Abstract is missing.
- Social and Political Dimensions of IdentityCharles D. Raab. 3-19 [doi]
- A Forensic Framework for Tracing PhishersSebastian Gajek, Ahmad-Reza Sadeghi. 23-35 [doi]
- The growing problem of Internet data persistenceThomas P. Keenan. 37-50 [doi]
- Privacy in Danger: Let's Google Your PrivacyEmin Islam Tatli. 51-59 [doi]
- Self, Script, and Situation: identity in a world of ICTsBibi van den Berg. 63-76 [doi]
- Moral identification in Identity Management SystemsNoëmi Manders-Huits, Jeroen van den Hoven. 77-91 [doi]
- Regulating a complex social construct in a Virtual WorldRonald Leenes. 95-112 [doi]
- Young People's Gender and Identity Work in a Swedish Internet CommunityMalin Sveningsson Elm. 113-126 [doi]
- Privacy implications of RFID: an assessment of threats and opportunitesMarc van Lieshout, Linda Kool. 129-141 [doi]
- Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID TagsMarkus Hansen, Sebastian Meissner. 143-150 [doi]
- Security versus EthicsVikas Kumar. 151-157 [doi]
- The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking ApplicationsStefan Weiss. 161-171 [doi]
- Authentication and Transaction Security in E-businessLorenz Müller. 175-197 [doi]
- Marrying Transparency Tools with User-Controlled Identity ManagementMarit Hansen. 199-220 [doi]
- Identity Deployment and Management in Wireless Mesh NetworksLeonardo A. Martucci, Albin Zuccato, Simone Fischer-Hübner. 223-233 [doi]
- Automating Identity Management and Access ControlRieks Joosten, Stef Joosten. 235-243 [doi]
- Privacy-friendly Identity Management in eGovernmentXavier Huysmans. 245-258 [doi]
- Generic Predefined Privacy Preferences for Online ApplicationsMike Bergmann. 259-273 [doi]
- Data Protection and the Use of Biometric Data in the EUAnnemarie Sprokkereef. 277-284 [doi]
- Using Identity-Based Public-Key Cryptography with Images to Preserve PrivacySebastian Pape, Nabil Benamar. 299-310 [doi]
- Traffic Flow Confidentiality in IPsec: Protocol and ImplementationCsaba Király, Simone Teofili, Giuseppe Bianchi, Renato Lo Cigno, Matteo Nardelli, Emanuele Delzeri. 311-324 [doi]
- On the Fundamentals of Anonymity MetricsChrister Andersson, Reine Lundin. 325-341 [doi]
- A Model-based Analysis of Tunability in Privacy ServicesReine Lundin, Stefan Lindskog, Anna Brunstrom. 343-356 [doi]
- Desi Manifestations and RegulationRowena Rodrigues. 359-374 [doi]
- ICT and Social Work: a Question of Identities?Véronique Laurent. 375-386 [doi]
- Introduction of a ModelRieks Joosten, Diane Whitehouse, Penny Duquenoy. 389-403 [doi]
- An identification modelCristina Denisa Neagu. 407-421 [doi]
- Lessons to Learn from a Large Automotive CompanyNouha Taifi. 423-429 [doi]
- What's in it for Organisations?Denis Royer. 433-446 [doi]
- Privacy and Data Protection in a User-Centric Business Model for Telecommunications ServicesJuan C. Yelmo, José M. del Álamo, Rubén Trapero. 447-461 [doi]