Aggarwal, C. C., & Wang, H. 2011. Text mining in social networks. In Social network data analytics (pp. 353-378). Springer, Boston, MA. Alur, R., E. Berger, A. W. Drobnis, L. Fix, K. Fu, G. D. Hager, D. Lopresti, K. Nahrstedt, E. Mynatt, S. Patel, J. Rexford, J. A. Stankovic, and B. Zorn. 2016. Systems Computing Challenges in the Internet of Things. https://arxiv.org/abs/1604.02980 (accessed Sep. 22, 2017). Daqiang, Z., G. Minyi, Z. Jingyu, K. Dazhou and C. Jiannong. 2010. Context reasoning using extended evidence theory in pervasive computing environments, Future Generation Computer Systems 26 (2): 207-216. Dijkman, R. M., B. Sprenkels, T. Peeters, and A. Janssen. 2015. Business models for the Internet of Things. International Journal of Information Management 35 (6): 672-678. Di Nardo, J. V. 2008. Biometric Technologies: Functionality, Emerging Trends, and Vulnerabilities. Journal of Applied Security Research 4 (1-2): 194-216. Eleonora, E. 2014. The Internet of Things vision: Key features, applications and open issues. Computer Communications 54: 1-31. Eunhwa, J., and K. Hong. 2015. Biometric verification based on facial profile images for mobile security. Journal of Systems and Information Technology 17 (1): 91-100. Farooq, M. U., M. Waseem, A. Khairi, and S. Mazhar. 2015. A Critical Analysis on the Security, Concerns of Internet of Things (IoT). International Journal of Computer Applications 111 (7): 1-6. Giroux, S., and H. Pigot. 2005. From smart homes to smart care: ICOST 2005. Washington: IOS Press. Han, S. S. 2005. Global city making in Singapore: a real estate perspective. Progress in Planning, 64 (2), 69-175. In, L., and L. Kyoochun. 2015. The Internet of things: Applications, investments, and challenges for enterprises. Business Horizons 58 (4): 431-440. Jain, A., K. Nandakumar, and A. Ross. 2005. Score normalization in multimodal biometric systems. Pattern Recognition 38 (12): 2270-2285. Nataliia, L., & Elena, F. (2015). Internet of things as a symbolic resource of power. Procedia-Social and Behavioral Sciences, 166, 521-525. O’droma, M., and I. Ganchev. 2010. The creation of a ubiquitous consumer wireless world through strategic ITU-T standardization, IEEE Communications Magazine 48 (10): 158–165. Srivastava, L. 2004. Japan’s ubiquitous mobile information society. Info 6 (4): 234–251. Ulrich, G., G. Peter, J. Benjamin, and L. Dennis. 2012. Multimedia content identification through smart meter power usage profiles. Proceedings of the International Conference on Information and Knowledge Engineering (IKE). Athens: 1-8. Venier, S. 2009. Ethical aspects of biometric identification technologies in a multicultural society. AECME annual meeting. Venice, 10–11 September. Verma, I., & Jain, S. K. (2015, March). Biometrics security system: A review of multimodal biometrics based techniques for generating crypto-key. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1189-1192). IEEE Villalbaa, A., J. L. Pe´reza, D. Carreraa, C. Pedrinacib, and L. Panzierab. 2015. servIoTicy and iServe: A Scalable Platform for Mining the IoT, Procedia Computer Science 52: 1022-1027. Xia, F., L. T. Yang, L. Wang, and A. Vinel. 2012. Internet of things. International Journal of Communication Systems 25 (9): 1101–1102. Zeng, D., S. Guo, and Z. Cheng. 2011. The web of things: a survey, Journal of Communications 6 (6): 424–438. Zhang, D., Zhang, D., Xiong, H., Hsu, C. H., & Vasilakos, A. V. (2014). BASA: building mobile Ad-Hoc social networks on top of android. IEEE Network, 28 (1), 4-9. Zhang, D., J. Zhou, M. Guo, J. Cao, and T. Li. 2011. tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems 22 (4): 558–570.