Obstacles to the adoption of secure communication tools, Security and Privacy (SP), 2017 IEEE Symposium on, p.137153, 2017. ,
Privacy in e-commerce: examining user scenarios and privacy preferences, Proceedings of the 1st ACM conference on Electronic commerce, p.18, 1999. ,
Nudges for privacy and security: Understanding and assisting users' choices online, 2017. ,
E-empowerment: Empowerment by the internet, Computers in Human Behavior, vol.24, issue.5, p.17761789, 2008. ,
Design for privacy in ubiquitous computing environments, Proceedings of the Third European Conference on Computer-Supported Cooperative Work, p.7792, 1317. ,
Usable security and privacy: a case study of developing privacy management tools, Proceedings of the 2005 symposium on Usable privacy and security, p.3543, 2005. ,
Privacy stories: condence in privacy behaviors through end user programming, SOUPS, 2009. ,
Work in progress: Fearful users' privacy intentions -an empirical investigation, 7th International Workshop on Socio-Technical Aspects in Security and Trust, 2017. ,
Designing usable online privacy mechanisms: What can we learn from real world behaviour?, IFIP PrimeLife International Summer School on Privacy and Identity Management for Life, p.311324, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01559454
Mental models: An approach to identify privacy concern and behavior, At SOUPS 2014 workshop on Privacy Personas and Segmentation, 2014. ,
Cognitive eort in privacy decision-making vs. 3 x 4: Evaluation of a pilot experiment design, LASER 2014 Workshop, 2014. ,
Mental models for usable privacy: A position paper, LNCS, vol.8533, p.410421, 2014. ,
Mental models of online privacy: Structural properties and cognitive maps, British HCI 2014, 2014. ,
Why privacy is all but forgotten -an empirical study of privacy and sharing attitude, Proceedings on Privacy Enhancing Technologies, vol.4, p.3960, 2017. ,
In the eye of the beholder: a visualization-based approach to information system security, International Journal of Human-Computer Studies, vol.63, issue.1-2, p.524, 2005. ,
It and senior citizens: Using the internet for empowering active citizenship, Technology, & Human Values, vol.30, issue.4, p.468495, 2005. ,
Consumer empowerment through internet-based co-creation, Journal of Management Information Systems, vol.26, issue.3, p.71102, 2009. ,
Usable security: History, themes, and challenges, Synthesis Lectures on Information Security, Privacy, and Trust, vol.5, issue.2, p.1124, 2014. ,
Examining technology use factors of privacy-enhancing technologies: The role of perceived anonymity and trust, 2018. ,
Privacyscore: improving privacy and security via crowd-sourced benchmarks of websites, Annual Privacy Forum, p.178191, 2017. ,
Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model, Information Systems Research, vol.15, issue.4, p.336355, 2004. ,
Stealing pins via mobile sensors: actual risk versus user perception, International Journal of Information Security, vol.17, issue.3, p.291313, 2018. ,
Impact of consumer empowerment on online trust: An examination across genders, Decision Support Systems, vol.54, issue.1, p.198205, 2012. ,
Evaluating users' aect states: towards a study on privacy concerns, IFIP International Summer School on Privacy and Identity Management, p.248262, 2016. ,
Lifelogging: Privacy and empowerment with memories for life, Identity in the Information Society, vol.1, issue.1, p.155172, 2008. ,
Privacy versus willingness to disclose in e-commerce exchanges: The eect of risk awareness on the relative role of trust and control, Journal of Economic Psychology, vol.25, issue.2, p.243262, 2004. ,
Online privacy in social media: A conceptual exploration of empowerment and vulnerability, 2012. ,
The internet, consumer empowerment and marketing strategies, European Journal of Marketing, vol.40, issue.9, p.936949, 2006. ,
Cognitive elements of empowerment: An interpretive model of intrinsic task motivation, Academy of management review, vol.15, p.666681, 1990. ,
Privacy-enhancing technologies, Handbook of research on social and organizational liabilities in information security, p.203227, 2009. ,
Consumer control and empowerment: A primer, Marketing Letters, vol.13, issue.3, p.297305, 2002. ,
Why johnny can't encrypt: A usability evaluation of pgp 5.0, USENIX Security Symposium, vol.348, 1999. ,
Psychological empowerment: Issues and illustrations, American journal of community psychology, vol.23, issue.5, p.581599, 1995. ,