E. Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) COM(2012) 11 final, 2012.

M. Hansen and T. Probst, Datenschutzgütesiegel aus technischer Sicht: Bewertungskriterien des schleswig-holsteinischen Datenschutzgütesiegels, Datenschutz als Wettbewerbsvorteil ? Privacy sells: Mit modernen Datenschutzkomponenten Erfolg beim Kunden, pp.163-179, 2002.
DOI : 10.1007/978-3-322-90277-1_19

J. Nielsen, The Power of Defaults Jakob Nielsen's Alertbox, 2005.

J. P. Kesan and R. C. Shah, Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics. U Illinois Law & Economics Research Paper No. LE06- 012, Notre Dame Law Review, vol.82, pp.583-634, 2006.

E. Data and P. Supervisor, Opinion of the European Data Protection Supervisor on the data protection reform package, pp.12-15, 2012.

J. P. Albrecht, Draft Report on the proposal for a regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data, Committee on Civil Liberties , Justice and Home Affairs, pp.11-18, 2012.

A. Cavoukian, Privacy by Design, 2009.
DOI : 10.4018/978-1-61350-501-4.ch007

V. Reding, Your data, your rights: Safeguarding your privacy in a connected world Privacy Platform " The Review of the EU Data Protection Framework, Brussels, vol.183, issue.11, 2011.

M. Altheim, The Review of the EU Data Protection Framework v. The State of Online Consumer Privacy in the US. Blog entry, 2011.

K. Scarfone and P. Hoffman, Guidelines on Firewalls and Firewall Policy. Recommendations of the National Institute of Standards and Technology. Special Publication, pp.800-841, 2009.
DOI : 10.6028/nist.sp.800-41r1

S. Lipner and M. Howard, The Trustworthy Computing Security Development Lifecycle. MSDN, Security Engineering and Communications, Security Business and Technology Unit, Microsoft Corporation, 2005.
DOI : 10.1109/csac.2004.41

C. Soghoian, Not an option: time for companies to embrace security by defaultnot-an-option-time-for- companies-to-embrace-security-by-default, Ars Technica, vol.08, 2011.

G. Iachello and J. Hong, End-User Privacy in Human-Computer Interaction, Foundations and Trends?? in Human-Computer Interaction, vol.1, issue.1, pp.1-137, 2007.
DOI : 10.1561/1100000004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.2788

Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011.
DOI : 10.1145/2068816.2068823

M. Madejski, M. Johnson, and S. M. Bellovin, The Failure of Online Social Network Privacy Settings, 2011.

I. S. Rubinstein and N. Good, Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents, SSRN Electronic Journal, vol.347, p.347, 2012.
DOI : 10.2139/ssrn.2128146

F. Niemann and P. Scholz, Privacy by Design und Privacy by Default ? Wege zu einem funktionierenden Datenschutz in Sozialen Netzwerken, pp.109-145, 2012.

R. T. Fielding and D. Singer, Tracking Preference Expression (DNT) W3C Working Draft 02, 2012.

E. Commission, Letter to World Wide Web Consortium Tracking Protection Working Group, Ref. Ares, vol.743354, 2012.

M. Hansen, User-controlled identity management: the key to the future of privacy?, International Journal of Intellectual Property Management, vol.2, issue.4, pp.325-344, 2008.
DOI : 10.1504/IJIPM.2008.021428

H. Zwingelberg and M. Hansen, Privacy Protection Goals and Their Implications for eID Systems, Privacy and Identity 2011, IFIP AICT 375 IFIP International Federation for Information Processing, pp.245-260, 2012.
DOI : 10.1007/978-3-642-31668-5_19

A. Acquisti, L. John, and G. Loewenstein, What Is Privacy Worth?, The Journal of Legal Studies, vol.42, issue.2, 2009.
DOI : 10.1086/671754

L. Schmitt, Privacy as default Privacy by default! Konzept für Privatsphäre im Ubiquitous Computing. Diploma Thesis, Köln International School of Design, 2006.