| privacy → ReceivesAction → protected | 0.76 | |
| privacy → ReceivesAction → guaranteed | 0.72 | |
| privacy → ReceivesAction → maintained | 0.72 | |
| privacy → ReceivesAction → breached | 0.65 | |
| privacy → ReceivesAction → respected | 0.64 | |
| privacy → ReceivesAction → compromised | 0.61 | |
| privacy → ReceivesAction → respected at time | 0.57 | |
| privacy → ReceivesAction → expected | 0.55 | |
| privacy → ReceivesAction → kept confidential | 0.55 | |
| privacy → ReceivesAction → threatened | 0.53 | |
| privacy → ReceivesAction → required | 0.52 | |
| privacy → ReceivesAction → achieved | 0.49 | |
| privacy → ReceivesAction → addressed | 0.45 | |
| privacy → ReceivesAction → limited | 0.44 | |
| privacy → ReceivesAction → discussed | 0.44 | |
| privacy → ReceivesAction → invaded | 0.42 | |
| privacy → ReceivesAction → connected | 0.41 | |
| privacy → ReceivesAction → important to individual | 0.40 | |
| privacy → ReceivesAction → considered for any design | 0.40 | |
| privacy → ReceivesAction → desired | 0.38 | |
| privacy → ReceivesAction → enforced | 0.37 | |
| privacy → ReceivesAction → recognized as right | 0.37 | |
| privacy → ReceivesAction → considered in implementation | 0.36 | |
| privacy → ReceivesAction → protected at time | 0.36 | |
| privacy → ReceivesAction → created | 0.36 | |
| privacy → ReceivesAction → lost | 0.35 | |
| privacy → ReceivesAction → supported by the law | 0.35 | |
| privacy → ReceivesAction → violated | 0.34 | |
| privacy → ReceivesAction → associated with image | 0.34 | |
| privacy → ReceivesAction → left alone | 0.34 | |
| privacy → ReceivesAction → never be compromised | 0.34 | |
| privacy → ReceivesAction → protected by the fourth amendme… | 0.34 | |
| privacy → ReceivesAction → designed into the product | 0.32 | |
| privacy → ReceivesAction → good for business | 0.32 | |
| privacy → ReceivesAction → built into system | 0.31 | |
| privacy → ReceivesAction → collected | 0.31 | |
| privacy → ReceivesAction → diminished | 0.31 | |
| privacy → ReceivesAction → encrypted | 0.31 | |
| privacy → ReceivesAction → guaranteed by the indian consti… | 0.31 | |
| privacy → ReceivesAction → incorporated into technology | 0.31 | |
| privacy → ReceivesAction → posed by government agencies | 0.31 | |
| privacy → ReceivesAction → shared | 0.31 | |
| privacy → ReceivesAction → important to llc | 0.29 | |
| privacy → ReceivesAction → offered by bitcoin | 0.29 | |
| privacy → ReceivesAction → protected by government | 0.29 | |
| privacy → ReceivesAction → raised | 0.29 | |
| privacy → ReceivesAction → enhanced | 0.28 | |
| privacy → ReceivesAction → associated with the images of a… | 0.28 | |
| privacy → ReceivesAction → caused by dissemination of pers… | 0.28 | |
| privacy → ReceivesAction → committed to protecting custome… | 0.28 | |
| privacy → ReceivesAction → involved in getting phone numbe… | 0.28 | |
| privacy → ReceivesAction → linked | 0.28 | |
| privacy → ReceivesAction → reduced to singular essence | 0.28 | |
| privacy → ReceivesAction → requested | 0.28 | |
| privacy → ReceivesAction → misunderstood | 0.27 | |
| privacy → ReceivesAction → ignored | 0.26 | |
| privacy → ReceivesAction → alluded in the european convent… | 0.25 | |
| privacy → ReceivesAction → avoided | 0.25 | |
| privacy → ReceivesAction → changed | 0.25 | |
| privacy → ReceivesAction → developed by dr. ann cavoukian | 0.25 | |
| privacy → ReceivesAction → earned | 0.25 | |
| privacy → ReceivesAction → emphasized throughout the course | 0.25 | |
| privacy → ReceivesAction → granted | 0.25 | |
| privacy → ReceivesAction → granted by applicable data prot… | 0.25 | |
| privacy → ReceivesAction → guaranteed by article 7 of the … | 0.25 | |
| privacy → ReceivesAction → incorporated at the level of pr… | 0.25 | |
| privacy → ReceivesAction → incorporated into data systems | 0.25 | |
| privacy → ReceivesAction → posed by online surveillance | 0.25 | |
| privacy → ReceivesAction → posed by social media | 0.25 | |
| privacy → ReceivesAction → protected at any cost | 0.25 | |
| privacy → ReceivesAction → protected by act | 0.25 | |
| privacy → ReceivesAction → restored | 0.25 | |
| privacy → ReceivesAction → situated upon narrow stretch of… | 0.25 | |
| privacy → ReceivesAction → traded for service | 0.25 | |
| privacy → ReceivesAction → affected | 0.25 | |
| privacy → ReceivesAction → aimed at sexual orientation | 0.25 | |
| privacy → ReceivesAction → implicated by use | 0.22 | |
| privacy → ReceivesAction → reached | 0.21 | |
| privacy → ReceivesAction → aimed at national origin | 0.19 | |
| privacy → ReceivesAction → aimed at religious views | 0.19 | |
| privacy → ReceivesAction → guaranteed with bar | 0.19 | |
| privacy → ReceivesAction → guaranteed with private lounge | 0.19 | |
| privacy → ReceivesAction → overrated | 0.19 | |
| privacy → ReceivesAction → rendered obsolete | 0.19 | |
| privacy → ReceivesAction → sacrificed for security | 0.19 | |
| privacy → ReceivesAction → compromised by human error | 0.16 | |
| privacy → ReceivesAction → coupled with the best resort am… | 0.16 | |
| privacy → ReceivesAction → guaranteed with private recepti… | 0.16 | |
| privacy → ReceivesAction → invaded by officer | 0.16 | |
| privacy → ReceivesAction → misdirected | 0.16 | |
| privacy → ReceivesAction → protected by thick walls | 0.16 | |
| privacy → ReceivesAction → rejuvenated | 0.16 | |
| privacy → ReceivesAction → violated by company | 0.16 | |
| privacy → ReceivesAction → intended to establish agreement | 0.13 | |
| privacy → ReceivesAction → intended to establish any oblig… | 0.13 |