. Ofcom, The Communications Market Report, 2017.

J. Zang, K. Dummit, and J. Graves, Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps, Technology Science, 2015.

T. R. Book, Privacy Concerns in Android Advertising Libraries. Thesis, 2015.

A. Narayanan and V. Shmatikov, Myths and Fallacies of 'Personally Identifiable Information', Commun ACM, vol.53, pp.24-26, 2010.

W. Christl, S. Spiekermann, and . Networks, , 2016.

, Zuiderveen Borgesius F. Singling Out People Without Knowing Their Names -Behavioural Targeting, Pseudonymous Data, and the New Data Protection Regulation. SSRN Scholarly Paper ID 2733115, 2016.

A. Schiff, Edition: A Marketer's Guide To Cross-Device Identity, 2015.

Y. De-montjoye, C. A. Hidalgo, and M. Verleysen, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.3, 2013.

F. Borgesius, J. Möller, and S. Kruikemeier, Online Political Microtargeting: Promises and Threats for Democracy, 2018.

H. Almuhimedi, F. Schaub, and N. Sadeh, Your Location Has Been Shared 5, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.787-796

R. Balebako, J. Jung, and W. Lu, Little Brothers Watching You': Raising Awareness of Data Leaks on Smartphones, Proceedings of the Ninth Symposium on Usable Privacy and Security, vol.12, p.11

A. P. Felt, S. Egelman, and D. Wagner, Ve Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns, Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.33-44

J. Lin, S. Amini, and J. I. Hong, Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp.501-510

B. Liu, M. S. Andersen, and F. Schaub, Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions, Twelfth Symposium on Usable Privacy and Security, pp.27-41, 2016.

L. Tsai, P. Wijesekera, and J. Reardon, Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences, Thirteenth Symposium on Usable Privacy and Security, pp.145-162, 2017.

P. Wijesekera, A. Baokar, and J. Y. Tsai, The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences, 2017.

A. Mathur, J. Vitak, and A. Narayanan, Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking -Semantic Scholar, /paper/Characterizing-the-Useof-Browser-Based-Blocking-To

. Narayanan, , 2018.

F. Schaub, A. Marella, and P. Kalvani, Watching Them Watching Me: Browser Extensions Impact on User Privacy Awareness and Concern, 2016.

P. Leon, B. Ur, and R. Shay, Why Johnny Can'T Opt out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.589-598

P. Dunphy, J. Vines, and L. Coles-kemp, Understanding the Experience-Centeredness of Privacy and Security Technologies, Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp.83-94

L. Stark, The emotional context of information privacy, The Information Society, vol.32, pp.14-27, 2016.

I. Shklovski, S. D. Mainwaring, and H. H. Skúladóttir, Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use, Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, pp.2347-2356

N. R. Mathiasen and S. Bødker, Experiencing Security in Interaction Design, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2325-2334

M. Nørgaard and K. Hornb\a, What Do Usability Evaluators Do in Practice?: An Explorative Study of Think-aloud Testing, Proceedings of the 6th Conference on Designing Interactive Systems, pp.209-218

E. L. Olmsted-hawala, E. D. Murphy, and S. Hawala, Think-aloud Protocols: A Comparison of Three Think-aloud Protocols for Use in Testing Data-dissemination Web Sites for Usability, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2381-2390

A. U. Smith and . Smartphone, , 2015.

M. Denscombe, The Good Research Guide, 2007.

R. B. Clayton, G. Leshner, and A. Almond, The Extended iSelf: The Impact of iPhone Separation on Cognition, Emotion, and Physiology, Journal of Computer-Mediated Communication, vol.20, pp.119-135, 2015.

P. G. Kelley, S. Consolvo, and L. F. Cranor, A Conundrum of Permissions: Installing Applications on an Android Smartphone, Financial Cryptography and Data Security, pp.68-79

L. Rainie and M. Madden, Americans' Privacy Strategies Post-Snowden, 2015.

L. Rainie, S. Kiesler, and R. Kang, Part 2: Concerns About Personal Information Online, Pew Research Center: Internet, Science & Tech, 2013.

J. Jung, S. Han, D. Wetherall, . Short, and . Paper, Enhancing Mobile Application Permissions with Runtime Feedback and Constraints, Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.45-50

H. Oinas-kukkonen and M. Harjumaa, Persuasive Systems Design: Key Issues, Process Model, and System Features, Communications of the Association for Information Systems, vol.24, 2009.

P. Wright, C. Peter, and J. C. Mccarthy, Experience-centered design designers, users, and communities in dialogue, 2010.

M. Abrams, The Origins of Personal Data and its Implications for Governance, SSRN Scholarly Paper ID 2510927, p.16, 2014.

W. W. Gaver, J. Bowers, and A. Boucher, The Drift Table: Designing for Ludic Engagement, CHI '04 Extended Abstracts on Human Factors in Computing Systems, pp.885-900

H. Hutchinson, W. Mackay, and B. Westerlund, Technology Probes: Inspiring Design for and with Families, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.17-24

D. Uriu and W. Odom, Designing for Domestic Memorialization and Remembrance: A Field Study of Fenestra in Japan, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp.5945-5957

J. Vines, M. Blythe, and P. Dunphy, Cheque Mates: Participatory Design of Digital Payments with Eighty Somethings, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.1189-1198