[
Arora, A., Krishnan, R, Telang, R, Yang, Y. (2010). An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/isre.1080.0226
]Search in Google Scholar
[
Arora, A,. Xu, H, Telang, R. (2008). Optimal Policy for Software Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/mnsc.1070.0771? Journal Code=mnsc
]Search in Google Scholar
[
AT&T Internet Security with ActiveArmor, retrieved on Feb 08, 2022 at https://www.att.com/support/article/u-verse-high-speed-internet/KM1399140/
]Search in Google Scholar
[
Balan, A. (2021). DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days, retrieved at https://www.youtube.com/watch?v=xUb190HQtjA&t=2254s
]Search in Google Scholar
[
Berte, DR. (2018). Defining the IoT, retrieved at https://sciendo.com/pdf/10.2478/picbe-2018-0013
]Search in Google Scholar
[
Collela, P. (2021). Ushering in a Better Connected Future, retrieved at https://www.ericsson.com/en/about-us/company-facts/ericsson-worldwide/india/authored-articles/ushering-in-a-better-connected-future
]Search in Google Scholar
[
Comcast Advanced Security, retrieved on Feb 08, 2022 at https://www.xfinity.com/learn/internet-service
]Search in Google Scholar
[
Daws, R. (2021). Kaspersky: Attacks on IoT devices double in a year retrieved at https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/
]Search in Google Scholar
[
Day, Jeff et al. (2022). Vulnerability Disclosure: Best Practice Guidelines, retrieved at http://www.open-access.bcu.ac.uk/12218/
]Search in Google Scholar
[
Ding, A.Y., De Jesus G.L. & Janssen, M. (2019). Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure
]Search in Google Scholar
[
Flynn, JR., Francis J. (2019). Ring LLC Privacy Litigation, as retrieved at https://www.courtlistener.com/docket/16630199/1/orange-v-ring-llc/
]Search in Google Scholar
[
Gartner, Inc., (2018). Emerging Technology Analysis: Bug Bounties and Crowdsourced Security Testing.
]Search in Google Scholar
[
Google Project Zero Policy and Disclosure, retrieved on Feb 08, 2022 at https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html
]Search in Google Scholar
[
ISO.org. (2018). Information technology – Security techniques – Vulnerability disclosure, retrieved at https://www.iso.org/standard/72311.html
]Search in Google Scholar
[
Istrate, C. (2020). Bitdefender, THE STATE OF IoT SECURITY IN 2020
]Search in Google Scholar
[
Mehraban, S. (2017). Component Lifespan Considerations for Industrial IoT OEMs, retrieved at https://www.lantronix.com/blog/component-lifespan-considerations-for-industrial-iot-oems/
]Search in Google Scholar
[
Netgear Armor, retrieved on Feb 08, 2022 at https://www.netgear.com/home/services/armor/
]Search in Google Scholar
[
OECD. (2021).Teleworking in the COVID-19 Pandemic: Trends and Prospects, retrieved at https://read.oecd-ilibrary.org/view/?ref=1108_1108540-p249kho0iu&title=Teleworkingin-the-COVID-19-pandemic-Trends-and-prospects
]Search in Google Scholar
[
Routley, N. (2020). 6 charts that show what employers and employees really think about remote working, retrieved at https://www.weforum.org/agenda/2020/06/coronavirus-covid19-remote-working-office-employees-employers
]Search in Google Scholar
[
Stahie, S. (2020). Mozi Botnet Accounts for Most Traffic in Q1 2020, New Research Shows, retrieved at https://www.bitdefender.com/blog/hotforsecurity/mozi-botnet-accounts-traffic-q1-2020-new-research-shows
]Search in Google Scholar
[
Todor, R. (2021). Bitdefender, THE STATE OF SMART HOME SECURITY IN 2021 AND BEYOND
]Search in Google Scholar
[
White, C., Barrett, J., (2022), Data Privacy and Security in the Connected Home, retrieved at https://www.parksassociates.com/marketfocus/data-privacy
]Search in Google Scholar