gang mit persοnlichen Daten im Web 2, Datenschutz
und Datensicherung (DuD) 9/2008, pp. 597-600
Brignall, T., 2002. The new panopticon: The internet vie-
wed as a structure of social control, In Theory and
Science, vol. 3, no. 1, pp. 335–348.
Bruns, A., 2006. Towards produsage: Futures for user-led
content production, In Proc. of Cultural Attitudes to-
wards Communication and Technology, pp. 275-284.
Cas, I., 2011. Ubiquitous Computing, Privacy and Data
Protection: Options and limitations to reconcile the un-
precedented contradictions, In Computers, Privacy
and Data Protection: An Element of Choice, pp. 139-
170, Springer.
Castelluccia, C., Druschel, P., Hübner, S., Pasic, A., Pre-
neel, B., Tschofenig, H., 2011. Privacy, Accountabili-
ty and Trust-Challenges and Opportunities, Technical
Report, ENISA.
Cohen, J., 2000. Examined Lives: Informational Privacy
and the subject as object, In Stanford Law Review, vol.
52, pp. 1373-1438.
Costa, L., Rodrigues, F., Travieso, G., Boas, P., 2007.
Characterization of complex networks: A survey of
measurements, In Advances in Physics, vol. 56, no. 1,
pp. 167-242.
De Choudhury, M., Counts, S., 2012. The nature of emo-
tional expression in social media: measurement, infe-
rence and utility, In 2012 Human Computer Interac-
tion Consortium (HCIC) Workshop.
Fazekas, C., 2004. 1984 is Still Fiction: Electronic Moni-
toring in the Workplace and US Privacy Law, In Duke
Law & Technology Review, pp. 15-25.
Foucault, M., 1975. Surveiller et punir: Naissance de la
prison, Paris: Gallimard. Alan Sheridan (Trans.), Dis-
cipline and punish: The birth of the prison: Penguin.
Fuchs, C., 2011.New Media, Web 2.0 and Surveillance. In
Sociology Compass 5/2 (2011), pp. 134–147
Gibson, S., 2004. Open source intelligence, In The RUSI
Journal, vol. 149, no. 1, pp. 16-22.
Gritzalis, D., 2001. A digital seal solution for deploying
trust on commercial transactions, In Information Ma-
nagement & Computer Security Journal, vol. 9, no. 2,
pp. 71-79, MCB University Press.
Gutwirth, S., De Hert, P., 2008. Regulating profiling in a
democratic constitutional State, In Profiling the Euro-
pean citizen cross-disciplinary perspectives, pp. 271-
302, Springer.
Henderson, S., 2012. Expectations of Privacy in Social
Media, In Mississippi College L. Rev., pp. 31 (Sympo-
sium Edition)). Available at:
http://works.bepress.com/stephen_henderson/10
Hildebrandt, M., 2009. Who is profiling who? Invisible vi-
sibility, In Reinventing Data Protection, pp. 239-252.
Jakobsson, M., Finn, P., Johnson, N., 2008. Why and how
to perform fraud experiments, In IEEE Security & Pri-
vacy, vol. 6, no. 2, pp. 66-68.
Jakobsson, M., Ratkiewicz, J., 2006. Designing ethical
phishing experiments: a study of (ROT13) rOnl query
features, In Proc. of the 15
th
International Conference
on World Wide Web, pp. 513-522, ACM.
Joachims, T., 1998. Text categorization with support vec
tor machines: Learning with many relevant features, In
Machine learning: ECML-98, pp. 137-142.
Jurgenson, N., 2010. Review of Ondi Timoner’s We Live
in Public. Surveillance & Society 8(3), pp. 374-378.
http://www.surveillance-and-society.org
Kandias M., Galbogini K., Mitrou L., Gritzalis D., "Insi-
ders trapped in the mirror reveal themselves in social
media", in Proc. of the 7th International Conference
on Network and System Security (NSS 2013), pp. 220-
235, Springer (LNCS 7873), Spain, June 2013.
King, I., Li, J., Chan, K., 2009. A brief survey of computa-
tional approaches in social computing, In International
Joint Conference on Neural Networks, pp. 1625-1632.
Lambrinoudakis, C., Gritzalis, D., Tsoumas V., Karyda,
M., Ikonomopoulos, S., 2003. Secure Electronic Vot-
ing: The current landscape, In Secure Electronic Vot-
ing, Gritzalis, D. (Ed.), pp. 101-122, Springer.
Manning, C., Raghavan, P., Schütze, H., 2008. Introducti-
on to Information Retrieval, Cambridge University
Press.
Marias, J., Dritsas, S., Theoharidou, M., Mallios, J. Gritza-
lis, D., 2007. SIP vulnerabilities and antispit mecha-
nisms assessment, In Proc. of the 16
th
IEEE Internati-
onal Conference on Computer Communications and
Networks, pp. 597-604, IEEE Press.
Marvwick, A., 2012. The Public Domain: Social Surveil-
lance in Everyday Life. In Surveillance & Society 9
(4). 2012, pp. 378-393
McCallum, A., Nigam, K., 1998. A comparison of event
models for naive Bayes text classification, In Work-
shop on learning for text categorization, vol. 752, pp.
41-48.
Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G.,
2003. Electronic voting: Constitutional and legal re-
quirements, and their technical implications, In Secure
Electronic Voting, pp. 43-60, Springer.
Mitrou, L., 2009. The Commodification of the Individual
in the Internet Era: Informational self-determination or
“self-alienation”, In Proc. of the 8
th
International Con-
ference of Computer Ethics Philosophical Enquiry
(CEPE ‘09), pp. 466-485.
Mitrou, L., 2010. The impact of communications data re-
tention on fundamental rights and democracy: The ca-
se of the EU Data Retention Directive, In Haggerty/-
Samatas, pp. 127-147.
Nevrla, J. 2010, Voluntary Surveillance: Privacy, Identity
and the Rise of Social Panopticism in the Twenty-First
Century, In Commentary - The UNH Journal of Com-
munication Special Issue, 2009-10, pp. 5-13
Pang, B., Lee, L., 2008. Opinion mining and sentiment a-
nalysis, in Foundations and Trends in Information Re-
trieval, vol. 2, nos. 1-2, pp. 1–135.
Park, N., Kee, K., Valenzuela, S., 2009. Being immersed
in social networking environment: Facebook groups,
uses and gratifications, and social outcomes, In Cyber-
Psychology & Behaviour, vol. 12, no. 6, pp. 729-733.
Schermer, B., 2011. The limits of privacy in automated
profiling and data mining, In Computer Law and Secu-
rity Review, vol. 27, pp. 45-52.
WhichSideAreYouOn?-ANewPanopticonvs.Privacy
109