End-user privacy in human-computer interaction. Foundations and Trends in Human, Computer Interaction, vol.1, issue.1, pp.1-137, 2007. ,
DOI : 10.1561/1100000004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.2788
The Future of Networked Privacy, Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, CSCW'15 Companion, pp.267-272 ,
DOI : 10.1145/2685553.2685554
Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction, pp.319-342, 2006. ,
DOI : 10.1207/s15327051hci2103_2
Fighting for my space, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.609-618, 2012. ,
DOI : 10.1145/2207676.2207761
Privacy for a Networked World, Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA '11, pp.2441-2444, 2011. ,
DOI : 10.1145/1979742.1979579
Bridging the Gap between Privacy by Design and Privacy in Prac- tice. Call for Participation, 2016. ,
The language of privacy, ACM Transactions on Computer-Human Interaction, vol.12, issue.2, pp.328-370, 2005. ,
DOI : 10.1145/1067860.1067868
We're in it together, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.3217-3226, 2011. ,
DOI : 10.1145/1978942.1979420
Give Social Network Users the Privacy They Want, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.1427-1441, 2015. ,
DOI : 10.1145/2675133.2675256
Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005. ,
DOI : 10.1145/1102199.1102214
Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2008. ,
DOI : 10.1111/j.1083-6101.2007.00393.x
Social media? Get serious! Understanding the functional building blocks of social media, Business Horizons, vol.54, issue.3, pp.241-251, 2011. ,
DOI : 10.1016/j.bushor.2011.01.005
The Environment and Social Behavior -Privacy, Personal Space, Territory, Crowding, 1975. ,
Unpacking "privacy" for a networked world, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.129-136, 2003. ,
DOI : 10.1145/642611.642635
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.7183
Impact of privacy concern in social networking web sites, Internet Research, vol.22, issue.2, pp.211-233, 2012. ,
DOI : 10.1108/10662241211214575
Public Opinion and Policy Initiatives for Online Privacy Protection, Journal of Broadcasting & Electronic Media, vol.17, issue.2, pp.350-374, 2003. ,
DOI : 10.1145/272287.272299
Predicting user concerns about online privacy, Journal of the American Society for Information Science and Technology, vol.38, issue.5, pp.710-722, 2007. ,
DOI : 10.1002/asi.20530
A new social order: Mechanisms for social network site boundary regulation, Proceedings of Americas Conference on Information Systems, pp.1-8, 2011. ,
Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users, Comm. of the AIS, vol.38, pp.235-258, 2016. ,
Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1563-1572 ,
DOI : 10.1145/1753326.1753560
Thinking aloud: reconciling theory and practice, IEEE Transactions on Professional Communication, vol.43, issue.3, pp.261-278, 2000. ,
DOI : 10.1109/47.867942
Scrutinising usability evaluation: does thinking aloud affect behaviour and mental workload?, Behaviour & Information Technology, vol.28, issue.2, pp.165-181, 2009. ,
DOI : 10.1080/01449290701773842
Usability and privacy, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.137-144, 2003. ,
DOI : 10.1145/642611.642636
An Empirical Study of the Effects of Three Think-Aloud Protocols on Identification of Usability Problems, Human-Computer Interaction -INTERACT 2015, pp.159-176, 2015. ,
DOI : 10.1007/978-3-319-22668-2_14
Understanding and capturing people???s privacy policies in a mobile social networking application, Personal and Ubiquitous Computing, vol.10, issue.1, pp.401-412, 2009. ,
DOI : 10.1007/s00779-008-0214-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.8994
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Proceedings of the 8 th USENIX Security Symposium, pp.169-184, 1999. ,