{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:15:53Z","timestamp":1730297753822,"version":"3.28.0"},"reference-count":107,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/sp40000.2020.00043","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T20:48:34Z","timestamp":1596142114000},"page":"447-464","source":"Crossref","is-referenced-by-count":100,"title":["Ask the Experts: What Should Be on an IoT Privacy and Security Label?"],"prefix":"10.1109","author":[{"given":"Pardis","family":"Emami-Naeini","sequence":"first","affiliation":[]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Lorrie","family":"Faith Cranor","sequence":"additional","affiliation":[]},{"given":"Hanan","family":"Hibshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","article-title":"ENISA Good practices for IoT and Smart Infrastructures Tool","key":"ref39"},{"year":"2017","article-title":"Proposal for a regulation of the European Parliament and of the Council on ENISA, the “EU cybersecurity agency”, and repealing regulation (EU) 526\/2013, and on information and communication technology cybersecurity certification (\"Cybersecurity Act\")","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1093\/eurpub\/ckr144"},{"year":"2019","article-title":"Plans announced to introduce new laws for internet connected devices","key":"ref32"},{"year":"2019","article-title":"Mandating security requirements for consumer IoT products","key":"ref31"},{"year":"2018","article-title":"Secure by design: Improving the cyber security of consumer internet of things report","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/3290605.3300764"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/1518701.1518752"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1111\/j.1467-6435.2009.00448.x"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1093\/erae\/jbi003"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1080\/0361697900140207"},{"key":"ref27","first-page":"272","article-title":"The Delphi technique: A case study","volume":"52","author":"cyphert","year":"1971","journal-title":"Phi Delta Kappan"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1287\/mnsc.9.3.458"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3313831.3376389"},{"year":"0","article-title":"The standard","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1093\/reep\/rex022"},{"key":"ref24","first-page":"17","article-title":"A large-scale evaluation of us financial institutions’ standardized privacy notices","volume":"10","author":"cranor","year":"2016","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"ref23","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","volume":"10","author":"cranor","year":"2012","journal-title":"J on Telecomm & High Tech L"},{"year":"2019","article-title":"Strengthening the cybersecurity of the internet of things","key":"ref101"},{"year":"0","article-title":"How we evaluate","key":"ref26"},{"year":"0","article-title":"Verify","key":"ref100"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1038\/sj.ejcn.1602231"},{"year":"2017","article-title":"Energy efficiency","key":"ref50"},{"year":"2018","article-title":"IoT security compliance framework","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/WF-IoT.2016.7845392"},{"year":"2018","author":"lee","article-title":"Amazon Alexa heard and sent private chat","key":"ref58"},{"year":"0","article-title":"Green building leadership is leed","key":"ref57"},{"year":"2018","author":"lara","article-title":"What the internet of things means for consumer privacy","key":"ref56"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1111\/j.1461-0248.2010.01477.x"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1186\/1476-069X-9-19"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1080\/10408398.2011.653018"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1145\/1753326.1753561"},{"year":"2017","article-title":"Comment to national telecommunications and information administration","key":"ref40"},{"key":"ref4","first-page":"1093","article-title":"Understanding the Mirai botnet","author":"antonakakis","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SP.2019.00013"},{"year":"1976","author":"atherton","article-title":"Group techniques for program planning: A guide to nominal group and Delphi processes","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref8","first-page":"279","article-title":"Is notice enough: Mitigating the risks of smartphone data sharing","volume":"11","author":"balebako","year":"2015","journal-title":"ISJLP"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1111\/j.1745-6606.2011.01219.x"},{"key":"ref7","article-title":"Estimating survey fatigue in time use study","author":"backor","year":"2007","journal-title":"International Association of Time Use Research Conference"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2501604.2501616"},{"year":"2019","article-title":"Consumer internet of things security labelling survey research findings","key":"ref46"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref48","first-page":"147","article-title":"A grounded analysis of experts’ decision-making during security assessments","volume":"2","author":"hibshi","year":"2016","journal-title":"Cybersecurity"},{"year":"2018","author":"hibshi","article-title":"Composite Security Requirements in the Presence of Uncertainty","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.4135\/9781412986182.n15"},{"year":"2013","author":"fleiss","article-title":"Statistical methods for rates and proportions","key":"ref41"},{"year":"0","article-title":"IoT Security Assessment","key":"ref44"},{"year":"2018","article-title":"Internet of things endpoint spending worldwide by category from 2014 to 2020 (in billion U.S. dollars)","key":"ref43"},{"key":"ref73","first-page":"399","article-title":"Privacy expectations and preferences in an IoT world","author":"naeini","year":"2017","journal-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1353\/rhe.1995.0008"},{"year":"2018","article-title":"Shop safe this holiday season","key":"ref71"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1016\/j.appet.2012.04.009"},{"year":"2019","author":"ng","article-title":"Google calls Nest’s hidden microphone an “error","key":"ref76"},{"year":"2019","author":"nielsen","article-title":"Should connected devices carry an IoT security-star rating?","key":"ref77"},{"year":"2017","article-title":"Communicating IoT device security update capability to improve transparency for consumers","key":"ref74"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1111\/j.1745-6606.2000.tb00086.x"},{"year":"0","article-title":"Energy star","key":"ref78"},{"year":"2018","article-title":"Purchase intentions for smart home devices increased by 66% year over year","key":"ref79"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/PERCOM.2017.7917874"},{"year":"2017","author":"lieu","article-title":"H.R.4163: Cyber Shield Act of 2017","key":"ref62"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1145\/2501604.2501611"},{"key":"ref63","first-page":"1","article-title":"Predicting the future: Have you considered using the Delphi methodology","volume":"35","author":"ludwig","year":"1997","journal-title":"Journal of Extension"},{"key":"ref64","first-page":"119","article-title":"Team-based codebook development: Structure, process, and agreement","author":"macqueen","year":"2008","journal-title":"Handbook for Team-Based Qualitative Research"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1348\/000712600161646"},{"year":"2017","author":"markey","article-title":"S.2020: Cyber shield act of 2017","key":"ref66"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.4135\/9781849209793"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1145\/3359174"},{"year":"1996","author":"adler","article-title":"Gazing into the oracle: The Delphi method and its application to social policy and public health","key":"ref2"},{"key":"ref69","first-page":"7","article-title":"The use of the Delphi method to determine the benefits of the personas method-an approach to systems design","author":"miaskiewicz","year":"2006","journal-title":"SIGHCI 2006 Proceedings"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1126\/science.aaa1465"},{"year":"2013","author":"taylor","article-title":"It may have been terrifyingly easy for a stranger to hack into a baby monitor and curse at a 2-year-old","key":"ref95"},{"year":"2018","author":"tanczer","article-title":"Gender and IoT research report","key":"ref94"},{"year":"0","article-title":"Evaluating and scoring smart-home devices to improve security!","key":"ref107"},{"key":"ref93","article-title":"Summary literature review of industry recommendations and international developments on IoT security","author":"tanczer","year":"2018","journal-title":"PETRAS IoT Hub Department for Digital Culture Media & Sport (DCMS)"},{"doi-asserted-by":"publisher","key":"ref106","DOI":"10.1509\/jppm.15.020"},{"key":"ref92","first-page":"159","article-title":"Brain food: bringing psychological insights to bear on modern nutrition labeling efforts","volume":"65","author":"szanyi","year":"2010","journal-title":"Food & Drug LJ"},{"year":"2002","article-title":"The platform for privacy preferences 1.0 (p3p1.0) specification","key":"ref105"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1002\/j.2162-6057.1975.tb00574.x"},{"doi-asserted-by":"publisher","key":"ref104","DOI":"10.1186\/1479-5868-7-65"},{"year":"2019","author":"statt","article-title":"Amazon’s Alexa isn’t just AI — thousands of humans are listening","key":"ref90"},{"doi-asserted-by":"publisher","key":"ref103","DOI":"10.3389\/fpsyg.2017.02110"},{"doi-asserted-by":"publisher","key":"ref102","DOI":"10.1016\/j.enpol.2013.06.110"},{"year":"0","article-title":"Methodology for marketing claim verification: Security capabilities verified to level bronze\/silver\/gold\/platinum\/diamond, UL MCV 1376","key":"ref98"},{"year":"0","article-title":"IoT security rating. empowering consumers through product security labeling","key":"ref99"},{"year":"2007","article-title":"Ten steps to develop a multilayered privacy notice","key":"ref96"},{"year":"2017","author":"thorun","article-title":"Indicators of consumer protection and empowerment in the digital world","key":"ref97"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1049\/cp.2018.0004"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1093\/cybsec\/tyz005"},{"key":"ref12","first-page":"195","article-title":"Exploring decision making with Android’s runtime permission dialogs using in-context surveys","author":"bonn\u00e9","year":"2017","journal-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)"},{"year":"2018","author":"bowles","article-title":"Thermostats, locks and lights: Digital tools of domestic abuse","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1191\/1478088706qp063oa"},{"year":"2017","author":"caltrider","article-title":"10 fascinating things we learned when we asked the world “how connected are you?","key":"ref15"},{"year":"2016","journal-title":"2016 CIGI-Ipsos global survey on internet security and trust","article-title":"Centre for International Governance Innovation & IPSOS","key":"ref16"},{"year":"2015","article-title":"The coding manual for qualitative researchers","key":"ref82"},{"year":"0","author":"chirgwin","article-title":"Australia’s IoT security rating might work, if done right","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1509\/jppm.19.1.27.16941"},{"year":"2017","article-title":"Building trust and value in the data exchange between people, things and providers","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1097\/NT.0b013e3181cb4561"},{"key":"ref19","first-page":"111","article-title":"The Delphi method: Formulating and refining group judgements","volume":"2","author":"cochran","year":"1983","journal-title":"Journal of Human Sciences"},{"key":"ref83","first-page":"1","article-title":"A design space for effective privacy notices","author":"schaub","year":"2015","journal-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)"},{"year":"2018","article-title":"Developing a consumer security index for consumer IoT devices (CSI)","key":"ref80"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1111\/j.1539-6924.2009.01337.x"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.4018\/978-1-4666-6539-2.ch074"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1109\/ECRIME.2009.5342608"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref88","first-page":"163","article-title":"Network-level security and privacy control for smarthome IoT devices","author":"sivaraman","year":"2015","journal-title":"Wireless and Mobile Computing Networking and Communications (WiMob) 2015 IEEE 11th International Conference on"}],"event":{"name":"2020 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2020,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2020,5,21]]}},"container-title":["2020 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9144328\/9152199\/09152770.pdf?arnumber=9152770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T11:17:19Z","timestamp":1656587839000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9152770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":107,"URL":"https:\/\/doi.org\/10.1109\/sp40000.2020.00043","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}