A Problem-Based Approach for Computer-Aided Privacy Threat Identification.- Conceptual Framework and Architecture for Privacy Audit.- Privacy-Preserving Computation.- Designing Privacy-by-Design.- Enhancing Privacy by Design from a Developer’s Perspective.- A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design.- Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.- Federated Identity as Capabilities.- Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials.- Collection and Storage of Personal Data: A Critical View on Current Practices in the Transportation Sector.- ICT and Privacy: Barriers.- A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks.- Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.