References
Bennur, S. (2010). From apparel, product attributes to brand loyalty: a cross-cultural investigation of U.S and Indian consumers attribute choices applying Kano’s theory. Ph.D. Dissertation. Oklahoma State University.
Boyd, D. M. (2008). Facebook’s privacy train wreck: Exposure, invasion, and social convergence. Int’l J. Research into New Media Tech, 14(1), 13–20.
Brown, I. (2012), Government access to private-sector data in the United Kingdom, International Data Privacy Law, 2 (4), 230–38.
Dewar, K. (2017). The value exchange: Generating trust in the digital world. Business Information Review, 34 (2), 96–100.
Dumdum, O. & Crielda, G. (2009). Casting credibility, University of the Philippines, college of mass communication, for presentation during the pre-conference on “ Affective Audiene” in the 59th. Annual conference of international communication association, in Chicago.
Elmetwaly, M.A. & Babin, L. (2020). Relationship between Saudi customers’ electronic-trust and electronic-loyalty. Journal of Advanced Pharmacy Education & Research, 10(3), 160-166.
Fortin, D., Dholakia, R. & Dholakia, N. (2002). Emerging issues in electronic marketing: thinking outside the square. Journal of Business Research, 55 (8), 623-627.
Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 59(6), 703-705.
Gross, R. & Acquisti, A. (2005). Information revelation and privacy in online social networks. Workshop on Privacy in the Electronic Society.
Gruschka, N., Mavroeidis, V., Vishi, K. & Jensen, M. (2018). Privacy issues and data protection in big data: A case study analysis under GDPR. 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 5027-5033, doi: 10.1109/BigData.2018.8622621.
Gupta, A. & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites.
Ubiquity the Journal of Pervasive Media, 17(1). DOI:
10.1057/dddmp.2015.32
Hill, K. (2012). How target figured out a teen girl was pregnant before her father did. Forbes, Inc.
Hoffmann, C. P., Lutz, C. & Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), 7-26.
Jayasinghe, U. (2018). Trust evaluation in the IoT environment, PQDT-UK & Ireland. Liverpool John Moores University (United Kingdom).
Kinast, S., Ashkenazy, Y. & Meron, E. A. (2014). Coupled Vegetation–crust model for patchy landscapes. Pure Applied Geophysics, 173, 983–993.
Kroll, J. A. (2016). Accountable algorithms. rithms. University of Pennsylvania Law Review. Law Review. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2765268.
Layton, R. (2017). How the GDPR compares to best practices for privacy, accountability and trust. Visiting Researcher, Aalborg University, Denmark and Independent Data Scientist, Italy.
Leonnard, A. (2019). Exploring the relationship among e-service quality, e-trust, e-satisfaction and loyalty at higher education institutions. Journal on Efficiency and Responsibility in Education and Science, 12(4), 103- 110.
Lewis, D. & Moorkens, J. (2020). A rights-based approach to trustworthy AI in social media. Social Media + Society, 6(3), 516-539.
Liu, D., Ainsworth, S. E. & Baumeister, R. F. (2016). A meta-analysis of social networking online and social capital. Review of General Psychology, 20(4), 369–391.
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S. & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 365-394.
Mostert, M., Bredenoord, A.L., Biesaart, M.C. & van Delden, J.J. (2016), Big Data in medical research and EU data protection law: challenges to the consent or anonyms approach. European Journal of Human Genetics, 24(7), 956-960.
Orlowski, P. (2011), Teaching about hegemony: Race, class and democracy in the 21st Century. Springer Science+Business Media, https://doi.org/10.1007/978-94-007-1418-2.
Romansky, R. (2014). Social media and personal data protection. International Journal on Information Technologies & Security, 11(4), 65-80.
Shareef, M. A., Mukerji, B., Dwivedi, Y. K., Rana, N. P. & Islam, R. (2019). Social media marketing: Comparative effect of advertisement sources. Journal of Retailing and Consumer Services, 46, 58-69.
Sophos, R. (2007). Reverse Social Engineering Attacks in Online Social Networks.
In: Holz, T., Bos, H. (eds) Detection of intrusions and malware, and vulnerability assessment. Lecture Notes in Computer Science, vol 6739. Springer, Berlin, Heidelberg.
https://doi.org/10.1007/978-3-642-22424-9_4
Sukhu, A., Zhang T. & Bilgihan, A. (2015) Factors Influencing Information-Sharing Behaviors in Social Networking Sites, Services Marketing Quarterly, 36(4), 317-334.
Tran, V. V. & Quang Vu, H. (2019). Inspecting the relationship among e-service quality, e-trust, e-customer satisfaction, and behavioral intentions of online shopping customers. Global Business and Finance Review, 24(3), 29-42.
Weichert, S. (2013). E-trust building in the hotel industry. Journal of Islamic Marketing, 12(2), 123-146.
Živković, P. D. (2018). An international publication for theory and practice of Management Science. University of Belgrade, Technical Faculty in Bor, Department of Engineering Management.