Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, pp.21-29, 2004. ,
DOI : 10.1145/988772.988777
Privacy in social software, Privacy and Identity Management for Life, pp.33-60, 2011. ,
Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology, Proceedings of the Fourteenth International Conference on Information Systems Development (ISD2005), pp.437-448, 2005. ,
User centricity: A taxonomy and open issues*, Journal of Computer Security, vol.15, issue.5, pp.493-527, 2007. ,
DOI : 10.3233/JCS-2007-15502
URL : http://doi.org/10.3233/jcs-2007-15502
Coevolution of neocortical size, group size and language in humans, Behavioral and Brain Sciences, vol.7, issue.04, pp.681-735, 1993. ,
DOI : 10.1016/S0047-2484(85)80087-7
Trust and assurance HCI, Privacy and Identity Management for Life, pp.245-260, 2011. ,
Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005. ,
DOI : 10.1145/1102199.1102214
Transparency Tools, Privacy and Identity Management for Life, pp.135-143, 2011. ,
DOI : 10.1007/978-3-642-20317-6_6
User-Controlled Automated Identity Delegation, 2010 International Conference on Network and Service Management, 2010. ,
DOI : 10.1109/CNSM.2010.5691295
How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project, Proceedings of 25th IFIP International Information Security Conference Security & Privacy ? Silver Linings in the Cloud (IFIP SEC 2010), 2010. ,
DOI : 10.1016/S1363-4127(04)00014-7
URL : https://hal.archives-ouvertes.fr/hal-01054509
I know what you will do next summer, ACM SIGCOMM Computer Communication Review, vol.40, issue.5, pp.65-70, 2010. ,
DOI : 10.1145/1880153.1880164
Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008. ,
DOI : 10.1145/1397735.1397744
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.4305
On the leakage of personally identifiable information via online social networks, ACM SIGCOMM Computer Communication Review, vol.40, issue.1, pp.112-117, 2010. ,
DOI : 10.1145/1672308.1672328
How I and others can link my various social network profiles as a basis to reveal my virtual appearance, LNI ? Proceedings of the 4th DFN Forum Communication Technologies, GI-Edition, 2011. ,
What your friends tell others about you: Low cost linkability of social network profiles, Proceedings of the 5th International ACM Workshop on Social Network Mining and Analysis, 2011. ,
A familiar face(book), Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.435-444, 2007. ,
DOI : 10.1145/1240624.1240695
digital.me -towards an integrated personal information sphere, Workshop on the Federated Social Web Summit (FSW), 2011. ,
Federated identity management as a basis for integrated information management. it ? Information Technology, pp.14-23, 2009. ,
DOI : 10.1524/itit.2009.0518
How much do you tell? information disclosure behaviour indifferent types of online communities, Proceedings of the fourth international conference on Communities and technologies, pp.275-284, 2009. ,
Towards privacy-enhanced mobile communities???Architecture, concepts and user trials, Journal of Systems and Software, vol.84, issue.11, pp.1947-1960, 2011. ,
DOI : 10.1016/j.jss.2011.06.048
Privacy threat model for data portability in social network applications, International Journal of Information Management, vol.29, issue.4, pp.249-254, 2009. ,
DOI : 10.1016/j.ijinfomgt.2009.03.007
URL : http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1016&context=amcis2008