{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:00:15Z","timestamp":1776128415494,"version":"3.50.1"},"reference-count":74,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:p>The Internet of Things (IoT) is increasingly present in many family homes, yet it is unclear precisely how well families understand the cyber security threats and risks of using such devices, and how possible it is for them to educate themselves on these topics. Using a survey of 553 parents and interviews with 25 families in the UK, we find that families do not consider home IoT devices to be significantly different in terms of threats than more traditional home computers, and believe the major risks to be largely mitigated through consumer protection regulation. As a result, parents focus on teaching being careful with devices to prolong device life use, exposing their families to additional security risks and modeling incorrect security behaviors to their children. This is a risk for the present and also one for the future, as children are not taught about the IoT, and appropriate cyber security management of such devices, at school. We go on to suggest that steps must be taken by manufacturers and governments or appropriate trusted institutions to improve the cyber security knowledge and behaviors of both adults and children in relation to the use of home IoT devices.<\/jats:p>","DOI":"10.1145\/3555159","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T22:59:06Z","timestamp":1668207546000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["\"You Just Assume It Is In There, I Guess\": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security"],"prefix":"10.1145","volume":"6","author":[{"given":"Sarah","family":"Turner","sequence":"first","affiliation":[{"name":"University of Kent, Canterbury, United Kingdom"}]},{"given":"Nandita","family":"Pattnaik","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, United Kingdom"}]},{"given":"Jason R.C.","family":"Nurse","sequence":"additional","affiliation":[{"name":"University of Kent, Cantebury, United Kingdom"}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Noah Apthorpe Pardis Emami-Naeini Arunesh Mathur Marshini Chetty and Nick Feamster. 2020. You Me and IoT: How Internet-Connected Consumer Devices Affect Interpersonal Relationships. arXiv:2001.10608v2 [cs.HC]  Noah Apthorpe Pardis Emami-Naeini Arunesh Mathur Marshini Chetty and Nick Feamster. 2020. You Me and IoT: How Internet-Connected Consumer Devices Affect Interpersonal Relationships. arXiv:2001.10608v2 [cs.HC]","DOI":"10.1145\/3311957.3359489"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 2015 International Conference on Cyber Security for Sustainable Society. Sustainable Society Network, 118--131","author":"Bada Maria","unstructured":"Maria Bada , Angela Sasse , and Jason R.C. Nurse . 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? . In Proceedings of the 2015 International Conference on Cyber Security for Sustainable Society. Sustainable Society Network, 118--131 . Maria Bada, Angela Sasse, and Jason R.C. Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?. In Proceedings of the 2015 International Conference on Cyber Security for Sustainable Society. Sustainable Society Network, 118--131."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd , Ruba Abu-Salma , and Alisa Frik . 2020 . Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance . In Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance. In Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819928"},{"key":"e_1_2_1_6_1","volume-title":"Parenting for a Digital Future: How Hopes and Fears about Technology Shape Children's Lives","author":"Blum-Ross Alicia","unstructured":"Alicia Blum-Ross and Sonia Livingstone . 2020. Parenting for a Digital Future: How Hopes and Fears about Technology Shape Children's Lives . Oxford University Press . Alicia Blum-Ross and Sonia Livingstone. 2020. Parenting for a Digital Future: How Hopes and Fears about Technology Shape Children's Lives. Oxford University Press."},{"key":"e_1_2_1_7_1","first-page":"97","article-title":"A systematic review of crime facilitated by the consumer Internet of Things","volume":"2019","author":"Blythe John","year":"2019","unstructured":"John Blythe and Shane Johnson . 2019 . A systematic review of crime facilitated by the consumer Internet of Things . Security Journal 2019 (2019), 97 -- 125 . https:\/\/doi.org\/10.1057\/s41284-019-00211--8 10.1057\/s41284-019-00211--8 John Blythe and Shane Johnson. 2019. A systematic review of crime facilitated by the consumer Internet of Things. Security Journal 2019 (2019), 97--125. https:\/\/doi.org\/10.1057\/s41284-019-00211--8","journal-title":"Security Journal"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_9_1","unstructured":"Miles Brignall. 2020. Bank fraud: couple lose \u00a343 000 but can't get a refund. News report The Guardian. https:\/\/www.theguardian.com\/money\/2020\/feb\/08\/bank-couple-lose-43000-but-cant-get-a-refund  Miles Brignall. 2020. Bank fraud: couple lose \u00a343 000 but can't get a refund. News report The Guardian. https:\/\/www.theguardian.com\/money\/2020\/feb\/08\/bank-couple-lose-43000-but-cant-get-a-refund"},{"key":"e_1_2_1_10_1","volume-title":"Article e0231615","author":"Cannizzaro Sara","year":"2020","unstructured":"Sara Cannizzaro , Rob Procter , Sinong Ma , and Carsten Maple . 2020. Trust in the smart home: Findings from a nationally representative survey in the UK. PLOS ONE 15, 5 , Article e0231615 ( 2020 ). https:\/\/doi.org\/10.1371\/journal.pone.0231615 10.1371\/journal.pone.0231615 Sara Cannizzaro, Rob Procter, Sinong Ma, and Carsten Maple. 2020. Trust in the smart home: Findings from a nationally representative survey in the UK. PLOS ONE 15, 5, Article e0231615 (2020). https:\/\/doi.org\/10.1371\/journal.pone.0231615"},{"key":"e_1_2_1_11_1","volume-title":"A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products","author":"Chalhoub George","unstructured":"George Chalhoub , Martin J Kraemer , Norbert Nthala , and Ivan Flechais . 2021. \" It Did Not Give Me an Option to Decline\" : A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products . Association for Computing Machinery , New York, NY, USA . https:\/\/doi.org\/10.1145\/3411764.3445691 10.1145\/3411764.3445691 George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. \"It Did Not Give Me an Option to Decline\": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3411764.3445691"},{"key":"e_1_2_1_12_1","unstructured":"Joseph Cox and Samantha Cole. 2019. How Hackers Are Breaking Into Ring Cameras. News report Vice. https:\/\/www.vice.com\/en\/article\/3a88k5\/how-hackers-are-breaking-into-ring-cameras  Joseph Cox and Samantha Cole. 2019. How Hackers Are Breaking Into Ring Cameras. News report Vice. https:\/\/www.vice.com\/en\/article\/3a88k5\/how-hackers-are-breaking-into-ring-cameras"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235841"},{"key":"e_1_2_1_14_1","volume-title":"UK Government.","author":"Department for Digital, Culture","year":"2018","unstructured":"Department for Digital, Culture , Media and Sport , UK Government. 2018 . Code of Practice for Consumer IoT Security. Governmental report. https:\/\/www.gov.uk\/government\/publications\/code-of-practice-for-consumer-iot-security Department for Digital, Culture, Media and Sport, UK Government. 2018. Code of Practice for Consumer IoT Security. Governmental report. https:\/\/www.gov.uk\/government\/publications\/code-of-practice-for-consumer-iot-security"},{"key":"e_1_2_1_15_1","volume-title":"UK Government.","author":"Department for Digital, Culture","year":"2020","unstructured":"Department for Digital, Culture , Media and Sport , UK Government. 2020 . Consultation on regulatory proposals on consumer IoT security. Public consultation document. https:\/\/www.gov.uk\/government\/consultations\/consultation-on-regulatory-proposals-on-consumer-iot-security Department for Digital, Culture, Media and Sport, UK Government. 2020. Consultation on regulatory proposals on consumer IoT security. Public consultation document. https:\/\/www.gov.uk\/government\/consultations\/consultation-on-regulatory-proposals-on-consumer-iot-security"},{"key":"e_1_2_1_16_1","unstructured":"Department for Education. 2013. National curriculum in England: computing programmes of study. Web page. https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study  Department for Education. 2013. National curriculum in England: computing programmes of study. Web page. https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study"},{"key":"e_1_2_1_17_1","volume-title":"The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent","author":"Ehrenberg Nils","unstructured":"Nils Ehrenberg and Turkka Keinonen . 2021. The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent . Association for Computing Machinery , New York, NY, USA . https:\/\/doi.org\/10.1145\/3411764.3445058 10.1145\/3411764.3445058 Nils Ehrenberg and Turkka Keinonen. 2021. The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3411764.3445058"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445599"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_2_1_20_1","unstructured":"ETSI. 2020. CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements. European Standard REN\/CYBER-0048. https:\/\/www.etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/02.01.01_60\/en_303645v020101p.pdf  ETSI. 2020. CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements. European Standard REN\/CYBER-0048. https:\/\/www.etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/02.01.01_60\/en_303645v020101p.pdf"},{"key":"e_1_2_1_21_1","unstructured":"Financial Ombudsman. 2021. Fraud and scams. Web page. https:\/\/www.financial-ombudsman.org.uk\/consumers\/complaints-can-help\/fraud-scams  Financial Ombudsman. 2021. Fraud and scams. Web page. https:\/\/www.financial-ombudsman.org.uk\/consumers\/complaints-can-help\/fraud-scams"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security. USENIX Association, 97--111","author":"Forget Alain","year":"2016","unstructured":"Alain Forget , Sarah Pearman , Jeremy Thomas , Alessandro Acquisti , Nicolas Christin , Lorrie Faith Cranor , Serge Egelman , Marian Harbach , and Rahul Telang . 2016 . Do or Do Not, There is No Try: User Engagement May Not Improve Security Outcomes . In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security. USENIX Association, 97--111 . Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or Do Not, There is No Try: User Engagement May Not Improve Security Outcomes. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security. USENIX Association, 97--111."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359165"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 30th USENIX Security Symposium. USENIX Association, 22 pages. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney","author":"Haney Julie","year":"2021","unstructured":"Julie Haney , Yasemin Acar , and Susanne Furman . 2021 . \" It's the Company, the Government, You and I\": User Perceptions of Responsibility for Smart Home Privacy and Security . In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 22 pages. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney Julie Haney, Yasemin Acar, and Susanne Furman. 2021. \"It's the Company, the Government, You and I\": User Perceptions of Responsibility for Smart Home Privacy and Security. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 22 pages. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney"},{"key":"e_1_2_1_26_1","unstructured":"Roger Harrabin. 2021. \"Right to repair' law to come in this summer. News report BBC News. https:\/\/www.bbc.co.uk\/news\/business-56340077  Roger Harrabin. 2021. \"Right to repair' law to come in this summer. News report BBC News. https:\/\/www.bbc.co.uk\/news\/business-56340077"},{"key":"e_1_2_1_27_1","unstructured":"Alex Hern. 2021. TechScape: How the UK forced global shift in child safety policies. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2021\/aug\/18\/uk-governments-child-safety-regulation-leads-to-global-policy-shifts  Alex Hern. 2021. TechScape: How the UK forced global shift in child safety policies. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2021\/aug\/18\/uk-governments-child-safety-regulation-leads-to-global-policy-shifts"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1376--1389","author":"Hiniker Alexis","year":"1804","unstructured":"Alexis Hiniker , Sarita Y. Schoenebeck , and Julie A. Kientz . 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules . In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1376--1389 . https:\/\/doi.org\/10.1145\/28 1804 8.2819940 10.1145\/2818048.2819940 Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1376--1389. https:\/\/doi.org\/10.1145\/2818048.2819940"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102418"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_2_1_32_1","unstructured":"Information Commissioner's Office. 2020. Introduction to the Age appropriate design code. Web page. https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/ico-codes-of-practice\/age-appropriate-design-code\/  Information Commissioner's Office. 2020. Introduction to the Age appropriate design code. Web page. https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/ico-codes-of-practice\/age-appropriate-design-code\/"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312786"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804283"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363384.3363389"},{"key":"e_1_2_1_36_1","volume-title":"Nurse","author":"Kritzinger Elmarie","year":"2017","unstructured":"Elmarie Kritzinger , Maria Bada , and Jason R.C . Nurse . 2017 . A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. In Information Security Education for a Global Digital Society. Springer , 110--120. Elmarie Kritzinger, Maria Bada, and Jason R.C. Nurse. 2017. A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. In Information Security Education for a Global Digital Society. Springer, 110--120."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_2_1_38_1","volume-title":"Benjamin Andow, Martin Degeling, Anupam Das, and William Enck.","author":"Lentzsch Christopher","year":"2021","unstructured":"Christopher Lentzsch , Sheel Jayesh Shah , Benjamin Andow, Martin Degeling, Anupam Das, and William Enck. 2021 . Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. In Proceedings of the 28th ISOC Annual Network and Distributed Systems Symposium. Internet Society , 18 pages. https:\/\/www.ndss-symposium.org\/ndss-paper\/hey-alexa-is-this-skill-safe-taking-a-closer-look-at-the-alexa-skill-ecosystem\/ Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, and William Enck. 2021. Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. In Proceedings of the 28th ISOC Annual Network and Distributed Systems Symposium. Internet Society, 18 pages. https:\/\/www.ndss-symposium.org\/ndss-paper\/hey-alexa-is-this-skill-safe-taking-a-closer-look-at-the-alexa-skill-ecosystem\/"},{"key":"e_1_2_1_39_1","first-page":"22","article-title":"Internet of Things': How abuse is getting smarter","volume":"63","author":"Lopez-Neira Isabel","year":"2019","unstructured":"Isabel Lopez-Neira , Trupti Patel , Simon Parkin , George Danezis , and Leonie Tanczer . 2019 . \" Internet of Things': How abuse is getting smarter . Safe - The Domestic Abuse Quarterly 63 (2019), 22 -- 26 . Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, and Leonie Tanczer. 2019. \"Internet of Things': How abuse is getting smarter. Safe - The Domestic Abuse Quarterly 63 (2019), 22--26.","journal-title":"Safe - The Domestic Abuse Quarterly"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.00424"},{"key":"e_1_2_1_43_1","unstructured":"National Cyber Security Centre UK. 2019. Smart devices: using them safely in your home. https:\/\/www.ncsc.gov.uk\/guidance\/smart-devices-in-the-home  National Cyber Security Centre UK. 2019. Smart devices: using them safely in your home. https:\/\/www.ncsc.gov.uk\/guidance\/smart-devices-in-the-home"},{"key":"e_1_2_1_44_1","first-page":"1","article-title":"Guiding young children's internet use at home: Problems that parents experience in their parental mediation and the need for parenting support. Cyberpsychology","volume":"9","author":"Nikken Peter","year":"2015","unstructured":"Peter Nikken and Jos de Haan . 2015 . Guiding young children's internet use at home: Problems that parents experience in their parental mediation and the need for parenting support. Cyberpsychology : Journal of Psychosocial Research on Cyberspace 9 , 1 (2015), 1 . https:\/\/doi.org\/10.5817\/CP2015--1--3 10.5817\/CP2015--1--3 Peter Nikken and Jos de Haan. 2015. Guiding young children's internet use at home: Problems that parents experience in their parental mediation and the need for parenting support. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 9, 1 (2015), 1. https:\/\/doi.org\/10.5817\/CP2015--1--3","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_2_1_45_1","unstructured":"Poppy Noor. 2019. Ring hackers are reportedly watching and talking to strangers via in-home cameras. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2019\/dec\/13\/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras  Poppy Noor. 2019. Ring hackers are reportedly watching and talking to strangers via in-home cameras. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2019\/dec\/13\/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"},{"key":"e_1_2_1_46_1","unstructured":"Office for National Statistics. 221. Population estimates for the UK England and Wales Scotland and Northern Ireland: mid-2020. Web page. https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/populationandmigration\/populationestimates\/bulletins\/annualmidyearpopulationestimates\/latest  Office for National Statistics. 221. Population estimates for the UK England and Wales Scotland and Northern Ireland: mid-2020. Web page. https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/populationandmigration\/populationestimates\/bulletins\/annualmidyearpopulationestimates\/latest"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415228"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the Workshop on Usable Security and Privacy. https:\/\/www.ndss-symposium.org\/ndss-paper\/auto-draft-19\/","author":"Parkin S.","unstructured":"S. Parkin , E.M. Redmiles , L. Coventry , and M.A. Sasse . 2019. Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change . In Proceedings of the Workshop on Usable Security and Privacy. https:\/\/www.ndss-symposium.org\/ndss-paper\/auto-draft-19\/ S. Parkin, E.M. Redmiles, L. Coventry, and M.A. Sasse. 2019. Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change. In Proceedings of the Workshop on Usable Security and Privacy. https:\/\/www.ndss-symposium.org\/ndss-paper\/auto-draft-19\/"},{"key":"e_1_2_1_49_1","unstructured":"Kari Paul. 2019. Ring sued by man who claims camera was hacked and used to harass his kids. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2019\/dec\/27\/ring-camera-lawsuit-hackers-alabama  Kari Paul. 2019. Ring sued by man who claims camera was hacked and used to harass his kids. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2019\/dec\/27\/ring-camera-lawsuit-hackers-alabama"},{"key":"e_1_2_1_50_1","unstructured":"Kari Paul. 2020. Dozens sue Amazon's Ring after camera hack leads to threats and racial slurs. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats  Kari Paul. 2020. Dozens sue Amazon's Ring after camera hack leads to threats and racial slurs. News report The Guardian. https:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats"},{"key":"e_1_2_1_51_1","volume-title":"S.C.A.","author":"PayPal","year":"2021","unstructured":"PayPal (Europe) S.\u00e0 r.l. et Cie , S.C.A. 2021 . Send Money, Pay Online or Set Up a Merchant Account - PayPal. Web page. https:\/\/www.paypal.com\/uk\/home PayPal (Europe) S.\u00e0 r.l. et Cie, S.C.A. 2021. Send Money, Pay Online or Set Up a Merchant Account - PayPal. Web page. https:\/\/www.paypal.com\/uk\/home"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2969409"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.006"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718984"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813516833"},{"key":"e_1_2_1_57_1","unstructured":"David Smahel Hana Machackova Giovanna Mascheroni Lenka Dedkova Elisabeth Staksrud Kjartan \u00d3lafsson Sonia Livingstone and Uwe Hasebrink. 2020. EU Kids Online 2020: Survey results from 19 countries. http:\/\/www.lse.ac.uk\/media-and-communications\/assets\/documents\/research\/eu-kids-online\/reports\/EU-Kids-Online-2020--10Feb2020.pdf  David Smahel Hana Machackova Giovanna Mascheroni Lenka Dedkova Elisabeth Staksrud Kjartan \u00d3lafsson Sonia Livingstone and Uwe Hasebrink. 2020. EU Kids Online 2020: Survey results from 19 countries. http:\/\/www.lse.ac.uk\/media-and-communications\/assets\/documents\/research\/eu-kids-online\/reports\/EU-Kids-Online-2020--10Feb2020.pdf"},{"key":"e_1_2_1_58_1","unstructured":"Jitendra Soni. 2020. Avast reportedly sold user web browsing data. News report TechRadar. https:\/\/www.techradar.com\/news\/avast-reportedly-sold-user-web-browsing-data  Jitendra Soni. 2020. Avast reportedly sold user web browsing data. News report TechRadar. https:\/\/www.techradar.com\/news\/avast-reportedly-sold-user-web-browsing-data"},{"key":"e_1_2_1_59_1","unstructured":"Nick Statt. 2018. Amazon sent 1 700 Alexa voice recordings to the wrong user following data request. News report The Verge. https:\/\/www.theverge.com\/2018\/12\/20\/18150531\/amazon-alexa-voice-recordings-wrong-user-gdpr-privacy-ai  Nick Statt. 2018. Amazon sent 1 700 Alexa voice recordings to the wrong user following data request. News report The Verge. https:\/\/www.theverge.com\/2018\/12\/20\/18150531\/amazon-alexa-voice-recordings-wrong-user-gdpr-privacy-ai"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479858"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0033"},{"key":"e_1_2_1_62_1","volume-title":"The State of the Connected Home","author":"UK","year":"2021","unstructured":"tech UK and GfK. 2021. The State of the Connected Home 2021 . Industry Report . techUK. https:\/\/www.techuk.org\/resource\/the-state-of-the-connected-home-2021-new-report-launch.html techUK and GfK. 2021. The State of the Connected Home 2021. Industry Report. techUK. https:\/\/www.techuk.org\/resource\/the-state-of-the-connected-home-2021-new-report-launch.html"},{"key":"e_1_2_1_63_1","volume-title":"Human Aspects of Information Security and Assurance","author":"Turner Sarah","unstructured":"Sarah Turner , Jason R.C. Nurse , and Shujun Li. 2021. When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices . In Human Aspects of Information Security and Assurance , Steven Furnell and Nathan Clarke (Eds.). Springer International Publishing , Cham , 115--126. Sarah Turner, Jason R.C. Nurse, and Shujun Li. 2021. When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. In Human Aspects of Information Security and Assurance, Steven Furnell and Nathan Clarke (Eds.). Springer International Publishing, Cham, 115--126."},{"key":"e_1_2_1_64_1","unstructured":"UK Government. 2022. Product Security and Telecommunications Infrastructure Bill. https:\/\/bills.parliament.uk\/publications\/43895\/documents\/1050  UK Government. 2022. Product Security and Telecommunications Infrastructure Bill. https:\/\/bills.parliament.uk\/publications\/43895\/documents\/1050"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_2_1_66_1","unstructured":"Lisa Vass. 2020. Android pulls 24 \"dangerous' malware-filled apps from Play Store. News report Naked Security. https:\/\/nakedsecurity.sophos.com\/2020\/02\/06\/android-pulls-24-dangerous-malware-filled-apps-from-play-store\/  Lisa Vass. 2020. Android pulls 24 \"dangerous' malware-filled apps from Play Store. News report Naked Security. https:\/\/nakedsecurity.sophos.com\/2020\/02\/06\/android-pulls-24-dangerous-malware-filled-apps-from-play-store\/"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00029"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 523--540","author":"Wisniewski Pamela","unstructured":"Pamela Wisniewski , Heng Xu , Mary Beth Rosson , and John M. Carroll . 2017. Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences . In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 523--540 . https:\/\/doi.org\/10.1145\/2998181.2998236 10.1145\/2998181.2998236 Pamela Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 523--540. https:\/\/doi.org\/10.1145\/2998181.2998236"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376416"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300303"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555159","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:13Z","timestamp":1750182553000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":74,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1145\/3555159"],"URL":"https:\/\/doi.org\/10.1145\/3555159","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}