1. Apthorpe N, Reissman D and Feamster N (2016) “A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic”, Workshop on Data and Algorithmic Transparency (DAT ‘16), November 19. New York,
http://datworkshop.org/papers/dat16-final37.pdf
[accessed 03–07-2017]
2. Chiang M and Shi W (2016) Workshop report on grand challenges in edge computing, National Science Foundation.
http://iot.eng.wayne.edu/edge/finalreport.php
[accessed 03–07-2017]
3. Crabtree A, Lodge T, Colley J, Greenhalgh C, Mortier R, Haddadi H (2016) Enabling the new economic actor: data protection, the digital economy, and the Databox. Personal and Ubiquitous Computing 20(6):947–957
4. Crabtree A, Lodge T, Colley J, Greenhalgh C and Mortier R (in print) Accountable internet of things? Outline of the IoT databox model, Proc. of WoWMoM (IoT SoS workshop), Macau, IEEE.
http://eprints.nottingham.ac.uk/42233/1/IoT_SoS.pdf
[accessed 03–07-2017]
5. Garfinkel H (1967) Studies in ethnomethodology. Prentice-Hall, Englewood Cliffs