References
- Adar, E.; Tan, D. S. and Teevan, J. Benevolent Deception in Human Computer Interaction. In Chi 2013: 1863-1872, 2013. doi
- Ahadzadeh, A. S.; Sharif, S. P. and Ong, F. S. Self-schema and self-discrepancy mediate the influence of Instagram usage on body image satisfaction among youth. In Computers in Human Behavior, 68: 8-16, 2017.
- Akerlof, G. A. and Shiller, R. J. Privacy in context: Technology, policy, and the integrity of social life. Princeton University Press, 2015.
- Akker, H.; Jones, V. M. and Hermens, H. J. Tailoring Real-time Physical Activity Coaching Systems: A Literature Survey and Model. In User Modeling and User-Adapted Interaction, 24 (5): 351-392, 2014. doi
- Albrechtslund, A Online social networking as participatory surveillance. In First Monday, 13 (3): 1-11, 2008.
- Alexander, J. M and Smith, J. M Disinformation : A Taxonomy. Technical Report, University of Pennsylvania Department of Computer & Information Science, 2010.
- Anolli, L.; Balconi, M. and Ciceri, R. Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication. In Say not to say New perspectives on miscommunication (FEBRUARY): 73-100, 2001.
- Aoki, P. M. and Woodruff, A. Making Space for Stories: Ambiguity in the Design of Personal Communication Systems. doi www
- Appelquist, D. and Brickley, D. A Standards-based, Open and Privacy-aware Social Web. Technical Report, W3C, 2010.
- Armenti, M. New Twitter search API won't be available to third-party clients. In marco.org, 2014.
- Armenti, M. Twitter's "peace offering" to developers is meaningless. In marco.org, 2014.
- Atkins, M., W. N. W., M. C., W. M. and Dolin, R. ActivityStreams 1.0 Concepts and Representations. Technical Report, , 2010.
- Auger, J. Speculative design: crafting the speculation. In Digital Creativity, 24 (1): 11-35, 2013.
- Baker, A. J. Mick or Keith: blended identity of online rock fans. In Identity in the Information Society, 2 (1): 7-21, 2009.
- Barcena, M. B.; Wueest, C. and Lau, H. How safe is your quantified self. In Symantech: Mountain View, CA, USA, 2014.
- Bardzell, J.; Bardzell, S. and Stolterman, E. Reading critical designs: supporting reasoned interpretations of critical design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1951-1960, 2014.
- Barlow, J. Born Digital: Understanding the First Generation of Digital Natives.
- Barmann, J. Drag Queens, Other Performers Outraged As Facebook Forces Them To Use Their Real Names. www
- Barrett, R. facebook: /me/posts returns objects with ids with colons. In GitHub Issues, 2014.
- Baym, N. K and boyd, d. Socially mediated publicness: An introduction. In Journal of Broadcasting & Electronic Media, 56 (3): 320-329, 2012.
- Beer, D. Social network(ing) sites...revisiting the story so far: A response to danah boyd & Nicole Ellison. In Journal of Computer-Mediated Communication, 13 (2): 516-529, 2008. doi
- Berners-Lee, T. and Fischetti, M Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web. Harper Collins, New York, New York, USA, 1999.
- Berners-Lee, T. Socially Aware Cloud Storage. In Design Issues, 2009.
- Berners-Lee, T.; Fischetti, M. and Foreword By-Dertouzos, M. L Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. HarperInformation, 2000.
- Berners-Lee, T.; Hall, W.; Hendler, J. A.; O'Hara, K.; Shadbolt, N. and Weitzner, D. J. A Framework for Web Science. In Found. Trends Web Sci., 1 (1): 1-130, 2006. doi
- Bernstein, M.; Monroy-Hernandez, A.; Harry, D.; Andre, P.; Panovich, K. and Vargas, G. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, pages 50-57, Association for the Advancement of Artificial Intelligence, 2011.
- Bielenberg, A.; Helm, L.; Gentilucci, A.; Stefanescu, D. and Zhang, H. The growth of diaspora-a decentralized online social network in the wild. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pages 13-18, 2012.
- Birnholtz, J.; Dixon, G. and Hancock, J. Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization. In Computers in Human Behavior, 28 (3): 1028-1035, 2012.
- Blascovich, J. and Bailenson, J. Infinite reality: The hidden blueprint of our virtual lives. William Morrow, 2011.
- Bok, S. Lying: Moral choice in public life. In New York: Pantheon, 1978.
- Bok, S. Lying: Moral choice in public and private life. Random House LLC, 2011.
- Bortoli, S.; Palpanas, T. and Bouquet, P. Pulling down the walled garden: Towards a paradigm for decentralized social network management. In Iadis Multi Conference On Computer Science And Information Systems. Web Based Communities, 2009.
- boyd, d. and Ellison, N. Social network sites: definition, history, and scholarship. In IEEE Engineering Management Review, 3 (38): 16-31, 2010.
- boyd, d. Social network sites: Public, private, or what. In Knowledge Tree, 13 (1): 1-7, 2007.
- boyd, d. Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites. In First Monday, 11 (12), 2006.
- boyd, d. Social media: A phenomenon to be analyzed. In Social Media+ Society, 1 (1): 2056305115580148, 2015.
- boyd, d. Why youth (heart) social network sites: The role of networked publics in teenage social life. In MacArthur foundation series on digital learning--Youth, identity, and digital media volume: 119-142, 2007.
- boyd, d. The politics of real names. In Communications of the ACM, 55 (8): 29-31, 2012.
- boyd, d. It's Complicated: The Social Lives of Networked Teens. Yale University Press, 2014. www
- boyd, d. Faceted id/entity: Managing representation in a digital world. Ph.D. Thesis, Massachusetts Institute of Technology, 2002.
- boyd, d. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In A Networked Self: Identity, Community, and Culture on Social Network Sites: 39-58, 2010.
- boyd, d. Networked privacy. In Surveillance & Society, 10 (3/4): 348, 2012.
- Breslin, J. G; Harth, A.; Bojars, U. and Decker, S. Towards Semantically-Interlinked Online Communities. In Proc. European Semantic Web Conference (ESWC 05), pages 500-514, Springer, 2005.
- Brickley, D and Miller, L FOAF Vocabulary Specification 0.99. Namespace Document. Technical Report, , 2014.
- Brunswik, E Perception and the representative design of psychological experiments. Berkeley and Los Angeles: Univer.
- Brunton, F. and Nissenbaum, H. Vernacular resistance to data collection and analysis: A political theory of obfuscation. In First Monday, 16 (5): 1-16, 2011.
- Brunton, F. and Nissenbaum, H. Obfuscation: A User's Guide for Privacy and Protest. Mit Press, 2015.
- Bu, Z.; Xia, Z. and Wang, J. A sock puppet detection algorithm on virtual spaces. In Knowledge-Based Systems, 37: 366-377, 2013.
- Buckels, E. E; Trapnell, P. D and Paulhus, D. L Trolls just want to have fun. In Personality and individual Differences, 67: 97-102, 2014.
- Bucklin, R. E and Sismeiro, C. Click here for Internet insight: Advances in clickstream data analysis in marketing. In Journal of Interactive Marketing, 23 (1): 35-48, 2009.
- Buller, D. B and Burgoon, J. K Interpersonal deception theory. In Communication theory, 6 (3): 203-242, 1996.
- Buller, D. B; Burgoon, J. K; Buslig, A. and Roiger, J. Testing interpersonal deception theory: The language of interpersonal deception. In Communication theory, 6 (3): 268-289, 1996.
- Burgess, J. E. and Vivienne, S. The remediation of the personal photograph and the politics of self-representation in digital storytelling. In Journal of Material Culture, 18 (3): 279-298, 2013. doi
- Burgoon, J. K.; Stoner, G. M.; Bonito, J. A. and Dunbar, N. E. Trust and Deception in Mediated Communication. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1 - Volume 1, pages 44.1-, IEEE Computer Society, Washington, DC, USA, HICSS '03 , 2003.
- Burgoon, J. K; Parrott, R.; Le Poire, B. A; Kelley, D. L; Walther, J. B and Perry, D. Maintaining and restoring privacy through communication in different types of relationships. In Journal of Social and Personal Relationships, 6 (2): 131-158, 1989.
- Byrne Evans, M.; O'Hara, K.; Tiropanis, T. and Webber, C. Crime Applications and Social Machines: Crowdsourcing Sensitive Data. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
- Calvo, R. A and Peters, D. The irony and re-interpretation of our quantified self. In Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, pages 367-370, 2013.
- Camden, C.; Motley, M. T. and Wilson, A. White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations. In Western Journal of Speech Communication, 48 (4): 309-325, 1984.
- Capadisli, S. and Guy, A. Linked Data Notifications. Technical Report, W3C, 2017.
- Casale, E. A. Cryptocurrencies and the Anonymous Nature of Transactions on the Internet. Ph.D. Thesis, 2015.
- Caspi, A. and Gorsky, P. Online deception: Prevalence, motivation, and emotion. In CyberPsychology & Behavior, 9 (1): 54-59, 2006.
- Celik, T. and Meyer, E. XHTML Friends Network (Poster). In ACM Hypertext, 2004.
- Chan, W. M and Dicianno, B. E Virtual socialization in adults with spina bifida. In PM&R, 3 (3): 219-225, 2011.
- Cho, C. H; Martens, M. L; Kim, H. and Rodrigue, M. Astroturfing global warming: It isn't always greener on the other side of the fence. In Journal of Business Ethics, 104 (4): 571-587, 2011.
- Chowdhury, S. R.; Roy, A. R.; Shaikh, M. and Daudjee, K. A taxonomy of decentralized online social networks. In Peer-to-Peer Networking and Applications, 8 (3): 367-383, 2015. doi
- Clark, A. and Chalmers, D. The extended mind. In analysis: 7-19, 1998.
- Conley, D. Elsewhere, USA: How we got from the company man, family dinners, and the affluent society to the home office, BlackBerry moms, and economic anxiety. Vintage, 2009.
- Conquergood, D. Rethinking ethnography: Towards a critical cultural politics. In Communications monographs, 58 (2): 179-194, 1991.
- Consolvo, S.; McDonald, D. W.; Toscos, T.; Chen, M. Y.; Froehlich, J.; Harrison, B.; Klasnja, P.; LaMarca, A.; LeGrand, L.; Libby, R.; Smith, I. and Landay, J. A. Activity Sensing in the Wild: A Field Trial of Ubifit Garden. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1797-1806, ACM, New York, NY, USA, CHI '08 , 2008.
- Counts, S. and Stecher, K. B. Self-Presentation of Personality During Online Profile Creation. In ICWSM, 2009.
- Dalton, B. Pseudonymity in Social Machines. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
- Datta, A.; Buchegger, S.; Vu, L-H.; Strufe, T. and Rzadca, K. Decentralized Online Social Networks. In Handbook of Social Network Technologies, 2010.
- Davis, I. RELATIONSHIP: A vocabulary for describing relationships between people. Technical Report, vocab.org, 2010.
- Davis, J. L and Jurgenson, N. Context collapse: theorizing context collusions and collisions. In Information, Communication & Society, 17 (4): 476-485, 2014. doi
- de Jong, M. B. remoteStorage. www
- de Jong, M. B. remoteStorage. Technical Report, IETF, 2016.
- De Roure, D.; Hooper, C.; Meredith-Lobay, M.; Page, K.; Tarte, S.; Cruickshank, D. and De Roure, C. Observing Social Machines Part 1: What to Observe?. In CHI'13, ACM, Paris, 2013.
- DeCew, J. W. In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, 1997.
- Dennen, V. P. Constructing academic alter-egos: identity issues in a blog-based community. In Identity in the Information Society, 2 (1): 23-38, 2009. doi
- DePaulo, B. M; Kashy, D. A; Kirkendol, S. E; Wyer, M. M and Epstein, J. A Lying in everyday life. In Journal of personality and social psychology, 70 (5): 979, 1996.
- DePaulo, B. M; Lindsay, J. J; Malone, B. E; Muhlenbruck, L.; Charlton, K. and Cooper, H. Cues to deception. In Psychological bulletin, 129 (1): 74, 2003.
- Diaspora Foundation, Welcome to diaspora*. Technical Report, , 2017.
- Dijck, J. V. and Nieborg, D. Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos. In New Media & Society, 11 (5): 855-874, 2009. doi
- Dijck, J. V. Users like you? Theorizing agency in user-generated content. In Media, Culture & Society, 31 (1): 41-58, 2009. doi
- DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. In Proceedings of the 2007 International ACM Conference on Supporting Group Work, pages 383-386, ACM, New York, NY, USA, GROUP '07 , 2007.
- Dingledine, R.; Mathewson, N. and Syverson, P. Tor: The second-generation onion router. Technical Report, DTIC Document, 2004.
- Dodge, M. and Kitchin, R. Codes of life: identification codes and the machine-readable world. In Environment and Planning D: Society and Space, 23: 851-881, 2005.
- Doe, J. Change the Youtube comment section back to its original form. www
- Donath, J. and Boyd, D. Public displays of connection. In bt technology Journal, 22 (4): 71-82, 2004.
- Donath, J. S. Identity and deception in the virtual community. In Communities in cyberspace, pages 29-59, Routledge, 2002.
- Duffy, B. Amateur, autonomous, and collaborative: Myths of aspiring female cultural producers in Web 2.0. In Critical Studies in Media Communication, 32 (1): 48-64, 2015.
- Duffy, B. E. The Labor of Visibility: Gendered Self-Expression in the Social Media Imaginary. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
- Duggan, M. Mobile Messaging and Social Media 2015. In Pew Research Center, 2015.
- Duguay, S. Facebook as a decontextualized environment: Young people's experiences of navigating LGBTQ identity on a social networking site. In Social Media & Society 2013 International Conference, 2013.
- Duguay, S. "He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site. In new media & society, 18 (6): 891-907, 2016.
- Dunne, A. and Raby, F. Speculative everything: design, fiction, and social dreaming. MIT Press, 2013.
- Eckersley, P. How unique is your web browser?. In Privacy Enhancing Technologies, pages 1-18, 2010.
- Ellison, N. B and Boyd, D. M Sociality through social network sites. In The Oxford handbook of internet studies, pages 151-172, 2013.
- Ellison, N. B.; Steinfield, C. and Lampe, C. Connection strategies: Social capital implications of Facebook-enabled communication practices. In New Media & Society, 13 (6): 873-892, 2011. doi
- Ellison, N. B; Steinfield, C. and Lampe, C. The benefits of Facebook “friends:†Social capital and college students’ use of online social network sites. In Journal of Computer-Mediated Communication, 12 (4): 1143-1168, 2007.
- Ellison, N.; Heino, R. and Gibbs, J. Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. In Journal of Computer-Mediated Communication, 11 (2): 415-441, 2006. doi
- Esguerra, R. Google CEO Eric Schmidt Dismisses the Importance of Privacy. In Electronic Frontier Foundation, 2009.
- Evans, D. C; Gosling, S. D and Carroll, A. What elements of an online social networking profile predict target-rater agreement in personality impressions?. In ICWSM, 2008.
- Farnham, S. D. and Churchill, E. F. Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, pages 359-368, ACM, New York, NY, USA, CSCW '11 , 2011.
- Featherman, M. S; Miyazaki, A. D and Sprott, D. E Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility. In Journal of Services Marketing, 24 (3): 219-229, 2010.
- Fife, E. and Orjuela, J. The privacy calculus: Mobile apps and user perceptions of privacy and security. In International Journal of Engineering Business Management, 5 (6): 7, 2012.
- Fitzpatrick, B., S. B. and M., Atkins. Pubsubhubbub Core. Technical Report, 2010.
- Friendica, Friendica Features. Technical Report, , 2017.
- Frischmuth, P; Ermilov, T; Shekarpour, S and Auer, S An architecture of a distributed semantic social network. In Semantic Web, 5 (1): 77-95, 2014.
- Frosh, P. The gestural image: The selfie, photography theory, and kinesthetic sociability. In International journal of communication, 9 (0): 22, 2015.
- Gallagher, R New York Student Selling His Private Data on Kickstarter. In Slate, 2013.
- Garcez, P. M. Microethnography. In Encyclopedia of Language and Education, pages 187-196, Springer Netherlands, 1997.
- Gardner, H. and Davis, K. The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world. Yale University Press, 2013.
- Gaver, B. and Martin, H. Alternatives: Exploring Information Appliances Through Conceptual Design Proposals. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 209-216, ACM, New York, NY, USA, CHI '00 , 2000.
- Gaver, B.; Dunne, T. and Pacenti, E. Design: Cultural Probes. In interactions, 6 (1): 21-29, 1999.
- Gaver, W.; Beaver, J. and Benford, S. Ambiguity as a resource for design. doi
- Genestou, J. and Parecki, A. WebSub. Technical Report, W3C, 2017.
- Giddens, A. The constitution of society: Outline of the theory of structuration. Univ of California Press, 1984.
- Giddens, A. Modernity and self-identity: Self and society in the late modern age. Stanford University Press, 1991.
- Gigerenzer, G. and Kurz, E. M Vicarious functioning reconsidered: A fast and frugal lens model. In The essential Brunswik: Beginnings, explications, applications: 342-347, 2001.
- Gilewicz, N. and Allard-Huver, F. Digital Parrhesia as a Counterweight to Astroturfing. In Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication: 215, 2012.
- Gimpel, H.; Nissen, M. and Gorlitz, R. Quantifying the quantified self: A study on the motivations of patients to track their own health. In Thirty Fourth International Conference on Information Systems, 2013.
- Goffman, E. The Presentation of Self in Everyday Life. Doubleday, Anchor books , 1959.
- Gosling, S. D; Ko, S. J.; Mannarelli, T. and Morris, M. E A room with a cue: personality judgments based on offices and bedrooms. In Journal of personality and social psychology, 82 (3): 379, 2002.
- Grice, H. P Logic and conversation. na, 1970.
- Griffiths, M. D; Davies, M. NO and Chappell, D. Online computer gaming: a comparison of adolescent and adult gamers. In Journal of adolescence, 27 (1): 87-96, 2004.
- Grimes, D A and Schulz, K F Descriptive studies: what they can and cannot do. In The Lancet, 2002.
- Gulcu, C. and Tsudik, G. Mixing E-mail with Babel. In Network and Distributed System Security, 1996., Proceedings of the Symposium on, pages 2-16, 1996.
- Guy, A. and Klein, E. Constructed Identity and Social Machines: A Case Study in Creative Media Production. In WWW 2014 Companion, ACM, Seoul, 2014.
- Guy, A. Social Web Protocols. Technical Report, W3C, 2017.
- Hall, W.; Tiropanis, T.; Tinati, R.; Booth, P.; Gaskell, P.; Hare, J. and Carr, L. The Southampton University Web Observatory.
- Halpin, H. and Bria, F. State of the Art of social networking systems, identity ecosystem and social data stores. In Decentralised Citizens ENgagement Technologies project, 2014.
- Halpin, H. Identity, Reference and Meaning on the Web. In WWW2006, Edinburgh, 2006.
- Halpin, H. Sense and reference on the web. Ph.D. Thesis, University of Edinburgh, 2009.
- Halpin, H.; Troncoso, C.; Isaakides, M. and Danezis, G. Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments. In Submission, 2016.
- Hammarfelt, B.; Rijcke, S. de and Rushforth, A. D. Quantified academic selves: the gamification of research through social networking services. In Inf. Res., 21, 2016.
- Hammer-Lahav, E. The OAuth 1.0 Protocol. Technical Report, IETF, 2010.
- Hammersley, M. and Atkinson, P. Ethnography: Principles in practice. Routledge, 2007.
- Hample, D. Purposes and effects of lying. In Southern Speech Communication Journal, 46 (1): 33-47, 1980.
- Hancock, J. T Digital deception. In Oxford handbook of internet psychology: 289-301, 2007.
- Hancock, J. T.; Thom-Santelli, J. and Ritchie, T. Deception and Design: The Impact of Communication Technology on Lying Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 129-134, ACM, New York, NY, USA, CHI '04 , 2004.
- Hancock, J. T.; Toma, C. and Ellison, N. The Truth About Lying in Online Dating Profiles. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 449-452, ACM, New York, NY, USA, CHI '07 , 2007.
- Hancock, J. T; Thom-Santelli, J. and Ritchie, T. Deception and design: The impact of communication technology on lying behavior. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129-134, 2004.
- Hancock, J.; Birnholtz, J.; Bazarova, N.; Guillory, J.; Perlin, J. and Amos, B. Butler lies: awareness, deception and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 517-526, 2009.
- Harbulot, B; Jacobi, I and Jones, M FOAF+SSL: RESTful authentication for the social web. In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009), 2009.
- Hardt, D. The OAuth 2.0 Authorization Framework. Technical Report, IETF, 2012.
- Hearn, A. Verified: Self-presentation, identity management, and selfhood in the age of big data. In Popular Communication, 15 (2): 62-77, 2017. doi
- Heidegger, M. The question concerning technology. In Technology and values: Essential readings: 99-113, 1954.
- Hendler, J. and Berners-Lee, T. From the Semantic Web to social machines: A research challenge for AI on the World Wide Web. In Artificial Intelligence, 174 (2): 156-161, 2009. doi
- Hogan, B. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. In Bulletin of Science, Technology & Society: 0270467610385893, 2010.
- Hogan, B. The presentation of self in the age of social media: Distinguishing performances and exhibitions online. In Bulletin of Science, Technology & Society: 0270467610385893, 2010.
- Hubzilla, Hubzilla. www
- Hussain, Z. and Griffiths, M. D Gender swapping and socializing in cyberspace: An exploratory study. In CyberPsychology & Behavior, 11 (1): 47-53, 2008.
- Idehen, K. and Erling, O. Linked Data Spaces & Data Portability. In LDOW, Proceedings of WWW, 2008.
- Interactive, H. The Harris Polltextregistered♯ 17: Most People are ‘Privacy Pragmatists' who, while Concerned about Privacy, will Sometimes Trade it off for Other Benefits. In Online: http://www. harrisinteractive. com/harris_poll/index. asp, 2003.
- Jacobi, I. FOAF-Persona: A schema for indicating relationships between personas and real people. www
- Johnson, B. Privacy no longer a social norm, says Facebook founder. www
- Johnson, B. Privacy no longer a social norm, says Facebook founder. In The Guardian, 2010.
- Jones, P. S. G., J. M., and J., S. Web Finger. Technical Report, IETF, 2013.
- Kaplan, A. M and Haenlein, M. Users of the world, unite! The challenges and opportunities of Social Media. In Business Horizons, 53 (1): 59-68, 2010.
- Keen, A. Digital vertigo: how today's online social revolution is dividing, diminishing, and disorienting us. Macmillan, 2012.
- Kessler, S. Twitter Only Gave Meerkat 2 Hours’ Notice Before Cutting Access To The Social Graph. In Fast Company, 2015.
- Khare, R. and Celik, T. Microformats: a pragmatic path to the semantic web. In Proceedings of the 15th international conference on World Wide Web, pages 865-866, 2006.
- Kirkpatrick, D. The Facebook effect: The inside story of the company that is connecting the world. Simon and Schuster, 2011.
- Kleek, M. V.; Murray-Rust, D.; Guy, A.; Smith, D. A and Shadbolt, N. R Self Curation , Social Partitioning , Escaping from Prejudice and Harassment : the Many Dimensions of Lying Online. In WebSci2015, 2015.
- Kleek, M. V.; Smith, D. A; Murray-Rust, D.; Guy, A.; Dragan, L. and Shadbolt, N. R Social Personal Data Stores: the Nuclei of Decentralised Social Machines. In WWW 2015 Companion, pages 1155-1160, ACM, 2015.
- Klyne, G. and Carroll, J. Resource Description Framework (RDF): Concepts and Abstract Syntax. Technical Report, W3C, 2004.
- Known, Known beta. Technical Report, , 2017.
- Kolivos, E. and Kuperman, A. Consumer law: Web of lies-legal implications of astroturfing. In Keeping Good Companies, 64 (1): 38, 2012.
- Krane, D.; Light, L. and Gravitch, D. Privacy on and off the Internet: What consumers want. In Harris Interactive, 2002.
- Kumaraguru, P. and Cranor, L. F. Privacy indexes: a survey of Westin's studies.
- Larsen, J. Contradictions Of The Social Imaginary: Making Sense Of Digital Food Snaps. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
- Las'en, A. Digital self-portraits, exposure and the modulation of intimacy. In Mobile and Digital Communication: Approaches to Public and Private. Covilha, Portugal: LabCom books. Video of the conference available at URL www. youtube. com/watch, 2015.
- Lawrence, K F. Amateur Fiction Online - The Web of Community Trust A Case Study in Community Focused Design for the Semantic Web. In 1st AKT Doctoral Colloquium, Milton Keynes, 2005.
- Lenhart, A.; Kahne, J.; Middaugh, E.; Macgill, A. R.; Evans, C. and Vitak, J. Teens, Video Games, and Civics: Teens' Gaming Experiences Are Diverse and Include Significant Social Interaction and Civic Engagement. In Pew Internet & American Life Project, 2008.
- Lenhart, A.; Purcell, K.; Smith, A. and Zickuhr, K. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. In Pew Internet & American Life Project, 2010.
- Li, I.; Dey, A. K and Forlizzi, J. Understanding my data, myself: supporting self-reflection with ubicomp technologies. In Proceedings of the 13th international conference on Ubiquitous computing, pages 405-414, 2011.
- Lindskold, S. and Walters, P. S Categories for acceptability of lies. In The Journal of Social Psychology, 120 (1): 129-136, 1983.
- Lingel, J. and Golub, A. In Face on Facebook: Brooklyn's Drag Community and Sociotechnical Practices of Online Communication. In Journal of Computer-Mediated Communication, 2015.
- Litt, E. Knock, Knock. Who's There? The Imagined Audience. In Journal of Broadcasting & Electronic Media, 56 (3): 330-345, 2012. doi
- Livingstone, S. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression. In New media & society, 10 (3): 393-411, 2008.
- Luppicini, R. Handbook of Research on Technoself: Identity in a Technological Society: Identity in a Technological Society. IGI Global, 2012.
- Luther, K. and Diakopoulos, N. Distributed Creativity. In Supporting creative acts beyond dissemination. Creativity & Cognition, Washington DC, 2007.
- Luther, K. Edits & Credits: Exploring Integration and Attribution in Online Creative Collaboration. In CHI, pages 2823-2832, 2010.
- Macgirvin, M Zot! social communications protocol. Technical Report, , 2011.
- Madden, M.; Lenhart, A.; Cortesi, S.; Gasser, U.; Duggan, M.; Smith, A. and Beaton, M. Teens, social media, and privacy. In Pew Research Center, 2013.
- Mahmood, S. and Desmedt, Y. Your Facebook deactivated friend or a cloaked spy. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 367-373, 2012.
- Mansour, E.; Sambra, A. V.; Hawke, S.; Zereba, M.; Capadisli, S.; Ghanem, A.; Aboulnaga, A. and Berners-Lee, T. A demonstration of the solid platform for social web applications. In Proceedings of the 25th International Conference Companion on World Wide Web, pages 223-226, 2016.
- Marcus, B.; Machilek, F. and Sch"utz, A. Personality in cyberspace: personal Web sites as media for personality expressions and impressions. In Journal of personality and social psychology, 90 (6): 1014, 2006.
- Marwick, A. and Boyd, D. ‘It's just drama’: teen perspectives on conflict and aggression in a networked era. In Journal of Youth Studies, 17 (9): 1187-1204, 2014.
- Marwick, A. E and boyd, d. Social privacy in networked publics: Teens’ attitudes, practices, and strategies. In A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, 2011.
- Marwick, a. E. and boyd, d. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. In New Media & Society, 13 (1): 114-133, 2010.
- McCathie Nevile, C. World Wide Web Consortium Process Document: Maturity Levels. Technical Report, W3C, 2015.
- McCornack, S. a. Information manipulation theory. In Communication Monographs, 59 (1): 1-16, 1992.
- McLuhan, M. Understanding media: The extensions of man. MIT press, 1994.
- Mercier, C. How to Create a Working Group or Interest Group. In W3C Guidebook, 2017.
- Mess, L. M. H. Selfies and Side-Eye: Drag Queens Take on Facebook. In Studies in Gender and Sexuality, 16 (2): 144-146, 2015.
- Metzger, M. J Privacy, trust, and disclosure: Exploring barriers to electronic commerce. In Journal of Computer-Mediated Communication, 9 (4): 00-00, 2004.
- Miemis, V. 88+ Projects & Standards for Data Ownership, Identity, & A Federated Social Web. www
- Mihindukulasooriya, N. and Menday, R. Linked Data Platform 1.0 Primer. Technical Report, W3C, 2015.
- Miles, M. B and Huberman, A M. Qualitative data analysis: An expanded sourcebook. Sage, 1994.
- Monroy-Hernandez, A.; Mako Hill, B.; Gonzalez-Rivero, J. and boyd, d. Computers can't give credit: How automatic attribution falls short in an online remixing community. In CHI, ACM, Vancouver, 2011.
- Moore, P and Piwek, L Unintended Consequences: The Dark Sides of Quantifying Selves.
- Moore, P. and Robinson, A. The quantified self: What counts in the neoliberal workplace. In new media & society, 18 (11): 2774-2792, 2016.
- Mydex, The case for personal information empowerment : The rise of the personal data store.
- Mylonas, A.; Kastania, A. and Gritzalis, D. Delegate the smartphone user? Security awareness in smartphone platforms. In Computers & Security, 34: 47-66, 2013.
- Nafus, D. and Sherman, J. Big data, big questions| this one does not go up to 11: the quantified self movement as an alternative big data practice. In International journal of communication, 8: 11, 2014.
- Naquin, C. E; Kurtzberg, T. R and Belkin, L. Y The finer points of lying online: e-mail versus pen and paper. In The Journal of applied psychology, 95 (2): 387-394, 2010.
- Narayanan, A., T. V., B. S. and Nissenbaum, H. A critical look at decentralized personal data architectures. In arXiv.org, 2012.
- Nemer, D. and Freeman, G. Empowering the marginalized: Rethinking selfies in the slums of Brazil. In International Journal of Communication, 9 (0): 1832-1847, 2015.
- NextCloud, NextCloud. www
- Nissenbaum, H. Privacy as contextual integrity. In Washington law review, 79 (1), 2004.
- Nissenbaum, H. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, 2009.
- Noland, C. M Auto-photography as research practice: Identity and self-esteem research. In Journal of research Practice, 2 (1): 1, 2006.
- Nottingham, M and Sayre, R The Atom Syndication Format. Technical Report, IETF, 2005.
- Palfrey, J. and Gasser, U. Born digital: Understanding the first generation of digital natives. Basic Books, 2013.
- Panzer, J. The Salmon Protocol. Technical Report, 2010.
- Papacharissi, Z. The Blogger Revolution? Audiences as Media Producers. , 2004.
- Papacharissi, Z. The presentation of self in virtual life: Characteristics of personal home pages. In Journalism & Mass Communication Quarterly, 79 (3): 643-660, 2002.
- Papacharissi, Z. Without You, I'm Nothing: Performances of the Self on Twitter. In International Journal of Communication, 6 (0), 2012.
- Parecki, A. Micropub. Technical Report, W3C, 2017.
- Passant, A.; Bojars, U.; Breslin, J. G. and Decker, S. The SIOC Project: Semantically-Interlinked Online Communities, from Humans to Machines. In Coordination, Organizations, Institutions and Norms in Agent Systems V: COIN 2009 International Workshops. COIN@AAMAS 2009, Budapest, Hungary, May 2009, COIN@IJCAI 2009, Pasadena, USA, July 2009, COIN@MALLOW 2009, Turin, Italy, September 2009. Revised Selected Papers, pages 179-194, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010.
- Passant, A.; Breslin, J. G and Decker, S. Rethinking microblogging: open, distributed, semantic. In International Conference on Web Engineering, pages 263-277, 2010.
- Paul, T.; Famulari, A. and Strufe, T. A survey on decentralized online social networks. In Computer Networks, 75: 437-452, 2014.
- Perez, S. Facebook Wins "Worst API" in Developer Survey. In Techcrunch, 2011.
- Perreault, S. and Resnick, P. vCard Format Specification. Technical Report, IETF, 2011.
- Potts, A. `LOVE YOU GUYS (NO HOMO)' How gamers and fans play with sexuality, gender, and Minecraft on YouTube. In Critical Discourse Studies: 1-24, 2014.
- Prodromou, E, V. B, W. J and Z, C. OStatus. Technical Report, , 2010.
- Prodromou, E. pump.io API. Technical Report, e14n, 2017.
- Quinn, K The Navigation of Boundaries in Online Social Spaces. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
- Rains, S. The impact of anonymity on perceptions of source credibility and influence in computer-mediated group communication: A test of two competing hypotheses. In Communication Research, 34 (1): 100-125, 2007.
- Raynes-Goldie, K. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. In First Monday, 15 (1), 2010.
- Rees, J. A Guide to ISSUE-57 (httpRange-14) Document Suite from Jonathan A Rees on 2012-01-21(www-tag@ w3. org from January 2012).
- Ren, Y.; Kraut, R.; Kiesler, S. and Resnick, P. Encouraging commitment in online communities. In Building Successful Online Communities: Evidence-Based Social Design, pages 77-125, MIT Press, 2012.
- Roig, M. and Caso, M. Lying and cheating: Fraudulent excuse making, cheating, and plagiarism. In The Journal of Psychology, 139 (6): 485-494, 2005.
- Rousseau, A.; Eggermont, S. and Frison, E. The reciprocal and indirect relationships between passive Facebook use, comparison on Facebook, and adolescents' body dissatisfaction. In Computers in Human Behavior, 73: 336-344, 2017. doi
- Russell, A. and Echchaibi, N. International blogging: Identity, politics, and networked publics. Peter Lang, 2009.
- Rust, C.; Mottram, J. and Till, J AHRC Research Review Practice-Led Research in Art. In Design and Architecture: Arts and Humanities Research Council, 2007.
- Sanderson, R Web Annotation Protocol. Technical Report, W3C, 2017.
- Sanderson, R.; Ciccarese, P. and Young, B. Web Annotation Vocabulary. Technical Report, W3C, 2017.
- Sanford, J. The Truth about Lying: Course explores history of deception. www
- Scarlata, V.; Levine, B. N. and Shields, C. Responder anonymity and anonymous peer-to-peer file sharing. In Network Protocols, 2001. Ninth International Conference on, pages 272-280, 2001.
- Schaar, P. Privacy by design. In Identity in the Information Society, 3 (2): 267-274, 2010.
- Scheidt, L. A. and Wright, E. Common visual design elements of weblogs. In Into the blogosphere: Rhetoric, community, and culture of weblogs., 2004.
- Schulman, N. In Real Life: Love, Lies & Identity in the Digital Age. Hachette UK, 2014.
- Senft, T. M and Baym, N. K What does the selfie say? Investigating a global phenomenon introduction. In International Journal of Communication, 9: 1588–1606, 2015.
- Seong, S-W.; Seo, J.; Nasielski, M.; Sengupta, D.; Hangal, S.; Teh, S. K.; Chu, R.; Dodson, B. and Lam, M. S. PrPl: a decentralized social networking infrastructure. In Proceedings of the 1st International Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010.
- Shetty, S. and Parecki, A. Webmention. Technical Report, W3C, 2017.
- Shields, P. and Rangarajan, N. A Playbook for Research Methods: Integrating Conceptual Frameworks and Project Management. Stillwater, OK: New Forums Press, 2013.
- singh, s Subverting Social Media. In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR, 2015.
- Smarr, J Portable Contacts 1.0. Technical Report, 2008.
- Smart, P. R; Simperl, E. and Shadbolt, N. A Taxonomic Framework for Social Machines. In Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, 2014.
- Snyder, M. Self-monitoring of expressive behavior. In Journal of personality and social psychology, 30 (4): 526, 1974.
- Solon, O 'Data soul' of Shawn Buckles sells for £288. In Wired, 2014.
- Solorio, T.; Hasan, R. and Mizan, M. A case study of sockpuppet detection in wikipedia. In Workshop on Language Analysis in Social Media (LASM) at NAACL HLT, pages 59-68, 2013.
- Sporny, M.; Kellogg, G. and Lanthaler, M. JSON-LD 1.0: A JSON-based Serialization for Linked Data. Technical Report, W3C, 2014.
- Stendal, K. How do People with Disability Use and Experience Virtual Worlds and ICT: A Literature Review. In Journal For Virtual Worlds Research, 5 (1), 2012. doi
- Story, H. and thers, WebAccessControl. Technical Report, W3C Wiki, 2016.
- Story, H; Sambra, A and Tramp, S Friending On The Social Web. In Proceedings of Federated Social Web Europe, Federated Social Web Europe, 2011.
- Strauss, A. and Corbin, J. M Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc, 1990.
- Strohmaier, M. A Few Thoughts on Engineering Social Machines. In WWW 2013 Companion, ACM, Rio de Janeiro, 2013.
- Swan, M. The quantified self: Fundamental disruption in big data science and biological discovery. In Big Data, 1 (2): 85-99, 2013.
- Swan, M. Health 2050: The realization of personalized medicine through crowdsourcing, the quantified self, and the participatory biocitizen. In Journal of personalized medicine, 2 (3): 93-118, 2012.
- Swan, M. Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0. In Journal of Sensor and Actuator Networks, 1 (3): 217-253, 2012.
- Tan, D.; Berry, E.; Czerwinski, M.; Bell, G.; Gemmell, J.; Hodges, S. and Wood, K. Save everything: supporting human memory with a personal digital lifetime store. In Personal information management, 90, 2007.
- Tang, J. C.; Cebrian, M.; Giacobe, N. A.; Kim, H-W.; Kim, T. and Wickert, D. ". Reflecting on the DARPA Red Balloon Challenge. In Commun. ACM, 54 (4): 78-85, 2011.
- Tene, O. and Polenetsky, J. To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising. In Minn. JL Sci. & Tech., 13: 281, 2012.
- tent.io, Tent.io Protocol Introduction. Technical Report, , 2015.
- Thomas, A. Youth online: Identity and literacy in the digital age. Peter Lang, 2007.
- Tiidenberg, K. and Whelan, A. Sick bunnies and pocket dumps:“Not-selfies†and the genre of self-representation. In Popular Communication, 15 (2): 141-153, 2017.
- Till, C. Exercise as labour: Quantified self and the transformation of exercise into labour. In Societies, 4 (3): 446-462, 2014.
- Tiropanis, T.; Hall, W.; Shadbolt, N.; De Roure, D.; Contractor, N. and Hendler, J. The web science observatory. In IEEE Intelligent Systems, 28 (2): 100-104, 2013.
- Toma, C. L Affirming the self through online profiles: beneficial effects of social networking sites. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1749-1752, 2010.
- Trammell, K. D and Keshelashvili, A. Examining the new influencers: A self-presentation study of A-list blogs. In Journalism & Mass Communication Quarterly, 82 (4): 968-982, 2005.
- Tramp, S; Frischmuth, P; Ermilov, T and Auer, S Weaving a social data web with semantic pingback. In Knowledge Engineering and Management by the Masses --- 17th International Conference, EKAW 2010, pages 135-149, Springer, 2010.
- Turkle, S. Life on the Screen. Simon and Schuster, 2011.
- Turkle, S. Reclaiming Conversation: The Power of Talk in a Digital Age. Penguin Publishing Group, 2015. www
- Turner, R. E; Edgley, C. and Olmstead, G. Information control in conversations: Honesty is not always the best policy. In Kansas Journal of Sociology: 69-89, 1975.
- Tyler, J. R and Tang, J. C When can I expect an email response? A study of rhythms in email usage. In ECSCW 2003, pages 239-258, 2003.
- Unhosted, unhosted.org.
- Unknown, Disinformation - Wikipedia, The Free Encyclopedia. , [Online; accessed 15-Sept-2015]. www
- Uyi Idehen, K. A Read-Write Web without Storage Silos. www
- Van den Bulck, J. Sleep apps and the quantified self: blessing or curse?. In Journal of sleep research, 24 (2): 121-123, 2015.
- Van Doorn, N. and Van Zoonen, L. Theorizing gender and the Internet: Past, present, and future. In The Routledge Handbook of Internet Politics: 261-74, 2008.
- Van House, N. A Personal photography, digital technologies and the uses of the visual. In Visual Studies, 26 (2): 125-134, 2011.
- Van Kleek, M. and OHara, K. The Future of Social Is Personal: The Potential of the Personal Data Store. In Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, pages 125-158, Springer International Publishing, Cham, 2014.
- Van Kleek, M.; Murray-Rust, D.; Guy, A.; O'hara, K. and Shadbolt, N. Computationally Mediated Pro-Social Deception. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 552-563, 2016.
- Van Kleek, M.; Smith, D. A.; Shadbolt, N. and thers, A decentralized architecture for consolidating personal information ecosystems: The WebBox.
- Van Kleek, M.; Smith, D. A.; Tinati, R.; O'Hara, K.; Hall, W. and Shadbolt, N. R 7 billion home telescopes: observing social machines through personal data stores. In Proceedings of the 23rd International Conference on World Wide Web, pages 915-920, 2014.
- van Wersch, A.; Eberhardt, J. and Stringer, F Cyberpsychology behavior and social networking. In Cyberpsychology, behavior, and social networking, 2013.
- Vazire, S. and Gosling, S. D e-Perceptions: personality impressions based on personal websites. In Journal of personality and social psychology, 87 (1): 123, 2004.
- Verduyn, P.; Ybarra, O.; Resibois, M.; Jonides, J. and Kross, E. Do Social Network Sites Enhance or Undermine Subjective Well-Being? A Critical Review. In Social Issues and Policy Review, 11 (1): 274-302, 2017. doi
- Vitak, J. and Kim, J. "You Can't Block People Offline": Examining How Facebook's Affordances Shape the Disclosure Process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, pages 461-474, ACM, New York, NY, USA, CSCW '14 , 2014.
- Voida, A.; Newstetter, W. C and Mynatt, E. D When conventions collide: the tensions of instant messaging attributed. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 187-194, 2002.
- Vrij, A. Detecting lies and deceit: The psychology of lying and implications for professional practice. Wiley, 2000.
- W3C News, OpenSocial Foundation Moving Standards Work to W3C. In W3C News Blog, 2014.
- Walther, J. B and Parks, M. R Cues filtered out, cues filtered in. In Handbook of interpersonal communication, 3: 529-563, 2002.
- Walther, J. B Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. In Communication research, 23 (1): 3-43, 1996.
- Walther, J. B; Van Der Heide, B.; Hamel, L. M and Shulman, H. C Self-generated versus other-generated statements and impressions in computer-mediated communication: A test of warranting theory using Facebook. In Communication research, 36 (2): 229-253, 2009.
- Walther, J. B; Van Der Heide, B.; Kim, S-Y.; Westerman, D. and Tong, S. T. The role of friends’ appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?. In Human communication research, 34 (1): 28-49, 2008.
- Warkentin, D.; Woodworth, M.; Hancock, J. T and Cormier, N. Warrants and deception in computer mediated communication. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 9-12, 2010.
- Warren, C. Twitter's API Update Cuts Off Oxygen to Third-Party Clients. In Mashable, 2012.
- Wesch, M. YouTube and You Experiences of Self-Awareness in the Context Collapse of the Recording Webcam. In Explorations in Media Ecology, 8 (2): 99-114, 2009.
- Wetherall, D.; Choffnes, D.; Greenstein, B; Han, S.; Hornyack, P.; Jung, J.; Schechter, S. and Wang, X. Privacy revelations for web and mobile apps. In Proc 13th USENIX Conference on Hot Topics in Operating Systems, pages 21, 2011.
- Whitson, J. R Gaming the quantified self. In Surveillance & Society, 11 (1/2): 163, 2013.
- Whitty, M. and Gavin, J. Age/sex/location: Uncovering the social cues in the development of online relationships. In CyberPsychology & Behavior, 4 (5): 623-630, 2001.
- Whitty, M. T Liar, liar! An examination of how open, supportive and honest people are in chat rooms. In Computers in Human Behavior, 18 (4): 343-352, 2002.
- Wikipedia, Browser Wars. www
- Wikipedia, Eating your own dog food. www
- Wikipedia, 50 Cent Party. , [Online; accessed 20-March-2015]. www
- Yee, N. The demographics, motivations, and derived experiences of users of massively multi-user online graphical environments. In Presence, 15 (3): 309-329, 2006.
- Yee, N.; Bailenson, J. N and Ducheneaut, N. The Proteus effect: Implications of transformed digital self-representation on online and offline behavior. In Communication Research, 2009.
- Yeung, C A; Liccardi, I; Lu, K and Seneviratne, O Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.
- Zhang, J.; Carpenter, D. and Ko, M. Online Astroturfing: A Theoretical Perspective. In Americas Conference on Information Systems 2013 Proceedings, 2014.
- Zhao, X.; Lampe, C. and Ellison, N. B. The Social Media Ecology: User Perceptions, Strategies and Challenges. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 89-100, ACM, New York, NY, USA, CHI '16 , 2016.