privacy
→
ReceivesAction
→
protected
|
0.76
|
|
privacy
→
ReceivesAction
→
guaranteed
|
0.72
|
|
privacy
→
ReceivesAction
→
maintained
|
0.72
|
|
privacy
→
ReceivesAction
→
breached
|
0.65
|
|
privacy
→
ReceivesAction
→
respected
|
0.64
|
|
privacy
→
ReceivesAction
→
compromised
|
0.61
|
|
privacy
→
ReceivesAction
→
respected at time
|
0.57
|
|
privacy
→
ReceivesAction
→
expected
|
0.55
|
|
privacy
→
ReceivesAction
→
kept confidential
|
0.55
|
|
privacy
→
ReceivesAction
→
threatened
|
0.53
|
|
privacy
→
ReceivesAction
→
required
|
0.52
|
|
privacy
→
ReceivesAction
→
achieved
|
0.49
|
|
privacy
→
ReceivesAction
→
addressed
|
0.45
|
|
privacy
→
ReceivesAction
→
limited
|
0.44
|
|
privacy
→
ReceivesAction
→
discussed
|
0.44
|
|
privacy
→
ReceivesAction
→
invaded
|
0.42
|
|
privacy
→
ReceivesAction
→
connected
|
0.41
|
|
privacy
→
ReceivesAction
→
important to individual
|
0.40
|
|
privacy
→
ReceivesAction
→
considered for any design
|
0.40
|
|
privacy
→
ReceivesAction
→
desired
|
0.38
|
|
privacy
→
ReceivesAction
→
enforced
|
0.37
|
|
privacy
→
ReceivesAction
→
recognized as right
|
0.37
|
|
privacy
→
ReceivesAction
→
considered in implementation
|
0.36
|
|
privacy
→
ReceivesAction
→
protected at time
|
0.36
|
|
privacy
→
ReceivesAction
→
created
|
0.36
|
|
privacy
→
ReceivesAction
→
lost
|
0.35
|
|
privacy
→
ReceivesAction
→
supported by the law
|
0.35
|
|
privacy
→
ReceivesAction
→
violated
|
0.34
|
|
privacy
→
ReceivesAction
→
associated with image
|
0.34
|
|
privacy
→
ReceivesAction
→
left alone
|
0.34
|
|
privacy
→
ReceivesAction
→
never be compromised
|
0.34
|
|
privacy
→
ReceivesAction
→
protected by the fourth amendme…
|
0.34
|
|
privacy
→
ReceivesAction
→
designed into the product
|
0.32
|
|
privacy
→
ReceivesAction
→
good for business
|
0.32
|
|
privacy
→
ReceivesAction
→
built into system
|
0.31
|
|
privacy
→
ReceivesAction
→
collected
|
0.31
|
|
privacy
→
ReceivesAction
→
diminished
|
0.31
|
|
privacy
→
ReceivesAction
→
encrypted
|
0.31
|
|
privacy
→
ReceivesAction
→
guaranteed by the indian consti…
|
0.31
|
|
privacy
→
ReceivesAction
→
incorporated into technology
|
0.31
|
|
privacy
→
ReceivesAction
→
posed by government agencies
|
0.31
|
|
privacy
→
ReceivesAction
→
shared
|
0.31
|
|
privacy
→
ReceivesAction
→
important to llc
|
0.29
|
|
privacy
→
ReceivesAction
→
offered by bitcoin
|
0.29
|
|
privacy
→
ReceivesAction
→
protected by government
|
0.29
|
|
privacy
→
ReceivesAction
→
raised
|
0.29
|
|
privacy
→
ReceivesAction
→
enhanced
|
0.28
|
|
privacy
→
ReceivesAction
→
associated with the images of a…
|
0.28
|
|
privacy
→
ReceivesAction
→
caused by dissemination of pers…
|
0.28
|
|
privacy
→
ReceivesAction
→
committed to protecting custome…
|
0.28
|
|
privacy
→
ReceivesAction
→
involved in getting phone numbe…
|
0.28
|
|
privacy
→
ReceivesAction
→
linked
|
0.28
|
|
privacy
→
ReceivesAction
→
reduced to singular essence
|
0.28
|
|
privacy
→
ReceivesAction
→
requested
|
0.28
|
|
privacy
→
ReceivesAction
→
misunderstood
|
0.27
|
|
privacy
→
ReceivesAction
→
ignored
|
0.26
|
|
privacy
→
ReceivesAction
→
alluded in the european convent…
|
0.25
|
|
privacy
→
ReceivesAction
→
avoided
|
0.25
|
|
privacy
→
ReceivesAction
→
changed
|
0.25
|
|
privacy
→
ReceivesAction
→
developed by dr. ann cavoukian
|
0.25
|
|
privacy
→
ReceivesAction
→
earned
|
0.25
|
|
privacy
→
ReceivesAction
→
emphasized throughout the course
|
0.25
|
|
privacy
→
ReceivesAction
→
granted
|
0.25
|
|
privacy
→
ReceivesAction
→
granted by applicable data prot…
|
0.25
|
|
privacy
→
ReceivesAction
→
guaranteed by article 7 of the …
|
0.25
|
|
privacy
→
ReceivesAction
→
incorporated at the level of pr…
|
0.25
|
|
privacy
→
ReceivesAction
→
incorporated into data systems
|
0.25
|
|
privacy
→
ReceivesAction
→
posed by online surveillance
|
0.25
|
|
privacy
→
ReceivesAction
→
posed by social media
|
0.25
|
|
privacy
→
ReceivesAction
→
protected at any cost
|
0.25
|
|
privacy
→
ReceivesAction
→
protected by act
|
0.25
|
|
privacy
→
ReceivesAction
→
restored
|
0.25
|
|
privacy
→
ReceivesAction
→
situated upon narrow stretch of…
|
0.25
|
|
privacy
→
ReceivesAction
→
traded for service
|
0.25
|
|
privacy
→
ReceivesAction
→
affected
|
0.25
|
|
privacy
→
ReceivesAction
→
aimed at sexual orientation
|
0.25
|
|
privacy
→
ReceivesAction
→
implicated by use
|
0.22
|
|
privacy
→
ReceivesAction
→
reached
|
0.21
|
|
privacy
→
ReceivesAction
→
aimed at national origin
|
0.19
|
|
privacy
→
ReceivesAction
→
aimed at religious views
|
0.19
|
|
privacy
→
ReceivesAction
→
guaranteed with bar
|
0.19
|
|
privacy
→
ReceivesAction
→
guaranteed with private lounge
|
0.19
|
|
privacy
→
ReceivesAction
→
overrated
|
0.19
|
|
privacy
→
ReceivesAction
→
rendered obsolete
|
0.19
|
|
privacy
→
ReceivesAction
→
sacrificed for security
|
0.19
|
|
privacy
→
ReceivesAction
→
compromised by human error
|
0.16
|
|
privacy
→
ReceivesAction
→
coupled with the best resort am…
|
0.16
|
|
privacy
→
ReceivesAction
→
guaranteed with private recepti…
|
0.16
|
|
privacy
→
ReceivesAction
→
invaded by officer
|
0.16
|
|
privacy
→
ReceivesAction
→
misdirected
|
0.16
|
|
privacy
→
ReceivesAction
→
protected by thick walls
|
0.16
|
|
privacy
→
ReceivesAction
→
rejuvenated
|
0.16
|
|
privacy
→
ReceivesAction
→
violated by company
|
0.16
|
|
privacy
→
ReceivesAction
→
intended to establish agreement
|
0.13
|
|
privacy
→
ReceivesAction
→
intended to establish any oblig…
|
0.13
|
|