A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, 2005.
DOI : 10.1109/MSP.2005.22

G. Bell and P. Dourish, Yesterday's tomorrows: notes on ubiquitous computing's dominant vision, Personal and Ubiquitous Computing, 2007.
DOI : 10.1007/s00779-006-0071-x

M. Brereton and S. Ghelawat, Designing for participation in local social ridesharing networks, Proceedings of the 11th Biennial Participatory Design Conference on, PDC '10, 2010.
DOI : 10.1145/1900441.1900478

M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, Designing participation in agile ridesharing with mobile social software, Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group on Design: Open 24/7, OZCHI '09, 2009.
DOI : 10.1145/1738826.1738868

R. C. Carlson, Anatomy of a systems failure: Dial-a-ride in Santa Clara County, California, Transportation, vol.5, issue.1, 1976.
DOI : 10.1007/BF00165244

F. De-keukelaere, S. Yoshihama, S. Trent, Y. Zhang, L. Luo et al., Adaptive Security Dialogs for Improved Security Behavior of Users, 2009.
DOI : 10.1109/CSAC.2002.1176309

P. Dourish, A. , and K. , Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, Human-Computer Interaction, vol.290, issue.10, 2006.
DOI : 10.1088/0963-6625/1/3/004

P. Dourish, B. Grinter, J. Delgado-de-la-flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, 2004.
DOI : 10.1002/0470848693

S. Ghelawat, K. Radke, and M. Brereton, Interaction, privacy and profiling considerations in local mobile social software, Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction, OZCHI '10, 2010.
DOI : 10.1145/1952222.1952307

C. Heyer and M. Brereton, Design from the everyday, Proceedings of the 8th ACM Conference on Designing Interactive Systems, DIS '10, 2010.
DOI : 10.1145/1858171.1858222

A. Josang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, 2007.
DOI : 10.1016/j.dss.2005.05.019

C. Lampe, N. Ellison, and C. Steinfield, A face(book) in the crowd, Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , CSCW '06, 2006.
DOI : 10.1145/1180875.1180901

S. Patil, L. , and J. , Who gets to know what when, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '05, 2005.
DOI : 10.1145/1054972.1054987

M. A. Sasse, S. Brostoff, and D. Weirich, Transforming the 'Weakest Link' - a Human-Computer Interaction Approach to Usable and Effective security, BT Tech Journal, vol, vol.19, issue.3, pp.122-131, 2001.
DOI : 10.1049/PBBT004E_ch15

S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, The Emperor's New Security Indicators, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.35

J. S. Shin and V. D. Gligor, A New Privacy-Enhanced Matchmaking Protocol, IEICE Transactions on Communications, vol.96, issue.8, 2007.
DOI : 10.1587/transcom.E96.B.2049

A. Shostack and A. Stewart, The New School of Information Security, N.J, 2008.

A. Sotirakopoulos, K. Hawkey, and K. Beznosov, I did it because I trusted you " : Challenges with the Study Environment Biasing Participant Behaviours, SOUPS, 2010.

S. Spiekermann, J. Grossklags, and B. Berendt, E-privacy in 2nd generation Ecommerce: privacy preferences versus actual behavior, 2001.
DOI : 10.1145/501158.501163

S. L. Star, The Ethnography of Infrastructure, American Behavioral Scientist, vol.17, issue.1, 1999.
DOI : 10.1023/A:1008651105359