Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce, pp.21-29, 2004. ,
Nudging privacy: The behavioral economics of personal information, 2009. ,
Privacy Attitudes and Privacy Behavior, 2004. ,
Privacy and rationality in individual decision making, IEEE Security Privacy, vol.3, issue.1, 2005. ,
Inferring social links from mobility profiles, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, vol.2, pp.1943-1957, 2017. ,
Find me if you can: improving geographical prediction with social and spatial proximity, 2010. ,
Characterizing user behavior in online social networks, IMC, 2009. ,
Dissecting privacy risks in biomedical data, Proceedings of the 3rd IEEE European Symposium on Security and Privacy, 2018. ,
Moving beyond untagging: photo privacy in a tagged world, Proc. of SIGCHI, 2010. ,
Interdependent Privacy: Let Me Share Your Data, FC, 2013. ,
A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks, Pervasive and Mobile Computing (PMC), 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01108962
You are what you like! information leakage through users' interests, NDSS, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00748162
Information privacy concern about peer disclosure in online social networks, IEEE Transactions on Engineering Management, vol.62, issue.3, pp.311-324, 2015. ,
Networked privacy management in Facebook: A mixed-methods and multinational study, Proc. of CSCW, 2016. ,
Inferring social ties from geographic coincidences, Proc. of PNAS, p.107, 2010. ,
Estimating age privacy leakage in online social networks, INFOCOM, 2012. ,
Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making, ACM Transactions on Computer-Human Interaction (TOCHI), vol.24, issue.1, p.5, 2017. ,
Game theory, 1991. ,
Cooped: Co-owned personal data management, Computers & Security, vol.47, 2014. ,
Conjoint Analysis in Consumer Research: Issues and Outlook, Journal of Consumer Research, vol.5, issue.2, 1978. ,
Snapme if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it, 2013. ,
Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy, CCS'13: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013. ,
On non-cooperative genomic privacy, FC, 2015. ,
DOI : 10.1007/978-3-662-47854-7_24
URL : http://repository.bilkent.edu.tr/bitstream/11693/28396/1/On%20non-cooperative%20genomic%20privacy.pdf
Face/Off: Preventing Privacy Leakage From Photos in Social Networks, CCS, 2015. ,
Autonomous and interdependent: Collaborative privacy management on social networking sites, Proc. of CHI, 2016. ,
DOI : 10.1145/2858036.2858415
Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon, Computers Security, 2015. ,
Probabilistic graphical models: principles and techniques, 2009. ,
Multi-agent influence diagrams for representing and solving games, Games and economic behavior, vol.45, issue.1, 2003. ,
DOI : 10.1016/s0899-8256(02)00544-4
URL : http://ai.stanford.edu/~koller/Papers/Koller+Milch:IJCAI01.pdf
Online social networks: Why we disclose, Journal of information technology, vol.25, issue.2, 2010. ,
DOI : 10.1057/jit.2010.6
A survey of computational location privacy. Personal and Ubiquitous Computing, vol.13, 2009. ,
DOI : 10.1007/s00779-008-0212-5
We're in it together: interpersonal management of disclosure in social network services, Proc. of CHI, 2011. ,
A survey of interdependent information security games, 2015. ,
DOI : 10.1145/2635673
URL : http://www.hit.bme.hu/~buttyan/publications/LaszkaFB14acmcsur.pdf
Some analytic dimensions of privacy, Proceedings of the Lund Conference on Architectural Psychology, 1973. ,
Privacy as a concept and a social issue: A multidimensional developmental theory, Journal of social Issues, vol.33, issue.3, pp.22-42, 1977. ,
DOI : 10.1111/j.1540-4560.1977.tb01880.x
All your location are belong to us: Breaking mobile social networks for automated user location tracking, MobiHoc, 2014. ,
DOI : 10.1145/2632951.2632953
On the Windfall of Friendship: Inoculation Strategies on Social Networks, EC, 2008. ,
You are who you know: Inferring user profiles in online social networks, WSDM, 2010. ,
Pacman: Personal agent for access control in social media, IEEE Internet Computing, vol.21, issue.6, pp.18-26, 2017. ,
Game theory, 2013. ,
Inferring interests from mobility and social interactions, Proc. of NIPS Workshops, 2009. ,
Quantifying interdependent privacy risks with location data, In IEEE Trans. Mobile Comput, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01266229
Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study, European Journal of Information Systems, vol.26, issue.6, pp.642-660, 2017. ,
FYI: Communication Style Preferences Underlie Differences in Locationsharing Adoption and Usage, UbiComp, 2013. ,
Where's wally?: Precise user discovery attacks in location proximity services, CCS, pp.817-828, 2015. ,
An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences, GameSec, 2014. ,
Towards a model on the factors influencing social app users' valuation of interdependent privacy, 2015. ,
Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios, ICIS. Assoc. for Information Systems, 2015. ,
Valuating friends' privacy: Does anonymity of sharing personal data matter?, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 2017. ,
An ultimatum game model for the evolution of privacy in jointly managed content, International Conference on Decision and Game Theory for Security, pp.112-130, 2017. ,
Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook, First Monday, vol.15, issue.1, 2010. ,
Poster: Do users make rational security decisions?, 2018. ,
Findyou: A personal location privacy auditing tool, 2016. ,
Who are the crowdworkers?: Shifting demographics in mechanical turk, CHI, 2010. ,
Privacy games: Optimal user-centric data obfuscation, PoPETS, issue.2, 2015. ,
Protecting location privacy: optimal strategy against localization attacks, CCS'12: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012. ,
Portrait of a privacy invasion; detecting relationships through large-scale photo analysis, 2015. ,
Resolving multi-party privacy conflicts in social media, IEEE KDE, 2016. ,
Photo privacy conflicts in social media: A large-scale empirical study, Proc. of CHI, 2017. ,
Empirical models of privacy in location sharing, UbiComp, 2010. ,
Theory of games and economic behavior, 2007. ,
A Location-Privacy Threat Stemming from the Use of Shared Public IP, IEEE Trans. on Mobile Computing (TMC), vol.13, issue.11, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00954306
will check-in for badges": Understanding bias and misbehavior on location-based social networks, ICWSM, 2016. ,
Social and political dimensions of privacy, Journal of social issues, vol.59, issue.2, pp.431-453, 2003. ,
Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share, UbiComp, 2011. ,
Fighting for my space: Coping mechanisms for sns boundary regulation, Proc. of SIGCHI, 2012. ,
, Xlstat statistical software for microsoft excel, 2016.
Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data, Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2017. ,
Reframing privacy 2.0 in online social network, Pa. J. Const. L, 2011. ,
You can yak but you can't hide: Localizing anonymous social network users, Proceedings of the 2016 Internet Measurement Conference, pp.25-31, 2016. ,
DOI : 10.1145/2987443.2987449
I know where you are: thwarting privacy protection in location-based social discovery services, IEEE Conference on Computer Communications Workshops, pp.179-184, 2015. ,
Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit, 2014. ,
Learning transportation mode from raw GPS data for geographic applications on the web, WWW, pp.247-256, 2008. ,