M. Fodor and A. Brem, Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany, Computers in Human Behavior, vol.53, pp.344-353, 2015.
DOI : 10.1016/j.chb.2015.06.048

C. Patsakis, A. Zigomitros, A. Papageorgiou, and E. Galván-lópez, Distributing privacy policies over multimedia content across multiple online social networks, Computer Networks, vol.75, pp.531-543, 2014.
DOI : 10.1016/j.comnet.2014.08.023

Y. Al-saggaf and S. Nielsen, Self-disclosure on Facebook among female users and its relationship to feelings of loneliness, Computers in Human Behavior, vol.36, issue.0, pp.460-468, 2014.
DOI : 10.1016/j.chb.2014.04.014

L. N. Zlatolas, T. Welzer, M. Heri?ko, and M. Hölbl, Privacy antecedents for SNS self-disclosure: The case of Facebook, Computers in Human Behavior, vol.45, pp.158-167, 2015.
DOI : 10.1016/j.chb.2014.12.012

M. Taddicken, The ???Privacy Paradox??? in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure, Journal of Computer-Mediated Communication, vol.11, issue.6, pp.248-273, 2014.
DOI : 10.1111/jcc4.12052

R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, Preventing Private Information Inference Attacks on Social Networks, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.8, pp.1849-1862, 2013.
DOI : 10.1109/TKDE.2012.120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7366

K. T. Kwak, S. K. Choi, and B. G. Lee, SNS flow, SNS self-disclosure and post hoc interpersonal relations change: Focused on Korean Facebook user, Computers in Human Behavior, vol.31, issue.0, pp.31-294, 2014.
DOI : 10.1016/j.chb.2013.10.046

S. Utz, The function of self-disclosure on social network sites: Not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection, Computers in Human Behavior, vol.45, issue.0, pp.1-10, 2015.
DOI : 10.1016/j.chb.2014.11.076

C. Chang, Self-construal and Facebook activities: Exploring differences in social interaction orientation, Computers in Human Behavior, vol.53, pp.91-101, 2015.
DOI : 10.1016/j.chb.2015.06.049

G. Biczók and P. H. Chia, Interdependent Privacy: Let Me Share Your Data, In: Financial Cryptography and Data Security, vol.7859, pp.338-353, 2013.
DOI : 10.1007/978-3-642-39884-1_29

L. Jin, J. B. Joshi, and M. Anwar, Mutual-friend based attacks in social network systems, Computers & Security, vol.37, pp.15-30, 2013.
DOI : 10.1016/j.cose.2013.04.003

J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan, Information Privacy Concern About Peer Disclosure in Online Social Networks, IEEE Transactions on Engineering Management, vol.62, issue.3, pp.311-324, 2015.
DOI : 10.1109/TEM.2015.2432117

D. M. Boyd and N. B. Ellison, Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2007.
DOI : 10.1111/j.1083-6101.2007.00393.x

O. K. Burmeister, M. Z. Islam, M. Dayhew, and M. Crichton, Enhancing client welfare through better communication of private mental health data between rural service providers, Australasian Journal of Information Systems, vol.19, pp.1-14, 2015.
DOI : 10.3127/ajis.v19i0.1206

M. Bernoth, E. Dietsch, O. K. Burmeister, and M. Schwartz, Information Management in Aged Care: Cases of Confidentiality and Elder Abuse, Journal of Business Ethics, vol.25, issue.2, pp.453-460, 2014.
DOI : 10.1007/s10551-013-1770-7

O. K. Burmeister, What Seniors Value About Online Community, The Journal of Community Informatics, vol.8, issue.1, pp.1-12, 2012.

O. K. Burmeister, Websites for seniors : Cognitive accessibility, International Journal of Emerging Technologies and Society, vol.8, issue.2, pp.99-113, 2010.

M. Conti, R. Poovendran, and M. Secchiero, FakeBook: Detecting Fake Profiles in On-Line Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.1071-1078, 2012.
DOI : 10.1109/ASONAM.2012.185

S. H. Ahmadinejad and P. W. Fong, Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems, Computers & Security, vol.44, pp.75-91, 2014.
DOI : 10.1016/j.cose.2014.04.004

A. Squicciarini, S. Karumanchi, D. Lin, and N. Desisto, Identifying hidden social circles for advanced privacy configuration, Computers & Security, vol.41, issue.0, pp.40-51, 2014.
DOI : 10.1016/j.cose.2013.07.007

A. C. Squicciarini, H. Xu, and X. Zhang, CoPE: Enabling collaborative privacy management in online social networks, Journal of the American Society for Information Science and Technology, vol.23, issue.10, pp.521-534, 2011.
DOI : 10.1002/asi.21473

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.5636

A. Acquisti, L. Brandimarte, and G. Loewenstein, Privacy and human behavior in the age of information, Science, vol.347, issue.6221, pp.509-514, 2015.
DOI : 10.1126/science.aaa1465

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011.
DOI : 10.1145/2068816.2068823

M. Madejski, M. L. Johnson, and S. M. Bellovin, The failure of online social network privacy settings, pp.1-20, 2011.

A. Masoumzadeh and J. Joshi, Privacy settings in social networking systems, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.149-154, 2013.
DOI : 10.1145/2484313.2484331

M. Netter, M. Riesner, M. Weber, and G. Pernul, Privacy Settings in Online Social Networks -- Preferences, Perception, and Reality, 2013 46th Hawaii International Conference on System Sciences, pp.3219-3228, 2013.
DOI : 10.1109/HICSS.2013.455

P. Anthonysamy, A. Rashid, and P. Greenwood, Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.1155-1158, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.150

Y. M. Baek, E. Kim, and Y. Bae, My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns, Computers in Human Behavior, vol.31, pp.48-56, 2014.
DOI : 10.1016/j.chb.2013.10.010

J. Staddon, D. Huffaker, L. Brown, and A. Sedley, Are privacy concerns a turn-off?, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-13, 2012.
DOI : 10.1145/2335356.2335370

J. Parra-arnau, A. Perego, E. Ferrari, J. Forne, and D. Rebollo-monedero, Privacy-Preserving Enhanced Collaborative Tagging, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.1, pp.180-193, 2014.
DOI : 10.1109/TKDE.2012.248

URL : http://hdl.handle.net/2117/21533

C. Lang and H. Barton, Just untag it: Exploring the management of undesirable Facebook photos, Computers in Human Behavior, vol.43, pp.147-155, 2015.
DOI : 10.1016/j.chb.2014.10.051

H. Hu, G. Ahn, and J. Jorgensen, Detecting and resolving privacy conflicts for collaborative data sharing in online social networks, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011.
DOI : 10.1145/2076732.2076747

P. Wisniewski, H. Xu, H. Lipford, and E. Bello-ogunu, Facebook apps and tagging: The trade-off between personal privacy and engaging with friends, Journal of the Association for Information Science and Technology, vol.12, issue.12, pp.1883-1896, 2015.
DOI : 10.1002/asi.23299

N. Wang, H. Xu, and J. Grossklags, Third-party apps on Facebook, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT '11, pp.1-10, 2011.
DOI : 10.1145/2076444.2076448

E. Ryu, Y. Rong, J. Li, and A. Machanavajjhala, curso: protect yourself from curse of attribute inference, Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, DBSocial '13, pp.13-18, 2013.
DOI : 10.1145/2484702.2484706

D. Y. Wohn and E. L. Spottswood, Reactions to other-generated face threats on Facebook and their relational consequences, Computers in Human Behavior, vol.57, pp.187-194, 2016.
DOI : 10.1016/j.chb.2015.12.021

E. Litt and E. Hargittai, A bumpy ride on the information superhighway: Exploring turbulence online, Computers in Human Behavior, vol.36, pp.520-529, 2014.
DOI : 10.1016/j.chb.2014.04.027

E. Litt, E. Spottswood, J. Birnholtz, J. T. Hancock, M. E. Smith et al., Awkward encounters of an "other" kind, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, CSCW '14, pp.449-460, 2004.
DOI : 10.1145/2531602.2531646

L. Chang, Baby role-play, or virtual kidnapping, is the most disturbing Instagram hashtag ever, http://www.digitaltrends.com/mobile/baby-role-play-virtual-kidnapping, 2015.

O. K. Burmeister, Applying the ACS code of ethics, Journal of Research and Practice in Information Technology, vol.32, issue.2, pp.107-120, 2000.

O. K. Burmeister and J. Weckert, Applying the new software engineering code of ethics to usability engineering: A study of four cases, Journal of Information, Communication and Ethics in Society, vol.1, issue.3, pp.119-132, 2003.
DOI : 10.1108/14779960380000231

M. Bowern, O. Burmeister, D. Gotterbarn, and J. Weckert, ICT Integrity: bringing the ACS code of ethics up to date, Australasian Journal of Information Systems, vol.13, issue.2, pp.168-181, 2006.
DOI : 10.3127/ajis.v13i2.50

O. K. Burmeister, Achieving the goal of a global computing code of ethics through an international-localisation hybrid. Ethical Space: The International Journal of Communication Ethics, pp.25-32, 2013.