Sources

Sources used:

Don’t Make me Think (Krug S., 2006)
About Face 4 (A Cooper, Reimann R, Cronin D, Noessel C, 2014)
Privacy As Contextual Integrity. (Nissenbaum H, 2004)
    Page(s): 101–139
Trust on the Line (Keymolen E., 2016)
The Design of Everyday Things (Norman D, 2013)
The Impact of Context Collapse and Privacy on Social Network Site Disclosures (Vitak J, 2012)
    Page(s): 451–470
Designing for the People (Dreyfuss H, 1955)
The secrets of Surveillance Capitalism (Zuboff S, 2016)
    Date Accessed: January 9, 2017

A Behavior Model for Persuasive Design (Fogg B.J., 2009)
Article 4 GDPR (1): Personal data ()
Wikipedia: Moore’s Law ()
Super computer Smartphone (2017) Date Accessed: December 25, 2017
Ericsson: IoT connections outlook (2017) Date Accessed: December 18, 2017
Designing Interactions (Moggridge B.J., 2007)
IBM STUDY (2011) Date Accessed: April 22, 2016
The Coming Age of Calm Technology (Weiser M, 1996) Date Accessed: January 4, 2016
PARC Pad (1990)
THE COMING AGE OF CALM TECHNOLOGY[1] (Weiser M, Brown J.S., 1996)
Ubiquitous Computing (Weiser M, 1993)
Hooked (Eyal N, , 2014)
Examination of neural systems sub-serving facebook “addiction”. ()
This Is Your Brain On Uber ()
Terms And Conditions Are The Biggest Lie Of Our Industry. ()
WhatsApp to share user data with Facebook for ad targeting — here’s how to opt out. ()
Basic Privacy Settings & Tools | Facebook Help Center | Facebook. ()
That Game on Your Phone May Be Tracking What You’re Watching on TV. (2017)
Get your loved ones off Facebook ()
Gang of hackers behind nude celebrity photo leak routinely attacked iCloud ()
Toronto police report two suicides associated with Ashley Madison hack. ()
What Did Cambridge Analytica Really Do for Trump’s Campaign? ()
How the Net aids dictatorships ()
China to bar people with bad ‘social credit’ from planes, trains. ()
China’s CCTV surveillance network took just 7 minutes to capture BBC reporter. ()
Equifax hit by data breach, affecting more than 143 million Americans. ()
Windows WannaCry: This separate, ‘bigger’ malware attack also uses NSA’s exploit ()
Uber concealed hack of 57 million accounts for more than a year. ()
Incident report on memory leak caused by Cloudflare parser bug. ()
Uber’s latest misstep? The ‘Greyball’ program. ()
The Data That Turned the World Upside Down ()
Cultural Probes | Interactions, (Gaver B, Pacenti E, Dunne T, 1999)
()
The Critical Engineering Manifesto ()
Privacy by Design – The 7 Foundational Principles. ()
A designer’s code of ethics ()
Key Changes with the General Data Protection Regulation ()
RESPECT 4U Paper (Dutch) (Vermeulen P, Djafari S, van Lieshout M, 2017)
Eight Privacy Design Strategies (Hoepman J.H., 2012)