainability of connected places; however, exactly how and to what extent remains unknown. We argue that more research is needed on the mechanisms to assess the influence of public perceptions and associated behaviors on threats to security in connected places. Furthermore, there is a need to investigate the models and tools currently being deployed by connected place design and management to understand and influence public perceptions and behaviors. Lastly, we identify the requirements to investigate the complex relationship between the public and connected place managers, define all stakeholders clearly, and explore the patterns between specific connected place cybersecurity incidents and the methods used to transform public perceptions.<\/jats:p>","DOI":"10.3390\/info15020080","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T10:44:24Z","timestamp":1706697864000},"page":"80","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4911-4805","authenticated-orcid":false,"given":"Agnieszka","family":"Dutkowska-Zuk","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster LA1 4YW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5246-4442","authenticated-orcid":false,"given":"Joe","family":"Bourne","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster LA1 4YW, UK"}]},{"given":"Chengyuan","family":"An","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster LA1 4YW, UK"}]},{"given":"Xuan","family":"Gao","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster LA1 4YW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7214-6485","authenticated-orcid":false,"given":"Oktay","family":"Cetinkaya","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford OX1 2JD, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3838-1668","authenticated-orcid":false,"given":"Peter","family":"Novitzky","sequence":"additional","affiliation":[{"name":"University College London, London WC1E 6BT, UK"},{"name":"Avans University of Applied Sciences, 4817 LL Breda, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3304-2632","authenticated-orcid":false,"given":"Gideon","family":"Ogunniye","sequence":"additional","affiliation":[{"name":"University College London, London WC1E 6BT, UK"}]},{"given":"Rachel","family":"Cooper","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster LA1 4YW, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9074-3016","authenticated-orcid":false,"given":"David","family":"De Roure","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford OX1 2JD, UK"}]},{"given":"Julie","family":"McCann","sequence":"additional","affiliation":[{"name":"Adaptive Emergent Systems Engineering, Imperial College London, London SW7 2BX, UK"}]},{"given":"Jeremy","family":"Watson","sequence":"additional","affiliation":[{"name":"University College London, London WC1E 6BT, UK"}]},{"given":"Tim","family":"Watson","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London NW1 2DB, UK"}]},{"given":"Eleri","family":"Jones","sequence":"additional","affiliation":[{"name":"Independent Researcher, Bangor LL57 2DG, UK"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,31]]},"reference":[{"key":"ref_1","unstructured":"(2023, January 24). Connected Places Cyber Security Principles, Available online: https:\/\/www.ncsc.gov.uk\/collection\/connected-places-security-principles."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.scs.2017.12.034","article-title":"The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability","volume":"38","author":"Bibri","year":"2018","journal-title":"Sustain. Cities Soc."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"122877","DOI":"10.1016\/j.jclepro.2020.122877","article-title":"Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future","volume":"274","author":"Patrono","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_4","first-page":"419","article-title":"Meeting challenges in IoT: Sensing, energy efficiency, and the implementation","volume":"Volume 1","author":"Patrono","year":"2020","journal-title":"Proceedings of the Fourth International Congress on Information and Communication Technology: ICICT 2019"},{"key":"ref_5","unstructured":"NCSC (2023, November 09). What Is Cyber Security?, Available online: https:\/\/www.ncsc.gov.uk\/section\/about-ncsc\/what-is-cyber-security."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"102096","DOI":"10.1016\/j.adhoc.2020.102096","article-title":"Proposing a secure RPL based internet of things routing protocol: A review","volume":"101","author":"Almusaylim","year":"2020","journal-title":"Ad. Hoc. Netw."},{"key":"ref_7","unstructured":"Kaushik, K., and Singh, K. (2019). Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018, Springer."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSEC.2020.3012353","article-title":"Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions","volume":"19","author":"Martinez","year":"2021","journal-title":"IEEE Secur. Priv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.cose.2019.02.009","article-title":"Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership","volume":"83","author":"Vitunskaite","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kakkavas, G., Gkatzioura, D., Karyotis, V., and Papavassiliou, S. (2020). A review of advanced algebraic approaches enabling network tomography for future network infrastructures. Future Internet, 12.","DOI":"10.3390\/fi12020020"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.jbusres.2019.07.039","article-title":"Literature review as a research methodology: An overview and guidelines","volume":"104","author":"Snyder","year":"2019","journal-title":"J. Bus. Res."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"105906","DOI":"10.1016\/j.ijsu.2021.105906","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume":"88","author":"Page","year":"2021","journal-title":"Int. J. Surg."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"101799","DOI":"10.1016\/j.giq.2022.101799","article-title":"Smart cities & citizen discontent: A systematic review of the literature","volume":"40","author":"Ruijer","year":"2023","journal-title":"Gov. Inf. Q."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1177\/0020852314564308","article-title":"Governing the smart city: A review of the literature on smart urban governance","volume":"82","author":"Meijer","year":"2016","journal-title":"Int. Rev. Adm. Sci."},{"key":"ref_15","unstructured":"Soare, S.R. (2020). Cyber Threats and NATO 2030: Horizon Scanning and Analysis, CCDCOE."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"7999","DOI":"10.1016\/j.egyr.2021.08.124","article-title":"Smart city and cyber-security; technologies used, leading challenges and future recommendations","volume":"7","author":"Ma","year":"2021","journal-title":"Energy Rep."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Thomas, V., Wang, D., Mullagh, L., and Dunn, N. (2016). Where is Wally? In Search of Citizen Perspectives on the Smart City. Sustainability, 8.","DOI":"10.3390\/ifou-A001"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Herbert, F., Schmidbauer-Wolf, G.M., and Reuter, C. (2021, January 5\u20138). Who Should Get My Private Data in Which Case? Evidence in the Wild. Proceedings of the Mensch und Computer 2021, New York, NY, USA. MuC \u201921.","DOI":"10.1145\/3473856.3473879"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"465","DOI":"10.3233\/JCS-210035","article-title":"User Privacy Concerns in Commercial Smart Buildings","volume":"30","author":"Harper","year":"2022","journal-title":"J. Comput. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Fayoumi, A., Sobati-Moghadam, S., Rajaiyan, A., Oxley, C., Montero, P.F., and Dahmani, A. (2022, January 14\u201315). The Cybersecurity Risks of Using Internet of Things (IoT) and Surveys of End-Users and Providers within the Domiciliary Care Sector. Proceedings of the 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), Mashhad, Iran.","DOI":"10.1109\/SCIoT56583.2022.9953634"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sharma, S.K., Dwivedi, Y.K., Metri, B., and Rana, N.P. (2020, January 18\u201319). Citizens\u2019 Participation as an Important Element for Smart City Development. Proceedings of the Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, Tiruchirappalli, India. IFIP Advances in Information and Communication Technology.","DOI":"10.1007\/978-3-030-64849-7"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lea, R., and Blackstock, M. (2014, January 1\u20132). Smart Cities: An IoT-centric Approach. Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing, New York, NY, USA. IWWISS \u201914.","DOI":"10.1145\/2637064.2637096"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.giq.2016.06.004","article-title":"Privacy concerns in smart cities","volume":"33","year":"2016","journal-title":"Gov. Inf. Q."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1080\/0144929X.2019.1693629","article-title":"Factors that determine residents\u2019 acceptance of smart city technologies","volume":"39","author":"Habib","year":"2020","journal-title":"Behav. Inf. Technol."},{"key":"ref_25","unstructured":"Louw, C., and Von Solms, B. (2019). Smart Cities Cybersecurity and Privacy, Elsevier."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Georgiadou, A., Michalitsi-Psarrou, A., Gioulekas, F., Stamatiadis, E., Tzikas, A., Gounaris, K., Doukas, G., Ntanos, C., Landeiro Ribeiro, L., and Askounis, D. (2021). Hospitals\u2019 Cybersecurity Culture during the COVID-19 Crisis. Healthcare, 9.","DOI":"10.3390\/healthcare9101335"},{"key":"ref_27","first-page":"82","article-title":"Cyber Security Awareness, Knowledge and Behavior: A Comparative Study","volume":"62","author":"Zwilling","year":"2022","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_28","first-page":"1","article-title":"\u201cI feel spied on and I do not have any control over my data\u201d: User Privacy Perception, Preferences and Trade-offs in University Smart Buildings","volume":"2023","author":"Tawer","year":"2022","journal-title":"Socio-Tech. Asp. Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Sasse, M.A., and Baddeley, M. (2016, January 5). Why do people use unsecure public wi-fi? An investigation of behaviour and factors driving decisions. Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, New York, NY, USA. STAST \u201916.","DOI":"10.1145\/3046055.3046058"},{"key":"ref_30","first-page":"236","article-title":"Extending the airport boundary: Connecting physical security and cybersecurity","volume":"12","author":"Willemsen","year":"2018","journal-title":"J. Airpt. Manag."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.futures.2016.05.010","article-title":"Is there anybody out there? The place and role of citizens in tomorrow\u2019s smart cities","volume":"82","author":"Vanolo","year":"2016","journal-title":"Futures"},{"key":"ref_32","first-page":"483","article-title":"Security and Privacy Awareness: A Survey for Smartphone User","volume":"10","author":"Ali","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_33","unstructured":"Ipsos MORI (2023, October 31). Consumer Attitudes towards IoT Security, Available online: https:\/\/assets.publishing.service.gov.uk\/media\/607d7e588fa8f57358f07e60\/Consumer_Attitudes_Towards_IoT_Security_-_Research_Report.pdf."},{"key":"ref_34","unstructured":"Simic, M. (2022). Cyber Security Awareness of Croatian Students and the Personal Data Protection, University of JJ Strossmayer Osijek."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.giq.2014.12.004","article-title":"Determinants of multi-service smartcard success for smart cities development: A study based on citizens\u2019 privacy and security perceptions","volume":"32","year":"2015","journal-title":"Gov. Inf. Q."},{"key":"ref_36","unstructured":"Isin, E., and Ruppert, E. (2020). Being Digital Citizens, Rowman & Littlefield Publishers. [2nd ed.]."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"465","DOI":"10.5194\/isprs-archives-XLVI-4-W5-2021-465-2021","article-title":"Smart City Security Issues: The Main Attacks and Countermeasures","volume":"XLVI-4\/W5-2021","author":"Saber","year":"2021","journal-title":"Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci."},{"key":"ref_38","unstructured":"Cilauro, F. (2023, December 20). The Connected Places Market in the UK, Available online: https:\/\/assets.publishing.service.gov.uk\/media\/633d9e3ee90e0709df741cb8\/The_connected_places_market_in_the_UK_2022.pdf."},{"key":"ref_39","unstructured":"(2023, December 20). Security-Minded Approach to Developing Smart Cities. Available online: https:\/\/www.protectuk.police.uk\/advice-and-guidance\/awareness\/security-minded-approach-developing-smart-cities."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MCOM.2013.6525606","article-title":"The pursuit of citizens\u2019 privacy: A privacy-aware smart city is possible","volume":"51","author":"Solanas","year":"2013","journal-title":"IEEE Commun. Mag."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/2\/80\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:52:42Z","timestamp":1760104362000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/2\/80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,31]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["info15020080"],"URL":"https:\/\/doi.org\/10.3390\/info15020080","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2024,1,31]]}}}