Journal of Advanced Research, 491-497.
ENISA, 2014a. Privacy and Data Protection by Design –
From policy to engineering. Retrieved from
www.enisa.europa.eu.
ENISA, 2017a. Principles and opportunities for a renewed
EU cyber security strategy. Retrieved from
www.enisa.europa.eu.
ENISA, 2017b. Cloud Computing Certification - CCSL and
CCSM. Retrieved from www.enisa.europa.eu.
Evans, D., 2011. The Internet of Things How the Next
Evolution of the Internet Is Changing Everything. San
Jose, CA, USA.
EY, (2015). Cybersecurity and the Internet of Things. US.
EYGM Limited. Retrieved from www.ey.com/Publica
tion/vwLUAssets/EY-cybersecurity-and-the-internet-of-
things/%24FILE/EY-cybersecurity-and-the-internet-of-
things.pdf.
Farhoud, N., 2015, How hackers could use your 'smart home'
devices to break into your home and spy on your kids.
Retrieved from http://www.mirror.co.uk/tech/smart-
home devices-could-criminals-10361249.
FTC, 2015a. Privacy & Security in a Connected World.
Retrieved from www.ftc.gov/system/files/documents/re
port/federal-trade-commission-staff-report-november
2013-workshop-entitled-internet-things privacy/15012
7iotrpt.pdf.
FTC, 2015b. Careful Connections: Building Security in the
Internet of Things. Retrieved from www.ftc.gov.
Grance, T. & Jansen, W., 2011. Guidelines on Security and
Privacy in Public Cloud Computing. Retrieved from
www.nist.gov.
Greverie, F., Buvat, J., Nambiar, R., Appell, D. & Bisht, A.,
2014. Securing the Internet of Things Opportunity:
Putting Cybersecurity at the Heart of the IoT. Capgemini
Consulting.
GSMA, 2017a. IoT Connection Efficiency Guidelines.
Retrieved from www.gsma.com/iot/gsma-iot-device
connection-efficiency-guidelines/.
GSMA, 2017b. Remote Provisioning Architecture for
Embedded UICC Test Specification. Retrieved from
www.gsma.com/newsroom/wp-content/uploads//SG
P.11-v3.3.pdf.
Hevner, A. R. & Chatterjee, S., 2010. Design Research in
Information Systems. New York (USA), 1. ed., Springer
Science and Business Media LLC.
ISACA, 2016a. IoT Needs Better Security. ISACA Journal,
vol. 3, 27-32.
ISACA, 2016b. Security Assurance in the SDLC for the
Internet of Things. ISACA Journal, vol. 3, 32-43.
ISACA, 2017. Managing the Risk of IoT. ISACA Journal,
vol 3, 19-27.
ISO, 2008. Information technology - Security techniques -
Systems Security Engineering - Capability Maturity
Model (SSE-CMM). Retrieved from www.iso.org
/standard/44716.html.
ITU, 2015. Cybersecurity, data protection and cyber
resilience in smart sustainable cities. International
Telecommunication Union. Focus Group Technical
Report. Retrieved from www.itu.int/en/ITU-T/focus
groups/ssc/Documents/website/web-fg-ssc-0090-r7-tech
nical_report_on_ICT_infrastructure_for_resilience_secu
rity.doc.
Jacobsson, A., Boldt, M. & Carlsson, B., 2016. A risk
analysis of a smart home automation system. Future
Generation Computer Systems, 719-733.
Kodra, S, 2016. Smart Home Hacking, NTNU. Retrieved
from https://brage.bibsys.no/xmlui/bitstream/handle/11
250/2405119/15721_FULLTEXT.pdf?sequence=1.
Levy-Bencheton, C., 2015a. Security and Resilience of Smart
Home Environments. Retrieved from
www.enisa.europa.eu.
Levy-Bencheton, C., 2015b. Securing the Lifecycle of Smart
Home Environments. Retrieved from www.enisa.
europa.eu.
Levy-Bencheton, C., Darra, E., Tetu, G., Dufay, G. & Alattar,
M., 2015. Security and Resilience of Smart Home
Environments. Retrieved from www.enisa.europa.eu.
Mantas, G., Lymberopoulos, D. & Komninos, N., 2010.
Security in smart home environment, Wireless
Technologies for Ambient Assisted Living and
Healthcare: Systems and Applications. Medical
Information Science, Hershey, 170-191.
McKechnie, G., 2017. Integrating Smart Home Devices.
Retrieved from http://smarthomegallery.com/insights/
integrating smart-home-devices/.
Miessler, D., 2014. HP Study. Retrieved from comm
unity.saas.hpe.com/t5/Protect-Your Assets/HP-Study
-Reveals-70-Percent-of-Internet of-Things-Devices/b
a-p/220516#.WT7x6BOGPR2.
Minerva, R., Biru, A. & Rotondi, D., 2015. Towards a
definition of the Internet of Things (IoT).
O'Brien, D., 2014. The Internet of Things: New Threats
Emerge in a Connected World. Retrieved from
www.symantec.com/connect/blogs/internetthings-new-
threats-emerge-connected-world.
Rehman, S. U. & Manickam, S., 2016. A Study of Smart
Home Environment and its Security Threats. In
International Journal of Reliability, Quality and Safety
Engineering.
Saleha, M. S. & Alfantookh, A., 2011. Applied Computing and
Informatics. A new comprehensive framework for
enterprise information security risk management, 107-118.
Saunders, M. N., Lewis, P. & Thornhill, A., 2009. Research
Methods for Business Students. 5. ed. Harlow, England,
Pearson Education Limited.
TechHome, 2015. Recommended Best Practices for Securing
Home Systems. Retrieved from www.cta.tech/cta/
media/Membership/PDFs.
The EA Pad, n.d.. Reference Models. Security Reference
Model – SRM. Retrieved from eapad.dk/gov/us/com
mon-approach/reference-models/.
The Telegraph, (2016). Cyber-crime: One in 10 people now
victim of fraud or online offences, figures show.
Retrieved from www.telegraph.co.uk/news/2016/07/21/
one-in-people-now-victims-of-cyber-crime/.
Towne, S., 2014. The Current State of Smart Locks. Retriev-
ed from http://schuylertowne.com/blog/smart-locks.
Wang, W. & Lu, Z., 2013. Cyber security in the Smart Grid:
Survey and challenges. In Computer Networks, 1344–
1371.
Whitehouse, O. (2014). Security of Things: An Implemen-
ters’ Guide to Cyber-Security for Internet of Things
Devices and Beyond. Retrieved from
www.nccgroup.trust.