Cyber-enabled burglary of smart homes
Tài liệu tham khảo
Ali, 2018, Cyber and physical security vulnerability assessment for IoT-based smart homes, Sensors (Switzerland), 18, 817, 10.3390/s18030817
Bennett, 1984
Bernasco, 2004, How do residential burglars select target areas?: A new approach to the analysis of criminal location choice, Br. J. Criminol., 45, 296, 10.1093/bjc/azh070
Blythe, 2021, A systematic review of crime facilitated by the consumer Internet of Things, Secur. J., 34, 97, 10.1057/s41284-019-00211-8
Bugeja, 2017, An analysis of malicious threat agents for the smart connected home, 557
Bullock K, Chowdhury R, Hollings P. Public concerns about organised crime. In 2009. Available from: https://web.archive.org/web/20200106124823/https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/116623/horr16-report.pdf
Chan, 2008, A review of smart homes—Present state and future challenges, Comput. Methods Programs Biomed., 91, 55, 10.1016/j.cmpb.2008.02.001
Chen, 2017, Butler, not servant: a human-centric smart home energy management system, IEEE Commun. Mag., 55, 27, 10.1109/MCOM.2017.1600699CM
Clare, 2011, Examination of systematic variations in burglars’ domain-specific perceptual and procedural skills, Psychol. Crime Law, 17, 199, 10.1080/10683160903025810
Clare, 2009, Formal evaluation of the impact of barriers and connectors on residential Burglars’ macro-level offending location choices, Aust. N. Z. J. Criminol., 42, 139, 10.1375/acri.42.2.139
Clarke, 1999, Hot products: understanding, anticipating and reducing demand for stolen goods
Cohen, 1979, Social change and crime rate trends: a routine activity approach, Am. Sociol. Rev. [Internet], 44, 588, 10.2307/2094589
Conway, 2006, Terrorism and the internet: new media—new threat?, Parliam. Aff., 59, 283, 10.1093/pa/gsl009
Cornish, 2014
Coupe, 2006, Daylight and darkness targeting strategies and the risks of being seen at residential burglaries, Criminology, 44, 431, 10.1111/j.1745-9125.2006.00054.x
Van Daele, 2012, Vander Beken T. Technische hulpmiddelen en doelwitselectie bij woninginbraak: een experimenteel onderzoek naar de invloed van Google Maps en Google Street View, Tijdschr voor Criminol, 54, 362
Damodaran, 2010, User responses to assisted living technologies (Alts) - a review of the literature, J. Integr. Care, 18, 25, 10.5042/jic.2010.0133
Demiris, 2004, Older adults’ attitudes towards and perceptions of ‘smart home’ technologies: a pilot study, Med. Inform. Internet Med., 29, 87, 10.1080/14639230410001684387
Elffers, 2008, Modelling crime flow between neighbourhoods in terms of distance and of intervening opportunities, Crime Prev. Community Saf, 10, 85, 10.1057/palgrave.cpcs.8150062
Elkin M. Crime in England and wales: year ending June 2019 [Internet]. Office for National Statistics. 2019 [cited 2020 Jan 6]. Available from: https://web.archive.org/web/20200106125230/https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingjune2019
Flatley J. Focus on property crime: year ending March 2016 [Internet]. Office for National Statistics. 2016 [cited 2019 Dec 22]. Available from: https://web.archive.org/web/20191222143433/https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/focusonpropertycrime/yearendingmarch2016
Gai, 2018, Categorisation of security threats for smart home appliances
van Gelder, 2017, Virtual burglary: exploring the potential of virtual reality to study burglary in action, J. Res. Crime Delinq. [Internet], 54, 29, 10.1177/0022427816663997
Geneiatakis, 2017, Security and privacy issues for an IoT based smart home, 1292
Ghirardello, 2018, Cyber security of smart homes: development of a reference architecture for attack surface analysis, 45
Hargreaves, 2013, Keeping energy visible? Exploring how householders interact with feedback from smart energy monitors in the longer term, Energy Policy, 52, 126, 10.1016/j.enpol.2012.03.027
Haupert, 2018, Honey, I shrunk your app security: the state of android app hardening, 69
Hearnden, 2004, Decision-making by house burglars: Offenders’ perspectives
Heartfield, 2018, A taxonomy of cyber-physical threats and impact in the smart home, Comput. Secur., 78, 398, 10.1016/j.cose.2018.07.011
Huang, 2018, Systematically understanding the cyber attack business: a survey, ACM Comput. Surv., 51, 10.1145/3199674
Jacobsson, 2016, A risk analysis of a smart home automation system, Futur. Gener. Comput. Syst., 56, 719, 10.1016/j.future.2015.09.003
Kearns, 2005, Victim and perpetrator accounts of interpersonal transgressions: self-serving or relationship-serving biases?, Person. Soc. Psychol. Bull. [Internet], 31, 321, 10.1177/0146167204271594
Klobas, 2019, How perceived security risk affects intention to use smart home devices: a reasoned action explanation, Comput. Secur., 87, 10.1016/j.cose.2019.101571
Langton, 2017, Residential burglary target selection: an analysis at the property-level using Google Street View, Appl. Geogr., 86, 292, 10.1016/j.apgeog.2017.06.014
Langworthy, 1992, Spatial evolution of a sting clientele, J. Crim. Justice, 20, 135, 10.1016/0047-2352(92)90004-S
Leclerc, 2013, How house burglars decide on targets: a computer-based scenario approach, In: Cognition and Crime. Routledge;, 50
Leitão, 2019, Anticipating smart home security and privacy threats with survivors of intimate partner abuse, 527
Leukfeldt, 2016, Applying routine activity theory to cybercrime: a theoretical and empirical analysis, Deviant. Behav. [Internet], 37, 263, 10.1080/01639625.2015.1012409
Liu, 2019, A review of the smart world, Futur. Gener. Comput. Syst., 96, 678, 10.1016/j.future.2017.09.010
Loukas, 2015
Lurigio, 1987, Are all victims alike? The adverse, generalized, and differential impact of crime, Crime Delinq., 33, 452, 10.1177/0011128787033004003
Manky, 2013, Cybercrime as a service: a very modern business, Comput. Fraud. Secur, 2013, 9, 10.1016/S1361-3723(13)70053-8
Marikyan, 2019, A systematic review of the smart home literature: a user perspective, Technol. Forecast. Soc. Change, 138, 139, 10.1016/j.techfore.2018.08.015
Mayhew, 2020, Combating domestic abuse inflicted in smart societies, 347, 10.1007/978-3-030-35746-7_16
McGuire, 2013, Cyber-enabled crimes - fraud and theft, Cyber Crime A Rev. Evid. Res. Rep. 75
Metropolitan Police. 2018- 2019 Crime statistics [Internet]. 2019 [cited 2020 Jan 4]. Available from: https://www.met.police.uk/sd/stats-and-data/met/year-end-crime-statistics/
Microsoft. Azure IoT reference architecture - Azure Reference Architectures | Microsoft Docs [Internet]. 2020 [cited 2021 Mar 12]. Available from: https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/iot
Mulcahy, 2019, Are households ready to engage with smart home technology?, J. Mark. Manag., 35, 1370, 10.1080/0267257X.2019.1680568
Mullins, 2011, Islamist terrorism and australia: an empirical examination of the “Home-Grown” threat, Terror Polit Violence, 23, 254, 10.1080/09546553.2010.535717
Nee, 2015, Understanding expertise in burglars: From pre-conscious scanning to action and beyond, Aggress Violent Behav., 53, 10.1016/j.avb.2014.12.006
Nee, 2019, Learning on the job: studying expertise in residential burglars using virtual environments*, Criminology [Internet], 57, 481, 10.1111/1745-9125.12210
Nee, 2006, Expert decision making in burglars, Br. J. Criminol., 46, 935, 10.1093/bjc/azl013
Nee, 1988, Residential burglary in the republic of ireland: a situational perspective, Howard. J. Crim. Justice, 27, 105, 10.1111/j.1468-2311.1988.tb00609.x
Nee, 2000, Examining burglars’ target selection: Interview, experiment or ethnomethodology?, Psychol. Crime Law, 6, 45, 10.1080/10683160008410831
Nee, 2015, Review of expertise and its general implications for correctional psychology and criminology, Aggress Violent. Behav., 20, 1, 10.1016/j.avb.2014.12.002
Nee, 2015, New methods for examining expertise in burglars in natural and simulated environments: preliminary findings, Psychol. Crime Law, 21, 507, 10.1080/1068316X.2014.989849
Nicholls, 2020, Social impacts and control in the smart home, Nat. Energy, 5, 180, 10.1038/s41560-020-0574-0
Nurse, 2016, Towards a usable framework for modelling security and privacy risks in the smart home, 255
Oravec, 2017, Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things, Technol. Soc., 51, 189, 10.1016/j.techsoc.2017.09.004
Park, 2019, Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective, Sensors, 19, 2148, 10.3390/s19092148
Percival, 2006, Big brother or brave new world? Telecare and its implications for older people's independence and social inclusion, Crit. Soc. Policy, 26, 888, 10.1177/0261018306068480
Piasecki S, Urquhart L, McAuley D. Defence against dark artefacts: an analysis of the assumptions underpinning smart home cybersecurity standards. SSRN Electron J [Internet]. 2019; Available from: https://www.ssrn.com/abstract=3463799
Piza, 2014, Analyzing the influence of micro-level factors on CCTV camera effect, J. Quant. Criminol, 30, 237, 10.1007/s10940-013-9202-5
Sanders, 2017, Exploring and understanding differences between deliberate and impulsive male and female burglars, Crime Delinq. [Internet], 63, 1547, 10.1177/0011128716660519
Sent, 2018, Rationality and bounded rationality: you can't have one without the other, Eur. J. Hist. Econ. Thought [Internet], 25, 1370, 10.1080/09672567.2018.1523206
Sha, 2008, Cyber-physical systems: a new frontier, 1
SmartThings. SmartThings Developers | Documentation [Internet]. 2020 [cited 2021 Mar 12]. Available from: https://smartthings.developer.samsung.com/docs/platform-basics.html
Statista. Crime clearance rate in the United States in 2018 [Internet]. 2018 [cited 2020 Jan 4]. Available from: https://web.archive.org/web/20200106130539/https://www.statista.com/statistics/194213/crime-clearance-rate-by-type-in-the-us/
Sturgess, 2018, A capability-oriented approach to assessing privacy risk in smart home ecosystems, 37
Sugawara, 2020, Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems, 2631
Taylor, 1988, The role of cues in simulated residential burglary, Br. J. Criminol., 28, 396, 10.1093/oxfordjournals.bjc.a047736
Thomas TL. Al qaeda and the internet: the danger of “Cyberplanning” [Internet]. 2003 Jan. Available from: https://apps.dtic.mil/sti/citations/ADA485810
Tibbetts PS. Terrorist use of the internet and related information technologies [Internet]. 2002 May. Available from: https://apps.dtic.mil/sti/citations/ADA403802
Tilley, 2011, Income disparities of burglary risk: security availability during the crime drop, Br. J. Criminol., 51, 296, 10.1093/bjc/azr010
Tseloni, 2010, Exploring the international decline in crime rates, Eur. J. Criminol., 7, 375, 10.1177/1477370810367014
Tzezana, 2016, Scenarios for crime and terrorist attacks using the internet of things, Eur. J. Futur. Res., 4, 18, 10.1007/s40309-016-0107-z
Vandeviver, 2014, Applying google maps and google street view in criminological research, Crime Sci., 3, 13, 10.1186/s40163-014-0013-2
Weiser M. Ubiquitous computing. Computer (Long Beach Calif). 1993 Oct;26(10):71–2.
Williams, 2016, Guardians upon high: an application of routine activities theory to online identity theft in Europe at the country and individual level, Br. J. Criminol. [Internet], 56, 21, 10.1093/bjc/azv011
Winchester S, Jackson H. Residential burglary: the limits of prevention. In: Home Office Research Study No 74 London: Home Office. 1982.
Wright, 1996, Burglars on the job: Streetlife and residential break-ins, UPNE;
Yar, 2005, The Novelty of ‘Cybercrime.’, Eur. J. Criminol. [Internet], 2, 407, 10.1177/147737080556056
Zheng, 2018, User perceptions of smart home IoT privacy, Proc. ACM Human-Comput. Interact, 2, 1, 10.1145/3274469