B
¨
uttner, O. B. and G
¨
oritz, A. S. (2008). Perceived trust-
worthiness of online shops. Journal of Consumer Be-
haviour: An Int. Research Review, 7(1):35–50.
Daubert, J., Bock, L., Kikirasy, P., M
¨
uhlh
¨
auser, M., and
Fischer, M. (2014). Twitterize: Anonymous micro-
blogging. In 2014 IEEE/ACS 11th Int. Conf. on Com-
puter Systems and Applications (AICCSA), pages 817–
823. IEEE.
Dowling, G. R. (1986). Perceived risk: the concept and its
measurement. Psychology & Marketing, 3(3):193–210.
Ebert, N., Ackermann, K. A., and Heinrich, P. (2020). Does
context in privacy communication really matter?—a
survey on consumer concerns and preferences. In Proc.
of the 2020 CHI Conf. on Human Factors in Computing
Systems, pages 1–11.
Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A.,
and Steinmetz, R. (2008). A distributed platform for
multimedia communities.
Guardian, T. (2018a). Facebook to contact 87 million users
affected by data breach. https://www.theguardian.
com/technology/2018/apr/08/facebook-to-contact-
the-87-million-users-affected-by-data-breach. Online;
accessed 07.12.2020.
Guardian, T. (2018b). Huge Facebook breach
leaves thousands of other apps vulnerable.
https://www.theguardian.com/technology/2018/oct/
02/facebook-hack-compromised-accounts-tokens.
Online; accessed 18.11.2020.
Hu, L.-t. and Bentler, P. M. (1999). Cutoff criteria for fit
indexes in covariance structure analysis: Conventional
criteria versus new alternatives. Structural equation
modeling: a multidisciplinary journal, 6(1):1–55.
Jarvenpaa, S. L., Tractinsky, N., and Saarinen, L. (1999).
Consumer trust in an internet store: A cross-cultural
validation. Journal of Computer-Mediated Communi-
cation, 5(2):JCMC526.
Kani-Zabihi, E. and Helmhout, M. (2011). Increasing ser-
vice users’ privacy awareness by introducing on-line
interactive privacy features. In Nordic Conf. on Secure
IT Systems, pages 131–148. Springer.
Kozlowska, I. (2018). Facebook and data privacy in the age
of cambridge analytica. Seattle, WA: The University of
Washington. Retrieved August, 1:2019.
Kusyanti, A., Puspitasari, D. R., Catherina, H. P. A., and Sari,
Y. A. L. (2017). Information privacy concerns on teens
as facebook users in indonesia. Procedia Computer
Science, 124:632–638.
Larson, S. (2017). Every single Yahoo account was
hacked - 3 billion in all. http://money.cnn.com/2017/
10/03/technology/business/yahoo-breach-3-billion-
accounts/index.html. Online; accessed 07.12.2020.
Larson, S. (2018). Fitness app that revealed mil-
itary bases highlights bigger privacy issues.
http://money.cnn.com/2018/01/29/technology/strava-
privacy-data-exposed/index.html. Online; accessed
09.05.2019.
Luo, W., Xie, Q., and Hengartner, U. (2011). Face-
Cloak Download. https://crysp.uwaterloo.ca/
software/facecloak/download.html. Online, accessed
07.12.2020.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Inter-
net users’ information privacy concerns (iuipc): The
construct, the scale, and a causal model. Information
systems research, 15(4):336–355.
Mason, R. O. (1986). Four ethical issues of the information
age. MIS quarterly, pages 5–12.
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995). An
integrative model of organizational trust. Academy of
management review, 20(3):709–734.
McCandless, D. (2019). World’s Biggest Data Breaches
& Hacks. https://informationisbeautiful.net/
visualizations/worlds-biggest-data-breaches-hacks.
Online; accessed 07.12.2020.
Mohammadi, N. G., Paulus, S., Bishr, M., Metzger, A.,
Koennecke, H., Hartenstein, S., and Pohl, K. (2013).
An analysis of software quality attributes and their
contribution to trustworthiness. In CLOSER, pages
542–552.
Noyes, D. (2021). Distribution of Twitter users world-
wide as of January 2021, by gender. https:
//www.statista.com/statistics/828092/distribution-of-
users-on-twitter-worldwide-gender/. Online; accessed
10.02.2021.
Olivero, N. and Lunt, P. (2004). Privacy versus willingness
to disclose in e-commerce exchanges: The effect of
risk awareness on the relative role of trust and control.
Journal of economic psychology, 25(2):243–262.
Salzberg, M. (2010). Diaspora - Kickstarter Pitch.
https://web.archive.org/web/20110814222702/http:
//blog.joindiaspora.com/2010/04/27/kickstarter-
pitch.html. Online, accessed 07.12.2020.
Smith, H. J., Milberg, S. J., and Burke, S. J. (1996). In-
formation privacy: measuring individuals’ concerns
about organizational practices. MIS quarterly, pages
167–196.
Sonderegger, A. and Sauer, J. (2010). The influence of design
aesthetics in usability testing: Effects on user perfor-
mance and perceived usability. Applied ergonomics,
41(3):403–410.
Stone, E. F., Gueutal, H. G., Gardner, D. G., and McClure,
S. (1983). A field experiment comparing information-
privacy values, beliefs, and attitudes across several
types of organizations. Journal of applied psychology,
68(3):459.
Tufekci, Z. and King, B. (2014). We Can’t Trust
Uber. https://www.nytimes.com/2014/12/08/opinion/
we-cant-trust-uber.html.
Wainakh, A., Grube, T., Daubert, J., Porth, C., and
M
¨
uhlh
¨
auser, M. (2019). Tweet beyond the cage: A
hybrid solution for the privacy dilemma in online so-
cial networks. In 2019 IEEE Global Communications
Conf. (GLOBECOM), pages 1–6. IEEE.
Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media Application
279