[1]
|
OFCOM Media Literacy Matters (2010) Online Trust and Privacy: People’s Attitude and Behaviour.
|
[2]
|
US Federal Trade Commission (2000) Privacy Online: Fair information Practices in the Electronic Marketplace: A Report to Con-gress. FTC, Washington DC.
|
[3]
|
Karahasanovic, A., Brandtz?g, P.B., Vanattenhoven, J., Lievens, B., Nielsen, K.T. and Pierson, J. (2009) Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. Computer, 42, 42-49. http://dx.doi.org/10.1109/MC.2009.186
|
[4]
|
KaniZabihi, E. and Helmhout, M. (2011) Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features. In: Pre-Proceedings of Nordsec 2011 16th Nordic Conference on Secure IT-Systems, Talinn, 26-28 October 2011, 287-306.
|
[5]
|
Gross, R. and Acquisti, A. (2005) Information Revelation and Privacy in Online Social Networks (The Facebook Case). ACM Workshop on Privacy in the Electronic Society, Virginia.
|
[6]
|
Palen, L. and Dourish, P. (2003) Unpacking “Privacy” for a Networked World. Proceeding of the SIGCHI Conference on Human Factors in Computer Systems.
|
[7]
|
Stutzman, F. (2006) An Evaluation of Identity-Sharing Behavior in Social Network Communities. iDMAa Journal, 3.
|
[8]
|
Acquisti, A. and Gross, R. (2006) Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Proceedings of the 6th Workshop on Privacy Enhancing Technologies. http://dx.doi.org/10.1007/11957454_3
|
[9]
|
Breakwell, G.M. (2006) Research Methods in Psychology. Sage Publications Ltd, Oxford.
|
[10]
|
Ajzen, I. (1991) The Theory of Planned Behaviour. Organizational Behaviour and Human Decision Processes, 50, 179-211. http://dx.doi.org/10.1016/0749-5978(91)90020-T
|
[11]
|
Masiello, B. (2009) Deconstructing the Privacy Experience. IEEE Security and Privacy, 7, 68-70.
http://dx.doi.org/10.1109/MSP.2009.88
|
[12]
|
Kolter, J. and Pernul, G. (2009) Generating User-Understandable Privacy Preferences. International Conference on Availability, Reliability and Security, 299-306.
|
[13]
|
Miller, R.E., Salmona, M. and Melton, J. (2011) Students and Social Networking Site: A Model of Inappropriate Posting. Proceedings of the Southern Association for Information Systems Conference, Atlanta.
|
[14]
|
Livingstone, S. (2008) Taking Risky Opportunities in Youthful Content Creation: Teenagers’ Use of Social Networking Sites for Intimacy, Privacy and Self-Expression. New Media and Society, 10, 393-411.
http://dx.doi.org/10.1177/1461444808089415
|
[15]
|
Fogg, B.J. and Iizawa, D. (2008) Online Persuasion in Facebook and Mixi: A Cross-Cultural Comparison. In Persuasive, Berlin, 35-46.
|
[16]
|
Houghton, D.J. and Joinson, A. (2010) Privacy, Social Network Sites, and Social Relations. Journal of Technology in Human Services, 28, 74-94. http://dx.doi.org/10.1080/15228831003770775
|
[17]
|
Acquisti, A. and Grossklags, J. (2004) Privacy Attitudes and Privacy Behaviour: Losses, Gains and Hyperbolic Discounting. In: Camp, L.J. and Lewis, R., Eds., The Economics of Information Security, Klewer.
|
[18]
|
Wang, Y., et al. (2011) I Regretted the Minute I Pressed Share: A Qualitative Study of Regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, ACM.
http://dx.doi.org/10.1145/2078827.2078841
|
[19]
|
LaRose, R. and Rifon, N. (2007) Promoting i-Safety: Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behaviour. The Journal of Consumer Affairs, 41, 127-149.
http://dx.doi.org/10.1111/j.1745-6606.2006.00071.x
|
[20]
|
Brandimarte, M., Acquisti, A. and Loewenstien, G. (2012) Misplaced Confidences: Privacy and the Control Paradox. In: Workshop on the Economics of Information Security, Harvard.
|
[21]
|
Galletta, D.F. and Zhang, P. (2006) Human-Computer Interaction and Management Information Systems: Applications. Vol. 6, ME Sharpe.
|
[22]
|
Lyytined, K. (2010) HCI Research: Future Directions That Matter. AIS Transactions on Human-Computer Interaction, 2, 22-25.
|
[23]
|
P?tzsch, S. (2009) Privacy Awareness: A Means to Solve the Privacy Paradox. The Future of Identity, 226-236.
|
[24]
|
Lew, L., et al. (2011) Of Course I Wouldn?t Do That in Real Life: Advancing the Arguments for Increasing Realism in HCI Experiments. Computer Human Interaction.
|
[25]
|
Marcus, A. (1998) Metaphor Design in User Interfaces. Journal of Computer Documentation, 22, 43-57.
|
[26]
|
Portes, A. (1998) Social Capital: Its Origins and Applications in Modern Sociology. Annual Review of Sociology, 24, 1-24. http://dx.doi.org/10.1146/annurev.soc.24.1.1
|
[27]
|
Bandura, A. (1977) Self-Efficacy: Toward a Unifying Theory of Behavioural Change. Psychological Review, 84, 191- 215. http://dx.doi.org/10.1037/0033-295X.84.2.191
|
[28]
|
Macmillan, N.A. (2002) Signal Detection Theory. In: Wixted, J., Ed., Stevens’ Handbook of Experimental Psychology, John Wiley & Sons, New York. http://dx.doi.org/10.1002/0471214426.pas0402
|
[29]
|
Barnes, S.B. (2006) A Privacy Paradox: Social Networking in the United States. First Monday, 11.
http://dx.doi.org/10.5210/fm.v11i9.1394
|
[30]
|
Milgra m, S. and Fleissner, R. (1974) Das Milgram-Experiment. Rowohlt.
|
[31]
|
Bishop, J. (2007) Increasing Participation in Online Communities: A Framework for Human-Computer Interaction. Computers in Human Behavior, 23, 1881-1893. http://dx.doi.org/10.1016/j.chb.2005.11.004
|
[32]
|
Bonneau, J., Anderson, J. and Church, L. (2009) Privacy Suites: Shared Privacy for Social Networks. 5th Symposium on Usable Privacy and Security.
|
[33]
|
Chiasson, S., et al. (2008) Influencing Users towards Better Passwords: Persuasive Cued Click-Points. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, Swin- ton, 121-130.
|
[34]
|
Fancher, R.E. (1973) Psychoanalytic Psychology: The Development of Freud’s Thought. WW Norton.
|