[1] ComputingCases.Org, 2011. http://computingcases.org/general_tools/sia/socio_tech_system.html
[2] Principia Cybernetica Web, “Socio-Technical System,” 2011. http://pespmc1.vub.ac.be/ASC/Socio-_Syste.html
[3] ComputingCases.Org, Editorial Content, 2012. http://computingcases.org/general_tools/sia/socio_tech_system.html
[4] ComputingCases.Org, Editorial Content, 2011. http://computingcases.org/general_tools/sia/socio_tech_system.html
[5] M. Michelle, “New Privacy Legislation,” Beyond Numbers, 2003. http://www.ica.bc.ca/kb.php3?pageid=2326
[6] B. J. Fogg, “How Do People Evaluate a Web Site’s Credibility?” 2002. http://www.nd.edu/~cclark2/capp30523/PDFs/HowDoPeopleEvaluate.pdf
[7] A. Alessandro and J. Tsai, S. Egelmana and L. Cranor, “The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study,” Carnegie Mellon University, Pittsburgh, 2007.
[8] G. Robert, “Do Consumers Care about Online Privacy?” 2007. http://www.mendeley.com/research/consumers-care-about-online-privacy/
[9] OUT-LAW News Editorial, “Regulators Demand Clearer Privacy Policies,” 2009. http://www.out-law.com//default.aspx?page=9795
[10] B. Spencer, “The Effects of Privacy Policy Statements on Customer Behavior,” 1999. http://www.techrepublic.com/article/the-effects-of-privacy-policy-statements-on-customer-behavior/5032632
[11] Treasury Board of Canada Secretariat, “Guidelines for Privacy Breaches,” 2011. http://www.tbs-sct.gc.ca/atip-aiprp/in-ai/in-ai2007/breach-atteint-eng.asp
[12] A. Figueroa, “Privacy Issues Hit Facebook (Again),” 2010. http://www.pcworld.com/article/202315/privacy_concerns_hit_facebook_again.html
[13] N. O’Neill, “10 Privacy Settings Every Facebook User Should Know,” 2009. http://www.allfacebook.com/facebook-privacy-2009-02
[14] Federal Trade Commission, “Choice Point Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” 2006. http://www.ftc.gov/opa/2006/01/choicepoint.shtm
[15] Electronic Privacy Information Center, “Choice Point: Introduction and Background,” 2001. http://epic.org/privacy/choicepoint/
[16] K. Tedder, “Don’t Wait for a Data Compromise,” 2010. https://www.firstdata.com/downloads/thought-leadership/fd-data-compromise-wp.pdf.
[17] H. Nissenbaum, “Technology, Policy, and the Integrity of Social Life,” Stanford University Press, Stanford, 2010.
[18] L. Ponemon, “Institute Research Editorial Report,” 2010. http://www.ponemon.org/about-ponemon-research
[19] F. Y. Rashid, “IT Security & Network Security News & Reviews: 10 Biggest Data Breaches of 2011 So Far,” 2011. http://www.eweek.com/c/a/Security/10-Biggest-Data-Breaches-of-2011-So-Far-175567/
[20] C. Sturdevant, “Danger: Privacy Agreements,” 2012. http://www.pcmag.com/article2/0,2817,1752833,00.asp
[21] C. Sturdevant, “IT Security & Network Security News,” 2005. http://www.eweek.com/c/a/Security/Danger-Privacy-Agreements/
[22] Second Moment, “Georgetown Internet Privacy Policy Survey,” 2003. http://www.secondmoment.org/etal-column/georgetown.php
[23] http://www.ftc.gov/os/1998/9808/geo-cmpl.htm http://www.ftc.gov/os/1999/9902/9823015d&o.htm
[24] GVU’s 10th WWW User Survey, 1998. http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-10/