Abstract is missing.
- The German Constitutional Court Judgment on Data Retention: Proportionality Overrides Unlimited Surveillance (Doesn't It?)Katja De Vries, Rocco Bellanova, Paul De Hert, Serge Gutwirth. 3-23 [doi]
- Property in Personal Data: Second Life of an Old Idea in the Age of Cloud Computing, Chain Informatisation, and Ambient IntelligenceNadezhda Purtova. 39-64 [doi]
- Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal ConceptualizationNorberto Nuno Gomes de Andrade. 65-97 [doi]
- Frames from the Life and Death of Jean Charles de MenezesAmos Bianchi, Denis J. Roio. 101-109 [doi]
- Regulating Privacy: Vocabularies of Motive in Legislating Right of Access to Criminal Records in SwedenChristel Backman. 111-137 [doi]
- Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented ContradictionsJohann Cas. 139-169 [doi]
- EU PNR: European Flight Passengers Under General Suspicion - The Envisaged European Model of Analyzing Flight Passenger DataFranziska Boehm. 171-199 [doi]
- Options for Securing PCs Against Phishing and Espionage: A Report from the EU-Project "Open Trusted Computing"Arnd Weber, Dirk Weber. 201-207 [doi]
- Keeping Up Appearances: Audience Segregation in Social Network SitesBibi van den Berg, Ronald Leenes. 211-231 [doi]
- Avatars Out of Control: Gazira Babeli, Pose Balls and "Rape" in Second LifeKatja De Vries. 233-250 [doi]
- Privacy as a Practice: Exploring the Relational and Spatial Dynamics of HIV-Related Information SeekingFadhila Mazanderani, Ian Brown. 251-268 [doi]
- Rise and Phall: Lessons from the Phorm SagaPaul Bernal. 269-283 [doi]
- Disclosing or Protecting? Teenagers' Online Self-DisclosureMichel Walrave, Wannes Heirman. 285-307 [doi]
- Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much TimeJohn J. Borking. 309-341 [doi]
- Can a Cloud Be Really Secure? A Socratic DialogueGurpreet Dhillon, Ella Kolkowska. 345-360 [doi]
- Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and PracticeJoep Ruiter, Martijn Warnier. 361-376 [doi]
- Data Protection in the CloudsYves Poullet, Jean-Marc Van Gyseghem, Jean-Philippe Moiny, Jacques GĂ©rard, Claire Gayrel. 377-409 [doi]
- Privacy-Preserving Data Mining from Outsourced DatabasesFosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang. 411-426 [doi]
- PerfCloud Case StudyValentina Casola, Raffaele Lettiero, Massimiliano Rak, Umberto Villano. 427-444 [doi]
- Security and Privacy in the Clouds: A Bird's Eye ViewWolter Pieters. 445-457 [doi]