, feedback | feed-back, n.: OED Online, 2018.
Nudges for privacy and security: Understanding and assisting users' choices online, ACM Comput. Surv, vol.50, issue.3, p.41, 2017. ,
What would it take for you to tell your secrets to a cloud?, Secure IT Systems, pp.129-145, 2014. ,
Feedback systems: an introduction for scientists and engineers, 2010. ,
Privacy protection in data sharing: Towards feedback based solutions, Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, pp.28-36, 2014. ,
Misplaced confidences: Privacy and the control paradox, Social Psychological and Personality Science, vol.4, issue.3, pp.340-347, 2013. ,
A biopsychosocial model based on negative feedback and control, Frontiers in Human Neuroscience, vol.8, p.94, 2014. ,
Control processes, priority management, and affective dynamics, Emotion Review, vol.7, issue.4, pp.301-307, 2015. ,
User perceptions of sharing, advertising, and tracking, Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp.53-67, 2015. ,
How to inform privacy agents on preferred level of user control?, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp.1542-1547, 2016. ,
, Fragile imperceptible digital watermark with privacy control, vol.3657, pp.3657-3657, 1999.
Privacy, The Stanford Encyclopedia of Philosophy, 2018. ,
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts, European Journal of Information Systems, vol.22, issue.3, pp.295-316, 2013. ,
,
, Feedback control theory. Courier Corporation, 2013.
Differential privacy: A survey of results, Theory and Applications of Models of Computation, pp.1-19 ,
, , 2008.
An anatomy of values: problems of personal choice, 1970. ,
Optimal task recommendation for mobile crowdsourcing with privacy control, IEEE Internet of Things Journal, vol.3, issue.5, pp.745-756, 2016. ,
Invited paper: A model of paradoxical privacy behavior in online users, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp.206-211, 2016. ,
Bibliometric mapping of computer and information ethics, Ethics and Information Technology, vol.13, issue.3, p.241, 2011. ,
Viewing the viewers: Publishers' desires and viewers' privacy concerns in social networks, Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp.555-566, 2017. ,
,
Control theory for humans: Quantitative approaches to modeling performance, 2003. ,
Modeling privacy control in contextaware systems, IEEE Pervasive Computing, vol.1, issue.3, pp.59-63, 2002. ,
,
Feasibility of structural network clustering for group-based privacy control in social networks, Proceedings of the Sixth Symposium on Usable Privacy and Security, vol.9, pp.1-9, 2010. ,
, Is It Harmful? Reexamining Privacy Concerns, pp.59-75, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01883632
Increasing sharing tendency without reducing satisfaction: Finding the best privacy-settings user interface for social networks, 2014. ,
Like us on facebook! analyzing user preferences regarding privacy settings in germany, 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, vol.3, pp.815-822, 2015. ,
Online social networks: why we disclose, Journal of Information Technology, vol.25, issue.2, pp.109-125, 2010. ,
Privacy, autonomy, and self-concept, American Philosophical Quarterly, vol.24, issue.1, pp.81-89, 1987. ,
Closeness: A new privacy measure for data publishing, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.7, pp.943-956, 2010. ,
Introduction to dynamic systems: theory, models, and applications, vol.1, 1979. ,
Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model, Info. Sys. Research, vol.15, issue.4, pp.336-355, 2004. ,
The origins and future of control theory in psychology, Review of General Psychology, vol.19, issue.4, pp.425-430, 2015. ,
Privacy itch and scratch: On body privacy warnings and controls, Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp.2417-2424, 2016. ,
,
Defining privacy, Journal of Social Philosophy, vol.39, issue.3, pp.411-428, 2008. ,
Tools for achieving usable ex post transparency: A survey, IEEE Access, vol.5, pp.22965-22991, 2017. ,
,
Privacy, morality, and the law, Philosophy & Public Affairs, vol.12, issue.4, pp.269-288, 1983. ,
Interrupt now or inform later?: Comparing immediate and delayed privacy feedback, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.1415-1418, 2015. ,
Reflection or action?: How feedback and control affect location sharing decisions, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 101-110. CHI '14, 2014. ,
A general feedback theory of human behavior: Part i, Perceptual and Motor Skills, vol.11, issue.1, pp.71-88, 1960. ,
A design space for effective privacy notices, Eleventh Symposium On Usable Privacy and Security, pp.1-17, 2015. ,
Eyeing your exposure: Quantifying and controlling information sharing for improved privacy, Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. ,
Man-machine systems; Information, control, and decision models of human performance, 1974. ,
Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures, pp.187-204, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01883617
Network-level security and privacy control for smart-home iot devices, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.163-167, 2015. ,
,
Information privacy research: An interdisciplinary review, MIS Q, vol.35, issue.4, pp.989-1016, 2011. ,
A taxonomy of privacy, University of Pennsylvania Law Review, vol.154, issue.3, pp.477-560, 2006. ,
Locaccino: A privacy-centric location sharing application, Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing -Adjunct, pp.381-382, 2010. ,
Who's viewed you?: The impact of feedback in a mobile locationsharing application, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 2003-2012. CHI '09, 2009. ,
Turtle guard: Helping android users apply contextual privacy preferences, Thirteenth Symposium on Usable Privacy and Security, pp.145-162, 2017. ,
The tradeoff fallacy: How marketers are misrepresenting american consumers and opening them up to exploitation, SSRN Electronic Journal, 2015. ,
Modeling the mind and the milieu: Computational modeling for micro-level organizational researchers, Organizational Research Methods, vol.15, issue.4, pp.602-623, 2012. ,
The right to privacy, pp.193-220, 1890. ,
Privacy and freedom, 1967. ,