References
- Abrahamson, T., & Roth, M. S. (2014). Advertising, marketing, privacy, and big data. In: P. Brown, & M. S. Roth (Eds.), Information technology law institute 2014: Cybersecurity, mobile payments, cloud computing, big data and the internet of things. New York NY: Practising Law Institute. Section 17.
- Activision Blizzard. (2016). Privacy policy. Retrieved February 13, 2017 from https://www.activision.com/legal/privacy-policy
- Adobe Systems. (2016). Adobe privacy policy. Retrieved February 13, 2017 from, http://www.adobe.com/privacy/policy.html
- ADP. (2016). ADP online privacy portal. Retrieved February 13, 2017 from, https://privacy.adp.com/privacy.html
- Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). Anonymous authentication for privacy-preserving IoT target-driven applications. Computers & Society, 37, 111–123.
- Altimeter. (2017). Why internet of things privacy is different from internet privacy. Retrieved February 16, 2017 from https://www.prophet.com/thinking/2015/07/why-privacy-in-the-internet-of-things-is-different-from-privacy-on-the-internet/
- Apple (2016). Privacy policy. Retrieved February 13, 2017 from http://www.apple.com/legal/privacy/en-ww/
- Applied Materials. (2014). Privacy. Retrieved February 13, 2017 from http://www.appliedmaterials.com/privacy
- Ball, K. (2010). Workplace surveillance: An overview. Labor History, 51, 87–106.
- Bates, S. (2015, September). An analytical approach to benefits. HR Magazine, 60, 47–51.
- Belrose, L. (2012). Do automobile passengers have a legitimate expectation of privacy? An analysis of reasonable expectations under the fourth amendment. Touro Law Review, 28(3), 771–785.
- Better Business Bureau. (2016). BBB sample privacy policy. Retrieved October 13, 2016 from https://www.bbb.org/dallas/for-businesses/bbb-sample-privacy-policy1/
- Bouge, R. (2014). Towards the trillion sensors market. Sensor Review, 34, 137–142.
- Brill, J. (2016, January 7). Privacy and data security in the age of big data and the internet of things. Retrieved August 26, 2016, from https://www.ftc.gov/system/files/documents/public_statements/904973/160107wagovprivacysummit.pdf
- Brin, D. W. (2016, June). Wearable worries. HR Magazine, 61, 138–140.
- Britton, K. (2016, April). Handling privacy and security in the internet of things. Journal of Internet Law, 19, 3–7.
- Brookman, J. (2015). Testimony of Justin Brookman, Director, Consumer Privacy, Center for Democracy and Technology. Hearing on “The Connected World: Examining the Internet of Things.” Journal of Current. Journal of Current Issues in Media and Telecommunication, 7(2), 209–218.
- Business Wire. (2017). Global internet of things devices market size to reach USD 1,374.93 billion by 2021: Technavio. Retrieved February 16, 2017 from http://www.businesswire.com/news/home/20170216005601/en/Global-Internet-Devices-Market-Size-Reach-USD
- Businessinsider.com. (2014, August 2). The 6 basic building blocks of the things in the “Internet of Things.” Retrieved October 5, 2015, from http://www.businessinsider.com/defining-the-the-internet-of-things-2013-12
- Calvert, J. (2016, March 8). Secure your systems, Defend your data. Retrieved August 4, 2016 from https://www.schillingspartners.com/news-and-opinion/secure-your-systems-defend-your-data
- Chacos, B. (2015) Bloatware: How, why and good-bye [PC World online forum]. Retrieved on June 15, 2016 from http://www.pcworld.com/article/2890114/lenovo-vows-to-stop-shipping-pcs-with-third-party-bloatware-after-superfish-fiasco.html
- Chevillard, S. V., Guri, G., Frete, O., Clari, F., Gluhak, A., Vermesan, O., … Moretto, P. (2016). Report on the factors of user’s acceptance framework and societal and education stakeholders. H2020 – Unify-IoT Project. 58 pages. Retrieved February 18, 2017 from http://www.internet-of-things-research.eu/pdf/D04_01_WP04_H2020_UNIFY-IoT_Final.pdf
- Cisco. (2016). Cisco online privacy statement. Retrieved February 13, 2017 from http://www.cisco.com/web/siteassets/legal/privacy_full.html
- Cognizant Technology Solutions. (2017). Privacy. Retrieved February 18, 2017 from https://www1.cognizant.com/privacy
- Dutton, W. H. (2014, November 20). Putting things to work: Social and policy challenges to the Internet of Things. Info, 16, 1–21. doi:10.1108/info-09-2013-0047
- European Union. (1995). Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, 23/ 11/1995P. 0031 – 005. Retrieved from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
- Facebook. (2016). Workplace Premium Privacy Policy . Retrieved February 13, 2017 from https://www.facebook.com/legal/FB_Work_Privacy
- Federal Trade Commission. (2016). In the matter of the benefits, challenges, and potential roles for the government in fostering the advancement of the Internet of Things (Docket No. 160331306-6306-01). Retrieved from https://www.ftc.gov/system/files/documents/advocacy_documents/comment-staff-bureau-consumer-protection-office-policy-planning-national-telecommunications/160603ntiacomment.pdf
- Goodman, E. P. (Ed.). (2015). The atomic age of data: Policies for the internet of things. Washington, D. C., USA: The Aspen Institute.
- Google. (2017). Welcome to the google privacy policy. Retrieved February 13, 2017 from https://www.google.com/policies/privacy/
- Government of India. (2015). Draft policy on Internet of Things. Retrieved October 30, 2015, from https://mygov.in/sites/default/files/master_image/Revised-Draft-IoT-Policy-2.pdf/
- Greengard, S. (2015). The Internet of Things. Boston: MIT Press.
- Hense, M., Hermerschmidt, L., Kerpen, D. K., Haubling, R., Rumpe, B., & Wehrle, K. (2015). A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computer Systems, 56, 701–718.
- Hewlett Packard (2016). HP privacy statement. Retrieved February 13, 2017 from http://www8.hp.com/us/en/privacy/privacy.html
- Higginbotham, S. (2015). Companies need to share how they use our data. Here are some ideas. Retrieved February 16, 2017 from http://fortune.com/2015/07/06/consumer-data-privacy/
- Huber, S. (2016, June). The forgotten part of the security equation. Retrieved on July 12, 2016 from https://www.voxxed.com/blog/2016/06/securityequation/
- Hull, G. (2015). Successful failure: What Foucault can teach us about privacy self-management in a world of Facebook and other big data. Ethics and Information Technology, 17, 89–101. doi:10.1007/s10676-015-9363-z
- IBM. (2016). IBM online privacy statement. Retrieved February 12 from https://www.ibm.com/privacy/details/us/en/
- Intel. (2016). Intel privacy notice. Retrieved February 13, 2017 from http://www.intel.com/content/www/us/en/privacy/intel-privacy-notice.html
- International Monetary Fund. (2013). General data dissemination system. Washington, D. C.: Author. Retrieved February 24, 2015, from http://www.imf.org/external/pubs/ft/gdds/guide/2013/gddsguide13.pdf
- Intuit (2016). Intuit privacy statement. Retrieved February 13, 2017 from https://security.intuit.com/index.php/privacy
- ISO 9001. (2016). 5.3.3 communication. Retrieved September 4, 2016 from http://www.iso-9001-checklist.co.uk/tutorial/5.3.3-communication.htm
- Jing, Q., Valilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.
- Johnson, S. (2014). Internet of Things will transform life, but experts fear for privacy and personal data. Retrieved May 23, 2016 from http://www.mercurynews.com/business/ci_26845396/internet-things-will-transform-life-but-experts-fear
- Kaupins, G. E., & Minch, R. (2006). Legal and ethical implications of employee location monitoring. International Journal of Technology and Human Interaction, 2, 16–35.
- Kaupins, G. E., & Park, S. (2010, December). Legal and ethical implications of corporate social networks. Employee Responsibilities and Rights Journal, 22(4). Retrieved from http://www.springerlink.com/content/446x810tx0134588
- Kaur, N., & Sood, S. K. (2015). A game theoretic approach for an IoT-based automated employee performance evaluation. IEEE Systems Journal, PP Issue, 99, 1–10.
- Kerner, S. M. (2015, February 23). Lenovo now acknowledges Superfish adware risks. Eweek. Retrieved July 8, 2016 from http://www.eweek.com/security/lenovo-now-acknowledges-superfish-adware-risks.html
- Kerschberg, B. (2011). Corporate policy management. Retrieved November 9, 2015, from http://www.forbes.com/sites/benkerschberg/2011/06/28/corporate-policy-management/
- Kitchin, R. (2014). Big data, open, data, data infrastructures, & their consequences. Thousand Oaks, CA, USA: Sage.
- Kranenburg, R., Anzelmo, E., Bassi, A., Caprio, D., Dodson, S., & Ratto, M. (2011) The internet of things. Draft paper for the 1st Berlin symposium on the internet and society, 83 pages. Retrieved February 16, 2017 from https://www.researchgate.net/profile/Matt_Ratto/publication/228360933_The_Internet_of_Things/links/0912f513755ebd1e87000000.pdf
- Libelium.com (2017). 50 sensor applications for a smarter world. Retrieved February 16, 2017 from http://www.libelium.com/resources/top_50_iot_sensor_applications_ranking/
- Loewenthal, M. (2014). Internet of Things: Current privacy policies don’t work. Retrieved October 30, 2015, from http://www.informationweek.com/big-data/hardware-architectures/internet-of-things-current-privacy-policies-dont-work/a/d-id/1278925
- Malcolm Baldrige National Quality Award. (2015). Malcolm Baldrige National Quality Award (MBMQA). Retrieved July 9, 2015, from http://asq.org/learn-about-quality/malcolm-baldrige-award/overview/overview.html
- Mayhew, S. (2016, June 12). Perkotek introduces new fingerprint attendance control software. Biometric update.com. Retrieved June 22, 2016 from http://www.biometricupdate.com/201606/perkotek-introduces-new-fingerprint-attendance-control-software
- McGrath, J. (2004). Loving big brother: Performance, privacy, and surveillance space. London: Routledge.
- Mead, N. R., Miyazaki, S., & Zhan, J. (2011). Integrating privacy requirements considerations into a security requirements engineering method and tool. International Journal of Information Privacy, Security, and Integrity, 1, 106–126.
- Microsoft. (2016). Internet of Things. Retrieved March 30, 2016 from https://www.microsoft.com/en-us/server-cloud/internet-of-things/azure-iot-suite.aspx
- Microsoft. (2017). Microsoft privacy statement. Retrieved February 12, 2017 from https://privacy.microsoft.com/en-US/
- Nasdaq.com. (2017). Technology companies. Retrieved February 3, 2017 from http://www.nasdaq.com/screening/companies-by-industry.aspx?industry=Technology&sortname=marketcap&sorttype=1
- Nieweler, A. (2016). Code of ethics and code of conduct—What’s the Difference? Retrieved August 14, 2016 from https://www.whistleblowersecurity.com/blog/code-of-conduct-whats-the-difference
- Nordrum, A. (2016, November 10). Wanted: Smart public policy for Internet of Things security. Retrieved February 15, 2017 from http://spectrum.ieee.org/tech-talk/telecom/security/wanted-smart-public-policy-for-internet-of-things-security
- NVIDIA. (2016) NVIDIA Privacy policy/your California privacy rights. Retrieved February 13, 2017 from https://www.nvidia.com/en-us/about-nvidia/privacy-policy/
- Oracle. (2016). Oracle internet of things. Retrieved March 30, 2016 from https://www.oracle.com/solutions/internet-of-things/index.html
- Oracle. (2017). Oracle privacy policy. Retrieved February 12, 2017 from https://www.oracle.com/legal/privacy/privacy-policy.html
- Organization for Economic Cooperation and Development. (2013). OECD guidelines on the protection of privacy and trans border flows of personal data. Retrieved February 26, 2015, from http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
- P3PSeal. (2016). P3P privacy seal online privacy protection program. Retrieved October 13, 2016 from http://www.p3pseal.com
- Peppett, S. R. (2014). Regulating the Internet of Things: First steps toward managing discrimination, privacy, security, and consent. Texas Law Review, 93, 85–178.
- Ponemon Institute. (2016). 2016 Cost of data breach study: Global analysis. Retrieved September 30, 2015 from https://www2.idexpertscorp.com/sixth-annual-ponemon-benchmark-study-on-privacy-security-of-healthcare-data-incidents?utm_source=Paid%20Ad&utm_medium=Ponemon-Study2016&utm_campaign=Bing
- Postscapes.com. (2016). Government and the Internet of Things [Postscapes website]. Retrieved September 6, 2016 from http://www.postscapes.com/roundup-government-and-the-internet-of-things/
- Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of Things. Computer, 44, 51–58.
- Salesforce.com. (2016). Privacy. Retrieved February 13, 2017 from https://www.salesforce.com/company/privacy/
- Schlossberg, J. M. (2016). Illinois enacts amendments to the personal information protection act [Society for human resource management website]. Retrieved June 16, 2016 from https://www.shrm.org/legalissues/stateandlocalresources/pages/illinois-personal-information.aspx
- Sheppard, D. (2016, February 1). The internet of things v privacy: What it means for the workplace [Legal Updates]. Clarks Legal: The Diverse Law Firm. Retrieved from https://www.clarkslegal.com/Legal_Updates/Read/The_Internet_of_Things_v_Privacy_what_it_means_for_the_workplace
- Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146–164.
- Smith, M. S. (2015, November/December). Protecting privacy in an IoT-connected world. Information Management, 49, 36–39.
- Suby, M. P. (2015). BYOD done right is a win-win for workforce mobility [White Paper]. Retrieved on May 26, 2016, from http://www.slideshare.net/SamsungBusinessUSA/byod-done-right-is-a-winwin-for-workforce-mobility
- Texas Instruments. (2015). Texas Instruments online privacy policy. Retrieved February 13, 2017 from http://www.ti.com/corp/docs/legal/privacy.shtml
- Thierer, A. D. (2015). The Internet of Things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond Journal of Law and Technology, 21, 118. doi:10.2139/ssrn.2494382
- TRUSTe (2016). Certification standards. Retrieved October 13, 2016 from https://www.truste.com/privacy-certification-standards/
- United Nations Global Pulse. (2015). Privacy and data protection. Retrieved February 26, 2015, from http://www.unglobalpulse.org/privacy-and-data-protection
- U. S. Small Business Administration (2014). Retrieved September 2, 2014 from http://www.sba.gov/content/privacy-law
- Vermesan, O., & Friess, P. (2011). Internet of things global technological and societal trends. Aalborg, Denmark: River Publishers.
- VMware. (2016). VMware privacy policy. Retrieved March 29, 2016 from https://www.vmware.com/help/privacy
- Weber, R. (2009). Internet of Things: Need for a new legal environment? Computer Law and Security Review, 25, 522–527.
- Yahoo! (2016). Yahoo Privacy Center. Retrieved February 13, 2017 from https://policies.yahoo.com/us/en/yahoo/privacy/index.htm
- Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7, 2728–2742.