1. Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: 17th ACM Symposium on Access Control Models and Technologies, pp. 13–22 (2012)
2. Thurm, S., Kane, Y.: Your Apps Are Watching You. Wall Street Journal. http://online.wsj.com/news/articles/SB10001424052748704694004576020083703574602?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052748704694004576020083703574602.html . Accessed 2010
3. Papanikolaou, N., Creese, S., Goldsmith, M.: Refinement checking for privacy policies. Sci. Comput. Program. 77, 1198–1209 (2012)
4. European Union Directive: EUR-Lex. Access to European Union Law. http://eur-lex.europa.eu/search.html?qid=1516438784094&text=GDPR&scope=EURLEX&type=quick&lang=en . Accessed 2017
5. Westin, A.: Privacy and Freedom. Atheneum Publishers, New York (1967)