
 
gang mit persοnlichen Daten im Web 2, Datenschutz 
und Datensicherung (DuD) 9/2008, pp. 597-600 
Brignall, T., 2002. The new panopticon: The internet vie-
wed as a structure of social control, In Theory and 
Science, vol. 3, no. 1, pp. 335–348. 
Bruns, A., 2006. Towards produsage: Futures for user-led 
content production, In Proc. of Cultural Attitudes to-
wards Communication and Technology, pp. 275-284.  
Cas, I., 2011. Ubiquitous Computing, Privacy and Data 
Protection: Options and limitations to reconcile the un-
precedented contradictions, In Computers, Privacy 
and Data Protection: An Element of Choice, pp. 139-
170, Springer. 
Castelluccia, C., Druschel, P., Hübner, S., Pasic, A., Pre-
neel, B., Tschofenig, H., 2011. Privacy, Accountabili-
ty and Trust-Challenges and Opportunities, Technical 
Report, ENISA. 
Cohen, J., 2000. Examined Lives: Informational Privacy 
and the subject as object, In Stanford Law Review, vol. 
52, pp. 1373-1438. 
Costa, L., Rodrigues, F., Travieso, G., Boas, P., 2007. 
Characterization of complex networks: A survey of 
measurements, In Advances in Physics, vol. 56, no. 1, 
pp. 167-242. 
De Choudhury, M., Counts, S., 2012. The nature of emo-
tional expression in social media: measurement, infe-
rence and utility, In 2012 Human Computer Interac-
tion Consortium (HCIC) Workshop. 
Fazekas, C., 2004. 1984 is Still Fiction: Electronic Moni-
toring in the Workplace and US Privacy Law, In Duke 
Law & Technology Review, pp. 15-25. 
Foucault, M., 1975. Surveiller et punir: Naissance de la 
prison, Paris: Gallimard. Alan Sheridan (Trans.), Dis-
cipline and punish: The birth of the prison: Penguin. 
Fuchs, C., 2011.New Media, Web 2.0 and Surveillance. In 
Sociology Compass 5/2 (2011), pp. 134–147 
Gibson, S., 2004. Open source intelligence, In The RUSI 
Journal, vol. 149, no. 1, pp. 16-22. 
Gritzalis, D., 2001. A digital seal solution for deploying 
trust on commercial transactions, In Information Ma-
nagement & Computer Security Journal, vol. 9, no. 2, 
pp. 71-79, MCB University Press. 
Gutwirth, S., De Hert, P., 2008. Regulating profiling in a 
democratic constitutional State, In Profiling the Euro-
pean citizen cross-disciplinary perspectives, pp. 271-
302, Springer. 
Henderson, S., 2012. Expectations of Privacy in Social 
Media, In Mississippi College L. Rev., pp. 31 (Sympo-
sium Edition)). Available at: 
http://works.bepress.com/stephen_henderson/10 
Hildebrandt, M., 2009. Who is profiling who? Invisible vi-
sibility, In Reinventing Data Protection, pp. 239-252. 
Jakobsson, M., Finn, P., Johnson, N., 2008. Why and how 
to perform fraud experiments, In IEEE Security & Pri-
vacy, vol. 6, no. 2, pp. 66-68. 
Jakobsson, M., Ratkiewicz, J., 2006. Designing ethical 
phishing experiments: a study of (ROT13) rOnl query 
features, In Proc. of the 15
th
 International Conference 
on World Wide Web, pp. 513-522, ACM. 
Joachims, T., 1998. Text categorization with support vec
tor machines: Learning with many relevant features, In 
Machine learning: ECML-98, pp. 137-142. 
Jurgenson, N., 2010. Review of Ondi Timoner’s We Live 
in Public. Surveillance & Society 8(3), pp. 374-378. 
http://www.surveillance-and-society.org 
Kandias M., Galbogini K., Mitrou L., Gritzalis D., "Insi-
ders trapped in the mirror reveal themselves in social 
media", in Proc. of the 7th International Conference 
on Network and System Security (NSS 2013), pp. 220-
235, Springer (LNCS 7873), Spain, June 2013. 
King, I., Li, J., Chan, K., 2009. A brief survey of computa-
tional approaches in social computing, In International 
Joint Conference on Neural Networks, pp. 1625-1632. 
Lambrinoudakis, C., Gritzalis, D., Tsoumas V., Karyda, 
M., Ikonomopoulos, S., 2003. Secure Electronic Vot-
ing: The current landscape, In Secure Electronic Vot-
ing, Gritzalis, D. (Ed.), pp. 101-122, Springer. 
Manning, C., Raghavan, P., Schütze, H., 2008. Introducti-
on to Information Retrieval, Cambridge University 
Press. 
Marias, J., Dritsas, S., Theoharidou, M., Mallios, J. Gritza-
lis, D., 2007. SIP vulnerabilities and antispit mecha-
nisms assessment, In Proc. of the 16
th
 IEEE Internati-
onal Conference on Computer Communications and 
Networks, pp. 597-604, IEEE Press.  
Marvwick, A., 2012. The Public Domain: Social Surveil-
lance in Everyday Life. In Surveillance & Society 9 
(4). 2012, pp. 378-393 
McCallum, A., Nigam, K., 1998. A comparison of event 
models for naive Bayes text classification, In Work-
shop on learning for text categorization, vol. 752, pp. 
41-48. 
Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G., 
2003. Electronic voting: Constitutional and legal re-
quirements, and their technical implications, In Secure 
Electronic Voting, pp. 43-60, Springer.  
Mitrou, L., 2009. The Commodification of the Individual 
in the Internet Era: Informational self-determination or 
“self-alienation”, In Proc. of the 8
th
 International Con-
ference of Computer Ethics Philosophical Enquiry 
(CEPE ‘09), pp. 466-485. 
Mitrou, L., 2010. The impact of communications data re-
tention on fundamental rights and democracy: The ca-
se of the EU Data Retention Directive, In Haggerty/-
Samatas, pp. 127-147. 
Nevrla, J. 2010, Voluntary Surveillance: Privacy, Identity 
and the Rise of Social Panopticism in the Twenty-First 
Century, In Commentary - The UNH Journal of Com-
munication Special Issue, 2009-10, pp. 5-13 
Pang, B., Lee, L., 2008. Opinion mining and sentiment a-
nalysis, in Foundations and Trends in Information Re-
trieval, vol. 2, nos. 1-2, pp. 1–135. 
Park, N., Kee, K., Valenzuela, S., 2009. Being immersed 
in social networking environment: Facebook groups, 
uses and gratifications, and social outcomes, In Cyber-
Psychology & Behaviour, vol. 12, no. 6, pp. 729-733. 
Schermer, B., 2011. The limits of privacy in automated 
profiling and data mining, In Computer Law and Secu-
rity Review, vol. 27, pp. 45-52. 
WhichSideAreYouOn?-ANewPanopticonvs.Privacy
109