[Bambury P. (1998). A Taxonomy of Internet Commerce. First Monday, 3(10) (October 5, 1998), at http://www.firstmonday.dk/issues/issue3_10/bambury/index.html 10.5210/fm.v3i10.624]Search in Google Scholar
[Bankston K. (2009). Facebook’s New Privacy Changes: The Good, The Bad, and The Ugly. Electronic Frontier Foundation, 9 December 2009, at https://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changesgood-bad-and-ugly ]Search in Google Scholar
[Barnes S.B. (2006). A privacy paradox: Social networking in the United States’ First Monday, 11(9) (September 2006), at http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/1394/1312%23]Search in Google Scholar
[BBC (2011). Facebook U-turns on phone and address data sharing. BBC News, 18 January 2011, at http://www. bbc.com/news/technology-12214628]Search in Google Scholar
[Bell E. (2012). The real threat to the open web lies with the opaque elite who run it. The Guardian, 16 April 2012, at http://www.guardian.co.uk/commentisfree/2012/apr/16/threat-open-web-opaque-elite ]Search in Google Scholar
[Berners-Lee T. (2010). Long Live the Web. Scientific American, December 2010, pp. 80-85, at http://www.cs.virginia.edu/~robins/Long_Live_the_Web.pdf 10.1038/scientificamerican1210-80]Search in Google Scholar
[Bettini C., Jajodia S., Samarati P., & Wang X.S. (Eds.) (2009). Privacy in Location-Based Applications: Research Issues and Emerging Trends. Lecture Notes in Computer Science 5599, Springer-Verlag.]Search in Google Scholar
[Bleicher A. (2011). The Anti-Facebook. IEEE Spectrum, June 2011, pp. 47-51, 74, http://dx.doi.org/10.1109/MSPEC.2011.5779793 10.1109/MSPEC.2011.5779793]Search in Google Scholar
[boyd d. (2008). Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence. The International Journal of Research into New Media Technologies, 14(1), 13-20, http://dx.doi.org/10.1177/1354856507084416 10.1177/1354856507084416]Search in Google Scholar
[boyd d. (2012). The politics of “real names”. Communications of the ACM, 55(8) (August 2012) 29-31, http://dx.doi.org/10.1145/2240236.2240247 ]Search in Google Scholar
[boyd d., & Hargittai E. (2010). Facebook privacy settings: Who cares?. First Monday, 15, 8 (July 2010), at http:// firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/ article/view/3086/258910.5210/fm.v15i8.3086]Search in Google Scholar
[Cabello F., Franco M.G., & Haché A. (2013). The Social Web beyond ‘Walled Gardens’: Interoperability, Federation and the Case of Lorea/n-1. PsychNology Journal, 11(1), 43 - 65, at http://www.psychnology.org/File/PNJ11(1)/PSYCHNOLOGY_JOURNAL_11_1_CABELLO.pdfCFP (2010). A Social Network Users’ Bill of Rights.]Search in Google Scholar
[Computers, Freedom & Privacy Conference, June 2010, at http://www.cfp2010.org/wiki/index.php/A_Social_ Network_Users%27_Bill_of_Rights Clarke R. (1994). Information Infrastructure for The Networked Nation. Xamax Consultancy Pty Ltd, November 1994, at http://www.rogerclarke.com/II/NetNation.html, Extract from Section 2.4 at http://www.rogerclarke.com/II/NetN2.html ]Search in Google Scholar
[Clarke R. (1999). Person-Location and Person-Tracking: Technologies, Risks and Policy Implications. Proc. 21st International Conf. Privacy and Personal Data Protection, Hong Kong, September 1999. Revised version published in Information Technology & People 14, 1 (2001) 206-231, http://dx.doi.org/10.1108/0959384011069576710.1108/09593840110695767]Search in Google Scholar
[Clarke R. (2002). e-Consent: A Critical Element of Trust in e-Business. Proc. 15th Bled Electronic Commerce Conference, Bled, Slovenia, 17-19 June 2002, at https:// domino.fov.uni-mb.si/proceedings Clarke R. (2004a). Very Black ‘Little Black Books’. Xamax Consultancy Pty Ltd, February 2004, at http://www.rogerclarke.com/DV/ContactPITs.html ]Search in Google Scholar
[Clarke R. (2004b). Open Source Software and Open Content as Models for eBusiness. Proc. 17th International eCommerce Conference, Bled, Slovenia, 21-23 June 2004, https://domino.fov.uni-mb.si/proceedings ]Search in Google Scholar
[Clarke R. (2006). What’s ‘Privacy’?. Submission to the Australian Law Reform Commission, Xamax Consultancy Pty Ltd, July 2006, at http://www.rogerclarke.com/DV/Privacy.html ]Search in Google Scholar
[Clarke R. (2007). Business Models to Support Content Commons. SCRIPT-ed Special Issue on ‘Creating Commons’, 4(1), 59-71, http://dx.doi.org/10.2966/ scrip.040107.5910.2966/scrip.040107.59]Search in Google Scholar
[Clarke R. (2008a). B2C Distrust Factors in the Prosumer Er.’ Proc. CollECTeR Iberoamerica, Madrid, 25-28 June 2008, pp. 1-12, Invited Keynote Paper, at http://www.rogerclarke.com/EC/Collecter08.html ]Search in Google Scholar
[Clarke R. (2008b). Web 2.0 as Syndication. Journal of Theoretical and Applied Electronic Commerce Research, 3(2), 30-43, http://dx.doi.org/10.4067/S0718-1876200800010000410.4067/S0718-18762008000100004]Search in Google Scholar
[Clarke R. (2010a). An Evaluation of the Terms of Service and Privacy Policy of the LinkedIn Professional Networking Service. Xamax Consultancy Pty Ltd, at http://www.rogerclarke.com/EC/LinkedIn-1012.html ]Search in Google Scholar
[Clarke R. (2010b). Internet Users’ Second-Party Exposure.]Search in Google Scholar
[Xamax Consultancy Pty Ltd, http://www.rogerclarke.com/EC/IU-SPE-1012.html ]Search in Google Scholar
[Clarke R. (2011). The Cloudy Future of Consumer Computing. Proc. 24th Bled eConference, June 12-15, 2011, at http://www.rogerclarke.com/EC/CCC.html ]Search in Google Scholar
[Clarke R. (2013). Consumer-Oriented Social Media: The Identification of Key Characteristics. Working Paper, Xamax Consultancy Pty Ltd, at http://www.rogerclarke.com/II/COSM-1301.html ]Search in Google Scholar
[Clarke R. (2014). Privacy and Social Media: An Analytical Framework, Forthcoming. Journal of Law, Information and Science, 24 (March 2014), PrePrint at http://www.rogerclarke.com/DV/SMTD13.html ]Search in Google Scholar
[Clarke R., & Wigan M.R. (2011). You Are Where You’ve Been The Privacy Implications of Location and Tracking Technologies. Journal of Location Based Services, 5(3-4), 138-155, at http://www.rogerclarke.com/DV/YAWYB-CWP.html 10.1080/17489725.2011.637969]Search in Google Scholar
[Cohen J. (2013). A critical overview of the privacy debates regarding Facebook and an assessment of the ‘Anti- Facebook’ social network, Diaspora*, MA Thesis, University of the Witwatersrand, Johannesburg, February 2013, at http://mobile.wiredspace.wits.ac.za/bitstream/andle/10539/13131/Jenifer%20CohenThesis%20F.pdf?sequence=2]Search in Google Scholar
[Cox J. (2007). Tim Berners-Lee Warns of ‘Walled Gardens’ for Mobile Internet. The New York Times, 15 November 2007, at http://www.nytimes.com/idg/IDG_002570DE00740E1800257394004818F5.html?ex=1352869200&en=d4abf597b593be42&ei=5088&partner=rssnyt&emc=rss ]Search in Google Scholar
[Enders A., Hungenberg H., Denker H.P., & Mauch S. (2008).The long tail of social networking: Revenue models of social networking sites. European Management Journal, 26, 199- 211, http://dx.doi.org/10.1016/j.emj.2008.02.00210.1016/j.emj.2008.02.002]Search in Google Scholar
[Esguerra R. (2011). An Introduction to the Federated Social Network. Electronic Frontier Foundation, 21 March 2011, at https://www.eff.org/deeplinks/2011/03/introduction-distributed-social-network ]Search in Google Scholar
[Franchi E., & Tomaiuolo M. (2012). Software Agents for Distributed Social Networking. In De Paoli F. & Vizzari G. (eds.), Proc. 13th Workshop on Objects and Agents (WOA 2012), Milano, Italy, September 17-19, 2012, at http://ceur-ws.org/Vol-892/paper4.pdf ]Search in Google Scholar
[Gallagher R. (2013. Software that tracks people on social media created by defence firm. The Guardian, 10 February 2013, at http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence ]Search in Google Scholar
[GFW (2011). Who is harmed by a “Real Names” policy?. Geek Feminism Wiki, at http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F, accessed 3 August 2011.]Search in Google Scholar
[Handel M. (2011). Privacy in Social Networks. In Asaj N. et al. (eds), Proc. Third Seminar on Research Trends in Media Informatics, Institute of Media Informatics, Ulm University, 7-8 February 2011, pp. 77-82, at http://d-nb.info/1016626320/34#page=77]Search in Google Scholar
[Harris W. (2006). Why Web 2.0 will end your privacy. bit-tech.net, 3 June 2006, at http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/ ]Search in Google Scholar
[Helft M. (2010). Critics Say Google Invades Privacy With New Service. The New York Times, 12 February 2010, at http://www.nytimes.com/2010/02/13/technology/internet/13google.html?_r=1]Search in Google Scholar
[Howe J. (2006). The Rise of Crowdsourcing. Wired 14.06 (June 2006), http://www.wired.com/wired/archive/14.06/crowds.html ]Search in Google Scholar
[Kaplan A.M., & Haenlein M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), (Jan-Feb 2010) 59-68, slide-set at http://www.slideshare.net/studente1000/kaplan-andreas-m-haenlein-michael-2010-users-ofthe-orld-unite-the-challenges-and-opportunities-of-social-media-business-horizons-vol-53-issue-1-p-596810.1016/j.bushor.2009.09.003]Search in Google Scholar
[Krotoski A. (2012). Online identity: is authenticity or anonymity more important?. The Guardian, April 2012, at http://www.guardian.co.uk/technology/2012/apr/19/online-identity-authenticity-anonymity/print ]Search in Google Scholar
[Lankton N., & McKnight D. H. (2011). What Does it Mean to Trust Facebook? Examining Technology and Interpersonal Trust Beliefs. ACM SIGMIS Database, 42(2), 32-54, http://dx.doi.org/10.1145/1989098.198910110.1145/1989098.1989101]Search in Google Scholar
[McKeon M. (2010). The Evolution of Privacy on Facebook. Self-Published, at http://mattmckeon.com/facebookprivacy/ ]Search in Google Scholar
[Mann S. (2002). Cyborglogs (“glogs”). Wearcam.org, at http://wearcam.org/glogs.htm ]Search in Google Scholar
[Matlin C. (2010). With Google Buzz, your closest circle of friends is wide open. The Washington Post, 28 February 2010, at http://www.washingtonpost.com/wp-dyn/content/article/2010/02/26/AR2010022606639.html ]Search in Google Scholar
[Michael K., & Clarke R. (2013). Location and Tracking of Mobile Devices: Überveillance Stalks the Streets’ Forthcoming, Computer Law & Security Review, 29(2), PrePrint at http://www.rogerclarke.com/DV/LTMD.html ]Search in Google Scholar
[Moglen E. (2010). Freedom In the Cloud: Software Freedom, Privacy, and Security for Web 2.0 and Cloud Computing. Software Freedom Law Center, 5 February 2010, at http://www.softwarefreedom.org/events/2010/isoc-ny/FreedomInTheCloud-transcript.html ]Search in Google Scholar
[Musiani F. (2010). When social links are network links: The dawn of peer-to-peer social networks and its implications for privacy. Observatorio (OBS*) Journal, 4(39, 185-207, at http://halshs.archives-ouvertes.fr/docs/00/57/93/42/PDF/Musiani_2010_P2PPrivacy.pdf ]Search in Google Scholar
[Narayanan A., Barocas S., Toubiana V, Nissenbaum H., & Boneh D. (2012). A Critical Look at Decentralized Personal Data Architectures. arXiv: 1202.4503, 22 February 2012, at http://arxiv.org/abs/1202.4503]Search in Google Scholar
[NYT (2010). Facebook Privacy: A Bewildering Tangle of Options. The New York Times, 12 May 2010, at http:// www.nytimes.com/interactive/2010/05/12/business/facebook-privacy.html ]Search in Google Scholar
[O’Connor R. (2012). Facebook is Not Your Friend. Huffington Post, 15 April 2012, at http://www.huffingtonpost.com/rory-oconnor/facebook-privacy_b_1426807.html ]Search in Google Scholar
[Opsahl K. (2010). Facebook’s Eroding Privacy Policy: A Timeline. Electronic Frontier Foundation, 28 April 2010, at https://www.eff.org/deeplinks/2010/04/facebooktimeline/ ]Search in Google Scholar
[O’Reilly T. (2005). What Is Web 2.0? Design Patterns and Business Models for the Next Generation of Software.]Search in Google Scholar
[O’Reilly, 30 September 2005, at http://www.oreillynet.com/lpt/a/6228]Search in Google Scholar
[Osterwalder A., & Pigneur Y. (2002). An e-Business Model Ontology for Modeling e-Business. Proc. 15th Bled Electronic Commerce Conf., Bled, Slovenia, June 17 -19, 2002, at https://domino.fov.uni-mb.si/proceedings ]Search in Google Scholar
[Rappa M. (2003). Business Models on the Web. At http://digitalenterprise.org/models/models.html ]Search in Google Scholar
[Rheingold H. (1993). The virtual community: homesteading on the electronic frontier. New York: HarperPerrenial.]Search in Google Scholar
[Shane D, (2010). Facebook is “deliberately killing privacy”, says Schneier. Information Age, 13 October 2010, at http://www.information-age.com/technology/security/1290603/facebook-is-%22deliberately-killingprivacy%22-says-schneier ]Search in Google Scholar
[Smarr J. et al. (2007). A Bill of Rights for Users of the Social Web. OpenSocialWeb, September 2007, at http:// www.opensocialweb.org/ , copy at http://www.template.org/?page_id=599/2007/09/05/bill-of-rights/ ]Search in Google Scholar
[Smith G. (2004). Folksonomy: social classification.]Search in Google Scholar
[Mendeley, 3 August 2004, at http://www.mendeley.com/research/folksonomy-social-classification/ ]Search in Google Scholar
[Svantesson D., & Clarke R. (2010). Privacy and Consumer Risks in Cloud Computing. Computer Law & Security Review, 26( ), 391-397, http://dx.doi.org/10.1016/j.clsr.2010.05.005 10.1016/j.clsr.2010.05.005]Search in Google Scholar
[van Dijck J. & Nieborg D. (2009). Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos. New Media & Society, 11(4), 855-874, at http://www.gamespace.nl/content/Wikinomics_and_its_discontents_2009.pdf ]Search in Google Scholar
[Waugh R. (2012). Unfair and unwise: Google brings in new privacy policy for two billion users - despite EU concerns it may be illegal. Daily Mail, 2 March 2012, at http:// www.dailymail.co.uk/sciencetech/article-2108564/Google-privacy-policy-changes-Global-outcry-policyignored.html ]Search in Google Scholar
[Wilde W.D., & Swatman P.A. (1999). A Preliminary Theory of Telecommunications Enhanced Communities. Proc. 12th Int’l Bled Electronic Commerce Conf., Bled, Slovenia, June 7 - 9, 1999.]Search in Google Scholar
[Wilson C., Steinbauer T., Wang G., Sala A., Zheng H. & Zhao B.Y. (2011). Privacy, Availability and Economics in the Polaris Mobile Social Network. Proc. ACM Workshop on Mobile Computing Systems and Applications (HotMobile 2011), at http://www.cs.ucsb.edu/~ravenben/publications/pdf/polaris-hotmobile11.pdf 10.1145/2184489.2184499]Search in Google Scholar
[Womack B. (2013). Facebook Seen Reporting Faster Sales Growth on Ad Demand. Bloomberg News, 31 January 2013, at http://www.bloomberg.com/news/2013-01-30/facebook-seen-reporting-faster-sales-growth-on-mobilead-demand.html ]Search in Google Scholar
[Yeung C.M.A., Liccardi I., Lu K., Seneviratne O., & Berners- Lee T. (2009). Decentralization: The Future of Online Social Networking, in: W3C Workshop on the Future of Social Networking, at http://www.w3.org/2008/09/msnws/papers/decentralization.pdf ]Search in Google Scholar