1. Apple (2016). Apple Secure Coding Guide [Online]. Available at: https://developer.apple.com/library/archive/documentation/Security/Conceptual/SecureCodingGuide/Introduction.html [Accessed: June 2020].
2. Boeckl K., Fagan M., Fisher W., Lefkovitz N., Megas K. N., Nadeau E., Piccarreta B., O’Rourke D. G., Scarfone K. (2019). Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks, NISTIR 8228, National Institute of Standards and Technology, US Department of Commerce.
3. CGSR (2019). Consumer Protection (Consume Goods Safety Requirements) Regulations (CGSR) [Online]. Available at: https://www.enterprisesg.gov.sg/quality-standards/consumer-protection/for-suppliers/regulations-and-guidelines-for-suppliers/regulations-and-guidelines-for-suppliers/consumer-protection-consumer-goods-safety-requirements-regulations [Accessed: December, 2019].
4. Early years movement skills: Description, diagnosis and intervention;Chambers,2006
5. Chaudron S., Di Gioia R., Gemo M., Holloway D., Marsh J., Mascheroni G., Peter J., Yamada-Rice D. (2017). Kaleidoscope on the Internet of Toys - Safety, security, privacy and societal insights, EUR 28397 EN, doi:10.2788/05383.