F. Stutzman, R. Gross, and A. Acquisti, Silent Listeners: The evolution of privacy and disclosure on Facebook, Journal of privacy and confidentiality, vol.4, pp.7-41, 2012.

N. Wang, H. Xu, and J. Grossklags, Third-party apps on Facebook, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT '11, p.4, 2011.
DOI : 10.1145/2076444.2076448

S. Gutwirth and M. Hildebrandt, Some Caveats on Profiling, Data Protection in a Profiled World, pp.31-41, 2010.
DOI : 10.1007/978-90-481-8865-9_2

B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, Smart, useful, scary, creepy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, p.4, 2012.
DOI : 10.1145/2335356.2335362

R. Heyman, R. De-wolf, and J. Pierson, Not all privacy settings are created equal -evaluating social media privacy settings for personal and advertising purposes, 2012.

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068823

N. Wang, J. Grossklags, and H. Xu, An online experiment of privacy authorization dialogues for social applications, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.261-272, 2013.
DOI : 10.1145/2441776.2441807

D. Beer, Power through the algorithm? Participatory web cultures and the technological unconscious, New Media & Society, vol.24, issue.3, pp.985-1002, 2009.
DOI : 10.1177/1461444809336551

E. Pariser, The filter bubble : what the Internet is hiding from you, 2011.
DOI : 10.3139/9783446431164

A. Korolova, Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010.
DOI : 10.1109/ICDMW.2010.137

R. Heyman and J. Pierson, Social media use and corporate dataveillance: exploring and assessing digital Personal Identifiable Information (PII) collection tools, 2011.

A. M. Kaplan and M. Haenlein, Users of the world, unite! The challenges and opportunities of Social Media, Business Horizons, vol.53, issue.1, pp.59-68, 2010.
DOI : 10.1016/j.bushor.2009.09.003

D. M. Boyd and N. B. Ellison, Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2008.
DOI : 10.1111/j.1083-6101.2007.00393.x

V. Ciriani, S. Capitani-di-vimercati, S. Foresti, and P. Samarati, k-anonymity. Secure Data Management in Decentralized Systems, pp.323-353, 2007.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

P. Ballon, Business modelling revisited: the configuration of control and value. info, pp.6-19, 2007.

H. Bouwman, T. Haaker, and H. De-vos, Designing Business Models: a practical and holistic approach, Telematica Institute, 2005.

V. Allee, Value-creating networks: organizational issues and challenges. The Learning Organization, pp.427-442, 2009.

D. Knapp and E. Marouli, Adex Benchmark 2011, European online advertising expenditure, IAB Europe, 2012.

M. Pfadenhauer, At Eye Level: The Expert Interview ??? a Talk between Expert and Quasi-expert, pp.81-97
DOI : 10.1057/9780230244276_4

W. Bandara, M. Indulska, S. Chong, and S. Sadiq, Major issues in business process management: an expert perspective, 2007.

C. Welch, R. Marschan-piekkari, H. Penttinen, and M. Tahvanainen, Corporate elites as informants in qualitative international business research, International Business Review, vol.11, issue.5, pp.611-628, 2002.
DOI : 10.1016/S0969-5931(02)00039-2

G. Decocker, Bdma in het kort, 2009.