1. Albahar, M.A., Haataja, K., Toivanen, P.: Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned. Int. J. Inf. Technol. Secur. 8(4), 25–49 (2016)
2. Al-Saggaf, Y.: An exploratory study of attitudes towards privacy in social media and the threat of blackmail: the views of a group of Saudi women. Electron. J. Inf. Syst. Developing Countries 75(7), 1–16 (2016)
3. Al-Saggaf, Y., Islam, Z.: Data mining and privacy of social network sites’ users: implications of the data mining problem. Sci. Eng. Ethics 21(4), 941–966 (2015)
4. Al-Saggaf, Y., Islam, Z.: Privacy in social network sites (SNS): the threats from data mining. Ethical Space Int. J. Commun. Ethics 9(4), 32–40 (2012)
5. Chutikulrungsee, T.: A phenomenological study of other-generated disclosure in online social networks. PhD Thesis, Charles Sturt University (2020)