{"title":"South American Regulations","authors":"","doi":"10.1002/9781119660156.ch9","DOIUrl":"https://doi.org/10.1002/9781119660156.ch9","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and Cybersecurity","authors":"","doi":"10.1002/9781119660156.part3","DOIUrl":"https://doi.org/10.1002/9781119660156.part3","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A (Very) Brief History of Privacy","authors":"","doi":"10.1002/9781119660156.ch2","DOIUrl":"https://doi.org/10.1002/9781119660156.ch2","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome to the Future! Now, Go Home!","authors":"","doi":"10.1002/9781119660156.ch20","DOIUrl":"https://doi.org/10.1002/9781119660156.ch20","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy‐Centric Cybersecurity Program Overview","authors":"","doi":"10.1002/9781119660156.ch12","DOIUrl":"https://doi.org/10.1002/9781119660156.ch12","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Regulations","authors":"","doi":"10.1002/9781119660156.ch4","DOIUrl":"https://doi.org/10.1002/9781119660156.ch4","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Legal Case for Privacy (the Finer Print)","authors":"","doi":"10.1002/9781119660156.ch3","DOIUrl":"https://doi.org/10.1002/9781119660156.ch3","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"North American Regulations","authors":"","doi":"10.1002/9781119660156.ch5","DOIUrl":"https://doi.org/10.1002/9781119660156.ch5","url":null,"abstract":"","PeriodicalId":413594,"journal":{"name":"Privacy, Regulations, and Cybersecurity","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}