Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany, Computers in Human Behavior, vol.53, pp.344-353, 2015. ,
DOI : 10.1016/j.chb.2015.06.048
Distributing privacy policies over multimedia content across multiple online social networks, Computer Networks, vol.75, pp.531-543, 2014. ,
DOI : 10.1016/j.comnet.2014.08.023
Self-disclosure on Facebook among female users and its relationship to feelings of loneliness, Computers in Human Behavior, vol.36, issue.0, pp.460-468, 2014. ,
DOI : 10.1016/j.chb.2014.04.014
Privacy antecedents for SNS self-disclosure: The case of Facebook, Computers in Human Behavior, vol.45, pp.158-167, 2015. ,
DOI : 10.1016/j.chb.2014.12.012
The ???Privacy Paradox??? in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure, Journal of Computer-Mediated Communication, vol.11, issue.6, pp.248-273, 2014. ,
DOI : 10.1111/jcc4.12052
Preventing Private Information Inference Attacks on Social Networks, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.8, pp.1849-1862, 2013. ,
DOI : 10.1109/TKDE.2012.120
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7366
SNS flow, SNS self-disclosure and post hoc interpersonal relations change: Focused on Korean Facebook user, Computers in Human Behavior, vol.31, issue.0, pp.31-294, 2014. ,
DOI : 10.1016/j.chb.2013.10.046
The function of self-disclosure on social network sites: Not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection, Computers in Human Behavior, vol.45, issue.0, pp.1-10, 2015. ,
DOI : 10.1016/j.chb.2014.11.076
Self-construal and Facebook activities: Exploring differences in social interaction orientation, Computers in Human Behavior, vol.53, pp.91-101, 2015. ,
DOI : 10.1016/j.chb.2015.06.049
Interdependent Privacy: Let Me Share Your Data, In: Financial Cryptography and Data Security, vol.7859, pp.338-353, 2013. ,
DOI : 10.1007/978-3-642-39884-1_29
Mutual-friend based attacks in social network systems, Computers & Security, vol.37, pp.15-30, 2013. ,
DOI : 10.1016/j.cose.2013.04.003
Information Privacy Concern About Peer Disclosure in Online Social Networks, IEEE Transactions on Engineering Management, vol.62, issue.3, pp.311-324, 2015. ,
DOI : 10.1109/TEM.2015.2432117
Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, vol.3, issue.1, pp.210-230, 2007. ,
DOI : 10.1111/j.1083-6101.2007.00393.x
Enhancing client welfare through better communication of private mental health data between rural service providers, Australasian Journal of Information Systems, vol.19, pp.1-14, 2015. ,
DOI : 10.3127/ajis.v19i0.1206
Information Management in Aged Care: Cases of Confidentiality and Elder Abuse, Journal of Business Ethics, vol.25, issue.2, pp.453-460, 2014. ,
DOI : 10.1007/s10551-013-1770-7
What Seniors Value About Online Community, The Journal of Community Informatics, vol.8, issue.1, pp.1-12, 2012. ,
Websites for seniors : Cognitive accessibility, International Journal of Emerging Technologies and Society, vol.8, issue.2, pp.99-113, 2010. ,
FakeBook: Detecting Fake Profiles in On-Line Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.1071-1078, 2012. ,
DOI : 10.1109/ASONAM.2012.185
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems, Computers & Security, vol.44, pp.75-91, 2014. ,
DOI : 10.1016/j.cose.2014.04.004
Identifying hidden social circles for advanced privacy configuration, Computers & Security, vol.41, issue.0, pp.40-51, 2014. ,
DOI : 10.1016/j.cose.2013.07.007
CoPE: Enabling collaborative privacy management in online social networks, Journal of the American Society for Information Science and Technology, vol.23, issue.10, pp.521-534, 2011. ,
DOI : 10.1002/asi.21473
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.5636
Privacy and human behavior in the age of information, Science, vol.347, issue.6221, pp.509-514, 2015. ,
DOI : 10.1126/science.aaa1465
Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, 2011. ,
DOI : 10.1145/2068816.2068823
The failure of online social network privacy settings, pp.1-20, 2011. ,
Privacy settings in social networking systems, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.149-154, 2013. ,
DOI : 10.1145/2484313.2484331
Privacy Settings in Online Social Networks -- Preferences, Perception, and Reality, 2013 46th Hawaii International Conference on System Sciences, pp.3219-3228, 2013. ,
DOI : 10.1109/HICSS.2013.455
Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, pp.1155-1158, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.150
My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns, Computers in Human Behavior, vol.31, pp.48-56, 2014. ,
DOI : 10.1016/j.chb.2013.10.010
Are privacy concerns a turn-off?, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-13, 2012. ,
DOI : 10.1145/2335356.2335370
Privacy-Preserving Enhanced Collaborative Tagging, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.1, pp.180-193, 2014. ,
DOI : 10.1109/TKDE.2012.248
URL : http://hdl.handle.net/2117/21533
Just untag it: Exploring the management of undesirable Facebook photos, Computers in Human Behavior, vol.43, pp.147-155, 2015. ,
DOI : 10.1016/j.chb.2014.10.051
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, 2011. ,
DOI : 10.1145/2076732.2076747
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends, Journal of the Association for Information Science and Technology, vol.12, issue.12, pp.1883-1896, 2015. ,
DOI : 10.1002/asi.23299
Third-party apps on Facebook, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT '11, pp.1-10, 2011. ,
DOI : 10.1145/2076444.2076448
curso: protect yourself from curse of attribute inference, Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, DBSocial '13, pp.13-18, 2013. ,
DOI : 10.1145/2484702.2484706
Reactions to other-generated face threats on Facebook and their relational consequences, Computers in Human Behavior, vol.57, pp.187-194, 2016. ,
DOI : 10.1016/j.chb.2015.12.021
A bumpy ride on the information superhighway: Exploring turbulence online, Computers in Human Behavior, vol.36, pp.520-529, 2014. ,
DOI : 10.1016/j.chb.2014.04.027
Awkward encounters of an "other" kind, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, CSCW '14, pp.449-460, 2004. ,
DOI : 10.1145/2531602.2531646
Baby role-play, or virtual kidnapping, is the most disturbing Instagram hashtag ever, http://www.digitaltrends.com/mobile/baby-role-play-virtual-kidnapping, 2015. ,
Applying the ACS code of ethics, Journal of Research and Practice in Information Technology, vol.32, issue.2, pp.107-120, 2000. ,
Applying the new software engineering code of ethics to usability engineering: A study of four cases, Journal of Information, Communication and Ethics in Society, vol.1, issue.3, pp.119-132, 2003. ,
DOI : 10.1108/14779960380000231
ICT Integrity: bringing the ACS code of ethics up to date, Australasian Journal of Information Systems, vol.13, issue.2, pp.168-181, 2006. ,
DOI : 10.3127/ajis.v13i2.50
Achieving the goal of a global computing code of ethics through an international-localisation hybrid. Ethical Space: The International Journal of Communication Ethics, pp.25-32, 2013. ,