References

  1. Adar, E.; Tan, D. S. and Teevan, J. Benevolent Deception in Human Computer Interaction. In Chi 2013: 1863-1872, 2013. doi 
  2. Ahadzadeh, A. S.; Sharif, S. P. and Ong, F. S. Self-schema and self-discrepancy mediate the influence of Instagram usage on body image satisfaction among youth. In Computers in Human Behavior, 68: 8-16, 2017.
  3. Akerlof, G. A. and Shiller, R. J. Privacy in context: Technology, policy, and the integrity of social life. Princeton University Press, 2015.
  4. Akker, H.; Jones, V. M. and Hermens, H. J. Tailoring Real-time Physical Activity Coaching Systems: A Literature Survey and Model. In User Modeling and User-Adapted Interaction, 24 (5): 351-392, 2014. doi 
  5. Albrechtslund, A Online social networking as participatory surveillance. In First Monday, 13 (3): 1-11, 2008.
  6. Alexander, J. M and Smith, J. M Disinformation : A Taxonomy. Technical Report, University of Pennsylvania Department of Computer & Information Science, 2010.
  7. Anolli, L.; Balconi, M. and Ciceri, R. Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication. In Say not to say New perspectives on miscommunication (FEBRUARY): 73-100, 2001.
  8. Aoki, P. M. and Woodruff, A. Making Space for Stories: Ambiguity in the Design of Personal Communication Systems. doi  www 
  9. Appelquist, D. and Brickley, D. A Standards-based, Open and Privacy-aware Social Web. Technical Report, W3C, 2010.
  10. Armenti, M. New Twitter search API won't be available to third-party clients. In marco.org, 2014.
  11. Armenti, M. Twitter's "peace offering" to developers is meaningless. In marco.org, 2014.
  12. Atkins, M., W. N. W., M. C., W. M. and Dolin, R. ActivityStreams 1.0 Concepts and Representations. Technical Report, , 2010.
  13. Auger, J. Speculative design: crafting the speculation. In Digital Creativity, 24 (1): 11-35, 2013.
  14. Baker, A. J. Mick or Keith: blended identity of online rock fans. In Identity in the Information Society, 2 (1): 7-21, 2009.
  15. Barcena, M. B.; Wueest, C. and Lau, H. How safe is your quantified self. In Symantech: Mountain View, CA, USA, 2014.
  16. Bardzell, J.; Bardzell, S. and Stolterman, E. Reading critical designs: supporting reasoned interpretations of critical design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1951-1960, 2014.
  17. Barlow, J. Born Digital: Understanding the First Generation of Digital Natives.
  18. Barmann, J. Drag Queens, Other Performers Outraged As Facebook Forces Them To Use Their Real Names. www 
  19. Barrett, R. facebook: /me/posts returns objects with ids with colons. In GitHub Issues, 2014.
  20. Baym, N. K and boyd, d. Socially mediated publicness: An introduction. In Journal of Broadcasting & Electronic Media, 56 (3): 320-329, 2012.
  21. Beer, D. Social network(ing) sites...revisiting the story so far: A response to danah boyd & Nicole Ellison. In Journal of Computer-Mediated Communication, 13 (2): 516-529, 2008. doi 
  22. Berners-Lee, T. and Fischetti, M Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web. Harper Collins, New York, New York, USA, 1999.
  23. Berners-Lee, T. Socially Aware Cloud Storage. In Design Issues, 2009.
  24. Berners-Lee, T.; Fischetti, M. and Foreword By-Dertouzos, M. L Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. HarperInformation, 2000.
  25. Berners-Lee, T.; Hall, W.; Hendler, J. A.; O'Hara, K.; Shadbolt, N. and Weitzner, D. J. A Framework for Web Science. In Found. Trends Web Sci., 1 (1): 1-130, 2006. doi 
  26. Bernstein, M.; Monroy-Hernandez, A.; Harry, D.; Andre, P.; Panovich, K. and Vargas, G. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pages 50-57, Association for the Advancement of Artificial Intelligence, 2011.
  27. Bielenberg, A.; Helm, L.; Gentilucci, A.; Stefanescu, D. and Zhang, H. The growth of diaspora-a decentralized online social network in the wild. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pages 13-18, 2012.
  28. Birnholtz, J.; Dixon, G. and Hancock, J. Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization. In Computers in Human Behavior, 28 (3): 1028-1035, 2012.
  29. Blascovich, J. and Bailenson, J. Infinite reality: The hidden blueprint of our virtual lives. William Morrow, 2011.
  30. Bok, S. Lying: Moral choice in public life. In New York: Pantheon, 1978.
  31. Bok, S. Lying: Moral choice in public and private life. Random House LLC, 2011.
  32. Bortoli, S.; Palpanas, T. and Bouquet, P. Pulling down the walled garden: Towards a paradigm for decentralized social network management. In Iadis Multi Conference On Computer Science And Information Systems. Web Based Communities, 2009.
  33. boyd, d. and Ellison, N. Social network sites: definition, history, and scholarship. In IEEE Engineering Management Review, 3 (38): 16-31, 2010.
  34. boyd, d. Social network sites: Public, private, or what. In Knowledge Tree, 13 (1): 1-7, 2007.
  35. boyd, d. Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites. In First Monday, 11 (12), 2006.
  36. boyd, d. Social media: A phenomenon to be analyzed. In Social Media+ Society, 1 (1): 2056305115580148, 2015.
  37. boyd, d. Why youth (heart) social network sites: The role of networked publics in teenage social life. In MacArthur foundation series on digital learning--Youth, identity, and digital media volume: 119-142, 2007.
  38. boyd, d. The politics of real names. In Communications of the ACM, 55 (8): 29-31, 2012.
  39. boyd, d. It's Complicated: The Social Lives of Networked Teens. Yale University Press, 2014. www 
  40. boyd, d. Faceted id/entity: Managing representation in a digital world. Ph.D. Thesis, Massachusetts Institute of Technology, 2002.
  41. boyd, d. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In A Networked Self: Identity, Community, and Culture on Social Network Sites: 39-58, 2010.
  42. boyd, d. Networked privacy. In Surveillance & Society, 10 (3/4): 348, 2012.
  43. Breslin, J. G; Harth, A.; Bojars, U. and Decker, S. Towards Semantically-Interlinked Online Communities. In Proc. European Semantic Web Conference (ESWC 05), pages 500-514, Springer, 2005.
  44. Brickley, D and Miller, L FOAF Vocabulary Specification 0.99. Namespace Document. Technical Report, , 2014.
  45. Brunswik, E Perception and the representative design of psychological experiments. Berkeley and Los Angeles: Univer.
  46. Brunton, F. and Nissenbaum, H. Vernacular resistance to data collection and analysis: A political theory of obfuscation. In First Monday, 16 (5): 1-16, 2011.
  47. Brunton, F. and Nissenbaum, H. Obfuscation: A User's Guide for Privacy and Protest. Mit Press, 2015.
  48. Bu, Z.; Xia, Z. and Wang, J. A sock puppet detection algorithm on virtual spaces. In Knowledge-Based Systems, 37: 366-377, 2013.
  49. Buckels, E. E; Trapnell, P. D and Paulhus, D. L Trolls just want to have fun. In Personality and individual Differences, 67: 97-102, 2014.
  50. Bucklin, R. E and Sismeiro, C. Click here for Internet insight: Advances in clickstream data analysis in marketing. In Journal of Interactive Marketing, 23 (1): 35-48, 2009.
  51. Buller, D. B and Burgoon, J. K Interpersonal deception theory. In Communication theory, 6 (3): 203-242, 1996.
  52. Buller, D. B; Burgoon, J. K; Buslig, A. and Roiger, J. Testing interpersonal deception theory: The language of interpersonal deception. In Communication theory, 6 (3): 268-289, 1996.
  53. Burgess, J. E. and Vivienne, S. The remediation of the personal photograph and the politics of self-representation in digital storytelling. In Journal of Material Culture, 18 (3): 279-298, 2013. doi 
  54. Burgoon, J. K.; Stoner, G. M.; Bonito, J. A. and Dunbar, N. E. Trust and Deception in Mediated Communication. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1 - Volume 1, pages 44.1-, IEEE Computer Society, Washington, DC, USA, HICSS '03 , 2003.
  55. Burgoon, J. K; Parrott, R.; Le Poire, B. A; Kelley, D. L; Walther, J. B and Perry, D. Maintaining and restoring privacy through communication in different types of relationships. In Journal of Social and Personal Relationships, 6 (2): 131-158, 1989.
  56. Byrne Evans, M.; O'Hara, K.; Tiropanis, T. and Webber, C. Crime Applications and Social Machines: Crowdsourcing Sensitive Data. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
  57. Calvo, R. A and Peters, D. The irony and re-interpretation of our quantified self. In Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, pages 367-370, 2013.
  58. Camden, C.; Motley, M. T. and Wilson, A. White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. In Western Journal of Speech Communication, 48 (4): 309-325, 1984.
  59. Capadisli, S. and Guy, A. Linked Data Notifications. Technical Report, W3C, 2017.
  60. Casale, E. A. Cryptocurrencies and the Anonymous Nature of Transactions on the Internet. Ph.D. Thesis, 2015.
  61. Caspi, A. and Gorsky, P. Online deception: Prevalence, motivation, and emotion. In CyberPsychology & Behavior, 9 (1): 54-59, 2006.
  62. Celik, T. and Meyer, E. XHTML Friends Network (Poster). In ACM Hypertext, 2004.
  63. Chan, W. M and Dicianno, B. E Virtual socialization in adults with spina bifida. In PM&R, 3 (3): 219-225, 2011.
  64. Cho, C. H; Martens, M. L; Kim, H. and Rodrigue, M. Astroturfing global warming: It isn't always greener on the other side of the fence. In Journal of Business Ethics, 104 (4): 571-587, 2011.
  65. Chowdhury, S. R.; Roy, A. R.; Shaikh, M. and Daudjee, K. A taxonomy of decentralized online social networks. In Peer-to-Peer Networking and Applications, 8 (3): 367-383, 2015. doi 
  66. Clark, A. and Chalmers, D. The extended mind. In analysis: 7-19, 1998.
  67. Conley, D. Elsewhere, USA: How we got from the company man, family dinners, and the affluent society to the home office, BlackBerry moms, and economic anxiety. Vintage, 2009.
  68. Conquergood, D. Rethinking ethnography: Towards a critical cultural politics. In Communications monographs, 58 (2): 179-194, 1991.
  69. Consolvo, S.; McDonald, D. W.; Toscos, T.; Chen, M. Y.; Froehlich, J.; Harrison, B.; Klasnja, P.; LaMarca, A.; LeGrand, L.; Libby, R.; Smith, I. and Landay, J. A. Activity Sensing in the Wild: A Field Trial of Ubifit Garden. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1797-1806, ACM, New York, NY, USA, CHI '08 , 2008.
  70. Counts, S. and Stecher, K. B. Self-Presentation of Personality During Online Profile Creation. In ICWSM, 2009.
  71. Dalton, B. Pseudonymity in Social Machines. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
  72. Datta, A.; Buchegger, S.; Vu, L-H.; Strufe, T. and Rzadca, K. Decentralized Online Social Networks. In Handbook of Social Network Technologies, 2010.
  73. Davis, I. RELATIONSHIP: A vocabulary for describing relationships between people. Technical Report, vocab.org, 2010.
  74. Davis, J. L and Jurgenson, N. Context collapse: theorizing context collusions and collisions. In Information, Communication & Society, 17 (4): 476-485, 2014. doi 
  75. de Jong, M. B. remoteStorage. www 
  76. de Jong, M. B. remoteStorage. Technical Report, IETF, 2016.
  77. De Roure, D.; Hooper, C.; Meredith-Lobay, M.; Page, K.; Tarte, S.; Cruickshank, D. and De Roure, C. Observing Social Machines Part 1: What to Observe?. In CHI'13, ACM, Paris, 2013.
  78. DeCew, J. W. In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, 1997.
  79. Dennen, V. P. Constructing academic alter-egos: identity issues in a blog-based community. In Identity in the Information Society, 2 (1): 23-38, 2009. doi 
  80. DePaulo, B. M; Kashy, D. A; Kirkendol, S. E; Wyer, M. M and Epstein, J. A Lying in everyday life. In Journal of personality and social psychology, 70 (5): 979, 1996.
  81. DePaulo, B. M; Lindsay, J. J; Malone, B. E; Muhlenbruck, L.; Charlton, K. and Cooper, H. Cues to deception. In Psychological bulletin, 129 (1): 74, 2003.
  82. Diaspora Foundation, Welcome to diaspora*. Technical Report, , 2017.
  83. Dijck, J. V. and Nieborg, D. Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos. In New Media & Society, 11 (5): 855-874, 2009. doi 
  84. Dijck, J. V. Users like you? Theorizing agency in user-generated content. In Media, Culture & Society, 31 (1): 41-58, 2009. doi 
  85. DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. In Proceedings of the 2007 International ACM Conference on Supporting Group Work, pages 383-386, ACM, New York, NY, USA, GROUP '07 , 2007.
  86. Dingledine, R.; Mathewson, N. and Syverson, P. Tor: The second-generation onion router. Technical Report, DTIC Document, 2004.
  87. Dodge, M. and Kitchin, R. Codes of life: identification codes and the machine-readable world. In Environment and Planning D: Society and Space, 23: 851-881, 2005.
  88. Doe, J. Change the Youtube comment section back to its original form. www 
  89. Donath, J. and Boyd, D. Public displays of connection. In bt technology Journal, 22 (4): 71-82, 2004.
  90. Donath, J. S. Identity and deception in the virtual community. In Communities in cyberspace, pages 29-59, Routledge, 2002.
  91. Duffy, B. Amateur, autonomous, and collaborative: Myths of aspiring female cultural producers in Web 2.0. In Critical Studies in Media Communication, 32 (1): 48-64, 2015.
  92. Duffy, B. E. The Labor of Visibility: Gendered Self-Expression in the Social Media Imaginary. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
  93. Duggan, M. Mobile Messaging and Social Media 2015. In Pew Research Center, 2015.
  94. Duguay, S. Facebook as a decontextualized environment: Young people's experiences of navigating LGBTQ identity on a social networking site. In Social Media & Society 2013 International Conference, 2013.
  95. Duguay, S. "He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site. In new media & society, 18 (6): 891-907, 2016.
  96. Dunne, A. and Raby, F. Speculative everything: design, fiction, and social dreaming. MIT Press, 2013.
  97. Eckersley, P. How unique is your web browser?. In Privacy Enhancing Technologies, pages 1-18, 2010.
  98. Ellison, N. B and Boyd, D. M Sociality through social network sites. In The Oxford handbook of internet studies, pages 151-172, 2013.
  99. Ellison, N. B.; Steinfield, C. and Lampe, C. Connection strategies: Social capital implications of Facebook-enabled communication practices. In New Media & Society, 13 (6): 873-892, 2011. doi 
  100. Ellison, N. B; Steinfield, C. and Lampe, C. The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. In Journal of Computer-Mediated Communication, 12 (4): 1143-1168, 2007.
  101. Ellison, N.; Heino, R. and Gibbs, J. Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. In Journal of Computer-Mediated Communication, 11 (2): 415-441, 2006. doi 
  102. Esguerra, R. Google CEO Eric Schmidt Dismisses the Importance of Privacy. In Electronic Frontier Foundation, 2009.
  103. Evans, D. C; Gosling, S. D and Carroll, A. What elements of an online social networking profile predict target-rater agreement in personality impressions?. In ICWSM, 2008.
  104. Farnham, S. D. and Churchill, E. F. Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, pages 359-368, ACM, New York, NY, USA, CSCW '11 , 2011.
  105. Featherman, M. S; Miyazaki, A. D and Sprott, D. E Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. In Journal of Services Marketing, 24 (3): 219-229, 2010.
  106. Fife, E. and Orjuela, J. The privacy calculus: Mobile apps and user perceptions of privacy and security. In International Journal of Engineering Business Management, 5 (6): 7, 2012.
  107. Fitzpatrick, B., S. B. and M., Atkins. Pubsubhubbub Core. Technical Report, 2010.
  108. Friendica, Friendica Features. Technical Report, , 2017.
  109. Frischmuth, P; Ermilov, T; Shekarpour, S and Auer, S An architecture of a distributed semantic social network. In Semantic Web, 5 (1): 77-95, 2014.
  110. Frosh, P. The gestural image: The selfie, photography theory, and kinesthetic sociability. In International journal of communication, 9 (0): 22, 2015.
  111. Gallagher, R New York Student Selling His Private Data on Kickstarter. In Slate, 2013.
  112. Garcez, P. M. Microethnography. In Encyclopedia of Language and Education, pages 187-196, Springer Netherlands, 1997.
  113. Gardner, H. and Davis, K. The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world. Yale University Press, 2013.
  114. Gaver, B. and Martin, H. Alternatives: Exploring Information Appliances Through Conceptual Design Proposals. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 209-216, ACM, New York, NY, USA, CHI '00 , 2000.
  115. Gaver, B.; Dunne, T. and Pacenti, E. Design: Cultural Probes. In interactions, 6 (1): 21-29, 1999.
  116. Gaver, W.; Beaver, J. and Benford, S. Ambiguity as a resource for design. doi 
  117. Genestou, J. and Parecki, A. WebSub. Technical Report, W3C, 2017.
  118. Giddens, A. The constitution of society: Outline of the theory of structuration. Univ of California Press, 1984.
  119. Giddens, A. Modernity and self-identity: Self and society in the late modern age. Stanford University Press, 1991.
  120. Gigerenzer, G. and Kurz, E. M Vicarious functioning reconsidered: A fast and frugal lens model. In The essential Brunswik: Beginnings, explications, applications: 342-347, 2001.
  121. Gilewicz, N. and Allard-Huver, F. Digital Parrhesia as a Counterweight to Astroturfing. In Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication: 215, 2012.
  122. Gimpel, H.; Nissen, M. and Gorlitz, R. Quantifying the quantified self: A study on the motivations of patients to track their own health. In Thirty Fourth International Conference on Information Systems, 2013.
  123. Goffman, E. The Presentation of Self in Everyday Life. Doubleday, Anchor books , 1959.
  124. Gosling, S. D; Ko, S. J.; Mannarelli, T. and Morris, M. E A room with a cue: personality judgments based on offices and bedrooms. In Journal of personality and social psychology, 82 (3): 379, 2002.
  125. Grice, H. P Logic and conversation. na, 1970.
  126. Griffiths, M. D; Davies, M. NO and Chappell, D. Online computer gaming: a comparison of adolescent and adult gamers. In Journal of adolescence, 27 (1): 87-96, 2004.
  127. Grimes, D A and Schulz, K F Descriptive studies: what they can and cannot do. In The Lancet, 2002.
  128. Gulcu, C. and Tsudik, G. Mixing E-mail with Babel. In Network and Distributed System Security, 1996., Proceedings of the Symposium on, pages 2-16, 1996.
  129. Guy, A. and Klein, E. Constructed Identity and Social Machines: A Case Study in Creative Media Production. In WWW 2014 Companion, ACM, Seoul, 2014.
  130. Guy, A. Social Web Protocols. Technical Report, W3C, 2017.
  131. Hall, W.; Tiropanis, T.; Tinati, R.; Booth, P.; Gaskell, P.; Hare, J. and Carr, L. The Southampton University Web Observatory.
  132. Halpin, H. and Bria, F. State of the Art of social networking systems, identity ecosystem and social data stores. In Decentralised Citizens ENgagement Technologies project, 2014.
  133. Halpin, H. Identity, Reference and Meaning on the Web. In WWW2006, Edinburgh, 2006.
  134. Halpin, H. Sense and reference on the web. Ph.D. Thesis, University of Edinburgh, 2009.
  135. Halpin, H.; Troncoso, C.; Isaakides, M. and Danezis, G. Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments. In Submission, 2016.
  136. Hammarfelt, B.; Rijcke, S. de and Rushforth, A. D. Quantified academic selves: the gamification of research through social networking services. In Inf. Res., 21, 2016.
  137. Hammer-Lahav, E. The OAuth 1.0 Protocol. Technical Report, IETF, 2010.
  138. Hammersley, M. and Atkinson, P. Ethnography: Principles in practice. Routledge, 2007.
  139. Hample, D. Purposes and effects of lying. In Southern Speech Communication Journal, 46 (1): 33-47, 1980.
  140. Hancock, J. T Digital deception. In Oxford handbook of internet psychology: 289-301, 2007.
  141. Hancock, J. T.; Thom-Santelli, J. and Ritchie, T. Deception and Design: The Impact of Communication Technology on Lying Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 129-134, ACM, New York, NY, USA, CHI '04 , 2004.
  142. Hancock, J. T.; Toma, C. and Ellison, N. The Truth About Lying in Online Dating Profiles. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 449-452, ACM, New York, NY, USA, CHI '07 , 2007.
  143. Hancock, J. T; Thom-Santelli, J. and Ritchie, T. Deception and design: The impact of communication technology on lying behavior. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129-134, 2004.
  144. Hancock, J.; Birnholtz, J.; Bazarova, N.; Guillory, J.; Perlin, J. and Amos, B. Butler lies: awareness, deception and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 517-526, 2009.
  145. Harbulot, B; Jacobi, I and Jones, M FOAF+SSL: RESTful authentication for the social web. In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009), 2009.
  146. Hardt, D. The OAuth 2.0 Authorization Framework. Technical Report, IETF, 2012.
  147. Hearn, A. Verified: Self-presentation, identity management, and selfhood in the age of big data. In Popular Communication, 15 (2): 62-77, 2017. doi 
  148. Heidegger, M. The question concerning technology. In Technology and values: Essential readings: 99-113, 1954.
  149. Hendler, J. and Berners-Lee, T. From the Semantic Web to social machines: A research challenge for AI on the World Wide Web. In Artificial Intelligence, 174 (2): 156-161, 2009. doi 
  150. Hogan, B. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. In Bulletin of Science, Technology & Society: 0270467610385893, 2010.
  151. Hogan, B. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. In Bulletin of Science, Technology & Society: 0270467610385893, 2010.
  152. Hubzilla, Hubzilla. www 
  153. Hussain, Z. and Griffiths, M. D Gender swapping and socializing in cyberspace: An exploratory study. In CyberPsychology & Behavior, 11 (1): 47-53, 2008.
  154. Idehen, K. and Erling, O. Linked Data Spaces & Data Portability. In LDOW, Proceedings of WWW, 2008.
  155. Interactive, H. The Harris Polltextregistered♯ 17: Most People are ‘Privacy Pragmatists' who, while Concerned about Privacy, will Sometimes Trade it off for Other Benefits. In Online: http://www. harrisinteractive. com/harris_poll/index. asp, 2003.
  156. Jacobi, I. FOAF-Persona: A schema for indicating relationships between personas and real people. www 
  157. Johnson, B. Privacy no longer a social norm, says Facebook founder. www 
  158. Johnson, B. Privacy no longer a social norm, says Facebook founder. In The Guardian, 2010.
  159. Jones, P. S. G., J. M., and J., S. Web Finger. Technical Report, IETF, 2013.
  160. Kaplan, A. M and Haenlein, M. Users of the world, unite! The challenges and opportunities of Social Media. In Business Horizons, 53 (1): 59-68, 2010.
  161. Keen, A. Digital vertigo: how today's online social revolution is dividing, diminishing, and disorienting us. Macmillan, 2012.
  162. Kessler, S. Twitter Only Gave Meerkat 2 Hours’ Notice Before Cutting Access To The Social Graph. In Fast Company, 2015.
  163. Khare, R. and Celik, T. Microformats: a pragmatic path to the semantic web. In Proceedings of the 15th international conference on World Wide Web, pages 865-866, 2006.
  164. Kirkpatrick, D. The Facebook effect: The inside story of the company that is connecting the world. Simon and Schuster, 2011.
  165. Kleek, M. V.; Murray-Rust, D.; Guy, A.; Smith, D. A and Shadbolt, N. R Self Curation , Social Partitioning , Escaping from Prejudice and Harassment : the Many Dimensions of Lying Online. In WebSci2015, 2015.
  166. Kleek, M. V.; Smith, D. A; Murray-Rust, D.; Guy, A.; Dragan, L. and Shadbolt, N. R Social Personal Data Stores: the Nuclei of Decentralised Social Machines. In WWW 2015 Companion, pages 1155-1160, ACM, 2015.
  167. Klyne, G. and Carroll, J. Resource Description Framework (RDF): Concepts and Abstract Syntax. Technical Report, W3C, 2004.
  168. Known, Known beta. Technical Report, , 2017.
  169. Kolivos, E. and Kuperman, A. Consumer law: Web of lies-legal implications of astroturfing. In Keeping Good Companies, 64 (1): 38, 2012.
  170. Krane, D.; Light, L. and Gravitch, D. Privacy on and off the Internet: What consumers want. In Harris Interactive, 2002.
  171. Kumaraguru, P. and Cranor, L. F. Privacy indexes: a survey of Westin's studies.
  172. Larsen, J. Contradictions Of The Social Imaginary: Making Sense Of Digital Food Snaps. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
  173. Las'en, A. Digital self-portraits, exposure and the modulation of intimacy. In Mobile and Digital Communication: Approaches to Public and Private. Covilha, Portugal: LabCom books. Video of the conference available at URL www. youtube. com/watch, 2015.
  174. Lawrence, K F. Amateur Fiction Online - The Web of Community Trust A Case Study in Community Focused Design for the Semantic Web. In 1st AKT Doctoral Colloquium, Milton Keynes, 2005.
  175. Lenhart, A.; Kahne, J.; Middaugh, E.; Macgill, A. R.; Evans, C. and Vitak, J. Teens, Video Games, and Civics: Teens' Gaming Experiences Are Diverse and Include Significant Social Interaction and Civic Engagement. In Pew Internet & American Life Project, 2008.
  176. Lenhart, A.; Purcell, K.; Smith, A. and Zickuhr, K. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. In Pew Internet & American Life Project, 2010.
  177. Li, I.; Dey, A. K and Forlizzi, J. Understanding my data, myself: supporting self-reflection with ubicomp technologies. In Proceedings of the 13th international conference on Ubiquitous computing, pages 405-414, 2011.
  178. Lindskold, S. and Walters, P. S Categories for acceptability of lies. In The Journal of Social Psychology, 120 (1): 129-136, 1983.
  179. Lingel, J. and Golub, A. In Face on Facebook: Brooklyn's Drag Community and Sociotechnical Practices of Online Communication. In Journal of Computer-Mediated Communication, 2015.
  180. Litt, E. Knock, Knock. Who's There? The Imagined Audience. In Journal of Broadcasting & Electronic Media, 56 (3): 330-345, 2012. doi 
  181. Livingstone, S. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression. In New media & society, 10 (3): 393-411, 2008.
  182. Luppicini, R. Handbook of Research on Technoself: Identity in a Technological Society: Identity in a Technological Society. IGI Global, 2012.
  183. Luther, K. and Diakopoulos, N. Distributed Creativity. In Supporting creative acts beyond dissemination. Creativity & Cognition, Washington DC, 2007.
  184. Luther, K. Edits & Credits: Exploring Integration and Attribution in Online Creative Collaboration. In CHI, pages 2823-2832, 2010.
  185. Macgirvin, M Zot! social communications protocol. Technical Report, , 2011.
  186. Madden, M.; Lenhart, A.; Cortesi, S.; Gasser, U.; Duggan, M.; Smith, A. and Beaton, M. Teens, social media, and privacy. In Pew Research Center, 2013.
  187. Mahmood, S. and Desmedt, Y. Your Facebook deactivated friend or a cloaked spy. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 367-373, 2012.
  188. Mansour, E.; Sambra, A. V.; Hawke, S.; Zereba, M.; Capadisli, S.; Ghanem, A.; Aboulnaga, A. and Berners-Lee, T. A demonstration of the solid platform for social web applications. In Proceedings of the 25th International Conference Companion on World Wide Web, pages 223-226, 2016.
  189. Marcus, B.; Machilek, F. and Sch"utz, A. Personality in cyberspace: personal Web sites as media for personality expressions and impressions. In Journal of personality and social psychology, 90 (6): 1014, 2006.
  190. Marwick, A. and Boyd, D. ‘It's just drama’: teen perspectives on conflict and aggression in a networked era. In Journal of Youth Studies, 17 (9): 1187-1204, 2014.
  191. Marwick, A. E and boyd, d. Social privacy in networked publics: Teens’ attitudes, practices, and strategies. In A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, 2011.
  192. Marwick, a. E. and boyd, d. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. In New Media & Society, 13 (1): 114-133, 2010.
  193. McCathie Nevile, C. World Wide Web Consortium Process Document: Maturity Levels. Technical Report, W3C, 2015.
  194. McCornack, S. a. Information manipulation theory. In Communication Monographs, 59 (1): 1-16, 1992.
  195. McLuhan, M. Understanding media: The extensions of man. MIT press, 1994.
  196. Mercier, C. How to Create a Working Group or Interest Group. In W3C Guidebook, 2017.
  197. Mess, L. M. H. Selfies and Side-Eye: Drag Queens Take on Facebook. In Studies in Gender and Sexuality, 16 (2): 144-146, 2015.
  198. Metzger, M. J Privacy, trust, and disclosure: Exploring barriers to electronic commerce. In Journal of Computer-Mediated Communication, 9 (4): 00-00, 2004.
  199. Miemis, V. 88+ Projects & Standards for Data Ownership, Identity, & A Federated Social Web. www 
  200. Mihindukulasooriya, N. and Menday, R. Linked Data Platform 1.0 Primer. Technical Report, W3C, 2015.
  201. Miles, M. B and Huberman, A M. Qualitative data analysis: An expanded sourcebook. Sage, 1994.
  202. Monroy-Hernandez, A.; Mako Hill, B.; Gonzalez-Rivero, J. and boyd, d. Computers can't give credit: How automatic attribution falls short in an online remixing community. In CHI, ACM, Vancouver, 2011.
  203. Moore, P and Piwek, L Unintended Consequences: The Dark Sides of Quantifying Selves.
  204. Moore, P. and Robinson, A. The quantified self: What counts in the neoliberal workplace. In new media & society, 18 (11): 2774-2792, 2016.
  205. Mydex, The case for personal information empowerment : The rise of the personal data store.
  206. Mylonas, A.; Kastania, A. and Gritzalis, D. Delegate the smartphone user? Security awareness in smartphone platforms. In Computers & Security, 34: 47-66, 2013.
  207. Nafus, D. and Sherman, J. Big data, big questions| this one does not go up to 11: the quantified self movement as an alternative big data practice. In International journal of communication, 8: 11, 2014.
  208. Naquin, C. E; Kurtzberg, T. R and Belkin, L. Y The finer points of lying online: e-mail versus pen and paper. In The Journal of applied psychology, 95 (2): 387-394, 2010.
  209. Narayanan, A., T. V., B. S. and Nissenbaum, H. A critical look at decentralized personal data architectures. In arXiv.org, 2012.
  210. Nemer, D. and Freeman, G. Empowering the marginalized: Rethinking selfies in the slums of Brazil. In International Journal of Communication, 9 (0): 1832-1847, 2015.
  211. NextCloud, NextCloud. www 
  212. Nissenbaum, H. Privacy as contextual integrity. In Washington law review, 79 (1), 2004.
  213. Nissenbaum, H. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, 2009.
  214. Noland, C. M Auto-photography as research practice: Identity and self-esteem research. In Journal of research Practice, 2 (1): 1, 2006.
  215. Nottingham, M and Sayre, R The Atom Syndication Format. Technical Report, IETF, 2005.
  216. Palfrey, J. and Gasser, U. Born digital: Understanding the first generation of digital natives. Basic Books, 2013.
  217. Panzer, J. The Salmon Protocol. Technical Report, 2010.
  218. Papacharissi, Z. The Blogger Revolution? Audiences as Media Producers. , 2004.
  219. Papacharissi, Z. The presentation of self in virtual life: Characteristics of personal home pages. In Journalism & Mass Communication Quarterly, 79 (3): 643-660, 2002.
  220. Papacharissi, Z. Without You, I'm Nothing: Performances of the Self on Twitter. In International Journal of Communication, 6 (0), 2012.
  221. Parecki, A. Micropub. Technical Report, W3C, 2017.
  222. Passant, A.; Bojars, U.; Breslin, J. G. and Decker, S. The SIOC Project: Semantically-Interlinked Online Communities, from Humans to Machines. In Coordination, Organizations, Institutions and Norms in Agent Systems V: COIN 2009 International Workshops. COIN@AAMAS 2009, Budapest, Hungary, May 2009, COIN@IJCAI 2009, Pasadena, USA, July 2009, COIN@MALLOW 2009, Turin, Italy, September 2009. Revised Selected Papers, pages 179-194, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010.
  223. Passant, A.; Breslin, J. G and Decker, S. Rethinking microblogging: open, distributed, semantic. In International Conference on Web Engineering, pages 263-277, 2010.
  224. Paul, T.; Famulari, A. and Strufe, T. A survey on decentralized online social networks. In Computer Networks, 75: 437-452, 2014.
  225. Perez, S. Facebook Wins "Worst API" in Developer Survey. In Techcrunch, 2011.
  226. Perreault, S. and Resnick, P. vCard Format Specification. Technical Report, IETF, 2011.
  227. Potts, A. `LOVE YOU GUYS (NO HOMO)' How gamers and fans play with sexuality, gender, and Minecraft on YouTube. In Critical Discourse Studies: 1-24, 2014.
  228. Prodromou, E, V. B, W. J and Z, C. OStatus. Technical Report, , 2010.
  229. Prodromou, E. pump.io API. Technical Report, e14n, 2017.
  230. Quinn, K The Navigation of Boundaries in Online Social Spaces. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
  231. Rains, S. The impact of anonymity on perceptions of source credibility and influence in computer-mediated group communication: A test of two competing hypotheses. In Communication Research, 34 (1): 100-125, 2007.
  232. Raynes-Goldie, K. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. In First Monday, 15 (1), 2010.
  233. Rees, J. A Guide to ISSUE-57 (httpRange-14) Document Suite from Jonathan A Rees on 2012-01-21(www-tag@ w3. org from January 2012).
  234. Ren, Y.; Kraut, R.; Kiesler, S. and Resnick, P. Encouraging commitment in online communities. In Building Successful Online Communities: Evidence-Based Social Design, pages 77-125, MIT Press, 2012.
  235. Roig, M. and Caso, M. Lying and cheating: Fraudulent excuse making, cheating, and plagiarism. In The Journal of Psychology, 139 (6): 485-494, 2005.
  236. Rousseau, A.; Eggermont, S. and Frison, E. The reciprocal and indirect relationships between passive Facebook use, comparison on Facebook, and adolescents' body dissatisfaction. In Computers in Human Behavior, 73: 336-344, 2017. doi 
  237. Russell, A. and Echchaibi, N. International blogging: Identity, politics, and networked publics. Peter Lang, 2009.
  238. Rust, C.; Mottram, J. and Till, J AHRC Research Review Practice-Led Research in Art. In Design and Architecture: Arts and Humanities Research Council, 2007.
  239. Sanderson, R Web Annotation Protocol. Technical Report, W3C, 2017.
  240. Sanderson, R.; Ciccarese, P. and Young, B. Web Annotation Vocabulary. Technical Report, W3C, 2017.
  241. Sanford, J. The Truth about Lying: Course explores history of deception. www 
  242. Scarlata, V.; Levine, B. N. and Shields, C. Responder anonymity and anonymous peer-to-peer file sharing. In Network Protocols, 2001. Ninth International Conference on, pages 272-280, 2001.
  243. Schaar, P. Privacy by design. In Identity in the Information Society, 3 (2): 267-274, 2010.
  244. Scheidt, L. A. and Wright, E. Common visual design elements of weblogs. In Into the blogosphere: Rhetoric, community, and culture of weblogs., 2004.
  245. Schulman, N. In Real Life: Love, Lies & Identity in the Digital Age. Hachette UK, 2014.
  246. Senft, T. M and Baym, N. K What does the selfie say? Investigating a global phenomenon introduction. In International Journal of Communication, 9: 1588–1606, 2015.
  247. Seong, S-W.; Seo, J.; Nasielski, M.; Sengupta, D.; Hangal, S.; Teh, S. K.; Chu, R.; Dodson, B. and Lam, M. S. PrPl: a decentralized social networking infrastructure. In Proceedings of the 1st International Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010.
  248. Shetty, S. and Parecki, A. Webmention. Technical Report, W3C, 2017.
  249. Shields, P. and Rangarajan, N. A Playbook for Research Methods: Integrating Conceptual Frameworks and Project Management. Stillwater, OK: New Forums Press, 2013.
  250. singh, s Subverting Social Media. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
  251. Smarr, J Portable Contacts 1.0. Technical Report, 2008.
  252. Smart, P. R; Simperl, E. and Shadbolt, N. A Taxonomic Framework for Social Machines. In Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, 2014.
  253. Snyder, M. Self-monitoring of expressive behavior. In Journal of personality and social psychology, 30 (4): 526, 1974.
  254. Solon, O 'Data soul' of Shawn Buckles sells for £288. In Wired, 2014.
  255. Solorio, T.; Hasan, R. and Mizan, M. A case study of sockpuppet detection in wikipedia. In Workshop on Language Analysis in Social Media (LASM) at NAACL HLT, pages 59-68, 2013.
  256. Sporny, M.; Kellogg, G. and Lanthaler, M. JSON-LD 1.0: A JSON-based Serialization for Linked Data. Technical Report, W3C, 2014.
  257. Stendal, K. How do People with Disability Use and Experience Virtual Worlds and ICT: A Literature Review. In Journal For Virtual Worlds Research, 5 (1), 2012. doi 
  258. Story, H. and thers, WebAccessControl. Technical Report, W3C Wiki, 2016.
  259. Story, H; Sambra, A and Tramp, S Friending On The Social Web. In Proceedings of Federated Social Web Europe, Federated Social Web Europe, 2011.
  260. Strauss, A. and Corbin, J. M Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc, 1990.
  261. Strohmaier, M. A Few Thoughts on Engineering Social Machines. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
  262. Swan, M. The quantified self: Fundamental disruption in big data science and biological discovery. In Big Data, 1 (2): 85-99, 2013.
  263. Swan, M. Health 2050: The realization of personalized medicine through crowdsourcing, the quantified self, and the participatory biocitizen. In Journal of personalized medicine, 2 (3): 93-118, 2012.
  264. Swan, M. Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0. In Journal of Sensor and Actuator Networks, 1 (3): 217-253, 2012.
  265. Tan, D.; Berry, E.; Czerwinski, M.; Bell, G.; Gemmell, J.; Hodges, S. and Wood, K. Save everything: supporting human memory with a personal digital lifetime store. In Personal information management, 90, 2007.
  266. Tang, J. C.; Cebrian, M.; Giacobe, N. A.; Kim, H-W.; Kim, T. and Wickert, D. ". Reflecting on the DARPA Red Balloon Challenge. In Commun. ACM, 54 (4): 78-85, 2011.
  267. Tene, O. and Polenetsky, J. To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising. In Minn. JL Sci. & Tech., 13: 281, 2012.
  268. tent.io, Tent.io Protocol Introduction. Technical Report, , 2015.
  269. Thomas, A. Youth online: Identity and literacy in the digital age. Peter Lang, 2007.
  270. Tiidenberg, K. and Whelan, A. Sick bunnies and pocket dumps:“Not-selfies” and the genre of self-representation. In Popular Communication, 15 (2): 141-153, 2017.
  271. Till, C. Exercise as labour: Quantified self and the transformation of exercise into labour. In Societies, 4 (3): 446-462, 2014.
  272. Tiropanis, T.; Hall, W.; Shadbolt, N.; De Roure, D.; Contractor, N. and Hendler, J. The web science observatory. In IEEE Intelligent Systems, 28 (2): 100-104, 2013.
  273. Toma, C. L Affirming the self through online profiles: beneficial effects of social networking sites. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1749-1752, 2010.
  274. Trammell, K. D and Keshelashvili, A. Examining the new influencers: A self-presentation study of A-list blogs. In Journalism & Mass Communication Quarterly, 82 (4): 968-982, 2005.
  275. Tramp, S; Frischmuth, P; Ermilov, T and Auer, S Weaving a social data web with semantic pingback. In Knowledge Engineering and Management by the Masses --- 17th International Conference, EKAW 2010, pages 135-149, Springer, 2010.
  276. Turkle, S. Life on the Screen. Simon and Schuster, 2011.
  277. Turkle, S. Reclaiming Conversation: The Power of Talk in a Digital Age. Penguin Publishing Group, 2015. www 
  278. Turner, R. E; Edgley, C. and Olmstead, G. Information control in conversations: Honesty is not always the best policy. In Kansas Journal of Sociology: 69-89, 1975.
  279. Tyler, J. R and Tang, J. C When can I expect an email response? A study of rhythms in email usage. In ECSCW 2003, pages 239-258, 2003.
  280. Unhosted, unhosted.org.
  281. Unknown, Disinformation - Wikipedia, The Free Encyclopedia. , [Online; accessed 15-Sept-2015]. www 
  282. Uyi Idehen, K. A Read-Write Web without Storage Silos. www 
  283. Van den Bulck, J. Sleep apps and the quantified self: blessing or curse?. In Journal of sleep research, 24 (2): 121-123, 2015.
  284. Van Doorn, N. and Van Zoonen, L. Theorizing gender and the Internet: Past, present, and future. In The Routledge Handbook of Internet Politics: 261-74, 2008.
  285. Van House, N. A Personal photography, digital technologies and the uses of the visual. In Visual Studies, 26 (2): 125-134, 2011.
  286. Van Kleek, M. and OHara, K. The Future of Social Is Personal: The Potential of the Personal Data Store. In Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, pages 125-158, Springer International Publishing, Cham, 2014.
  287. Van Kleek, M.; Murray-Rust, D.; Guy, A.; O'hara, K. and Shadbolt, N. Computationally Mediated Pro-Social Deception. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 552-563, 2016.
  288. Van Kleek, M.; Smith, D. A.; Shadbolt, N. and thers, A decentralized architecture for consolidating personal information ecosystems: The WebBox.
  289. Van Kleek, M.; Smith, D. A.; Tinati, R.; O'Hara, K.; Hall, W. and Shadbolt, N. R 7 billion home telescopes: observing social machines through personal data stores. In Proceedings of the 23rd International Conference on World Wide Web, pages 915-920, 2014.
  290. van Wersch, A.; Eberhardt, J. and Stringer, F Cyberpsychology behavior and social networking. In Cyberpsychology, behavior, and social networking, 2013.
  291. Vazire, S. and Gosling, S. D e-Perceptions: personality impressions based on personal websites. In Journal of personality and social psychology, 87 (1): 123, 2004.
  292. Verduyn, P.; Ybarra, O.; Resibois, M.; Jonides, J. and Kross, E. Do Social Network Sites Enhance or Undermine Subjective Well-Being? A Critical Review. In Social Issues and Policy Review, 11 (1): 274-302, 2017. doi 
  293. Vitak, J. and Kim, J. "You Can't Block People Offline": Examining How Facebook's Affordances Shape the Disclosure Process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, pages 461-474, ACM, New York, NY, USA, CSCW '14 , 2014.
  294. Voida, A.; Newstetter, W. C and Mynatt, E. D When conventions collide: the tensions of instant messaging attributed. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 187-194, 2002.
  295. Vrij, A. Detecting lies and deceit: The psychology of lying and implications for professional practice. Wiley, 2000.
  296. W3C News, OpenSocial Foundation Moving Standards Work to W3C. In W3C News Blog, 2014.
  297. Walther, J. B and Parks, M. R Cues filtered out, cues filtered in. In Handbook of interpersonal communication, 3: 529-563, 2002.
  298. Walther, J. B Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. In Communication research, 23 (1): 3-43, 1996.
  299. Walther, J. B; Van Der Heide, B.; Hamel, L. M and Shulman, H. C Self-generated versus other-generated statements and impressions in computer-mediated communication: A test of warranting theory using Facebook. In Communication research, 36 (2): 229-253, 2009.
  300. Walther, J. B; Van Der Heide, B.; Kim, S-Y.; Westerman, D. and Tong, S. T. The role of friends’ appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?. In Human communication research, 34 (1): 28-49, 2008.
  301. Warkentin, D.; Woodworth, M.; Hancock, J. T and Cormier, N. Warrants and deception in computer mediated communication. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 9-12, 2010.
  302. Warren, C. Twitter's API Update Cuts Off Oxygen to Third-Party Clients. In Mashable, 2012.
  303. Wesch, M. YouTube and You Experiences of Self-Awareness in the Context Collapse of the Recording Webcam. In Explorations in Media Ecology, 8 (2): 99-114, 2009.
  304. Wetherall, D.; Choffnes, D.; Greenstein, B; Han, S.; Hornyack, P.; Jung, J.; Schechter, S. and Wang, X. Privacy revelations for web and mobile apps. In Proc 13th USENIX Conference on Hot Topics in Operating Systems, pages 21, 2011.
  305. Whitson, J. R Gaming the quantified self. In Surveillance & Society, 11 (1/2): 163, 2013.
  306. Whitty, M. and Gavin, J. Age/sex/location: Uncovering the social cues in the development of online relationships. In CyberPsychology & Behavior, 4 (5): 623-630, 2001.
  307. Whitty, M. T Liar, liar! An examination of how open, supportive and honest people are in chat rooms. In Computers in Human Behavior, 18 (4): 343-352, 2002.
  308. Wikipedia, Browser Wars. www 
  309. Wikipedia, Eating your own dog food. www 
  310. Wikipedia, 50 Cent Party. , [Online; accessed 20-March-2015]. www 
  311. Yee, N. The demographics, motivations, and derived experiences of users of massively multi-user online graphical environments. In Presence, 15 (3): 309-329, 2006.
  312. Yee, N.; Bailenson, J. N and Ducheneaut, N. The Proteus effect: Implications of transformed digital self-representation on online and offline behavior. In Communication Research, 2009.
  313. Yeung, C A; Liccardi, I; Lu, K and Seneviratne, O Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.
  314. Zhang, J.; Carpenter, D. and Ko, M. Online Astroturfing: A Theoretical Perspective. In Americas Conference on Information Systems 2013 Proceedings, 2014.
  315. Zhao, X.; Lampe, C. and Ellison, N. B. The Social Media Ecology: User Perceptions, Strategies and Challenges. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 89-100, ACM, New York, NY, USA, CHI '16 , 2016.