, feedback | feed-back, n.: OED Online, 2018.

A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. F. Cranor et al., Nudges for privacy and security: Understanding and assisting users' choices online, ACM Comput. Surv, vol.50, issue.3, p.41, 2017.

J. Angulo, E. Wästlund, and J. Högberg, What would it take for you to tell your secrets to a cloud?, Secure IT Systems, pp.129-145, 2014.

K. J. Aström and R. M. Murray, Feedback systems: an introduction for scientists and engineers, 2010.

M. S. Bargh, R. Meijer, S. Choenni, and P. Conradie, Privacy protection in data sharing: Towards feedback based solutions, Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, pp.28-36, 2014.

L. Brandimarte, A. Acquisti, and G. Loewenstein, Misplaced confidences: Privacy and the control paradox, Social Psychological and Personality Science, vol.4, issue.3, pp.340-347, 2013.

T. Carey, W. Mansell, and S. Tai, A biopsychosocial model based on negative feedback and control, Frontiers in Human Neuroscience, vol.8, p.94, 2014.

C. S. Carver, Control processes, priority management, and affective dynamics, Emotion Review, vol.7, issue.4, pp.301-307, 2015.

F. Chanchary and S. Chiasson, User perceptions of sharing, advertising, and tracking, Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp.53-67, 2015.

J. Colnago and H. Guardia, How to inform privacy agents on preferred level of user control?, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp.1542-1547, 2016.

D. Coppersmith, F. C. Mintzer, C. P. Tresser, C. W. Wu, and M. M. Yeung, Fragile imperceptible digital watermark with privacy control, vol.3657, pp.3657-3657, 1999.

J. Decew, Privacy, The Stanford Encyclopedia of Philosophy, 2018.

T. Dinev, H. Xu, J. H. Smith, and P. Hart, Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts, European Journal of Information Systems, vol.22, issue.3, pp.295-316, 2013.

,

J. C. Doyle, B. A. Francis, and A. R. Tannenbaum, Feedback control theory. Courier Corporation, 2013.

C. Dwork, Differential privacy: A survey of results, Theory and Applications of Models of Computation, pp.1-19

H. Springer-berlin, , 2008.

C. Fried, An anatomy of values: problems of personal choice, 1970.

Y. Gong, L. Wei, Y. Guo, C. Zhang, and Y. Fang, Optimal task recommendation for mobile crowdsourcing with privacy control, IEEE Internet of Things Journal, vol.3, issue.5, pp.745-756, 2016.

C. Griffin, S. Rajtmajer, and A. Squicciarini, Invited paper: A model of paradoxical privacy behavior in online users, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp.206-211, 2016.

R. Heersmink, J. Van-den-hoven, N. J. Van-eck, . Van-den, and J. Berg, Bibliometric mapping of computer and information ethics, Ethics and Information Technology, vol.13, issue.3, p.241, 2011.

R. Hoyle, S. Das, A. Kapadia, A. J. Lee, and K. Vaniea, Viewing the viewers: Publishers' desires and viewers' privacy concerns in social networks, Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp.555-566, 2017.

,

R. J. Jagacinski and J. M. Flach, Control theory for humans: Quantitative approaches to modeling performance, 2003.

X. Jiang and J. A. Landay, Modeling privacy control in contextaware systems, IEEE Pervasive Computing, vol.1, issue.3, pp.59-63, 2002.

,

S. Jones and E. O'neill, Feasibility of structural network clustering for group-based privacy control in social networks, Proceedings of the Sixth Symposium on Usable Privacy and Security, vol.9, pp.1-9, 2010.

A. Kitkowska, E. Wästlund, J. Meyer, and L. A. Martucci, Is It Harmful? Reexamining Privacy Concerns, pp.59-75, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01883632

B. P. Knijnenburg and A. Kobsa, Increasing sharing tendency without reducing satisfaction: Finding the best privacy-settings user interface for social networks, 2014.

S. Kowalewski, M. Ziefle, H. Ziegeldorf, and K. Wehrle, Like us on facebook! analyzing user preferences regarding privacy settings in germany, 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, vol.3, pp.815-822, 2015.

H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand, Online social networks: why we disclose, Journal of Information Technology, vol.25, issue.2, pp.109-125, 2010.

J. Kupfer, Privacy, autonomy, and self-concept, American Philosophical Quarterly, vol.24, issue.1, pp.81-89, 1987.

N. Li, T. Li, and S. Venkatasubramanian, Closeness: A new privacy measure for data publishing, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.7, pp.943-956, 2010.

D. G. Luenberger, Introduction to dynamic systems: theory, models, and applications, vol.1, 1979.

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model, Info. Sys. Research, vol.15, issue.4, pp.336-355, 2004.

W. Mansell and R. S. Marken, The origins and future of control theory in psychology, Review of General Psychology, vol.19, issue.4, pp.425-430, 2015.

V. Mehta, A. K. Bandara, B. A. Price, and B. Nuseibeh, Privacy itch and scratch: On body privacy warnings and controls, Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp.2417-2424, 2016.

,

A. Moore, Defining privacy, Journal of Social Philosophy, vol.39, issue.3, pp.411-428, 2008.

P. Murmann and S. Fischer-hbner, Tools for achieving usable ex post transparency: A survey, IEEE Access, vol.5, pp.22965-22991, 2017.

,

W. A. Parent, Privacy, morality, and the law, Philosophy & Public Affairs, vol.12, issue.4, pp.269-288, 1983.

S. Patil, R. Hoyle, R. Schlegel, A. Kapadia, and A. J. Lee, Interrupt now or inform later?: Comparing immediate and delayed privacy feedback, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.1415-1418, 2015.

S. Patil, R. Schlegel, A. Kapadia, and A. J. Lee, Reflection or action?: How feedback and control affect location sharing decisions, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 101-110. CHI '14, 2014.

W. T. Powers, R. K. Clark, and R. L. Mcfarland, A general feedback theory of human behavior: Part i, Perceptual and Motor Skills, vol.11, issue.1, pp.71-88, 1960.

F. Schaub, R. Balebako, A. L. Durity, and L. F. Cranor, A design space for effective privacy notices, Eleventh Symposium On Usable Privacy and Security, pp.1-17, 2015.

R. Schlegel, A. Kapadia, and A. J. Lee, Eyeing your exposure: Quantifying and controlling information sharing for improved privacy, Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011.

T. B. Sheridan and W. R. Ferrell, Man-machine systems; Information, control, and decision models of human performance, 1974.

Y. Shulman, Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures, pp.187-204, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01883617

V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, Network-level security and privacy control for smart-home iot devices, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.163-167, 2015.

,

H. J. Smith, T. Dinev, and H. Xu, Information privacy research: An interdisciplinary review, MIS Q, vol.35, issue.4, pp.989-1016, 2011.

D. J. Solove, A taxonomy of privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006.

E. Toch, J. Cranshaw, P. Hankes-drielsma, J. Springfield, P. G. Kelley et al., Locaccino: A privacy-centric location sharing application, Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing -Adjunct, pp.381-382, 2010.

J. Y. Tsai, P. Kelley, P. Drielsma, L. F. Cranor, J. Hong et al., Who's viewed you?: The impact of feedback in a mobile locationsharing application, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 2003-2012. CHI '09, 2009.

L. Tsai, P. Wijesekera, J. Reardon, I. Reyes, S. Egelman et al., Turtle guard: Helping android users apply contextual privacy preferences, Thirteenth Symposium on Usable Privacy and Security, pp.145-162, 2017.

J. Turow and M. Hennessy, The tradeoff fallacy: How marketers are misrepresenting american consumers and opening them up to exploitation, SSRN Electronic Journal, 2015.

J. B. Vancouver and J. M. Weinhardt, Modeling the mind and the milieu: Computational modeling for micro-level organizational researchers, Organizational Research Methods, vol.15, issue.4, pp.602-623, 2012.

S. D. Warren and L. D. Brandeis, The right to privacy, pp.193-220, 1890.

A. Westin, Privacy and freedom, 1967.