Issue No. 05 - May (2018 vol. 51)
Nir Kshetri , University of North Carolina at Greensboro
Jeffrey Voas , IEEE Fellow
Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can minimize the risks, but responsibility for monitoring smart toy usage ultimately lies with parents.
Internet, security of data
N. Kshetri and J. Voas, "Cyberthreats under the Bed," in Computer, vol. 51, no. 5, pp. 92-95, 2018.