-
Notifications
You must be signed in to change notification settings - Fork 6
/
appendices.html
36 lines (29 loc) · 102 KB
/
appendices.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta charset="utf-8" />
<title>References</title>
<meta content="width=device-width, initial-scale=1" name="viewport" />
<link href="thesis.css" media="all" rel="stylesheet" title="Thesis do" />
<link href="https://dokie.li/media/css/basic.css" media="all" rel="stylesheet alternate" title="Basic" />
<link href="https://dokie.li/media/css/dokieli.css" media="all" rel="stylesheet" />
<script src="https://dokie.li/scripts/dokieli.js"></script>
<link href="https://rhiaro.co.uk/incoming/" rel="http://www.w3.org/ns/ldp#inbox" />
<link href="https://linkedresearch.org/annotation/rhiaro/thesis/" rel="http://www.w3.org/ns/oa#annotationService" />
</head>
<body about="" prefix="rdf: http://www.w3.org/1999/02/22-rdf-syntax-ns# rdfs: http://www.w3.org/2000/01/rdf-schema# owl: http://www.w3.org/2002/07/owl# xsd: http://www.w3.org/2001/XMLSchema# dcterms: http://purl.org/dc/terms/ dctypes: http://purl.org/dc/dcmitype/ foaf: http://xmlns.com/foaf/0.1/ pimspace: http://www.w3.org/ns/pim/space# cc: https://creativecommons.org/ns# skos: http://www.w3.org/2004/02/skos/core# prov: http://www.w3.org/ns/prov# mem: http://mementoweb.org/ns# qb: http://purl.org/linked-data/cube# schema: http://schema.org/ void: http://rdfs.org/ns/void# rsa: http://www.w3.org/ns/auth/rsa# cert: http://www.w3.org/ns/auth/cert# wgs: http://www.w3.org/2003/01/geo/wgs84_pos# bibo: http://purl.org/ontology/bibo/ sioc: http://rdfs.org/sioc/ns# doap: http://usefulinc.com/ns/doap# dbr: http://dbpedia.org/resource/ dbp: http://dbpedia.org/property/ sio: http://semanticscience.org/resource/ opmw: http://www.opmw.org/ontology/ deo: http://purl.org/spar/deo/ doco: http://purl.org/spar/doco/ cito: http://purl.org/spar/cito/ fabio: http://purl.org/spar/fabio/ oa: http://www.w3.org/ns/oa# as: https://www.w3.org/ns/activitystreams# ldp: http://www.w3.org/ns/ldp# solid: http://www.w3.org/ns/solid/terms# acl: http://www.w3.org/ns/auth/acl# dio: https://w3id.org/dio# rel: https://www.w3.org/ns/iana/link-relations/relation#" typeof="schema:CreativeWork sioc:Post prov:Entity">
<main>
<article about="" typeof="schema:Article" id="appendices">
<h1 property="schema:name doap:name">References</h1>
<div id="content">
<section id="references" rel="schema:hasPart">
<div>
<ol start="1" id="references-list">
<li id="ref-adar2013Benevolent"><span class="authors">Adar, E.; Tan, D. S. and Teevan, J.</span> <span class="title">Benevolent Deception in Human Computer Interaction</span>. <span class="in">In <a href="http://dl.acm.org/citation.cfm?id=2470654.2466246" target="_blank">Chi 2013</a></span>: 1863-1872, 2013.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1145/2470654.2466246" target="_blank">doi</a></span> </span></li><li id="ref-insta17"><span class="authors">Ahadzadeh, A. S.; Sharif, S. P. and Ong, F. S.</span> <span class="title">Self-schema and self-discrepancy mediate the influence of Instagram usage on body image satisfaction among youth</span>. <span class="in">In Computers in Human Behavior</span>, 68: 8-16, 2017.<span class="links"></span></li><li id="ref-schiller2015Phishing"><span class="authors">Akerlof, G. A. and Shiller, R. J.</span> <span class="title">Privacy in context: Technology, policy, and the integrity of social life</span>. <span class="publisher">Princeton University Press</span>, 2015.<span class="links"></span></li><li id="ref-Akker:2014:TRP:2684563.2684638"><span class="authors">Akker, H.; Jones, V. M. and Hermens, H. J.</span> <span class="title">Tailoring Real-time Physical Activity Coaching Systems: A Literature Survey and Model</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/s11257-014-9146-y" target="_blank">User Modeling and User-Adapted Interaction</a></span>, 24 (5): 351-392, 2014.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1007/s11257-014-9146-y" target="_blank">doi</a></span> </span></li><li id="ref-albrechtslund2008Participatory"><span class="authors">Albrechtslund, A</span> <span class="title">Online social networking as participatory surveillance</span>. <span class="in">In <a href="http://firstmonday.org/ojs/index.php/fm/article/viewArticle/2142" target="_blank">First Monday</a></span>, 13 (3): 1-11, 2008.<span class="links"></span></li><li id="ref-alexander2010Disinformation"><span class="authors">Alexander, J. M and Smith, J. M</span> <span class="title">Disinformation : A Taxonomy</span>. Technical Report, <span class="institution">University of Pennsylvania Department of Computer & Information Science</span>, 2010.<span class="links"></span></li><li id="ref-anolli2001DeceptiveMiscommunication"><span class="authors">Anolli, L.; Balconi, M. and Ciceri, R.</span> <span class="title">Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication</span>. <span class="in">In <a href="http://books.google.com/books?hl=en&lr=&id=PsiLjRHr1JQC&oi=fnd&pg=PA73&dq=Deceptive+Miscommunication+Theory+(+DeMiT+):+A+new+model+for+the+analysis+of+deceptive+communication&ots=GkJjOpQJfZ&sig=DfUVh93xYcd2WThfB5_w3vU7nfo" target="_blank">Say not to say New perspectives on miscommunication</a></span> (FEBRUARY): 73-100, 2001.<span class="links"></span></li><li id="ref-aoki2005Ambiguity"><span class="authors">Aoki, P. M. and Woodruff, A.</span> <span class="title">Making Space for Stories: Ambiguity in the Design of Personal Communication Systems</span>.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1145/1054972.1054998" target="_blank">doi</a></span> <span class="url"><a href="http://arxiv.org/abs/cs/0507019" target="_blank">www</a></span> </span></li><li id="ref-incubator"><span class="authors">Appelquist, D. and Brickley, D.</span> <span class="title">A Standards-based, Open and Privacy-aware Social Web</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/2005/Incubator/socialweb/XGR-socialweb-20101206/" target="_blank">W3C</a></span>, 2010.<span class="links"></span></li><li id="ref-tw-api3"><span class="authors">Armenti, M.</span> <span class="title">New Twitter search API won't be available to third-party clients</span>. <span class="in">In <a href="https://marco.org/2014/11/24/twitter-california-knife" target="_blank">marco.org</a></span>, 2014.<span class="links"></span></li><li id="ref-tw-api4"><span class="authors">Armenti, M.</span> <span class="title">Twitter's "peace offering" to developers is meaningless</span>. <span class="in">In <a href="https://marco.org/2014/10/20/wsj-twitter-peace-offering" target="_blank">marco.org</a></span>, 2014.<span class="links"></span></li><li id="ref-as1"><span class="authors">Atkins, M., W. N. W., M. C., W. M. and Dolin, R.</span> <span class="title">ActivityStreams 1.0 Concepts and Representations</span>. Technical Report, <span class="institution"><a href="http://activitystrea.ms/head/json-activity.html" target="_blank"></a></span>, 2010.<span class="links"></span></li><li id="ref-auger2013speculative"><span class="authors">Auger, J.</span> <span class="title">Speculative design: crafting the speculation</span>. <span class="in">In Digital Creativity</span>, 24 (1): 11-35, 2013.<span class="links"></span></li><li id="ref-baker09"><span class="authors">Baker, A. J.</span> <span class="title">Mick or Keith: blended identity of online rock fans</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/s12394-009-0015-5" target="_blank">Identity in the Information Society</a></span>, 2 (1): 7-21, 2009.<span class="links"></span></li><li id="ref-symantec"><span class="authors">Barcena, M. B.; Wueest, C. and Lau, H.</span> <span class="title">How safe is your quantified self</span>. <span class="in">In Symantech: Mountain View, CA, USA</span>, 2014.<span class="links"></span></li><li id="ref-bardzell2014reading"><span class="authors">Bardzell, J.; Bardzell, S. and Stolterman, E.</span> <span class="title">Reading critical designs: supporting reasoned interpretations of critical design</span>. <span class="in">In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</span>, pages 1951-1960, 2014.<span class="links"></span></li><li id="ref-borndigi"><span class="authors">Barlow, J.</span> <span class="title">Born Digital: Understanding the First Generation of Digital Natives</span>.<span class="links"></span></li><li id="ref-barmann14drag"><span class="authors">Barmann, J.</span> <span class="title">Drag Queens, Other Performers Outraged As Facebook Forces Them To Use Their Real Names</span>.<span class="links"> <span class="url"><a href="http://sfist.com/2014/09/11/drag_queens_other_performers_outrag.php" target="_blank">www</a></span> </span></li><li id="ref-fb-api"><span class="authors">Barrett, R.</span> <span class="title">facebook: /me/posts returns objects with ids with colons</span>. <span class="in">In <a href="https://github.com/snarfed/bridgy/issues/305" target="_blank">GitHub Issues</a></span>, 2014.<span class="links"></span></li><li id="ref-baym12"><span class="authors">Baym, N. K and boyd, d.</span> <span class="title">Socially mediated publicness: An introduction</span>. <span class="in">In Journal of Broadcasting & Electronic Media</span>, 56 (3): 320-329, 2012.<span class="links"></span></li><li id="ref-dbeer08"><span class="authors">Beer, D.</span> <span class="title">Social network(ing) sites...revisiting the story so far: A response to danah boyd & Nicole Ellison</span>. <span class="in">In <a href="http://dx.doi.org/10.1111/j.1083-6101.2008.00408.x" target="_blank">Journal of Computer-Mediated Communication</a></span>, 13 (2): 516-529, 2008.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1111/j.1083-6101.2008.00408.x" target="_blank">doi</a></span> </span></li><li id="ref-Timbl1999"><span class="authors">Berners-Lee, T. and Fischetti, M</span> <span class="title">Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web</span>. <span class="publisher">Harper Collins</span>, New York, New York, USA, 1999.<span class="links"></span></li><li id="ref-timblcloud"><span class="authors">Berners-Lee, T.</span> <span class="title">Socially Aware Cloud Storage</span>. <span class="in">In <a href="https://www.w3.org/DesignIssues/CloudStorage.html" target="_blank">Design Issues</a></span>, 2009.<span class="links"></span></li><li id="ref-weavingtheweb"><span class="authors">Berners-Lee, T.; Fischetti, M. and Foreword By-Dertouzos, M. L</span> <span class="title">Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor</span>. <span class="publisher">HarperInformation</span>, 2000.<span class="links"></span></li><li id="ref-websci"><span class="authors">Berners-Lee, T.; Hall, W.; Hendler, J. A.; O'Hara, K.; Shadbolt, N. and Weitzner, D. J.</span> <span class="title">A Framework for Web Science</span>. <span class="in">In <a href="http://dx.doi.org/10.1561/1800000001" target="_blank">Found. Trends Web Sci.</a></span>, 1 (1): 1-130, 2006.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1561/1800000001" target="_blank">doi</a></span> </span></li><li id="ref-Bernstein2011"><span class="authors">Bernstein, M.; Monroy-Hernandez, A.; Harry, D.; Andre, P.; Panovich, K. and Vargas, G.</span> <span class="title">4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community</span>. <span class="in">In <a href="https://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewFile/2873/4398" target="_blank">Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media</a></span>, pages 50-57, <span class="publisher">Association for the Advancement of Artificial Intelligence</span>, 2011.<span class="links"></span></li><li id="ref-diaspora12"><span class="authors">Bielenberg, A.; Helm, L.; Gentilucci, A.; Stefanescu, D. and Zhang, H.</span> <span class="title">The growth of diaspora-a decentralized online social network in the wild</span>. <span class="in">In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on</span>, pages 13-18, 2012.<span class="links"></span></li><li id="ref-birnholtz2012distance"><span class="authors">Birnholtz, J.; Dixon, G. and Hancock, J.</span> <span class="title">Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization</span>. <span class="in">In Computers in Human Behavior</span>, 28 (3): 1028-1035, 2012.<span class="links"></span></li><li id="ref-infinitereality"><span class="authors">Blascovich, J. and Bailenson, J.</span> <span class="title">Infinite reality: The hidden blueprint of our virtual lives</span>. <span class="publisher">William Morrow</span>, 2011.<span class="links"></span></li><li id="ref-bok1978lying"><span class="authors">Bok, S.</span> <span class="title">Lying: Moral choice in public life</span>. <span class="in">In New York: Pantheon</span>, 1978.<span class="links"></span></li><li id="ref-bok2011lying"><span class="authors">Bok, S.</span> <span class="title">Lying: Moral choice in public and private life</span>. <span class="publisher">Random House LLC</span>, 2011.<span class="links"></span></li><li id="ref-bortoli09"><span class="authors">Bortoli, S.; Palpanas, T. and Bouquet, P.</span> <span class="title">Pulling down the walled garden: Towards a paradigm for decentralized social network management</span>. <span class="in">In Iadis Multi Conference On Computer Science And Information Systems. Web Based Communities</span>, 2009.<span class="links"></span></li><li id="ref-boydsns07"><span class="authors">boyd, d. and Ellison, N.</span> <span class="title">Social network sites: definition, history, and scholarship</span>. <span class="in">In IEEE Engineering Management Review</span>, 3 (38): 16-31, 2010.<span class="links"></span></li><li id="ref-boyd-sns07"><span class="authors">boyd, d.</span> <span class="title">Social network sites: Public, private, or what</span>. <span class="in">In Knowledge Tree</span>, 13 (1): 1-7, 2007.<span class="links"></span></li><li id="ref-boyd06"><span class="authors">boyd, d.</span> <span class="title">Friends, Friendsters, and MySpace Top 8: Writing Community Into Being on Social Network Sites</span>. <span class="in">In First Monday</span>, 11 (12), 2006.<span class="links"></span></li><li id="ref-boyd15"><span class="authors">boyd, d.</span> <span class="title">Social media: A phenomenon to be analyzed</span>. <span class="in">In Social Media+ Society</span>, 1 (1): 2056305115580148, 2015.<span class="links"></span></li><li id="ref-boyd2007youth"><span class="authors">boyd, d.</span> <span class="title">Why youth (heart) social network sites: The role of networked publics in teenage social life</span>. <span class="in">In MacArthur foundation series on digital learning--Youth, identity, and digital media volume</span>: 119-142, 2007.<span class="links"></span></li><li id="ref-boyd2012politics"><span class="authors">boyd, d.</span> <span class="title">The politics of real names</span>. <span class="in">In Communications of the ACM</span>, 55 (8): 29-31, 2012.<span class="links"></span></li><li id="ref-boyd2014s"><span class="authors">boyd, d.</span> <span class="title">It's Complicated: The Social Lives of Networked Teens</span>. <span class="publisher">Yale University Press</span>, 2014.<span class="links"> <span class="url"><a href="https://encrypted.google.com/books?id=s6PNAgAAQBAJ" target="_blank">www</a></span> </span></li><li id="ref-boydfacid"><span class="authors">boyd, d.</span> <span class="title">Faceted id/entity: Managing representation in a digital world</span>. Ph.D. Thesis, <span class="school">Massachusetts Institute of Technology</span>, 2002.<span class="links"></span></li><li id="ref-boydnp10"><span class="authors">boyd, d.</span> <span class="title">Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications</span>. <span class="in">In A Networked Self: Identity, Community, and Culture on Social Network Sites</span>: 39-58, 2010.<span class="links"></span></li><li id="ref-boydpriv12"><span class="authors">boyd, d.</span> <span class="title">Networked privacy</span>. <span class="in">In Surveillance & Society</span>, 10 (3/4): 348, 2012.<span class="links"></span></li><li id="ref-Breslin2005"><span class="authors">Breslin, J. G; Harth, A.; Bojars, U. and Decker, S.</span> <span class="title">Towards Semantically-Interlinked Online Communities</span>. <span class="in">In Proc. European Semantic Web Conference (ESWC 05)</span>, pages 500-514, <span class="publisher">Springer</span>, 2005.<span class="links"></span></li><li id="ref-foaf14"><span class="authors">Brickley, D and Miller, L</span> <span class="title">FOAF Vocabulary Specification 0.99. Namespace Document</span>. Technical Report, <span class="institution"><a href="http://xmlns.com/foaf/spec/" target="_blank"></a></span>, 2014.<span class="links"></span></li><li id="ref-brunswick56"><span class="authors">Brunswik, E</span> <span class="title">Perception and the representative design of psychological experiments. Berkeley and Los Angeles: Univer</span>.<span class="links"></span></li><li id="ref-brunton2011vernacular"><span class="authors">Brunton, F. and Nissenbaum, H.</span> <span class="title">Vernacular resistance to data collection and analysis: A political theory of obfuscation</span>. <span class="in">In First Monday</span>, 16 (5): 1-16, 2011.<span class="links"></span></li><li id="ref-brunton2015obfuscation"><span class="authors">Brunton, F. and Nissenbaum, H.</span> <span class="title">Obfuscation: A User's Guide for Privacy and Protest</span>. <span class="publisher">Mit Press</span>, 2015.<span class="links"></span></li><li id="ref-bu2013sock"><span class="authors">Bu, Z.; Xia, Z. and Wang, J.</span> <span class="title">A sock puppet detection algorithm on virtual spaces</span>. <span class="in">In Knowledge-Based Systems</span>, 37: 366-377, 2013.<span class="links"></span></li><li id="ref-buckels2014trolls"><span class="authors">Buckels, E. E; Trapnell, P. D and Paulhus, D. L</span> <span class="title">Trolls just want to have fun</span>. <span class="in">In Personality and individual Differences</span>, 67: 97-102, 2014.<span class="links"></span></li><li id="ref-bucklin2009click"><span class="authors">Bucklin, R. E and Sismeiro, C.</span> <span class="title">Click here for Internet insight: Advances in clickstream data analysis in marketing</span>. <span class="in">In Journal of Interactive Marketing</span>, 23 (1): 35-48, 2009.<span class="links"></span></li><li id="ref-buller1996interpersonal"><span class="authors">Buller, D. B and Burgoon, J. K</span> <span class="title">Interpersonal deception theory</span>. <span class="in">In Communication theory</span>, 6 (3): 203-242, 1996.<span class="links"></span></li><li id="ref-buller1996testing"><span class="authors">Buller, D. B; Burgoon, J. K; Buslig, A. and Roiger, J.</span> <span class="title">Testing interpersonal deception theory: The language of interpersonal deception</span>. <span class="in">In Communication theory</span>, 6 (3): 268-289, 1996.<span class="links"></span></li><li id="ref-burgess13"><span class="authors">Burgess, J. E. and Vivienne, S.</span> <span class="title">The remediation of the personal photograph and the politics of self-representation in digital storytelling</span>. <span class="in">In <a href="http://eprints.qut.edu.au/62708/" target="_blank">Journal of Material Culture</a></span>, 18 (3): 279-298, 2013.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1177/1359183513492080" target="_blank">doi</a></span> </span></li><li id="ref-Burgoon:2003:TDM:820748.821362"><span class="authors">Burgoon, J. K.; Stoner, G. M.; Bonito, J. A. and Dunbar, N. E.</span> <span class="title">Trust and Deception in Mediated Communication</span>. <span class="in">In <a href="http://dl.acm.org/citation.cfm?id=820748.821362" target="_blank">Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1 - Volume 1</a></span>, pages 44.1-, <span class="publisher">IEEE Computer Society</span>, Washington, DC, USA, HICSS '03 , 2003.<span class="links"></span></li><li id="ref-burgoon1989maintaining"><span class="authors">Burgoon, J. K; Parrott, R.; Le Poire, B. A; Kelley, D. L; Walther, J. B and Perry, D.</span> <span class="title">Maintaining and restoring privacy through communication in different types of relationships</span>. <span class="in">In Journal of Social and Personal Relationships</span>, 6 (2): 131-158, 1989.<span class="links"></span></li><li id="ref-ByrneEvans2013"><span class="authors">Byrne Evans, M.; O'Hara, K.; Tiropanis, T. and Webber, C.</span> <span class="title">Crime Applications and Social Machines: Crowdsourcing Sensitive Data</span>. <span class="in">In WWW 2013 Companion</span>, <span class="publisher">ACM</span>, Rio de Janeiro, 2013.<span class="links"></span></li><li id="ref-irony"><span class="authors">Calvo, R. A and Peters, D.</span> <span class="title">The irony and re-interpretation of our quantified self</span>. <span class="in">In Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration</span>, pages 367-370, 2013.<span class="links"></span></li><li id="ref-camden1984WhiteLies"><span class="authors">Camden, C.; Motley, M. T. and Wilson, A.</span> <span class="title">White lies in interpersonal communication: A taxonomy and preliminary investigation of social motivations</span>. <span class="in">In <a href="http://dx.doi.org/10.1080/10570318409374167" target="_blank">Western Journal of Speech Communication</a></span>, 48 (4): 309-325, 1984.<span class="links"></span></li><li id="ref-ldn"><span class="authors">Capadisli, S. and Guy, A.</span> <span class="title">Linked Data Notifications</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/ldn" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-casale2015cryptocurrencies"><span class="authors">Casale, E. A.</span> <span class="title">Cryptocurrencies and the Anonymous Nature of Transactions on the Internet</span>. Ph.D. Thesis, 2015.<span class="links"></span></li><li id="ref-caspi2006online"><span class="authors">Caspi, A. and Gorsky, P.</span> <span class="title">Online deception: Prevalence, motivation, and emotion</span>. <span class="in">In CyberPsychology & Behavior</span>, 9 (1): 54-59, 2006.<span class="links"></span></li><li id="ref-xfn"><span class="authors">Celik, T. and Meyer, E.</span> <span class="title">XHTML Friends Network (Poster)</span>. <span class="in">In ACM Hypertext</span>, 2004.<span class="links"></span></li><li id="ref-chan2011virtual"><span class="authors">Chan, W. M and Dicianno, B. E</span> <span class="title">Virtual socialization in adults with spina bifida</span>. <span class="in">In PM&R</span>, 3 (3): 219-225, 2011.<span class="links"></span></li><li id="ref-cho2011astroturfing"><span class="authors">Cho, C. H; Martens, M. L; Kim, H. and Rodrigue, M.</span> <span class="title">Astroturfing global warming: It isn't always greener on the other side of the fence</span>. <span class="in">In Journal of Business Ethics</span>, 104 (4): 571-587, 2011.<span class="links"></span></li><li id="ref-taxonomy15"><span class="authors">Chowdhury, S. R.; Roy, A. R.; Shaikh, M. and Daudjee, K.</span> <span class="title">A taxonomy of decentralized online social networks</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/s12083-014-0258-2" target="_blank">Peer-to-Peer Networking and Applications</a></span>, 8 (3): 367-383, 2015.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1007/s12083-014-0258-2" target="_blank">doi</a></span> </span></li><li id="ref-clarkmind"><span class="authors">Clark, A. and Chalmers, D.</span> <span class="title">The extended mind</span>. <span class="in">In analysis</span>: 7-19, 1998.<span class="links"></span></li><li id="ref-conleyintra"><span class="authors">Conley, D.</span> <span class="title">Elsewhere, USA: How we got from the company man, family dinners, and the affluent society to the home office, BlackBerry moms, and economic anxiety</span>. <span class="publisher">Vintage</span>, 2009.<span class="links"></span></li><li id="ref-conquergood1991rethinking"><span class="authors">Conquergood, D.</span> <span class="title">Rethinking ethnography: Towards a critical cultural politics</span>. <span class="in">In Communications monographs</span>, 58 (2): 179-194, 1991.<span class="links"></span></li><li id="ref-Consolvo:2008:ASW:1357054.1357335"><span class="authors">Consolvo, S.; McDonald, D. W.; Toscos, T.; Chen, M. Y.; Froehlich, J.; Harrison, B.; Klasnja, P.; LaMarca, A.; LeGrand, L.; Libby, R.; Smith, I. and Landay, J. A.</span> <span class="title">Activity Sensing in the Wild: A Field Trial of Ubifit Garden</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/1357054.1357335" target="_blank">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</a></span>, pages 1797-1806, <span class="publisher"><a href="http://dx.doi.org/10.1145/1357054.1357335" target="_blank">ACM</a></span>, New York, NY, USA, CHI '08 , 2008.<span class="links"></span></li><li id="ref-counts09"><span class="authors">Counts, S. and Stecher, K. B.</span> <span class="title">Self-Presentation of Personality During Online Profile Creation</span>. <span class="in">In ICWSM</span>, 2009.<span class="links"></span></li><li id="ref-Dalton2013"><span class="authors">Dalton, B.</span> <span class="title">Pseudonymity in Social Machines</span>. <span class="in">In WWW 2013 Companion</span>, <span class="publisher">ACM</span>, Rio de Janeiro, 2013.<span class="links"></span></li><li id="ref-Datta2010DecentralizedOS"><span class="authors">Datta, A.; Buchegger, S.; Vu, L-H.; Strufe, T. and Rzadca, K.</span> <span class="title">Decentralized Online Social Networks</span>. <span class="in">In Handbook of Social Network Technologies</span>, 2010.<span class="links"></span></li><li id="ref-foafship"><span class="authors">Davis, I.</span> <span class="title">RELATIONSHIP: A vocabulary for describing relationships between people</span>. Technical Report, <span class="institution"><a href="http://vocab.org/relationship/" target="_blank">vocab.org</a></span>, 2010.<span class="links"></span></li><li id="ref-daviscontext"><span class="authors">Davis, J. L and Jurgenson, N.</span> <span class="title">Context collapse: theorizing context collusions and collisions</span>. <span class="in">In <a href="http://dx.doi.org/10.1080/1369118X.2014.888458" target="_blank">Information, Communication & Society</a></span>, 17 (4): 476-485, 2014.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1080/1369118X.2014.888458" target="_blank">doi</a></span> </span></li><li id="ref-rs"><span class="authors">de Jong, M. B.</span> <span class="title">remoteStorage</span>.<span class="links"> <span class="url"><a href="https://remotestorage.io/" target="_blank">www</a></span> </span></li><li id="ref-rsietf"><span class="authors">de Jong, M. B.</span> <span class="title">remoteStorage</span>. Technical Report, <span class="institution"><a href="https://datatracker.ietf.org/doc/draft-dejong-remotestorage/" target="_blank">IETF</a></span>, 2016.<span class="links"></span></li><li id="ref-DeRoure2013"><span class="authors">De Roure, D.; Hooper, C.; Meredith-Lobay, M.; Page, K.; Tarte, S.; Cruickshank, D. and De Roure, C.</span> <span class="title">Observing Social Machines Part 1: What to Observe?</span>. <span class="in">In CHI'13</span>, <span class="publisher">ACM</span>, Paris, 2013.<span class="links"></span></li><li id="ref-decew1997pursuit"><span class="authors">DeCew, J. W.</span> <span class="title">In pursuit of privacy: Law, ethics, and the rise of technology</span>. <span class="publisher">Cornell University Press</span>, 1997.<span class="links"></span></li><li id="ref-dennen09"><span class="authors">Dennen, V. P.</span> <span class="title">Constructing academic alter-egos: identity issues in a blog-based community</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/s12394-009-0020-8" target="_blank">Identity in the Information Society</a></span>, 2 (1): 23-38, 2009.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1007/s12394-009-0020-8" target="_blank">doi</a></span> </span></li><li id="ref-depaulo1996lying"><span class="authors">DePaulo, B. M; Kashy, D. A; Kirkendol, S. E; Wyer, M. M and Epstein, J. A</span> <span class="title">Lying in everyday life</span>. <span class="in">In Journal of personality and social psychology</span>, 70 (5): 979, 1996.<span class="links"></span></li><li id="ref-depaulo2003cues"><span class="authors">DePaulo, B. M; Lindsay, J. J; Malone, B. E; Muhlenbruck, L.; Charlton, K. and Cooper, H.</span> <span class="title">Cues to deception</span>. <span class="in">In Psychological bulletin</span>, 129 (1): 74, 2003.<span class="links"></span></li><li id="ref-diaspora"><span class="authors">Diaspora Foundation,</span> <span class="title">Welcome to diaspora*</span>. Technical Report, <span class="institution"><a href="https://diasporafoundation.org" target="_blank"></a></span>, 2017.<span class="links"></span></li><li id="ref-vand09"><span class="authors">Dijck, J. V. and Nieborg, D.</span> <span class="title">Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos</span>. <span class="in">In <a href="https://doi.org/10.1177/1461444809105356" target="_blank">New Media & Society</a></span>, 11 (5): 855-874, 2009.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1177/1461444809105356" target="_blank">doi</a></span> </span></li><li id="ref-vand09b"><span class="authors">Dijck, J. V.</span> <span class="title">Users like you? Theorizing agency in user-generated content</span>. <span class="in">In <a href="https://doi.org/10.1177/0163443708098245" target="_blank">Media, Culture & Society</a></span>, 31 (1): 41-58, 2009.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1177/0163443708098245" target="_blank">doi</a></span> </span></li><li id="ref-DiMicco07"><span class="authors">DiMicco, J. M. and Millen, D. R.</span> <span class="title">Identity Management: Multiple Presentations of Self in Facebook</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/1316624.1316682" target="_blank">Proceedings of the 2007 International ACM Conference on Supporting Group Work</a></span>, pages 383-386, <span class="publisher"><a href="http://dx.doi.org/10.1145/1316624.1316682" target="_blank">ACM</a></span>, New York, NY, USA, GROUP '07 , 2007.<span class="links"></span></li><li id="ref-dingledine2004tor"><span class="authors">Dingledine, R.; Mathewson, N. and Syverson, P.</span> <span class="title">Tor: The second-generation onion router</span>. Technical Report, <span class="institution">DTIC Document</span>, 2004.<span class="links"></span></li><li id="ref-dodge2005codes"><span class="authors">Dodge, M. and Kitchin, R.</span> <span class="title">Codes of life: identification codes and the machine-readable world</span>. <span class="in">In Environment and Planning D: Society and Space</span>, 23: 851-881, 2005.<span class="links"></span></li><li id="ref-noplus"><span class="authors">Doe, J.</span> <span class="title">Change the Youtube comment section back to its original form</span>.<span class="links"> <span class="url"><a href="https://www.change.org/p/google-change-the-youtube-comment-section-back-to-its-original-form" target="_blank">www</a></span> </span></li><li id="ref-donathboyd04"><span class="authors">Donath, J. and Boyd, D.</span> <span class="title">Public displays of connection</span>. <span class="in">In bt technology Journal</span>, 22 (4): 71-82, 2004.<span class="links"></span></li><li id="ref-Donath2002"><span class="authors">Donath, J. S.</span> <span class="title">Identity and deception in the virtual community</span>. <span class="in">In Communities in cyberspace</span>, pages 29-59, <span class="publisher">Routledge</span>, 2002.<span class="links"></span></li><li id="ref-duffy15b"><span class="authors">Duffy, B.</span> <span class="title">Amateur, autonomous, and collaborative: Myths of aspiring female cultural producers in Web 2.0</span>. <span class="in">In Critical Studies in Media Communication</span>, 32 (1): 48-64, 2015.<span class="links"></span></li><li id="ref-duffy15"><span class="authors">Duffy, B. E.</span> <span class="title">The Labor of Visibility: Gendered Self-Expression in the Social Media Imaginary</span>. <span class="in">In <a href="http://spir.aoir.org https://spir.aoir.org/index.php/spir/article/download/1062/718" target="_blank">Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR</a></span>, 2015.<span class="links"></span></li><li id="ref-messaging2015"><span class="authors">Duggan, M.</span> <span class="title">Mobile Messaging and Social Media 2015</span>. <span class="in">In <a href="http://www.pewinternet.org/2015/08/19/mobile-messaging-and-social-media-2015/" target="_blank">Pew Research Center</a></span>, 2015.<span class="links"></span></li><li id="ref-duguay13"><span class="authors">Duguay, S.</span> <span class="title">Facebook as a decontextualized environment: Young people's experiences of navigating LGBTQ identity on a social networking site</span>. <span class="in">In Social Media & Society 2013 International Conference</span>, 2013.<span class="links"></span></li><li id="ref-duguay14"><span class="authors">Duguay, S.</span> <span class="title">"He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site</span>. <span class="in">In new media & society</span>, 18 (6): 891-907, 2016.<span class="links"></span></li><li id="ref-dunne2013speculative"><span class="authors">Dunne, A. and Raby, F.</span> <span class="title">Speculative everything: design, fiction, and social dreaming</span>. <span class="publisher">MIT Press</span>, 2013.<span class="links"></span></li><li id="ref-eckersley2010unique"><span class="authors">Eckersley, P.</span> <span class="title">How unique is your web browser?</span>. <span class="in">In Privacy Enhancing Technologies</span>, pages 1-18, 2010.<span class="links"></span></li><li id="ref-ellison13"><span class="authors">Ellison, N. B and Boyd, D. M</span> <span class="title">Sociality through social network sites</span>. <span class="in">In The Oxford handbook of internet studies</span>, pages 151-172, 2013.<span class="links"></span></li><li id="ref-ellison11fb"><span class="authors">Ellison, N. B.; Steinfield, C. and Lampe, C.</span> <span class="title">Connection strategies: Social capital implications of Facebook-enabled communication practices</span>. <span class="in">In <a href="http://dx.doi.org/10.1177/1461444810385389" target="_blank">New Media & Society</a></span>, 13 (6): 873-892, 2011.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1177/1461444810385389" target="_blank">doi</a></span> </span></li><li id="ref-ellison07"><span class="authors">Ellison, N. B; Steinfield, C. and Lampe, C.</span> <span class="title">The benefits of Facebook “friends:†Social capital and college students’ use of online social network sites</span>. <span class="in">In Journal of Computer-Mediated Communication</span>, 12 (4): 1143-1168, 2007.<span class="links"></span></li><li id="ref-JCC4:JCC420"><span class="authors">Ellison, N.; Heino, R. and Gibbs, J.</span> <span class="title">Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment</span>. <span class="in">In <a href="http://dx.doi.org/10.1111/j.1083-6101.2006.00020.x" target="_blank">Journal of Computer-Mediated Communication</a></span>, 11 (2): 415-441, 2006.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1111/j.1083-6101.2006.00020.x" target="_blank">doi</a></span> </span></li><li id="ref-googpriv"><span class="authors">Esguerra, R.</span> <span class="title">Google CEO Eric Schmidt Dismisses the Importance of Privacy</span>. <span class="in">In <a href="https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy" target="_blank">Electronic Frontier Foundation</a></span>, 2009.<span class="links"></span></li><li id="ref-gosling08"><span class="authors">Evans, D. C; Gosling, S. D and Carroll, A.</span> <span class="title">What elements of an online social networking profile predict target-rater agreement in personality impressions?</span>. <span class="in">In ICWSM</span>, 2008.<span class="links"></span></li><li id="ref-Farnham11"><span class="authors">Farnham, S. D. and Churchill, E. F.</span> <span class="title">Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/1958824.1958880" target="_blank">Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work</a></span>, pages 359-368, <span class="publisher"><a href="http://dx.doi.org/10.1145/1958824.1958880" target="_blank">ACM</a></span>, New York, NY, USA, CSCW '11 , 2011.<span class="links"></span></li><li id="ref-featherman2010reducing"><span class="authors">Featherman, M. S; Miyazaki, A. D and Sprott, D. E</span> <span class="title">Reducing online privacy risk to facilitate e-service adoption: the influence of perceived ease of use and corporate credibility</span>. <span class="in">In Journal of Services Marketing</span>, 24 (3): 219-229, 2010.<span class="links"></span></li><li id="ref-fife2012privacy"><span class="authors">Fife, E. and Orjuela, J.</span> <span class="title">The privacy calculus: Mobile apps and user perceptions of privacy and security</span>. <span class="in">In International Journal of Engineering Business Management</span>, 5 (6): 7, 2012.<span class="links"></span></li><li id="ref-push10"><span class="authors">Fitzpatrick, B., S. B. and M., Atkins.</span> <span class="title">Pubsubhubbub Core</span>. Technical Report, 2010.<span class="links"></span></li><li id="ref-friendica"><span class="authors">Friendica,</span> <span class="title">Friendica Features</span>. Technical Report, <span class="institution"><a href="http://friendi.ca/features/" target="_blank"></a></span>, 2017.<span class="links"></span></li><li id="ref-dssn14"><span class="authors">Frischmuth, P; Ermilov, T; Shekarpour, S and Auer, S</span> <span class="title">An architecture of a distributed semantic social network</span>. <span class="in">In <a href="http://www.semantic-web-journal.net/sites/default/files/swj201_4.pd" target="_blank">Semantic Web</a></span>, 5 (1): 77-95, 2014.<span class="links"></span></li><li id="ref-frosch15"><span class="authors">Frosh, P.</span> <span class="title">The gestural image: The selfie, photography theory, and kinesthetic sociability</span>. <span class="in">In International journal of communication</span>, 9 (0): 22, 2015.<span class="links"></span></li><li id="ref-slate"><span class="authors">Gallagher, R</span> <span class="title">New York Student Selling His Private Data on Kickstarter</span>. <span class="in">In <a href="http://www.slate.com/blogs/future_tense/2013/05/13/federico_zannier_is_selling_his_own_personal_data_on_kickstarter.html" target="_blank">Slate</a></span>, 2013.<span class="links"></span></li><li id="ref-Garcez1997"><span class="authors">Garcez, P. M.</span> <span class="title">Microethnography</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/978-94-011-4535-0_18" target="_blank">Encyclopedia of Language and Education</a></span>, pages 187-196, <span class="publisher"><a href="http://dx.doi.org/10.1007/978-94-011-4535-0_18" target="_blank">Springer Netherlands</a></span>, 1997.<span class="links"></span></li><li id="ref-appgen"><span class="authors">Gardner, H. and Davis, K.</span> <span class="title">The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world</span>. <span class="publisher">Yale University Press</span>, 2013.<span class="links"></span></li><li id="ref-Gaver:2000:AEI:332040.332433"><span class="authors">Gaver, B. and Martin, H.</span> <span class="title">Alternatives: Exploring Information Appliances Through Conceptual Design Proposals</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/332040.332433" target="_blank">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</a></span>, pages 209-216, <span class="publisher"><a href="http://dx.doi.org/10.1145/332040.332433" target="_blank">ACM</a></span>, New York, NY, USA, CHI '00 , 2000.<span class="links"></span></li><li id="ref-gaver1999design"><span class="authors">Gaver, B.; Dunne, T. and Pacenti, E.</span> <span class="title">Design: Cultural Probes</span>. <span class="in">In interactions</span>, 6 (1): 21-29, 1999.<span class="links"></span></li><li id="ref-gaver2003Ambiguity"><span class="authors">Gaver, W.; Beaver, J. and Benford, S.</span> <span class="title">Ambiguity as a resource for design</span>.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1145/642611.642653" target="_blank">doi</a></span> </span></li><li id="ref-websub"><span class="authors">Genestou, J. and Parecki, A.</span> <span class="title">WebSub</span>. Technical Report, <span class="institution">W3C</span>, 2017.<span class="links"></span></li><li id="ref-giddens84"><span class="authors">Giddens, A.</span> <span class="title">The constitution of society: Outline of the theory of structuration</span>. <span class="publisher">Univ of California Press</span>, 1984.<span class="links"></span></li><li id="ref-giddens91"><span class="authors">Giddens, A.</span> <span class="title">Modernity and self-identity: Self and society in the late modern age</span>. <span class="publisher">Stanford University Press</span>, 1991.<span class="links"></span></li><li id="ref-lens01"><span class="authors">Gigerenzer, G. and Kurz, E. M</span> <span class="title">Vicarious functioning reconsidered: A fast and frugal lens model</span>. <span class="in">In The essential Brunswik: Beginnings, explications, applications</span>: 342-347, 2001.<span class="links"></span></li><li id="ref-gilewicz2012digital"><span class="authors">Gilewicz, N. and Allard-Huver, F.</span> <span class="title">Digital Parrhesia as a Counterweight to Astroturfing</span>. <span class="in">In Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication</span>: 215, 2012.<span class="links"></span></li><li id="ref-motivations"><span class="authors">Gimpel, H.; Nissen, M. and Gorlitz, R.</span> <span class="title">Quantifying the quantified self: A study on the motivations of patients to track their own health</span>. <span class="in">In Thirty Fourth International Conference on Information Systems</span>, 2013.<span class="links"></span></li><li id="ref-goffman1959"><span class="authors">Goffman, E.</span> <span class="title">The Presentation of Self in Everyday Life</span>. <span class="publisher">Doubleday</span>, Anchor books , 1959.<span class="links"></span></li><li id="ref-bedrooms02"><span class="authors">Gosling, S. D; Ko, S. J.; Mannarelli, T. and Morris, M. E</span> <span class="title">A room with a cue: personality judgments based on offices and bedrooms</span>. <span class="in">In Journal of personality and social psychology</span>, 82 (3): 379, 2002.<span class="links"></span></li><li id="ref-grice1970logic"><span class="authors">Grice, H. P</span> <span class="title">Logic and conversation</span>. <span class="publisher">na</span>, 1970.<span class="links"></span></li><li id="ref-griffiths2004online"><span class="authors">Griffiths, M. D; Davies, M. NO and Chappell, D.</span> <span class="title">Online computer gaming: a comparison of adolescent and adult gamers</span>. <span class="in">In Journal of adolescence</span>, 27 (1): 87-96, 2004.<span class="links"></span></li><li id="ref-grimes02"><span class="authors">Grimes, D A and Schulz, K F</span> <span class="title">Descriptive studies: what they can and cannot do</span>. <span class="in">In The Lancet</span>, 2002.<span class="links"></span></li><li id="ref-gulcu1996mixing"><span class="authors">Gulcu, C. and Tsudik, G.</span> <span class="title">Mixing E-mail with Babel</span>. <span class="in">In Network and Distributed System Security, 1996., Proceedings of the Symposium on</span>, pages 2-16, 1996.<span class="links"></span></li><li id="ref-guy2014"><span class="authors">Guy, A. and Klein, E.</span> <span class="title">Constructed Identity and Social Machines: A Case Study in Creative Media Production</span>. <span class="in">In WWW 2014 Companion</span>, <span class="publisher">ACM</span>, Seoul, 2014.<span class="links"></span></li><li id="ref-swp"><span class="authors">Guy, A.</span> <span class="title">Social Web Protocols</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/social-web-protocols" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-webobs"><span class="authors">Hall, W.; Tiropanis, T.; Tinati, R.; Booth, P.; Gaskell, P.; Hare, J. and Carr, L.</span> <span class="title">The Southampton University Web Observatory</span>.<span class="links"></span></li><li id="ref-dcent"><span class="authors">Halpin, H. and Bria, F.</span> <span class="title">State of the Art of social networking systems, identity ecosystem and social data stores</span>. <span class="in">In Decentralised Citizens ENgagement Technologies project</span>, 2014.<span class="links"></span></li><li id="ref-Halpin2006"><span class="authors">Halpin, H.</span> <span class="title">Identity, Reference and Meaning on the Web</span>. <span class="in">In WWW2006</span>, Edinburgh, 2006.<span class="links"></span></li><li id="ref-halpinthesis"><span class="authors">Halpin, H.</span> <span class="title">Sense and reference on the web</span>. Ph.D. Thesis, <span class="school">University of Edinburgh</span>, 2009.<span class="links"></span></li><li id="ref-halpin16"><span class="authors">Halpin, H.; Troncoso, C.; Isaakides, M. and Danezis, G.</span> <span class="title">Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments</span>. <span class="in">In Submission</span>, 2016.<span class="links"></span></li><li id="ref-academicqs16"><span class="authors">Hammarfelt, B.; Rijcke, S. de and Rushforth, A. D.</span> <span class="title">Quantified academic selves: the gamification of research through social networking services</span>. <span class="in">In Inf. Res.</span>, 21, 2016.<span class="links"></span></li><li id="ref-oauth1"><span class="authors">Hammer-Lahav, E.</span> <span class="title">The OAuth 1.0 Protocol</span>. Technical Report, <span class="institution"><a href="http://tools.ietf.org/html/rfc5849" target="_blank">IETF</a></span>, 2010.<span class="links"></span></li><li id="ref-ethno"><span class="authors">Hammersley, M. and Atkinson, P.</span> <span class="title">Ethnography: Principles in practice</span>. <span class="publisher">Routledge</span>, 2007.<span class="links"></span></li><li id="ref-hample1980purposes"><span class="authors">Hample, D.</span> <span class="title">Purposes and effects of lying</span>. <span class="in">In Southern Speech Communication Journal</span>, 46 (1): 33-47, 1980.<span class="links"></span></li><li id="ref-hancock2007digital"><span class="authors">Hancock, J. T</span> <span class="title">Digital deception</span>. <span class="in">In Oxford handbook of internet psychology</span>: 289-301, 2007.<span class="links"></span></li><li id="ref-hancock2004Deception"><span class="authors">Hancock, J. T.; Thom-Santelli, J. and Ritchie, T.</span> <span class="title">Deception and Design: The Impact of Communication Technology on Lying Behavior</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/985692.985709" target="_blank">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</a></span>, pages 129-134, <span class="publisher"><a href="http://dx.doi.org/10.1145/985692.985709" target="_blank">ACM</a></span>, New York, NY, USA, CHI '04 , 2004.<span class="links"></span></li><li id="ref-Hancock:2007:TLO:1240624.1240697"><span class="authors">Hancock, J. T.; Toma, C. and Ellison, N.</span> <span class="title">The Truth About Lying in Online Dating Profiles</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/1240624.1240697" target="_blank">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</a></span>, pages 449-452, <span class="publisher"><a href="http://dx.doi.org/10.1145/1240624.1240697" target="_blank">ACM</a></span>, New York, NY, USA, CHI '07 , 2007.<span class="links"></span></li><li id="ref-hancock2004deception"><span class="authors">Hancock, J. T; Thom-Santelli, J. and Ritchie, T.</span> <span class="title">Deception and design: The impact of communication technology on lying behavior</span>. <span class="in">In Proceedings of the SIGCHI conference on Human factors in computing systems</span>, pages 129-134, 2004.<span class="links"></span></li><li id="ref-hancock2009butler"><span class="authors">Hancock, J.; Birnholtz, J.; Bazarova, N.; Guillory, J.; Perlin, J. and Amos, B.</span> <span class="title">Butler lies: awareness, deception and design</span>. <span class="in">In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</span>, pages 517-526, 2009.<span class="links"></span></li><li id="ref-foaftls"><span class="authors">Harbulot, B; Jacobi, I and Jones, M</span> <span class="title">FOAF+SSL: RESTful authentication for the social web</span>. <span class="in">In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009)</span>, 2009.<span class="links"></span></li><li id="ref-oauth2"><span class="authors">Hardt, D.</span> <span class="title">The OAuth 2.0 Authorization Framework</span>. Technical Report, <span class="institution"><a href="http://tools.ietf.org/html/rfc6749" target="_blank">IETF</a></span>, 2012.<span class="links"></span></li><li id="ref-hearn17"><span class="authors">Hearn, A.</span> <span class="title">Verified: Self-presentation, identity management, and selfhood in the age of big data</span>. <span class="in">In <a href="http://dx.doi.org/10.1080/15405702.2016.1269909" target="_blank">Popular Communication</a></span>, 15 (2): 62-77, 2017.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1080/15405702.2016.1269909" target="_blank">doi</a></span> </span></li><li id="ref-manhammer"><span class="authors">Heidegger, M.</span> <span class="title">The question concerning technology</span>. <span class="in">In Technology and values: Essential readings</span>: 99-113, 1954.<span class="links"></span></li><li id="ref-Hendler2010"><span class="authors">Hendler, J. and Berners-Lee, T.</span> <span class="title">From the Semantic Web to social machines: A research challenge for AI on the World Wide Web</span>. <span class="in">In <a href="http://linkinghub.elsevier.com/retrieve/pii/S0004370209001404" target="_blank">Artificial Intelligence</a></span>, 174 (2): 156-161, 2009.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1016/j.artint.2009.11.010" target="_blank">doi</a></span> </span></li><li id="ref-hogan10"><span class="authors">Hogan, B.</span> <span class="title">The presentation of self in the age of social media: Distinguishing performances and exhibitions online</span>. <span class="in">In Bulletin of Science, Technology & Society</span>: 0270467610385893, 2010.<span class="links"></span></li><li id="ref-hogan2010presentation"><span class="authors">Hogan, B.</span> <span class="title">The presentation of self in the age of social media: Distinguishing performances and exhibitions online</span>. <span class="in">In Bulletin of Science, Technology & Society</span>: 0270467610385893, 2010.<span class="links"></span></li><li id="ref-hubz"><span class="authors">Hubzilla,</span> <span class="title">Hubzilla</span>.<span class="links"> <span class="url"><a href="https://project.hubzilla.org/page/hubzilla/hubzilla-project" target="_blank">www</a></span> </span></li><li id="ref-hussain2008gender"><span class="authors">Hussain, Z. and Griffiths, M. D</span> <span class="title">Gender swapping and socializing in cyberspace: An exploratory study</span>. <span class="in">In CyberPsychology & Behavior</span>, 11 (1): 47-53, 2008.<span class="links"></span></li><li id="ref-ods"><span class="authors">Idehen, K. and Erling, O.</span> <span class="title">Linked Data Spaces & Data Portability</span>. <span class="in">In LDOW, Proceedings of WWW</span>, 2008.<span class="links"></span></li><li id="ref-interactive2003harris"><span class="authors">Interactive, H.</span> <span class="title">The Harris Polltextregistered♯ 17: Most People are ‘Privacy Pragmatists' who, while Concerned about Privacy, will Sometimes Trade it off for Other Benefits</span>. <span class="in">In Online: http://www. harrisinteractive. com/harris_poll/index. asp</span>, 2003.<span class="links"></span></li><li id="ref-Jacobi2005"><span class="authors">Jacobi, I.</span> <span class="title">FOAF-Persona: A schema for indicating relationships between personas and real people</span>.<span class="links"> <span class="url"><a href="http://www.pipian.com/schemas/foaf/persona.html" target="_blank">www</a></span> </span></li><li id="ref-guardian"><span class="authors">Johnson, B.</span> <span class="title">Privacy no longer a social norm, says Facebook founder</span>.<span class="links"> <span class="url"><a href="http://www.theguardian.com/technology/2010/jan/11/facebook-privacy" target="_blank">www</a></span> </span></li><li id="ref-zuckpriv"><span class="authors">Johnson, B.</span> <span class="title">Privacy no longer a social norm, says Facebook founder</span>. <span class="in">In <a href="https://www.theguardian.com/technology/2010/jan/11/facebook-privacy" target="_blank">The Guardian</a></span>, 2010.<span class="links"></span></li><li id="ref-webfinger"><span class="authors">Jones, P. S. G., J. M., and J., S.</span> <span class="title">Web Finger</span>. Technical Report, <span class="institution"><a href="https://datatracker.ietf.org/doc/rfc7033/" target="_blank">IETF</a></span>, 2013.<span class="links"></span></li><li id="ref-kaplan10"><span class="authors">Kaplan, A. M and Haenlein, M.</span> <span class="title">Users of the world, unite! The challenges and opportunities of Social Media</span>. <span class="in">In Business Horizons</span>, 53 (1): 59-68, 2010.<span class="links"></span></li><li id="ref-digitalvertigo"><span class="authors">Keen, A.</span> <span class="title">Digital vertigo: how today's online social revolution is dividing, diminishing, and disorienting us</span>. <span class="publisher">Macmillan</span>, 2012.<span class="links"></span></li><li id="ref-tw-api2"><span class="authors">Kessler, S.</span> <span class="title">Twitter Only Gave Meerkat 2 Hours’ Notice Before Cutting Access To The Social Graph</span>. <span class="in">In <a href="https://www.fastcompany.com/3043716/sxsw/twitter-only-gave-meerkat-2-hours-notice-before-cutting-access-to-the-social-graph" target="_blank">Fast Company</a></span>, 2015.<span class="links"></span></li><li id="ref-mf"><span class="authors">Khare, R. and Celik, T.</span> <span class="title">Microformats: a pragmatic path to the semantic web</span>. <span class="in">In Proceedings of the 15th international conference on World Wide Web</span>, pages 865-866, 2006.<span class="links"></span></li><li id="ref-fbeffect"><span class="authors">Kirkpatrick, D.</span> <span class="title">The Facebook effect: The inside story of the company that is connecting the world</span>. <span class="publisher">Simon and Schuster</span>, 2011.<span class="links"></span></li><li id="ref-kleek2015SelfCuration"><span class="authors">Kleek, M. V.; Murray-Rust, D.; Guy, A.; Smith, D. A and Shadbolt, N. R</span> <span class="title">Self Curation , Social Partitioning , Escaping from Prejudice and Harassment : the Many Dimensions of Lying Online</span>. <span class="in">In WebSci2015</span>, 2015.<span class="links"></span></li><li id="ref-vkpds"><span class="authors">Kleek, M. V.; Smith, D. A; Murray-Rust, D.; Guy, A.; Dragan, L. and Shadbolt, N. R</span> <span class="title">Social Personal Data Stores: the Nuclei of Decentralised Social Machines</span>. <span class="in">In <a href="http://dx.doi.org/10.1145/2740908.2743975" target="_blank">WWW 2015 Companion</a></span>, pages 1155-1160, <span class="publisher"><a href="http://dx.doi.org/10.1145/2740908.2743975" target="_blank">ACM</a></span>, 2015.<span class="links"></span></li><li id="ref-rdf"><span class="authors">Klyne, G. and Carroll, J.</span> <span class="title">Resource Description Framework (RDF): Concepts and Abstract Syntax</span>. Technical Report, <span class="institution">W3C</span>, 2004.<span class="links"></span></li><li id="ref-known"><span class="authors">Known,</span> <span class="title">Known beta</span>. Technical Report, <span class="institution"><a href="https://withknown.com" target="_blank"></a></span>, 2017.<span class="links"></span></li><li id="ref-kolivos2012consumer"><span class="authors">Kolivos, E. and Kuperman, A.</span> <span class="title">Consumer law: Web of lies-legal implications of astroturfing</span>. <span class="in">In Keeping Good Companies</span>, 64 (1): 38, 2012.<span class="links"></span></li><li id="ref-krane2002privacy"><span class="authors">Krane, D.; Light, L. and Gravitch, D.</span> <span class="title">Privacy on and off the Internet: What consumers want</span>. <span class="in">In Harris Interactive</span>, 2002.<span class="links"></span></li><li id="ref-kumaraguru2005privacy"><span class="authors">Kumaraguru, P. and Cranor, L. F.</span> <span class="title">Privacy indexes: a survey of Westin's studies</span>.<span class="links"></span></li><li id="ref-food15"><span class="authors">Larsen, J.</span> <span class="title">Contradictions Of The Social Imaginary: Making Sense Of Digital Food Snaps</span>. <span class="in">In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR</span>, 2015.<span class="links"></span></li><li id="ref-lasen15"><span class="authors">Las'en, A.</span> <span class="title">Digital self-portraits, exposure and the modulation of intimacy</span>. <span class="in">In Mobile and Digital Communication: Approaches to Public and Private. Covilha, Portugal: LabCom books. Video of the conference available at URL www. youtube. com/watch</span>, 2015.<span class="links"></span></li><li id="ref-Lawrence"><span class="authors">Lawrence, K F.</span> <span class="title">Amateur Fiction Online - The Web of Community Trust A Case Study in Community Focused Design for the Semantic Web</span>. <span class="in">In 1st AKT Doctoral Colloquium</span>, Milton Keynes, 2005.<span class="links"></span></li><li id="ref-lenhart2008teens"><span class="authors">Lenhart, A.; Kahne, J.; Middaugh, E.; Macgill, A. R.; Evans, C. and Vitak, J.</span> <span class="title">Teens, Video Games, and Civics: Teens' Gaming Experiences Are Diverse and Include Significant Social Interaction and Civic Engagement</span>. <span class="in">In Pew Internet & American Life Project</span>, 2008.<span class="links"></span></li><li id="ref-lenhart2010social"><span class="authors">Lenhart, A.; Purcell, K.; Smith, A. and Zickuhr, K.</span> <span class="title">Social Media & Mobile Internet Use among Teens and Young Adults. Millennials</span>. <span class="in">In Pew Internet & American Life Project</span>, 2010.<span class="links"></span></li><li id="ref-reflect"><span class="authors">Li, I.; Dey, A. K and Forlizzi, J.</span> <span class="title">Understanding my data, myself: supporting self-reflection with ubicomp technologies</span>. <span class="in">In Proceedings of the 13th international conference on Ubiquitous computing</span>, pages 405-414, 2011.<span class="links"></span></li><li id="ref-lindskold1983categories"><span class="authors">Lindskold, S. and Walters, P. S</span> <span class="title">Categories for acceptability of lies</span>. <span class="in">In The Journal of Social Psychology</span>, 120 (1): 129-136, 1983.<span class="links"></span></li><li id="ref-lingel2015face"><span class="authors">Lingel, J. and Golub, A.</span> <span class="title">In Face on Facebook: Brooklyn's Drag Community and Sociotechnical Practices of Online Communication</span>. <span class="in">In Journal of Computer-Mediated Communication</span>, 2015.<span class="links"></span></li><li id="ref-litt12"><span class="authors">Litt, E.</span> <span class="title">Knock, Knock. Who's There? The Imagined Audience</span>. <span class="in">In <a href="http://dx.doi.org/10.1080/08838151.2012.705195" target="_blank">Journal of Broadcasting & Electronic Media</a></span>, 56 (3): 330-345, 2012.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1080/08838151.2012.705195" target="_blank">doi</a></span> </span></li><li id="ref-livingstone2008taking"><span class="authors">Livingstone, S.</span> <span class="title">Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression</span>. <span class="in">In New media & society</span>, 10 (3): 393-411, 2008.<span class="links"></span></li><li id="ref-technoself"><span class="authors">Luppicini, R.</span> <span class="title">Handbook of Research on Technoself: Identity in a Technological Society: Identity in a Technological Society</span>. <span class="publisher">IGI Global</span>, 2012.<span class="links"></span></li><li id="ref-Luther2007a"><span class="authors">Luther, K. and Diakopoulos, N.</span> <span class="title">Distributed Creativity</span>. <span class="in">In Supporting creative acts beyond dissemination. Creativity & Cognition</span>, Washington DC, 2007.<span class="links"></span></li><li id="ref-Luther2010"><span class="authors">Luther, K.</span> <span class="title">Edits & Credits: Exploring Integration and Attribution in Online Creative Collaboration</span>. <span class="in">In CHI</span>, pages 2823-2832, 2010.<span class="links"></span></li><li id="ref-zot"><span class="authors">Macgirvin, M</span> <span class="title">Zot! social communications protocol</span>. Technical Report, <span class="institution"><a href="http://web.archive.org/web/20110927010548/http://dfrn.org:80/zot-protocol.txt" target="_blank"></a></span>, 2011.<span class="links"></span></li><li id="ref-madden2013teens"><span class="authors">Madden, M.; Lenhart, A.; Cortesi, S.; Gasser, U.; Duggan, M.; Smith, A. and Beaton, M.</span> <span class="title">Teens, social media, and privacy</span>. <span class="in">In Pew Research Center</span>, 2013.<span class="links"></span></li><li id="ref-mahmood2012your"><span class="authors">Mahmood, S. and Desmedt, Y.</span> <span class="title">Your Facebook deactivated friend or a cloaked spy</span>. <span class="in">In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on</span>, pages 367-373, 2012.<span class="links"></span></li><li id="ref-solid"><span class="authors">Mansour, E.; Sambra, A. V.; Hawke, S.; Zereba, M.; Capadisli, S.; Ghanem, A.; Aboulnaga, A. and Berners-Lee, T.</span> <span class="title">A demonstration of the solid platform for social web applications</span>. <span class="in">In Proceedings of the 25th International Conference Companion on World Wide Web</span>, pages 223-226, 2016.<span class="links"></span></li><li id="ref-markus06"><span class="authors">Marcus, B.; Machilek, F. and Sch"utz, A.</span> <span class="title">Personality in cyberspace: personal Web sites as media for personality expressions and impressions</span>. <span class="in">In Journal of personality and social psychology</span>, 90 (6): 1014, 2006.<span class="links"></span></li><li id="ref-marwickdrama14"><span class="authors">Marwick, A. and Boyd, D.</span> <span class="title">‘It's just drama’: teen perspectives on conflict and aggression in a networked era</span>. <span class="in">In Journal of Youth Studies</span>, 17 (9): 1187-1204, 2014.<span class="links"></span></li><li id="ref-boydpriv11"><span class="authors">Marwick, A. E and boyd, d.</span> <span class="title">Social privacy in networked publics: Teens’ attitudes, practices, and strategies</span>. <span class="in">In A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society</span>, 2011.<span class="links"></span></li><li id="ref-Marwick2010"><span class="authors">Marwick, a. E. and boyd, d.</span> <span class="title">I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience</span>. <span class="in">In New Media & Society</span>, 13 (1): 114-133, 2010.<span class="links"></span></li><li id="ref-w3c-maturity"><span class="authors">McCathie Nevile, C.</span> <span class="title">World Wide Web Consortium Process Document: Maturity Levels</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/2015/Process-20150901/#maturity-levels" target="_blank">W3C</a></span>, 2015.<span class="links"></span></li><li id="ref-mccornack1009InformationManipulation"><span class="authors">McCornack, S. a.</span> <span class="title">Information manipulation theory</span>. <span class="in">In <a href="http://dx.doi.org/10.1080/03637759209376245" target="_blank">Communication Monographs</a></span>, 59 (1): 1-16, 1992.<span class="links"></span></li><li id="ref-mcluhan"><span class="authors">McLuhan, M.</span> <span class="title">Understanding media: The extensions of man</span>. <span class="publisher">MIT press</span>, 1994.<span class="links"></span></li><li id="ref-wg-charter"><span class="authors">Mercier, C.</span> <span class="title">How to Create a Working Group or Interest Group</span>. <span class="in">In <a href="https://www.w3.org/Guide/Charter#review-eval" target="_blank">W3C Guidebook</a></span>, 2017.<span class="links"></span></li><li id="ref-hotmess2015selfies"><span class="authors">Mess, L. M. H.</span> <span class="title">Selfies and Side-Eye: Drag Queens Take on Facebook</span>. <span class="in">In Studies in Gender and Sexuality</span>, 16 (2): 144-146, 2015.<span class="links"></span></li><li id="ref-metzger2004privacy"><span class="authors">Metzger, M. J</span> <span class="title">Privacy, trust, and disclosure: Exploring barriers to electronic commerce</span>. <span class="in">In Journal of Computer-Mediated Communication</span>, 9 (4): 00-00, 2004.<span class="links"></span></li><li id="ref-88-projects"><span class="authors">Miemis, V.</span> <span class="title">88+ Projects & Standards for Data Ownership, Identity, & A Federated Social Web</span>.<span class="links"> <span class="url"><a href="https://emergentbydesign.com/2011/04/11/88-projects-standards-for-data-ownership-identity-a-federated-social-web/" target="_blank">www</a></span> </span></li><li id="ref-ldp"><span class="authors">Mihindukulasooriya, N. and Menday, R.</span> <span class="title">Linked Data Platform 1.0 Primer</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/ldp-primer/" target="_blank">W3C</a></span>, 2015.<span class="links"></span></li><li id="ref-miles94"><span class="authors">Miles, M. B and Huberman, A M.</span> <span class="title">Qualitative data analysis: An expanded sourcebook</span>. <span class="publisher">Sage</span>, 1994.<span class="links"></span></li><li id="ref-Monroy-Hernandez2011"><span class="authors">Monroy-Hernandez, A.; Mako Hill, B.; Gonzalez-Rivero, J. and boyd, d.</span> <span class="title">Computers can't give credit: How automatic attribution falls short in an online remixing community</span>. <span class="in">In CHI</span>, <span class="publisher">ACM</span>, Vancouver, 2011.<span class="links"></span></li><li id="ref-darkside"><span class="authors">Moore, P and Piwek, L</span> <span class="title">Unintended Consequences: The Dark Sides of Quantifying Selves</span>.<span class="links"></span></li><li id="ref-moore16"><span class="authors">Moore, P. and Robinson, A.</span> <span class="title">The quantified self: What counts in the neoliberal workplace</span>. <span class="in">In new media & society</span>, 18 (11): 2774-2792, 2016.<span class="links"></span></li><li id="ref-mydex"><span class="authors">Mydex,</span> <span class="title">The case for personal information empowerment : The rise of the personal data store</span>.<span class="links"></span></li><li id="ref-mylonas2013delegate"><span class="authors">Mylonas, A.; Kastania, A. and Gritzalis, D.</span> <span class="title">Delegate the smartphone user? Security awareness in smartphone platforms</span>. <span class="in">In Computers & Security</span>, 34: 47-66, 2013.<span class="links"></span></li><li id="ref-eleven"><span class="authors">Nafus, D. and Sherman, J.</span> <span class="title">Big data, big questions| this one does not go up to 11: the quantified self movement as an alternative big data practice</span>. <span class="in">In International journal of communication</span>, 8: 11, 2014.<span class="links"></span></li><li id="ref-naquin2010FinerLying"><span class="authors">Naquin, C. E; Kurtzberg, T. R and Belkin, L. Y</span> <span class="title">The finer points of lying online: e-mail versus pen and paper</span>. <span class="in">In <a href="http://dx.doi.org/10.1037/a0018627" target="_blank">The Journal of applied psychology</a></span>, 95 (2): 387-394, 2010.<span class="links"></span></li><li id="ref-crit12"><span class="authors">Narayanan, A., T. V., B. S. and Nissenbaum, H.</span> <span class="title">A critical look at decentralized personal data architectures</span>. <span class="in">In arXiv.org</span>, 2012.<span class="links"></span></li><li id="ref-nemer15"><span class="authors">Nemer, D. and Freeman, G.</span> <span class="title">Empowering the marginalized: Rethinking selfies in the slums of Brazil</span>. <span class="in">In International Journal of Communication</span>, 9 (0): 1832-1847, 2015.<span class="links"></span></li><li id="ref-nextc"><span class="authors">NextCloud,</span> <span class="title">NextCloud</span>.<span class="links"> <span class="url"><a href="https://nextcloud.com/" target="_blank">www</a></span> </span></li><li id="ref-nissenbaum2004privacy"><span class="authors">Nissenbaum, H.</span> <span class="title">Privacy as contextual integrity</span>. <span class="in">In Washington law review</span>, 79 (1), 2004.<span class="links"></span></li><li id="ref-nissenbaum2009privacy"><span class="authors">Nissenbaum, H.</span> <span class="title">Privacy in context: Technology, policy, and the integrity of social life</span>. <span class="publisher">Stanford University Press</span>, 2009.<span class="links"></span></li><li id="ref-noland06"><span class="authors">Noland, C. M</span> <span class="title">Auto-photography as research practice: Identity and self-esteem research</span>. <span class="in">In Journal of research Practice</span>, 2 (1): 1, 2006.<span class="links"></span></li><li id="ref-atom"><span class="authors">Nottingham, M and Sayre, R</span> <span class="title">The Atom Syndication Format</span>. Technical Report, <span class="institution"><a href="https://tools.ietf.org/html/rfc4287" target="_blank">IETF</a></span>, 2005.<span class="links"></span></li><li id="ref-palfrey2013born"><span class="authors">Palfrey, J. and Gasser, U.</span> <span class="title">Born digital: Understanding the first generation of digital natives</span>. <span class="publisher">Basic Books</span>, 2013.<span class="links"></span></li><li id="ref-salmon"><span class="authors">Panzer, J.</span> <span class="title">The Salmon Protocol</span>. Technical Report, 2010.<span class="links"></span></li><li id="ref-papa04blog"><span class="authors">Papacharissi, Z.</span> <span class="title">The Blogger Revolution? Audiences as Media Producers</span>. , 2004.<span class="links"></span></li><li id="ref-papacharissi02"><span class="authors">Papacharissi, Z.</span> <span class="title">The presentation of self in virtual life: Characteristics of personal home pages</span>. <span class="in">In Journalism & Mass Communication Quarterly</span>, 79 (3): 643-660, 2002.<span class="links"></span></li><li id="ref-papatwit12"><span class="authors">Papacharissi, Z.</span> <span class="title">Without You, I'm Nothing: Performances of the Self on Twitter</span>. <span class="in">In <a href="http://ijoc.org/index.php/ijoc/article/view/1484" target="_blank">International Journal of Communication</a></span>, 6 (0), 2012.<span class="links"></span></li><li id="ref-mp"><span class="authors">Parecki, A.</span> <span class="title">Micropub</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/microupb" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-Passant2010"><span class="authors">Passant, A.; Bojars, U.; Breslin, J. G. and Decker, S.</span> <span class="title">The SIOC Project: Semantically-Interlinked Online Communities, from Humans to Machines</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/978-3-642-14962-7_12" target="_blank">Coordination, Organizations, Institutions and Norms in Agent Systems V: COIN 2009 International Workshops. COIN@AAMAS 2009, Budapest, Hungary, May 2009, COIN@IJCAI 2009, Pasadena, USA, July 2009, COIN@MALLOW 2009, Turin, Italy, September 2009. Revised Selected Papers</a></span>, pages 179-194, <span class="publisher"><a href="http://dx.doi.org/10.1007/978-3-642-14962-7_12" target="_blank">Springer Berlin Heidelberg</a></span>, Berlin, Heidelberg, 2010.<span class="links"></span></li><li id="ref-passant2010rethinking"><span class="authors">Passant, A.; Breslin, J. G and Decker, S.</span> <span class="title">Rethinking microblogging: open, distributed, semantic</span>. <span class="in">In International Conference on Web Engineering</span>, pages 263-277, 2010.<span class="links"></span></li><li id="ref-survey14"><span class="authors">Paul, T.; Famulari, A. and Strufe, T.</span> <span class="title">A survey on decentralized online social networks</span>. <span class="in">In Computer Networks</span>, 75: 437-452, 2014.<span class="links"></span></li><li id="ref-fb-api2"><span class="authors">Perez, S.</span> <span class="title">Facebook Wins "Worst API" in Developer Survey</span>. <span class="in">In <a href="https://techcrunch.com/2011/08/11/facebook-wins-worst-api-in-developer-survey/" target="_blank">Techcrunch</a></span>, 2011.<span class="links"></span></li><li id="ref-vcard"><span class="authors">Perreault, S. and Resnick, P.</span> <span class="title">vCard Format Specification</span>. Technical Report, <span class="institution"><a href="http://tools.ietf.org/html/rfc6350" target="_blank">IETF</a></span>, 2011.<span class="links"></span></li><li id="ref-potts2014love"><span class="authors">Potts, A.</span> <span class="title">`LOVE YOU GUYS (NO HOMO)' How gamers and fans play with sexuality, gender, and Minecraft on YouTube</span>. <span class="in">In Critical Discourse Studies</span>: 1-24, 2014.<span class="links"></span></li><li id="ref-ostatus"><span class="authors">Prodromou, E, V. B, W. J and Z, C.</span> <span class="title">OStatus</span>. Technical Report, <span class="institution"><a href="http://ostatus.org/specification" target="_blank"></a></span>, 2010.<span class="links"></span></li><li id="ref-pump"><span class="authors">Prodromou, E.</span> <span class="title">pump.io API</span>. Technical Report, <span class="institution"><a href="https://github.com/pump-io/pump.io/blob/master/API.md" target="_blank">e14n</a></span>, 2017.<span class="links"></span></li><li id="ref-quinn15"><span class="authors">Quinn, K</span> <span class="title">The Navigation of Boundaries in Online Social Spaces</span>. <span class="in">In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR</span>, 2015.<span class="links"></span></li><li id="ref-Rains2007"><span class="authors">Rains, S.</span> <span class="title">The impact of anonymity on perceptions of source credibility and influence in computer-mediated group communication: A test of two competing hypotheses</span>. <span class="in">In Communication Research</span>, 34 (1): 100-125, 2007.<span class="links"></span></li><li id="ref-raynes2010aliases"><span class="authors">Raynes-Goldie, K.</span> <span class="title">Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook</span>. <span class="in">In First Monday</span>, 15 (1), 2010.<span class="links"></span></li><li id="ref-http14"><span class="authors">Rees, J. A</span> <span class="title">Guide to ISSUE-57 (httpRange-14) Document Suite from Jonathan A Rees on 2012-01-21(www-tag@ w3. org from January 2012)</span>.<span class="links"></span></li><li id="ref-Ren2012"><span class="authors">Ren, Y.; Kraut, R.; Kiesler, S. and Resnick, P.</span> <span class="title">Encouraging commitment in online communities</span>. <span class="in">In Building Successful Online Communities: Evidence-Based Social Design</span>, pages 77-125, <span class="publisher">MIT Press</span>, 2012.<span class="links"></span></li><li id="ref-roig2005lying"><span class="authors">Roig, M. and Caso, M.</span> <span class="title">Lying and cheating: Fraudulent excuse making, cheating, and plagiarism</span>. <span class="in">In The Journal of Psychology</span>, 139 (6): 485-494, 2005.<span class="links"></span></li><li id="ref-Rousseau17"><span class="authors">Rousseau, A.; Eggermont, S. and Frison, E.</span> <span class="title">The reciprocal and indirect relationships between passive Facebook use, comparison on Facebook, and adolescents' body dissatisfaction</span>. <span class="in">In <a href="http://www.sciencedirect.com/science/article/pii/S0747563217302157" target="_blank">Computers in Human Behavior</a></span>, 73: 336-344, 2017.<span class="links"> <span class="doi"><a href="http://dx.doi.org/https://doi.org/10.1016/j.chb.2017.03.056" target="_blank">doi</a></span> </span></li><li id="ref-intlblog"><span class="authors">Russell, A. and Echchaibi, N.</span> <span class="title">International blogging: Identity, politics, and networked publics</span>. <span class="publisher">Peter Lang</span>, 2009.<span class="links"></span></li><li id="ref-ahrc07"><span class="authors">Rust, C.; Mottram, J. and Till, J</span> <span class="title">AHRC Research Review Practice-Led Research in Art</span>. <span class="in">In Design and Architecture: Arts and Humanities Research Council</span>, 2007.<span class="links"></span></li><li id="ref-wap"><span class="authors">Sanderson, R</span> <span class="title">Web Annotation Protocol</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/annotation-protocol" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-oav"><span class="authors">Sanderson, R.; Ciccarese, P. and Young, B.</span> <span class="title">Web Annotation Vocabulary</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/annotation-vocab" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-salford"><span class="authors">Sanford, J.</span> <span class="title">The Truth about Lying: Course explores history of deception</span>.<span class="links"> <span class="url"><a href="http://news.stanford.edu/news/2003/april23/deception-423.html" target="_blank">www</a></span> </span></li><li id="ref-scarlata2001responder"><span class="authors">Scarlata, V.; Levine, B. N. and Shields, C.</span> <span class="title">Responder anonymity and anonymous peer-to-peer file sharing</span>. <span class="in">In Network Protocols, 2001. Ninth International Conference on</span>, pages 272-280, 2001.<span class="links"></span></li><li id="ref-schaar2010privacy"><span class="authors">Schaar, P.</span> <span class="title">Privacy by design</span>. <span class="in">In Identity in the Information Society</span>, 3 (2): 267-274, 2010.<span class="links"></span></li><li id="ref-blogdesign"><span class="authors">Scheidt, L. A. and Wright, E.</span> <span class="title">Common visual design elements of weblogs</span>. <span class="in">In <a href="http://blog. lib. umn. edu/blogosphere/common_visual. html" target="_blank">Into the blogosphere: Rhetoric, community, and culture of weblogs.</a></span>, 2004.<span class="links"></span></li><li id="ref-inreallife"><span class="authors">Schulman, N.</span> <span class="title">In Real Life: Love, Lies & Identity in the Digital Age</span>. <span class="publisher">Hachette UK</span>, 2014.<span class="links"></span></li><li id="ref-senft15"><span class="authors">Senft, T. M and Baym, N. K</span> <span class="title">What does the selfie say? Investigating a global phenomenon introduction</span>. <span class="in">In International Journal of Communication</span>, 9: 1588–1606, 2015.<span class="links"></span></li><li id="ref-prpl10"><span class="authors">Seong, S-W.; Seo, J.; Nasielski, M.; Sengupta, D.; Hangal, S.; Teh, S. K.; Chu, R.; Dodson, B. and Lam, M. S.</span> <span class="title">PrPl: a decentralized social networking infrastructure</span>. <span class="in">In <a href="https://mobisocial.stanford.edu/papers/mcs10.pdf" target="_blank">Proceedings of the 1st International Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond</a></span>, 2010.<span class="links"></span></li><li id="ref-wm"><span class="authors">Shetty, S. and Parecki, A.</span> <span class="title">Webmention</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/webmention" target="_blank">W3C</a></span>, 2017.<span class="links"></span></li><li id="ref-desc"><span class="authors">Shields, P. and Rangarajan, N.</span> <span class="title">A Playbook for Research Methods: Integrating Conceptual Frameworks and Project Management</span>. <span class="publisher">Stillwater, OK: New Forums Press</span>, 2013.<span class="links"></span></li><li id="ref-singh15"><span class="authors">singh, s</span> <span class="title">Subverting Social Media</span>. <span class="in">In Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. Phoenix, AZ, USA: AoIR</span>, 2015.<span class="links"></span></li><li id="ref-portcont08"><span class="authors">Smarr, J</span> <span class="title">Portable Contacts 1.0</span>. Technical Report, 2008.<span class="links"></span></li><li id="ref-Smart2014"><span class="authors">Smart, P. R; Simperl, E. and Shadbolt, N.</span> <span class="title">A Taxonomic Framework for Social Machines</span>. <span class="in">In <a href="http://eprints.soton.ac.uk/362359/" target="_blank">Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society</a></span>, 2014.<span class="links"></span></li><li id="ref-snyder74"><span class="authors">Snyder, M.</span> <span class="title">Self-monitoring of expressive behavior</span>. <span class="in">In Journal of personality and social psychology</span>, 30 (4): 526, 1974.<span class="links"></span></li><li id="ref-wired"><span class="authors">Solon, O</span> <span class="title">'Data soul' of Shawn Buckles sells for £288</span>. <span class="in">In <a href="http://www.wired.co.uk/article/shawn-buckles-is-worth-350-euros" target="_blank">Wired</a></span>, 2014.<span class="links"></span></li><li id="ref-solorio2013case"><span class="authors">Solorio, T.; Hasan, R. and Mizan, M.</span> <span class="title">A case study of sockpuppet detection in wikipedia</span>. <span class="in">In Workshop on Language Analysis in Social Media (LASM) at NAACL HLT</span>, pages 59-68, 2013.<span class="links"></span></li><li id="ref-jsonld"><span class="authors">Sporny, M.; Kellogg, G. and Lanthaler, M.</span> <span class="title">JSON-LD 1.0: A JSON-based Serialization for Linked Data</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/TR/json-ld" target="_blank">W3C</a></span>, 2014.<span class="links"></span></li><li id="ref-stendal12"><span class="authors">Stendal, K.</span> <span class="title">How do People with Disability Use and Experience Virtual Worlds and ICT: A Literature Review</span>. <span class="in">In <a href="https://journals.tdl.org/jvwr/index.php/jvwr/article/view/6173" target="_blank">Journal For Virtual Worlds Research</a></span>, 5 (1), 2012.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.4101/jvwr.v5i1.6173" target="_blank">doi</a></span> </span></li><li id="ref-wac"><span class="authors">Story, H. and thers,</span> <span class="title">WebAccessControl</span>. Technical Report, <span class="institution"><a href="https://www.w3.org/wiki/WebAccessControl" target="_blank">W3C Wiki</a></span>, 2016.<span class="links"></span></li><li id="ref-friending"><span class="authors">Story, H; Sambra, A and Tramp, S</span> <span class="title">Friending On The Social Web</span>. <span class="in">In Proceedings of Federated Social Web Europe</span>, <span class="publisher">Federated Social Web Europe</span>, 2011.<span class="links"></span></li><li id="ref-strauss1990basics"><span class="authors">Strauss, A. and Corbin, J. M</span> <span class="title">Basics of qualitative research: Grounded theory procedures and techniques</span>. <span class="publisher">Sage Publications, Inc</span>, 1990.<span class="links"></span></li><li id="ref-Strohmaier2013"><span class="authors">Strohmaier, M.</span> <span class="title">A Few Thoughts on Engineering Social Machines</span>. <span class="in">In WWW 2013 Companion</span>, <span class="publisher">ACM</span>, Rio de Janeiro, 2013.<span class="links"></span></li><li id="ref-bigdata"><span class="authors">Swan, M.</span> <span class="title">The quantified self: Fundamental disruption in big data science and biological discovery</span>. <span class="in">In Big Data</span>, 1 (2): 85-99, 2013.<span class="links"></span></li><li id="ref-health2050"><span class="authors">Swan, M.</span> <span class="title">Health 2050: The realization of personalized medicine through crowdsourcing, the quantified self, and the participatory biocitizen</span>. <span class="in">In Journal of personalized medicine</span>, 2 (3): 93-118, 2012.<span class="links"></span></li><li id="ref-swan12"><span class="authors">Swan, M.</span> <span class="title">Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0</span>. <span class="in">In Journal of Sensor and Actuator Networks</span>, 1 (3): 217-253, 2012.<span class="links"></span></li><li id="ref-tan07"><span class="authors">Tan, D.; Berry, E.; Czerwinski, M.; Bell, G.; Gemmell, J.; Hodges, S. and Wood, K.</span> <span class="title">Save everything: supporting human memory with a personal digital lifetime store</span>. <span class="in">In Personal information management</span>, 90, 2007.<span class="links"></span></li><li id="ref-Tang2011"><span class="authors">Tang, J. C.; Cebrian, M.; Giacobe, N. A.; Kim, H-W.; Kim, T. and Wickert, D. ".</span> <span class="title">Reflecting on the DARPA Red Balloon Challenge</span>. <span class="in">In Commun. ACM</span>, 54 (4): 78-85, 2011.<span class="links"></span></li><li id="ref-tene2012track"><span class="authors">Tene, O. and Polenetsky, J.</span> <span class="title">To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising</span>. <span class="in">In Minn. JL Sci. & Tech.</span>, 13: 281, 2012.<span class="links"></span></li><li id="ref-tent"><span class="authors">tent.io,</span> <span class="title">Tent.io Protocol Introduction</span>. Technical Report, <span class="institution"><a href="https://tent.io/docs/" target="_blank"></a></span>, 2015.<span class="links"></span></li><li id="ref-youth"><span class="authors">Thomas, A.</span> <span class="title">Youth online: Identity and literacy in the digital age</span>. <span class="publisher">Peter Lang</span>, 2007.<span class="links"></span></li><li id="ref-bunnies17"><span class="authors">Tiidenberg, K. and Whelan, A.</span> <span class="title">Sick bunnies and pocket dumps:“Not-selfies†and the genre of self-representation</span>. <span class="in">In Popular Communication</span>, 15 (2): 141-153, 2017.<span class="links"></span></li><li id="ref-labour"><span class="authors">Till, C.</span> <span class="title">Exercise as labour: Quantified self and the transformation of exercise into labour</span>. <span class="in">In Societies</span>, 4 (3): 446-462, 2014.<span class="links"></span></li><li id="ref-websciobs"><span class="authors">Tiropanis, T.; Hall, W.; Shadbolt, N.; De Roure, D.; Contractor, N. and Hendler, J.</span> <span class="title">The web science observatory</span>. <span class="in">In IEEE Intelligent Systems</span>, 28 (2): 100-104, 2013.<span class="links"></span></li><li id="ref-toma10"><span class="authors">Toma, C. L</span> <span class="title">Affirming the self through online profiles: beneficial effects of social networking sites</span>. <span class="in">In Proceedings of the SIGCHI conference on human factors in computing systems</span>, pages 1749-1752, 2010.<span class="links"></span></li><li id="ref-alist05"><span class="authors">Trammell, K. D and Keshelashvili, A.</span> <span class="title">Examining the new influencers: A self-presentation study of A-list blogs</span>. <span class="in">In Journalism & Mass Communication Quarterly</span>, 82 (4): 968-982, 2005.<span class="links"></span></li><li id="ref-sp"><span class="authors">Tramp, S; Frischmuth, P; Ermilov, T and Auer, S</span> <span class="title">Weaving a social data web with semantic pingback</span>. <span class="in">In Knowledge Engineering and Management by the Masses --- 17th International Conference, EKAW 2010</span>, pages 135-149, <span class="publisher">Springer</span>, 2010.<span class="links"></span></li><li id="ref-turkle2011life"><span class="authors">Turkle, S.</span> <span class="title">Life on the Screen</span>. <span class="publisher">Simon and Schuster</span>, 2011.<span class="links"></span></li><li id="ref-Turkle2015"><span class="authors">Turkle, S.</span> <span class="title">Reclaiming Conversation: The Power of Talk in a Digital Age</span>. <span class="publisher">Penguin Publishing Group</span>, 2015.<span class="links"> <span class="url"><a href="https://books.google.com.my/books?id=POpJBgAAQBAJ" target="_blank">www</a></span> </span></li><li id="ref-turner1975information"><span class="authors">Turner, R. E; Edgley, C. and Olmstead, G.</span> <span class="title">Information control in conversations: Honesty is not always the best policy</span>. <span class="in">In Kansas Journal of Sociology</span>: 69-89, 1975.<span class="links"></span></li><li id="ref-tyler2003can"><span class="authors">Tyler, J. R and Tang, J. C</span> <span class="title">When can I expect an email response? A study of rhythms in email usage</span>. <span class="in">In ECSCW 2003</span>, pages 239-258, 2003.<span class="links"></span></li><li id="ref-unhosted"><span class="authors">Unhosted,</span> <span class="title">unhosted.org</span>.<span class="links"></span></li><li id="ref-wiki:disinformation"><span class="authors">Unknown,</span> <span class="title">Disinformation - Wikipedia, The Free Encyclopedia</span>. , [Online; accessed 15-Sept-2015].<span class="links"> <span class="url"><a href="https://en.wikipedia.org/wiki/Disinformation" target="_blank">www</a></span> </span></li><li id="ref-do-ods"><span class="authors">Uyi Idehen, K.</span> <span class="title">A Read-Write Web without Storage Silos</span>.<span class="links"> <span class="url"><a href="https://medium.com/openlink-software-blog/read-write-web-without-storage-silos-demo-dokie-li-and-medium-quick-draft-b79cc3ae4246" target="_blank">www</a></span> </span></li><li id="ref-sleep"><span class="authors">Van den Bulck, J.</span> <span class="title">Sleep apps and the quantified self: blessing or curse?</span>. <span class="in">In Journal of sleep research</span>, 24 (2): 121-123, 2015.<span class="links"></span></li><li id="ref-van2008theorizing"><span class="authors">Van Doorn, N. and Van Zoonen, L.</span> <span class="title">Theorizing gender and the Internet: Past, present, and future</span>. <span class="in">In The Routledge Handbook of Internet Politics</span>: 261-74, 2008.<span class="links"></span></li><li id="ref-vanhouse11"><span class="authors">Van House, N. A</span> <span class="title">Personal photography, digital technologies and the uses of the visual</span>. <span class="in">In Visual Studies</span>, 26 (2): 125-134, 2011.<span class="links"></span></li><li id="ref-vkpds14"><span class="authors">Van Kleek, M. and OHara, K.</span> <span class="title">The Future of Social Is Personal: The Potential of the Personal Data Store</span>. <span class="in">In <a href="http://dx.doi.org/10.1007/978-3-319-08681-1_7" target="_blank">Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society</a></span>, pages 125-158, <span class="publisher"><a href="http://dx.doi.org/10.1007/978-3-319-08681-1_7" target="_blank">Springer International Publishing</a></span>, Cham, 2014.<span class="links"></span></li><li id="ref-lies"><span class="authors">Van Kleek, M.; Murray-Rust, D.; Guy, A.; O'hara, K. and Shadbolt, N.</span> <span class="title">Computationally Mediated Pro-Social Deception</span>. <span class="in">In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</span>, pages 552-563, 2016.<span class="links"></span></li><li id="ref-indx"><span class="authors">Van Kleek, M.; Smith, D. A.; Shadbolt, N. and thers,</span> <span class="title">A decentralized architecture for consolidating personal information ecosystems: The WebBox</span>.<span class="links"></span></li><li id="ref-vk14"><span class="authors">Van Kleek, M.; Smith, D. A.; Tinati, R.; O'Hara, K.; Hall, W. and Shadbolt, N. R</span> <span class="title">7 billion home telescopes: observing social machines through personal data stores</span>. <span class="in">In Proceedings of the 23rd International Conference on World Wide Web</span>, pages 915-920, 2014.<span class="links"></span></li><li id="ref-haferkamp10"><span class="authors">van Wersch, A.; Eberhardt, J. and Stringer, F</span> <span class="title">Cyberpsychology behavior and social networking</span>. <span class="in">In Cyberpsychology, behavior, and social networking</span>, 2013.<span class="links"></span></li><li id="ref-vazire04"><span class="authors">Vazire, S. and Gosling, S. D</span> <span class="title">e-Perceptions: personality impressions based on personal websites</span>. <span class="in">In Journal of personality and social psychology</span>, 87 (1): 123, 2004.<span class="links"></span></li><li id="ref-wellbeing17"><span class="authors">Verduyn, P.; Ybarra, O.; Resibois, M.; Jonides, J. and Kross, E.</span> <span class="title">Do Social Network Sites Enhance or Undermine Subjective Well-Being? A Critical Review</span>. <span class="in">In <a href="http://dx.doi.org/10.1111/sipr.12033" target="_blank">Social Issues and Policy Review</a></span>, 11 (1): 274-302, 2017.<span class="links"> <span class="doi"><a href="http://dx.doi.org/10.1111/sipr.12033" target="_blank">doi</a></span> </span></li><li id="ref-Vitak14"><span class="authors">Vitak, J. and Kim, J.</span> <span class="title">"You Can't Block People Offline": Examining How Facebook's Affordances Shape the Disclosure Process</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/2531602.2531672" target="_blank">Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing</a></span>, pages 461-474, <span class="publisher"><a href="http://dx.doi.org/10.1145/2531602.2531672" target="_blank">ACM</a></span>, New York, NY, USA, CSCW '14 , 2014.<span class="links"></span></li><li id="ref-voida2002conventions"><span class="authors">Voida, A.; Newstetter, W. C and Mynatt, E. D</span> <span class="title">When conventions collide: the tensions of instant messaging attributed</span>. <span class="in">In Proceedings of the SIGCHI conference on Human factors in computing systems</span>, pages 187-194, 2002.<span class="links"></span></li><li id="ref-vrij2000detecting"><span class="authors">Vrij, A.</span> <span class="title">Detecting lies and deceit: The psychology of lying and implications for professional practice</span>. <span class="publisher">Wiley</span>, 2000.<span class="links"></span></li><li id="ref-wg-os"><span class="authors">W3C News,</span> <span class="title">OpenSocial Foundation Moving Standards Work to W3C</span>. <span class="in">In <a href="https://www.w3.org/blog/news/archives/4265" target="_blank">W3C News Blog</a></span>, 2014.<span class="links"></span></li><li id="ref-warrant1"><span class="authors">Walther, J. B and Parks, M. R</span> <span class="title">Cues filtered out, cues filtered in</span>. <span class="in">In Handbook of interpersonal communication</span>, 3: 529-563, 2002.<span class="links"></span></li><li id="ref-walther1996computer"><span class="authors">Walther, J. B</span> <span class="title">Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction</span>. <span class="in">In Communication research</span>, 23 (1): 3-43, 1996.<span class="links"></span></li><li id="ref-warrant2"><span class="authors">Walther, J. B; Van Der Heide, B.; Hamel, L. M and Shulman, H. C</span> <span class="title">Self-generated versus other-generated statements and impressions in computer-mediated communication: A test of warranting theory using Facebook</span>. <span class="in">In Communication research</span>, 36 (2): 229-253, 2009.<span class="links"></span></li><li id="ref-tong08"><span class="authors">Walther, J. B; Van Der Heide, B.; Kim, S-Y.; Westerman, D. and Tong, S. T.</span> <span class="title">The role of friends’ appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?</span>. <span class="in">In Human communication research</span>, 34 (1): 28-49, 2008.<span class="links"></span></li><li id="ref-warrant"><span class="authors">Warkentin, D.; Woodworth, M.; Hancock, J. T and Cormier, N.</span> <span class="title">Warrants and deception in computer mediated communication</span>. <span class="in">In Proceedings of the 2010 ACM conference on Computer supported cooperative work</span>, pages 9-12, 2010.<span class="links"></span></li><li id="ref-tw-api"><span class="authors">Warren, C.</span> <span class="title">Twitter's API Update Cuts Off Oxygen to Third-Party Clients</span>. <span class="in">In <a href="http://mashable.com/2012/08/16/twitter-api-big-changes/" target="_blank">Mashable</a></span>, 2012.<span class="links"></span></li><li id="ref-contextwesch"><span class="authors">Wesch, M.</span> <span class="title">YouTube and You Experiences of Self-Awareness in the Context Collapse of the Recording Webcam</span>. <span class="in">In Explorations in Media Ecology</span>, 8 (2): 99-114, 2009.<span class="links"></span></li><li id="ref-wetherall2011privacy"><span class="authors">Wetherall, D.; Choffnes, D.; Greenstein, B; Han, S.; Hornyack, P.; Jung, J.; Schechter, S. and Wang, X.</span> <span class="title">Privacy revelations for web and mobile apps</span>. <span class="in">In Proc 13th USENIX Conference on Hot Topics in Operating Systems</span>, pages 21, 2011.<span class="links"></span></li><li id="ref-gaming"><span class="authors">Whitson, J. R</span> <span class="title">Gaming the quantified self</span>. <span class="in">In Surveillance & Society</span>, 11 (1/2): 163, 2013.<span class="links"></span></li><li id="ref-whitty2001age"><span class="authors">Whitty, M. and Gavin, J.</span> <span class="title">Age/sex/location: Uncovering the social cues in the development of online relationships</span>. <span class="in">In CyberPsychology & Behavior</span>, 4 (5): 623-630, 2001.<span class="links"></span></li><li id="ref-whitty2002liar"><span class="authors">Whitty, M. T</span> <span class="title">Liar, liar! An examination of how open, supportive and honest people are in chat rooms</span>. <span class="in">In Computers in Human Behavior</span>, 18 (4): 343-352, 2002.<span class="links"></span></li><li id="ref-bwars"><span class="authors">Wikipedia,</span> <span class="title">Browser Wars</span>.<span class="links"> <span class="url"><a href="https://en.wikipedia.org/wiki/Browser_wars" target="_blank">www</a></span> </span></li><li id="ref-dogfood"><span class="authors">Wikipedia,</span> <span class="title">Eating your own dog food</span>.<span class="links"> <span class="url"><a href="https://en.wikipedia.org/wiki/Eating_your_own_dog_food" target="_blank">www</a></span> </span></li><li id="ref-fiftycent"><span class="authors">Wikipedia,</span> <span class="title">50 Cent Party</span>. , [Online; accessed 20-March-2015].<span class="links"> <span class="url"><a href="http://en.wikipedia.org/wiki/50_Cent_Party" target="_blank">www</a></span> </span></li><li id="ref-yee2006demographics"><span class="authors">Yee, N.</span> <span class="title">The demographics, motivations, and derived experiences of users of massively multi-user online graphical environments</span>. <span class="in">In Presence</span>, 15 (3): 309-329, 2006.<span class="links"></span></li><li id="ref-yee2009proteus"><span class="authors">Yee, N.; Bailenson, J. N and Ducheneaut, N.</span> <span class="title">The Proteus effect: Implications of transformed digital self-representation on online and offline behavior</span>. <span class="in">In Communication Research</span>, 2009.<span class="links"></span></li><li id="ref-timblfuture"><span class="authors">Yeung, C A; Liccardi, I; Lu, K and Seneviratne, O</span> <span class="title">Decentralization: The future of online social networking</span>. <span class="in">In <a href="https://www.w3.org/2008/09/msnws/papers/decentralization.pdf" target="_blank">W3C Workshop on the Future of Social Networking Position Papers</a></span>, 2009.<span class="links"></span></li><li id="ref-zhang2014astroturfing"><span class="authors">Zhang, J.; Carpenter, D. and Ko, M.</span> <span class="title">Online Astroturfing: A Theoretical Perspective</span>. <span class="in">In Americas Conference on Information Systems 2013 Proceedings</span>, 2014.<span class="links"></span></li><li id="ref-Zhao16"><span class="authors">Zhao, X.; Lampe, C. and Ellison, N. B.</span> <span class="title">The Social Media Ecology: User Perceptions, Strategies and Challenges</span>. <span class="in">In <a href="http://doi.acm.org/10.1145/2858036.2858333" target="_blank">Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</a></span>, pages 89-100, <span class="publisher"><a href="http://dx.doi.org/10.1145/2858036.2858333" target="_blank">ACM</a></span>, New York, NY, USA, CHI '16 , 2016.<span class="links"></span></li></ol>
</div>
</section>
</div>
</article>
</main>
</body>
</html>