A. Acquisti, Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, pp.21-29, 2004.
DOI : 10.1145/988772.988777

B. Berg, S. Pötzsch, R. Leenes, K. Borcea-pfitzmann, and F. Beato, Privacy in social software, Privacy and Identity Management for Life, pp.33-60, 2011.

M. Bergmann, M. Rost, and J. S. Pettersson, Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology, Proceedings of the Fourteenth International Conference on Information Systems Development (ISD2005), pp.437-448, 2005.

A. Bhargav-spantzel, J. Camenisch, T. Gross, and D. Sommer, User centricity: A taxonomy and open issues*, Journal of Computer Security, vol.15, issue.5, pp.493-527, 2007.
DOI : 10.3233/JCS-2007-15502

URL : http://doi.org/10.3233/jcs-2007-15502

R. Dunbar, Coevolution of neocortical size, group size and language in humans, Behavioral and Brain Sciences, vol.7, issue.04, pp.681-735, 1993.
DOI : 10.1016/S0047-2484(85)80087-7

S. Fischer-huebner, H. Hedbom, and E. Waestlund, Trust and assurance HCI, Privacy and Identity Management for Life, pp.245-260, 2011.

R. Gross and A. Acquisti, Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005.
DOI : 10.1145/1102199.1102214

H. Hedbom, T. Pulls, and M. Hansen, Transparency Tools, Privacy and Identity Management for Life, pp.135-143, 2011.
DOI : 10.1007/978-3-642-20317-6_6

T. Höllrigl, H. Kuehner, J. Dinger, and H. Hartenstein, User-Controlled Automated Identity Delegation, 2010 International Conference on Network and Service Management, 2010.
DOI : 10.1109/CNSM.2010.5691295

C. Kahl, K. Boettcher, M. Tschersich, S. Heim, and K. Rannenberg, How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project, Proceedings of 25th IFIP International Information Security Conference Security & Privacy ? Silver Linings in the Cloud (IFIP SEC 2010), 2010.
DOI : 10.1016/S1363-4127(04)00014-7

URL : https://hal.archives-ouvertes.fr/hal-01054509

B. Krishnamurthy, I know what you will do next summer, ACM SIGCOMM Computer Communication Review, vol.40, issue.5, pp.65-70, 2010.
DOI : 10.1145/1880153.1880164

B. Krishnamurthy and C. Wills, Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008.
DOI : 10.1145/1397735.1397744

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.4305

B. Krishnamurthy and C. Wills, On the leakage of personally identifiable information via online social networks, ACM SIGCOMM Computer Communication Review, vol.40, issue.1, pp.112-117, 2010.
DOI : 10.1145/1672308.1672328

S. Labitzke, J. Dinger, and H. Hartenstein, How I and others can link my various social network profiles as a basis to reveal my virtual appearance, LNI ? Proceedings of the 4th DFN Forum Communication Technologies, GI-Edition, 2011.

S. Labitzke, I. Taranu, and H. Hartenstein, What your friends tell others about you: Low cost linkability of social network profiles, Proceedings of the 5th International ACM Workshop on Social Network Mining and Analysis, 2011.

C. A. Lampe, N. Ellison, and C. Steinfield, A familiar face(book), Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.435-444, 2007.
DOI : 10.1145/1240624.1240695

S. Scerri, R. Gimenez, F. Hermann, M. Bourimi, and S. Thiel, digital.me -towards an integrated personal information sphere, Workshop on the Federated Social Web Summit (FSW), 2011.

F. Schell, T. Höllrigl, and H. Hartenstein, Federated identity management as a basis for integrated information management. it ? Information Technology, pp.14-23, 2009.
DOI : 10.1524/itit.2009.0518

J. Schrammel, C. Köffel, and M. Tscheligi, How much do you tell? information disclosure behaviour indifferent types of online communities, Proceedings of the fourth international conference on Communities and technologies, pp.275-284, 2009.

M. Tschersich, C. Kahl, S. Heim, S. Crane, K. Böttcher et al., Towards privacy-enhanced mobile communities???Architecture, concepts and user trials, Journal of Systems and Software, vol.84, issue.11, pp.1947-1960, 2011.
DOI : 10.1016/j.jss.2011.06.048

S. Weiss, Privacy threat model for data portability in social network applications, International Journal of Information Management, vol.29, issue.4, pp.249-254, 2009.
DOI : 10.1016/j.ijinfomgt.2009.03.007

URL : http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1016&context=amcis2008