References
[1]. Abelson, H., Ledeen, K. and Lewis, H., (2008). Blown to
bits: your life, liberty, and happiness after the digital
explosion,. 1st ed. s.l.:Addison-Wesley Professional.
[2]. Accenture, (2014). “Racing Towards a Complete Digital Lifestyle: Digital Consumers Crave More”:
Accentrue Digital Consumer Survey, s.l.: s.n.
[3]. Ackerman, L., (2013). Mobile Health and Fitness
Applications and Information Privacy, San Diego: Privacy
Right Clearinghouse.
[4]. Barcena, M. B., Wueest, C. and Lau, H., (2014).
“Security Response: How safe is your quantified self?”, s.l.:
Symantec.
[5]. Becker, B. W. (2014). “The Quantified Self: Balancing
Privacy and Personal”. Behavioural and Social Sciences
Librarian, Vol. 33, No. 4, pp. 212-215.
[6]. Buchanan, T. et al., (2007). “Internet users' perceptions
of 'privacy concerns' and 'privacy actions”. International
Journal of Human-Computer Studies, Vol. 65, pp. 526-
536.
[7]. Common Sense Media, (2009). Digital Literacy and
Citizenship, in the 21st century. s.l.:s.n.
[8]. Cortez, N., (2013). The Mobile Health revolution?, UC
Davis Law Review, Volume 47.
[9]. Davies, N., (2003). “Security and Privacy”. Persuasive
Computing IEEE, Vol. 2(1), pp. 20.
[10]. Executive office of the President, (2014). Big Data:
Seizing opportunities, Preserving values, Washington: The
White House.
[11]. Gavison, R. E., (1980). “Privacy and the Limits of Law”.
The Yale Law Journal, Vol. 89, No. 3, pp. 421-471.
[12]. Hawkins, N. et al., (2010). “Assessing the Privacy Risks
of Data Sharing in Genomics”. Public Health Genomics,
Vol. 14, No. 1, pp. 17-25.
[13]. Ho, J.-J., Novick, S. and Yeung, C., (2014). A
Snapshot of Data Sharing by Select Health and Fitness
Apps, s.l.:Federal Trade Commission.
[14]. Hoofnagle, C., King, J., Li, S. and Turow, J., (2010).
“How different are young adults from older adults when it
come to information attitudes and policies?” s.l.:s.n.
[15]. Jones, D. and Paton, B., (2014). What Price? The
currency of Privacy,. Sydney : Reactive.
[16]. Khan, M. Y., Darwish, A. & Tyagi, S., (2014).
“Managing computing infrastructure for IoT Data”.
Advances in Internet of Things, Vol.4, pp. 29-35.
[17]. Mann, S., (2014). The Encyclopedia of Human-
Computer Interaction,. 2nd ed. Aarhus: The Interaction
Design Foundation.
[18]. May, T., (2011). Social Research. 4th ed.
Maidenhead: Open University Press.
[19]. McGivern, Y., (2008). The practice of market
research: An introduction,. s.l.:Pearson Education .
[20]. Park, S. and Jayaraman, S., (2014). “A
Transdisciplinary Approach to Wearables”, Big Data and
Quality of Life. IEEE, pp. 4155-4158.
[21]. Pricewaterhousecoopers, (2014). The Wearable
Future, s.l.: s.n.
[22]. Ribble, M. S., Bailey, G. D. and Ross, T. W., (2004).
“Digital citizenship: Addressing Appropriate Technology
Behaviour”. Learning and Leading with Technology, Vol.
32, pp. 6-11.
[23]. Robson, C., (2002). Real World Research,. 2nd ed.
Oxford: Blackwell Publishing.
[24]. Shilton, K., (2009). “Four Billion Little Brothers: Privacy,
mobile phones and ubiquitous data collection”.
Communication of the ACM, Vol. 52, No. 11, pp. 49-53.
[25]. Shin, D.-H., (2010). “The effects of trust, security and
privacy in social networking: A security-based approach
to understand the pattern of adoption”. Interacting with
Computers, Vol. 22, No. 5, pp. 428-438.
[26]. Solove, D. J., (2008). Understanding Privacy,.
s.l.:Harvard University Press.
[27]. Spiekermann, S. and Novotny, A., (2015). “A vision for
global privacy bridges: Technical and legal measures for
international data markets”. Computer Law and Security
Review, Vol. 31, No. 2, pp. 181-200.
[28]. Thierer, A. (2014a). “The Internet of things and
Wearable technology”, Arlington: Mercatus Centre.
[29]. Thierer, A. (2014b). “Privacy Law's Precautionary
Principle Problem”. Maine Law Review, Vol. 66, No. 2,
pp.482-486.
[30]. Walters, R., (2014). Cyber attacks on US Companies
in 2014, s.l.: The Heritage Foundation.
[31]. Weintraub, K., (2013). “Quantified self: The techbased
route to a better life?”. [Online]. Retrieved from: http://scripts.mit.edu/~schull/nds/wp-content/uploads/2013/01/bbc.pdf[Accessed
21/08/2015].