How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review †
Abstract
:1. Introduction
“a computationally augmented everyday environment where the physical world (everyday objects) and the informational world are integrated within the ever-growing Internet infrastructure via a wide range of active and smart data-sensing devices […].”[2] (p. 234)
2. Methods
2.1. Search Strategy
2.2. Eligibility Criteria
- Language: Full-text article written in English.
- Title relevance: Mentions user perceptions or a variable thereof; an aspect or type of connected place; and an aspect or synonym of cybersecurity and/or sustainability.
- Abstract relevance: Mentions user perceptions or a variable thereof; an aspect or type of connected place; and an aspect or synonym of cybersecurity and/or sustainability.
- Geography of case studies: Given the UK policy orientation of this review purpose, the authors agreed with DSIT’s Secure Connected Place Team that only the case studies in the UK, Europe, and North America would be eligible for inclusion given their likely cultural, democratic and legal proximity; and similarity in technological readiness level.
3. Results
3.1. Background Characteristics
3.1.1. Characteristics of Results against Query Syntax Variables
3.1.2. Characteristics of Results by Geographic Focus
4. Findings
4.1. Public Perceptions Influencing Public Security Behaviors
4.2. Perspectives on Public Security Behaviors Affecting Security, and Sustainability of Connected Places
4.2.1. Reasons Public Perceptions Affect Connected Place Security and Sustainability
4.2.2. Specific Technical Vulnerabilities Affected by Public Perception
4.2.3. The Public as a Threat to Connected Place Security and Sustainability
4.2.4. Public Perspectives before, during, and after a Cyberattack on a Connected Place
4.3. The Relationship between Connected Places, Their Managers and Public Perceptions, and How This Affects Security and Sustainability
4.3.1. The Various Definitions of Users, Place Managers and the Public in Connected Places Cybersecurity Research and Guidance
4.3.2. The Influence of Connected Place Managers and Their Relationship with the Public
4.3.3. Tools, Frameworks, Models and Methods That Affect the Influence of Public Perceptions on Connected Places’ Security and Sustainability
5. Discussion
5.1. Confusion and Contradictions
- Connected place security is simultaneously in the interest of both the public and place managers and these interests are not ever in conflict.
- That public users and place managers are entirely separate groups, with no individuals taking dual roles within a connected place.
- That malicious actors are ‘another’ separate group to public users and place managers and that users or place managers themselves always act in the interests of the other group and those within their own group.
- Place managers often focus on the technical requirements of privacy without adequate consideration of the social requirements. The technical aspects of privacy focus on the technical requirements (such as access control and data minimization) required to ensure privacy, while the social aspects focus on the privacy preferences of the public users, the relationships between public users and how such relationships impact their privacy.
5.2. Trade-Offs of Connected Places
5.2.1. Secure Places vs. Friction-Less Experiences
5.2.2. Sustainability vs. Security
5.2.3. Responsibility vs. Authority
5.3. Limitations of This Study
5.4. Recommendations for Future Research
5.4.1. Socio-Technical Approach towards Security
5.4.2. User in the Loop
5.4.3. Transparency and Awareness Lead to Acceptance
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Connected Places Cyber Security Principles. Available online: https://www.ncsc.gov.uk/collection/connected-places-security-principles (accessed on 24 January 2023).
- Bibri, S.E. The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability. Sustain. Cities Soc. 2018, 38, 230–253. [Google Scholar] [CrossRef]
- Nižetić, S.; Šolić, P.; Gonzalez-De, D.L.D.I.; Patrono, L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 2020, 274, 122877. [Google Scholar] [CrossRef] [PubMed]
- Perković, T.; Damjanović, S.; Šolić, P.; Patrono, L.; Rodrigues, J.J. Meeting challenges in IoT: Sensing, energy efficiency, and the implementation. In Proceedings of the Fourth International Congress on Information and Communication Technology: ICICT 2019, London, UK, 6–8 September 2023; Springer: Berlin/Heidelberg, Germany, 2020; Volume 1, pp. 419–430. [Google Scholar]
- NCSC. What Is Cyber Security? Available online: https://www.ncsc.gov.uk/section/about-ncsc/what-is-cyber-security (accessed on 9 November 2023).
- Almusaylim, Z.A.; Alhumam, A.; Jhanjhi, N. Proposing a secure RPL based internet of things routing protocol: A review. Ad. Hoc. Netw. 2020, 101, 102096. [Google Scholar] [CrossRef]
- Kaushik, K.; Singh, K. Security and trust in iot communications: Role and impact. In Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018; Springer: Berlin/Heidelberg, Germany, 2019; pp. 791–798. [Google Scholar]
- Hernandez-Ramos, J.L.; Martinez, J.A.; Savarino, V.; Angelini, M.; Napolitano, V.; Skarmeta, A.F.; Baldini, G. Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions. IEEE Secur. Priv. 2021, 19, 12–23. [Google Scholar] [CrossRef]
- Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef]
- Kakkavas, G.; Gkatzioura, D.; Karyotis, V.; Papavassiliou, S. A review of advanced algebraic approaches enabling network tomography for future network infrastructures. Future Internet 2020, 12, 20. [Google Scholar] [CrossRef]
- Snyder, H. Literature review as a research methodology: An overview and guidelines. J. Bus. Res. 2019, 104, 333–339. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Int. J. Surg. 2021, 88, 105906. [Google Scholar] [CrossRef]
- van Twist, A.; Ruijer, E.; Meijer, A. Smart cities & citizen discontent: A systematic review of the literature. Gov. Inf. Q. 2023, 40, 101799. [Google Scholar] [CrossRef]
- Meijer, A.; Bolívar, M.P.R. Governing the smart city: A review of the literature on smart urban governance. Int. Rev. Adm. Sci. 2016, 82, 392–408. [Google Scholar] [CrossRef]
- Soare, S.R. Smart Cities, Cyber Warfare and Social Disorder. In Cyber Threats and NATO 2030: Horizon Scanning and Analysis; CCDCOE: Tallinn, Estonia, 2020. [Google Scholar]
- Ma, C. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Rep. 2021, 7, 7999–8012. [Google Scholar] [CrossRef]
- Thomas, V.; Wang, D.; Mullagh, L.; Dunn, N. Where is Wally? In Search of Citizen Perspectives on the Smart City. Sustainability 2016, 8, 207. [Google Scholar] [CrossRef]
- Herbert, F.; Schmidbauer-Wolf, G.M.; Reuter, C. Who Should Get My Private Data in Which Case? Evidence in the Wild. In Proceedings of the Mensch und Computer 2021, New York, NY, USA, 5–8 September 2021; MuC ’21. pp. 281–293. [Google Scholar] [CrossRef]
- Harper, S.; Mehrnezhad, M.; Mace, J.; Groß, T.; Viganò, L. User Privacy Concerns in Commercial Smart Buildings. J. Comput. Secur. 2022, 30, 465–497. [Google Scholar] [CrossRef]
- Fayoumi, A.; Sobati-Moghadam, S.; Rajaiyan, A.; Oxley, C.; Montero, P.F.; Dahmani, A. The Cybersecurity Risks of Using Internet of Things (IoT) and Surveys of End-Users and Providers within the Domiciliary Care Sector. In Proceedings of the 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), Mashhad, Iran, 14–15 September 2022; pp. 1–7. [Google Scholar] [CrossRef]
- Manfreda, A.; Ekart, N.; Mori, M.; Groznik, A. Citizens’ Participation as an Important Element for Smart City Development. In Proceedings of the Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, Tiruchirappalli, India, 18–19 December 2020; Sharma, S.K., Dwivedi, Y.K., Metri, B., Rana, N.P., Eds.; Springer: Cham, Switzerland, 2020. IFIP Advances in Information and Communication Technology. pp. 274–284. [Google Scholar] [CrossRef]
- Lea, R.; Blackstock, M. Smart Cities: An IoT-centric Approach. In Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing, New York, NY, USA, 1–2 September 2014; IWWISS ’14. pp. 1–2. [Google Scholar] [CrossRef]
- van Zoonen, L. Privacy concerns in smart cities. Gov. Inf. Q. 2016, 33, 472–480. [Google Scholar] [CrossRef]
- Habib, A.; Alsmadi, D.; Prybutok, V.R. Factors that determine residents’ acceptance of smart city technologies. Behav. Inf. Technol. 2020, 39, 610–623. [Google Scholar] [CrossRef]
- Louw, C.; Von Solms, B. Free Public Wi-Fi Security in a Smart City Context-An End User Perspective. In Smart Cities Cybersecurity and Privacy; Elsevier: Amsterdam, The Netherlands, 2019; p. 127. [Google Scholar] [CrossRef]
- Georgiadou, A.; Michalitsi-Psarrou, A.; Gioulekas, F.; Stamatiadis, E.; Tzikas, A.; Gounaris, K.; Doukas, G.; Ntanos, C.; Landeiro Ribeiro, L.; Askounis, D. Hospitals’ Cybersecurity Culture during the COVID-19 Crisis. Healthcare 2021, 9, 1335. [Google Scholar] [CrossRef] [PubMed]
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, L.; Cetin, F.; Basim, H. Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. J. Comput. Inf. Syst. 2022, 62, 82–97. [Google Scholar] [CrossRef]
- Tawer, R.; Mehrnezhad, M.; Morisset, C. “I feel spied on and I do not have any control over my data”: User Privacy Perception, Preferences and Trade-offs in University Smart Buildings. Socio-Tech. Asp. Secur. 2022, 2023, 1–20. [Google Scholar]
- Sombatruang, N.; Sasse, M.A.; Baddeley, M. Why do people use unsecure public wi-fi? An investigation of behaviour and factors driving decisions. In Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, New York, NY, USA, 5 December 2016; STAST ’16. pp. 61–72. [Google Scholar] [CrossRef]
- Willemsen, B.; Cadee, M. Extending the airport boundary: Connecting physical security and cybersecurity. J. Airpt. Manag. 2018, 12, 236–247. [Google Scholar]
- Vanolo, A. Is there anybody out there? The place and role of citizens in tomorrow’s smart cities. Futures 2016, 82, 26–36. [Google Scholar] [CrossRef]
- Ali, M.; Rahman, M.L.; Jahan, I. Security and Privacy Awareness: A Survey for Smartphone User. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 483–488. [Google Scholar] [CrossRef]
- Ipsos MORI. Consumer Attitudes towards IoT Security. Available online: https://assets.publishing.service.gov.uk/media/607d7e588fa8f57358f07e60/Consumer_Attitudes_Towards_IoT_Security_-_Research_Report.pdf (accessed on 31 October 2023).
- Papic, A.; Radoja, K.; Szombathelyi, D. Cyber Security Awareness of Croatian Students and the Personal Data Protection; Simic, M., Ed.; University of JJ Strossmayer Osijek: Osijek, Croatia, 2022; pp. 563–574. [Google Scholar]
- Belanche-Gracia, D.; Casaló-Ariño, L.V.; Pérez-Rueda, A. Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Gov. Inf. Q. 2015, 32, 154–163. [Google Scholar] [CrossRef]
- Isin, E.; Ruppert, E. Being Digital Citizens, 2nd ed.; Rowman & Littlefield Publishers: Lanham, MD, USA, 2020. [Google Scholar]
- Saber, O.; Mazri, T. Smart City Security Issues: The Main Attacks and Countermeasures. Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. 2021, XLVI-4/W5-2021, 465–472. [Google Scholar] [CrossRef]
- Cilauro, F. The Connected Places Market in the UK. 2021. Available online: https://assets.publishing.service.gov.uk/media/633d9e3ee90e0709df741cb8/The_connected_places_market_in_the_UK_2022.pdf (accessed on 20 December 2023).
- Security-Minded Approach to Developing Smart Cities. 2022. Available online: https://www.protectuk.police.uk/advice-and-guidance/awareness/security-minded-approach-developing-smart-cities (accessed on 20 December 2023).
- Martinez-Balleste, A.; Perez-Martinez, P.; Solanas, A. The pursuit of citizens’ privacy: A privacy-aware smart city is possible. IEEE Commun. Mag. 2013, 51, 136–141. [Google Scholar] [CrossRef]
Constant Concept | Variable Concept |
---|---|
((public OR user N5 trust* OR perspective* OR attitude* OR perception* OR awareness OR accept*) AND (“cyber?security” OR cybersecurity)) | Cit*; place; smart; connected; hospital; airport; station; centre OR center; port; prison; “social housing” |
Parent Category | Subcategory 1 | Subcategory 2 | Frequency |
---|---|---|---|
Application | Smart Transport | 32 | |
Application | Sensors | 27 | |
IoT devices | 19 | ||
Connectivity & Data Transport | Radio Network | Wi-Fi | 17 |
IoT Devices | Sensors | Environmental Monitoring | 17 |
Application | E-Governance | 14 | |
IoT devices | End Point Devices | Smartphone | 14 |
Application | Smart Lighting | 13 | |
ICT | 13 | ||
IT Security | 12 | ||
Application | Smart Homes | 10 | |
Application | Smart Surveillance Systems | 9 | |
IoT devices | Wearable | Wearables | 9 |
Application | Smart Parking | 8 | |
Application | Smart Healthcare | 8 | |
Application | Smart Building | 8 | |
Big Data | Artificial Intelligence | 8 | |
Connectivity & Data Transport | Mobile Network | 5G | 8 |
IT Security | Authentication | Smart Cards | 7 |
Data Management | Data Storage | Cloud | 6 |
Big Data | 5 | ||
IoT devices | End Point Devices | PC | 5 |
Application | Surveillance System | CCTV | 4 |
Application | Energy Infrastructure | 4 | |
Application | Smart Delivery Systems | 4 | |
Connectivity & Data Transport | Radio Network | Bluetooth | 4 |
Connectivity & Data Transport | Satelite Navigation | GPS | 4 |
Connectivity & Data Transport | Low Power Network | LoRaWAN | 4 |
IoT devices | Smart Meters | 3 | |
IoT Platforms | Urban-Scale Iot Platforms | 3 | |
IT Security | Contactless | RFID | 3 |
IT Security | Contactless | NFC | 3 |
Service | 3 | ||
Application | Actuators | 2 | |
Connectivity & Data Transport | ISP | 2 | |
Software | App | Waze | 2 |
Application | Smart Building | Air Conditioning (HVAC) | 1 |
Application | Baggage Handling Systems | 1 | |
Application | BMS | 1 | |
Application | Environmental Monitoring | Connected Forest Project | 1 |
Application | BMS | IEQ | 1 |
Application | Digital Twins | 1 | |
Application | Surveillance System | Smart Alarm Systems | 1 |
Blockchain | 1 | ||
Connectivity & Data Transport | Radio Network | Free Open Networks | 1 |
Connectivity & Data Transport | Radio Network | NB-IoT | 1 |
Connectivity & Data Transport | Low Power Network | Weightless | 1 |
Connectivity & Data Transport | Network Layer | Zigbee | 1 |
Connectivity & Data Transport | Low Power Network | NB-IoT | 1 |
Connectivity & Data Transport | Network Hardware | VSAT | 1 |
Connectivity & Data Transport | Protocol | CoAP | 1 |
Connectivity & Data Transport | Radio Network | CWN | 1 |
Connectivity & Data Transport | Protocol | 1 | |
Connectivity & Data Transport | Mobility Service | V2X | 1 |
Connectivity & Data Transport | Mobility Service | VANETS | 1 |
Connectivity & Data Transport | Protocol | DNS | 1 |
Cyberspace | User Experience | VR | 1 |
Cyberspace | User Experience | AR | 1 |
Data Management | Data Management | CKAN | 1 |
Data Management | Data Storage | USB | 1 |
Edge Computing | Edge And Fog Computing | 1 | |
ICT | Microcontrollers | 1 | |
IoT devices | End Point Devices | Smart Batteries | 1 |
IoT devices | End Point Devices | EUT | 1 |
IoT devices | End Point Devices | Smart Plugs | 1 |
IoT devices | Programmable Logic Controllers (PLCs) | 1 | |
IoT Platforms | WoTKit | 1 | |
IT Security | Authentication | PIN | 1 |
IT Security | Authentication | MFA | 1 |
IT Security | Encryption | PIN | 1 |
IT Security | Authentication | readers | 1 |
Service | Financial Service | E-Banking | 1 |
Service | LBS provider | 1 | |
Software | App | Otonomo | 1 |
Software | App | Corona-Warn-App | 1 |
Software | Mobility Service | Smart Back-office Systems | 1 |
Software | Control System Architecture | SCADA | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dutkowska-Zuk, A.; Bourne, J.; An, C.; Gao, X.; Cetinkaya, O.; Novitzky, P.; Ogunniye, G.; Cooper, R.; De Roure, D.; McCann, J.; et al. How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review. Information 2024, 15, 80. https://doi.org/10.3390/info15020080
Dutkowska-Zuk A, Bourne J, An C, Gao X, Cetinkaya O, Novitzky P, Ogunniye G, Cooper R, De Roure D, McCann J, et al. How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review. Information. 2024; 15(2):80. https://doi.org/10.3390/info15020080
Chicago/Turabian StyleDutkowska-Zuk, Agnieszka, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, and et al. 2024. "How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review" Information 15, no. 2: 80. https://doi.org/10.3390/info15020080
APA StyleDutkowska-Zuk, A., Bourne, J., An, C., Gao, X., Cetinkaya, O., Novitzky, P., Ogunniye, G., Cooper, R., De Roure, D., McCann, J., Watson, J., Watson, T., & Jones, E. (2024). How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review. Information, 15(2), 80. https://doi.org/10.3390/info15020080