R. Abu-salma, M. A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina et al., Obstacles to the adoption of secure communication tools, Security and Privacy (SP), 2017 IEEE Symposium on, p.137153, 2017.

M. S. Ackerman, L. F. Cranor, and J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, Proceedings of the 1st ACM conference on Electronic commerce, p.18, 1999.

A. Acquisti, Nudges for privacy and security: Understanding and assisting users' choices online, 2017.

Y. Amichai-hamburger, K. Y. Mckenna, and S. , E-empowerment: Empowerment by the internet, Computers in Human Behavior, vol.24, issue.5, p.17761789, 2008.

V. Bellotti and A. Sellen, Design for privacy in ubiquitous computing environments, Proceedings of the Third European Conference on Computer-Supported Cooperative Work, p.7792, 1317.

C. Brodie, C. Karat, J. Karat, and J. Feng, Usable security and privacy: a case study of developing privacy management tools, Proceedings of the 2005 symposium on Usable privacy and security, p.3543, 2005.

L. Church, J. Anderson, J. Bonneau, and F. Stajano, Privacy stories: condence in privacy behaviors through end user programming, SOUPS, 2009.

K. P. Coopamootoo, Work in progress: Fearful users' privacy intentions -an empirical investigation, 7th International Workshop on Socio-Technical Aspects in Security and Trust, 2017.

K. P. Coopamootoo and D. Ashenden, Designing usable online privacy mechanisms: What can we learn from real world behaviour?, IFIP PrimeLife International Summer School on Privacy and Identity Management for Life, p.311324, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01559454

K. P. Coopamootoo and T. Groÿ, Mental models: An approach to identify privacy concern and behavior, At SOUPS 2014 workshop on Privacy Personas and Segmentation, 2014.

K. P. Coopamootoo and T. Groÿ, Cognitive eort in privacy decision-making vs. 3 x 4: Evaluation of a pilot experiment design, LASER 2014 Workshop, 2014.

K. P. Coopamootoo and T. Groÿ, Mental models for usable privacy: A position paper, LNCS, vol.8533, p.410421, 2014.

K. P. Coopamootoo and T. Groÿ, Mental models of online privacy: Structural properties and cognitive maps, British HCI 2014, 2014.

K. P. Coopamootoo and T. Groÿ, Why privacy is all but forgotten -an empirical study of privacy and sharing attitude, Proceedings on Privacy Enhancing Technologies, vol.4, p.3960, 2017.

R. De-paula, X. Ding, P. Dourish, K. Nies, B. Pillet et al., In the eye of the beholder: a visualization-based approach to information system security, International Journal of Human-Computer Studies, vol.63, issue.1-2, p.524, 2005.

L. Fuglsang, It and senior citizens: Using the internet for empowering active citizenship, Technology, & Human Values, vol.30, issue.4, p.468495, 2005.

J. Füller, H. Mühlbacher, K. Matzler, and G. Jawecki, Consumer empowerment through internet-based co-creation, Journal of Management Information Systems, vol.26, issue.3, p.71102, 2009.

S. Garnkel and H. R. Lipford, Usable security: History, themes, and challenges, Synthesis Lectures on Information Security, Privacy, and Trust, vol.5, issue.2, p.1124, 2014.

D. Harborth and S. Pape, Examining technology use factors of privacy-enhancing technologies: The role of perceived anonymity and trust, 2018.

M. Maass, P. Wichmann, H. Pridöhl, and D. Herrmann, Privacyscore: improving privacy and security via crowd-sourced benchmarks of websites, Annual Privacy Forum, p.178191, 2017.

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model, Information Systems Research, vol.15, issue.4, p.336355, 2004.

M. Mehrnezhad, E. Toreini, S. F. Shahandashti, and F. Hao, Stealing pins via mobile sensors: actual risk versus user perception, International Journal of Information Security, vol.17, issue.3, p.291313, 2018.

V. Midha, Impact of consumer empowerment on online trust: An examination across genders, Decision Support Systems, vol.54, issue.1, p.198205, 2012.

U. Nwadike, T. Groÿ, and K. P. Coopamootoo, Evaluating users' aect states: towards a study on privacy concerns, IFIP International Summer School on Privacy and Identity Management, p.248262, 2016.

K. O'hara, M. M. Tueld, and N. Shadbolt, Lifelogging: Privacy and empowerment with memories for life, Identity in the Information Society, vol.1, issue.1, p.155172, 2008.

N. Olivero and P. Lunt, Privacy versus willingness to disclose in e-commerce exchanges: The eect of risk awareness on the relative role of trust and control, Journal of Economic Psychology, vol.25, issue.2, p.243262, 2004.

J. Pierson, Online privacy in social media: A conceptual exploration of empowerment and vulnerability, 2012.

G. D. Pires, J. Stanton, and P. Rita, The internet, consumer empowerment and marketing strategies, European Journal of Marketing, vol.40, issue.9, p.936949, 2006.

K. W. Thomas and B. A. Velthouse, Cognitive elements of empowerment: An interpretive model of intrinsic task motivation, Academy of management review, vol.15, p.666681, 1990.

Y. Wang and A. Kobsa, Privacy-enhancing technologies, Handbook of research on social and organizational liabilities in information security, p.203227, 2009.

L. Wathieu, L. Brenner, Z. Carmon, A. Chattopadhyay, K. Wertenbroch et al., Consumer control and empowerment: A primer, Marketing Letters, vol.13, issue.3, p.297305, 2002.

A. Whitten and J. D. Tygar, Why johnny can't encrypt: A usability evaluation of pgp 5.0, USENIX Security Symposium, vol.348, 1999.

M. A. Zimmerman, Psychological empowerment: Issues and illustrations, American journal of community psychology, vol.23, issue.5, p.581599, 1995.