S. B. Barnes, A privacy paradox: Social networking in the United States, First Monday, vol.11, issue.9, 1394.
DOI : 10.5210/fm.v11i9.1394

L. Fang and K. Lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010.
DOI : 10.1145/1772690.1772727

P. Kumaraguru and L. F. Cranor, Privacy Indexes: A Survey of Westin's Studies, 2005.

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004.
DOI : 10.1287/isre.1040.0032

M. Mondal, Y. Liu, B. Viswanath, K. P. Gummadi, and A. Mislove, Understanding and specifying social access control lists, In: Symposium On Usable Privacy and Security, pp.271-283, 2014.

M. Shehab, G. Cheek, H. Touati, A. Squicciarini, and P. C. Cheng, User Centric Policy Management in Online Social Networks, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.9-13, 2010.
DOI : 10.1109/POLICY.2010.10

M. Shehab and H. Touati, Semi-supervised policy recommendation for online social networks, Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining ASONAM '12, pp.360-367, 2012.
DOI : 10.1007/s13278-016-0370-9

A. Sinha, Y. Li, and L. Bauer, What you want is not what you get, Proceedings of the 2013 ACM workshop on Artificial intelligence and security, AISec '13, pp.13-24, 2013.
DOI : 10.1145/2517312.2517317

A. Strauss and J. M. Corbin, Basics of Qualitative Research : Techniques and Procedures for Developing Grounded Theory, pp.803959400-803959421, 1998.

P. Wisniewski, A. N. Islam, B. P. Knijnenburg, and S. Patil, Give Social Network Users the Privacy They Want, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.1427-1441, 2015.
DOI : 10.1111/j.1083-6101.2006.00029.x