1. Beckwith, R., Mainwaring, S.: Privacy: Personal information, threats, and technologies. In: Proc. ISTAS 2005, pp. 9–16. IEEE, Los Alamitos (2005)
2. Consolvo, S., Klasnja, P., McDonald, D.W., Avrahami, D., Froehlich, J., LeGrand, L., Libby, R., Mosher, K., Landay, J.: Flowers or robot armies? Encouraging awareness & activity with personal, mobile displays. In: Proc. UbiComp 2008, pp. 54–63. ACM Press, New York (2008)
3. Lecture Notes in Computer Science;G.R. Hayes,2004
4. Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, A., Abowd, G., Truong, K.N.: Physical, social, and experiential knowledge in pervasive computing environments. IEEE Pervasive Computing 6(4), 56–63 (2007)
5. Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M.: Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In: Proc. CHI 2006, pp. 1009–1018. ACM Press, New York (2006)