, The European Parliament and Council General Data Protection Regulation, uri=CELEX: 32016R0679 Last Accessed, 2019.
Slaves to Big Data. Or Are We?, IDP. Revista de Internet, Derecho y Política, vol.17, pp.7-44, 2013. ,
, , 2018.
The semiotic engineering of human-computer interaction, 2005. ,
User Centered System Design: New Perspectives on Human-Computer Interaction, 1986. ,
Rapid contextual design: a how-to guide to key techniques for user-centered design, 2004. ,
Foundations for designing user-centered systems, pp.33-54, 2014. ,
Semiotic engineering: bringing designers and users together at interaction time, Interacting with Computers, vol.17, issue.3, pp.317-341, 2005. ,
Personal data management -a structured discussion, Digital Enlightenment Yearbook 2013: The Value of Personal Data, vol.270, pp.270-287, 2013. ,
End-user Privacy in Human-computer Interaction, Foundations and Trends in Human-Computer Interaction, vol.1, issue.1, pp.1-137, 2007. ,
The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, pp.1-20, 2018. ,
The continuing problems with online consent under the EU's emerging data protection principles, Computer Law & Security Review, vol.32, issue.3, pp.462-473, 2016. ,
Human Interface and the Management of Information. Interacting with Information. Human Interface, Lecture Notes in Computer Science, vol.6771, pp.349-358, 2011. ,
Privacy and human behavior in the age of information, Science, vol.347, issue.6221, pp.509-514, 2015. ,
Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations, SOUPS 2015 Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, pp.19-38, 2015. ,
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study, Information Systems Research, vol.22, issue.2, pp.254-268, 2011. ,
Promoting business success through contract visualization, Journal of Law, Business, and Ethics, vol.17, p.55, 2011. ,
From Words to Images Through Legal Visualization, pp.72-85, 2018. ,
A Visualization Approach for Adaptive Consent in the European Data Protection Framework, Proceedings of the 2017 Conference for E-Democracy and Open Government (CeDEM), pp.159-170, 2017. ,
Privacy Languages: Are We There Yet to Enable User Controls, Proceedings of the 20th International Conference Companion on World Wide Web, pp.799-806, 2016. ,
A Design Space for Effective Privacy Notices, SOUPS 2015 Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, pp.1-17, 2015. ,
User Interfaces for Privacy Agents, ACM Transactions on Computer-Human Interaction, vol.13, issue.2, pp.135-178, 2006. ,
Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, Journal of Computer Information Systems, vol.44, issue.4, pp.85-92, 2004. ,
How to Express Explicit and Auditable Consent, Proceedings of the 16th Annual Conference on Privacy, Security and Trust, pp.1-5, 2018. ,
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions, Journal of Cybersecurity, issue.1, pp.1-20, 2018. ,
Making PRIME Usable, Proceedings of SOUPS'05 Proceedings of the 2005 Symposium on Usable Privacy and Security, pp.53-64, 2005. ,
How to Make Privacy Policies both GDPR-Compliant and Usable, Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), pp.1-8, 2018. ,
Claudette meets GDPR: Automating the evaluation of privacy policies using artificial intelligence, pp.1-59, 2018. ,
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation, Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, pp.15-21, 2018. ,
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining, ACM Transactions on Internet Technology, vol.18, issue.4, p.18, 2018. ,
Semiotic engineering methods for scientific research in HCI, Synthesis Lectures on Human-Centered Informatics. Morgan & Claypool, 2009. ,
Software developers as users: semiotic investigations in human-centered software development, 2016. ,
Beyond the interface: users' perceptions of interaction and audience on websites, Interacting with Computers, vol.13, issue.3, pp.325-351, 2001. ,
A Critical Analysis of Privacy Design Strategies, 2016 IEEE Security and Privacy Workshops (SPW), pp.33-40, 2016. ,
Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Information Society, vol.3, issue.2, pp.247-251, 2010. ,
Peirce, signs, and meaning, 1997. ,
Online dispute resolution: Some implications for the emergence of law in cyberspace, International Review of Law Computers & Technology, vol.21, issue.2, pp.97-107, 2007. ,
Slave to the Algorithm: Why a Right to an Explanation Is Probably Not the Remedy You Are Looking for, Duke Law & Technology Review, vol.16, pp.18-84, 2017. ,