Silent Listeners: The evolution of privacy and disclosure on Facebook, Journal of privacy and confidentiality, vol.4, pp.7-41, 2012. ,
Third-party apps on Facebook, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT '11, p.4, 2011. ,
DOI : 10.1145/2076444.2076448
Some Caveats on Profiling, Data Protection in a Profiled World, pp.31-41, 2010. ,
DOI : 10.1007/978-90-481-8865-9_2
Smart, useful, scary, creepy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, p.4, 2012. ,
DOI : 10.1145/2335356.2335362
Not all privacy settings are created equal -evaluating social media privacy settings for personal and advertising purposes, 2012. ,
Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011. ,
DOI : 10.1145/2068816.2068823
An online experiment of privacy authorization dialogues for social applications, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.261-272, 2013. ,
DOI : 10.1145/2441776.2441807
Power through the algorithm? Participatory web cultures and the technological unconscious, New Media & Society, vol.24, issue.3, pp.985-1002, 2009. ,
DOI : 10.1177/1461444809336551
The filter bubble : what the Internet is hiding from you, 2011. ,
DOI : 10.3139/9783446431164
Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010. ,
DOI : 10.1109/ICDMW.2010.137
Social media use and corporate dataveillance: exploring and assessing digital Personal Identifiable Information (PII) collection tools, 2011. ,
Users of the world, unite! The challenges and opportunities of Social Media, Business Horizons, vol.53, issue.1, pp.59-68, 2010. ,
DOI : 10.1016/j.bushor.2009.09.003
Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2008. ,
DOI : 10.1111/j.1083-6101.2007.00393.x
k-anonymity. Secure Data Management in Decentralized Systems, pp.323-353, 2007. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Business modelling revisited: the configuration of control and value. info, pp.6-19, 2007. ,
Designing Business Models: a practical and holistic approach, Telematica Institute, 2005. ,
Value-creating networks: organizational issues and challenges. The Learning Organization, pp.427-442, 2009. ,
Adex Benchmark 2011, European online advertising expenditure, IAB Europe, 2012. ,
At Eye Level: The Expert Interview ??? a Talk between Expert and Quasi-expert, pp.81-97 ,
DOI : 10.1057/9780230244276_4
Major issues in business process management: an expert perspective, 2007. ,
Corporate elites as informants in qualitative international business research, International Business Review, vol.11, issue.5, pp.611-628, 2002. ,
DOI : 10.1016/S0969-5931(02)00039-2
Bdma in het kort, 2009. ,