1. Using and validating the strategic alignment model
2. Bardram, J. E., Kjaer, R. E., & Pedersen, M. Ö. (2003). Context-aware user authentication – Supporting proximity-based login. In Proceedings of the Ubiquitous Computing 5th International Conference. Seattle, WA: Academic Press.
3. Barfield, W. (2006). Information privacy as a function of facial recognition technology and wearable computers (Legal Series Paper 1739). Berkeley, CA: Berkeley Electronic Press. Retrieved from http://law.bepress.com/expresso/eps/1739
4. Bluetooth. (2009). Security. Retrieved April 4, 2012, from http://www.bluetooth.com/Pages/Simple-Secure-Everywhere.aspx
5. Boronowsky, M., Herzog, O., Knackfuss, P., & Lawo, M. (2005). wearIT@work – Empowering the mobile worker by wearable computing – The first results. In Proceedings of the AMI@work Forum Day, (pp. 38-45). Munich, Germany: AMI@work.