P. Schütz and M. , Friedewald Implementability of the Identity Management Part in Pfitzmann/Hansen's Terminology for a Complex Digital World, p.15

M. Berg, K. Borcea, and .. , Pfitzmann Privacy Metrics Towards a Formal Language for Privacy Options, p.27

L. Rajbhandari and E. , Arthur Snekkenes A Taxonomy of Privacy and Security Risks Contributing Factors, p.52

E. Paintsil and L. F. Ethical, Social, and Legal Aspects ETICA Workshop on Computer Ethics: Exploring Normative Issues, p.64

B. C. Stahl, C. Flick-contextualised-concerns, and .. , The Online Privacy Attitudes of Young Adults, p.78

N. Nuno-gomes-de-andrade and .. , Data Protection and Identity Management Oops -We Didn't Mean to Do That! ? How Unintended Consequences Can Hijack Good Privacy and Security Policies

P. Thomas and X. Keenan, Table of Contents Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns, p.120

S. Haas, R. Herkenhöner, and D. Royer, Ammar Alkassar, Hermann de Meer, and Günter Müller Security Levels for Web Authentication Using Mobile Phones, p.130

A. Vapen and N. , Shahmehri eID Cards and eID Interoperability Challenges of eID Interoperability: The STORK Project (Keynote), p.144

J. Vossaert, P. Verhaeghe, and .. , 178 Bibi van den Berg 50 Ways to Break RFID Privacy 192 Ton van Deursen Privacy for eGovernment and AAL Applications The Limits of Control ? (Governmental) Identity Management from a Privacy Perspective, 206 Stefan Strauß Privacy Concerns in a Remote Monitoring and Social Networking Platform for Assisted 219 Peter Rothenpieler, Claudia Becker, and Stefan Fischer Social Networks and Privacy Privacy Settings in Social Networking Sites: Is It Fair, p.231

A. Kuczerawy and F. , Coudert Privacy Effects of Web Bugs Amplified by Web 2, p.244

S. Marco-casassa-mont, S. Pearson, .. Creese, and .. For-privacy, Michael Goldsmith, and Nick Papanikolaou Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements, 271 Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, and Nick Papanikolaou A Decision Support System for Design, p.283

K. Fatema and W. David, Chadwick, and Stijn Lievens Usable Privacy Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?, 311 Periambal L. Coopamootoo and Debi Ashenden

P. Checkout, ?. Privacy-enabling-e-shopping-user-interface, and .. , 325 Ulrich König Towards Displaying Privacy Information with Icons, p.338

L. Holtz, K. Nocun, M. Hansen-obituary-andreas-pfitzmann, and .. , Pioneer of Technical Privacy Protection in the Information Society, 349 Hannes Federrath, Marit Hansen, and Michael Waidner, 1958.