1. Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems (CHI 2003), pp. 129–136. ACM Press, New York (2003)
2. Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440–454 (2004)
3. Bettini, C., Mascetti, S., Wang, X.S.: Privacy Protection through Anonymity in Location-based Services. In: Handbook of Database Security: Applications and Trends, pp. 509–530 (2008)
4. Riboni, D., Pareschi, L., Bettini, C.: Shadow attacks on users’ anonymity in pervasive computing environments. Pervasive and Mobile Computing 4(6), 819–835 (2008)
5. Atallah, M.J., Frikken, K.B.: Privacy-Preserving Location-Dependent Query Processing. In: ICPS 2004: Proceedings of the The IEEE/ACS International Conference on Pervasive Services, pp. 9–17. IEEE Computer Society Press, Los Alamitos (2004)