http://newsroom.fb.com/company-info/, accessed 1 July 2015.
Correa, T., Hinsley, A. W. and de Zúñiga, H. G. (2010) ‘Who interacts on the web? The intersection of users’ personality and social media use’, Computers in Human Behavior, Vol. 26, No. 2, pp. 247–253.
Lin, K. Y. and Lu, H.-P. (2011) ‘Why people use social networking sites: An empirical study integrating network externalities and motivation theory’, Computers in Human Behavior, Vol. 27, No. 3, pp. 1152–1161.
Gross, R. and Acquiti, A. (2005) ‘Information revelation and privacy in online social networks’, Proceedings of the Association for Computing Machinery workshop on privacy in the electronic society (Alexandria, VA, 7 November). ACM Press, New York.
Doerr, B., Fouz, M. and Friedrich, T. (2012) ‘Why rumors spread so quickly in social networks communication’, Association for Computing Machinery, Vol. 55, No. 6, pp. 70–75.
Mohamed, N. and Ahmad, I. H. (2012) ‘Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia’, Computers in Human Behavior, Vol. 28, No. 6, pp. 2366–2375.
Boyd, D. (2008) ‘Facebook’s privacy trainwreck — Exposure, invasion, and social convergence’, The International Journal of Research into New Media Technologies, Vol. 14, No. 1, pp. 13–20.
Luedtke, J. (2003) ‘Toward pervasive computing — RFID tags: Pervasive computing in your pocket, on your key chain and in your car’, 17 July, DMReview.com.
Johnston, K., Tanner, K., Lalla, N. and Kawalski, D. (2013) ‘Social capital: The benefit of Facebook “friends”’, Behaviour & Information Technology, Vol. 32, No. 1, pp. 24–36.
Cheung, C. M. K., Chiu, P. Y. and Lee, M. K. O. (2011) ‘Online social networks: Why do students use Facebook?’, Computers in Human Behavior, Vol. 27, No. 4, pp. 1337–1343.
Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R. and Upadhyaya, A. J. (2009) ‘Internet and online information privacy: An exploratory study of preteens and early teens’, IEEE Transactions on Professional Communication, Vol. 52, No. 2, pp. 167–182.
Shin, D. (2010) ‘The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption’, Interacting with Computers, Vol. 22, No. 5, pp. 428–438.
Ajzen, I. (1991) ‘The theory of planned behavior’, Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179–211.
Lin, K.-Y. and Lu, H.-P. (2011) ‘Why people use social networking sites: An empirical study integrating network externalities and motivation theory’, Computers in Human Behavior, Vol. 27, No. 3, pp. 1152–1161.
Almadhoun, N. M., Dominic, P. D. D. and Woon, L. F. (2011) ‘Perceived security, privacy, and trust concerns within social networking sites: The role of information sharing and relationships development in the Malaysian higher education institutions marketing’, International Conference on Control System, Computing and Engineering, IEEE, Malaysia, pp. 426–431.
Dwyer, C., Hiltz, S. R. and Passerini, K. (2007) ‘Trust and privacy concerns within social networking sites: A comparison of Facebook and MySpace’, Americas Conference on Information Systems, Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, 9–12 August, Colorado, USA, p. 339.
Goettke, R. and Christiana, J. (2007) ‘Privacy and online social networking websites’, Computer Science 199r: Special Topics in Computer Science Computation and Society: Privacy and Technology, 14 May.
Weber, R. H. (2009) ‘Internet of things — Need for a new legal environment?’, Computer Law & Security Review, Vol. 25, No. 6, pp, 522–527.
Miyazaki, A. D. and Fernandez, A. (2001) ‘Consumer perceptions of privacy and security risks for online shopping’, Journal of Consumer Affairs, Vol. 35, No. 1, pp. 27–44.
Westin, A. F. (1967) Privacy and Freedom, Atheneum, New York.
Corritore, C. L., Kracher, B. and Wiedenbeck, S. (2003) ‘On-line trust: concepts, evolving themes, a model’, International Journal of Human Computer Studies, Vol. 58, No. 6, pp. 737–758.
Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995) ‘An integrative model of organizational trust’, Academic Management Review, Vol. 20, No. 3, pp 709–734.
Pavlou, P. A. (2003) ‘Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model’, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 69–103.
Fukuyama, F. (1995) Trust: The Social Virtues and the Creation of Prosperity, Simon & Schuster, New York.
Lewis, J. D. and Weigert, A. (1985) ‘Trust as a social reality’, Social Forces, Vol. 63, No. 4, pp. 967–985.
Coppola, N., Hiltz, S. R. and Rotter, N. (2004) ‘Building trust in virtual teams’, IEEE Transactions on Professional Communication, Vol. 47, No. 2, pp. 95–104.
Jarvenpaa, S. and Leidner, D. (1998) ‘Communication and trust in global virtual teams’, JCMC, Vol. 3, No. 4, http://www.ascusc.org/jcmc/vol3/issue4/jarvenpaa.html, accessed December 2013.
Meyerson, D., Weick, K. E. and Kramer, R. M. (1996) ‘Swift trust and temporary groups’ in Kramer, R. M., (ed) Trust in Organizations: Frontiers of Theory and Research, Sage, Thousand Oaks, CA.
Piccoli, G. and Ives, B. (2003) ‘Trust and the unintended effects of behavior control in virtual teams’, MIS Quarterly, Vol. 27, No. 3, pp. 365–395.
Metzger, M. J. (2004) ‘Privacy, trust, and disclosure: Exploring barriers to electronic commerce’, Journal of Computer-Mediated Communication, Vol. 9, No. 4, pp. 1143–1168.
Belanger, F., Hiller, J. S. and Smith, W. J. (2002) ‘Trustworthiness in electronic commerce: The role of privacy, security, and site attributes’, Journal of Strategic Information Systems, Vol. 11, No. 3, pp. 245–270.
Camp, L. J. (1999) ‘Web security and privacy: An American perspective’, Information Society, Vol. 15, No. 4, pp. 249–256.
Chellappa, R. K. (2008) ‘Consumers’ trust in electronic commerce transactions: The role of perceived privacy and perceived security’, Unpublished manuscript, Emory University, Atlanta, GA.
Suh, B. and Han, I. (2003) ‘The impact of customer trust and perception of security control on the acceptance of electronic commerce’, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135–161.
Govani, T. and Pashley, H. (2005) ‘Student awareness of the privacy implications when using Facebook’, Paper presented at the Privacy Poster Fair at Carnegie Mellon University School of Library and Information Science, USA, http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf, accessed 14 December 2005.
Tufekci, Z. (2008) ‘Can you see me now? Audience and disclosure regulation in online social network sites’, Bulletin of Science, Technology and Society, Vol. 28, No. 20, pp. 20–36.
Chiaramonte, P. and Martinez, E. (2006) ‘Jerks in space’, The New York Post, 18 March, p. 6, New York.
Hass, N. (2006) ‘In your Facebook.com’, The New York Times, 8 January, Section 4A, pp. 30–31, New York.
Mintz, J. (2005) ‘Friendster’s “Eww” moment’, The Wall Street Journal, 8 December, Section B1, p. 23.
Read, B. (2006) ‘Think before you share: Students’ online socializing can have unintended consequences’. in Chronicle of Higher Education, Washington DC, p. 121.
George, D. and Mallery, P. (2003) SPSS for Windows Step by Step: A Simple Guide and Reference. 11.0 update, Allyn & Bacon, Boston, MA.
Dinev, T. and Hart, P. (2006) ‘An extended privacy calculus model for e-commerce transactions’, Information Systems Research, Vol. 17, No. 1, pp. 61–80.
Iacobucci, D. (2010) ‘Structural equations modeling: Fit indices, sample size, and advanced topics’, Journal of Consumer Psychology, Vol. 20, No. 1, pp. 90–98.
Scott, J. (1995) ‘The measurement of information systems effectiveness: Evaluating a measuring instrument’, ACM SIGMIS Database, Vol. 26, No. 1, pp. 43–61.
Bagozzi, R. and Yi, Y. (1988) ‘On the evaluation of structural equation models’, Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74–94.