1. Aitken, M., Toreini, E., Carmichael, P., Coopamootoo, K., Elliott, K., & van Moorsel, A. (2020). Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data & Society, 7(1), 2053951720908892.
2. Goodin, D., & Technica, A. (2015). 9 Baby monitors wide open to hacks that expose users’ most private moments. [Online]. Available: http://tinyurl.com/ya7w43e9
3. Bhardwaj, A., Al-Turjman, F., Kumar, M., Stephan, T., & Mostarda, L. (2020). Capturing-the-Invisible (CTI): Behavior-based attacks recognition in IoT-oriented industrial control systems. IEEE Access, 1–1. https://doi.org/10.1109/ACCESS.2020.2998983
4. Hirsch, J., & Los Angeles Times. (2015). Hackers can now hitch a ride on car computers. [Online]. Available: http://www.latimes.com/business/autos/la-fi-hy-car-hacking-20150914-story.html
5. Atheron, K. D., & Popular Science. (2015). Hackers can tap into hospital drug pumps to serve lethal doses to patients. [Online]. Available: http://tinyurl.com/qfscthv