{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:34:37Z","timestamp":1773797677781,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Office of the Privacy Commissioner of Canada (OPC) Contributions Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/jiot.2018.2877749","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T03:11:46Z","timestamp":1540350706000},"page":"2986-3002","source":"Crossref","is-referenced-by-count":29,"title":["Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-4087","authenticated-orcid":false,"given":"Sharon","family":"Shasha","sequence":"first","affiliation":[]},{"given":"Moustafa","family":"Mahmoud","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9630-5858","authenticated-orcid":false,"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62072-5_9"},{"key":"ref39","author":"nelson","year":"2016","journal-title":"Children&#x2019;s Connected Toys Data Security and Privacy Concerns"},{"key":"ref38","year":"2015","journal-title":"New Wi-Fi-Enabled Barbie Can Be Hacked Researchers Say"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"ref32","first-page":"1","article-title":"Towards a comprehensive analytical framework for smart toy privacy practices","author":"mahmoud","year":"2017","journal-title":"International Workshop on Socio-Technical Aspects in Security and Trust (STAST) IEEE"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873597"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930687"},{"key":"ref37","first-page":"25","article-title":"Smartphone security evaluation: The malware attack case","author":"mylonas","year":"2011","journal-title":"Proc Int Conf Security and Cryptography (SECRYPT)"},{"key":"ref36","year":"2014","journal-title":"Phasing Out Certificates With 1024-Bit RSA Keys"},{"key":"ref35","author":"morris","year":"2015","journal-title":"More Than 200 000 Kids Just Got Hacked"},{"key":"ref34","first-page":"281","article-title":"Protecting privacy in the era of smart toys: Does hello Barbie have a duty to report","volume":"25","author":"moini","year":"2016","journal-title":"Catholic University Journal of Law and Technology"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139947"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aat7111"},{"key":"ref61","author":"vlahos","year":"2015","journal-title":"Barbie Wants to Get to Know Your Child"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/3202185.3202732","article-title":"Measuring young children&#x2019;s long-term relationships with social robots","author":"westlund","year":"2018","journal-title":"Proc 17th ACM Conf Interact Design Child"},{"key":"ref28","author":"jasek","year":"2018","journal-title":"Gattacking Bluetooth Smart Devices"},{"key":"ref64","year":"2017","journal-title":"Which? Safety Alert See How Easy It is for Almost Anyone to Hack Your Child&#x2019;s Connected Toys"},{"key":"ref27","author":"hunt","year":"2017","journal-title":"When Children Are Breached&#x2014;Inside the Massive VTech Hack"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3210788"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11119-3_23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ETHICS.2016.7560047"},{"key":"ref67","year":"2018","journal-title":"Custom Events With Flurry Analytics for iOS"},{"key":"ref68","year":"2018","journal-title":"Flurry Analytics Product Features"},{"key":"ref69","year":"2018","journal-title":"Restricted Feature Set"},{"key":"ref2","year":"2018","journal-title":"ASIdentifierManager&#x2014;Ad Support&#x2014;Apple Developer Support"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref20","year":"2017","journal-title":"Dashboards"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref21","year":"2018","journal-title":"IP Anonymization in Analytics&#x2014;Analytics Help"},{"key":"ref24","author":"hughes","year":"2016","journal-title":"Vtech Porn Blunder Leaves NSFW Content Easily Accessible on Children&#x2019;s Tablet"},{"key":"ref23","article-title":"Every step you fake: A comparative analysis of fitness tracker privacy and security","author":"hilts","year":"2016"},{"key":"ref26","article-title":"The seven properties of highly secure devices","author":"hunt","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48674-1_20"},{"key":"ref50","author":"ristic","year":"2013","journal-title":"Bulletproof SSL and TLS Understanding and Deploying SSL\/TLS and PKI to Secure Servers and Web Applications"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref59","author":"federal trade commission","year":"2018","journal-title":"Electronic Toy Maker VTech Settles FTC Allegations That It Violated Children&#x2019;s Privacy Law and the FTC Act"},{"key":"ref58","author":"federal trade commission","year":"2015","journal-title":"Internet of Things Privacy & Security in a Connected World"},{"key":"ref57","author":"federal trade commission","year":"2018","journal-title":"Complying With COPPA Frequently Asked Questions"},{"key":"ref56","year":"2017","journal-title":"U S Federal Bureau of Investigation Public Service Announcement"},{"key":"ref55","article-title":"Encounters with Kismet and Cog: Children respond to relational artifacts","volume":"120","author":"turkle","year":"2006","journal-title":"Digital Media Transformations in Human Communication"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2016.2527078"},{"key":"ref53","year":"2016","journal-title":"Hello Barbie initial security analysis"},{"key":"ref52","first-page":"1814","article-title":"The PII problem: Privacy and a new concept of personally identifiable information","volume":"86","author":"schwartz","year":"2011","journal-title":"New York Univ Law Rev"},{"key":"ref10","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council Article 8 Conditions Applicable to Child&#x2019;s Consent in Relation to Information Society Services"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"ref40","author":"newman","year":"2005","journal-title":"Identity Theft Literature Review"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/3202185.3202741","article-title":"How smart are the smart toys? Children and parents&#x2019; agent interaction and intelligence attribution","author":"druga","year":"2018","journal-title":"Proc 17th ACM Conf Interact Design Child"},{"key":"ref13","year":"2018","journal-title":"Part 312&#x2014;Children&#x2019;s"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62072-5_3"},{"key":"ref15","first-page":"1205","article-title":"Protecting privacy of BLE device users","author":"fawaz","year":"2016","journal-title":"Proc Usenix Security Symp"},{"key":"ref16","year":"2016","journal-title":"Investigation of privacy and security issues with smart toys"},{"key":"ref17","author":"franceschi-bicchierai","year":"2016","journal-title":"A GPs Tracker for Kids Had a Bug That Would Let Hackers Stalk Them"},{"key":"ref18","year":"2018","journal-title":"AdvertisingIdClient&#x2014;Google APIs for Android"},{"key":"ref19","year":"2018","journal-title":"Types of Cookies Used by Google"},{"key":"ref4","year":"2017","journal-title":"German parents told to destroy Cayla dolls over hacking fears"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/07363769910297579"},{"key":"ref6","year":"2018","journal-title":"Security Bluetooth Low Energy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"ref8","author":"cloherty","year":"2017","journal-title":"Hackable Holidays Dangers of Toys That Spy on Kids"},{"key":"ref7","article-title":"Security and privacy analyses of Internet of Things children&#x2019;s toys","author":"chu","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1515\/popets-2018-0021","article-title":"Examining COPPA compliance at scale","author":"reyes","year":"2018","journal-title":"Proc Privacy Enhancing Technol"},{"key":"ref9","year":"2018","journal-title":"Eu general data protection regulation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.146"},{"key":"ref45","first-page":"85","article-title":"Regulating the Internet of Things: First steps toward managing discrimination, privacy, security and consent","volume":"93","author":"peppet","year":"2014","journal-title":"Texas Law Rev"},{"key":"ref48","year":"2016","journal-title":"R7-2015-27 and R7-2015-24 Fisher-Price Smart Toyfffdfffd hereO GPS Platform Vulnerabilities (FIXED)"},{"key":"ref47","year":"2015","journal-title":"Hacking iot A case study on baby monitor exposures and vulnerabilities"},{"key":"ref42","year":"2017","journal-title":"#WatchOut Analysis of Smartwatches for Children"},{"key":"ref41","year":"2018","journal-title":"OS Version Stats for iOS and Android 2017"},{"key":"ref44","year":"2015","journal-title":"VTech Innotab Max Vulnerable to Trivial Data Extraction"},{"key":"ref43","year":"2018","journal-title":"PIPEDA Report of Findings #2018-001 Connected Toy Manufacturer Improves Safeguards to Adequately Protect children&#x2019;s Information"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8709863\/08502818.pdf?arnumber=8502818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:49:31Z","timestamp":1657745371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502818\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":71,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2877749","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}