{"title":"How Did Data Privacy Change Over Time?","authors":"C. Bowen","doi":"10.1201/9781003122043-2","DOIUrl":"https://doi.org/10.1201/9781003122043-2","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why Is Data Privacy Important?","authors":"C. Bowen","doi":"10.1201/9781003122043-1","DOIUrl":"https://doi.org/10.1201/9781003122043-1","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Data Privacy Laws Exist?","authors":"C. Bowen","doi":"10.1201/9781003122043-6","DOIUrl":"https://doi.org/10.1201/9781003122043-6","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Is the Future of Data Privacy?","authors":"C. Bowen","doi":"10.1201/9781003122043-7","DOIUrl":"https://doi.org/10.1201/9781003122043-7","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129435513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do Data Privacy Methods Avoid Invalidating Results?","authors":"C. Bowen","doi":"10.1201/9781003122043-4","DOIUrl":"https://doi.org/10.1201/9781003122043-4","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122673586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Makes Datasets Difficult for Data Privacy?","authors":"C. Bowen","doi":"10.1201/9781003122043-5","DOIUrl":"https://doi.org/10.1201/9781003122043-5","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122490680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do Data Privacy Methods Expand Access to Data?","authors":"C. Bowen","doi":"10.1201/9781003122043-3","DOIUrl":"https://doi.org/10.1201/9781003122043-3","url":null,"abstract":"","PeriodicalId":363679,"journal":{"name":"Protecting Your Privacy in a Data-Driven World","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127479699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}