1. Hong, J. I., & Landay, J. A. (2004). An architecture for privacy-sensitive ubiquitous computing. MobiSys’04: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (pp. 177–189). ACM, New York.
2. Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media.
3. Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03) (pp. 129–136). ACM Press, New York.
4. Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2010). Designing the user interface: Strategies for effective human-computer interaction (5th ed.). Reading: Addison Wesley.
5. Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124). Berlin: Springer.