[1] Your privacy rights, 2016. URL https://www.priv.gc.ca/en/privacytopics/your-privacy-rights/.
[2] Number of social media users worldwide 2010-2021, 2017. URL https://www.statista.com/statistics/278414/number-of-worldwidesocial-network-users/.
[3] Personal Information Protection and Electronic Documents Act, 2017. URL http://lawslois.justice.gc.ca/eng/acts/P8.6/index.html.
[4] Global social media ranking 2018 | Statistic,2019. URL https://www.statista.com/statistics/272014/globalsocialnetworks-ranked-by-number-of-users/.
[5] Tariq Ahmad. Online Privacy Law:Canada, 2012. URL https://www.loc.gov/law/help/online privacylaw/canada.php{#}Current.
[6] Patrick L. Benaroche. Social Media and Employment Law An International Survey |Chapter 5 Canada. In Social Media and Employment Law An International Survey, page 26.2015. ISBN 978-90-411-4768-4. URL http://www.stikeman.com/pdf/Social-mediaemployment-law-survey{_}Walters-Kluwer. pdf?utm{_}source=Mondaq{&}utm{_}medium=syndication{&}utm{_}campaign=View-Original.
[7] Colin J. Bennett, Christopher A. Parsons, and Adam Molnar. Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice. Technical report, 2013. URL http://ssrn.com/abstract=2208098.
[8] Sohnen Cherie and Moe Responds. How can I become more confident in using social media? MASSAGE Magazine, pages 32–36, 2017. URL www.massagemagazine.com.
[9] Pierre-Luc Dusseault. PRIVACY AND SOCIAL MEDIA IN THE AGE OF BIG DATA. Technical report, House Of Commons - Canada, Canada, 2013. URL https://www.ourcommons. ca/Content/Committee/411/ETHI/Reports/RP6094136/ethirp05/ethirp05-e.pdf.
[10] Lisa Feinberg. Social Networking, 2012. URL https://cippic.ca/en/FAQ/social{_}networking{#}SN12.
[11] Enrico Franchi, Agostino Poggi, and Michele Tomaiuolo. Information and Password Attacks on Online Social Networks:: An Argument for Cryptography. Journal of Information Technlogy Research, 8(1):25–42, 2015. ISSN 1938- 7857. doi: 10.4018/JITR.2015010103.
[12] Ella Ben Hagai, Gabrielle Leon, and Eileen L. Zurbriggen. Negotiating privacy and intimacy on social media: Review
and recommendations. Translational Issues in Psychological Science, 2(3):248–260, 2016. ISSN 2332-2136, 2332-2136. doi: http://dx.doi.org/10.1037/tps0000078. URL https://search.proquest.com/docview/1826150550 accountid=15977{%}5Cnhttp://su3pq4eq3l.search.serialssolutions.com/?ctx{_}ver=Z39.88-2004{&}ctx{_}enc=
info:ofi/enc:UTF-8{&}rfr{_}id=info:sid/ProQ{%}3Apsycinfo{&}rft{_}val{_}fmt=info:ofi/fmt:kev:mtx:journal{&}rft.
genre=article{&}rft.
[13] Marjaana Hovi, Olli Pitkänen, and Virpi Kristiina Tuunainen. In 22nd Bled eConference eEnablement:Facilitating an Open, Effective and Representative eSociety, page 17, Slovenia, 2009.
[14] Michael C. James. A COMPARATIVE ANALYSIS OF THE RIGHT TO PRIVACY IN THE UNITED STATES, CANADA AND EUROPE Michael. Connecticut Journal of International Law, 29(2):257–300, 2013. ISSN 02729490. doi:10.3366/ajicl.2011.0005.
[15] Sangeeta Kumari and Shailendra Singh. A Critical Analysis of Privacy and Security on Social Media. 2015 Fifth International Conference on Communication Systems and Network Technologies, pages 602–608, 2015. doi: 10.1109/
CSNT.2015.21. URL http://ieeexplore.ieee.org/document/7279989/.
[16] Kai Li, Zhangxi Lin, and Xiaowen Wang. An empirical analysis of users’ privacy disclosuren behaviors on social network sites. Information and Management, 52(7):882–891, 2015.ISSN 03787206. doi: 10.1016/j.im.2015.07.
006. URL http://dx.doi.org/10.1016/j.im.2015.07.006.
[17] L Li and K Qian. Using Real-Time Fear Appeals to Improve Social Media Security. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2:610–611, 2016. ISSN 07303157. doi: 10.1109/COMPSAC.2016.217.
[18] Rob Normey. Privacy in Canada. LawNow, 1 (33):8, 2012.
[19] RBS. Social Media âAS What are your privacy risks?, 2012. URL https://www.riskbasedsecurity.com/2012/09/myprivacy-audit/.
[20] Hemamali Tennakoon. Information security and privacy in social media: The threat landscape. Implications of social media use in personal and professional settings., pages 73–101, 2015. doi: 10.4018/978-1-4666-8614-4.ch085. URL
http://ovidsp.ovid.com/ovidweb.cgi?T=JS{&}PAGE=reference{&}D=psyc12{&}NEWS=N{&}AN=2015-24113-004.
[21] Leanne Townsend and Claire Wallace. Social Media Research: A Guide to Ethics. Economic and Social Research Council, pages 1–16, 2016.
[22] J. L Williams. Privacy in The Age of The Internetof Things. Human Rights, 4(14):6, 2016.
[23] Jensen Zhao and Sherry Y. Zhao. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study. Journal of Education for Business, 90(8):458–466, 2015.ISSN 0883-2323. doi: 10.1080/08832323.2015.1095705. URL http://www.tandfonline.com/doi/full/10.1080/08832323.2015.1095705.ISeCure