D. Akhawe, Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness, Usenix Security, 2013.

A. Android and . Versions,

L. Atzori, The Internet of Things: A Survey, Computer Networks, 2010.

S. B. Barnes, A Privacy Paradox: Social Networking in the United States, 2006.

, Careful Connections: Building Security in the Internet of Things, 2015.

X. Caron, The Internet of Things (IoT) and its Impact on Individual Privacy: An Australian Perspective, Computer Law & Security Review, 2016.

D. Christin, Privacy in Mobile Participatory Sensing: Current Trends and Future Challenges, Journal of Systems and Software, 2016.

A. De-luca, Expert and Non-Expert Attitudes Towards (Secure) Instant Messaging, Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS), 2016.

M. Elkhodr, A Review of Mobile Location Privacy in the Internet of Things, Proceedings of the 10th International Conference on ICT and Knowledge Engineering, 2012.

D. Evans, The Internet of Things-How the Next Evolution of the Internet Is Changing Everything. Cisco, 2011.

G. Hardin, The Tragedy of the Commons, Journal of Natural Resources Policy Research, 2009.

, Privacy & Security in a Connected World. Staff report. FTC, 2015.

R. Kang, User Mental Models of the Internet and Implications for Privacy and Security, Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS), 2015.

M. Kosinski, Private Traits and Attributes Are Predictable From Digital Records of Human Behavior, Proceedings of the National Academy of Sciences, 2013.

N. D. Lane, On the Feasibility of User De-anonymization From Shared Mobile Sensor Data, Proceedings of the 3rd International Workshop on Sensing Applications on Mobile Phones, 2012.

D. M. Mendez, Internet of Things: Survey on Security and Privacy, 2017.

R. P. Minch, Location Privacy in the Era of the Internet of Things and Big Data Analytics, Proceedings of 48th Hawaii International Conference on System Sciences (HICSS), 2015.

P. E. Naeini, Privacy Expectations and Preferences in an IoT World, Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS), 2017.

A. Narayanan, How to Break Anonymity of the Netflix Prize Dataset, 2006.

O. S. Matter, OECD Skills Studies, 2016.

S. R. Peppet, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security and Consent, In: Tex. L. Rev, 2014.

, Regulation of the European Parliament and of the Council Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications, 2017.

, All of Our Products Will Be Connected to the Web, Samsung: By 2020

B. Schneier, Secrets and Lies: Digital Security in a Networked World, 2008.

M. Volkamer, Mental Models-General Introduction and Review of Their Application to Human-Centred Security, Lecture Notes in Computer Science, 2013.

W. Zhou, Security/Privacy of Wearable Fitness Tracking IoT Devices, Proceedings of the 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014.

J. H. Ziegeldorf, Privacy in the Internet of Things: Threats and Challenges, 2014.