Follow
Ralf De Wolf
Title
Cited by
Cited by
Year
Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook
R De Wolf, K Willaert, J Pierson
Computers in Human Behavior 35, 444-454, 2014
1462014
Mobile media and social space: How anytime, anyplace connectivity structures everyday life
MV Abeele, R De Wolf, R Ling
Media and Communication 6 (2), 5-14, 2018
1312018
Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general
M Martens, R De Wolf, L De Marez
Computers in Human Behavior 92, 139-150, 2019
1142019
Who shares what with whom and why?: News sharing profiles amongst Flemish news users
I Picone, R De Wolf, S Robijt
The Future of Journalism: Risks, Threats and Opportunities, 118-129, 2020
802020
Contextualizing how teens manage personal and interpersonal privacy on social media
R De Wolf
New media & society 22 (6), 1058-1075, 2020
732020
In-between child¢s play and teenage pop culture: Tweens, TikTok & privacy
T De Leyn, R De Wolf, M Vanden Abeele, L De Marez
Journal of Youth Studies 25 (8), 1108-1125, 2022
682022
From persuasive messages to tactics: Exploring children¢s knowledge and judgement of new advertising formats
P De Pauw, R De Wolf, L Hudders, V Cauberghe
New Media & Society 20 (7), 2604-2628, 2018
612018
Evaluating social media privacy settings for personal and advertising purposes
R Heyman, R De Wolf, J Pierson
info 16 (4), 18-32, 2014
302014
Teenage sexting on the rise? Results of a cohort study using a weighted sample of adolescents
J Van Ouytsel, M Walrave, L De Marez, K Van Damme, R De Wolf, ...
Sexual health 17 (2), 178-181, 2020
262020
Privacy by design through a social requirements analysis of social network sites form a user perspective
R De Wolf, R Heyman, J Pierson
European data protection: Coming of age, 241-265, 2012
242012
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
222015
Who¢s my audience again? Understanding audience management strategies for designing privacy management technologies
R De Wolf, J Pierson
Telematics and Informatics 31 (4), 607-616, 2014
222014
Teenagers¢ reflections on media literacy initiatives at school and everyday media literacy discourses
T De Leyn, C Waeterloos, R De Wolf, B Vanhaelewyn, K Ponnet, ...
Journal of children and media 16 (2), 221-239, 2022
212022
Interactive grouping of friends in OSN: towards online context management
B Gao, B Berendt, D Clarke, R De Wolf, T Peetz, J Pierson, R Sayaf
2012 IEEE 12th International Conference on Data Mining Workshops, 555-562, 2012
202012
Group privacy management strategies and challenges in Facebook: A focus group study among Flemish youth organizations
R De Wolf
Cyberpsychology. Journal of psychosocial reserach on cyberspace 10 (1), 2016
192016
Self-reflection on privacy research in social networking sites
R De Wolf, E Vanderhoven, B Berendt, J Pierson, T Schellens
Behaviour & Information Technology 36 (5), 459-469, 2017
182017
Onderzoeksrapport Apestaartjaren: de digitale leefwereld van kinderen en jongeren
H Vanwynsberghe, G Joris, C Waeterloos, S Anrijs, M Vanden Abeele, ...
Mediaraven, 2022
162022
Reframing current debates on young people's online privacy by taking into account the cultural construction of youth
T De Leyn, R De Wolf, MV Abeele, L De Marez
Proceedings of the 10th International Conference on Social Media and Society …, 2019
142019
The promise of audience transparency. Exploring users¢ perceptions and behaviors towards visualizations of networked audiences on Facebook
R De Wolf, B Gao, B Berendt, J Pierson
Telematics and Informatics 32 (4), 890-908, 2015
132015
Exploring Teenagers' Folk Theories and Coping Strategies Regarding Commercial Data Collection and Personalized Advertising
S Holvoet, SD Jans, RD Wolf, L Hudders, L Herrewijn
Media and Communication 10 (1), 317-328, 2022
122022
The system can't perform the operation now. Try again later.
Articles 1–20