{"id":"https://openalex.org/W2953323334","doi":"https://doi.org/10.1093/cybsec/tyz005","title":"What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?","display_name":"What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2953323334","doi":"https://doi.org/10.1093/cybsec/tyz005","mag":"2953323334"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyz005","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz005","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/5/1/tyz005/28833444/tyz005.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/5/1/tyz005/28833444/tyz005.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045326735","display_name":"John M. Blythe","orcid":"https://orcid.org/0000-0003-1743-4967"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"John M Blythe","raw_affiliation_strings":["CybSafe, Level 39, One Canada Square, Canary Wharf, London, UK","Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"],"affiliations":[{"raw_affiliation_string":"CybSafe, Level 39, One Canada Square, Canary Wharf, London, UK","institution_ids":[]},{"raw_affiliation_string":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019705100","display_name":"Nissy Sombatruang","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nissy Sombatruang","raw_affiliation_strings":["Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085424492","display_name":"Shane D. Johnson","orcid":"https://orcid.org/0000-0002-0184-9896"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shane D Johnson","raw_affiliation_strings":["Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Security and Crime Science, University College London, 35 Tavistock Square, London, UK","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045326735"],"corresponding_institution_ids":["https://openalex.org/I45129253"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":15.4384,"has_fulltext":true,"cited_by_count":56,"citation_normalized_percentile":{"value":0.98808774,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7124508619308472},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6383633613586426},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5209794640541077},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.49238312244415283},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.4750209450721741},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4633849561214447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45948442816734314},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.45830655097961426},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45141318440437317},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3037233352661133},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2752039134502411},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08124059438705444}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7124508619308472},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6383633613586426},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5209794640541077},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.49238312244415283},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.4750209450721741},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4633849561214447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45948442816734314},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.45830655097961426},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45141318440437317},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3037233352661133},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2752039134502411},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08124059438705444}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyz005","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz005","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/5/1/tyz005/28833444/tyz005.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10079499","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10079499/","pdf_url":"https://discovery.ucl.ac.uk/10079499/1/What%20security%20features%20and%20crime%20prevention%20advice%20is%20communicated%20in%20consumer%20IoT%20device%20manuals%20and%20support%20pages.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"   Journal of Cybersecurity , 5  (1)    , Article tyz005. (2019)      ","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyz005","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz005","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/5/1/tyz005/28833444/tyz005.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4314500828","display_name":null,"funder_award_id":"EP/N02334X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2953323334.pdf","grobid_xml":"https://content.openalex.org/works/W2953323334.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1690148500","https://openalex.org/W2136608905","https://openalex.org/W2142225512","https://openalex.org/W2169434152","https://openalex.org/W2467144198","https://openalex.org/W2733765803","https://openalex.org/W6719681186"],"related_works":["https://openalex.org/W4367365664","https://openalex.org/W4293227618","https://openalex.org/W2136634148","https://openalex.org/W3122851392","https://openalex.org/W3122800671","https://openalex.org/W2921504876","https://openalex.org/W4250708772","https://openalex.org/W4288862737","https://openalex.org/W1982580243","https://openalex.org/W2555868565"],"abstract_inverted_index":{"Through":[0],"the":[1,7,16,24,42,50,59,88,126,164,167,189,195,212,226,233,252,270,295,316],"enhanced":[2],"connectivity":[3],"of":[4,9,18,45,55,61,72,90,128,151,166,188,219,255,272,283,313,318],"physical":[5],"devices,":[6,257],"Internet":[8],"Things":[10],"(IoT)":[11],"brings":[12],"improved":[13],"efficiency":[14],"to":[15,58,64,87,134,140,182,202,211,224,228,236,238,275,300,335],"lives":[17],"consumers":[19,97,265,301],"when":[20,105],"on-the-go":[21],"and":[22,34,53,172,194,263,291],"in":[23,83,315,332,345],"home.":[25],"However,":[26],"it":[27],"also":[28],"introduces":[29],"new":[30],"potential":[31],"security":[32,91,103,122,130,190,205,253,271,286],"threats":[33,38],"risks.":[35],"These":[36],"include":[37],"that":[39,47,110,199,243],"range":[40],"from":[41],"direct":[43],"hacking":[44],"devices":[46,63,155,178,223,230,273,323],"could":[48],"undermine":[49],"security,":[51,340],"privacy":[52],"safety":[54],"its":[56],"users,":[57],"enslaving":[60],"IoT":[62,76,135,154,222,322],"commit":[65],"cybercrime":[66],"at":[67,163],"scale,":[68],"such":[69],"as":[70,79],"Denial":[71],"Service":[73],"attacks.":[74],"The":[75,169,204],"is":[77,109,132,200,343],"recognized":[78],"being":[80,294],"widely":[81],"insecure,":[82],"large":[84],"part,":[85],"due":[86],"lack":[89,112,312],"features":[92,104,123,131,191,206,254],"built":[93],"into":[94],"devices.":[95],"Additionally,":[96],"do":[98,145],"not":[99],"always":[100],"actively":[101],"use":[102],"available.":[106],"More":[107],"disconcerting":[108],"we":[111,147,309],"market":[113,234,260],"surveillance":[114,261],"on":[115,161,232,302],"whether":[116,341],"manufacturers":[117,160,244],"ship":[118],"products":[119],"with":[120,266,288],"good":[121],"or":[124,348],"how":[125],"importance":[127],"user-controlled":[129],"explained":[133],"users.":[136,203],"Our":[137,240],"study":[138],"seeks":[139],"address":[141],"this":[142,333,342],"gap.":[143],"To":[144],"this,":[146],"compiled":[148],"a":[149,184,311,346],"database":[150],"270":[152],"consumer":[153],"produced":[156],"by":[157,216],"220":[158],"different":[159],"sale":[162],"time":[165],"study.":[168],"user":[170],"manuals":[171],"associated":[173],"support":[174],"pages":[175],"for":[176,221,321,329],"these":[177],"were":[179,208],"then":[180,209],"analysed":[181],"provide":[183,193,245,336],"\u2018consumer":[185],"eye\u2019":[186],"view":[187],"they":[192],"cyber":[196,303],"hygiene":[197,304],"advice":[198],"communicated":[201],"identified":[207],"mapped":[210],"UK":[213],"Government\u2019s":[214],"Secure":[215],"Design":[217],"Code":[218],"Practice":[220],"examine":[225],"extent":[227],"which":[229,258],"currently":[231],"appear":[235],"conform":[237],"it.":[239],"findings":[241],"suggest":[242],"too":[246],"little":[247,267],"publicly":[248],"available":[249],"information":[250,268,320],"about":[251,269],"their":[256,276],"makes":[259],"challenging":[262],"provides":[264],"prior":[274],"purchase.":[277],"On":[278],"average,":[279],"there":[280],"was":[281,305],"discussion":[282],"around":[284,338],"four":[285],"features,":[287],"account":[289],"management":[290],"software":[292],"updates":[293],"most":[296],"frequently":[297],"mentioned.":[298],"Advice":[299],"rarely":[306],"provided.":[307],"Finally,":[308],"found":[310],"standardization":[314],"communication":[317],"security-related":[319],"among":[324],"our":[325],"sample.":[326],"We":[327],"argue":[328],"government":[330],"intervention":[331],"space":[334],"assurances":[337],"device":[339],"provided":[344],"centralized":[347],"decentralized":[349],"manner.":[350]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
