{"id":"https://openalex.org/W4414470915","doi":"https://doi.org/10.1093/cybsec/tyaf024","title":"Unfit for purpose? Assessing the applicability of country-level IoT security advice","display_name":"Unfit for purpose? Assessing the applicability of country-level IoT security advice","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414470915","doi":"https://doi.org/10.1093/cybsec/tyaf024"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf024","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf024","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092998479","display_name":"Veerle van Harten","orcid":"https://orcid.org/0000-0003-0451-4052"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Veerle van\u00a0Harten","raw_affiliation_strings":["Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,"],"raw_orcid":"https://orcid.org/0000-0003-0451-4052","affiliations":[{"raw_affiliation_string":"Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048211807","display_name":"Carlos Ga\u00f1\u00e1n","orcid":"https://orcid.org/0000-0002-4699-3007"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Carlos Hern\u00e1ndez Ga\u00f1\u00e1n","raw_affiliation_strings":["Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012946294","display_name":"Michel van Eeten","orcid":"https://orcid.org/0000-0002-0338-2812"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Michel van\u00a0Eeten","raw_affiliation_strings":["Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016771481","display_name":"Simon Parkin","orcid":"https://orcid.org/0000-0002-6667-0440"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Simon Parkin","raw_affiliation_strings":["Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,"],"raw_orcid":"https://orcid.org/0000-0002-6667-0440","affiliations":[{"raw_affiliation_string":"Technology, Policy, and Management, TU Delft , Jaffalaan 5, 2628 BX Delft ,","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092998479"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36882709,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/advice","display_name":"Advice (programming)","score":0.9233999848365784},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7225000262260437},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4812999963760376},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.43369999527931213},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.3695000112056732},{"id":"https://openalex.org/keywords/legal-advice","display_name":"Legal advice","score":0.3504999876022339}],"concepts":[{"id":"https://openalex.org/C2779955035","wikidata":"https://www.wikidata.org/wiki/Q4686785","display_name":"Advice (programming)","level":2,"score":0.9233999848365784},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7225000262260437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5250999927520752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5144000053405762},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4812999963760376},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4381999969482422},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.43369999527931213},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C2993469667","wikidata":"https://www.wikidata.org/wiki/Q220117","display_name":"Legal advice","level":2,"score":0.3504999876022339},{"id":"https://openalex.org/C2776510742","wikidata":"https://www.wikidata.org/wiki/Q6806456","display_name":"Medical advice","level":2,"score":0.34779998660087585},{"id":"https://openalex.org/C2781316041","wikidata":"https://www.wikidata.org/wiki/Q1230584","display_name":"Diversity (politics)","level":2,"score":0.3472000062465668},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.31790000200271606},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.28380000591278076},{"id":"https://openalex.org/C2778334971","wikidata":"https://www.wikidata.org/wiki/Q6958793","display_name":"Nagging","level":2,"score":0.273499995470047}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf024","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf024","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf024","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W89647087","https://openalex.org/W1529733883","https://openalex.org/W1555516857","https://openalex.org/W1971295515","https://openalex.org/W2045591401","https://openalex.org/W2119791462","https://openalex.org/W2256695479","https://openalex.org/W2537669654","https://openalex.org/W2624735790","https://openalex.org/W2740252643","https://openalex.org/W2752929869","https://openalex.org/W2756014520","https://openalex.org/W2771554845","https://openalex.org/W2803009345","https://openalex.org/W2895453755","https://openalex.org/W2896396724","https://openalex.org/W2913224440","https://openalex.org/W2953323334","https://openalex.org/W2959688941","https://openalex.org/W2995569586","https://openalex.org/W3017863658","https://openalex.org/W3027256508","https://openalex.org/W3029172965","https://openalex.org/W3042026930","https://openalex.org/W3048560297","https://openalex.org/W3096905840","https://openalex.org/W3111733481","https://openalex.org/W3128146742","https://openalex.org/W3134731862","https://openalex.org/W3167950364","https://openalex.org/W3175373484","https://openalex.org/W3181718291","https://openalex.org/W4200518437","https://openalex.org/W4210320858","https://openalex.org/W4281633907","https://openalex.org/W4285201154","https://openalex.org/W4296132168","https://openalex.org/W4385080394"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Existing":[1],"research":[2],"offers":[3],"insights":[4],"into":[5,21],"the":[6,32,50,52,55,59,73,80,99,125,137,147,170,214,221,235,259,270,277,301,317],"properties":[7],"of":[8,34,62,101,108,114,139,143,162,276,319],"security":[9,47,102,261,274,283,313],"advice":[10,24,48,74,103,115,171,195,211,230,251],"and":[11,54,88,119,241,273,286,298,304,322],"user":[12,60,289,323],"abilities":[13],"to":[14,31,58,156,183,197,217,232,248,254,268,309],"implement":[15],"such":[16],"advice,":[17,163],"but":[18,180],"lacks":[19,213],"insight":[20],"whether":[22,72,193],"this":[23,41],"is":[25],"fit":[26],"for":[27,97,150,234],"purpose":[28],"when":[29,245],"applied":[30],"diversity":[33],"consumer":[35],"IoT":[36,65,109,282],"devices.":[37,110],"Our":[38,128],"study":[39],"bridges":[40],"gap":[42],"by":[43],"examining":[44],"how":[45],"country-level":[46],"from":[49],"UK,":[51],"USA,":[53],"Netherlands":[56],"relates":[57],"materials":[61,149],"40":[63],"top-selling":[64],"devices":[66,152],"across":[67,104],"five":[68],"categories,":[69],"focusing":[70],"on":[71,85,266],"can":[75],"realistically":[76],"be":[77],"followed":[78],"given":[79],"devices\u2019":[81],"documented":[82],"features.":[83],"Drawing":[84],"manuals,":[86],"videos,":[87],"organic":[89],"search":[90],"results,":[91],"we":[92],"offer":[93],"a":[94,105,131,208,264],"scalable":[95],"approach":[96],"assessing":[98],"applicability":[100],"wide":[106,236],"range":[107],"Four":[111],"overlapping":[112],"pieces":[113,142,161],"regarding":[116],"password":[117],"management":[118],"firmware":[120],"updates":[121],"were":[122],"identified":[123],"in":[124,177,220,238,291],"three":[126],"countries.":[127],"assessment":[129],"revealed":[130],"significant":[132],"disconnect;":[133],"no":[134],"device":[135,186,239,249,320],"supported":[136],"implementation":[138],"all":[140],"four":[141],"advice.":[144,278],"At":[145],"most,":[146],"analyzed":[148],"36":[151],"provided":[153,312],"sufficient":[154],"information":[155],"apply":[157],"one":[158],"or":[159,202],"two":[160],"primarily":[164],"concerning":[165],"updates.":[166],"This":[167,205,279],"shows":[168],"that":[169,296,311],"does":[172],"not":[173],"merely":[174],"fall":[175],"short":[176],"isolated":[178],"cases,":[179],"fails":[181,231],"systematically":[182],"align":[184],"with":[185,316],"capabilities.":[187,324],"Users,":[188],"typically":[189],"non-experts,":[190],"must":[191],"determine":[192],"expert":[194],"applies":[196],"their":[198],"devices,":[199],"risking":[200],"ineffective":[201],"harmful":[203],"practices.":[204],"disconnect":[206],"highlights":[207],"broader":[209],"issue:":[210],"itself":[212],"grounding":[215],"needed":[216],"support":[218,242,314],"users":[219,267,307],"first":[222],"place.":[223],"While":[224],"framed":[225],"as":[226],"broadly":[227],"applicable,":[228],"general":[229],"account":[233],"variability":[237],"features":[240,321],"materials.":[243],"Even":[244],"seemingly":[246],"connected":[247],"features,":[250],"risks":[252,287],"leading":[253],"pseudo-security":[255],"improvements":[256],"rather":[257],"than":[258],"proposed":[260],"improvements,":[262],"placing":[263],"burden":[265],"assess":[269],"relevance,":[271],"implementation,":[272],"effectiveness":[275],"situation":[280],"jeopardizes":[281],"at":[284],"scale,":[285],"undermining":[288],"trust":[290],"protective":[292],"measures.":[293],"We":[294],"propose":[295],"governments":[297],"researchers":[299],"consider":[300],"practical":[302],"constraints":[303],"informational":[305],"contexts":[306],"face":[308],"ensure":[310],"aligns":[315],"realities":[318]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
