N. AbdiK. M. RamokapaneJ. M. Such 2019 More than smart speakers: Security and privacy perceptions of smart home personal assistants Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security 451 466
N. ApthorpeY. ShvartzshnaiderA. MathurD. ReismanN. Feamster 2018 Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2 2 59 1 59 23 https://doi.org/10.1145/3214262
M. BadaA. SasseJ. R. C. Nurse 2015 Cyber Security Awareness Campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society 118 131
A. BasaureA. VesselkovJ. Töyli 2020 Internet of things (IoT) platform competition: Consumer switching versus provider multihoming. Technovation, 90–91 102101 https://doi.org/10.1016/j.technovation.2019.102101
J. M. BlytheN. SombatruangS. D. Johnson 2019 What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? Journal of Cybersecurity 5 1 https://doi.org/10.1093/cybsec/tyz005
R. ChatterjeeP. DoerflerH. OrgadS. HavronJ. PalmerD. FreedK. LevyN. DellD. McCoyT. Ristenpart 2018 The Spyware Used in Intimate Partner Violence 2018 IEEE Symposium on Security and Privacy (SP) 441 458 https://doi.org/10.1109/SP.2018.00061
L. F. CranorA. L. DurityA. MarshB. Ur 2014 Parents’ and teens’ perspectives on privacy in a technology-filled world Proceedings of the Tenth USENIX Conference on Usable Privacy and Security 19 35
Department for Digital, Culture, Media and Sport 2018 Code of Practice for Consumer IoT Security 24
Department for Digital, Culture, Media and Sport 2020 July 16 Proposals for regulating consumer smart product cyber security—Call for views GOV.UK
P. Emami-NaeiniH. DixonY. AgarwalL. F. Cranor 2019 Exploring How Privacy and Security Factor into IoT Device Purchase Behavior Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3290605.3300764
C. GaritaonandiaI. KarreraN. Larranaga 2019 Media convergence, risk and harm to children online Doxa Comunicacion 28 179 199 https://doi.org/10.31921/doxacom.n28a10
C. GeengF. Roesner 2019 Who’s In Control? Interactions In Multi-User Smart Homes Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 13 https://doi.org/10.1145/3290605.3300498
A. K. GhoshK. Badillo-UrquiolaS. GuhaJ. J. LaViola JrP. J. Wisniewski 2018 Safety vs. Surveillance: What children have to say about mobile apps for parental control Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems https://doi.org/10.1145/3173574.3173698
Information Commissioner’s Office. (n.d.). Age appropriate design: A code of practice for online services Retrieved 22 July 2020 from https://ico.org.uk/for-organisations/guide-to-data-protection/key-data-protection-themes/age-appropriate-design-a-code-of-practice-for-online-services/
W. JangA. ChhabraA. Prasad 2017 Enabling multi-user controls in smart home devices Proceedings of the 2017 Workshop on Internet of Things Security and Privacy 49 54 https://doi.org/10.1145/3139937.3139941
G. Kemper 2019 IoT Technology and Smart Devices in the Home
S. LivingstoneK. ÓlafssonE. J. HelsperF. Lupiáñez-VillanuevaG. A. VeltriF. Folkvord 2017 Maximizing Opportunities and Minimizing Risks for Children Online: The Role of Digital Skills in Emerging Strategies of Parental Mediation: Maximizing Opportunities and Minimizing Risks Journal of Communication 67 1 82 105 https://doi.org/10.1111/jcom.12277
K. MarkwickA. BickerdikeE. Wilson-EveredJ. Zeleznikow 2019 Technology and Family Violence in the Context of Post -Separated Parenting Australian and New Zealand Journal of Family Therapy 40 1 143 162 https://doi.org/10.1002/anzf.1350
T. MatthewsK. LiaoA. TurnerM. BerkovichR. ReederS. Consolvo 2016 ‘She’ll just grab any device that’s closer’: A Study of Everyday Device & Account Sharing in Households. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 5921 5932 https://doi.org/10.1145/2858036.2858051
E. McReynoldsS. HubbardT. LauA. SarafM. CakmakF. Roesner 2017 Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 5197 5207 https://doi.org/10.1145/3025453.3025735
C. MoserS. Y. SchoenebeckK. Reinecke 2016 Technology at the Table: Attitudes about Mobile Phone Use at Mealtimes Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 1881 1892 https://doi.org/10.1145/2858036.2858357
K. MuirA. Joinson 2020 An Exploratory Study Into the Negotiation of Cyber-Security Within the Family Home Frontiers in Psychology 11 424 https://doi.org/10.3389/fpsyg.2020.00424
National Cyber Security Centre 2019 Smart devices: Using them safely in your home
Y. StrengersJ. KennedyP. ArcariL. NichollsM. Gregg 2019 Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early Adopters Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 13 https://doi.org/10.1145/3290605.3300875
M. TabassumJ. KropczynskiP. WisniewskiH. R. Lipford 2020 Smart home beyond the home: A case for community-based access control Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3313831.3376255
L. M. TanczerI. SteenmansM. ElsdenJ. BlackstockM. Carr 2018 Emerging risks in the IoT ecosystem: Who’s afraid of the big bad smart fridge? Living in the Internet of Things: Cybersecurity of the IoT - 2018 1 9 https://doi.org/10.1049/cp.2018.0033
P. TolmieA. CrabtreeT. RoddenJ. ColleyE. Luger 2016 “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing 491 502 https://doi.org/10.1145/2818048.2819992
B. UrJ. JungS. Schechter 2014 Intruders versus intrusiveness: Teens’ and parents’ perspectives on home-entryway surveillance Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing 129 139 https://doi.org/10.1145/2632048.2632107
H. WatsonE. Moju-IgbeneA. KumariS. Das 2020 “We hold each other accountable”: Unpacking how social groups approach cybersecurity and privacy together. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3313831.3376605
M. WilliamsJ. R. C. NurseS. Creese 2017 Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things 2017 15th Annual Conference on Privacy, Security and Trust (PST) 181 18109 https://doi.org/10.1109/PST.2017.00029
M. WilliamsJ. R. C. NurseS. Creese 2016 The Perfect Storm: The Privacy Paradox and the Internet-of-Things 2016 11th International Conference on Availability, Reliability and Security (ARES) 644 652 https://doi.org/10.1109/ARES.2016.25
P. WisniewskiH. XuM. B. RossonJ. M. Carroll 2017 Parents Just Don’t Understand: Why Teens Don’t Talk to Parents about Their Online Risk Experiences Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW ’17 523 540 https://doi.org/10.1145/2998181.2998236
E. ZengS. MareF. Roesner 2017 End user security and privacy concerns with smart homes Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) 65 80
L. Zhang-KennedyC. MekhailY. AbdelazizS. Chiasson 2016 From Nosy Little Brothers to Stranger-Danger: Children and Parents’ Perception of Mobile Threats Proceedings of the the 15th International Conference on Interaction Design and Children 388 399 https://doi.org/10.1145/2930674.2930716
J. ZhaoG. WangC. DallyP. SlovakJ. Edbrooke-ChildsM. Van KleekN. Shadbolt 2019 `I make up a silly name’: Understanding Children’s Perception of Privacy Risks Online Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–13 https://doi.org/10.1145/3290605.3300336