Markman, J. (2016). Massive IoT Hacks Should
Lead To Positive Change. 10 November
http://www.forbes.com/sites/jonmarkman/2016/11/10
/massive-iot-hacks-should-lead-to-positive-change/.
Matyszczyk, C. (2015). Samsung’s warning: Our
Smart TVs record your living room chatter.
http://www.cnet.com/uk/news/samsungs-warning-
our-smart-tvs-record-your-living-room-chatter/.
McCrickard, D. S. and Chewar, C. M. (2003). Attuning
notification design to user goals and attention costs.
Commun. ACM, 46(3):67–72.
Medaglia, C. M. and Serbanati, A. (2010). An overview of
privacy and security issues in the internet of things. In
The Internet of Things, pages 389–395. Springer.
Nextgov (2016). Who’S in change of regulating the Internet
of Things? 1 Sept http://www.nextgov.com/emerging-
tech/2016/09/internet-things-regulating-
charge/131208/.
Nikkei Asian Review (2016). Japan, Saudi Ara-
bia to cooperate on Internet of Things, re-
newables. http://asia.nikkei.com/Politics-
Economy/International-Relations/Japan-Saudi-
Arabia-to-cooperate-on-Internet -of-Things-
renewables.
Nordrum, A. (2016). Wanted: Smart Pub-
lic Policy for Internet of Things Security.
10 November http://spectrum.ieee.org/tech-
talk/telecom/security/wanted-smart-public-policy-
for-internet-of-things-security).
Pauli, D. (2016). IoT worm can hack Philips Hue
lightbulbs, spread across cities. 10 November
http://www.theregister.co.uk/2016/11/10/iot worm
can hack philips hue lightbulbs spread across cities/.
Preuveneers, D. and Berbers, Y. (2008). Internet of things:
A context-awareness perspective. The Internet of
Things: From RFID to the Next-Generation Pervasive
Networked Systems, pages 287–307.
Price, R. (2016). The government needs to step in and
save the internet from hacked toasters. 25 October
http://www.businessinsider.com/dyn-hack-calls-
grow-regulation-internet-of-things-security-mikko-
hypponen-f-secure-interview-2016-10.
Pultarova, T. (2016). Webcam hack shows vulner-
ability of connected devices. 11 November
https://eandt.theiet.org/content/articles/2016/11/web
cam-hack-shows-vulnerability-of-connected-
devices/.
Rao, L. (2011). Sexual Activity Tracked By Fitbit
Shows Up In Google Search Results. 3 July
https://techcrunch.com/2011/07/03/sexual-activity-
tracked-by-fitbit-shows-up-in-google-search-results/.
Roberts, J. J. (2016). Who to blame for the attack on the in-
ternet. http://fortune.com/2016/10/23/internet-attack-
perpetrator/.
Rouse, M. (2014). Internet of Things privacy (IoT privacy).
http://internetofthingsagenda.techtarget.com/definition
/Internet-of-Things-privacy-IoT-privacy.
rt.com (2016). Smart fridge browses porn in us store,
shows hot action while keeping its cool. 3
October https://www.rt.com/viral/361440-iot-fridge-
shows-porn/.
Sait, S., Al-Tawil, K., and Hussain, S. (2004). E-commerce
in Saudi Arabia: Adoption and perspectives. Aus-
tralasian Journal of Information Systems, 12(1).
Schneier, B. (2016). Regulation of
the Internet of Things. November
https://www.schneier.com/blog/archives/2016/11/
regulation of t.html.
Shirazi, A., Henze, N., Dingler, T., Pielot, M., Weber, D.,
and Schmidt, A. (2014). Large-scale assessment of
mobile notifications. In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems,
CHI ’14, pages 3055–3064. ACM.
Siegel, D. (2008). The need for a sense of control).
Singer, N. (2015). Sharing data, but not happily.
http://www.nytimes.com/2015/06/05/technology/
consumers-conflicted-over-data-mining-
policies-report-finds.html.
Sletteme
˚
as, D. (2009). RFID—the “Next Step” in
Consumer–Product Relations or Orwellian Night-
mare? Challenges for Research and Policy. Journal
of Consumer Policy, 32(3):219–244.
Solomon, H. (2016). Most makers of IoT devices still
dont explain how personal info is used: Report.
http://www.itworldcanada.com/article/most-makers-
of-iot-devices-still-dont-explain-how-personal-info-
is-used-report/386650.
Solove, D. J. (2008). Understanding privacy. Harvard Uni-
versity Press.
Spiekermann, S. and Berthold, O. (2005). Maintaining pri-
vacy in RFID enabled environments. In Privacy, Se-
curity and Trust within the Context of Pervasive Com-
puting, pages 137–146. Springer.
Turow, J., Hennessy, M., and Draper, N. A. (2015). The
tradeoff fallacy: How marketers are misrepresenting
american consumers and opening them up to exploita-
tion. Available at SSRN.
Warren, S. D. and Brandeis, L. D. (1890). The right to pri-
vacy. Harvard law review, pages 193–220.
Weber, R. H. (2010). Internet of things–new security and
privacy challenges. Computer Law & Security Review,
26(1):23–30.
Weinberger, M. (2016). This is how Microsoft is prevent-
ing hackers from hijacking IoT devices. 26 Octo-
ber http://www.businessinsider.com/microsoft-azure-
iot-security-program-2016-10.
Weinstein, M. (2015). What your FitBit doesn’t want you
to know.
Yu, E. (2016). Asia must adopt ‘data protec-
tion by design’ in IoT era. 10 November
http://www.businessinsider.com/microsoft-azure-
iot-security-program-2016-10.
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions
205