Abstract is missing.
- Privacy: What Are We Actually Talking About? - A Multidisciplinary ApproachPhilip Schütz, Michael Friedewald. 1-14 [doi]
- Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital WorldManuela Berg, Katrin Borcea-Pfitzmann. 15-26 [doi]
- Towards a Formal Language for Privacy OptionsStefan Berthold. 27-40 [doi]
- Using Game Theory to Analyze Risk to Privacy: An Initial InsightLisa Rajbhandari, Einar Snekkenes. 41-51 [doi]
- A Taxonomy of Privacy and Security Risks Contributing FactorsEbenezer Paintsil, Lothar Fritsch. 52-63 [doi]
- ETICA Workshop on Computer Ethics: Exploring Normative IssuesBernd Carsten Stahl, Catherine Flick. 64-77 [doi]
- Contextualised Concerns: The Online Privacy Attitudes of Young AdultsMichael Dowd. 78-89 [doi]
- Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating RightsNorberto Nuno Gomes de Andrade. 90-107 [doi]
- That! - How Unintended Consequences Can Hijack Good Privacy and Security PoliciesThomas P. Keenan. 108-119 [doi]
- Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of ConcernsSebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann de Meer, Günter Müller. 120-129 [doi]
- Security Levels for Web Authentication Using Mobile PhonesAnna Vapen, Nahid Shahmehri. 130-143 [doi]
- Challenges of eID Interoperability: The STORK ProjectHerbert Leitold. 144-150 [doi]
- Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity CardHarald Zwingelberg. 151-163 [doi]
- A Smart Card Based Solution for User-Centric Identity ManagementJan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens. 164-177 [doi]
- The Uncanny Valley Everywhere? On Privacy Perception and Expectation ManagementBibi van den Berg. 178-191 [doi]
- 50 Ways to Break RFID PrivacyTon van Deursen. 192-205 [doi]
- The Limits of Control - (Governmental) Identity Management from a Privacy PerspectiveStefan Strauß. 206-218 [doi]
- Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted LivingPeter Rothenpieler, Claudia Becker, Stefan Fischer. 219-230 [doi]
- Privacy Settings in Social Networking Sites: Is It Fair?Aleksandra Kuczerawy, Fanny Coudert. 231-243 [doi]
- Privacy Effects of Web Bugs Amplified by Web 2.0Jaromir Dobias. 244-257 [doi]
- A Conceptual Model for Privacy Policies with Consent and Revocation RequirementsMarco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou. 258-270 [doi]
- Applying Formal Methods to Detect and Resolve Ambiguities in Privacy RequirementsIoannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou. 271-282 [doi]
- A Decision Support System for Design for PrivacySiani Pearson, Azzedine Benameur. 283-296 [doi]
- A Multi-privacy Policy Enforcement SystemKaniz Fatema, David W. Chadwick, Stijn F. Lievens. 297-310 [doi]
- Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?Periambal L. Coopamootoo, Debi Ashenden. 311-324 [doi]
- PrimeLife Checkout - - A Privacy-Enabling e-Shopping User InterfaceUlrich König. 325-337 [doi]
- Towards Displaying Privacy Information with IconsLeif-Erik Holtz, Katharina Nocun, Marit Hansen. 338-348 [doi]
- Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information SocietyHannes Federrath, Marit Hansen, Michael Waidner. 349-352 [doi]