1. K.A. Hild, "Leave Me alone: Protecting Children's Privacy in the Digital Age." Georgetown University, 2017.
2. L.B. Rafferty, "Toy Computing Background: Mobile Services For Toy Computing." Springer International Publishing, 2015. Page(s):10–37.
3. A study of privacy requirements for smart toys;Hung,2016
4. Toys that listen: a study of parents, children, and internet-connected toys;Mcreynolds;CHI,2017
5. NIST. "Guide For Security-Focused Configuration Management of Information Systems." (2011)[Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128.pdf [Accessed: 9 Dec. 2017 ].