Andrews, J. C., Burton, S., and Kees, J. (2011). Is sim-
pler always better? consumer evaluations of front-of-
package nutrition symbols. Journal of Public Policy
& Marketing, 30(2):175–190.
Baldini, G., Skarmeta, A., Fourneret, E., Neisse, R., Leg-
eard, B., and Le Gall, F. (2016). Security certification
and labelling in internet of things. In 2016 IEEE 3rd
World Forum on Internet of Things (WF-IoT), pages
627–632. IEEE.
Bellman, C. and van Oorschot, P. C. (2020). Best practices
for IoT security: What does that even mean? arXiv
preprint arXiv:2004.12179.
Blythe, J. and Johnson, S. (2018). Rapid evidence assess-
ment on labelling schemes and implications for con-
sumer IoT security. Technical report, DCMS: London.
BSI (2018). BSI launches kitemark for Internet of Things
devices. Technical report, British Standards Institute.
C2 (2019). The C2 consensus on iot device security baseline
capabilities. Technical report, CSDE.
Camp, L. J. (2009). Mental models of privacy and security.
IEEE Technology & Society magazine, 28(3):37–46.
Communicating Upgradability and Improving Trans-
parency Working Group (2017). Communicating
iot device security update capabilityto improve trans-
parency for consumers. Technical report, NTIA.
Copper Horse (2018). Mapping security & privacy in the
Internet of Things. https://iotsecuritymapping.uk/.
CTIA (2020). Cybersecurity certification program for IoT
devices. Technical report, CTIA.
Cyber Security Agency of Singapore (2020). Cybersecurity
labelling scheme. https://www.csa.gov.sg/-/media/
csa/documents/cos/2020/csa-cos-media-factsheet
cybersecurity-labelling-scheme.pdf.
DCMS (2019). Mandating security requirements for con-
sumer ‘IoT’ products. Technical report, DCMS.
Dingman, A., Russo, G., Osterholt, G., Uffelman, T., and
Camp, L. J. (2018). Good advice that just doesn’t
help. In 2018 IEEE/ACM Third International Con-
ference on Internet-of-Things Design and Implemen-
tation (IoTDI), pages 289–291. IEEE.
Ditigal Standard (2020). Digital standard. https://www.
thedigitalstandard.org/the-standard.
Emami-Naeini, P., Agarwal, Y., Cranor, L. F., and Hib-
shi, H. (2020). Ask the experts: What should be on
an IoT privacy and security label? arXiv preprint
arXiv:2002.04631.
Fagan, M., Megas, K. N., Scarfone, K., and Smith, M.
(2020). IoT device cybersecurity capability core base-
line. Technical report, NIST.
Garg, V. and Camp, J. (2013). Heuristics and biases: impli-
cations for security design. IEEE Technology & Soci-
ety Magazine, 32(1):73–79.
Harris Interactive (2019). Consumer internet of things se-
curity labelling survey research findings. Technical
report, Harris Interactive.
IoT Alliance Australia (2020). Internet of Things security
guideline. Technical report, IoTAA.
IoT Security Foundation (2020). Best practice user mark
FAQ and terms of use. Technical report, IoT Security
Foundation.
Ipsos Public Affairs (2019). Product security: IoT and other
internet enabled devices. Technical report, Centre for
International Governance Innovation.
Jameison, A. (2016). IoT security: It’s in the
stars. https://www.slideshare.net/AndrewRJamieson/
iot-security-its-in-the-stars-169-v201605241355.
Johnson, S. D., Blythe, J. M., Manning, M., and Wong, G.
T. W. (2020). The impact of IoT security labelling
on consumer product choice and willingness to pay.
PLOS ONE, 15(1):1–21.
King, A. and Gallagher, R. M. (2020). Cyberspace solarium
report. Technical report, CSC.
Klopp, P. and MacDonald, M. (1981). Nutrition labels:
an exploratory study of consumer reasons for nonuse.
Journal of Consumer Affairs, 15(2):301–316.
Knowledge, P. (2019). Security shield. Technical report,
Public Knowledge.
Momenzadeh, B., Dougherty, H., Remmel, M., Myers, S.,
and Camp, L. J. (2020). Best practices would make
things better in the IoT. IEEE Annals of the History of
Computing, 18(04):38–47.
Morgner, P., Mai, C., Koschate-Fischer, N., Freiling, F., and
Benenson, Z. (2020). Security update labels: Estab-
lishing economic incentives for security patching of
iot consumer products. In 2020 IEEE Symposium on
Security and Privacy (SP), pages 346–363.
National Cyber Security Center (2019). Tietoturvamerkki.
https://tietoturvamerkki.fi/.
Odom, M. D., Kumar, A., and Saunders, L. (2002). Web
assurance seals: How and why they influence con-
sumers’ decisions. Journal of Information Systems,
16(2):231–250.
Police Crime Prevention Initiatives (2020). Secure by de-
sign. https://www.securedbydesign.com/.
Rothman, R. L., Housam, R., Weiss, H., Davis, D., Gregory,
R., Gebretsadik, T., Shintani, A., and Elasy, T. A.
(2006). Patient understanding of food labels: the role
of literacy and numeracy. American journal of preven-
tive medicine, 31(5):391–398.
Shen, Y. and Vervier, P.-A. (2019). IoT security and pri-
vacy labels. In Annual Privacy Forum, pages 136–
147. Springer.
Smith, M. W. (2019). Information asymmetry meets data
security: The lemons market for smartphone apps.
Policy Perspectives, pages 85–96.
Trustable Technology Mark (2020). The trustable tech-
nology mark is wrapping up. https://trustabletech.
org/the-trustable-technology-mark-is-wrapping-up-\
\trustable-technology-lives-on/.
UL (2020). IoT security rating level. https://ims.ul.com/
iot-security-rating-levels.
Waechter, S., S
¨
utterlin, B., and Siegrist, M. (2015). De-
sired and undesired effects of energy labels—an eye-
tracking study. PloS one, 10(7):e0134132.
Wu, J. and Zappala, D. (2018). When is a tree really a
truck? exploring mental models of encryption. In
Fourteenth Symposium on Usable Privacy and Secu-
rity ({SOUPS} 2018), pages 395–409.
A Lemon by Any Other Label
565