Consumer and business practices and trends Database issues in privacy protection Economic impact analysis Encryption, authentication, and access control File and file system security and privacy Global issues Hacking and corruptions Identity and privacy confidentiality Peer-to-Peer computing Relationships and trade-offs between security and privacy Security and privacy techniques, management, and protocols Tools, techniques, methods, and frameworks Trends and new developments