Acquisti, A. and Grossklags, J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy 3, 1 (2005), 26-33. [OpenAIRE]
Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. IEEE Security and Privacy 7, 6 (2009) 82-85.
Adams, A. and Sasse, A. Users Are Not The Enemy. Commun. ACM 42, 12 (1999), 40-46.
Baumer, D. L., J. B. Earp, et al. (2004). Internet privacy law: a comparison between the United States and the European Union. Computers & Security 23(5): 400-412. [OpenAIRE]
Brunk, B. D. (2002). Understanding the Privacy Space. First Monday 7(10).
Chakrabarti, D., and Punera, K. (2011). Event summarization using tweets. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media (pp. 66-73).
Chapman, E. (2003). Alternative approaches to assessing student engagement rates. Practical Assessment, Research & Evaluation 8(13).
Coles-Kemp, L. and D. M. A. Ashenden (2012). Community-centric engagement: lessons learned from privacy awareness intervention design. Proceedings of HCI 2012. The 26th BCS Conference on Human Computer Interaction. [OpenAIRE]
de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D.F., Ren, J., Rode, J.A., and Silva Filho, R. In the eye of the beholder: a visualization-based approach to information system security. Int. J. Hum.- Comput. Stud. 63, 1-2 (2005), 5-24.
Deci, E.L. 1992. The relation of interest to the motivation of behavior: A self-determination perspective. In Renniger, K.A. Hidi, S. Krapp, A. (eds) The role of interest in learning and development.
Diakopoulos, N., De Choudhury, M., and Naaman, M. 2012. Finding and assessing social media information sources in the context of journalism. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 2451-2460. [OpenAIRE]
Diamond, L. Liberation Technology. Journal of Democracy 21, 3 (2010), 69-83.
Dickey, M. (2005). Engaging By Design: How Engagement Strategies in Popular Computer and Video Games Can Inform Instructional Design. ETR&D 53(2): 67-83.
Dourish, P. and Anderson, D. Collective Information Practice: Exploring Security and Privacy as Social and Cultural Phenomena. Human Computer Interaction 21, 3 (2006), 319-342.
Dourish, P., Grinter, R. E., de la Flor, J.D. and Joseph, M. (2004). Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing 8: 391-401. [OpenAIRE]