{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:22:24Z","timestamp":1776082944771,"version":"3.50.1"},"reference-count":39,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T00:00:00Z","timestamp":1560643200000},"content-version":"vor","delay-in-days":166,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"PETRAS IoT Research Hub\u2014Cybersecurity of the Internet of Things","award":["EP\/N02334X\/1"],"award-info":[{"award-number":["EP\/N02334X\/1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"DOI":"10.1093\/cybsec\/tyz005","type":"journal-article","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T06:39:50Z","timestamp":1560667190000},"source":"Crossref","is-referenced-by-count":41,"title":["What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?"],"prefix":"10.1093","volume":"5","author":[{"given":"John M","family":"Blythe","sequence":"first","affiliation":[{"name":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"},{"name":"CybSafe, Level 39, One Canada Square, Canary Wharf, London, UK"}]},{"given":"Nissy","family":"Sombatruang","sequence":"additional","affiliation":[{"name":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"}]},{"given":"Shane D","family":"Johnson","sequence":"additional","affiliation":[{"name":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"}]}],"member":"286","published-online":{"date-parts":[[2019,6,15]]},"reference":[{"key":"2019061602395007800_tyz005-B1","year":"2015"},{"key":"2019061602395007800_tyz005-B2","author":"Schneier","year":"2017"},{"key":"2019061602395007800_tyz005-B3","year":"2018"},{"key":"2019061602395007800_tyz005-B4","year":"2015"},{"key":"2019061602395007800_tyz005-B5","author":"Veracode","year":"2014"},{"key":"2019061602395007800_tyz005-B6","author":"Sadler","year":"2017"},{"key":"2019061602395007800_tyz005-B7","year":"2015"},{"key":"2019061602395007800_tyz005-B8","year":"2017"},{"key":"2019061602395007800_tyz005-B9","author":"Loi"},{"key":"2019061602395007800_tyz005-B10","first-page":"46","author":"Lyu","year":"2017"},{"key":"2019061602395007800_tyz005-B11","author":"Tekeoglu"},{"key":"2019061602395007800_tyz005-B12","author":"Tekeoglu"},{"key":"2019061602395007800_tyz005-B13","first-page":"343","author":"Tekeoglu"},{"key":"2019061602395007800_tyz005-B14","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.future.2015.09.003","article-title":"A risk analysis of a smart home automation system","volume":"56","author":"Jacobsson","year":"2016","journal-title":"Fut Gener Comput Syst"},{"key":"2019061602395007800_tyz005-B15"},{"key":"2019061602395007800_tyz005-B16","author":"Craggs"},{"key":"2019061602395007800_tyz005-B17"},{"key":"2019061602395007800_tyz005-B18"},{"key":"2019061602395007800_tyz005-B19","author":"Tanczer","year":"2018"},{"key":"2019061602395007800_tyz005-B20","year":"2016"},{"key":"2019061602395007800_tyz005-B21","year":"2018"},{"key":"2019061602395007800_tyz005-B22","author":"Jamieson"},{"key":"2019061602395007800_tyz005-B23","author":"Kleinhans","year":"2018"},{"key":"2019061602395007800_tyz005-B24"},{"key":"2019061602395007800_tyz005-B25"},{"key":"2019061602395007800_tyz005-B26","author":"Coventry"},{"key":"2019061602395007800_tyz005-B27","author":"Blythe","year":"2017"},{"key":"2019061602395007800_tyz005-B28","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1177\/1049732305276687","article-title":"Three approaches to qualitative content analysis","volume":"15","author":"Hsieh","year":"2005","journal-title":"Qual Health Res"},{"key":"2019061602395007800_tyz005-B29","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and other botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"2019061602395007800_tyz005-B30","first-page":"666","author":"Redmiles","year":"2016"},{"key":"2019061602395007800_tyz005-B31","author":"Redmiles"},{"key":"2019061602395007800_tyz005-B32","year":"2018"},{"key":"2019061602395007800_tyz005-B33","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s12160-013-9486-6","article-title":"The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: Building an international consensus for the reporting of behavior change interventions","volume":"46","author":"Michie","year":"2013","journal-title":"Ann Behav Med"},{"key":"2019061602395007800_tyz005-B34","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1186\/1748-5908-6-42","article-title":"The behaviour change wheel: A new method for characterising and designing behaviour change interventions","volume":"6","author":"Michie","year":"2011","journal-title":"Implement Sci"},{"key":"2019061602395007800_tyz005-B35","first-page":"1","article-title":"From theory-inspired to theory-based interventions: A protocol for developing and testing a methodology for linking behaviour change techniques to theoretical mechanisms of action","author":"Michie","year":"2016","journal-title":"Ann Behav Med"},{"key":"2019061602395007800_tyz005-B36","author":"Blythe","year":"2017"},{"key":"2019061602395007800_tyz005-B37","author":"Blythe","year":"2018"},{"key":"2019061602395007800_tyz005-B38","year":"2018"},{"key":"2019061602395007800_tyz005-B39"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/5\/1\/tyz005\/28833444\/tyz005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T06:39:55Z","timestamp":1560667195000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyz005\/5519411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,6,15]]},"published-print":{"date-parts":[[2019,1,1]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyz005","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019]]},"published":{"date-parts":[[2019,1,1]]},"article-number":"tyz005"}}