A. Acquisti and J. Grossklags, Losses, Gains, Hyperbolic discounting: an experimental approach to information security attitudes and behaviour, 2nd Annual Workshop on Economics and Information Security -WEIS '03, 2003.

S. Spiekermann, J. Grossklags, and B. Berendt, E-privacy in 2nd Generation Ecommerce: Privacy preferences versus actual behaviour, 3rd ACM conference on Electronic Commerce, pp.14-17, 2001.
DOI : 10.1145/501158.501163

A. Acquisti, Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, pp.21-29, 1920.
DOI : 10.1145/988772.988777

D. Boyd, Why youth love social network sites; The role of networked publics in teenage social life MacArthur foundation series on digital learning -Youth, identity and digital media, p.119, 2007.

L. Cranor, A. Mcdonald, R. Reeder, G. Kelley, and P. , A Comparative study of online privacy policies and formats, 9th International Symposium on Privacy Enhancing Technologies, pp.37-55, 2009.

S. D. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890.
DOI : 10.2307/1321160

J. Decew, Privacy The Stanford Encyclopedia of Philosophy, 2008.

C. Fried, An Anatomy of Values: Problems of personal and social choice, 1970.
DOI : 10.4159/harvard.9780674332485

R. Gerstein, Intimacy and Privacy, Ethics, vol.89, issue.1, pp.76-81, 1978.
DOI : 10.1086/292105

R. Rachels, Why privacy is important, Philosophy of Public Affairs, vol.4, pp.323-333, 1975.
DOI : 10.1017/CBO9780511625138.013

L. D. Itrona and A. Pouloudi, Privacy in the Information Age: Stakeholders, Interests and Values, Journal of Business Ethics, vol.22, issue.1, pp.27-38, 1999.
DOI : 10.1023/A:1006151900807

A. Adams and M. A. Sasse, Privacy issues in ubiquitous multimedia environments: wake sleeping dogs, or let them lie?, Seventh IFIP Conference on Human-Computer Interaction INTERACT'99, 1999.

K. Strater and H. Richter, Examining privacy and disclosure in a social networking community", 3rd symposium on Usable privacy and security, pp.157-158, 2007.

A. Adams and M. A. Sasse, Taming the wolf in sheeps clothing: Privacy in multimedia communications, seventh ACM international conference on Multimedia, pp.101-107, 1999.

P. Swire, Privacy and Information Sharing in the War on Terrorism, Villanova Law Review, vol.51, pp.101-129, 2006.

L. Palen and P. Dourish, Unpacking "privacy" for a networked world, Proceedings of the conference on Human factors in computing systems , CHI '03, p.126, 2003.
DOI : 10.1145/642611.642635

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. L. Patterson, S. Mullens, and J. Romano, Compensatory Reactions to Spatial Intrusion, Sociometry, vol.34, issue.1, pp.114-121, 1971.
DOI : 10.2307/2786354

D. Zwick and N. , Models of privacy in the Digital Age: Implications for Marketing and E-commerce, Research Institute for Telecommunications and Information Marketing (RITIM), 1999.

J. Blanchette and D. G. Johnson, Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness, The Information Society, vol.11, issue.1, pp.33-45, 2002.
DOI : 10.2307/1325042

H. Richter-lipford, A. Besmer, and J. Watson, Understanding Privacy settings in facebook with an audience view, Proceedings of the 1st Conference on Usability, Psychology, and Security, pp.1-8, 2008.

I. Altman, The Environment and Social Behaviour: Privacy, Personal Space, Territory and Crowding, 1975.

P. M. Pedersen, MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS, Journal of Environmental Psychology, vol.19, issue.4, pp.397-405, 1999.
DOI : 10.1006/jevp.1999.0140

S. T. Margulis, On the Status and Contribution of Westin's and Altman's Theories of Privacy, Journal of Social Issues, vol.13, issue.2, pp.411-429, 2003.
DOI : 10.1007/978-1-4684-3405-7_6

S. Petronio, Boundaries of privacy: dialectics of disclosure, 2002.

V. J. Derlega and A. L. Chaikin, Privacy and Self-Disclosure in Social Relationships, Journal of Social Issues, vol.33, issue.3, pp.102-115, 1977.
DOI : 10.1111/j.2044-8260.1973.tb00065.x

P. B. Newell, Perspectives on privacy, Journal of Environmental Psychology, vol.15, issue.2, pp.87-104, 1995.
DOI : 10.1016/0272-4944(95)90018-7

L. Cranor, P. Guguru, and M. Arjula, User interfaces for privacy agents, ACM Transactions on Computer-Human Interaction, vol.13, issue.2, pp.135-176, 2006.
DOI : 10.1145/1165734.1165735

M. Hansen, Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Holstenstr. 98 Putting privacy pictograms into practice: a european perspective http://subs.emis.de/LNI, Kiel)Proceedings, 2010.

J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao et al., User-Controllable Security and Privacy for Pervasive Computing, Eighth IEEE Workshop on Mobile Computing Systems and Applications, pp.14-19, 2007.
DOI : 10.1109/HotMobile.2007.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. E. Leenes, User-centric identity management as an indispensable tool for privacy protection, International Journal of Intellectual Property Management, vol.2, issue.4, pp.345-371, 2008.
DOI : 10.1504/IJIPM.2008.021431

M. Metzger, Communication Privacy Management in Electronic Commerce, Journal of Computer-Mediated Communication, vol.14, issue.1&2, 2007.
DOI : 10.1080/00913367.1999.10673588

H. Oinas-kukkonen and M. Harjumaa, Persuasive system design: key issues, process model and system features, Communications of the Association of Information Systems, vol.24, pp.485-500, 2009.

H. Oinas-kukkonen and M. Harjumaa, Towards Deeper Understanding of Persuasion in Software and Information Systems, First International Conference on Advances in Computer-Human Interaction, pp.200-205, 2008.
DOI : 10.1109/ACHI.2008.31

H. Oinas-kukkonen, Behaviour change support systems: a research model and agenda, 5th International Conference, pp.4-14, 2010.
DOI : 10.1007/978-3-642-13226-1_3

H. Oinas-kukkonen and M. Harjumaa, A Systematic Framework for Designing and Evaluating Persuasive Systems, 3rd international Conference on Persuasive Technology, pp.164-176, 2008.
DOI : 10.1007/978-3-540-68504-3_15