G. Iachello and J. Hong, End-user privacy in human-computer interaction. Foundations and Trends in Human, Computer Interaction, vol.1, issue.1, pp.1-137, 2007.
DOI : 10.1561/1100000004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Vitak, P. Wisniewski, X. Page, A. Lampinen, E. Litt et al., The Future of Networked Privacy, Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, CSCW'15 Companion, pp.267-272
DOI : 10.1145/2685553.2685554

P. Dourish and K. Anderson, Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction, pp.319-342, 2006.
DOI : 10.1207/s15327051hci2103_2

P. Wisniewski, H. Lipford, and D. Wilson, Fighting for my space, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.609-618, 2012.
DOI : 10.1145/2207676.2207761

A. Lampinen, F. Stutzman, and M. Bylund, Privacy for a Networked World, Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA '11, pp.2441-2444, 2011.
DOI : 10.1145/1979742.1979579

C. Workshop, Bridging the Gap between Privacy by Design and Privacy in Prac- tice. Call for Participation, 2016.

M. Boyle and S. Greenberg, The language of privacy, ACM Transactions on Computer-Human Interaction, vol.12, issue.2, pp.328-370, 2005.
DOI : 10.1145/1067860.1067868

A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, We're in it together, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.3217-3226, 2011.
DOI : 10.1145/1978942.1979420

P. Wisniewski, A. K. Islam, B. P. Knijnenburg, and S. Patil, Give Social Network Users the Privacy They Want, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.1427-1441, 2015.
DOI : 10.1145/2675133.2675256

R. Gross and A. Acquisti, Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005.
DOI : 10.1145/1102199.1102214

D. M. Boyd and N. B. Ellison, Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2008.
DOI : 10.1111/j.1083-6101.2007.00393.x

J. H. Kietzmann, K. Hermkens, I. P. Mccarthy, and B. S. Silvestre, Social media? Get serious! Understanding the functional building blocks of social media, Business Horizons, vol.54, issue.3, pp.241-251, 2011.
DOI : 10.1016/j.bushor.2011.01.005

I. Altman, The Environment and Social Behavior -Privacy, Personal Space, Territory, Crowding, 1975.

L. Palen and P. Dourish, Unpacking "privacy" for a networked world, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.129-136, 2003.
DOI : 10.1145/642611.642635

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

X. Tan, L. Qin, Y. Kim, and J. Hsu, Impact of privacy concern in social networking web sites, Internet Research, vol.22, issue.2, pp.211-233, 2012.
DOI : 10.1108/10662241211214575

M. J. Metzger and S. Docter, Public Opinion and Policy Initiatives for Online Privacy Protection, Journal of Broadcasting & Electronic Media, vol.17, issue.2, pp.350-374, 2003.
DOI : 10.1145/272287.272299

M. Z. Yao, R. E. Rice, and K. Wallis, Predicting user concerns about online privacy, Journal of the American Society for Information Science and Technology, vol.38, issue.5, pp.710-722, 2007.
DOI : 10.1002/asi.20530

P. Karr-wisniewski, D. Wilson, and H. Richter-lipford, A new social order: Mechanisms for social network site boundary regulation, Proceedings of Americas Conference on Information Systems, pp.1-8, 2011.

P. Wisniewski, A. K. Islam, H. Richter-lipford, and D. C. Wilson, Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users, Comm. of the AIS, vol.38, pp.235-258, 2016.

A. Besmer, H. Richter-lipford, E. Mynatt, G. Fitzpatrick, S. Hudson et al., Moving beyond untagging, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1563-1572
DOI : 10.1145/1753326.1753560

T. Boren and J. Ramey, Thinking aloud: reconciling theory and practice, IEEE Transactions on Professional Communication, vol.43, issue.3, pp.261-278, 2000.
DOI : 10.1109/47.867942

M. Hertzum, K. D. Hansen, and H. H. Andersen, Scrutinising usability evaluation: does thinking aloud affect behaviour and mental workload?, Behaviour & Information Technology, vol.28, issue.2, pp.165-181, 2009.
DOI : 10.1080/01449290701773842

N. S. Good and A. Krekelberg, Usability and privacy, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.137-144, 2003.
DOI : 10.1145/642611.642636

A. Bruun, J. Stage, J. Abascal, S. Barbosa, M. Fetter et al., An Empirical Study of the Effects of Three Think-Aloud Protocols on Identification of Usability Problems, Human-Computer Interaction -INTERACT 2015, pp.159-176, 2015.
DOI : 10.1007/978-3-319-22668-2_14

N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley et al., Understanding and capturing people???s privacy policies in a mobile social networking application, Personal and Ubiquitous Computing, vol.10, issue.1, pp.401-412, 2009.
DOI : 10.1007/s00779-008-0214-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Whitten and J. D. Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Proceedings of the 8 th USENIX Security Symposium, pp.169-184, 1999.