[[1] Islam, SMR; Kwak, D ; Kabir, MH; Hossain, Kwak, KS, The Internet of Things for Health Care: A Comprehensive Survey, available on http://ieeexplore.ieee.org/document/7113786/]Search in Google Scholar
[[2] J.Gubbi et al, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, 29(2013), pp. 1645-1660. ]Search in Google Scholar
[[3] www.waymo.ro]Search in Google Scholar
[[4] https://www.linkedin.com/in/petertlewis]Search in Google Scholar
[[5] http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outagestatus- explained]Search in Google Scholar
[[6] https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/]Search in Google Scholar
[[7] https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddoshack- botnet]Search in Google Scholar
[[8] http://www.washingtonexaminer.com/wikileaks-warns-cia-can-hack-cars-forundetectable-assassinations/article/2616661]Search in Google Scholar
[[9] https://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99]Search in Google Scholar
[[10] http://ec.europa.eu/eurostat/statistics-explained/index.php/Ecommerce_statistics_for_individuals]Search in Google Scholar
[[11] https://www.bigcommerce.com/blog/ecommerce-trends/]Search in Google Scholar
[[12] https://deviceatlas.com/blog/16-mobile-market-statistics-you-should-know-2016]Search in Google Scholar
[[13] https://privacy.google.com/your-data.html accesat la 01 aprilie 2017]Search in Google Scholar
[[14] https://www.google.ro/adwords/ accesat la 01 aprilie 2017]Search in Google Scholar
[[15] Thomas J. Holt, Olga Smirnova & Yi Ting Chua (2016), Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets, Deviant Behavior, DOI: 10.1080/01639625.2015.102676610.1080/01639625.2015.1026766]Search in Google Scholar
[[16] Michael Trusov, Liye Ma, Zainab Jamal (2016,) Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting. Marketing Science Published online in Articles in Advance 28 Apr 2016 . http://dx.doi.org/10.1287/mksc.2015.095610.1287/mksc.2015.0956]Search in Google Scholar
[[17] https://zephoria.com/top-15-valuable-facebook-statistics/]Search in Google Scholar
[[18] https://www.facebook.com/policy.php accessed on April 2017]Search in Google Scholar
[[19] Montgomery, K. C. Youth and surveillance in the Facebook era: Policy interventions and social implications. Telecommunications Policy (2015), Volume: 39 Issue: 9 Pages: 771-786, http://dx.doi.org/10.1016/j.telpol.2014.12.006i]Search in Google Scholar
[[20] https://jtlr.wordpress.com/2011/12/11/facebook-issues-people-moan-too-much/]Search in Google Scholar
[[21] https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data]Search in Google Scholar
[[22] Reddick, Christopher G. ; Chatfield, Akemi Takeoka; Jaramillo, Patricia A. - Public opinion on National Security Agency surveillance programs: A multi-method approach, available at http://apps.webofknowledge.com.am.enformation.ro/full_record.do?product=WOS&search_mode=GeneralSearch&qid=7&SID=X2PUkelOYUMPmkZUtY6&page=2&doc=55]Search in Google Scholar
[[23] Working document no. 3, Claude Moraes, Jan Philipp Albrecht http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dt/1011/1011370/1011370ro.pdf]Search in Google Scholar
[[24] Bauman, Zygmunt et al. (2014) After Snowden: Rethinking the Impact of Surveillance. International Political Sociology , doi: 10.1111/ips.12048, p. 123]Search in Google Scholar
[[25] http://www.telesurtv.net/english/news/NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.html]Search in Google Scholar
[[26] http://www.nydailynews.com/news/national/wikileaks-documents-show-alleged-ciaprogram- hack-smart-tvs-article-1.2991141]Search in Google Scholar