Abstract

The COVID-19 pandemic has reshaped the way people work, normalizing the practice of working from home. However, work from home (WFH) can cause a blurring of personal and professional boundaries, surfacing new privacy issues, especially when workers take work meetings from their homes. As WFH arrangements are now standard practice in many organizations, addressing the associated privacy concerns should be a key part of creating healthy work environments for workers. To this end, we conducted a scenario-based survey with 214 US-based workers who currently work from home regularly. Our results suggest that privacy invasions are commonly experienced while working from home and cause discomfort to many workers. However, only a minority said that the discomfort escalated to cause harm to them or others and that the harm was almost always minor and psychological. While scenarios that restrict worker autonomy (prohibit turning off camera or microphone) are the least experienced scenarios, they are associated with the highest reported discomfort. In addition, participants reported measures that violated or would violate their employer’s autonomy-restricting rules to protect their privacy. We also find that conference tool settings that can prevent privacy invasions are not widely used compared to manual privacy-protective measures. Our findings provide a better understanding of the privacy challenges landscape that WFH workers face and how they address them, providing useful insights to organizations’ policymakers and technology designers for areas of improvements, to provide healthier work environments to workers.

Introduction

Work from home (WFH), is a flexible setting that allows workers to perform their work duties, including collaboration with others such as meeting and teaching, remotely from their homes instead of a dedicated office space provided by employers. WFH often requires the use of information and communication technologies such as voice and video conferencing tools (e.g. Zoom [1] and Microsoft Teams [2]). Before 2020, WFH was often provided as a benefit; however, in early 2020, with the advent of the global coronavirus pandemic (COVID-19) [3], WFH was no longer a benefit, but a mandate, despite the challenges it poses to some workers [4–6]. WFH can be especially challenging for workers who live with children, lack appropriate space at home, or lack the skills needed to deal with new technologies. Some WFH challenges were exemplified in viral videos. For example, in 2017, Professor Robert Kelly’s two young children invaded a live stream interview about South Korea’s politics on the British Broadcasting Channel (BBC) and were subsequently dragged out of the room by his wife [7], as illustrated in Fig. 1.

Graphical representation of Professor Robert Kelly’s two young children invading a live stream interview being dragged out of the room by his wife
Figure 1.

Professor Robert Kelly, his child, and wife invading a live streaming interview with the BBC channel [8].

After COVID-19, many organizations have changed their policies to allow WFH on an ongoing basis [9–11]. According to a 2024 report by WFH Research on US workers, the growth in WFH after COVID-19 is nearly equivalent to 40 years of growth before COVID-19 [12]. The same report shows that by early 2024, 13% of full-time workers were working fully remotely and 29% were in a hybrid mode [12]. Data from the US Bureau of Labor Statistics show that in December 2024, 23.1% of workers worked from home at least some of the time [13].

With a significant fraction of the American workforce working from home all or part of the time, understanding the privacy concerns and behaviors that first arose out of an emergency, WFH arrangements should now be considered a key part of creating healthy work environments for workers. To do that, we must first understand the privacy concerns and behaviors of those whose “new normal” includes WFH on a regular basis.

Our study aims to provide a detailed account of the privacy concerns workers face and the protective measures they take to prevent them. In particular, this study aims to answer the following main questions: How prevalent is experiencing privacy-invasive scenarios among WFH workers? To what extent does experiencing these scenarios cause discomfort? Does discomfort escalate to cause harm to workers or others? What type of harm do workers experience? What types of scenarios are associated with the highest reported discomfort? What protective measures do some workers take? Why do some workers choose not to take protective measures?

To this end, we surveyed 214 US-based workers who currently work from home regularly about their experiences with privacy-invasive scenarios pertaining to: audio, video, data,1 and autonomy that can occur in a WFH setting.

Our key findings can be summarized as follows:

  1. Privacy-invasive scenarios are commonly experienced and caused discomfort to most of our participants. Almost all participants (93.9%) experienced at least one of the privacy-invasive scenarios, and more than half of the participants (65.4%) felt uncomfortable during at least one of the scenarios they experienced.

  2. Most of the participants who experienced a privacy-invasive scenario that made them feel uncomfortable said that the incident did not escalate to cause harm to them or others (74.3%).

  3. While scenarios that restrict worker autonomy, such as prohibiting them from turning off the camera or microphone, are not among the most commonly experienced scenarios, they are associated with the highest reported discomfort. Participants often violated or would violate the employer’s autonomy-restricting rules to protect their privacy.

  4. Participants reported experiencing more discomfort with audio privacy invasions than with video privacy invasions (46.2% vs. 28.8% of video privacy-invasive scenarios).

  5. Smart measures (software/hardware settings or features to prevent privacy-invasive scenarios, e.g. virtual background and noise cancellation features) are not widely adopted compared to manual measures (e.g. manually covering the camera and turning on/off the microphone). When used, more participants reported using settings or features to prevent video scenarios (24.0%) than audio (13.11%), data (8.4%), and autonomy (4.2%) scenarios.

Our findings provide useful insights to organizations’ policymakers and technology designers to identify areas of improvement to provide healthier work environments. In addition, we provide several open questions that can inspire future work.

Background and related work

The shift to WFH

The concept of remote work is not new [14–16]. It has gained popularity in the past 40 years as computers, smartphones, Internet connectivity, and collaboration platforms were becoming ubiquitous [16]. Before 2020, WFH was often provided voluntarily, as a form of benefit such as reduced commuting [15]. However, with the advent of the global COVID-19 pandemic in early 2020, many people who held positions that required them to go to a traditional office space regularly suddenly found themselves required (by their employer or lockdown laws) to stay home, and WFH was no longer a benefit, but a mandate.

WFH mandate created disparate experiences for individuals [4]. Ford et al.'s study on software developers’ experiences with WFH found that some developers reported being more productive, while others faced significant challenges [4]. WFH can impose challenges on some people, such as affording suitable space at home, and the overlap between work-life and home-life, which, in turn, may affect worker performance and well-being [5]. There are also legal considerations about WFH practices, privacy, and how the two might impact an individual’s livelihood. For example, in the USA, the default employment standard is “employment-at-will,” which means that individuals are not guaranteed work and their employers may choose to terminate employment at any time [6]. As a result, workers may feel the need to self-censor their home environments to help align with what they believe are the social expectations of others in their organization to preserve their reputation and employment status [6]. Thus, privacy-protecting behaviors may also be employment-protecting behaviors.

After COVID-19, many individuals and organizations found that the benefits of WFH outweigh the drawbacks. Many organizations have changed their policies to allow WFH on an ongoing basis [9–11]. Thus, understanding the privacy concerns workers face is a key part of creating healthy work environments. Our work is a step in this direction.

Technologies that enabled WFH

Technologies that allow workers to work remotely, such as video conferencing, unified communication, and productivity monitoring tools, existed well before the onset of the pandemic and were used regularly by those who had WFH arrangements with their employer [17]. However, the government-issued mandatory COVID-19 lockdown created a need for employers to quickly switch to a new way of working for their entire organization [18]. Video conferencing technologies, such as Microsoft Teams [2], Google Meet [19], and Zoom [1], became part of workers’ daily lives, and mobile phones (often the worker’s personal property) became an ad hoc office phone. Organizations that had unified communication systems leveraged them in new ways to help workers stay connected [17].

As COVID-19 lockdown extended from weeks to months of remote work, employers became increasingly interested in ensuring that their workers were productive, which resulted in a sharp increase in the demand for remote monitoring technologies [20]. Remote monitoring tools can provide employers with a variety of surveillance functions. These tools may include features ranging from basic time clock functionality (through which the worker can check in and out of their work shift) to remote monitoring tools, which are installed on computers to track the time spent on certain applications, documents opened, email read, and keystrokes [21,22]. Some remote monitoring tools can be configured to keep a log of all websites a worker visits and take a screenshot of the worker’s computer screen at regular intervals [22,23]. Furthermore, in addition to monitoring worker productivity based on their interaction with their computer, it is not uncommon for employers to opt to use video conferencing tools as a worker surveillance tool, requiring workers to keep their cameras and microphones on throughout their workday [20]. Vitak et al. showed that WFH workers have concerns about worker monitoring practices when data collection exceeds the norms and when monitoring limits workers’ autonomy [24].

Our work complements existing work in this realm and adds new insights to what is known about workers’ autonomy-invading scenarios and workers’ attitudes toward them.

WFH and security & privacy issues

WFH security and privacy issues are often interrelated (a security attack can cause a privacy breach). Sometimes both types of issues are combined as cybersecurity issues. However, for the sake of clarity, in what follows, we dissect previous work into two categories: security-focused and privacy-focused studies. Our work is considered a privacy-focused study from the human aspect.

Security-focused studies

Several studies investigated the security attacks that emerged or increased during the COVID-19 lockdown when WFH was mandated. Pranggono and Arabo provided a summary of notable cybersecurity attacks that increased during the COVID-19 period [25]. Kotak et al. evaluated the various technologies that allow remote work, and introduced a taxonomy of the security threats that these technologies and WFH introduced to organizations [26]. Lallie et al. highlighted key cybercrime incidents with respect to the timeline of key global events during the COVID-19 pandemic [27]. Other studies provided empirical analysis on particular types of attacks, such as Zoombombing [28], phishing [29,30], and ransomware [31], to list a few.

Another line of research on security issues and WFH was focused on workers’ and organizations’ perspectives. Georgiadou et al. investigated workers’ security readiness for WFH during the COVID-19 lockdown [32]. Their findings showed a lack of security readiness, especially in terms of the human aspect. For example, 53% of the workers had not received security guidelines regarding WFH from their organizations, which looks even worse knowing that 44% of them had never experienced WFH [32]. Alromaih et al. conducted a qualitative study on 20 WFH workers investigating the phenomenon “shadow security behavior,” where workers apply security practices that do not comply with the organization’s security policy [33]. They introduced a model for “personal security” and identified how it interacts with an organization’s security model in the WFH setting [33]. Bispham et al. interviewed six cybersecurity experts on the cybersecurity issues organizations face in the WFH setting during COVID-19 [34]. The research found that while WFH raised new cybersecurity challenges, experts indicated that cybersecurity issues did not undermine effective WFH [34]. The researchers suggested the need for surveys to gain an empirical understanding of cybersecurity issues during and after COVID-19 WFH setting [34], which is the contribution of our work.

Privacy-focused studies

A few recent studies focused on privacy issues in WFH setting. Emami-Naeini et al. conducted a survey on privacy concerns and attitudes toward remote communications in work, socializing, and learning contexts [35]. They found that privacy issues in remote communications are among the issues people care about and affect their comfort in using conferencing tools [35]. They also found that most of the participants felt that they lacked autonomy to choose the conference tool and/or to use the microphone and camera in their remote communications [35]. Prange et al. investigated privacy breaches that occurred as a result of video meetings [36]. Of the numerous examples of audio and video-based privacy breaches reported by their participants, more than half of them occurred in business-related scenarios, and many related to video conferencing tools broadcasting accidental audio or video sharing of private situations [36]. Cheetham et al. interviewed 18 participants to identify how the COVID-19 pandemic impacted people’s privacy [37]. Their results provided high-level themes and showed that workers face accidental or inappropriate disclosure, feel they have limited control over their privacy, and are reluctant to discuss privacy with their employers due to concerns about privacy stigma [37]. Whitty et al. conducted a study on the human factor in the WFH environment that includes workers’ cybersecurity training and the incidents they may face [38]. While the study is not dedicated to privacy and covered both security and privacy issues, it shed light on a few privacy-invasive incidents such as the unexpected appearance of children at work-related meetings [38]. Herder and Gullit examined workers’ privacy-protective behavior with respect to “power distance,” a term used to describe the extent to which less powerful members of an organization accept variations in power distribution [39]. They found that the presence of a superior did not affect participants’ reported privacy-protective measures in group of peers meetings as much as group size and familiarity with group members did [39].

Several privacy-focused studies focused primarily on remote education context. Li et al. and Castelli et al. investigated students’ unwillingness to share their cameras in remote classes [40,41]. Both studies identified privacy as one of the reasons that led students not to share their cameras in remote classes [40,41]. Students indicated concerns about their appearance, the appearance of their physical space, or the people around them [40,41]. Cohney et al. surveyed university instructors and administrators, and analyzed the security of a set of the most popular virtual learning platforms [42]. While the study is not solely privacy-focused, the instructor survey shed light on some privacy issues. It showed that nearly half of the instructors have security and privacy concerns, care about recording controls, and some were dissatisfied with the choice of the platform and its configuration by their university [42].

Technologies designed to protect workers’ privacy can fail under certain assumptions. Hilgefort et al. showed that software features that can be used to enhance privacy while using video conferencing tools, in particular, virtual backgrounds (which can be used to obfuscate surroundings) are vulnerable to attack [43]. They found that artificial intelligence can be used to effectively remove the blurred virtual backgrounds native to many video conferencing tools, revealing the participants’ true physical setting [43].

While themes related to some types of privacy-invasive scenarios were identified in prior work, our scenario-based survey combined a list of common privacy-invasive scenarios from different categories (audio, video, data, and autonomy), providing a more comprehensive approach that allowed us to identify nuanced and novel insights that none of the previous work identified. For example, previous work identified autonomy-invading scenarios; however, our results provide insight on their prevalence and the reported discomfort associated with them compared to other scenario categories. While previous work surfaced workers’ privacy concerns when working from home, our results evaluated to what extent the discomfort resulting from experiencing privacy-invasive scenarios escalates to cause harm to the workers or others, and what types of harm they cause. Such nuanced insights were missing in previous work, although they are essential for informed decisions about WFH policies and arrangements by employers and policymakers to provide healthier work environments. Unlike the samples surveyed in previous work, which included workers and non-workers or focused on the education context (students and/or educators), our sample includes only WFH workers, providing us with deeper insights into the issues workers face while working from home.

Method

We conducted a 214-participant online survey. We obtained ethical approval for the study from the CMU Institutional Review Board (IRB). All participants were presented with an online consent form at the beginning of the survey.

Design

Our survey consisted of two parts: a screening survey and a main survey. We used the screening survey to select participants who were currently professional workers (at the time of the study) and working from home regularly (one or more days per week, either in full or hybrid mode), in addition to other screening criteria (e.g. working from home for at least three months), which we detailed in the demographics section of the results.

Only those who met our screening criteria were invited to take the main survey and were immediately redirected to the main survey if they agreed. The screening survey is provided in Appendix 1.

To design the main survey questions, three members of the research team developed a set of 14 privacy-invasive scenarios that can occur in a WFH setting, listed in Table 1. Some of these scenarios were inspired by the results of an IRB-approved unpublished 50-participant exploratory survey on WFH privacy behaviors and concerns conducted by some of this paper’s authors and others in 2023. The 14 scenarios were divided into four categories: audio, video, data, and autonomy. The audio and video categories (five scenarios for each category, totaling 10 scenarios) presented leaked audio/video scenarios through the subject’s microphone/camera from five different actors: the subject, another adult, child, pet, and object (e.g. appliances, books, furniture, artwork). The data category (two scenarios) presented leaked data scenarios through the subject’s shared screen. Finally, the autonomy category (two scenarios) presented restricted subject’s autonomy to turn off the microphone/camera. All scenarios were presented in the context of a work-related remote call or meeting from home.

Table 1.

The 14 scenarios presented to participants were divided into categories. Scenarios that share a large amount of text are listed once in the shaded rows for each scenario category, starting with three dots (...) that represent the variable part of the scenario that changes according to the individual scenario listed below.

No.CodeScenario
Audio Scenarios... was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.
1voice_youYour voice
2voice_adultThe voice of an adult person (other than you) in your home
3voice_childThe voice of a child in your home
4sound_objectThe sound of an object (e.g. vacuum cleaner, doorbell, etc.) in your home
5sound_petThe sound of a pet in your home
Video Scenarios... was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.
6video_youVideo footage of you
7video_adultVideo footage of an adult person (other than you) in your home
8video_childVideo footage of a child in your home
9video_objectVideo footage of an object (e.g. books, furniture, artwork, etc.) in your home
10video_petVideo footage of a pet in your home
Data Scenarios... was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.
11computer_dataYour data (e.g. emails, files, images, file names, etc.)
12browsing_dataYour personalized web browsing data (e.g. personalized ads, auto-completed forms/URLs, browser opened tabs, etc.)
Autonomy Scenarios
13cant_stop_cameraYou wanted to do something urgent privately (e.g. take a medication) at your home, but were not allowed to stop sharing the camera
14cant_stop_micYou wanted to have an urgent private conversation at your home, but were not allowed to stop sharing the microphone
No.CodeScenario
Audio Scenarios... was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.
1voice_youYour voice
2voice_adultThe voice of an adult person (other than you) in your home
3voice_childThe voice of a child in your home
4sound_objectThe sound of an object (e.g. vacuum cleaner, doorbell, etc.) in your home
5sound_petThe sound of a pet in your home
Video Scenarios... was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.
6video_youVideo footage of you
7video_adultVideo footage of an adult person (other than you) in your home
8video_childVideo footage of a child in your home
9video_objectVideo footage of an object (e.g. books, furniture, artwork, etc.) in your home
10video_petVideo footage of a pet in your home
Data Scenarios... was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.
11computer_dataYour data (e.g. emails, files, images, file names, etc.)
12browsing_dataYour personalized web browsing data (e.g. personalized ads, auto-completed forms/URLs, browser opened tabs, etc.)
Autonomy Scenarios
13cant_stop_cameraYou wanted to do something urgent privately (e.g. take a medication) at your home, but were not allowed to stop sharing the camera
14cant_stop_micYou wanted to have an urgent private conversation at your home, but were not allowed to stop sharing the microphone
Table 1.

The 14 scenarios presented to participants were divided into categories. Scenarios that share a large amount of text are listed once in the shaded rows for each scenario category, starting with three dots (...) that represent the variable part of the scenario that changes according to the individual scenario listed below.

No.CodeScenario
Audio Scenarios... was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.
1voice_youYour voice
2voice_adultThe voice of an adult person (other than you) in your home
3voice_childThe voice of a child in your home
4sound_objectThe sound of an object (e.g. vacuum cleaner, doorbell, etc.) in your home
5sound_petThe sound of a pet in your home
Video Scenarios... was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.
6video_youVideo footage of you
7video_adultVideo footage of an adult person (other than you) in your home
8video_childVideo footage of a child in your home
9video_objectVideo footage of an object (e.g. books, furniture, artwork, etc.) in your home
10video_petVideo footage of a pet in your home
Data Scenarios... was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.
11computer_dataYour data (e.g. emails, files, images, file names, etc.)
12browsing_dataYour personalized web browsing data (e.g. personalized ads, auto-completed forms/URLs, browser opened tabs, etc.)
Autonomy Scenarios
13cant_stop_cameraYou wanted to do something urgent privately (e.g. take a medication) at your home, but were not allowed to stop sharing the camera
14cant_stop_micYou wanted to have an urgent private conversation at your home, but were not allowed to stop sharing the microphone
No.CodeScenario
Audio Scenarios... was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.
1voice_youYour voice
2voice_adultThe voice of an adult person (other than you) in your home
3voice_childThe voice of a child in your home
4sound_objectThe sound of an object (e.g. vacuum cleaner, doorbell, etc.) in your home
5sound_petThe sound of a pet in your home
Video Scenarios... was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.
6video_youVideo footage of you
7video_adultVideo footage of an adult person (other than you) in your home
8video_childVideo footage of a child in your home
9video_objectVideo footage of an object (e.g. books, furniture, artwork, etc.) in your home
10video_petVideo footage of a pet in your home
Data Scenarios... was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.
11computer_dataYour data (e.g. emails, files, images, file names, etc.)
12browsing_dataYour personalized web browsing data (e.g. personalized ads, auto-completed forms/URLs, browser opened tabs, etc.)
Autonomy Scenarios
13cant_stop_cameraYou wanted to do something urgent privately (e.g. take a medication) at your home, but were not allowed to stop sharing the camera
14cant_stop_micYou wanted to have an urgent private conversation at your home, but were not allowed to stop sharing the microphone

The survey started with an introduction page where we defined WFH as:

Work From Home (WFH) is a flexible work setting in which employees perform their duties including collaborative work with others, such as meeting, teaching, etc. remotely from their own homes, mostly using information and communication technologies (e.g. Zoom, Microsoft Teams, Skype, etc.), instead of from a dedicated office space provided by employers.

Next, we presented a set of questions about the participant’s WFH setup such as whether the participant has a dedicated space they use to work from home, and an open-ended question to describe it. We then presented the scenarios listed in Table 1 in a matrix format, divided by categories, where each category was presented on a separate page of the survey. The scenarios were listed in the matrix rows, while the possible answers for each scenario were presented in the matrix columns with the following options: “Experienced it and felt very uncomfortable,” “Experienced it and felt somewhat uncomfortable,” “Experienced it and felt comfortable,” and “Never experienced it.” We randomized the order of the scenario matrices for each participant to mitigate the learning and fatigue effects.

To further characterize WFH scenarios that cause discomfort, after all scenario questions were answered, we presented participants with a list of all the scenarios that they indicated made them feel uncomfortable. Then, we asked participants to select the most memorable scenario and then asked them follow-up questions about the one selected scenario. The follow-up questions included an open-ended question to describe the incident in more detail, and several multiple-choice questions including whether the discomfort escalated to cause harm to themselves or others. If the participant did not report any scenario that made them feel uncomfortable, we asked them to describe a scenario that would make them feel uncomfortable if they were to experience it while working from home and why. The survey concluded with demographic questions.

To avoid security and privacy priming, we did not mention the word privacy or security to participants at any point before or during the survey. The survey was conducted using Qualtrics [44], an online survey platform. The complete screening and main survey questions are included in Appendix 1.

The final survey was refined after conducting two pilot surveys with a total of 19 completed surveys. Pilot surveys are not included in our results.

Recruitment

Our sample size choice (214 participants) was motivated by balancing cost-effectiveness and acceptable statistical power for scientific research [45]. A post hoc power analysis using the G*Power statistical tool [46] for the χ2 test family with Effect size 0.3 (medium); α err prob = 0.05; total sample size: 214; Df = 1, gives us a Power (1 - β err prob) = 0.99, suggesting that 214 provides sufficient power for our χ2 statistical tests.

We recruited gender-balanced survey participants using Prolific [47], a research-oriented online participant recruitment platform. We required participants to be at least 18 years old, reside in the USA, able to read and write in English, and have at least a 90% approval rate in Prolific. We paid participants $1.00 for completing the screening survey and $3.75 for completing the main survey. The survey was published on November 14, 2023, and closed in the same day after we reached 228 responses.

Analysis

We used mixed methods to analyze our data. We analyzed quantitative data using descriptive statistics. To test significance, we used the Chi-square test (χ2) [48], given that no more than 20% of the expected frequencies are less than 5 and none of the cells are less than 1 [49]. We used an alpha level of.05 for our statistical tests. All tests were computed using the R statistical tool [50]. We computed the χ2 effect size using Cramer’s V (αc).

To qualitatively analyze open-ended responses, two researchers used Template Analysis, a style of thematic analysis that combines both inductive and deductive coding, with an emphasis on hierarchical coding without specific prescription regarding the number of levels required and what the levels represent [51,52]. The first researcher acted as the main coder and the second as a reviewer. Both researchers are trained and have experience conducting qualitative analysis. Moreover, a single coder is deemed acceptable in the Template Analysis method and HCI research [51,53]. Both researchers first familiarized themselves with the data by reading the responses. Next, the first researcher created an initial codebook (the template), and then coded the whole dataset. The first researcher updated the codebook during the coding process. After the first researcher finished coding the entire data set, the second researcher reviewed the coding applied by the first researcher. Both researchers discussed and resolved disagreements and adjusted the codebook and the coding throughout the process as needed.

For analysis purposes and throughout the paper, a scenario is considered uncomfortable if the participant reported that they felt either “very uncomfortable” or “somewhat uncomfortable” when they experienced it. We grouped these categories for analysis for reasons deemed appropriate to collapse categories [54,55]: to make them more relevant to our research problem and to highlight patterns, especially as we combined relevant categories with low frequencies. The “very uncomfortable” category has low frequencies (see Table A5 in Appendix 2 for details). The scope of our exploratory study does not aim to investigate the severity of discomfort, thus treating the two categories (i.e. “very uncomfortable” and “somewhat uncomfortable”) separately will not add new information to our findings.

Results

We first describe our participants. We then describe the prevalence of privacy-invasive scenarios reported by participants, the measures participants took to prevent the presented privacy-invasive scenarios from happening (or happening again), and the reasons for not taking measures if they did not take any. Finally, we highlight further characteristics of the scenarios that caused discomfort. We refer to the participants as P followed by their ID (P_#). Finally, we provide frequencies of the main qualitative themes to offer a sense of their prevalence in our dataset.

Participants

We screened 517 participants. Out of those, 244 met the inclusion criteria and were invited to take the main survey, and 228 completed the main survey. We excluded 14 invalid responses: 5 showed a pattern of very low-quality answers in the open-ended questions indicating inattention; 2 reported they do not share camera, microphone, or screen in any of their meetings in response to screening Q.15–Q.17; 3 duplicate responses; 2 finished the main survey in less than 3 minutes (well below the average time to complete the survey); one response had a technical error; and one reported in the comment at the end of the survey that they misunderstood some questions (our survey purposefully did not have a back button to edit the answers). We ended up with 214 completed and valid responses included in our analysis.

Of the 214 participants in the final dataset, 116 (54.2%) were males, 94 (43.9%) were females, 3 (1.4%) were non-binary, and 1 preferred not to answer. Their ages ranged from 18 to 74 years, and the majority (69.2%) fell between 25 and 44 years old. In compliance with our screening requirements, all participants were professional workers (full-time or part-time employees, or self-employed, freelancers, or business owners); had been working from home one or more days per week for at least 3 months (at the time of the survey); were not performing their reported jobs through crowdworking platforms such as Prolific and MTurk2; were communicating with others via conferencing tools such as Zoom at least once every few WFH weeks; were using a device that has a screen (smartphone, tablet, laptop, or PC) and were using video conference software (e.g. Zoom) to facilitate WFH.

Our participants were employed in a wide range of sectors. However, there were a few dominating sectors: “Information and communication Technology” (22.4%), “Financial” (13.6%), “Sales and retail” (12.1%), and “Health” (10.7%). More than a third of the participants (31.3%) reported “Other.” Our participants’ job titles, provided in an open-text entry, covered a wide range of jobs and levels of seniority. For example, the job titles associated with the most reported sector “Information and communication Technology” include: “Administrative Assistant,” “customer service,” “IT Tech,” “Analyst,” “Senior Data Analyst,” “Developer,” “Project Manager,” and “Consultant.” See Tables A1–A4 in Appendix 2 for more demographic and WFH context details.

Most of our participants reported having been working from home for a fairly long time, with 79.4% reported having been working from home at least 1 day per week for at least 2 years. Regarding the frequencies of sharing (turning on) devices (camera, microphone, and screen), our participants reported that, for all or most of their meetings, 149 (69.6%) shared microphone, 102 (47.7%) shared camera, and 28 (13.1%) shared screen. Most participants were living with other people (e.g. spouse, children, parents, roommates, etc.), while only 31 (14.5%) reported that they were living with “no one.” One hundred seventy (79.4%) participants said they have a dedicated “space” to work from home; however, when we asked them to describe the space in an open-ended question, only 59 (27.6%) mentioned having a dedicated “office room,” and the rest were working from places other than an office room, such as bedroom (51), secondary bedroom (34), living room/living room-table (35), dining room/dining-table (14), and kitchen/kitchen-table (10). See Table A4 in Appendix 2 for further details about participants’ WFH setting.

Prevalence of privacy-invasive scenarios

Our results show that experiencing privacy-invasive scenarios while working from home is common, where 201 (93.9%) participants experienced at least one of the 14 presented scenarios, and 140 (65.4%) felt uncomfortable during their experience for at least one of the scenarios. The average number of scenarios the participants experienced is 5.2, and the average number of scenarios that made the participants feel uncomfortable is 2.2 scenarios. See Table A5 and Figs A1–A3 in Appendix 2 for further details and a breakdown of the results for the scenarios our participants experienced and how they felt about them.

We first look at the scenarios experienced by the largest number of participants (regardless of whether they caused discomfort or not), aggregated by category. As Fig. 2 illustrates, audio scenarios are the most commonly experienced scenarios, with 187/214 (87.4%) participants experiencing at least one audio scenario. The most experienced types of audio scenarios (from the most experienced to the least experienced) were related to leaked sound or voice of an object, a pet, the subject, an adult, and a child. On the other hand, autonomy scenarios are the least experienced scenarios, with 72/214 (33.6%) participants having experienced at least one autonomy scenario. A breakdown of results for each scenario is presented in Fig. A4 in Appendix 2.

A chart with four horizontal bars. The x-axis is labelled Participants. The y-axis is labelled Scenario Cat. with the following categories from top to bottom: audio, video, data, and autonomy
Figure 2.

Participants who experienced one or more scenarios in a scenario category as a percentage of all participants.

Second, we focus on the scenarios that caused the most discomfort. As shown in Fig. 3, audio scenarios were most often reported as causing discomfort, with discomfort reported by 107/214 (50%) participants for one or more audio scenarios. A breakdown of results for each scenario is presented in Fig. A5 in Appendix 2.

A chart with four horizontal bars. The x-axis is labelled Participants. The y-axis is labelled Scenario Cat. with the following categories from top to bottom: audio, video, autonomy, and data
Figure 3.

Participants who experienced one or more scenarios in a scenario category and felt uncomfortable as a percentage of all participants.

Finally, we present results showing which aggregated scenario categories caused the most discomfort to those who experienced them. That is, the percentage of those who experienced discomfort to the total number of people who experienced one or more scenarios from that category. As Fig. 4 illustrates, the autonomy scenario category has the highest percentage, with 54/72 (75.0%) of those who experienced at least one autonomy scenario reporting that they felt uncomfortable, suggesting that autonomy scenarios are the most privacy-invasive scenarios when they occur. Audio scenarios come next with 107/187 (57.2%), while video scenarios remain the least reported scenario category that caused discomfort with 55/138 (39.9%) participants. A breakdown of the results for each scenario is presented in Fig. A6 in Appendix 2.

A chart with four horizontal bars. The x-axis is labelled Participants. The y-axis is labelled Scenario Cat. with the following categories from top to bottom: autonomy, audio, data, and video
Figure 4.

Participants who experienced one or more scenarios in a category and felt uncomfortable as a percentage of the participants who experienced one or more scenarios of that category.

Table A6 in Appendix 2 provides a breakdown of the numbers summarized in Figs 2–4.

Measures adoption

At the end of each scenario matrix question (scenario category), we asked the participants if they took any protective measures to prevent the presented scenarios from happening (if they never experienced any) or happening again (if they experienced any). We asked the participants who reported that they took measures to describe the protective measures they took “including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.” In what follows, we summarize the adoption rate of privacy protection measures and the types of measures our participants took.

Measures’ adoption rate

As shown in Table 2, our results show that participants who experienced scenarios in a category were more likely to take protective measures. To test the significance of the measures’ adoption rate between those who experienced one or more scenarios of a particular category or never experienced any, we computed the χ2 test in each scenario category. The difference in measures’ adoption rate between those who experienced at least one scenario of a category and those who never did is statistically significant in all categories except the audio category (audio: χ2 = 0.989; P = 0.3198; αv = 0.0537), (video: χ2 = 5.1425; P = 0.023; αv = 0.145), (data: χ2 = 7.142; P = 0.007; αv = 0.173), (autonomy: χ2 = 19.866; P  < 0.001; αv = 0.292).

Table 2.

Number of participants who took and did not take protective measures. We show all participants in the left section and then break this down into those who experienced scenarios in that category (middle) and those who never did (right). As the table shows, those who experienced scenarios in a category were more likely to take protective measures.

 All participants (Experienced or Never experienced)ExperiencedNever experienced
Scenario Cat.Took measuresDidn’t takeTook measuresDidn’t takeTook measuresDidn’t take
Audio122/214(57.0%)92/214(43.0%)109/187(58.3%)78/187(41.7%)13/27(48.1%)14/27(51.9%)
Video104/214(48.6%)110/214(51.4%)75/138(54.3%)63/138(45.7%)29/76(38.2%)47/76(61.8%)
Data95/214(44.4%)119/214(55.6%)50/91(54.9%)41/91(45.1%)45/123(36.6%)78/123(63.4%)
Autonomy48/214(22.4%)166/214(77.6%)29/72(40.3%)43/72(59.7%)19/142(13.4%)123/142(86.6%)
 All participants (Experienced or Never experienced)ExperiencedNever experienced
Scenario Cat.Took measuresDidn’t takeTook measuresDidn’t takeTook measuresDidn’t take
Audio122/214(57.0%)92/214(43.0%)109/187(58.3%)78/187(41.7%)13/27(48.1%)14/27(51.9%)
Video104/214(48.6%)110/214(51.4%)75/138(54.3%)63/138(45.7%)29/76(38.2%)47/76(61.8%)
Data95/214(44.4%)119/214(55.6%)50/91(54.9%)41/91(45.1%)45/123(36.6%)78/123(63.4%)
Autonomy48/214(22.4%)166/214(77.6%)29/72(40.3%)43/72(59.7%)19/142(13.4%)123/142(86.6%)
Table 2.

Number of participants who took and did not take protective measures. We show all participants in the left section and then break this down into those who experienced scenarios in that category (middle) and those who never did (right). As the table shows, those who experienced scenarios in a category were more likely to take protective measures.

 All participants (Experienced or Never experienced)ExperiencedNever experienced
Scenario Cat.Took measuresDidn’t takeTook measuresDidn’t takeTook measuresDidn’t take
Audio122/214(57.0%)92/214(43.0%)109/187(58.3%)78/187(41.7%)13/27(48.1%)14/27(51.9%)
Video104/214(48.6%)110/214(51.4%)75/138(54.3%)63/138(45.7%)29/76(38.2%)47/76(61.8%)
Data95/214(44.4%)119/214(55.6%)50/91(54.9%)41/91(45.1%)45/123(36.6%)78/123(63.4%)
Autonomy48/214(22.4%)166/214(77.6%)29/72(40.3%)43/72(59.7%)19/142(13.4%)123/142(86.6%)
 All participants (Experienced or Never experienced)ExperiencedNever experienced
Scenario Cat.Took measuresDidn’t takeTook measuresDidn’t takeTook measuresDidn’t take
Audio122/214(57.0%)92/214(43.0%)109/187(58.3%)78/187(41.7%)13/27(48.1%)14/27(51.9%)
Video104/214(48.6%)110/214(51.4%)75/138(54.3%)63/138(45.7%)29/76(38.2%)47/76(61.8%)
Data95/214(44.4%)119/214(55.6%)50/91(54.9%)41/91(45.1%)45/123(36.6%)78/123(63.4%)
Autonomy48/214(22.4%)166/214(77.6%)29/72(40.3%)43/72(59.7%)19/142(13.4%)123/142(86.6%)

Furthermore, whether the participants experienced any of the scenarios in a particular category or not, in all scenarios except autonomy scenarios, nearly half of the participants said that they adopted measures to prevent audio (57.0%), video (48.6%), and data (44.4%) scenarios; while only 22.4% of participants reported that they adopted measures to prevent autonomy scenarios.

Types of measures taken

We identified four overarching themes that summarize the types of protective measures our participants took to prevent the privacy-invasive scenarios: device control, changes to the surrounding space, involving others, and vigilance. In what follows, we elaborate on each theme. Note that the listed measures are non-exclusive.

Device control

Participants mentioned measures centered around controlling the shared device (microphone for voice, camera for video, and screen for data), mostly in relation to audio and video scenarios.

To prevent audio scenarios, most of the participants control the microphone. The most mentioned microphone control measures were keeping the microphone muted unless they needed to talk (43) and using mute whenever they needed to prevent unwanted audio from being transmitted (12) as described by P_220: “I try to keep myself muted unless I’m talking. I’m usually pretty good about muting/unmuting.” Few participants (16) explicitly mentioned using software or hardware settings or features to control the microphone. For example, using noise cancellation features built into conference software (6) or headset (6) “to only pick up my voice and minimize any outside noise” (P_043), using “push-to-talk” to provide temporal unmute by pressing a key or button (3), or configuring the mute setting to be on by default (2).

In the same vein, to control video scenarios, participants control the camera. The most mentioned camera control was covering the camera (23), e.g. with a tape or slider as P_068 who places “a Post-It note over my camera lens so that I would have to physically take it off before appearing on camera,” keeping the camera off unless needed (8) and turning off the camera whenever needed (6). Few participants (25) explicitly mentioned using software settings to control their camera, such as the virtual or blurred background features available in most conference software (22), or configuring the camera off as their default setting (3).

For data scenarios, unlike audio and video scenarios, controlling the shared screen is less practical. However, three participants mentioned that they limit screen sharing unless necessary: “I try not to share my screen and do what I can to avoid it” (P_097). Few participants (8) mentioned software settings, features, or tools to control what is shown on the screen. For example, five mentioned window sharing instead of full-screen sharing as P_076 explained: “ensure that I don’t share my entire screen, but only share the specific program or tab that needs to be shared,” two mentioned using private browsing, one mentioned using software that allows to “share a specific section of my screen” (P_074), one mentioned auto-deleting the history, and one mentioned using an ad blocker.

Autonomy scenarios are scenarios in which workers are required to continuously share their microphone or camera. Nonetheless, some participants mentioned that they control their microphone or camera as preventative measures for autonomy scenarios, even though this is prohibited by their employer. For example, participants mentioned turning their microphone off (7) or keeping mute unless needed (4). Similarly, the participants mentioned turning off their camera (6), covering their camera (2), or keeping the camera off unless needed (1). For example, P_027 explained: “if i have a true emergency and need to speak to someone—I will simply turn my camera and microphone off for a minute.” This indicates a tension and conflicting situation between the employer’s stated requirements in the scenarios (disallowing workers from turning off their microphone or camera) and what some participants do in such situations as P_195 expressed: “I decided that I am an adult and if I need to leave my desk or mute my microphone it won’t be the end of the world, if my job wants me to be productive as an adult then I need to be treated as an adult.”

Changes to the surrounding space

Changes to the surrounding space, either physical or virtual space (the latter for data scenarios), were mentioned across all types of scenarios. Changes in physical space included closing the door, mentioned by 27 to prevent audio scenarios, and by 15 to prevent video scenarios, while 2 participants mentioned it in relation to autonomy scenarios to mitigate the reasons they might want to stop the camera or microphone. Using a door sign to signal that they were in a meeting was also mentioned by a few participants in the audio (4), video (1), and autonomy scenarios (2). For example, P_068 explained that they “put a ‘Please don’t knock’ sign on my door.” To prevent data scenarios, participants mentioned changes to the virtual space that are equivalent to closing the door in the physical space, such as closing or minimizing the browser, apps, or tabs (32). P_050 explained that they “always make sure to close everything before meetings.”

Clearing the physical background was mentioned in relation to audio and video scenarios. For audio scenarios, removing sources of background noise from the physical space was mentioned by 15 participants, such as ensuring that the “TV is turned down” (P_138) and “turn off Google doorbell alerts and other sounds” (P_224). For video scenarios, 23 participants mentioned tidying or clearing the physical background or workspace, such as “rearranged my office” (P_167 ) and “just a blank wall behind me” (P_136). For data scenarios, participants mentioned equivalent changes to the virtual space, such as clearing browsing history or cookies or logging out of accounts (9), and opening a new browser tab (3).

The participants also mentioned the use of a designated or quiet physical space to prevent audio (6), video (9), and autonomy scenarios (1). Changing the place altogether was mentioned by four participants in the audio scenarios such as P_213 who would “leave the house when it’s getting clean (and work elsewhere),” and by four in autonomy scenarios, but none of the participants mentioned changing the place in video scenarios. Equivalently, using a designated space or changing the place to prevent data scenarios were expressed through virtual means. For example, 24 participants mentioned using a separate device for work (including two participants who mentioned virtual machines) such as P_091 who explained: “I do not mix my business devices with my personal devices.” Participants also mentioned using a second monitor (6) to “move certain tabs to a different monitor that I don’t share” (P_196), a separate browser (5), and a separate account for work (4).

Involving others

Participants mentioned measures that require involving others who live in their homes to prevent audio, video, and autonomy scenarios, but not data scenarios. This included involving adults, children, and pets. For example, in audio scenarios, 25 participants mentioned measures involving others at home, e.g., to “Ask the people to be quiet during my meeting” (P_011) or “to watch the cat” (P_012). Similarly, in video scenarios, 10 participants would inform others mainly “to not come in during certain hours” (P_132) or “to knock or text my phone first” (P_137). Involving others at home was also mentioned in autonomy scenarios by eight participants, e.g. “to remind them that I should not be disturbed” (P_091).

In limited cases, participants mentioned involving people at work-related meetings or calls. This was mentioned by three in relation to audio scenarios, e.g.: “if there is something going on outside my home such as construction. I usually just apologize and let them know what is going on and when they can expect the noise to stop” (P_091). Three participants in autonomy scenarios would inform people at work when they need to leave.

Involving pets including removing or managing pets such as “make sure the dogs are comfortable or put away for that time” (P_165), is a common measure that is repeatedly mentioned mostly in relation to audio (21), and to a lesser extent video (3).

Vigilance

Vigilance was expressed through being mindful of the physical or virtual surroundings, mostly in relation to video, data, and autonomy scenarios. In video scenarios, 23 participants mentioned being mindful of the camera position and what it shows as P_077 described: “I make sure that my private living area cannot be seen.” Only two participants in audio scenarios mentioned being mindful of their surroundings. In autonomy scenarios, mindfulness was expressed through planning ahead of time and time management, as mentioned by 15 participants. For example, the participants repeatedly mentioned comments such as “I make sure door is closed during meetings and have everything I need” (P_049), “I try to get everything done” (P_043), and “I try to go to the bathroom” (P_024), before the meeting time. Equivalently, in data scenarios, participants mentioned being mindful of what is shown on the screen (20), mindful of their activity on the work device (19), or their activity during the work or meeting time (4).

Vigilance was also expressed by checking the device status. In audio scenarios, checking the microphone status was mentioned by 11 participants, with 6 of them mentioning repeated checks at various frequencies: “double check” (P_112), “multiple times” (P_033), “triple-check” (P_166), and “constantly keep ensuring” (P_185). In video scenarios, checking the camera status was also mentioned, but at a lower rate (possibly because if the camera is on, this is immediately reflected on the screen, unlike the mic), where only 3 mentioned it, with only one of those participants mentioning repeated camera checks.

Not adopting measures

At the end of each scenario matrix question (scenario category), we asked participants who reported that they did not take any measures to prevent the presented scenarios from happening (if they never experienced any) or happening again (if they experienced any) about the reasons for not taking any measures.

As shown earlier in Table 2, our results show that many participants, whether they experienced any of the scenarios in a particular category or never did, said they did not take any measures to prevent the scenarios from happening (or happening again): audio (43.0%), video (51.4%), data (55.6%), and autonomy (77.6%) scenarios.

Participants who said they did not take any protective measures provided a variety of reasons for not doing so. We identified six prominent themes that encompass most of these reasons: never experienced, oblivious to measures, understanding work environment, nothing can be done, unbothered, and have nothing to hide. In what follows, we elaborate on each theme.

Since these themes are universal across all scenario categories, for readability, we refer the reader to Table 3 for themes’ frequencies. Note that the reasons for not taking measures are non-exclusive.

Table 3.

Frequencies of the identified themes that form the reasons for not taking protective measures to prevent the privacy-invasive scenarios.

Reasons’ ThemesAudioVideoDataAutonomy
Never experienced10113173
Oblivious to measures23315420
Understanding work environment1512321
Nothing can be done227218
Unbothered42512429
Nothing to hide219260
Reasons’ ThemesAudioVideoDataAutonomy
Never experienced10113173
Oblivious to measures23315420
Understanding work environment1512321
Nothing can be done227218
Unbothered42512429
Nothing to hide219260
Table 3.

Frequencies of the identified themes that form the reasons for not taking protective measures to prevent the privacy-invasive scenarios.

Reasons’ ThemesAudioVideoDataAutonomy
Never experienced10113173
Oblivious to measures23315420
Understanding work environment1512321
Nothing can be done227218
Unbothered42512429
Nothing to hide219260
Reasons’ ThemesAudioVideoDataAutonomy
Never experienced10113173
Oblivious to measures23315420
Understanding work environment1512321
Nothing can be done227218
Unbothered42512429
Nothing to hide219260
Never experienced

One intuitive reason for not taking any measure for some or all scenario categories is that the participant never experienced the scenarios. This was mostly mentioned in relation to autonomy scenarios, which are the least experienced scenarios as P_103 explained: “I have not had this occur so it is not a concern for me,” and to a lesser extent in other scenarios: data, video, and audio, respectively.

Oblivious to measures

Many participants who said they did not take any measures appeared (based on their answers) to be taking preventative steps, but did not realize that those steps were a type of preventative measure we were asking about. For example, P_040 said they did not take measures to prevent data scenarios; however, when asked about the reason, she elaborated: “I only use my work computer for work-related emails and web browsing so I do not feel the need for protective measures.” Similarly, in audio scenarios, P_131 said that she “found a quiet space/designated area, so no need for protective measures.” The steps taken by these participants, using a separate computer for work purposes or using a quiet or designated space, are indeed measures to prevent privacy-invasive scenarios.

Understanding work environment

An understanding and friendly work environment was mentioned across all scenarios as a reason to not adopt measures, notably in relation to autonomy scenarios, where this theme also includes flexible or no work policies that restrict worker’s autonomy as summarized by P_168: “My organization has always been understanding that we might need to turn off our microphone or camera. There’s been no negative repercussions around doing so,” and to a lesser extent in other scenarios: audio, video, and data.

Nothing can be done

Many participants across all scenarios felt that there was nothing they could do to prevent the scenarios or that the scenarios were inevitable. Notably, in relation to audio and autonomy scenarios as P_075 explained why she did not take measures to prevent audio scenarios: “some things are unpreventable.”

Unbothered

Some participants mentioned that the scenarios did not, or would not, bother them, or expressed they felt that there was no need to take any measures. Some participants did not explain and just noted: “Not necessary” (P_157), while some of them followed that with oblivious measures such as “Never needed to since I use a dedicated room” (P_181).

Have nothing to hide

Many expressed that they have nothing to hide mostly in relation to data and video scenarios, which included nothing sensitive, confidential, offensive, embarrassing, inappropriate, bad, important, or personal as P_017 elaborated: “Nothing that has ever been shown was non-work appropriate. Haven’t felt the need to adopt protective measures yet.”

Characterizing privacy-invasive scenarios

To better understand the factors that make a privacy-invasive scenario uncomfortable, we asked participants to select one of the scenarios (the most memorable) that made them feel uncomfortable and asked them detailed follow-up questions about it. Through these detailed questions, we identified some notable patterns of scenarios that caused discomfort as we will elaborate next (see Table A8 in Appendix 2 for further details). For participants who did not report any scenario that made them feel uncomfortable (they either felt comfortable or had never experienced any of the presented scenarios), we asked them to describe an incident that would make them feel uncomfortable and why.

Reasons for discomfort

We first look at the scenarios that the participants selected as the most memorable scenario that made them feel uncomfortable. Of the 140 participants who reported one or more scenarios that made them feel uncomfortable, we find that the most selected memorable scenarios tended to be from the audio category (74/140) and the least selected scenarios are from the video category (13/140). See Table A7 in Appendix 2 for further details.

Our qualitative analysis of the open-ended question about why participants felt uncomfortable (Q.21) revealed four overarching themes for the causes of discomfort: affecting the flow of the meeting, affecting the worker’s professional image, feeling a lack of control over the incident, and fear of consequences. Table 4 lists the frequencies of the identified themes that form the reasons that caused discomfort when experiencing privacy-invasive scenarios while working from home. The audio scenarios have the highest frequencies in three of the four themes.

Table 4.

Frequencies of the identified themes that form the reasons for discomfort when experiencing privacy-invasive scenarios while working from home.

  Scenario Cat.
ThemesSub-themesAudioVideoDataAutonomy
Affecting the flow of the meetingInterrupting; Unexpected; Non-work-related27422
Affecting the worker’s professional imageEmbarrassing; Unprofessional; Fear of peer judgement; Brought unwanted attention; Inappropriate381375
Feeling lack of control over the incidentHeard against will; Seen against will; Cannot stop the meeting; Cannot control12586
Fear of consequencesn.a.1002
  Scenario Cat.
ThemesSub-themesAudioVideoDataAutonomy
Affecting the flow of the meetingInterrupting; Unexpected; Non-work-related27422
Affecting the worker’s professional imageEmbarrassing; Unprofessional; Fear of peer judgement; Brought unwanted attention; Inappropriate381375
Feeling lack of control over the incidentHeard against will; Seen against will; Cannot stop the meeting; Cannot control12586
Fear of consequencesn.a.1002
Table 4.

Frequencies of the identified themes that form the reasons for discomfort when experiencing privacy-invasive scenarios while working from home.

  Scenario Cat.
ThemesSub-themesAudioVideoDataAutonomy
Affecting the flow of the meetingInterrupting; Unexpected; Non-work-related27422
Affecting the worker’s professional imageEmbarrassing; Unprofessional; Fear of peer judgement; Brought unwanted attention; Inappropriate381375
Feeling lack of control over the incidentHeard against will; Seen against will; Cannot stop the meeting; Cannot control12586
Fear of consequencesn.a.1002
  Scenario Cat.
ThemesSub-themesAudioVideoDataAutonomy
Affecting the flow of the meetingInterrupting; Unexpected; Non-work-related27422
Affecting the worker’s professional imageEmbarrassing; Unprofessional; Fear of peer judgement; Brought unwanted attention; Inappropriate381375
Feeling lack of control over the incidentHeard against will; Seen against will; Cannot stop the meeting; Cannot control12586
Fear of consequencesn.a.1002

For the 74 participants who did not experience any scenario that made them feel uncomfortable, the described scenarios that would make them feel uncomfortable were centered on the workers themselves and other adults, with the top scenario categories related to3: their video (24), their voice (11), an adult’s video (11), and an adult’s voice (10). Most of the scenarios contained exacerbated details that our scenarios did not include. For example, 26 participants provided scenarios related to inappropriateness, mainly related to being inappropriately dressed or undressed, such as “If I inadvertently shared my camera and was not dressed appropriately for work.” (P_155) and “If i was in the nude thinking my camera was off but it actually wasn’t” (P_143), as well as inappropriate behaviors or conversations.

Looking at the reasons that would make these anticipated scenarios uncomfortable, they are the same reasons that were expressed by those who experienced our scenarios, but with different priorities. Here, we observe that reasons related to interrupting the flow of the meeting are barely mentioned (5), and most of the reasons are centered around affecting the worker’s professional image (28/74), feeling a lack of control over the incident (17/74), and fear of consequences (6/74).

When discomfort escalates to harm

Most of the participants 104/140 said the scenario did not escalate to cause harm to self or others, while 36/140 said it caused some amount of harm (35 chose “small amount of harm” and one “large amount of harm”). Of the 36 participants who reported harm, 24/36 participants reported audio scenarios, 6/36 data, compared to only 4/36 autonomy, and only 2/36 video scenarios.

Out of the 36 who reported harm, 34 said that the harm was “Psychological harm,” one participant reported “Financial harm” in addition to psychological, one reported “Physical harm,” and one selected “Other” and specified it was a “Reputational harm” (which fits under psychological harm but we keep answers as reported). When we asked them to explain how it caused the harm, the most recurring themes were related to: feeling embarrassed mentioned by 11 participants, unprofessional (4), fear of incident recurrence or paranoia (3), feeling ashamed (2), and anxious (2). P_187 explained the psychological harm: “It made me paranoid of the situation repeating and constantly having to make sure to an almost extreme extent that everything is in order before I use my camera.” The one financial harm was due to a 1-month suspension from work, the physical harm was in relation to the participant’s loud dog barking that he could not stop and explained the harm to others as “sudden loudness... which hurt their ears” (P_105), while the reputational harm was because the incident “caused some within my organization to talk” (P_208).

The harm has little relation to whether there were manager(s) presented in the meeting or not. Of the 36 participants who reported harm, almost half (17/36) reported that there were managers at the meeting, while the remaining did not.

The most shared device and recording

Participants reported microphone was shared more often in incidents that caused them discomfort (115/140), compared to 82/140 who shared the camera, and 28/140 who shared the screen. In more than half of the cases (88/140), participants said that those incidents were not recorded, suggesting that even non-recorded incidents still cause discomfort to a large extent.

Recurrence and location

Our results suggest that whether the incident occurred once or multiple times, and whether the incident occurred in an office room or in other rooms, have little impact on discomfort. That is, nearly half of the participants (71/140) reported that the incident that caused them discomfort occurred once, while a total of 69/140 reported more than once (“A few times” or “Repeatedly”). Similarly, 59/140 reported that the incidents occurred in an office room, while a total of 81/140 in a room other than an office.

Discussion

This study aims to provide detailed insights of the privacy-invasive scenarios that workers face while working from home. In what follows, we summarize our key findings, provide practical recommendations, and raise open questions that can motivate future work.

WFH discomfort is unlikely to cause harm, yet harmed minority should not be ignored

WFH privacy-invasive scenarios are prevalent. Almost all participants experienced at least one scenario. More than half of the participants felt uncomfortable in at least one of the presented scenarios. When asked about harm, most of the participants who experienced discomfort did not find the discomfort caused harm to themselves or others (74.3%). Almost all of those who reported that the discomfort had escalated to harm said that the harm was psychological and minor. While only 25.7% of participants who experienced discomfort (16.8% of all participants) said that it escalated to harm, this is still a considerable minority that should not be ignored.

Our results suggest that the privacy-invasive scenarios that workers experience while working from home often do not cause harm. Nevertheless, organizations that intend to enforce WFH either in full or hybrid mode need to consider that there might be a harmed minority. One possible suggestion to address this is to involve workers in discussions about WFH policy, listen to the needs of those who might be harmed, and consider ways to mediate this.

Rethink WFH policies that restrict the worker’s autonomy

Our results show that autonomy scenarios that limit the subject’s autonomy, such as prohibiting them from turning off their camera or microphone during a work-related call or meeting, are the least prevalent scenarios. However, when they are experienced, these scenarios have the highest discomfort rate compared to other scenarios. Moreover, as shown through our participants, many workers reported measures that violated or would violate these rules when needed, despite the stated rules in the autonomy scenarios such as turning off the camera or muting the microphone to protect their privacy, which may result in tension and conflicting situations between workers and employers.

One might argue that workers should have no expectations for privacy on employer’s owned devices and that such autonomy-invading policies are set to protect organizations [56], e.g. to prevent workers from working in public spaces that can expose confidential information. However, our results show that adherence to such policies may not be always possible, and there are no practical measures to prevent emergencies that may require workers to turn off their camera or microphone. Thus, we suggest that employers rethink policies that limit the worker’s autonomy such as disallowing them to turn off their cameras or microphones. For example, we suggest employers discuss and identify the exceptional situations where workers can be exempted from these autonomy-restricting policies, which is inlined with Emami-Naeini’s recommendation [35]. This may release the tension that such policies impose on worker as we observed in some participants’ comments.

Audio privacy-invading scenarios are more related to discomfort and harm than video scenarios

Our results show that audio scenarios are the most experienced scenarios among our participants. We note that the prevalence of audio scenarios might be in part due to the frequency with which participants shared their microphone as opposed to camera or screen sharing. Regardless, audio scenarios have the second highest discomfort ratio, after the much less frequently experienced autonomy scenarios. When comparing the discomfort ratio in all audio vs. all video scenarios, respectively 239/517 (46.2%) vs. 98/340 (28.8%), considerably more audio scenarios caused discomfort than video scenarios (see Table A5 in Appendix 2 for details). Additionally, when we asked participants to select the most memorable uncomfortable scenario from the list of all reported uncomfortable scenarios, the four most reported scenarios were audio scenarios. On the other hand, the least four reported memorable scenarios were video scenarios. Furthermore, looking at the reasons that made the memorable scenarios uncomfortable, we find that audio scenarios appeared more frequently in relation to interrupting or distracting the meeting and affecting the worker’s professional image than video and other scenarios. Audio scenarios appeared considerably more than video scenarios in scenarios that escalated to cause harm (24/36 audio vs. 2/36 video).

The aforementioned findings show that audio scenarios are more prevalent, and more related to discomfort and harm, suggesting that they are more difficult to prevent than video scenarios. Future work can better understand the reasons that made audio privacy-invasive scenarios more prevalent, and associated to discomfort and harm compared to video scenarios.

“Smart” measures are not widely adopted compared to manual measures

Our results show that applying “smart” privacy-protective measures through software/hardware settings or features that would automate the process (e.g. set the microphone to mute by default instead of manually muting the microphone) or using technical means to replace manual efforts (e.g. use virtual or blurred background instead of manually clearing the physical background) are not widely adopted measures among our participants compared to manual measures. Although we equally primed participants to the two types of measures when we asked them to describe the measures they took “including any new software you started using, changes to software settings, changes to your physical workspace, or anything else,” still, only a minority of participants who took measures in each category reported smart measures: 16/122 (13.1%) participants in voice scenarios, 25/104 (24.0%) in video, 8/95 (8.4%) in data, while only 2/48 (4.2%) mentioned smart measures to prevent autonomy scenarios.

One possible explanation for such phenomenon is a lack of awareness of some smart measures from the first place. For example, Li et al.’s study on the reasons that drive students not to share their cameras in classrooms found that many students were concerned about the appearance of their background or the people around them, suggesting that students lack awareness about smart features on conferencing tools such as virtual background [40]. Another reason is a lack of awareness that some features are applied by default. For example, some conference tools such as Zoom have the “Zoom background noise removal” set to “Auto (automatically adjust noise suppression)” by default. There is no indicator that signals the activation status of this setting in Zoom. Thus, some participants may be oblivious to it.

It remains unclear what are the reasons for the low usage of smart measures in general. Is it a lack of need, awareness (of their existence or default activation status), convenience, usability, discoverability, skills to use them, or lack of trust in the effectiveness of smart measures in conference tools? We leave these questions to future work.

Do smart measures visualization/indicators matter?

While smart measure adoption was low in general, from this study, we observe that smart measures to prevent video scenarios such as virtual or blurred backgrounds, which are reflected on the worker’s and the meeting participants’ screens were more adopted than other types of smart measures that are not reflected on the meeting’s screen such as noise cancellation features. Our results show that 25/104 (24.0%) participants in video scenarios mentioned smart measures compared to 16/122 (13.1%) participants in audio scenarios.

This raises an open question that we leave to future work: Does visualization/indicators matter in raising awareness and adoption rate of smart measures in conference tools?

Research questions revisited

In what follows, we summarize key findings for our main research questions.

  • How prevalent is experiencing privacy-invasive scenarios among WFH workers?

    Our results show that WFH privacy-invasive scenarios are prevalent among our participants. Almost all participants (93.9%) reported that they have experienced at least one of the privacy-invasive scenarios we presented to them.

  • To what extent does experiencing these scenarios cause discomfort?

    More than half of the participants (65.4%) felt uncomfortable during at least one of the scenarios they experienced.

  • Does discomfort escalate to cause harm to workers or others?

    Most of the participants who experienced discomfort in privacy invasive scenarios said that the discomfort did not cause harm to them or others (74.3%).

  • What type of harm do workers experience?

    Almost all the participants who reported that the discomfort they experienced escalated to cause harm to them or other said the harm was psychological (34/36) and minor (35/36).

  • What types of scenarios are associated with the highest reported discomfort?

    Our results show that scenarios that restrict worker autonomy, such as prohibiting them from turning off the camera or microphone are associated with the highest reported discomfort when experienced (75%). Participants often violated or would violate the employer’s autonomy-restricting rules to protect their privacy.

  • What protective measures do some workers take?

    Most participants reported manual measures such as manually covering the camera and turning on/off the microphone. Smart measures (software/hardware settings or features to prevent privacy-invasive scenarios, e.g. virtual background and noise cancellation features) are not widely adopted compared to manual measures. It should be noted that when smart measures are used, more participants reported using settings or features to prevent video scenarios (24.0%) than audio (13.11%), data (8.4%), and autonomy (4.2%) scenarios.

  • Why do some workers choose not to take protective measures?

    Participants reported a variety of reasons for not taking protective measures across all scenario categories with varying rates. The reported reasons include: never experiencing the scenario, having an understanding work environment, feeling that there is nothing they can do to prevent the scenario, or not feeling bothered about experiencing it. Interestingly, some participants were oblivious to measures they were already taking that may help prevent privacy-invasive scenarios. That is, they reported not taking measures, but their open-ended answers to the reasons for not doing so revealed that they are taking measures such as using a separate device for work and using a quiet or designated space for working from home.

Limitations

First, we used the Prolific [47] crowdworking platform to recruit participants, and Prolific workers are known to be more technically skilled than the average population. However, Prolific has been shown to provide reasonably generalizable results in security and privacy research [57]. Moreover, we screened for Prolific users who were not performing their reported jobs through crowdsourcing platforms such as Prolific and MTurk. This may have skewed our participants toward a certain type of Prolific users. Second, we used self-reported surveys, which are naturally prone to recall bias and social desirability effects. To mitigate recall bias, we asked participants to answer based on their experiences within the last 3 years. Moreover, in the open-ended questions when we asked participants what protective measures they took, we equally nudged participants to mention manual and smart measures. However, participants may still have trouble accurately recalling incidents or measures within a 3-year time frame. Third, we acknowledge a limitation in the follow-up detailed questions on the scenarios that caused discomfort, where we only followed up with the participants about one scenario they reported as the most memorable scenario that made them feel uncomfortable. However, asking participants follow-up questions about multiple scenarios would likely result in survey fatigue that would affect the quality of the data. Fourth, we did not ask the participants what conference software they use. Different software may have different default settings and features. Moreover, some participants may not be fully aware of their software’s default settings and features. Fifth, our study does not consider potential nuanced differences between different types of jobs. This can have implications for the type of rules imposed by employers and the consequences of privacy invasions for workers. Finally, our sample is limited to participants from the USA. Privacy laws and social norms can vary between jurisdictions, which needs to be considered when interpreting our results outside the US context. Even within the USA, privacy regulations and labor laws vary somewhat by state, which may impact workers’ experiences.

Conclusion

In this study, we surveyed 214 workers about their experiences with 14 privacy-invasive scenarios that can occur in a WFH setting. Our findings provide a better understanding of the privacy challenges that WFH workers face and how they address them, which can help identify ways to improve WFH experiences.

Acknowledgements

We thank Prof. Marc Dacier from KAUST for feedback on earlier versions of some sections of this paper. We also thank Harish Balaji, Mahith Edula, Rachel Martini, and Zili Zhou for their contributions to the initial survey study during the Usable Privacy and Security course at CMU. Finally, we thank the participants for their time and valuable input. E.A. was a Collaborating Visitor at CMU while working on this paper.

Author contributions

Eman Alashwali (Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Writing – original draft, Writing – review & editing); Joanne Peca (Conceptualization, Data curation, Methodology, Writing – original draft); Mandy Lanyon (Conceptualization, Data curation, Formal analysis, Methodology, Writing – original draft); Lorrie Faith Cranor (Conceptualization, Funding acquisition, Methodology, Writing – review & editing)

Conflict of interest

None declared.

Funding

E. A. acknowledges the financial support of the Ibn Rushd Program at King Abdullah University of Science and Technology (KAUST). This work was supported in part by the Innovators Network Foundation (L. F. C.).

Data Availability

The data underlying this article cannot be shared publicly due to ethical/privacy reasons.

Appendix 1. Surveys

In this section, we include the surveys we used in the study. The subsections and text between [square brackets] were not shown to participants. We include them here for clarity. We first list the recruitment materials. Then, we list the screening survey followed by the main study’s survey.

1.1 RECRUITMENT MATERIALS

Title: Your Work From Home Experiences

Reward: $1.00 (screening) $3.75 (main) (approximately $15/hr)

Estimated completion time: 15 mins

Description: Our research team at Carnegie Mellon University is searching for people to participate in a survey about their Work From Home Experiences. Participants should be working from home to participate.

If you are interested in participating in our survey, please complete this initial screening survey, which should just take about 4 minutes. You will be paid $1.00 for completing the screening survey. All responses in the screening survey will be kept confidential.

If you are selected for the study’s main survey, you will be asked if you agree to take the main survey and you will be redirected to the main survey that will last about 15 minutes. You will be paid a bonus of $3.75 for completing the main survey through Prolific.

Devices you can use to take this study: Mobile, Tablet, Desktop

1.2 SCREENING SURVEY

1.2.1 CONSENT

[consent form is shown here]

Q.0: Please enter your Prolific ID.

Please note that this response should auto-fill with the correct ID.

[Open-text entry]

1.2.2 INTRODUCTION

Thank you for your interest in our study. Please complete this initial 4 minute screening survey. You will be paid $1.00 for completing the screening survey through Prolific. If you are selected for the study’s main survey, you will be asked if you agree to take the main survey and you will be directed to the main survey that will take about 15 minutes. You will be paid $3.75 for completing the main survey through Prolific.

Note that the survey does not allow you to return back to the previous question once you hit “Next”. Please make sure you have selected the choice you really want before you click the “Next” button.

Q.1: Which of the following best describes your current employment status?

  • Employee (full-time)

  • Employee (part-time)

  • Self-employed / Freelancer / Business-owner

  • Student

  • Homemaker

  • Unemployed, and looking for a job

  • Unemployed, and not looking for a job

  • Unable to work

  • Retired

  • Other (please specify): [open-text entry]

[Q.2 to Q.8 are displayed if Q.1 answer is (“Employee (full-time)” OR “Employee (part-time)” OR “Self-employed / Freelancer / Business-owner”)]

Q.2: What is your current job title? (e.g. Teacher, Administrative Assistant, Nurse, etc.)

[Open-text entry]

Q.3: In your job that you described in the previous questions, do you perform your work through crowdsourcing platforms such as Prolific, MTurk, etc.?

  • Yes

  • No

  • Other (please specify): [open-text entry]

Q.4: What sector do you currently work in?

  • Pre-university Education

  • University Education

  • Health

  • Information and Communication Technology

  • Financial

  • Industrial

  • Agricultural

  • Sales and retail

  • Petrochemical

  • Other (please specify): [open-text entry]

Q.5: Which of the following best describes the organization you currently work in?

  • Privately-held organization

  • Publicly-traded organization

  • Government organization

  • Educational organization

  • Not-for-profit organization

  • Other (please specify): [open-text entry]

Q.6: Approximately, how long have you been working in your job described above?

  • Less than a year

  • One year

  • 2 years

  • 3 years

  • 4 years

  • 5 years

  • More than 5 years

  • Other (please specify): [open-text entry]

Q.7: On average, how many days per week do you work overall?

  • One day per week

  • 2 days per week

  • 3 days per week

  • 4 days per week

  • 5 days per week

  • 6 days per week

  • 7 days per week

  • Other (please specify): [open-text entry]

Please think only about your current job that you just reported in the previous section, and answer all the following questions in that context.

Q.8: Do you currently work from home regularly (one or more days per week, either in full or hybrid mode), where you perform your duties including collaborative work with others, such as meeting, teaching, etc. remotely from your own home, mostly using information and communication technologies (e.g. Zoom, Microsoft Teams, Skype, etc.), instead of from a dedicated office space provided by employers?

  • Yes

  • No

[Q.9 – Q.14 are displayed if Q.8 answer is “Yes”]

Q.9: On average, out of the [Q.7 answer] that you work, how many of those days are you working from home for all or part of the day?

  • One day per week

  • 2 days per week

  • 3 days per week

  • 4 days per week

  • 5 days per week

  • 6 days per week

  • 7 days per week

  • Other (please specify): [open-text entry]

Q.10: Approximately, how long have you been working from home (either in full or hybrid mode)?

  • Less than 3 months

  • From 3 to 11 months

  • One year

  • 2 years

  • 3 years

  • 4 years

  • 5 years

  • More than 5 years

  • Other (please specify): [open-text entry]

Q.11: Typically, when working from home, approximately, how often do you need to communicate with others via conferencing tools such as Zoom or Microsoft Teams?

  • At least once every work from home day

  • At least once every few work from home days

  • At least once every work from home week

  • At least once every few work from home weeks

  • At least once every work from home month

  • Less than once every work from home month

  • Other (please specify): [open-text entry]

Q.12: Typically, when working from home, on a day where you communicate with others, approximately, how much of the day do you spend communicating with others via conferencing tools such as Zoom or Microsoft Teams?

  • Less than one hour per work from home day

  • At least one hour per work from home day

  • At least 2 hours per work from home day

  • At least 3 hours per work from home day

  • At least 4 hours per work from home day

  • More than 4 hours per work from home day

  • Other (please specify): [open-text entry]

Q.13: Typically, when working from home, which of the following devices do you use? (select all that apply)

  • Mobile smartphone

  • Mobile traditional (non-smart) phone

  • Landline phone

  • Tablet

  • Laptop

  • Personal Computer (PC)

  • Other (please specify): [open-text entry]

Q.14: Typically, when working from home, which of the following technologies do you use to facilitate remote work from home? (select all that apply)

  • Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)

  • Phone (audio only)

  • Email messaging

  • Instant messaging applications (Slack, WhatsApp, etc.)

  • Mobile Short Messaging Service (SMS) messaging

  • Other (please specify): [open-text entry]

[Q.15 – Q.17 are displayed if Q.14 answer includes “Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.”)]

Q.15: Overall, how often do you share your microphone for all or part of the meeting when you work from home and communicate with others via conferencing tools such as Zoom or Microsoft Teams?

  • All of my meetings

  • Most of my meetings

  • About half of my meetings

  • A few of my meetings

  • None of my meetings

  • Other (please specify): [open-text entry]

Q.16: Overall, how often do you share your camera for all or part of the meeting when you work from home and communicate with others via conferencing tools such as Zoom or Microsoft Teams?

  • All of my meetings

  • Most of my meetings

  • About half of my meetings

  • A few of my meetings

  • None of my meetings

  • Other (please specify): [open-text entry]

Q.17: Overall, how often do you share your screen for all or part of the meeting when you work from home and communicate with others via conferencing tools such as Zoom or Microsoft Teams?

  • All of my meetings

  • Most of my meetings

  • About half of my meetings

  • A few of my meetings

  • None of my meetings

  • Other (please specify): [open-text entry]

[Q.18 is displayed if the following screening criteria are met: Q.1 answer is (“Employee (full-time)” OR “Employee (part-time)” OR “Self-employed / Freelancer / Business-owner”) AND if Q.3 answer is “No” AND if Q.6 answer is NOT “Other (please specify)” AND if Q.7 answer is NOT “Other (please specify)” AND if Q.8 answer is “Yes” AND if Q.9 answer is NOT “Other (please specify)” AND if Q.10 answer is NOT (“Less than 3 months” OR “Other (please specify)”) AND if Q.11 answer is (“At least once every work from home day” OR “At least once every few work from home days” OR “At least once every work from home week” OR “At least once every few work from home weeks”) AND if Q.12 answer is NOT “Other (please specify)” AND if Q.13 answer is“Mobile smartphone” OR “Tablet” OR “Laptop” OR “Personal Computer (PC)” AND if Q.14 answer is “Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)” OR (“Phone” OR “Email messaging” OR “Instant messaging applications (Slack, WhatsApp, etc.)” OR “Other (please specify)”)]

Q.18: Do you agree to take a survey about your work from home experience, which will take around 15 min? You will be paid additional $3.75 through your Prolific account for taking it.

  • Yes

  • No

[Q.19 is displayed if Q.18 answer is “Yes”]

Q.19: Before we move to the study’s main survey, do you have any comments you want to add about the previous screening survey? (optional)

[Open-text entry]

[Redirect to the main survey]

1.3 MAIN SURVEY

1.3.1 INTRODUCTION

Work From Home (WFH) is a flexible work setting in which employees perform their duties including collaborative work with others, such as meeting, teaching, etc. remotely from their own homes, mostly using information and communication technologies (e.g. Zoom, Microsoft Teams, Skype, etc.), instead of from a dedicated office space provided by employers.

Most people all over the world have experienced work from home in the last three years due to the COVID-19 pandemic.

In this survey, we will ask you a set of multiple choice and open-ended questions about your experience in working from home, in addition to some demographic questions.

Please note that you cannot return back to previous sections once you click the ”Next” button. So make sure you selected the answer you really want before you click the “Next” button.

1.3.2 WFH SETUP

Q.1: How many bedrooms in your home?

  • 1 bedroom

  • 2 bedrooms

  • 3 bedrooms

  • 4 bedrooms

  • 5 bedrooms

  • More than 5 bedrooms

  • Other (please specify): [open-text entry]

Q.2: Who lives in your home with you? (select all that apply)

  • Spouse or partner

  • Roommate(s)

  • Child(ren) under the age of 18

  • Child(ren) over the age of 18

  • Parent(s)

  • Sibling(s)

  • No one [exclusive]

  • Other (please specify): [open-text entry]

Q.3: Approximately, how long have you been living in your home described above?

  • Less than a year

  • One year

  • 2 years

  • 3 years

  • 4 years

  • 5 years

  • More than 5 years

  • Other (please specify): [open-text entry]

Q.4: Do you have a dedicated space that you use to work from home?

  • Yes

  • No

Q.5: Whether you have a dedicated space or not, describe the space that you use to work from home (e.g. a dedicated office room, a corner in the living room, a corner in the bed room, etc.).

[Open-text entry]

1.3.3 WFH SCENARIOS

In the following sections, we will present you with several scenarios that can happen in work from home settings. For each scenario, we will ask you about your experience.

[Q.6, Q.9, Q.12, and Q.15 are displayed as matrices in randomized-order (the matrices), one matrix per page.]

[The following list represents the matrices columns for Q.6, Q.9, Q.12, and Q.15]

  • Experienced it and felt very uncomfortable

  • Experienced it and felt somewhat uncomfortable

  • Experienced it and felt comfortable

  • Never experienced it

[Q.6, Q.9, Q.12, and Q.15 scenario lists represents the matrices rows]

Voice/Sound Scenarios

Q.6: For each scenario, if you experienced the scenario one or more times while working from home within the last 3 years, select how comfortable or uncomfortable you have felt overall. If you never experienced a scenario, select “Never experienced it.”

  • Your voice was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.

  • The voice of an adult person (other than you) in your home was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.

  • The voice of a child in your home was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.

  • The sound of an object (e.g. vacuum cleaner, doorbell, etc.) in your home was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.

  • The sound of a pet in your home was inadvertently picked up by your device’s microphone, and was heard by one or more people on your work-related remote call or meeting.

[Q.7 is displayed if one or more of Q.6 answers were “Experienced it and felt very uncomfortable” OR “Experienced it and felt somewhat uncomfortable” OR “Experienced it and felt comfortable”]

Q.7: Has experiencing any of the voice/sound scenarios presented to you in the previous question caused you to adopt protective measures to prevent those incidents from happening again?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

[Q.8 is displayed if all Q.6 answers were “Never experienced it”]

Q.8: Have you adopted protective measures to prevent the voice/sound scenarios presented to you in the previous question from happening to you?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

Video Footage Scenarios

Q.9: For each scenario, if you experienced the scenario one or more times while working from home within the last 3 years, select how comfortable or uncomfortable you have felt overall. If you never experienced a scenario, select “Never experienced it.”

  • Video footage of you was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.

  • Video footage of an adult person (other than you) in your home was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.

  • Video footage of a child in your home was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.

  • Video footage of an object (e.g. books, furniture, artwork, etc.) in your home was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.

  • Video footage of a pet in your home was inadvertently captured by your device’s camera, and was seen by one or more people on your work-related remote call or meeting.

[Q.10 is displayed if one or more of Q.9 answers were “Experienced it and felt very uncomfortable” OR “Experienced it and felt somewhat uncomfortable” OR “Experienced it and felt comfortable”]

Q.10: Has experiencing any of the video footage scenarios presented to you in the previous question caused you to adopt protective measures to prevent those incidents from happening again?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

[Q.11 is displayed if all Q.9 answers were “Never experienced it”]

Q.11: Have you adopted protective measures to prevent the video footage scenarios presented to you in the previous question from happening to you?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

Computer/Browsing Data Scenarios

Q.12: For each scenario, if you experienced the scenario one or more times while working from home within the last 3 years, select how comfortable or uncomfortable you have felt overall. If you never experienced a scenario, select “Never experienced it.”

  • Your data (e.g. emails, files, images, file names, etc.) was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.

  • Your personalized web browsing data (e.g. personalized ads, auto-completed forms/URLs, browser opened tabs, etc.) was inadvertently displayed on your device’s shared screen, and was seen by one or more people on your work-related remote call or meeting.

[Q.13 is displayed if one or more of Q.12 answers were “Experienced it and felt very uncomfortable” OR “Experienced it and felt somewhat uncomfortable” OR “Experienced it and felt comfortable”]

Q.13: Has experiencing any of the computer/browsing data scenarios presented to you in the previous question caused you to adopt protective measures to prevent those incidents from happening again?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

[Q.14 is displayed if all Q.12 answers were “Never experienced it”]

Q.14: Have you adopted protective measures to prevent the computer/browsing data scenarios presented to you in the previous question from happening to you?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

Autonomy Scenarios

Q.15: For each scenario, if you experienced the scenario one or more times while working from home within the last 3 years, select how comfortable or uncomfortable you have felt overall. If you never experienced a scenario, select “Never experienced it.”

  • You wanted to do something urgent privately (e.g. take medicine) at your home, but were not allowed to stop sharing the camera.

  • You wanted to have an urgent private conversation at your home, but were not allowed to stop sharing the microphone.

[Q.16 is displayed if one or more of Q.15 answers were “Experienced it and felt very uncomfortable” OR “Experienced it and felt somewhat uncomfortable” OR “Experienced it and felt comfortable”]

Q.16: Has experiencing any of the autonomy scenarios presented to you in the previous question caused you to adopt protective measures to prevent those incidents from happening again?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

[Q.17 is displayed if all Q.15 answers were “Never experienced it”]

Q.17: Have you adopted protective measures to prevent the autonomy scenarios presented to you in the previous question from happening to you?

  • Yes (what are they?)

    Please describe any protective measures you took, including any new software you started using, changes to software settings, changes to your physical workspace, or anything else.

    [Open-text entry]

  • No (what are the reasons to not adopt protective measures?)

    [Open-text entry]

1.3.4 DETAILED SCENARIO

Q.18: From the list, please select your most memorable incident that you reported in the previous sections when you felt very or somewhat uncomfortable. [A list of the scenarios that the participant reported that they made them feel “very uncomfortable” or “somewhat uncomfortable” in Q.6, Q.9, Q.12, and Q.15 is displayed here] [Q.19 - Q.30 are displayed if the participant selected one ore more scenario as “very uncomfortable” or “somewhat uncomfortable” in Q.6, Q.9, Q.12, and Q.15]

Q.19: In your own words, describe in more detail this specific incident in which you felt very or somewhat uncomfortable:

[Open-text entry]

Q.20: How frequently has this incident happened to you?

  • Once

  • A few times

  • Repeatedly

  • I cannot remember

Q.21: Why did it make you feel uncomfortable?

[Open-text entry]

Q.22: To what extent did the discomfort escalate to cause harm (e.g. financial, physical, psychological, etc.) to yourself or others?

  • It caused a large amount of harm

  • It caused a moderate amount of harm

  • It caused a small amount of harm

  • It did not cause any harm

[Q.23 - Q.24 are displayed if Q.22 answer is “It caused a large amount of harm” OR “It caused a moderate amount of harm” OR “It caused a small amount of harm”]

Q.23: What type of harm did it cause? (select all that apply).

  • Financial harm

  • Physical harm

  • Psychological harm

  • Other (please specify): [open-text entry]

Q.24: Please explain how it caused this harm?

[Open-text entry]

[Q.25 is displayed if Q.22 answer is “It did not cause any harm”]

Q.25: Please explain how and why it did not cause any harm?

[Open-text entry]

Q.26: Where in your home were you located at the time of the incident you described?

  • Office room

  • Living room / recreation area

  • Bedroom

  • Kitchen

  • Dining room

  • Garage

  • Bathroom

  • Other (please specify): [open-text entry]

Q.27: Which of the following were you sharing during the incident you described? (select all that apply)

  • Microphone

  • Camera

  • Screen

  • I cannot remember [exclusive]

  • Other (*please specify): [open-text entry]

Q.28: Was the incident recorded?

  • Yes, video and voice

  • Yes, video only

  • Yes, voice only

  • No, not recorded

  • I cannot remember

Q.29: What was your relationship with the people at work with whom this incident happened? (e.g. colleagues, managers, customers, students, etc.)?

[Open-text entry]

Q.30: How did this relationship with the people at work affect the impact of the incident on you?

[Open-text entry]

[Q.31 - Q.32 are displayed if the participants did not select any scenario as “very uncomfortable” or “somewhat uncomfortable” in Q.6, Q.9, Q.12, and Q.15]

Q.31: In your own words, describe in more detail one incident that, if you WERE to experience it while working from home, would make you feel very or somewhat uncomfortable?

[Open-text entry]

Q.32: Why would it make you feel uncomfortable?

[Open-text entry]

1.3.5 Demographics

Please answer the following demographic questions.

Q.33: Which of the following technologies, if any, does your employer use to monitor your productivity when you work from home? (select all that apply)

  • Time trackers

  • Activity trackers

  • Task trackers

  • Video monitoring

  • Audio monitoring

  • I am not aware of any productivity trackers used by my employers [exclusive]

  • Other (*please specify): [open-text entry]

Q.34: What is your age in years?

  • From 18 to 24

  • From 25 to 34

  • From 35 to 44

  • From 45 to 54

  • From 55 to 64

  • From 65 to 74

  • 75 or older

  • Prefer not to answer

Q.35: What is your gender?

  • Male

  • Female

  • Non-binary

  • Prefer to self describe: [open-text entry]

  • Prefer not to answer

Q.36: What is your race or ethnic identity? (You may select more than one option)

  • White

  • Black or African American

  • American Indian or Alaska Native

  • Asian

  • Native Hawaiian or Pacific Islander

  • Hispanic and/or Latino/Latina/Latinx

  • Prefer to self describe: [open-text entry]

  • Prefer not to answer [exclusive]

Q.37: What is your approximate annual household income?

Please answer based on your entire current annual household’s income, before taxes.

  • Less than $20,000

  • $20,000 to $39,999

  • $40,000 to $59,999

  • $60,000 to $79,999

  • $80,000 to $99,999

  • $100,000 to $149,999

  • $150,000 or more

  • Prefer not to answer

Q.38: What is the highest educational degree you have received?

  • Doctoral degree

  • Master’s degree

  • Bachelor’s degree

  • Associate’s degree

  • High school diploma or GED

  • Less than high school degree

  • Other (please specify): [open-text entry]

Q.39: Do you have a university degree in, or currently work in, one or more of the following fields: Computer Science (CS), Information Systems (IS), Information Technology (IT), or Computer Engineering (CE)?

  • Yes

  • No

Q.40: Do you have a university degree in cybersecurity or currently work in the cybersecurity area?

  • Yes

  • No

Q.41: If you have any other thoughts or feedback about this survey or the information you viewed, please let us know here. (optional)

[Open-text entry]

You now reached the end of the survey. To submit your response click the “Submit” button.

Appendix 2. Further Results

2.1 Screening survey results

This section provides additional results from the screening survey.

2.2 Main survey results

This section provides additional results from the main survey.

A chart with horizontal bars. The x-axis is labelled Participants. The y-axis is labelled Scenarios with 14 categories starting from top to bottom: 1 or more scenarios, 2 or more scenarios, ... up to14 scenarios
Figure A1.

Number of participants who experienced one or more scenario (whether they made them feel comfortable or uncomfortable) compared to those who experienced them and felt uncomfortable.

A chart with 14 vertical bars. The x-axis has the following categories from left to right: 0 scenario, 1 scenario, ... up to14 scenarios. The y-axis is labelled Participants
Figure A2.

Distribution of participants according to the number of scenarios they experienced (whether they made them feel comfortable or uncomfortable).

A chart with 14 vertical bars. The x-axis has the following categories from left to right: 0 scenario, 1 scenario, ... up to14 scenarios. The y-axis is labelled Participants
Figure A3.

Distribution of participants according to the number of scenarios they experienced and made them feel uncomfortable.

Number of participants who experienced the named scenario (whether they made them feel comfortable or uncomfortable) with respect to the total number of participants (whether they experienced the scenario or never did).
Figure A4.

Number of participants who experienced the named scenario (whether they made them feel comfortable or uncomfortable) with respect to the total number of participants (whether they experienced the scenario or never did).

Number of participants who experienced the named scenario and felt uncomfortable with respect to the total number of participants (whether they experienced the scenario or never did).
Figure A5.

Number of participants who experienced the named scenario and felt uncomfortable with respect to the total number of participants (whether they experienced the scenario or never did).

A chart with 14 vertical bars. The x-axis is labelled Scenarios with the following categories from left to right: cannot_stop_cam, cannot_stop_mic, voice_you, video_you, browsing_data, voice_adult, voice_child, sound_pet, computer_data, sound_object, video_adult, video_child, video_object, video_pet. The y-axis is labelled Participants
Figure A6.

Percentages of participants who experienced the named scenario and felt uncomfortable with respect to the total number of participants who experienced the named scenario.

Table A1.

Participants’ work context.

N = 214
Employment typeNo.%
Employee (full time)17581.8
Employee (part time)198.9
Self-employed / freelancer / business owner209.3
Work sectorNo.%
Pre-university education31.4
University education115.1
Health2310.7
Information and communications technology4822.4
Financial2913.6
Industrial73.3
Agricultural00.0
Sales and retail2612.1
Petrochemical00.0
Other (please specify)6731.3
Organization typeNo.%
Privately held organization11654.2
Publicly traded organization4119.2
Government organization2511.7
Educational organization146.5
Not-for-profit organization177.9
Other (please specify)10.5
Duration working in current jobNo.%
Less than a year167.5
1 year2310.7
2 years4219.6
3 years209.3
4 years146.5
5 years188.4
More than 5 years8137.9
Other (please specify)00.0
Avg. normal work days/weekNo.%
1 day per week10.5
2 days per week31.4
3 days per week73.3
4 days per week115.1
5 days per week17782.7
6 days per week125.6
7 days per week31.4
Other (please specify)00.0
Avg. WFH days/weekNo.%
1 day per week188.4
2 days per week2813.1
3 days per week3315.4
4 days per week3114.5
5 days per week9544.4
6 days per week73.3
7 days per week20.9
Other (please specify)00.0
Duration been WFHNo.%
Less than 3 months00.0
From 3 to 11 months219.8
One year2310.7
2 years4521.0
3 years6630.8
4 years2712.6
5 years94.2
More than 5 years2310.7
Other (please specify)00.0
N = 214
Employment typeNo.%
Employee (full time)17581.8
Employee (part time)198.9
Self-employed / freelancer / business owner209.3
Work sectorNo.%
Pre-university education31.4
University education115.1
Health2310.7
Information and communications technology4822.4
Financial2913.6
Industrial73.3
Agricultural00.0
Sales and retail2612.1
Petrochemical00.0
Other (please specify)6731.3
Organization typeNo.%
Privately held organization11654.2
Publicly traded organization4119.2
Government organization2511.7
Educational organization146.5
Not-for-profit organization177.9
Other (please specify)10.5
Duration working in current jobNo.%
Less than a year167.5
1 year2310.7
2 years4219.6
3 years209.3
4 years146.5
5 years188.4
More than 5 years8137.9
Other (please specify)00.0
Avg. normal work days/weekNo.%
1 day per week10.5
2 days per week31.4
3 days per week73.3
4 days per week115.1
5 days per week17782.7
6 days per week125.6
7 days per week31.4
Other (please specify)00.0
Avg. WFH days/weekNo.%
1 day per week188.4
2 days per week2813.1
3 days per week3315.4
4 days per week3114.5
5 days per week9544.4
6 days per week73.3
7 days per week20.9
Other (please specify)00.0
Duration been WFHNo.%
Less than 3 months00.0
From 3 to 11 months219.8
One year2310.7
2 years4521.0
3 years6630.8
4 years2712.6
5 years94.2
More than 5 years2310.7
Other (please specify)00.0
Table A1.

Participants’ work context.

N = 214
Employment typeNo.%
Employee (full time)17581.8
Employee (part time)198.9
Self-employed / freelancer / business owner209.3
Work sectorNo.%
Pre-university education31.4
University education115.1
Health2310.7
Information and communications technology4822.4
Financial2913.6
Industrial73.3
Agricultural00.0
Sales and retail2612.1
Petrochemical00.0
Other (please specify)6731.3
Organization typeNo.%
Privately held organization11654.2
Publicly traded organization4119.2
Government organization2511.7
Educational organization146.5
Not-for-profit organization177.9
Other (please specify)10.5
Duration working in current jobNo.%
Less than a year167.5
1 year2310.7
2 years4219.6
3 years209.3
4 years146.5
5 years188.4
More than 5 years8137.9
Other (please specify)00.0
Avg. normal work days/weekNo.%
1 day per week10.5
2 days per week31.4
3 days per week73.3
4 days per week115.1
5 days per week17782.7
6 days per week125.6
7 days per week31.4
Other (please specify)00.0
Avg. WFH days/weekNo.%
1 day per week188.4
2 days per week2813.1
3 days per week3315.4
4 days per week3114.5
5 days per week9544.4
6 days per week73.3
7 days per week20.9
Other (please specify)00.0
Duration been WFHNo.%
Less than 3 months00.0
From 3 to 11 months219.8
One year2310.7
2 years4521.0
3 years6630.8
4 years2712.6
5 years94.2
More than 5 years2310.7
Other (please specify)00.0
N = 214
Employment typeNo.%
Employee (full time)17581.8
Employee (part time)198.9
Self-employed / freelancer / business owner209.3
Work sectorNo.%
Pre-university education31.4
University education115.1
Health2310.7
Information and communications technology4822.4
Financial2913.6
Industrial73.3
Agricultural00.0
Sales and retail2612.1
Petrochemical00.0
Other (please specify)6731.3
Organization typeNo.%
Privately held organization11654.2
Publicly traded organization4119.2
Government organization2511.7
Educational organization146.5
Not-for-profit organization177.9
Other (please specify)10.5
Duration working in current jobNo.%
Less than a year167.5
1 year2310.7
2 years4219.6
3 years209.3
4 years146.5
5 years188.4
More than 5 years8137.9
Other (please specify)00.0
Avg. normal work days/weekNo.%
1 day per week10.5
2 days per week31.4
3 days per week73.3
4 days per week115.1
5 days per week17782.7
6 days per week125.6
7 days per week31.4
Other (please specify)00.0
Avg. WFH days/weekNo.%
1 day per week188.4
2 days per week2813.1
3 days per week3315.4
4 days per week3114.5
5 days per week9544.4
6 days per week73.3
7 days per week20.9
Other (please specify)00.0
Duration been WFHNo.%
Less than 3 months00.0
From 3 to 11 months219.8
One year2310.7
2 years4521.0
3 years6630.8
4 years2712.6
5 years94.2
More than 5 years2310.7
Other (please specify)00.0
Table A2.

Participants’ conference tools usage.

N = 214
Frequency of communication via conference toolsNo.%
At least once every work from home day13261.7
At least once every few work from home days4320.1
At least once every work from home week2813.1
At least once every few work from home weeks115.1
At least once every work from home month00.0
Less than once every work from home month00.0
Other (please specify)00.0
Avg. time spent comm via conference toolsNo.%
Less than 1 hour per work from home day5123.8
At least 1 hour per work from home day8238.3
At least 2 hours per work from home day4621.5
At least 3 hours per work from home day198.9
At least 4 hours per work from home day62.8
More than 4 hours per work from home day104.7
Other (please specify)00.0
Devices used in WFH (non-exclusive)No.%
Mobile smartphone15170.6
Mobile traditional (non-smart) phone00.0
Landline phone136.1
Tablet2813.1
Laptop19490.7
Personal computer (PC)7434.6
Other (please specify)00.0
Techs used in WFH (non-exclusive)No.%
Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)214100.0
Phone (audio only)12457.9
Email messaging19490.7
Instant messaging applications (Slack, WhatsApp, etc.)14165.9
Mobile short messaging service (SMS) messaging7936.9
Other (please specify)31.4
Frequency share microphoneNo.%
All of my meetings7535.0
Most of my meetings7434.6
About half of my meetings3014.0
A few of my meetings3114.5
None of my meetings41.9
Frequency share cameraNo.%
All of my meetings4621.5
Most of my meetings5626.2
About half of my meetings3215.0
A few of my meetings6229.0
None of my meetings188.4
Frequency share screenNo.%
All of my meetings83.7
Most of my meetings209.3
About half of my meetings4119.2
A few of my meetings12156.5
None of my meetings2411.2
N = 214
Frequency of communication via conference toolsNo.%
At least once every work from home day13261.7
At least once every few work from home days4320.1
At least once every work from home week2813.1
At least once every few work from home weeks115.1
At least once every work from home month00.0
Less than once every work from home month00.0
Other (please specify)00.0
Avg. time spent comm via conference toolsNo.%
Less than 1 hour per work from home day5123.8
At least 1 hour per work from home day8238.3
At least 2 hours per work from home day4621.5
At least 3 hours per work from home day198.9
At least 4 hours per work from home day62.8
More than 4 hours per work from home day104.7
Other (please specify)00.0
Devices used in WFH (non-exclusive)No.%
Mobile smartphone15170.6
Mobile traditional (non-smart) phone00.0
Landline phone136.1
Tablet2813.1
Laptop19490.7
Personal computer (PC)7434.6
Other (please specify)00.0
Techs used in WFH (non-exclusive)No.%
Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)214100.0
Phone (audio only)12457.9
Email messaging19490.7
Instant messaging applications (Slack, WhatsApp, etc.)14165.9
Mobile short messaging service (SMS) messaging7936.9
Other (please specify)31.4
Frequency share microphoneNo.%
All of my meetings7535.0
Most of my meetings7434.6
About half of my meetings3014.0
A few of my meetings3114.5
None of my meetings41.9
Frequency share cameraNo.%
All of my meetings4621.5
Most of my meetings5626.2
About half of my meetings3215.0
A few of my meetings6229.0
None of my meetings188.4
Frequency share screenNo.%
All of my meetings83.7
Most of my meetings209.3
About half of my meetings4119.2
A few of my meetings12156.5
None of my meetings2411.2
Table A2.

Participants’ conference tools usage.

N = 214
Frequency of communication via conference toolsNo.%
At least once every work from home day13261.7
At least once every few work from home days4320.1
At least once every work from home week2813.1
At least once every few work from home weeks115.1
At least once every work from home month00.0
Less than once every work from home month00.0
Other (please specify)00.0
Avg. time spent comm via conference toolsNo.%
Less than 1 hour per work from home day5123.8
At least 1 hour per work from home day8238.3
At least 2 hours per work from home day4621.5
At least 3 hours per work from home day198.9
At least 4 hours per work from home day62.8
More than 4 hours per work from home day104.7
Other (please specify)00.0
Devices used in WFH (non-exclusive)No.%
Mobile smartphone15170.6
Mobile traditional (non-smart) phone00.0
Landline phone136.1
Tablet2813.1
Laptop19490.7
Personal computer (PC)7434.6
Other (please specify)00.0
Techs used in WFH (non-exclusive)No.%
Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)214100.0
Phone (audio only)12457.9
Email messaging19490.7
Instant messaging applications (Slack, WhatsApp, etc.)14165.9
Mobile short messaging service (SMS) messaging7936.9
Other (please specify)31.4
Frequency share microphoneNo.%
All of my meetings7535.0
Most of my meetings7434.6
About half of my meetings3014.0
A few of my meetings3114.5
None of my meetings41.9
Frequency share cameraNo.%
All of my meetings4621.5
Most of my meetings5626.2
About half of my meetings3215.0
A few of my meetings6229.0
None of my meetings188.4
Frequency share screenNo.%
All of my meetings83.7
Most of my meetings209.3
About half of my meetings4119.2
A few of my meetings12156.5
None of my meetings2411.2
N = 214
Frequency of communication via conference toolsNo.%
At least once every work from home day13261.7
At least once every few work from home days4320.1
At least once every work from home week2813.1
At least once every few work from home weeks115.1
At least once every work from home month00.0
Less than once every work from home month00.0
Other (please specify)00.0
Avg. time spent comm via conference toolsNo.%
Less than 1 hour per work from home day5123.8
At least 1 hour per work from home day8238.3
At least 2 hours per work from home day4621.5
At least 3 hours per work from home day198.9
At least 4 hours per work from home day62.8
More than 4 hours per work from home day104.7
Other (please specify)00.0
Devices used in WFH (non-exclusive)No.%
Mobile smartphone15170.6
Mobile traditional (non-smart) phone00.0
Landline phone136.1
Tablet2813.1
Laptop19490.7
Personal computer (PC)7434.6
Other (please specify)00.0
Techs used in WFH (non-exclusive)No.%
Video conferencing (e.g. Zoom, Google Meet, Microsoft Teams, Skype, etc.)214100.0
Phone (audio only)12457.9
Email messaging19490.7
Instant messaging applications (Slack, WhatsApp, etc.)14165.9
Mobile short messaging service (SMS) messaging7936.9
Other (please specify)31.4
Frequency share microphoneNo.%
All of my meetings7535.0
Most of my meetings7434.6
About half of my meetings3014.0
A few of my meetings3114.5
None of my meetings41.9
Frequency share cameraNo.%
All of my meetings4621.5
Most of my meetings5626.2
About half of my meetings3215.0
A few of my meetings6229.0
None of my meetings188.4
Frequency share screenNo.%
All of my meetings83.7
Most of my meetings209.3
About half of my meetings4119.2
A few of my meetings12156.5
None of my meetings2411.2
Table A3.

Participants’ demographics.

N = 214
Employer productivity monitoring (non-exclusive)No.%
Time trackers4119.2
Activity trackers3918.2
Task trackers3014.0
Video monitoring115.1
Audio monitoring104.7
I am not aware of any productivity trackers used by my employers14366.8
Other (*please specify)62.8
Age (years)No.%
From 18 to 24177.9
From 25 to 348137.9
From 35 to 446731.3
From 45 to 542511.7
From 55 to 64219.8
From 65 to 7431.4
75 or older00.0
Prefer not to answer00.0
GenderNo.%
Male11654.2
Female9443.9
Non-binary31.4
Prefer to self describe:00.0
Prefer not to answer10.5
Race / ethnicity (non-exclusive)No.%
White15472.0
Black or African American2310.7
American Indian or Alaska Native73.3
Asian3315.4
Native Hawaiian or Pacific Islander00.0
Hispanic and/or Latino/Latina/Latinx167.5
Prefer to self describe:31.4
Prefer not to answer31.4
Annual IncomeNo.%
Less than $20,00031.4
$20,000–$39,999136.1
$40,000–$59,9993114.5
$60,000–$79,9994922.9
$80,000–$99,9993315.4
$100,000–$149,9994320.1
$150,000 or more3717.3
Prefer not to answer52.3
EducationNo.%
Doctoral degree62.8
Master’s degree4320.1
Bachelor’s degree10850.5
Associate’s degree177.9
High school diploma or GED3817.8
Less than high school degree00.0
Other (please specify)20.9
CS/IS/IT/CE backgroundNo.%
Yes5224.3
No16275.7
Cybersecurity backgroundNo.%
Yes167.5
No19892.5
N = 214
Employer productivity monitoring (non-exclusive)No.%
Time trackers4119.2
Activity trackers3918.2
Task trackers3014.0
Video monitoring115.1
Audio monitoring104.7
I am not aware of any productivity trackers used by my employers14366.8
Other (*please specify)62.8
Age (years)No.%
From 18 to 24177.9
From 25 to 348137.9
From 35 to 446731.3
From 45 to 542511.7
From 55 to 64219.8
From 65 to 7431.4
75 or older00.0
Prefer not to answer00.0
GenderNo.%
Male11654.2
Female9443.9
Non-binary31.4
Prefer to self describe:00.0
Prefer not to answer10.5
Race / ethnicity (non-exclusive)No.%
White15472.0
Black or African American2310.7
American Indian or Alaska Native73.3
Asian3315.4
Native Hawaiian or Pacific Islander00.0
Hispanic and/or Latino/Latina/Latinx167.5
Prefer to self describe:31.4
Prefer not to answer31.4
Annual IncomeNo.%
Less than $20,00031.4
$20,000–$39,999136.1
$40,000–$59,9993114.5
$60,000–$79,9994922.9
$80,000–$99,9993315.4
$100,000–$149,9994320.1
$150,000 or more3717.3
Prefer not to answer52.3
EducationNo.%
Doctoral degree62.8
Master’s degree4320.1
Bachelor’s degree10850.5
Associate’s degree177.9
High school diploma or GED3817.8
Less than high school degree00.0
Other (please specify)20.9
CS/IS/IT/CE backgroundNo.%
Yes5224.3
No16275.7
Cybersecurity backgroundNo.%
Yes167.5
No19892.5
Table A3.

Participants’ demographics.

N = 214
Employer productivity monitoring (non-exclusive)No.%
Time trackers4119.2
Activity trackers3918.2
Task trackers3014.0
Video monitoring115.1
Audio monitoring104.7
I am not aware of any productivity trackers used by my employers14366.8
Other (*please specify)62.8
Age (years)No.%
From 18 to 24177.9
From 25 to 348137.9
From 35 to 446731.3
From 45 to 542511.7
From 55 to 64219.8
From 65 to 7431.4
75 or older00.0
Prefer not to answer00.0
GenderNo.%
Male11654.2
Female9443.9
Non-binary31.4
Prefer to self describe:00.0
Prefer not to answer10.5
Race / ethnicity (non-exclusive)No.%
White15472.0
Black or African American2310.7
American Indian or Alaska Native73.3
Asian3315.4
Native Hawaiian or Pacific Islander00.0
Hispanic and/or Latino/Latina/Latinx167.5
Prefer to self describe:31.4
Prefer not to answer31.4
Annual IncomeNo.%
Less than $20,00031.4
$20,000–$39,999136.1
$40,000–$59,9993114.5
$60,000–$79,9994922.9
$80,000–$99,9993315.4
$100,000–$149,9994320.1
$150,000 or more3717.3
Prefer not to answer52.3
EducationNo.%
Doctoral degree62.8
Master’s degree4320.1
Bachelor’s degree10850.5
Associate’s degree177.9
High school diploma or GED3817.8
Less than high school degree00.0
Other (please specify)20.9
CS/IS/IT/CE backgroundNo.%
Yes5224.3
No16275.7
Cybersecurity backgroundNo.%
Yes167.5
No19892.5
N = 214
Employer productivity monitoring (non-exclusive)No.%
Time trackers4119.2
Activity trackers3918.2
Task trackers3014.0
Video monitoring115.1
Audio monitoring104.7
I am not aware of any productivity trackers used by my employers14366.8
Other (*please specify)62.8
Age (years)No.%
From 18 to 24177.9
From 25 to 348137.9
From 35 to 446731.3
From 45 to 542511.7
From 55 to 64219.8
From 65 to 7431.4
75 or older00.0
Prefer not to answer00.0
GenderNo.%
Male11654.2
Female9443.9
Non-binary31.4
Prefer to self describe:00.0
Prefer not to answer10.5
Race / ethnicity (non-exclusive)No.%
White15472.0
Black or African American2310.7
American Indian or Alaska Native73.3
Asian3315.4
Native Hawaiian or Pacific Islander00.0
Hispanic and/or Latino/Latina/Latinx167.5
Prefer to self describe:31.4
Prefer not to answer31.4
Annual IncomeNo.%
Less than $20,00031.4
$20,000–$39,999136.1
$40,000–$59,9993114.5
$60,000–$79,9994922.9
$80,000–$99,9993315.4
$100,000–$149,9994320.1
$150,000 or more3717.3
Prefer not to answer52.3
EducationNo.%
Doctoral degree62.8
Master’s degree4320.1
Bachelor’s degree10850.5
Associate’s degree177.9
High school diploma or GED3817.8
Less than high school degree00.0
Other (please specify)20.9
CS/IS/IT/CE backgroundNo.%
Yes5224.3
No16275.7
Cybersecurity backgroundNo.%
Yes167.5
No19892.5
Table A4.

Participants’ WFH setting.

N = 214
Bedrooms in homeNo.%
One bedroom2210.3
Two bedrooms5425.2
Three bedrooms7936.9
Four bedrooms4219.6
Five bedrooms146.5
More than 5 bedrooms10.5
Other (please specify)20.9
Living with (non-exclusive)No.%
Spouse or partner12357.5
Roommate(s)157.0
Child(ren) under the age of 186831.8
Child(ren) over the age of 18177.9
Parent(s)3616.8
Sibling(s)146.5
No one3114.5
Other (please specify)62.8
Duration living in the homeNo.%
Less than a year167.5
1 year2210.3
2 years3014.0
3 years219.8
4 years157.0
5 years62.8
More than 5 years10247.7
Other (please specify)20.9
Have a dedicated space for workNo.%
Yes17079.4
No4420.6
N = 214
Bedrooms in homeNo.%
One bedroom2210.3
Two bedrooms5425.2
Three bedrooms7936.9
Four bedrooms4219.6
Five bedrooms146.5
More than 5 bedrooms10.5
Other (please specify)20.9
Living with (non-exclusive)No.%
Spouse or partner12357.5
Roommate(s)157.0
Child(ren) under the age of 186831.8
Child(ren) over the age of 18177.9
Parent(s)3616.8
Sibling(s)146.5
No one3114.5
Other (please specify)62.8
Duration living in the homeNo.%
Less than a year167.5
1 year2210.3
2 years3014.0
3 years219.8
4 years157.0
5 years62.8
More than 5 years10247.7
Other (please specify)20.9
Have a dedicated space for workNo.%
Yes17079.4
No4420.6
Table A4.

Participants’ WFH setting.

N = 214
Bedrooms in homeNo.%
One bedroom2210.3
Two bedrooms5425.2
Three bedrooms7936.9
Four bedrooms4219.6
Five bedrooms146.5
More than 5 bedrooms10.5
Other (please specify)20.9
Living with (non-exclusive)No.%
Spouse or partner12357.5
Roommate(s)157.0
Child(ren) under the age of 186831.8
Child(ren) over the age of 18177.9
Parent(s)3616.8
Sibling(s)146.5
No one3114.5
Other (please specify)62.8
Duration living in the homeNo.%
Less than a year167.5
1 year2210.3
2 years3014.0
3 years219.8
4 years157.0
5 years62.8
More than 5 years10247.7
Other (please specify)20.9
Have a dedicated space for workNo.%
Yes17079.4
No4420.6
N = 214
Bedrooms in homeNo.%
One bedroom2210.3
Two bedrooms5425.2
Three bedrooms7936.9
Four bedrooms4219.6
Five bedrooms146.5
More than 5 bedrooms10.5
Other (please specify)20.9
Living with (non-exclusive)No.%
Spouse or partner12357.5
Roommate(s)157.0
Child(ren) under the age of 186831.8
Child(ren) over the age of 18177.9
Parent(s)3616.8
Sibling(s)146.5
No one3114.5
Other (please specify)62.8
Duration living in the homeNo.%
Less than a year167.5
1 year2210.3
2 years3014.0
3 years219.8
4 years157.0
5 years62.8
More than 5 years10247.7
Other (please specify)20.9
Have a dedicated space for workNo.%
Yes17079.4
No4420.6
Table A5.

The privacy invasive scenarios ordered by category. Columns 2--4, respectively, list the number of participants who experienced the scenario and felt very uncomfortable; somewhat uncomfortable; and comfortable. The last column shows the percentage of participants who experienced the scenario and felt uncomfortable with respect to the number of participants who experienced that scenario (ratio of discomfort). Refer to Table 1 in the text for a description of the scenarios codes.

N = 214
 Experienced the scenario and felt:    
Scenario codeVery uncomf.Somewhat uncomf.Comf.Never experiencedTotal uncomf. (somewhat or very)Total experienced (comf. and uncomf.)Ratio discomf.
Audio scenarios
voice_you1744391146110061.0%
voice_adult123550117479748.5%
voice_child52033156255843.1%
sound_object104585745514039.3%
sound_pet94271925112241.8%
Video scenarios
video_you82323160315457.4%
video_adult51533161205337.7%
video_child6825175143935.9%
video_object121921002211419.3%
video_pet01169134118013.8%
Data scenarios
computer_data62546137317740.3%
browsing_data43035145346949.3%
Autonomy scenarios
cannot_stop_camera93315157425773.7%
cannot_stop_mic112619158375666.1%
N = 214
 Experienced the scenario and felt:    
Scenario codeVery uncomf.Somewhat uncomf.Comf.Never experiencedTotal uncomf. (somewhat or very)Total experienced (comf. and uncomf.)Ratio discomf.
Audio scenarios
voice_you1744391146110061.0%
voice_adult123550117479748.5%
voice_child52033156255843.1%
sound_object104585745514039.3%
sound_pet94271925112241.8%
Video scenarios
video_you82323160315457.4%
video_adult51533161205337.7%
video_child6825175143935.9%
video_object121921002211419.3%
video_pet01169134118013.8%
Data scenarios
computer_data62546137317740.3%
browsing_data43035145346949.3%
Autonomy scenarios
cannot_stop_camera93315157425773.7%
cannot_stop_mic112619158375666.1%
Table A5.

The privacy invasive scenarios ordered by category. Columns 2--4, respectively, list the number of participants who experienced the scenario and felt very uncomfortable; somewhat uncomfortable; and comfortable. The last column shows the percentage of participants who experienced the scenario and felt uncomfortable with respect to the number of participants who experienced that scenario (ratio of discomfort). Refer to Table 1 in the text for a description of the scenarios codes.

N = 214
 Experienced the scenario and felt:    
Scenario codeVery uncomf.Somewhat uncomf.Comf.Never experiencedTotal uncomf. (somewhat or very)Total experienced (comf. and uncomf.)Ratio discomf.
Audio scenarios
voice_you1744391146110061.0%
voice_adult123550117479748.5%
voice_child52033156255843.1%
sound_object104585745514039.3%
sound_pet94271925112241.8%
Video scenarios
video_you82323160315457.4%
video_adult51533161205337.7%
video_child6825175143935.9%
video_object121921002211419.3%
video_pet01169134118013.8%
Data scenarios
computer_data62546137317740.3%
browsing_data43035145346949.3%
Autonomy scenarios
cannot_stop_camera93315157425773.7%
cannot_stop_mic112619158375666.1%
N = 214
 Experienced the scenario and felt:    
Scenario codeVery uncomf.Somewhat uncomf.Comf.Never experiencedTotal uncomf. (somewhat or very)Total experienced (comf. and uncomf.)Ratio discomf.
Audio scenarios
voice_you1744391146110061.0%
voice_adult123550117479748.5%
voice_child52033156255843.1%
sound_object104585745514039.3%
sound_pet94271925112241.8%
Video scenarios
video_you82323160315457.4%
video_adult51533161205337.7%
video_child6825175143935.9%
video_object121921002211419.3%
video_pet01169134118013.8%
Data scenarios
computer_data62546137317740.3%
browsing_data43035145346949.3%
Autonomy scenarios
cannot_stop_camera93315157425773.7%
cannot_stop_mic112619158375666.1%
Table A6.

The aggregated number of participants who experienced at least one scenario of the named category and felt comfortable or uncomfortable (experienced) and those who felt uncomfortable (very or somewhat).

N = 214
Scenario cat.ExperiencedUncomf.
Audio187107
Video13855
Data9154
Autonomy7247
N = 214
Scenario cat.ExperiencedUncomf.
Audio187107
Video13855
Data9154
Autonomy7247
Table A6.

The aggregated number of participants who experienced at least one scenario of the named category and felt comfortable or uncomfortable (experienced) and those who felt uncomfortable (very or somewhat).

N = 214
Scenario cat.ExperiencedUncomf.
Audio187107
Video13855
Data9154
Autonomy7247
N = 214
Scenario cat.ExperiencedUncomf.
Audio187107
Video13855
Data9154
Autonomy7247
Table A7.

Categories of the most memorable scenario the participants experienced and made them feel uncomfortable.

N = 140
ScenarioNo.%
sound_pet2820.0
voice_you1913.6
voice_adult1410.0
sound_object139.3
cant_stop_camera128.6
video_you117.9
computer_data96.4
browsing_data75.0
voice_child75.0
cant_stop_mic75.0
video_adult53.6
video_child42.9
video_object21.4
video_pet21.4
N = 140
ScenarioNo.%
sound_pet2820.0
voice_you1913.6
voice_adult1410.0
sound_object139.3
cant_stop_camera128.6
video_you117.9
computer_data96.4
browsing_data75.0
voice_child75.0
cant_stop_mic75.0
video_adult53.6
video_child42.9
video_object21.4
video_pet21.4
Table A7.

Categories of the most memorable scenario the participants experienced and made them feel uncomfortable.

N = 140
ScenarioNo.%
sound_pet2820.0
voice_you1913.6
voice_adult1410.0
sound_object139.3
cant_stop_camera128.6
video_you117.9
computer_data96.4
browsing_data75.0
voice_child75.0
cant_stop_mic75.0
video_adult53.6
video_child42.9
video_object21.4
video_pet21.4
N = 140
ScenarioNo.%
sound_pet2820.0
voice_you1913.6
voice_adult1410.0
sound_object139.3
cant_stop_camera128.6
video_you117.9
computer_data96.4
browsing_data75.0
voice_child75.0
cant_stop_mic75.0
video_adult53.6
video_child42.9
video_object21.4
video_pet21.4
Table A8.

Characteristics of scenarios that caused discomfort.

N = 140
Discomfort escalated to cause harmNo.%
It caused a large amount of harm10.7
It caused a moderate amount of harm00.0
It caused a small amount of harm3525.0
It did not cause any harm10474.3
Type of harm (non-exclusive; N = 36)No.%
Financial harm12.8
Physical harm12.8
Psychological harm3494.4
Other (please specify)12.8
Frequency of eventNo.%
Once7150.7
A few times6647.1
Repeatedly32.1
I cannot remember00.0
Recording of eventNo.%
Yes, video and voice2517.9
Yes, video only42.9
Yes, voice only1510.7
No, not recorded8862.9
I cannot remember85.7
Where in the houseNo.%
Office room5942.1
Living room / recreation area2618.6
Bedroom3021.4
Kitchen75.0
Dining room85.7
Garage00.0
Bathroom10.7
Other (please specify)96.4
Device shared (non-exclusive)No.%
Microphone11582.1
Camera8258.6
Screen2820.0
I cannot remember10.7
Other (please specify)21.4
N = 140
Discomfort escalated to cause harmNo.%
It caused a large amount of harm10.7
It caused a moderate amount of harm00.0
It caused a small amount of harm3525.0
It did not cause any harm10474.3
Type of harm (non-exclusive; N = 36)No.%
Financial harm12.8
Physical harm12.8
Psychological harm3494.4
Other (please specify)12.8
Frequency of eventNo.%
Once7150.7
A few times6647.1
Repeatedly32.1
I cannot remember00.0
Recording of eventNo.%
Yes, video and voice2517.9
Yes, video only42.9
Yes, voice only1510.7
No, not recorded8862.9
I cannot remember85.7
Where in the houseNo.%
Office room5942.1
Living room / recreation area2618.6
Bedroom3021.4
Kitchen75.0
Dining room85.7
Garage00.0
Bathroom10.7
Other (please specify)96.4
Device shared (non-exclusive)No.%
Microphone11582.1
Camera8258.6
Screen2820.0
I cannot remember10.7
Other (please specify)21.4
Table A8.

Characteristics of scenarios that caused discomfort.

N = 140
Discomfort escalated to cause harmNo.%
It caused a large amount of harm10.7
It caused a moderate amount of harm00.0
It caused a small amount of harm3525.0
It did not cause any harm10474.3
Type of harm (non-exclusive; N = 36)No.%
Financial harm12.8
Physical harm12.8
Psychological harm3494.4
Other (please specify)12.8
Frequency of eventNo.%
Once7150.7
A few times6647.1
Repeatedly32.1
I cannot remember00.0
Recording of eventNo.%
Yes, video and voice2517.9
Yes, video only42.9
Yes, voice only1510.7
No, not recorded8862.9
I cannot remember85.7
Where in the houseNo.%
Office room5942.1
Living room / recreation area2618.6
Bedroom3021.4
Kitchen75.0
Dining room85.7
Garage00.0
Bathroom10.7
Other (please specify)96.4
Device shared (non-exclusive)No.%
Microphone11582.1
Camera8258.6
Screen2820.0
I cannot remember10.7
Other (please specify)21.4
N = 140
Discomfort escalated to cause harmNo.%
It caused a large amount of harm10.7
It caused a moderate amount of harm00.0
It caused a small amount of harm3525.0
It did not cause any harm10474.3
Type of harm (non-exclusive; N = 36)No.%
Financial harm12.8
Physical harm12.8
Psychological harm3494.4
Other (please specify)12.8
Frequency of eventNo.%
Once7150.7
A few times6647.1
Repeatedly32.1
I cannot remember00.0
Recording of eventNo.%
Yes, video and voice2517.9
Yes, video only42.9
Yes, voice only1510.7
No, not recorded8862.9
I cannot remember85.7
Where in the houseNo.%
Office room5942.1
Living room / recreation area2618.6
Bedroom3021.4
Kitchen75.0
Dining room85.7
Garage00.0
Bathroom10.7
Other (please specify)96.4
Device shared (non-exclusive)No.%
Microphone11582.1
Camera8258.6
Screen2820.0
I cannot remember10.7
Other (please specify)21.4

Footnotes

1

For brevity, throughout this paper, we use the word “data” to denote “computer/browsing data.”

2

These differ from the traditional work model and relationships (e.g. with managers and colleagues) that we assumed when we developed our survey’s scenarios.

3

Since the scenarios here were provided in response to an open-ended question and not on a list as those who said they experienced at least one scenario that made them feel uncomfortable, some participants provided scenarios that contained multiple categories. Thus, scenario categories in this section are non-exclusive and the counts represent the mentioned scenario categories and not the participants.

References

1.

Zoom Communications, Inc.
.
One Platform to Connect | Zoom
.
2025
, .
(3 January 2025, date last accessed)
.

2.

Microsoft
.
Video Conferencing, Meetings, Calling | Microsoft Teams
.
2025
,
https://www.microsoft.com/en-us/microsoft-teams. (3 January 2025, date last accessed)
.

3.

World Health Organization
.
Coronavirus Disease (COVID-19)
.
2024
,
https://www.who.int/health-topics/coronavirus#tab=tab_1. (19 March 2024, date last accessed)
.

4.

Ford
 
D
,
Storey
 
MA
,
Zimmermann
 
T
 et al.  
A Tale of Two Cities: software developers Working from Home During the COVID-19 pandemic
.
ACM Trans Softw Eng Methodol
.
2021
;
31
:
1
37
.

5.

Fukumura
 
YE
,
Schott
 
JM
,
Lucas
 
GM
 et al.  
Negotiating time and space when Working From Home: experiences during COVID-19
.
OTJR: Occup Ther J Res
.
2021
;
41
:
223
31
.

6.

Varner
 
K
,
Schmidt
 
K
.
Employment-at-will in the United States and the challenges of remote work in the time of COVID-19
.
Laws
.
2022
;
11
:
29
.

7.

Chappell
 
B
.
Viral “BBC Dad” returns to discuss Working From Home: “Just Really, Really Tough”
.
2020
. .

8.

News
 
BBC
.
Children Interrupt BBC News Interview—BBC News
.
2017
,
https://www.youtube.com/watch?v=Mh4f9AYRCZY. (22 March 2024, date last accessed)
.

9.

Smite
 
D
,
Moe
 
NB
,
Hildrum
 
J
 et al.  
Work-From-Home is here to stay: call for flexibility in post-pandemic work policies
.
J Syst Softw
.
2023
;
195
:
111552
.

10.

Christian
 
A
.
The companies sticking to fully remote work
.
2023
, .

11.

Lufkin
 
B
.
The companies doubling down on remote work
.
2022
, .

12.

Barrero
 
JM
,
Bloom
 
N
,
Buckman
 
S
 et al.  
SWAA March 2024 updates
.
2024
, .

13.

US Bureau of Labor Statistics
.
Bureau of labor statistics data–databases, tables, and calculators by subject
.
2023
,
https://data.bls.gov/timeseries/LNU0201B46B. (15 January 2025, date last accessed)
.

14.

McAlpine
 
Kristie
.
Don’t Abandon the Water Cooler Yet: Flexible Work Arrangements and the Unique Effect of Face-to-Face Informal Communication on Idea Generation and Innovation
. .
2018
.
(8 September 2024, date last accessed)
.

15.

Hayes
 
SW
,
Priestley
 
JL
,
Moore
 
BA
 et al.  
Perceived stress, work-related burnout, and Working From Home before and during COVID-19: an examination of workers in the United States
.
SAGE Open
.
2021
;
11
:
1
12
.

16.

Chiru
 
C
.
Teleworking: evolution and trends in USA, EU and Romania
.
Econ Manage Financ Mar
.
2017
;
12
:
222
9
.

17.

Rysavy
 
MDT
,
Michalak
 
R
.
Working from Home: how we managed our team remotely with technology
.
J Libr Admin
.
2020
;
60
:
532
42
.

18.

Hodder
 
A
.
New technology, work and employment in the era of COVID-19: reflecting on legacies of research
.
New Technology, Work and Employment
.
2020
;
35
:
262
75
.

19.

Google
.
Google Meet
.
2025
,
https://meet.google.com/landing. (3 January 2025, date last accessed)
.

20.

Mosendz
 
P
,
Melin
 
A
.
Bosses Panic-buy spy software to keep tabs on remote workers
.
2020
, .

21.

Nguyen
 
A
.
On the clock and at home: Post-COVID-19 employee monitoring in the workplace
.
People and Strategy
.
2020
;
43
:
1
7
.

22.

Vatcha
 
A
.
Workplace surveillance outside the workplace: an analysis of E-monitoring remote employees
.
Ischannel
.
2020
;
15
:
4
9
.

23.

Allyn
 
B
.
Your boss is watching you: Work-From-Home boom leads to more surveillance
.
2020
, .

24.

Vitak
 
J
,
Zimmer
 
M
.
Surveillance and the future of work: exploring employees’ attitudes toward monitoring in a post-COVID workplace
.
J Comput-Mediat Commun
.
2023
;
28
:
zmad007
.

25.

Pranggono
 
B
,
Arabo
 
A
.
COVID-19 pandemic cybersecurity issues
.
Internet Techn Lett
.
2021
;
4
:
e247
.

26.

Kotak
 
J
,
Habler
 
E
,
Brodt
 
O
 et al.  
Information security threats and working from home culture: taxonomy, risk assessment and solutions
.
Sensors
.
2023
;
23
:
4018
.

27.

Lallie
 
HS
,
Shepherd
 
LA
,
Nurse
 
JRC
 et al.  
Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic
.
Comput Secur
.
2021
;
105
:
102248
.

28.

Ling
 
C
,
Balcı
 
U
,
Blackburn
 
J
 et al.  
A first look at zoombombing
. In:
Proceedings of the IEEE Symposium on Security and Privacy (SP)
. pp.
1452
67
.
USA
:
IEEE
,
2021
.

29.

Akdemir
 
N
,
Yenal
 
S
.
How phishers exploit the coronavirus pandemic: a content analysis of COVID-19 themed phishing emails
.
Sage Open
.
2021
;
11
:
21582440211031879
.

30.

Hoheisel
 
R
,
van Capelleveen
 
G
,
Sarmah
 
DK
 et al.  
The development of phishing during the COVID-19 pandemic: an analysis of over 1100 targeted domains
.
Comput Secur
.
2023
;
128
:
103158
.

31.

Lang
 
M
,
Connolly
 
L
,
Taylor
 
P
 et al.  
The evolving menace of ransomware: a comparative analysis of pre-pandemic and mid-pandemic attacks
.
Digital Threats
.
2023
;
4
:
1
22
.

32.

Georgiadou
 
A
,
Mouzakitis
 
S
,
Askounis
 
D
.
Working From Home During COVID-19 crisis: a cyber security culture assessment survey
.
Secur J
.
2022
;
35
:
486
505
.

33.

Alromaih
 
S
,
Flechais
 
I
,
Chalhoub
 
G
.
Beyond the office walls: understanding security and shadow security behaviours in a remote work context
. In:
Proceedings of the Symposioum in Usable Privacy and Security (SOUPS)
.
USA
:
USENIX Association
,
2024
.

34.

Bispham
 
M
,
Creese
 
S
,
Dutton
 
WH
 et al.  
An exploratory study of cybersecurity in Working From Home: problem or enabler?
,
J Inform Poli
.
2022
;
12
:
353
86
.

35.

Emami-Naeini
 
P
,
Francisco
 
T
,
Kohno
 
T
 et al.  
Understanding privacy attitudes and concerns towards remote communications during the COVID-19 pandemic
. In:
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
. pp.
695
714
.
2021
.

36.

Prange
 
S
,
Rodriguez
 
SD
,
Mecke
 
L
 et al.  
“I Saw Your Partner Naked”: exploring privacy challenges during video-based online meetings
. In:
Proceedings of the Conference on Mobile and Ubiquitous Multimedia
. pp.
71
82
.
USA
:
Association for Computing Machinery
,
2022
.

37.

Cheetham
 
K
,
Michalec
 
O
.
Home Alone? Exploring the geographies of digitally-mediated privacy practices at home during the COVID-19 pandemic
. In:
Rannenberg
 
K
,
Drogkaris
 
P
,
Lauradoux
 
C
, (eds).
Privacy Technologies and Policy
.
Switzerland
:
Springer Nature
,
2024
,
109
41
.

38.

Whitty
 
MT
,
Moustafa
 
N
,
Grobler
 
M
.
Cybersecurity when working From Home during COVID-19: considering the human factors
.
J Cybersecur
.
2024
;
10
:
tyae001
.

39.

Herder
 
E
,
Gullit
 
M
.
Understanding privacy decisions of homeworkers during video conferences
. In:
Proceedings of the User Modeling, Adaptation and Personalization
. pp.
354
8
.
2022
.

40.

Li
 
N
,
Romera Rodriguez
 
G
,
Xu
 
Y
 et al.  
Picturing one’s self: camera use in zoom classes during the COVID-19 pandemic
. In:
Proceedings of the ACM Conference on Learning @ Scale
. pp.
151
62
.
USA
:
Association for Computing Machinery
,
2022
.

41.

Castelli
 
FR
,
Sarvary
 
MA
.
Why students do not turn on their video cameras during online classes and an equitable and inclusive plan to encourage them to do so
.
Academic Practice in Ecology and Evolution
.
2021
;
11
:
3565
76
.

42.

Cohney
 
S
,
Teixeira
 
R
,
Kohlbrenner
 
A
 et al.  
Virtual classrooms and real harms: remote learning at U.S. Universities
. In:
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
. pp.
653
74
.
USA
:
USENIX Association
,
2021
.

43.

Hilgefort
 
JM
,
Arp
 
D
,
Rieck
 
K
.
Spying through virtual backgrounds of video calls
. In:
Proceedings of the Workshop on Artificial Intelligence and Security
. pp.
135
44
.
USA
:
Association for Computing Machinery
,
2021
.

44.

Qualtrics
.
Qualtrics XM | The Leading Experience Management Software
.
2024
,
https://www.qualtrics.com. (10 April 2024, date last accessed)
.

45.

Serdar
 
CC
,
Cihan
 
M
,
Yöucel
 
D
 et al.  
Sample size, power and effect size revisited: simplified and practical approaches in pre-clinical, clinical and laboratory studies
.
Biochem Med (Zagreb)
.
2021
;
31
:
010502
.

46.

Buchner
 
A
,
Erdfelder
 
E
,
Faul
 
F
 et al.  
G*Power statistical power analyses for mac and windows
.
2024
, .

47.

Prolific
.
Prolific | easily collect high-quality data from real people
.
2024
,
https://www.prolific.com. (14 February 2024, date last accessed)
.

48.

McHugh
 
ML
.
The Chi-Square Test of Independence
.
Biochem Med
.
2013
;
23
:
143
149
.

49.

Kim
 
HY
.
Statistical notes for clinical researchers: chi-squared test and Fisher’s exact test
.
Restor Dent Endod
.
2017
;
42
:
152
55
.

50.

The R Foundation
.
Victims of identity theft, 2012
.
2024
,
https://www.r-project.org. (26 January 2024, date last accessed)
.

51.

King
 
N
.
Template analysis
.
2024
, .

52.

Brooks
 
J
,
King
 
N
.
Doing template analysis: evaluating an end of life care service
.In:
SAGE Research Methods Cases Part 1
.
London
:
SAGE Publications, Ltd
,
2014
.

53.

McDonald
 
N
,
Schoenebeck
 
S
,
Forte
 
A
.
Reliability and inter-rater reliability in qualitative research: norms and guidelines for CSCW and HCI practice
.
Proc ACM Hum-Comput Interact
.
2019
;
3
:
1
23
.

54.

de Vaus
 
D
.
Surveys in Social Research
, 6th Edition.
London and New York
:
Routledge
,
2014
,
161
3
.

55.

Dusen
 
BV
,
Nissen
 
JM
.
Criteria for collapsing rating scale responses: a case study of the CLASS
. In:
Proceedings of the Physics Education Research Conference
.
USA
:
American Association of Physics Teachers (AAPT)
,
2020
.

56.

SHRM
.
Managing workplace monitoring and surveillance
.
2018
, .

57.

Tang
 
J
,
Birrell
 
E
,
Lerner
 
A
.
Replication: how well do my results generalize now? The external validity of online privacy and security surveys
. In:
Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS)
. pp.
367
85
.
USA
:
USENIX Association
,
2022
.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.