abs | rel | |
---|---|---|
Human activities | 1131 | 87.7% |
Politics | 940 | 72.9% |
Government | 897 | 69.6% |
Law | 788 | 61.1% |
Privacy | 780 | 60.5% |
Public sphere | 726 | 56.3% |
Justice | 718 | 55.7% |
Technology | 631 | 49.0% |
Social institutions | 629 | 48.8% |
Policy | 602 | 46.7% |
Artificial intelligence | 510 | 39.6% |
Surveillance | 478 | 37.1% |
Applied ethics | 462 | 35.8% |
Information privacy | 438 | 34.0% |
Issues in ethics | 437 | 33.9% |
Social media | 369 | 28.6% |
Facial recognition system | 367 | 28.5% |
Risk | 363 | 28.2% |
Personal data | 356 | 27.6% |
General Data Protection Regulation | 354 | 27.5% |
Biometrics | 351 | 27.2% |
National security | 349 | 27.1% |
Information | 329 | 25.5% |
Computing | 322 | 25.0% |
Computer security | 321 | 24.9% |
Internet | 314 | 24.4% |
Human rights | 288 | 22.3% |
Research | 274 | 21.3% |
Crime | 261 | 20.2% |
Communication | 258 | 20.0% |
Social issues | 256 | 19.9% |
Rights | 249 | 19.3% |
Information technology | 214 | 16.6% |
Transparency (behavior) | 212 | 16.4% |
Regulatory compliance | 211 | 16.4% |
Accountability | 182 | 14.1% |
Culture | 182 | 14.1% |
Governance | 180 | 14.0% |
Privacy law | 177 | 13.7% |
Freedom of speech | 175 | 13.6% |
Identity document | 173 | 13.4% |
Ethical principles | 170 | 13.2% |
Public law | 168 | 13.0% |
Ethics | 160 | 12.4% |
News | 154 | 11.9% |
Bias | 151 | 11.7% |
Democracy | 139 | 10.8% |
Closed-circuit television | 138 | 10.7% |
Machine learning | 134 | 10.4% |
Mass media | 134 | 10.4% |
Advertising | 133 | 10.3% |
Disinformation | 131 | 10.2% |
Security | 131 | 10.2% |
Personally identifiable information | 129 | 10.0% |
Cyberwarfare | 126 | 9.8% |
System | 126 | 9.8% |
Discrimination | 125 | 9.7% |
Data | 124 | 9.6% |
Internet of things | 123 | 9.5% |
Virtue | 120 | 9.3% |
Authentication | 117 | 9.1% |
Fake news | 116 | 9.0% |
Information Age | 115 | 8.9% |
Cyberspace | 114 | 8.8% |
Automation | 112 | 8.7% |
Fingerprint | 106 | 8.2% |
Innovation | 102 | 7.9% |
Government and personhood | 101 | 7.8% |
Right to privacy | 99 | 7.7% |
Data Protection Directive | 98 | 7.6% |
Business | 96 | 7.4% |
Misinformation | 96 | 7.4% |
Cyberattack | 94 | 7.3% |
Branches of science | 92 | 7.1% |
Database | 90 | 7.0% |
European Union law | 88 | 6.8% |
Computer network | 86 | 6.7% |
Decision-making | 85 | 6.6% |
Political science | 85 | 6.6% |
Mass surveillance | 84 | 6.5% |
Audit | 83 | 6.4% |
Consent | 82 | 6.4% |
Intelligence | 82 | 6.4% |
Big data | 81 | 6.3% |
Deepfake | 81 | 6.3% |
Information security | 79 | 6.1% |
Journalism | 79 | 6.1% |
European Convention on Human Rights | 75 | 5.8% |
Border control | 74 | 5.7% |
Data retention | 74 | 5.7% |
Health | 73 | 5.7% |
Algorithm | 71 | 5.5% |
Common law | 71 | 5.5% |
Contract | 68 | 5.3% |
Analytics | 67 | 5.2% |
Employment | 67 | 5.2% |
Civil rights and liberties | 66 | 5.1% |
Cybercrime | 66 | 5.1% |
Privacy policy | 65 | 5.0% |
Internet privacy | 64 | 5.0% |
Directive (European Union) | 63 | 4.9% |
Law enforcement | 63 | 4.9% |
Education | 61 | 4.7% |
Fact-checking | 61 | 4.7% |
Crime prevention | 60 | 4.7% |
Cloud computing | 59 | 4.6% |
Fourth Amendment to the United States Constitution | 59 | 4.6% |
Prosecutor | 59 | 4.6% |
Criminal law | 57 | 4.4% |
Safety | 57 | 4.4% |
Vulnerability (computing) | 57 | 4.4% |
Anonymity | 56 | 4.3% |
Criminal justice | 55 | 4.3% |
Algorithmic bias | 54 | 4.2% |
Autonomy | 53 | 4.1% |
Cognitive science | 53 | 4.1% |
Discovery (law) | 53 | 4.1% |
Information sensitivity | 53 | 4.1% |
Treaty | 53 | 4.1% |
COVID-19 pandemic | 52 | 4.0% |
Accuracy and precision | 51 | 4.0% |
Evaluation | 51 | 4.0% |
Arrest | 50 | 3.9% |
Election | 50 | 3.9% |
Propaganda | 50 | 3.9% |
Censorship | 49 | 3.8% |
Privacy and Electronic Communications Directive 2002 | 48 | 3.7% |
Self-driving car | 48 | 3.7% |
Society | 47 | 3.6% |
World Wide Web | 47 | 3.6% |
Charter of Fundamental Rights of the European Union | 46 | 3.6% |
Data laws | 45 | 3.5% |
Forensic science | 45 | 3.5% |
Iris recognition | 44 | 3.4% |
Member state of the European Union | 44 | 3.4% |
Mobile app | 44 | 3.4% |
Cognition | 43 | 3.3% |
Concepts in metaphysics | 43 | 3.3% |
Schengen Area | 43 | 3.3% |
Encryption | 42 | 3.3% |
Fundamental rights | 42 | 3.3% |
Interoperability | 42 | 3.3% |
Travel visa | 42 | 3.3% |
U.S. state | 42 | 3.3% |
Identity theft | 41 | 3.2% |
International Covenant on Civil and Political Rights | 41 | 3.2% |
Rule of law | 41 | 3.2% |
Search warrant | 41 | 3.2% |
Unmanned aerial vehicle | 41 | 3.2% |
Freedom of the press | 40 | 3.1% |
Regulation | 40 | 3.1% |
Science | 40 | 3.1% |
Terrorism | 40 | 3.1% |
Behavior | 39 | 3.0% |
Deep learning | 39 | 3.0% |
Freedom of Information Act (United States) | 39 | 3.0% |
Information governance | 39 | 3.0% |
Malware | 39 | 3.0% |
Violence | 39 | 3.0% |
Privacy by design | 38 | 2.9% |
First Amendment to the United States Constitution | 37 | 2.9% |
Online advertising | 37 | 2.9% |
Robot | 37 | 2.9% |
Data analysis | 36 | 2.8% |
Filter bubble | 36 | 2.8% |
Fundamental rights in India | 36 | 2.8% |
Profiling (information science) | 35 | 2.7% |
Targeted advertising | 35 | 2.7% |
Best practice | 34 | 2.6% |
Information technology management | 34 | 2.6% |
Learning | 34 | 2.6% |
Automatic number-plate recognition | 33 | 2.6% |
Biometric passport | 33 | 2.6% |
DNA profiling | 33 | 2.6% |
Right to be forgotten | 33 | 2.6% |
Passport | 32 | 2.5% |
Risk management | 32 | 2.5% |
Search and seizure | 32 | 2.5% |
Citizenship | 31 | 2.4% |
Data Protection Act 1998 | 31 | 2.4% |
Hate speech | 31 | 2.4% |
Lawsuit | 31 | 2.4% |
Privacy Act of 1974 | 31 | 2.4% |
Privacy Impact Assessment | 31 | 2.4% |
Probable cause | 31 | 2.4% |
Treaty on European Union | 31 | 2.4% |
Consumer protection | 30 | 2.3% |
Expert | 30 | 2.3% |
Visa policy of the Schengen Area | 30 | 2.3% |
Immigration | 29 | 2.2% |
Market (economics) | 29 | 2.2% |
Money laundering | 29 | 2.2% |
Reason | 29 | 2.2% |
Access to information | 28 | 2.2% |
Data security | 28 | 2.2% |
Digital rights | 28 | 2.2% |
Human nature | 28 | 2.2% |
Telecommunication | 28 | 2.2% |
Blockchain | 27 | 2.1% |
Computer | 27 | 2.1% |
Fraud | 27 | 2.1% |
Online and offline | 27 | 2.1% |
Racial profiling | 27 | 2.1% |
Russian interference in the 2016 United States elections | 27 | 2.1% |
Training, validation, and test sets | 27 | 2.1% |
Type I and type II errors | 27 | 2.1% |
Data management | 26 | 2.0% |
Dignity | 26 | 2.0% |
Face | 26 | 2.0% |
Freedom of information laws by country | 26 | 2.0% |
Internet bot | 26 | 2.0% |
Counter-terrorism | 25 | 1.9% |
Criminal record | 25 | 1.9% |
De-identification | 25 | 1.9% |
Health Insurance Portability and Accountability Act | 25 | 1.9% |
Human | 25 | 1.9% |
Internet troll | 25 | 1.9% |
Police body camera | 25 | 1.9% |
Access control | 24 | 1.9% |
Constitution of the United States | 24 | 1.9% |
Donald Trump | 24 | 1.9% |
HTTP cookie | 24 | 1.9% |
Health care | 24 | 1.9% |
Informed consent | 24 | 1.9% |
Smart city | 24 | 1.9% |
Telephone tapping | 24 | 1.9% |
Authoritarianism | 23 | 1.8% |
Civil liberties | 23 | 1.8% |
Competition | 23 | 1.8% |
Data breach | 23 | 1.8% |
Defamation | 23 | 1.8% |
Emotion | 23 | 1.8% |
Jurisdiction | 23 | 1.8% |
Non-governmental organization | 23 | 1.8% |
Occupational safety and health | 23 | 1.8% |
Organization | 23 | 1.8% |
Proportionality (law) | 23 | 1.8% |
Risk assessment | 23 | 1.8% |
Schengen Information System | 23 | 1.8% |
Bill (law) | 22 | 1.7% |
Campaign advertising | 22 | 1.7% |
Carpenter v. United States | 22 | 1.7% |
FTC fair information practice | 22 | 1.7% |
Freedom of information | 22 | 1.7% |
Infrastructure | 22 | 1.7% |
Media pluralism | 22 | 1.7% |
Predictive policing | 22 | 1.7% |
Sustainability | 22 | 1.7% |
Vladimir Putin | 22 | 1.7% |
CE marking | 21 | 1.6% |
Espionage | 21 | 1.6% |
Evidence | 21 | 1.6% |
Gender | 21 | 1.6% |
Law and economics | 21 | 1.6% |
Phishing | 21 | 1.6% |
Public opinion | 21 | 1.6% |
Robotics | 21 | 1.6% |
Witness | 21 | 1.6% |
5G | 20 | 1.6% |
Civil society | 20 | 1.6% |
Cyber-security regulation | 20 | 1.6% |
Electronic Commerce Directive 2000 | 20 | 1.6% |
International law | 20 | 1.6% |
Metadata | 20 | 1.6% |
Pseudonymization | 20 | 1.6% |
Psychological concepts | 20 | 1.6% |
Race (human categorization) | 20 | 1.6% |
Reliability engineering | 20 | 1.6% |
Safety of journalists | 20 | 1.6% |
Social networking service | 20 | 1.6% |
Consumer privacy | 19 | 1.5% |
Economics | 19 | 1.5% |
Investigatory Powers Act 2016 | 19 | 1.5% |
Literacy | 19 | 1.5% |
Passenger name record | 19 | 1.5% |
Property | 19 | 1.5% |
Software | 19 | 1.5% |
Treaty on the Functioning of the European Union | 19 | 1.5% |
Universal Declaration of Human Rights | 19 | 1.5% |
Amazon Rekognition | 18 | 1.4% |
Assumption | 18 | 1.4% |
DNA database | 18 | 1.4% |
Data re-identification | 18 | 1.4% |
Echo chamber (media) | 18 | 1.4% |
Emergency management | 18 | 1.4% |
Expectation of privacy | 18 | 1.4% |
Foreign Intelligence Surveillance Act | 18 | 1.4% |
Information warfare | 18 | 1.4% |
Internet service provider | 18 | 1.4% |
Lawyer | 18 | 1.4% |
Leadership | 18 | 1.4% |
Management | 18 | 1.4% |
Password | 18 | 1.4% |
Political campaign | 18 | 1.4% |
Ransomware | 18 | 1.4% |
Standardization | 18 | 1.4% |
Artificial neural network | 17 | 1.3% |
Children's Online Privacy Protection Act | 17 | 1.3% |
Copyright | 17 | 1.3% |
Design | 17 | 1.3% |
Deterrence theory | 17 | 1.3% |
Fake news website | 17 | 1.3% |
Judgment (law) | 17 | 1.3% |
Net neutrality | 17 | 1.3% |
Notified body | 17 | 1.3% |
Prediction | 17 | 1.3% |
Radio-frequency identification | 17 | 1.3% |
Remand (detention) | 17 | 1.3% |
Right to privacy in New Zealand | 17 | 1.3% |
Smartphone | 17 | 1.3% |
Sustainable Development Goals | 17 | 1.3% |
Trust (social science) | 17 | 1.3% |
United States Code | 17 | 1.3% |
United States v. Jones | 17 | 1.3% |
Concentration of media ownership | 16 | 1.2% |
Confidentiality | 16 | 1.2% |
Copyright infringement | 16 | 1.2% |
Data portability | 16 | 1.2% |
Experiment | 16 | 1.2% |
Human rights defender | 16 | 1.2% |
Identity management | 16 | 1.2% |
Information broker | 16 | 1.2% |
Law enforcement techniques | 16 | 1.2% |
Psychology | 16 | 1.2% |
Racism | 16 | 1.2% |
Section 230 | 16 | 1.2% |
Strategic lawsuit against public participation | 16 | 1.2% |
Transparency of media ownership in Europe | 16 | 1.2% |
Voting | 16 | 1.2% |
Computer science | 15 | 1.2% |
Digital identity | 15 | 1.2% |
Digital media | 15 | 1.2% |
Information science | 15 | 1.2% |
Max Schrems | 15 | 1.2% |
Requirement | 15 | 1.2% |
Security technology | 15 | 1.2% |
User-generated content | 15 | 1.2% |
Value (ethics) | 15 | 1.2% |
Video | 15 | 1.2% |
Visa Information System | 15 | 1.2% |
Abuse | 14 | 1.1% |
Airport security | 14 | 1.1% |
Camera | 14 | 1.1% |
Damages | 14 | 1.1% |
Digital Services Act | 14 | 1.1% |
Digital forensics | 14 | 1.1% |
Edward Snowden | 14 | 1.1% |
Ethics of artificial intelligence | 14 | 1.1% |
Internet censorship | 14 | 1.1% |
Internet governance | 14 | 1.1% |
Judge | 14 | 1.1% |
Law enforcement agency | 14 | 1.1% |
Liberty | 14 | 1.1% |
Mark Zuckerberg | 14 | 1.1% |
Philosophy | 14 | 1.1% |
Tort | 14 | 1.1% |
Treaties of the European Union | 14 | 1.1% |
Verification and validation | 14 | 1.1% |
Area of freedom, security and justice | 13 | 1.0% |
Brexit | 13 | 1.0% |
COVID-19 misinformation | 13 | 1.0% |
E-commerce | 13 | 1.0% |
Federal Information Security Management Act of 2002 | 13 | 1.0% |
Information and communications technology | 13 | 1.0% |
Insurance | 13 | 1.0% |
International Safe Harbor Privacy Principles | 13 | 1.0% |
Media manipulation | 13 | 1.0% |
Mobile phone | 13 | 1.0% |
Multistakeholder governance | 13 | 1.0% |
Pegasus (spyware) | 13 | 1.0% |
Personal Information Protection and Electronic Documents Act | 13 | 1.0% |
Proactive cyber defence | 13 | 1.0% |
Secure Flight | 13 | 1.0% |
State (polity) | 13 | 1.0% |
Strategic communication | 13 | 1.0% |
War | 13 | 1.0% |
Wearable technology | 13 | 1.0% |
Whistleblower | 13 | 1.0% |
Automated decision-making | 12 | 0.9% |
Bank | 12 | 0.9% |
Cryptography | 12 | 0.9% |
EU–US Privacy Shield | 12 | 0.9% |
European Arrest Warrant | 12 | 0.9% |
Executive Order 13769 | 12 | 0.9% |
Face Recognition Vendor Test | 12 | 0.9% |
Inference | 12 | 0.9% |
Intellectual property | 12 | 0.9% |
Judiciary | 12 | 0.9% |
Jury | 12 | 0.9% |
Legal person | 12 | 0.9% |
Netzwerkdurchsetzungsgesetz | 12 | 0.9% |
Opt-out | 12 | 0.9% |
Prison | 12 | 0.9% |
Propaganda in the Russian Federation | 12 | 0.9% |
Recommender system | 12 | 0.9% |
Retail | 12 | 0.9% |
Security engineering | 12 | 0.9% |
Speaker recognition | 12 | 0.9% |
Statistics | 12 | 0.9% |
The Right to Privacy (article) | 12 | 0.9% |
Attitude (psychology) | 11 | 0.9% |
Augmented reality | 11 | 0.9% |
Automated Targeting System | 11 | 0.9% |
Classified information | 11 | 0.9% |
Committee of Ministers of the Council of Europe | 11 | 0.9% |
Complaint | 11 | 0.9% |
Computer data storage | 11 | 0.9% |
Computer vision | 11 | 0.9% |
Data quality | 11 | 0.9% |
Deception | 11 | 0.9% |
Disability | 11 | 0.9% |
Driver's license | 11 | 0.9% |
Due diligence | 11 | 0.9% |
Economic, social and cultural rights | 11 | 0.9% |
Electronic Communications Privacy Act | 11 | 0.9% |
Europe | 11 | 0.9% |
False positives and false negatives | 11 | 0.9% |
Forensic identification | 11 | 0.9% |
Information retrieval | 11 | 0.9% |
Institution | 11 | 0.9% |
Katz v. United States | 11 | 0.9% |
Legal action | 11 | 0.9% |
Media (communication) | 11 | 0.9% |
Media literacy | 11 | 0.9% |
Medical device | 11 | 0.9% |
Morality | 11 | 0.9% |
Negligence | 11 | 0.9% |
Network Enforcement Act | 11 | 0.9% |
Ownership | 11 | 0.9% |
Patriot Act | 11 | 0.9% |
Police officer | 11 | 0.9% |
Privacy laws of the United States | 11 | 0.9% |
Public engagement | 11 | 0.9% |
Recruitment | 11 | 0.9% |
Technological convergence | 11 | 0.9% |
Telecommunications | 11 | 0.9% |
Type approval | 11 | 0.9% |
United Kingdom National DNA Database | 11 | 0.9% |
United Nations Guiding Principles on Business and Human Rights | 11 | 0.9% |
Aadhaar | 10 | 0.8% |
Airport | 10 | 0.8% |
Application software | 10 | 0.8% |
Artificial general intelligence | 10 | 0.8% |
Big Tech | 10 | 0.8% |
California Consumer Privacy Act | 10 | 0.8% |
Coronavirus disease 2019 | 10 | 0.8% |
Crime scene | 10 | 0.8% |
Customs | 10 | 0.8% |
DNA | 10 | 0.8% |
Data mining | 10 | 0.8% |
Digital economy | 10 | 0.8% |
Digital literacy | 10 | 0.8% |
Educational technology | 10 | 0.8% |
End user | 10 | 0.8% |
Fair Credit Reporting Act | 10 | 0.8% |
Fourteenth Amendment to the United States Constitution | 10 | 0.8% |
Freedom of movement | 10 | 0.8% |
Gramm–Leach–Bliley Act | 10 | 0.8% |
Information management | 10 | 0.8% |
Intelligence analysis | 10 | 0.8% |
International relations | 10 | 0.8% |
Language | 10 | 0.8% |
Legal liability | 10 | 0.8% |
Minority group | 10 | 0.8% |
Newspaper | 10 | 0.8% |
Personalization | 10 | 0.8% |
Privacy engineering | 10 | 0.8% |
Procurement | 10 | 0.8% |
Prüm Convention | 10 | 0.8% |
Recidivism | 10 | 0.8% |
S and Marper v United Kingdom | 10 | 0.8% |
Situation awareness | 10 | 0.8% |
Strategy | 10 | 0.8% |
Terms of service | 10 | 0.8% |
United States Constitution | 10 | 0.8% |
Website | 10 | 0.8% |
Android (operating system) | 9 | 0.7% |
Article 8 of the European Convention on Human Rights | 9 | 0.7% |
Burden of proof (law) | 9 | 0.7% |
Business ethics | 9 | 0.7% |
Business model | 9 | 0.7% |
Children's rights | 9 | 0.7% |
Civic space | 9 | 0.7% |
Civil and political rights | 9 | 0.7% |
Competition law | 9 | 0.7% |
Computer and network surveillance | 9 | 0.7% |
Computer data | 9 | 0.7% |
Court | 9 | 0.7% |
Credit bureau | 9 | 0.7% |
Credit score | 9 | 0.7% |
Do Not Track | 9 | 0.7% |
E-government | 9 | 0.7% |
Economic inequality | 9 | 0.7% |
Emotion recognition | 9 | 0.7% |
Empowerment | 9 | 0.7% |
Facebook–Cambridge Analytica data scandal | 9 | 0.7% |
Health data | 9 | 0.7% |
Human factors and ergonomics | 9 | 0.7% |
Image scanner | 9 | 0.7% |
Information privacy law | 9 | 0.7% |
Liberal democracy | 9 | 0.7% |
New media | 9 | 0.7% |
News Feed | 9 | 0.7% |
Notice and take down | 9 | 0.7% |
Perception | 9 | 0.7% |
Precedent | 9 | 0.7% |
Privacy Commissioner (New Zealand) | 9 | 0.7% |
Productivity | 9 | 0.7% |
Regulation of Investigatory Powers Act 2000 | 9 | 0.7% |
Right to explanation | 9 | 0.7% |
Rulemaking | 9 | 0.7% |
Section 230 of the Communications Decency Act | 9 | 0.7% |
Smart card | 9 | 0.7% |
Social dialogue | 9 | 0.7% |
Soft power | 9 | 0.7% |
Traffic | 9 | 0.7% |
Transparency report | 9 | 0.7% |
Truth | 9 | 0.7% |
Weapon | 9 | 0.7% |
Wi-Fi | 9 | 0.7% |
2016 United Kingdom European Union membership referendum | 8 | 0.6% |
Amicus curiae | 8 | 0.6% |
Background check | 8 | 0.6% |
Bail | 8 | 0.6% |
Citizenship of the United States | 8 | 0.6% |
Committee | 8 | 0.6% |
Communications Decency Act | 8 | 0.6% |
Community | 8 | 0.6% |
Computer file | 8 | 0.6% |
Conspiracy theory | 8 | 0.6% |
Data Retention Directive | 8 | 0.6% |
Data governance | 8 | 0.6% |
Data sharing | 8 | 0.6% |
Debate | 8 | 0.6% |
Detective | 8 | 0.6% |
Detention (imprisonment) | 8 | 0.6% |
Digitization | 8 | 0.6% |
Domain name | 8 | 0.6% |
Emerging technologies | 8 | 0.6% |
Entertainment | 8 | 0.6% |
Goal | 8 | 0.6% |
Great Firewall | 8 | 0.6% |
Information system | 8 | 0.6% |
International human rights law | 8 | 0.6% |
Knowledge | 8 | 0.6% |
Life-cycle assessment | 8 | 0.6% |
Market surveillance (products) | 8 | 0.6% |
Marketing | 8 | 0.6% |
Medical imaging | 8 | 0.6% |
Misinformation related to the COVID-19 pandemic | 8 | 0.6% |
Online hate speech | 8 | 0.6% |
Organized crime | 8 | 0.6% |
Powers of the police in England and Wales | 8 | 0.6% |
Privacy-enhancing technologies | 8 | 0.6% |
Public safety | 8 | 0.6% |
Refugee | 8 | 0.6% |
Right to a fair trial | 8 | 0.6% |
Schengen Agreement | 8 | 0.6% |
September 11 attacks | 8 | 0.6% |
Spamming | 8 | 0.6% |
Statistical classification | 8 | 0.6% |
Treaty of Lisbon | 8 | 0.6% |
Usability | 8 | 0.6% |
Annexation of Crimea by the Russian Federation | 7 | 0.5% |
Arrest warrant | 7 | 0.5% |
Assault | 7 | 0.5% |
Body worn video | 7 | 0.5% |
Border | 7 | 0.5% |
Botnet | 7 | 0.5% |
Car | 7 | 0.5% |
Chatbot | 7 | 0.5% |
Child | 7 | 0.5% |
Climate resilience | 7 | 0.5% |
Combined DNA Index System | 7 | 0.5% |
Computer law | 7 | 0.5% |
Conference on the Future of Europe | 7 | 0.5% |
Congressional oversight | 7 | 0.5% |
Constitution | 7 | 0.5% |
Credit card | 7 | 0.5% |
Credit history | 7 | 0.5% |
Cryptocurrency | 7 | 0.5% |
Cyberbullying | 7 | 0.5% |
Department of Motor Vehicles | 7 | 0.5% |
Digital technology | 7 | 0.5% |
Disparate impact | 7 | 0.5% |
Dual-use technology | 7 | 0.5% |
Duty of care | 7 | 0.5% |
Federal preemption | 7 | 0.5% |
High Representative of the Union for Foreign Affairs and Security Policy | 7 | 0.5% |
IT law | 7 | 0.5% |
Identity (social science) | 7 | 0.5% |
Internet access | 7 | 0.5% |
Jessikka Aro | 7 | 0.5% |
Legal remedy | 7 | 0.5% |
Logic | 7 | 0.5% |
Mens rea | 7 | 0.5% |
Misconduct | 7 | 0.5% |
Moderation system | 7 | 0.5% |
Multistakeholder governance model | 7 | 0.5% |
Near-field communication | 7 | 0.5% |
Omnibus Crime Control and Safe Streets Act of 1968 | 7 | 0.5% |
Petya (malware) | 7 | 0.5% |
Pixel | 7 | 0.5% |
Political warfare | 7 | 0.5% |
Predictive analytics | 7 | 0.5% |
Product liability | 7 | 0.5% |
Rape | 7 | 0.5% |
Records management | 7 | 0.5% |
Regulation of artificial intelligence | 7 | 0.5% |
Regulatory risk differentiation | 7 | 0.5% |
Science, technology, engineering, and mathematics | 7 | 0.5% |
Scientific method | 7 | 0.5% |
Social partners | 7 | 0.5% |
Specification (technical standard) | 7 | 0.5% |
Spyware | 7 | 0.5% |
Trial | 7 | 0.5% |
Understanding | 7 | 0.5% |
Vehicular automation | 7 | 0.5% |
WHOIS | 7 | 0.5% |
Act of Parliament | 6 | 0.5% |
Act of Parliament (UK) | 6 | 0.5% |
Airline | 6 | 0.5% |
Areas of computer science | 6 | 0.5% |
Asylum seeker | 6 | 0.5% |
Bank Secrecy Act | 6 | 0.5% |
Boarding pass | 6 | 0.5% |
Capitalism | 6 | 0.5% |
Census | 6 | 0.5% |
Citizenship of the European Union | 6 | 0.5% |
Cognitive ergonomics | 6 | 0.5% |
Consensus decision-making | 6 | 0.5% |
Criminology | 6 | 0.5% |
Dark web | 6 | 0.5% |
Denial-of-service attack | 6 | 0.5% |
Digital Markets Act | 6 | 0.5% |
Do Not Track legislation | 6 | 0.5% |
Dublin Regulation | 6 | 0.5% |
Economic growth | 6 | 0.5% |
Electronic health record | 6 | 0.5% |
Engineering | 6 | 0.5% |
European Citizens' Initiative | 6 | 0.5% |
Evidence (law) | 6 | 0.5% |
Florida v. Riley | 6 | 0.5% |
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 | 6 | 0.5% |
Fourth Industrial Revolution | 6 | 0.5% |
Globalization | 6 | 0.5% |
Hashtag | 6 | 0.5% |
Hatred | 6 | 0.5% |
Health informatics | 6 | 0.5% |
Home automation | 6 | 0.5% |
Housing discrimination in the United States | 6 | 0.5% |
IPhone | 6 | 0.5% |
Illegal immigration | 6 | 0.5% |
Institutional review board | 6 | 0.5% |
Integrated Automated Fingerprint Identification System | 6 | 0.5% |
International Covenant on Economic, Social and Cultural Rights | 6 | 0.5% |
Journalism ethics and standards | 6 | 0.5% |
Knowledge representation and reasoning | 6 | 0.5% |
License | 6 | 0.5% |
Medical ethics | 6 | 0.5% |
Mind | 6 | 0.5% |
Monopoly | 6 | 0.5% |
Narrative | 6 | 0.5% |
Natural language processing | 6 | 0.5% |
Pluralism (political theory) | 6 | 0.5% |
Police National Computer | 6 | 0.5% |
Political polarization | 6 | 0.5% |
Psychological resilience | 6 | 0.5% |
Psychological warfare | 6 | 0.5% |
Public health | 6 | 0.5% |
Radicalization | 6 | 0.5% |
Receiver operating characteristic | 6 | 0.5% |
Secure communication | 6 | 0.5% |
Self-censorship | 6 | 0.5% |
Sentence (law) | 6 | 0.5% |
Simulation | 6 | 0.5% |
Social Security number | 6 | 0.5% |
Social norm | 6 | 0.5% |
Sociological theories | 6 | 0.5% |
Sovereign state | 6 | 0.5% |
Speech recognition | 6 | 0.5% |
Standards organization | 6 | 0.5% |
Stored Communications Act | 6 | 0.5% |
Stuxnet | 6 | 0.5% |
Targeted surveillance | 6 | 0.5% |
Testimony | 6 | 0.5% |
Training | 6 | 0.5% |
Tribunal | 6 | 0.5% |
Video content analysis | 6 | 0.5% |
Virtual private network | 6 | 0.5% |
Webcam | 6 | 0.5% |
2016 Democratic National Committee email leak | 5 | 0.4% |
3D printing | 5 | 0.4% |
Accessibility | 5 | 0.4% |
Adoption | 5 | 0.4% |
Advanced persistent threat | 5 | 0.4% |
Air traffic control | 5 | 0.4% |
Analysis | 5 | 0.4% |
Anti-discrimination law | 5 | 0.4% |
Attention | 5 | 0.4% |
Belt and Road Initiative | 5 | 0.4% |
Biodiversity | 5 | 0.4% |
Board of directors | 5 | 0.4% |
Body worn video (police equipment) | 5 | 0.4% |
Categorization | 5 | 0.4% |
Causality | 5 | 0.4% |
Certification | 5 | 0.4% |
Classification of ethnicity in the United Kingdom | 5 | 0.4% |
Commerce Clause | 5 | 0.4% |
Common Foreign and Security Policy | 5 | 0.4% |
Computer program | 5 | 0.4% |
Consciousness | 5 | 0.4% |
Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the Application of Biology and Medicine | 5 | 0.4% |
Convolutional neural network | 5 | 0.4% |
Corporate governance | 5 | 0.4% |
Criminal procedure in South Africa | 5 | 0.4% |
Cyber-physical system | 5 | 0.4% |
DNA sequencing | 5 | 0.4% |
Deviance (sociology) | 5 | 0.4% |
Digital Revolution | 5 | 0.4% |
Digital Single Market | 5 | 0.4% |
Digital divide | 5 | 0.4% |
Digital evidence | 5 | 0.4% |
Digital image | 5 | 0.4% |
Digital transformation | 5 | 0.4% |
Diplomacy | 5 | 0.4% |
Discretion | 5 | 0.4% |
Economic development | 5 | 0.4% |
Economy | 5 | 0.4% |
Electronic evidence | 5 | 0.4% |
Email spam | 5 | 0.4% |
Emergency | 5 | 0.4% |
Emergency services | 5 | 0.4% |
Emmanuel Macron | 5 | 0.4% |
Expert system | 5 | 0.4% |
Expert witness | 5 | 0.4% |
Family Educational Rights and Privacy Act | 5 | 0.4% |
Free will | 5 | 0.4% |
Full body scanner | 5 | 0.4% |
Genetics | 5 | 0.4% |
Global surveillance disclosures (2013–present) | 5 | 0.4% |
Google Spain v AEPD and Mario Costeja González | 5 | 0.4% |
Guccifer 2.0 | 5 | 0.4% |
Human Rights Act 1998 | 5 | 0.4% |
Human rights and encryption | 5 | 0.4% |
Human subject research | 5 | 0.4% |
Hybrid warfare | 5 | 0.4% |
Image resolution | 5 | 0.4% |
Image sharing | 5 | 0.4% |
Infrared | 5 | 0.4% |
International sanctions during the Ukrainian crisis | 5 | 0.4% |
Internet forum | 5 | 0.4% |
John Lennon | 5 | 0.4% |
Louis Brandeis | 5 | 0.4% |
Malaysia Airlines Flight 17 | 5 | 0.4% |
Microsatellite | 5 | 0.4% |
Mug shot | 5 | 0.4% |
Ombudsman | 5 | 0.4% |
Open government | 5 | 0.4% |
Overfitting | 5 | 0.4% |
Performance indicator | 5 | 0.4% |
Persuasion | 5 | 0.4% |
Photography | 5 | 0.4% |
Pizzagate conspiracy theory | 5 | 0.4% |
Police car | 5 | 0.4% |
Polygraph | 5 | 0.4% |
Populism | 5 | 0.4% |
Poverty | 5 | 0.4% |
Price discrimination | 5 | 0.4% |
Public key infrastructure | 5 | 0.4% |
Public participation | 5 | 0.4% |
Publishing | 5 | 0.4% |
Punishment | 5 | 0.4% |
Real ID Act | 5 | 0.4% |
Right of asylum | 5 | 0.4% |
Right to education | 5 | 0.4% |
Sanctuary city | 5 | 0.4% |
Sandra Wachter | 5 | 0.4% |
Science and technology | 5 | 0.4% |
Search engine | 5 | 0.4% |
Security hacker | 5 | 0.4% |
Security token | 5 | 0.4% |
Sexual harassment | 5 | 0.4% |
Social exclusion | 5 | 0.4% |
Sociotechnical system | 5 | 0.4% |
State of emergency | 5 | 0.4% |
Stereotype | 5 | 0.4% |
Stingray phone tracker | 5 | 0.4% |
Supply chain | 5 | 0.4% |
Survey methodology | 5 | 0.4% |
Target audience | 5 | 0.4% |
Technological singularity | 5 | 0.4% |
Thought | 5 | 0.4% |
Time | 5 | 0.4% |
Torture | 5 | 0.4% |
Trade union | 5 | 0.4% |
Traffic collision | 5 | 0.4% |
Transphobia | 5 | 0.4% |
Trust (emotion) | 5 | 0.4% |
United States passport | 5 | 0.4% |
University | 5 | 0.4% |
Use of force | 5 | 0.4% |
User (computing) | 5 | 0.4% |
Virtual reality | 5 | 0.4% |
Visa Waiver Program | 5 | 0.4% |
Voice over IP | 5 | 0.4% |
WannaCry ransomware attack | 5 | 0.4% |
2019–20 coronavirus outbreak | 4 | 0.3% |
API | 4 | 0.3% |
Activity tracker | 4 | 0.3% |
Aerial photography | 4 | 0.3% |
Africa | 4 | 0.3% |
Agile software development | 4 | 0.3% |
Agriculture | 4 | 0.3% |
Aircraft | 4 | 0.3% |
Application programming interface | 4 | 0.3% |
Backup | 4 | 0.3% |
Basic Law for the Federal Republic of Germany | 4 | 0.3% |
Battles and conflicts without fatalities | 4 | 0.3% |
Bluetooth | 4 | 0.3% |
Brain | 4 | 0.3% |
COMPAS (software) | 4 | 0.3% |
Cargo | 4 | 0.3% |
Chief information officer | 4 | 0.3% |
Class action | 4 | 0.3% |
Collective bargaining | 4 | 0.3% |
Common Security and Defence Policy | 4 | 0.3% |
Communication protocol | 4 | 0.3% |
Communications Assistance for Law Enforcement Act | 4 | 0.3% |
Competition (companies) | 4 | 0.3% |
Computer forensics | 4 | 0.3% |
Contactless smart card | 4 | 0.3% |
Control (social and political) | 4 | 0.3% |
Convention on Cybercrime | 4 | 0.3% |
Conversation | 4 | 0.3% |
Corruption | 4 | 0.3% |
Countering Foreign Propaganda and Disinformation Act | 4 | 0.3% |
Counterintelligence | 4 | 0.3% |
Credential | 4 | 0.3% |
Credibility | 4 | 0.3% |
Credit | 4 | 0.3% |
Critical infrastructure protection | 4 | 0.3% |
Cultural diversity | 4 | 0.3% |
Curriculum | 4 | 0.3% |
Data science | 4 | 0.3% |
DataWorks Plus | 4 | 0.3% |
Department of motor vehicles | 4 | 0.3% |
Dialogue | 4 | 0.3% |
Director of National Intelligence | 4 | 0.3% |
Dmitry Muratov | 4 | 0.3% |
Due Process Clause | 4 | 0.3% |
Electronic voting | 4 | 0.3% |
Emergence | 4 | 0.3% |
Euro | 4 | 0.3% |
European Union legislative procedure | 4 | 0.3% |
Felony | 4 | 0.3% |
Fine (penalty) | 4 | 0.3% |
Focus group | 4 | 0.3% |
Future enlargement of the European Union | 4 | 0.3% |
Genocide | 4 | 0.3% |
Government by algorithm | 4 | 0.3% |
Green card | 4 | 0.3% |
Hacker | 4 | 0.3% |
Hillary Clinton | 4 | 0.3% |
Human migration | 4 | 0.3% |
Incentive | 4 | 0.3% |
Inductive reasoning | 4 | 0.3% |
Information Sharing Environment | 4 | 0.3% |
Institutions of the European Union | 4 | 0.3% |
Intelligence-led policing | 4 | 0.3% |
International Convention on the Elimination of All Forms of Racial Discrimination | 4 | 0.3% |
Judiciaries | 4 | 0.3% |
Law enforcement in the United Kingdom | 4 | 0.3% |
Law of the United States | 4 | 0.3% |
Liberalism | 4 | 0.3% |
Loan | 4 | 0.3% |
MIFARE | 4 | 0.3% |
Marc Rotenberg | 4 | 0.3% |
Media bias | 4 | 0.3% |
Multi-factor authentication | 4 | 0.3% |
Multi-stakeholder governance | 4 | 0.3% |
National security letter | 4 | 0.3% |
Office of Inspector General (United States) | 4 | 0.3% |
Omission (law) | 4 | 0.3% |
Open data | 4 | 0.3% |
PRISM (surveillance program) | 4 | 0.3% |
Panopticon | 4 | 0.3% |
Police accountability | 4 | 0.3% |
Polymerase chain reaction | 4 | 0.3% |
Post-truth politics | 4 | 0.3% |
President of the United States | 4 | 0.3% |
Price | 4 | 0.3% |
Privacy settings | 4 | 0.3% |
Qualitative research | 4 | 0.3% |
Quality management system | 4 | 0.3% |
Question | 4 | 0.3% |
Race and ethnicity in the United States Census | 4 | 0.3% |
Reasonable suspicion | 4 | 0.3% |
Research and development | 4 | 0.3% |
Riley v. California | 4 | 0.3% |
Romance scam | 4 | 0.3% |
Router (computing) | 4 | 0.3% |
Russo-Ukrainian War | 4 | 0.3% |
Sanitization (classified information) | 4 | 0.3% |
Search engine optimization | 4 | 0.3% |
Section summary of the Patriot Act, Title II | 4 | 0.3% |
Sensor | 4 | 0.3% |
Shoplifting | 4 | 0.3% |
Social justice | 4 | 0.3% |
Sovereignty | 4 | 0.3% |
Space | 4 | 0.3% |
Special agent | 4 | 0.3% |
Standing (law) | 4 | 0.3% |
Startup company | 4 | 0.3% |
Statute | 4 | 0.3% |
Surveillance capitalism | 4 | 0.3% |
Tallinn Manual | 4 | 0.3% |
Terrorist Finance Tracking Program | 4 | 0.3% |
Third-party doctrine | 4 | 0.3% |
Tor (anonymity network) | 4 | 0.3% |
Trade secret | 4 | 0.3% |
Transport Layer Security | 4 | 0.3% |
Treaty of Rome | 4 | 0.3% |
Trespass | 4 | 0.3% |
USA Freedom Act | 4 | 0.3% |
United Kingdom labour law | 4 | 0.3% |
Victimology | 4 | 0.3% |
Violence against women | 4 | 0.3% |
Violent extremism | 4 | 0.3% |
Web 2.0 | 4 | 0.3% |
Web search engine | 4 | 0.3% |
World Summit on the Information Society | 4 | 0.3% |
Xi Jinping | 4 | 0.3% |
Y-STR | 4 | 0.3% |
2016 United States presidential election | 3 | 0.2% |
3D computer graphics | 3 | 0.2% |
Access to public information in Europe | 3 | 0.2% |
Active measures | 3 | 0.2% |
Activism | 3 | 0.2% |
Actus reus | 3 | 0.2% |
Admissible evidence | 3 | 0.2% |
Aid | 3 | 0.2% |
Aircraft pilot | 3 | 0.2% |
Alexei Navalny | 3 | 0.2% |
Algorithmic trading | 3 | 0.2% |
Alternative dispute resolution | 3 | 0.2% |
Antivirus software | 3 | 0.2% |
Anxiety | 3 | 0.2% |
Arms control | 3 | 0.2% |
Automated fingerprint identification | 3 | 0.2% |
Automation bias | 3 | 0.2% |
Bankruptcy | 3 | 0.2% |
BioAPI | 3 | 0.2% |
Blog | 3 | 0.2% |
Border search exception | 3 | 0.2% |
Bosnian War | 3 | 0.2% |
Broadcasting | 3 | 0.2% |
COINTELPRO | 3 | 0.2% |
CSI effect | 3 | 0.2% |
Cabinet (government) | 3 | 0.2% |
Capital Requirements Directives | 3 | 0.2% |
Censorship in China | 3 | 0.2% |
Certificate authority | 3 | 0.2% |
Charitable organization | 3 | 0.2% |
Chief privacy officer | 3 | 0.2% |
Child migration | 3 | 0.2% |
Chokehold | 3 | 0.2% |
Climate change mitigation | 3 | 0.2% |
Cognitive bias | 3 | 0.2% |
Cold War | 3 | 0.2% |
Communications Act of 1934 | 3 | 0.2% |
Complexity | 3 | 0.2% |
Conflict of interest | 3 | 0.2% |
Conformance testing | 3 | 0.2% |
Connected car | 3 | 0.2% |
Constitutional amendment | 3 | 0.2% |
Contact tracing | 3 | 0.2% |
Contractual term | 3 | 0.2% |
Convention on the Rights of the Child | 3 | 0.2% |
Counterterrorism | 3 | 0.2% |
Creative Commons license | 3 | 0.2% |
Creativity | 3 | 0.2% |
Crisis management | 3 | 0.2% |
Daphne Caruana Galizia | 3 | 0.2% |
Daubert standard | 3 | 0.2% |
Deadly force | 3 | 0.2% |
Death of Freddie Gray | 3 | 0.2% |
Debt | 3 | 0.2% |
Dependent and independent variables | 3 | 0.2% |
Digital signature | 3 | 0.2% |
Direct marketing | 3 | 0.2% |
E-democracy | 3 | 0.2% |
E-services | 3 | 0.2% |
Educational assessment | 3 | 0.2% |
Electroencephalography | 3 | 0.2% |
Electronic identification | 3 | 0.2% |
End-to-end encryption | 3 | 0.2% |
Enlargement of the European Union | 3 | 0.2% |
Entrepreneurship | 3 | 0.2% |
Environmental impact assessment | 3 | 0.2% |
Equal opportunity | 3 | 0.2% |
Equality Act 2010 | 3 | 0.2% |
FaceApp | 3 | 0.2% |
Fair use | 3 | 0.2% |
Fault (law) | 3 | 0.2% |
Federal Trade Commission Act of 1914 | 3 | 0.2% |
Feminism | 3 | 0.2% |
Fifth Amendment to the United States Constitution | 3 | 0.2% |
Financial technology | 3 | 0.2% |
Forgery | 3 | 0.2% |
Freedom of Information Act 2000 | 3 | 0.2% |
Future | 3 | 0.2% |
Genealogy | 3 | 0.2% |
Genetic testing | 3 | 0.2% |
Geographic information system | 3 | 0.2% |
Global Entry | 3 | 0.2% |
Global Positioning System | 3 | 0.2% |
Goal setting | 3 | 0.2% |
Graphics display resolution | 3 | 0.2% |
Happiness | 3 | 0.2% |
Harmonisation of law | 3 | 0.2% |
Human Rights Impact Assessment | 3 | 0.2% |
Human resource management | 3 | 0.2% |
IPhone X | 3 | 0.2% |
Illiberal democracy | 3 | 0.2% |
Image segmentation | 3 | 0.2% |
Immersion (virtual reality) | 3 | 0.2% |
Incitement | 3 | 0.2% |
Industry (economics) | 3 | 0.2% |
Infection | 3 | 0.2% |
Influencer marketing | 3 | 0.2% |
Information literacy | 3 | 0.2% |
Integrity | 3 | 0.2% |
Intelligent transportation system | 3 | 0.2% |
Internal control | 3 | 0.2% |
International development | 3 | 0.2% |
International humanitarian law | 3 | 0.2% |
International sanctions during the Russo-Ukrainian War | 3 | 0.2% |
Internet censorship circumvention | 3 | 0.2% |
Internet censorship in China | 3 | 0.2% |
Internet geolocation | 3 | 0.2% |
Internet protocol suite | 3 | 0.2% |
Internet universality | 3 | 0.2% |
Joy Buolamwini | 3 | 0.2% |
Laboratory | 3 | 0.2% |
Labour economics | 3 | 0.2% |
Law enforcement in the United States | 3 | 0.2% |
Legal certainty | 3 | 0.2% |
Legal procedure | 3 | 0.2% |
Legislative branch of the United States government | 3 | 0.2% |
Link analysis | 3 | 0.2% |
Lynching | 3 | 0.2% |
Media development | 3 | 0.2% |
Mediation | 3 | 0.2% |
Medicine | 3 | 0.2% |
Meredith Whittaker | 3 | 0.2% |
Military strategy | 3 | 0.2% |
Mining | 3 | 0.2% |
Miscarriage of justice | 3 | 0.2% |
National Defense Authorization Act for Fiscal Year 2012 | 3 | 0.2% |
Nationalism | 3 | 0.2% |
Network effect | 3 | 0.2% |
News aggregator | 3 | 0.2% |
No Fly List | 3 | 0.2% |
Nuclear weapon | 3 | 0.2% |
Nudge (book) | 3 | 0.2% |
Obscenity | 3 | 0.2% |
Online newspaper | 3 | 0.2% |
Open-source intelligence | 3 | 0.2% |
Open-source model | 3 | 0.2% |
Operating system | 3 | 0.2% |
Optics | 3 | 0.2% |
Outlier | 3 | 0.2% |
Outsourcing | 3 | 0.2% |
P3P | 3 | 0.2% |
Partnership | 3 | 0.2% |
Patch (computing) | 3 | 0.2% |
Patent | 3 | 0.2% |
Pen register | 3 | 0.2% |
Personalized search | 3 | 0.2% |
Persuasive technology | 3 | 0.2% |
Photograph | 3 | 0.2% |
Physical fitness | 3 | 0.2% |
Plaintext | 3 | 0.2% |
Plea | 3 | 0.2% |
Poisoning of Sergei and Yulia Skripal | 3 | 0.2% |
Police and Criminal Evidence Act 1984 | 3 | 0.2% |
Police misconduct | 3 | 0.2% |
Political theories | 3 | 0.2% |
Precautionary principle | 3 | 0.2% |
Presidency of Donald Trump | 3 | 0.2% |
Pricing | 3 | 0.2% |
Priority Enforcement Program | 3 | 0.2% |
Problem solving | 3 | 0.2% |
Procurator fiscal | 3 | 0.2% |
Public broadcasting | 3 | 0.2% |
Public policy | 3 | 0.2% |
Public-key cryptography | 3 | 0.2% |
Public–private partnership | 3 | 0.2% |
Quality assurance | 3 | 0.2% |
Radio | 3 | 0.2% |
Real-time computing | 3 | 0.2% |
Reasonable person | 3 | 0.2% |
Regression analysis | 3 | 0.2% |
Rehabilitation Act of 1973 | 3 | 0.2% |
Remote work | 3 | 0.2% |
Request for Comments | 3 | 0.2% |
Road | 3 | 0.2% |
Rumor | 3 | 0.2% |
Russian interference in the 2020 United States elections | 3 | 0.2% |
SIM card | 3 | 0.2% |
Samuel Alito | 3 | 0.2% |
Security certificate | 3 | 0.2% |
Sensationalism | 3 | 0.2% |
Service industries | 3 | 0.2% |
Sex robot | 3 | 0.2% |
Signature | 3 | 0.2% |
Sixth Amendment to the United States Constitution | 3 | 0.2% |
Smart meter | 3 | 0.2% |
SmartGate | 3 | 0.2% |
Social network | 3 | 0.2% |
Social robot | 3 | 0.2% |
Social science | 3 | 0.2% |
Software framework | 3 | 0.2% |
Spoofing attack | 3 | 0.2% |
State media | 3 | 0.2% |
Subversion | 3 | 0.2% |
Synthetic media | 3 | 0.2% |
Telecommuting | 3 | 0.2% |
Terrorism Act 2000 | 3 | 0.2% |
Terrorism financing | 3 | 0.2% |
Terrorist Screening Database | 3 | 0.2% |
Think tank | 3 | 0.2% |
Third country resettlement | 3 | 0.2% |
Threat (computer) | 3 | 0.2% |
Trust law | 3 | 0.2% |
Unfunded mandate | 3 | 0.2% |
Uyghurs | 3 | 0.2% |
Validity (statistics) | 3 | 0.2% |
Vine (service) | 3 | 0.2% |
Virtual assistant | 3 | 0.2% |
Voice user interface | 3 | 0.2% |
Waste | 3 | 0.2% |
Wearable computer | 3 | 0.2% |
Welfare | 3 | 0.2% |
Western world | 3 | 0.2% |
Xenophobia | 3 | 0.2% |
Yellow vests movement | 3 | 0.2% |
2.5D | 2 | 0.2% |
2017 cyberattacks on Ukraine | 2 | 0.2% |
3D modeling | 2 | 0.2% |
3D scanning | 2 | 0.2% |
4G | 2 | 0.2% |
4chan | 2 | 0.2% |
Access to Information Act | 2 | 0.2% |
Acquittal | 2 | 0.2% |
Active Measures Working Group | 2 | 0.2% |
Address geocoding | 2 | 0.2% |
Administrative Procedure Act (United States) | 2 | 0.2% |
Adolescence | 2 | 0.2% |
Advanced driver-assistance systems | 2 | 0.2% |
Adversarial system | 2 | 0.2% |
African Americans | 2 | 0.2% |
Agenda-setting theory | 2 | 0.2% |
Airspace | 2 | 0.2% |
Alex Jones | 2 | 0.2% |
Alt-right | 2 | 0.2% |
Amazon Alexa | 2 | 0.2% |
Andrei Soldatov | 2 | 0.2% |
Ann Cavoukian | 2 | 0.2% |
Anti-Counterfeiting Trade Agreement | 2 | 0.2% |
Anti-spam techniques | 2 | 0.2% |
Arbitration | 2 | 0.2% |
Argument | 2 | 0.2% |
Art | 2 | 0.2% |
Article 101 of the Treaty on the Functioning of the European Union | 2 | 0.2% |
Artistic freedom | 2 | 0.2% |
Asia | 2 | 0.2% |
Asset forfeiture | 2 | 0.2% |
Attack on Pearl Harbor | 2 | 0.2% |
Attorney general | 2 | 0.2% |
Authenticator | 2 | 0.2% |
Automatic identification and data capture | 2 | 0.2% |
Autonomous car | 2 | 0.2% |
Aviation | 2 | 0.2% |
Backdoor (computing) | 2 | 0.2% |
Barack Obama | 2 | 0.2% |
Barcode | 2 | 0.2% |
Barrister | 2 | 0.2% |
Basic income | 2 | 0.2% |
Belief | 2 | 0.2% |
Binding corporate rules | 2 | 0.2% |
Biology | 2 | 0.2% |
Bioterrorism | 2 | 0.2% |
Border Force | 2 | 0.2% |
Brain–computer interface | 2 | 0.2% |
Brand | 2 | 0.2% |
Brandon Mayfield | 2 | 0.2% |
Brexit withdrawal agreement | 2 | 0.2% |
Bullying | 2 | 0.2% |
Bundesdatenschutzgesetz | 2 | 0.2% |
CAPTCHA | 2 | 0.2% |
CLOUD Act | 2 | 0.2% |
COVID-19 apps | 2 | 0.2% |
Canadian Charter of Rights and Freedoms | 2 | 0.2% |
Capital punishment | 2 | 0.2% |
Card reader | 2 | 0.2% |
Case study | 2 | 0.2% |
Catherine Tucker | 2 | 0.2% |
Chairperson | 2 | 0.2% |
Check-in | 2 | 0.2% |
Chemical weapon | 2 | 0.2% |
China–United States trade war | 2 | 0.2% |
Civil Rights Act of 1964 | 2 | 0.2% |
Civil Rights Act of 1968 | 2 | 0.2% |
Clickbait | 2 | 0.2% |
Climate change | 2 | 0.2% |
Clinical trial | 2 | 0.2% |
Clint Watts | 2 | 0.2% |
Cluster analysis | 2 | 0.2% |
Collaboration | 2 | 0.2% |
Commercial off-the-shelf | 2 | 0.2% |
Common Criteria | 2 | 0.2% |
Common carrier | 2 | 0.2% |
Common good | 2 | 0.2% |
Competition (economics) | 2 | 0.2% |
Computational linguistics | 2 | 0.2% |
Computer Fraud and Abuse Act | 2 | 0.2% |
Computer networks | 2 | 0.2% |
Computer virus | 2 | 0.2% |
Computer-Assisted Passenger Prescreening System | 2 | 0.2% |
Concepts in ethics | 2 | 0.2% |
Conceptual model | 2 | 0.2% |
Consent decree | 2 | 0.2% |
Constitution of Finland | 2 | 0.2% |
Constitutional law | 2 | 0.2% |
Contactless payment | 2 | 0.2% |
Content (media) | 2 | 0.2% |
Content-control software | 2 | 0.2% |
Contrast (vision) | 2 | 0.2% |
Corporate social responsibility | 2 | 0.2% |
Countering America's Adversaries Through Sanctions Act | 2 | 0.2% |
Credit score in the United States | 2 | 0.2% |
Crime analysis | 2 | 0.2% |
Criminal Code of Finland | 2 | 0.2% |
Crisis | 2 | 0.2% |
Crowdsourcing | 2 | 0.2% |
Cubby, Inc. v. CompuServe Inc. | 2 | 0.2% |
Cuckservative | 2 | 0.2% |
Customary international law | 2 | 0.2% |
Cybernetics | 2 | 0.2% |
Cybersecurity Law of the People's Republic of China | 2 | 0.2% |
Cyberwarfare by Russia | 2 | 0.2% |
Dark pattern | 2 | 0.2% |
Darknet market | 2 | 0.2% |
Darrell M. West | 2 | 0.2% |
Data Protection Officer | 2 | 0.2% |
Data at rest | 2 | 0.2% |
Data center | 2 | 0.2% |
Data type | 2 | 0.2% |
Database Directive | 2 | 0.2% |
Decentralization | 2 | 0.2% |
Deep packet inspection | 2 | 0.2% |
DeepFace | 2 | 0.2% |
Demography | 2 | 0.2% |
Deplatforming | 2 | 0.2% |
Development aid | 2 | 0.2% |
Differential privacy | 2 | 0.2% |
Digital journalism | 2 | 0.2% |
Digital marketing | 2 | 0.2% |
Digital privacy | 2 | 0.2% |
Digital security | 2 | 0.2% |
Digital signage | 2 | 0.2% |
Disease | 2 | 0.2% |
Doctor of Philosophy | 2 | 0.2% |
Domain Name System | 2 | 0.2% |
Domestic violence | 2 | 0.2% |
Donald Trump on social media | 2 | 0.2% |
Dormant Commerce Clause | 2 | 0.2% |
Doxing | 2 | 0.2% |
Doğu Perinçek | 2 | 0.2% |
Due process | 2 | 0.2% |
Dynamic pricing | 2 | 0.2% |
Dystopia | 2 | 0.2% |
E-governance | 2 | 0.2% |
ECHELON | 2 | 0.2% |
Economic globalization | 2 | 0.2% |
Economic sanctions | 2 | 0.2% |
Electrical grid | 2 | 0.2% |
Electronic authentication | 2 | 0.2% |
Electronics industry | 2 | 0.2% |
Emotional self-regulation | 2 | 0.2% |
Empathy | 2 | 0.2% |
Employee monitoring | 2 | 0.2% |
Employee retention | 2 | 0.2% |
Equal Protection Clause | 2 | 0.2% |
Espionage techniques | 2 | 0.2% |
European Neighbourhood Policy | 2 | 0.2% |
Existential risk from artificial general intelligence | 2 | 0.2% |
Expectation of privacy (United States) | 2 | 0.2% |
Explainable artificial intelligence | 2 | 0.2% |
Export | 2 | 0.2% |
Extract, transform, load | 2 | 0.2% |
Extraterritoriality | 2 | 0.2% |
Extremism | 2 | 0.2% |
Eyewitness memory | 2 | 0.2% |
Face ID | 2 | 0.2% |
Feasibility study | 2 | 0.2% |
Federalism | 2 | 0.2% |
Federated learning | 2 | 0.2% |
FeliCa | 2 | 0.2% |
Fiduciary | 2 | 0.2% |
FinFisher | 2 | 0.2% |
Financial intelligence | 2 | 0.2% |
Financial risk | 2 | 0.2% |
Fingerprint Verification Competition | 2 | 0.2% |
Flanders | 2 | 0.2% |
Foreign direct investment | 2 | 0.2% |
Forensic dentistry | 2 | 0.2% |
Freedom of expression | 2 | 0.2% |
Freedom of thought | 2 | 0.2% |
G7 Rapid Response Mechanism | 2 | 0.2% |
GPS tracking unit | 2 | 0.2% |
Gambling | 2 | 0.2% |
Gamergate controversy | 2 | 0.2% |
General Conference (Methodism) | 2 | 0.2% |
Generative adversarial network | 2 | 0.2% |
Generic top-level domain | 2 | 0.2% |
Genetic genealogy | 2 | 0.2% |
Geneva Conventions | 2 | 0.2% |
Geopolitics | 2 | 0.2% |
George Floyd protests | 2 | 0.2% |
Geospatial intelligence | 2 | 0.2% |
Ghouta chemical attack | 2 | 0.2% |
Gillick competence | 2 | 0.2% |
Google Drive | 2 | 0.2% |
Government agency | 2 | 0.2% |
Government institutions | 2 | 0.2% |
HTTPS | 2 | 0.2% |
Hacktivism | 2 | 0.2% |
Hair analysis | 2 | 0.2% |
Hand luggage | 2 | 0.2% |
Hard disk drive | 2 | 0.2% |
Hate crime | 2 | 0.2% |
Hearsay | 2 | 0.2% |
Heisei | 2 | 0.2% |
History | 2 | 0.2% |
Homelessness | 2 | 0.2% |
Hypothesis | 2 | 0.2% |
IOS | 2 | 0.2% |
Icon (computing) | 2 | 0.2% |
Identity verification service | 2 | 0.2% |
Illegal immigration to the United States | 2 | 0.2% |
Imagine (John Lennon album) | 2 | 0.2% |
Immigration and Nationality Act Section 287(g) | 2 | 0.2% |
Implied cause of action | 2 | 0.2% |
Imprisonment | 2 | 0.2% |
Incarceration in the United States | 2 | 0.2% |
Industry self-regulation | 2 | 0.2% |
Inference engine | 2 | 0.2% |
Influence of mass media | 2 | 0.2% |
Information Technology Act, 2000 | 2 | 0.2% |
Injunction | 2 | 0.2% |
Input/output | 2 | 0.2% |
Institutional racism | 2 | 0.2% |
Intelligence, surveillance, target acquisition, and reconnaissance | 2 | 0.2% |
Intelligent agent | 2 | 0.2% |
Intention | 2 | 0.2% |
Interactive kiosk | 2 | 0.2% |
Interdisciplinarity | 2 | 0.2% |
Interest | 2 | 0.2% |
Internally displaced person | 2 | 0.2% |
International criminal law | 2 | 0.2% |
International sanctions | 2 | 0.2% |
International security | 2 | 0.2% |
Internet Protocol | 2 | 0.2% |
Internet celebrity | 2 | 0.2% |
Internet manipulation | 2 | 0.2% |
Internet meme | 2 | 0.2% |
Interpol notice | 2 | 0.2% |
Intranet | 2 | 0.2% |
Istanbul Protocol | 2 | 0.2% |
Jamal Khashoggi | 2 | 0.2% |
Jan Philipp Albrecht | 2 | 0.2% |
Joan Donovan | 2 | 0.2% |
Joe Biden | 2 | 0.2% |
Journalist | 2 | 0.2% |
Juridical person | 2 | 0.2% |
Key (cryptography) | 2 | 0.2% |
Key size | 2 | 0.2% |
Kinect | 2 | 0.2% |
Landlord | 2 | 0.2% |
Latanya Sweeney | 2 | 0.2% |
Latin America | 2 | 0.2% |
Law Enforcement Support Office | 2 | 0.2% |
Leasehold estate | 2 | 0.2% |
Legislation | 2 | 0.2% |
Library | 2 | 0.2% |
Lighting | 2 | 0.2% |
Lightweight Directory Access Protocol | 2 | 0.2% |
Linguistics | 2 | 0.2% |
Lobbying | 2 | 0.2% |
Lock and key | 2 | 0.2% |
London Underground | 2 | 0.2% |
Low copy number | 2 | 0.2% |
Lynching in the United States | 2 | 0.2% |
Machine | 2 | 0.2% |
2 | 0.2% | |
Manosphere | 2 | 0.2% |
Marriage | 2 | 0.2% |
Mass atrocity crimes | 2 | 0.2% |
Mass media in Russia | 2 | 0.2% |
Mass surveillance in China | 2 | 0.2% |
Master of Laws | 2 | 0.2% |
Media analysis | 2 | 0.2% |
Median | 2 | 0.2% |
Medical privacy | 2 | 0.2% |
Men's movement | 2 | 0.2% |
Men's rights movement | 2 | 0.2% |
Mental disorder | 2 | 0.2% |
Metaverse | 2 | 0.2% |
Mexico–United States border | 2 | 0.2% |
Microchip implant (human) | 2 | 0.2% |
Microtargeting | 2 | 0.2% |
Military doctrine | 2 | 0.2% |
Minnesota Protocol | 2 | 0.2% |
Mirai (malware) | 2 | 0.2% |
Mobile broadband | 2 | 0.2% |
Mobile device | 2 | 0.2% |
Mobile phone tracking | 2 | 0.2% |
Motivation | 2 | 0.2% |
Multiculturalism | 2 | 0.2% |
Multimodal interaction | 2 | 0.2% |
Murder | 2 | 0.2% |
Murder of Ján Kuciak | 2 | 0.2% |
Narendra Modi | 2 | 0.2% |
National Environmental Policy Act | 2 | 0.2% |
National Information Exchange Model | 2 | 0.2% |
Native advertising | 2 | 0.2% |
Natural and legal rights | 2 | 0.2% |
Nervous system | 2 | 0.2% |
Net neutrality in the United States | 2 | 0.2% |
NetMundial Initiative | 2 | 0.2% |
Neural network | 2 | 0.2% |
Neuron | 2 | 0.2% |
New Zealand Bill of Rights Act 1990 | 2 | 0.2% |
News agency | 2 | 0.2% |
Next Generation Air Transportation System | 2 | 0.2% |
Nick Bostrom | 2 | 0.2% |
Non-lethal weapon | 2 | 0.2% |
Nordic countries | 2 | 0.2% |
Nuclear proliferation | 2 | 0.2% |
Nudity | 2 | 0.2% |
Nuisance in English law | 2 | 0.2% |
OV-chipkaart | 2 | 0.2% |
Octopus card | 2 | 0.2% |
Office 365 | 2 | 0.2% |
Olmstead v. United States | 2 | 0.2% |
Once-only principle | 2 | 0.2% |
Online Privacy Protection Act | 2 | 0.2% |
Online shopping | 2 | 0.2% |
Open access | 2 | 0.2% |
Open science | 2 | 0.2% |
Open source | 2 | 0.2% |
Opinion poll | 2 | 0.2% |
Oppression | 2 | 0.2% |
Opt-outs in the European Union | 2 | 0.2% |
Optical character recognition | 2 | 0.2% |
Organizational culture | 2 | 0.2% |
P-value | 2 | 0.2% |
Parallel construction | 2 | 0.2% |
Parent | 2 | 0.2% |
Parliament | 2 | 0.2% |
Parliamentary system | 2 | 0.2% |
Pattern recognition | 2 | 0.2% |
Paywall | 2 | 0.2% |
Peer-to-peer | 2 | 0.2% |
Performance appraisal | 2 | 0.2% |
Perinçek v. Switzerland | 2 | 0.2% |
Person | 2 | 0.2% |
Photo manipulation | 2 | 0.2% |
Photograph manipulation | 2 | 0.2% |
Physical security | 2 | 0.2% |
Physiognomy | 2 | 0.2% |
Polarization (politics) | 2 | 0.2% |
Police brutality | 2 | 0.2% |
Police surveillance in New York City | 2 | 0.2% |
Pornography | 2 | 0.2% |
Predictive medicine | 2 | 0.2% |
Predictive modelling | 2 | 0.2% |
Presumption of innocence | 2 | 0.2% |
Principles | 2 | 0.2% |
Printer (computing) | 2 | 0.2% |
Printz v. United States | 2 | 0.2% |
Prisoner | 2 | 0.2% |
Privacy Act 1988 | 2 | 0.2% |
Process (computing) | 2 | 0.2% |
Product certification | 2 | 0.2% |
Product lifecycle | 2 | 0.2% |
Provenance | 2 | 0.2% |
Psychiatry | 2 | 0.2% |
Psychological manipulation | 2 | 0.2% |
Qualified immunity | 2 | 0.2% |
Quantum network | 2 | 0.2% |
Race and ethnicity in the United States census | 2 | 0.2% |
Rapid DNA | 2 | 0.2% |
Ratification | 2 | 0.2% |
Record linkage | 2 | 0.2% |
Recycling | 2 | 0.2% |
Red team | 2 | 0.2% |
Redlining | 2 | 0.2% |
Regulation (European Union) | 2 | 0.2% |
Relevance (law) | 2 | 0.2% |
Reno v. Flores | 2 | 0.2% |
Resisting arrest | 2 | 0.2% |
Retinal scan | 2 | 0.2% |
Right to silence | 2 | 0.2% |
Right to social security | 2 | 0.2% |
Rita Cucchiara | 2 | 0.2% |
Road pricing | 2 | 0.2% |
Robbery | 2 | 0.2% |
Roe v. Wade | 2 | 0.2% |
Rome Statute of the International Criminal Court | 2 | 0.2% |
Rundfunkstaatsvertrag | 2 | 0.2% |
Russia under Vladimir Putin | 2 | 0.2% |
Russian web brigades | 2 | 0.2% |
SORM | 2 | 0.2% |
Sabre (computer system) | 2 | 0.2% |
School-to-prison pipeline | 2 | 0.2% |
Section 504 of the Rehabilitation Act | 2 | 0.2% |
Security clearance | 2 | 0.2% |
Security guard | 2 | 0.2% |
Self-incrimination | 2 | 0.2% |
Service-level agreement | 2 | 0.2% |
Sexual assault | 2 | 0.2% |
Shamoon | 2 | 0.2% |
Signage | 2 | 0.2% |
Single-nucleotide polymorphism | 2 | 0.2% |
Smart TV | 2 | 0.2% |
Smart manufacturing | 2 | 0.2% |
Smartwatch | 2 | 0.2% |
Social engineering (security) | 2 | 0.2% |
Social network analysis | 2 | 0.2% |
Social work | 2 | 0.2% |
Software-defined networking | 2 | 0.2% |
Source protection | 2 | 0.2% |
Spectral density | 2 | 0.2% |
State secrets privilege | 2 | 0.2% |
States and territories of Australia | 2 | 0.2% |
Statistical hypothesis testing | 2 | 0.2% |
Statutory instrument (UK) | 2 | 0.2% |
Stock | 2 | 0.2% |
Stop Enabling Sex Traffickers Act | 2 | 0.2% |
Streaming media | 2 | 0.2% |
Subscription business model | 2 | 0.2% |
Suica | 2 | 0.2% |
Sunset provision | 2 | 0.2% |
Superintelligence | 2 | 0.2% |
Superpower | 2 | 0.2% |
Supplemental Nutrition Assistance Program | 2 | 0.2% |
Supply chain attack | 2 | 0.2% |
Sustainable development | 2 | 0.2% |
Systemic risk | 2 | 0.2% |
Systems science | 2 | 0.2% |
TVET (Technical and Vocational Education and Training) | 2 | 0.2% |
Tag (metadata) | 2 | 0.2% |
Tax | 2 | 0.2% |
Telegram (service) | 2 | 0.2% |
Television | 2 | 0.2% |
Temporary Assistance for Needy Families | 2 | 0.2% |
Territories of the United States | 2 | 0.2% |
Terry v. Ohio | 2 | 0.2% |
Tesla Autopilot | 2 | 0.2% |
Theft | 2 | 0.2% |
Thermography | 2 | 0.2% |
Three Laws of Robotics | 2 | 0.2% |
Timnit Gebru | 2 | 0.2% |
ToTok (app) | 2 | 0.2% |
Total Defence | 2 | 0.2% |
Total Information Awareness | 2 | 0.2% |
Touch ID | 2 | 0.2% |
Trade | 2 | 0.2% |
Traffic stop | 2 | 0.2% |
Translation | 2 | 0.2% |
Transport | 2 | 0.2% |
Travel document | 2 | 0.2% |
Turing Research | 2 | 0.2% |
Turnover (employment) | 2 | 0.2% |
UNICRI Centre for AI and Robotics | 2 | 0.2% |
Ubiquitous computing | 2 | 0.2% |
Uncertainty | 2 | 0.2% |
Unemployment | 2 | 0.2% |
United Kingdom company law | 2 | 0.2% |
United States Attorney | 2 | 0.2% |
United States Secretary of Defense | 2 | 0.2% |
United States federal probation and supervised release | 2 | 0.2% |
Universal jurisdiction | 2 | 0.2% |
Unmanned underwater vehicle | 2 | 0.2% |
Use case | 2 | 0.2% |
Vehicle registration plate | 2 | 0.2% |
Vessel monitoring system | 2 | 0.2% |
Victimisation | 2 | 0.2% |
Video game | 2 | 0.2% |
Videotelephony | 2 | 0.2% |
Visa policy of the United Kingdom | 2 | 0.2% |
Vocational education | 2 | 0.2% |
Voter registration | 2 | 0.2% |
Voter suppression in the United States | 2 | 0.2% |
Waiver | 2 | 0.2% |
War crime | 2 | 0.2% |
Wealth | 2 | 0.2% |
Web analytics | 2 | 0.2% |
Web application | 2 | 0.2% |
Web scraping | 2 | 0.2% |
Weev | 2 | 0.2% |
Windhoek Declaration | 2 | 0.2% |
Women's rights | 2 | 0.2% |
Workforce | 2 | 0.2% |
Working time | 2 | 0.2% |
Workplace bullying | 2 | 0.2% |
World War II | 2 | 0.2% |
X Article | 2 | 0.2% |
XKeyscore | 2 | 0.2% |
XML | 2 | 0.2% |
Zero-day (computing) | 2 | 0.2% |
Zeus (malware) | 2 | 0.2% |
18th National Congress of the Communist Party of China | 1 | 0.1% |
2011 Canadian federal election voter suppression scandal | 1 | 0.1% |
2015 European migrant crisis | 1 | 0.1% |
2015 San Bernardino attack | 1 | 0.1% |
2017–18 Qatar diplomatic crisis | 1 | 0.1% |
2018 North Korea–United States Singapore Summit | 1 | 0.1% |
2019 Balakot airstrike | 1 | 0.1% |
2019 Canadian federal election | 1 | 0.1% |
2019 Indian general election | 1 | 0.1% |
2019–20 coronavirus pandemic | 1 | 0.1% |
3G | 1 | 0.1% |
ARPANET | 1 | 0.1% |
Aarogya Setu | 1 | 0.1% |
Abmahnung | 1 | 0.1% |
Abortion | 1 | 0.1% |
Abortion in the United States | 1 | 0.1% |
Accident | 1 | 0.1% |
Actuator | 1 | 0.1% |
Addiction | 1 | 0.1% |
Adjudication | 1 | 0.1% |
Administrative law judge | 1 | 0.1% |
Admission to the bar in the United States | 1 | 0.1% |
Advertising revenue | 1 | 0.1% |
Adware | 1 | 0.1% |
Affective computing | 1 | 0.1% |
Affidavit | 1 | 0.1% |
Affordance | 1 | 0.1% |
Age of Enlightenment | 1 | 0.1% |
Age verification system | 1 | 0.1% |
Agenda (meeting) | 1 | 0.1% |
Aggravated sexual assault | 1 | 0.1% |
Aggression | 1 | 0.1% |
Aimee Van Wynsberghe | 1 | 0.1% |
Ajit Pai | 1 | 0.1% |
Alan Rusbridger | 1 | 0.1% |
Alexander Nix | 1 | 0.1% |
Algorithms | 1 | 0.1% |
Alien (law) | 1 | 0.1% |
Alliance for Securing Democracy | 1 | 0.1% |
Alternative facts | 1 | 0.1% |
Amazon Echo | 1 | 0.1% |
Ambient intelligence | 1 | 0.1% |
Ambulance | 1 | 0.1% |
American Convention on Human Rights | 1 | 0.1% |
Americans with Disabilities Act of 1990 | 1 | 0.1% |
Amitav Acharya | 1 | 0.1% |
Analytical chemistry | 1 | 0.1% |
Andrii Derkach | 1 | 0.1% |
Android (robot) | 1 | 0.1% |
Anna Politkovskaya | 1 | 0.1% |
Anomaly detection | 1 | 0.1% |
Anthony D. Romero | 1 | 0.1% |
Anthropomorphism | 1 | 0.1% |
Anti-Terrorism Act of 2020 | 1 | 0.1% |
Anti-satellite weapon | 1 | 0.1% |
Antonin Scalia | 1 | 0.1% |
Appeal | 1 | 0.1% |
Apple ID | 1 | 0.1% |
Application security | 1 | 0.1% |
Applications of cryptography | 1 | 0.1% |
Apprendi v. New Jersey | 1 | 0.1% |
Appropriations bill (United States) | 1 | 0.1% |
Archive | 1 | 0.1% |
Arizona v. Evans | 1 | 0.1% |
Armenian Genocide | 1 | 0.1% |
Arron Banks | 1 | 0.1% |
Article Three of the United States Constitution | 1 | 0.1% |
Artificial Intelligence for IT Operations | 1 | 0.1% |
Artificial cardiac pacemaker | 1 | 0.1% |
Artificial objects | 1 | 0.1% |
Asian Americans | 1 | 0.1% |
Assassination of Jamal Khashoggi | 1 | 0.1% |
Attorney's fee | 1 | 0.1% |
Auction | 1 | 0.1% |
Audience measurement | 1 | 0.1% |
Audiovisual | 1 | 0.1% |
Australian administrative law | 1 | 0.1% |
Authentication methods | 1 | 0.1% |
Authenticity (philosophy) | 1 | 0.1% |
Authorization | 1 | 0.1% |
Authorization bill | 1 | 0.1% |
Autocorrelation | 1 | 0.1% |
Automata theory | 1 | 0.1% |
Automated border control system | 1 | 0.1% |
Automated driving system | 1 | 0.1% |
Autonomous robot | 1 | 0.1% |
Autoregulation | 1 | 0.1% |
Avatar (computing) | 1 | 0.1% |
BBC iPlayer | 1 | 0.1% |
Ballot | 1 | 0.1% |
Baltic states | 1 | 0.1% |
Barack Obama citizenship conspiracy theories | 1 | 0.1% |
Barcode reader | 1 | 0.1% |
Barristers in England and Wales | 1 | 0.1% |
Basuki Tjahaja Purnama | 1 | 0.1% |
Batticaloa | 1 | 0.1% |
Beeban Kidron | 1 | 0.1% |
Behavioral targeting | 1 | 0.1% |
Belmont Report | 1 | 0.1% |
Benjamin Zand | 1 | 0.1% |
Best interests | 1 | 0.1% |
Bicycle helmet | 1 | 0.1% |
Bill of lading | 1 | 0.1% |
Biobank | 1 | 0.1% |
Bioethics | 1 | 0.1% |
Biometric Information Privacy Act | 1 | 0.1% |
Biometric device | 1 | 0.1% |
Biostatistics | 1 | 0.1% |
Biotechnology | 1 | 0.1% |
Birth certificate | 1 | 0.1% |
Body area network | 1 | 0.1% |
Body camera | 1 | 0.1% |
Brady disclosure | 1 | 0.1% |
Brazilian Civil Rights Framework for the Internet | 1 | 0.1% |
Breach of contract | 1 | 0.1% |
Brett Kavanaugh | 1 | 0.1% |
Brett Tolman | 1 | 0.1% |
Brief (law) | 1 | 0.1% |
Brute-force attack | 1 | 0.1% |
Budget | 1 | 0.1% |
Bullrun (decryption program) | 1 | 0.1% |
Bureaucracy | 1 | 0.1% |
Business process | 1 | 0.1% |
Bürgerliches Gesetzbuch | 1 | 0.1% |
CBRN defense | 1 | 0.1% |
COVID-19 pandemic in the United Kingdom | 1 | 0.1% |
Cable television | 1 | 0.1% |
Cairo Declaration on Human Rights in Islam | 1 | 0.1% |
California Public Records Act | 1 | 0.1% |
California Unfair Competition Law | 1 | 0.1% |
Cambodian Americans | 1 | 0.1% |
Campaign finance | 1 | 0.1% |
Campaign finance in the United States | 1 | 0.1% |
Canadian federalism | 1 | 0.1% |
Cancer | 1 | 0.1% |
Capacity (law) | 1 | 0.1% |
Capacity building | 1 | 0.1% |
Card security code | 1 | 0.1% |
Carding (fraud) | 1 | 0.1% |
Carjacking | 1 | 0.1% |
Carter Page | 1 | 0.1% |
Cartography | 1 | 0.1% |
CatalanGate | 1 | 0.1% |
Cause of action | 1 | 0.1% |
Central American migrant caravans | 1 | 0.1% |
Central Europe | 1 | 0.1% |
Central Monitoring System | 1 | 0.1% |
Centrality | 1 | 0.1% |
Chad Wolf | 1 | 0.1% |
Chandler v. Miller | 1 | 0.1% |
Chaos Monkey | 1 | 0.1% |
Chaos theory | 1 | 0.1% |
Charter of the United Nations | 1 | 0.1% |
Chess | 1 | 0.1% |
Chief mate | 1 | 0.1% |
Child custody | 1 | 0.1% |
Child pornography | 1 | 0.1% |
Child protection | 1 | 0.1% |
Chinese cyberwarfare | 1 | 0.1% |
Chinese intelligence activity abroad | 1 | 0.1% |
Choice architecture | 1 | 0.1% |
Chowkidar Chor Hai | 1 | 0.1% |
Chris Hoofnagle | 1 | 0.1% |
Christine Blasey Ford | 1 | 0.1% |
Christopher Wylie | 1 | 0.1% |
Citizen journalism | 1 | 0.1% |
City | 1 | 0.1% |
Civic engagement | 1 | 0.1% |
Civil defense | 1 | 0.1% |
Civil forfeiture in the United States | 1 | 0.1% |
Civil law (common law) | 1 | 0.1% |
Civil law (legal system) | 1 | 0.1% |
Civil service | 1 | 0.1% |
Civilian oversight | 1 | 0.1% |
Civility | 1 | 0.1% |
Claas Relotius | 1 | 0.1% |
Classified information in the United States | 1 | 0.1% |
Clinical governance | 1 | 0.1% |
Clipper chip | 1 | 0.1% |
Code of Criminal Procedure (India) | 1 | 0.1% |
Code of Virginia | 1 | 0.1% |
Codification (law) | 1 | 0.1% |
Cold calling | 1 | 0.1% |
Colonialism | 1 | 0.1% |
Color | 1 | 0.1% |
Commission de la carte d'identité des journalistes professionnels | 1 | 0.1% |
Commissioner | 1 | 0.1% |
Communications Act 2003 | 1 | 0.1% |
Community media | 1 | 0.1% |
Community radio | 1 | 0.1% |
CompStat | 1 | 0.1% |
Compassionate release | 1 | 0.1% |
Comprehensive Economic and Trade Agreement | 1 | 0.1% |
Comprehensive and Progressive Agreement for Trans-Pacific Partnership | 1 | 0.1% |
Computational learning theory | 1 | 0.1% |
Computer security exploits | 1 | 0.1% |
Concealed carry in the United States | 1 | 0.1% |
Concept | 1 | 0.1% |
Confidence | 1 | 0.1% |
Confirmation bias | 1 | 0.1% |
Confiscation | 1 | 0.1% |
Conformity | 1 | 0.1% |
Confrontation Clause | 1 | 0.1% |
Congressional Review Act | 1 | 0.1% |
Conscience | 1 | 0.1% |
Consent search | 1 | 0.1% |
Conservatism | 1 | 0.1% |
Constable | 1 | 0.1% |
Constitutional review | 1 | 0.1% |
Consumer | 1 | 0.1% |
Consumer behaviour | 1 | 0.1% |
Content creation | 1 | 0.1% |
Content delivery network | 1 | 0.1% |
Continuing resolution | 1 | 0.1% |
Contravention | 1 | 0.1% |
Convention on the Rights of Persons with Disabilities | 1 | 0.1% |
Copyright Act of Canada | 1 | 0.1% |
Coronavirus Act 2020 | 1 | 0.1% |
Corporate surveillance | 1 | 0.1% |
Correlation | 1 | 0.1% |
Correlation and dependence | 1 | 0.1% |
Counterfeit | 1 | 0.1% |
Counterfeit consumer goods | 1 | 0.1% |
Countermeasure (computer) | 1 | 0.1% |
Countries applying biometrics | 1 | 0.1% |
Courtroom | 1 | 0.1% |
Credit card fraud | 1 | 0.1% |
Credit freeze | 1 | 0.1% |
Crimea | 1 | 0.1% |
Crimes against humanity | 1 | 0.1% |
Criminal intelligence | 1 | 0.1% |
Criminal justice reform in the United States | 1 | 0.1% |
Criminal law of Canada | 1 | 0.1% |
Criminal procedure | 1 | 0.1% |
Critical thinking | 1 | 0.1% |
Crossfire Hurricane (FBI investigation) | 1 | 0.1% |
Crown copyright | 1 | 0.1% |
Cruise ship | 1 | 0.1% |
Cryptographic hash function | 1 | 0.1% |
Cuius est solum, eius est usque ad coelum et ad inferos | 1 | 0.1% |
Cultural Marxism conspiracy theory | 1 | 0.1% |
Curtilage | 1 | 0.1% |
Customer | 1 | 0.1% |
Customer experience | 1 | 0.1% |
Customer satisfaction | 1 | 0.1% |
Cyber insurance | 1 | 0.1% |
CyberPatriot | 1 | 0.1% |
Cyberpunk themes | 1 | 0.1% |
Cybersecurity Information Sharing Act | 1 | 0.1% |
Cyberstalking | 1 | 0.1% |
Cyberterrorism | 1 | 0.1% |
Cyborg | 1 | 0.1% |
DNA phenotyping | 1 | 0.1% |
Danish Penal Code | 1 | 0.1% |
Darfur | 1 | 0.1% |
Dassault/Dornier Alpha Jet | 1 | 0.1% |
Data Protection Act, 2012 | 1 | 0.1% |
Data compression | 1 | 0.1% |
Data custodian | 1 | 0.1% |
Data integrity | 1 | 0.1% |
Data model | 1 | 0.1% |
Data processing | 1 | 0.1% |
Data protection | 1 | 0.1% |
Data sovereignty | 1 | 0.1% |
Data visualization | 1 | 0.1% |
Database index | 1 | 0.1% |
Dataveillance | 1 | 0.1% |
Daubert v. Merrell Dow Pharmaceuticals, Inc. | 1 | 0.1% |
David Lewis (philosopher) | 1 | 0.1% |
De-escalation | 1 | 0.1% |
Deborah Raji | 1 | 0.1% |
Debt collection | 1 | 0.1% |
Decision | 1 | 0.1% |
Declaration on the Rights of Indigenous Peoples | 1 | 0.1% |
Deep Blue (chess computer) | 1 | 0.1% |
Defeat device | 1 | 0.1% |
Definition | 1 | 0.1% |
Delivery drone | 1 | 0.1% |
Delphi method | 1 | 0.1% |
Demand | 1 | 0.1% |
Democratic National Committee cyber attacks | 1 | 0.1% |
Democratic backsliding | 1 | 0.1% |
Democratization | 1 | 0.1% |
Deportation | 1 | 0.1% |
Derek Chauvin | 1 | 0.1% |
Derivative work | 1 | 0.1% |
Deterrence (penology) | 1 | 0.1% |
Dialect | 1 | 0.1% |
Digital Economy Act 2017 | 1 | 0.1% |
Digital Millennium Copyright Act | 1 | 0.1% |
Digital camera | 1 | 0.1% |
Digital citizen | 1 | 0.1% |
Digital cloning | 1 | 0.1% |
Digital data | 1 | 0.1% |
Digital electronics | 1 | 0.1% |
Digital footprint | 1 | 0.1% |
Digital health | 1 | 0.1% |
Digital identity in Australia | 1 | 0.1% |
Digital native | 1 | 0.1% |
Digital rights management | 1 | 0.1% |
Digital subscriber line | 1 | 0.1% |
Digital twin | 1 | 0.1% |
Digital wallet | 1 | 0.1% |
Directive 2014/65/EU | 1 | 0.1% |
Directive on Copyright in the Digital Single Market | 1 | 0.1% |
Director of the Federal Bureau of Investigation | 1 | 0.1% |
Discharge (sentence) | 1 | 0.1% |
Discipline and Punish | 1 | 0.1% |
Discoverability | 1 | 0.1% |
Display resolution | 1 | 0.1% |
Distance | 1 | 0.1% |
Distraint | 1 | 0.1% |
Dmitry Medvedev | 1 | 0.1% |
Documentation | 1 | 0.1% |
Doklam | 1 | 0.1% |
Door | 1 | 0.1% |
Doping in sport | 1 | 0.1% |
Dots per inch | 1 | 0.1% |
Driver's licenses in the United States | 1 | 0.1% |
Drone journalism | 1 | 0.1% |
Drug liberalization | 1 | 0.1% |
Drug test | 1 | 0.1% |
Dual federalism | 1 | 0.1% |
Durbin–Watson statistic | 1 | 0.1% |
Dutch passport | 1 | 0.1% |
Dynamic consent | 1 | 0.1% |
E-book | 1 | 0.1% |
E-participation | 1 | 0.1% |
E. Tendayi Achiume | 1 | 0.1% |
EHealth | 1 | 0.1% |
EIDAS | 1 | 0.1% |
EUR-Lex | 1 | 0.1% |
Earmark (politics) | 1 | 0.1% |
East Africa | 1 | 0.1% |
Ecolabel | 1 | 0.1% |
Ecological footprint | 1 | 0.1% |
Economies of scale | 1 | 0.1% |
Edge computing | 1 | 0.1% |
Edi Rama | 1 | 0.1% |
Edmund Burke | 1 | 0.1% |
Effect size | 1 | 0.1% |
Eigenface | 1 | 0.1% |
Elections to the European Parliament | 1 | 0.1% |
Electoral fraud | 1 | 0.1% |
Electronic documents | 1 | 0.1% |
Electronic monitoring in the United States | 1 | 0.1% |
Electronic signature | 1 | 0.1% |
Electronic tagging | 1 | 0.1% |
Electronics | 1 | 0.1% |
Elevator | 1 | 0.1% |
Elizabeth Denham | 1 | 0.1% |
Elon Musk | 1 | 0.1% |
Email Privacy Act | 1 | 0.1% |
Emergency medical services | 1 | 0.1% |
Emma Barnett | 1 | 0.1% |
Employment discrimination | 1 | 0.1% |
Employment discrimination law in the United States | 1 | 0.1% |
End-to-end auditable voting systems | 1 | 0.1% |
End-to-end principle | 1 | 0.1% |
Energy policy of the European Union | 1 | 0.1% |
Environmental impact statement | 1 | 0.1% |
Environmental resource management | 1 | 0.1% |
Equality Act (United States) | 1 | 0.1% |
Equity (law) | 1 | 0.1% |
Eric Rosenbach | 1 | 0.1% |
Estoppel | 1 | 0.1% |
Ethical code | 1 | 0.1% |
Ethnic group | 1 | 0.1% |
Ethnography | 1 | 0.1% |
Eur-Lex | 1 | 0.1% |
European migrant crisis | 1 | 0.1% |
Euroscepticism | 1 | 0.1% |
Event data recorder | 1 | 0.1% |
Evidence-based medicine | 1 | 0.1% |
Exclusionary rule | 1 | 0.1% |
Exculpatory evidence | 1 | 0.1% |
Executive Order 13768 | 1 | 0.1% |
Executive Order 13780 | 1 | 0.1% |
Exif | 1 | 0.1% |
Expense | 1 | 0.1% |
Experience | 1 | 0.1% |
Experience curve effects | 1 | 0.1% |
Exploit (computer security) | 1 | 0.1% |
Export control | 1 | 0.1% |
Export of cryptography from the United States | 1 | 0.1% |
Exposure (photography) | 1 | 0.1% |
Exposure Notification | 1 | 0.1% |
Extortion | 1 | 0.1% |
Extreme poverty | 1 | 0.1% |
Eye | 1 | 0.1% |
Eye tracking | 1 | 0.1% |
Eyewitness identification | 1 | 0.1% |
FBI–Apple encryption dispute | 1 | 0.1% |
FCC Open Internet Order 2010 | 1 | 0.1% |
Face perception | 1 | 0.1% |
Facebook Safety Check | 1 | 0.1% |
Facial composite | 1 | 0.1% |
Facial expression | 1 | 0.1% |
Facilitator | 1 | 0.1% |
Fact checking | 1 | 0.1% |
Fair Housing Council of San Fernando Valley v. Roommates.com, LLC | 1 | 0.1% |
Fax | 1 | 0.1% |
Feature (machine learning) | 1 | 0.1% |
FedRAMP | 1 | 0.1% |
Federal Information Technology Acquisition Reform Act | 1 | 0.1% |
Federalism in the United States | 1 | 0.1% |
Federica Mogherini | 1 | 0.1% |
File system | 1 | 0.1% |
Finance | 1 | 0.1% |
Financial inclusion | 1 | 0.1% |
Firefighter | 1 | 0.1% |
Firehose of falsehood | 1 | 0.1% |
First Nations | 1 | 0.1% |
First They Killed My Father (film) | 1 | 0.1% |
Five-year plans of China | 1 | 0.1% |
Florida v. Jardines | 1 | 0.1% |
Fog computing | 1 | 0.1% |
Food | 1 | 0.1% |
Force | 1 | 0.1% |
Forced disappearance | 1 | 0.1% |
Forced displacement | 1 | 0.1% |
Forecasting | 1 | 0.1% |
Foreign Agents Registration Act | 1 | 0.1% |
Foreign fighters in the Syrian and Iraqi Civil Wars | 1 | 0.1% |
Form I-94 | 1 | 0.1% |
Framing (social sciences) | 1 | 0.1% |
Franchising | 1 | 0.1% |
Freedom of association | 1 | 0.1% |
Freedom of speech in the United States | 1 | 0.1% |
Freight forwarder | 1 | 0.1% |
Fulton MacGregor | 1 | 0.1% |
Function (mathematics) | 1 | 0.1% |
Futures studies | 1 | 0.1% |
Fuzzing | 1 | 0.1% |
Félicien Kabuga | 1 | 0.1% |
G20 | 1 | 0.1% |
Gang | 1 | 0.1% |
Gatekeeping (communication) | 1 | 0.1% |
Gaza Strip | 1 | 0.1% |
Gender equality | 1 | 0.1% |
General Atomics MQ-9 Reaper | 1 | 0.1% |
General Schedule (US civil service pay scale) | 1 | 0.1% |
General principles of European Union law | 1 | 0.1% |
Generation Z | 1 | 0.1% |
Genome | 1 | 0.1% |
Genomics | 1 | 0.1% |
Geolocation | 1 | 0.1% |
Geprüfte Sicherheit | 1 | 0.1% |
Gerasimov doctrine | 1 | 0.1% |
Gift card | 1 | 0.1% |
Giovanni Buttarelli | 1 | 0.1% |
Glenn Greenwald | 1 | 0.1% |
Glik v. Cunniffe | 1 | 0.1% |
Global Counterterrorism Forum | 1 | 0.1% |
Global warming | 1 | 0.1% |
Google Glass | 1 | 0.1% |
Gorgon Stare | 1 | 0.1% |
Government agencies | 1 | 0.1% |
Government procurement in the European Union | 1 | 0.1% |
Graphical user interface | 1 | 0.1% |
Griswold v. Connecticut | 1 | 0.1% |
Gross domestic product | 1 | 0.1% |
Ground truth | 1 | 0.1% |
Gundy v. United States | 1 | 0.1% |
HADOPI law | 1 | 0.1% |
HKmap.live | 1 | 0.1% |
HONR Network | 1 | 0.1% |
Hand | 1 | 0.1% |
Harassment | 1 | 0.1% |
Harm reduction | 1 | 0.1% |
Hatch Act of 1939 | 1 | 0.1% |
Health Information Technology for Economic and Clinical Health Act | 1 | 0.1% |
Health information on the Internet | 1 | 0.1% |
Health technology in the United States | 1 | 0.1% |
Heartbleed | 1 | 0.1% |
Hernandez v. Mesa | 1 | 0.1% |
Heuristic | 1 | 0.1% |
Hijackers in the September 11 attacks | 1 | 0.1% |
Hispanic and Latino Americans | 1 | 0.1% |
Homeland Security Act of 2002 | 1 | 0.1% |
Homomorphic encryption | 1 | 0.1% |
Honeypot (computing) | 1 | 0.1% |
Hong Kong Basic Law | 1 | 0.1% |
Huang Jing (academic) | 1 | 0.1% |
Human capital | 1 | 0.1% |
Human genome | 1 | 0.1% |
Human resource management system | 1 | 0.1% |
Human resources | 1 | 0.1% |
Human rights in China | 1 | 0.1% |
Human trafficking | 1 | 0.1% |
Human-centered design | 1 | 0.1% |
Human–computer interaction | 1 | 0.1% |
Hyde Amendment | 1 | 0.1% |
Hyperlink | 1 | 0.1% |
IDENT1 | 1 | 0.1% |
IEEE 802.11 | 1 | 0.1% |
IMSI-catcher | 1 | 0.1% |
IOS 8 | 1 | 0.1% |
IPad | 1 | 0.1% |
IT security standards | 1 | 0.1% |
Identification | 1 | 0.1% |
Identity Cards Act 2006 | 1 | 0.1% |
Identity fraud | 1 | 0.1% |
Ideology | 1 | 0.1% |
Igor Sergun | 1 | 0.1% |
Illinois Brick Co. v. Illinois | 1 | 0.1% |
Illinois v. Gates | 1 | 0.1% |
Image editing | 1 | 0.1% |
Image quality | 1 | 0.1% |
Immigration officer | 1 | 0.1% |
Impressionism | 1 | 0.1% |
Incapacitation (penology) | 1 | 0.1% |
Incident Command System | 1 | 0.1% |
Industrial and organizational psychology | 1 | 0.1% |
Industrial espionage | 1 | 0.1% |
Information and media literacy | 1 | 0.1% |
Information policy | 1 | 0.1% |
Information seeking | 1 | 0.1% |
Information society | 1 | 0.1% |
Informational self-determination | 1 | 0.1% |
Initiative | 1 | 0.1% |
Inquiry | 1 | 0.1% |
Insight | 1 | 0.1% |
Inspection | 1 | 0.1% |
Inspector General report on the Crossfire Hurricane investigation | 1 | 0.1% |
Instant messaging | 1 | 0.1% |
Int'l Refugee Assistance Project v. Trump | 1 | 0.1% |
Intelligence assessment | 1 | 0.1% |
Intelligence cycle management | 1 | 0.1% |
Internal audit | 1 | 0.1% |
International Emergency Economic Powers Act | 1 | 0.1% |
International Mobile Equipment Identity | 1 | 0.1% |
International Traffic in Arms Regulations | 1 | 0.1% |
International mobile subscriber identity | 1 | 0.1% |
Internet activism | 1 | 0.1% |
Internet censorship in Russia | 1 | 0.1% |
Internet censorship in Thailand | 1 | 0.1% |
Internet culture | 1 | 0.1% |
Internet fraud | 1 | 0.1% |
Internet outage | 1 | 0.1% |
Interpellation (philosophy) | 1 | 0.1% |
Interpersonal relationship | 1 | 0.1% |
Interrogation | 1 | 0.1% |
Interview | 1 | 0.1% |
Intrusion detection system | 1 | 0.1% |
Inventory | 1 | 0.1% |
Investment | 1 | 0.1% |
Investment Advisers Act of 1940 | 1 | 0.1% |
Investor | 1 | 0.1% |
Iridology | 1 | 0.1% |
Islam in the United States | 1 | 0.1% |
Islamic terrorism | 1 | 0.1% |
Ivan Golunov | 1 | 0.1% |
Iyad Rahwan | 1 | 0.1% |
J. Edgar Hoover | 1 | 0.1% |
Jack Balkin | 1 | 0.1% |
Jair Bolsonaro | 1 | 0.1% |
Janai Nelson | 1 | 0.1% |
Jean-Luc Mélenchon | 1 | 0.1% |
Jeff Moss (hacker) | 1 | 0.1% |
Jencks Act | 1 | 0.1% |
Jeremy Corbyn | 1 | 0.1% |
Jeremy Hunt | 1 | 0.1% |
Jihadism | 1 | 0.1% |
Job interview | 1 | 0.1% |
Joel Kaplan | 1 | 0.1% |
John Locke | 1 | 0.1% |
Joseph Nye | 1 | 0.1% |
Juan Guaidó | 1 | 0.1% |
Judicial disqualification | 1 | 0.1% |
Judicial review | 1 | 0.1% |
Jun Murai | 1 | 0.1% |
Jurisprudence | 1 | 0.1% |
Jury trial | 1 | 0.1% |
Juvenile delinquency | 1 | 0.1% |
K. S. Puttaswamy | 1 | 0.1% |
Karrie Karahalios | 1 | 0.1% |
Kathryn Parsons | 1 | 0.1% |
Keychain | 1 | 0.1% |
Khadija Ismayilova | 1 | 0.1% |
Kill chain | 1 | 0.1% |
Kleptocracy | 1 | 0.1% |
Knowledge economy | 1 | 0.1% |
Ko Wen-je | 1 | 0.1% |
Kommunikationsbehörde Austria | 1 | 0.1% |
Kosciuszko Institute | 1 | 0.1% |
Kris Kobach | 1 | 0.1% |
Kriti Sharma | 1 | 0.1% |
Kronstadt | 1 | 0.1% |
Kulbhushan Jadhav | 1 | 0.1% |
Labour law | 1 | 0.1% |
Language assessment | 1 | 0.1% |
Languages of India | 1 | 0.1% |
Languages of the European Union | 1 | 0.1% |
Laura Poitras | 1 | 0.1% |
Law (principle) | 1 | 0.1% |
Law of Australia | 1 | 0.1% |
Law of Canada | 1 | 0.1% |
Law of war | 1 | 0.1% |
Law review | 1 | 0.1% |
Lawful interception | 1 | 0.1% |
Lawful permanent residents (United States) | 1 | 0.1% |
Layoff | 1 | 0.1% |
Lease | 1 | 0.1% |
Legal challenges to the Trump travel ban | 1 | 0.1% |
Legal concepts | 1 | 0.1% |
Legal guardian | 1 | 0.1% |
Legitimacy (political) | 1 | 0.1% |
Leonard Pozner | 1 | 0.1% |
Lethal autonomous weapon | 1 | 0.1% |
Li-Fi | 1 | 0.1% |
Liability insurance | 1 | 0.1% |
Lie detection | 1 | 0.1% |
Life sciences | 1 | 0.1% |
Light-emitting diode | 1 | 0.1% |
Likelihood function | 1 | 0.1% |
Lilian Edwards | 1 | 0.1% |
Limited partnership | 1 | 0.1% |
Lip reading | 1 | 0.1% |
Live scan | 1 | 0.1% |
Lockheed Martin F-35 Lightning II | 1 | 0.1% |
Logarithm | 1 | 0.1% |
Logistics | 1 | 0.1% |
Lone wolf attacks | 1 | 0.1% |
Low-carbon economy | 1 | 0.1% |
Lèse majesté in Thailand | 1 | 0.1% |
Lèse-majesté in Thailand | 1 | 0.1% |
Machine ethics | 1 | 0.1% |
Machine-readable passport | 1 | 0.1% |
MagicBands | 1 | 0.1% |
Magnitsky Act | 1 | 0.1% |
Maher Arar | 1 | 0.1% |
Main Intelligence Directorate | 1 | 0.1% |
Mainstream media | 1 | 0.1% |
Marci Harris | 1 | 0.1% |
Margarita Simonyan | 1 | 0.1% |
Margin of appreciation | 1 | 0.1% |
Maria Cantwell | 1 | 0.1% |
Maria Ressa | 1 | 0.1% |
Mariano-Florentino Cuéllar | 1 | 0.1% |
Market research | 1 | 0.1% |
Market segmentation | 1 | 0.1% |
Marketing research | 1 | 0.1% |
Marketing strategy | 1 | 0.1% |
Markets in Financial Instruments Directive 2004 | 1 | 0.1% |
Marvin Minsky | 1 | 0.1% |
Maryland v. King | 1 | 0.1% |
Mass media in China | 1 | 0.1% |
Mathematical model | 1 | 0.1% |
Mathematics | 1 | 0.1% |
Max Weber | 1 | 0.1% |
Mayor | 1 | 0.1% |
McCleskey v. Kemp | 1 | 0.1% |
Mean time between failures | 1 | 0.1% |
Media independence | 1 | 0.1% |
Media of Ukraine | 1 | 0.1% |
Medical billing | 1 | 0.1% |
Medical diagnosis | 1 | 0.1% |
Medical prescription | 1 | 0.1% |
Memory | 1 | 0.1% |
Menlo Report | 1 | 0.1% |
Mental Health Act 1983 | 1 | 0.1% |
Metagenomics | 1 | 0.1% |
Metrology | 1 | 0.1% |
Michael Geist | 1 | 0.1% |
Microblogging | 1 | 0.1% |
Microsoft account | 1 | 0.1% |
Microwork | 1 | 0.1% |
Mike Pompeo | 1 | 0.1% |
Military deception | 1 | 0.1% |
Military intelligence | 1 | 0.1% |
Military police of the United Kingdom | 1 | 0.1% |
Military science | 1 | 0.1% |
Military simulation | 1 | 0.1% |
Millennials | 1 | 0.1% |
Milorad Dodik | 1 | 0.1% |
Misdemeanor | 1 | 0.1% |
Misinformation related to the 2019–20 coronavirus pandemic | 1 | 0.1% |
Missing person | 1 | 0.1% |
Mixed reality | 1 | 0.1% |
Mobile ad hoc network | 1 | 0.1% |
Mobile device forensics | 1 | 0.1% |
Mobile security | 1 | 0.1% |
Mobile web | 1 | 0.1% |
Modem | 1 | 0.1% |
Mohammad bin Salman | 1 | 0.1% |
Montreal Institute for Genocide and Human Rights Studies | 1 | 0.1% |
Mortgage law | 1 | 0.1% |
Motor vehicle exception | 1 | 0.1% |
Mueller Report | 1 | 0.1% |
Multilateralism | 1 | 0.1% |
Multimedia | 1 | 0.1% |
Municipal Police (France) | 1 | 0.1% |
Municipal broadband | 1 | 0.1% |
Murder of Balbir Singh Sodhi | 1 | 0.1% |
Murder of Seth Rich | 1 | 0.1% |
Murphy v. National Collegiate Athletic Association | 1 | 0.1% |
NHS Connecting for Health | 1 | 0.1% |
NIST Special Publication 800-53 | 1 | 0.1% |
Nancy Pelosi | 1 | 0.1% |
Nanosensor | 1 | 0.1% |
Nation | 1 | 0.1% |
National Instant Criminal Background Check System | 1 | 0.1% |
National Pupil Database | 1 | 0.1% |
National identification number | 1 | 0.1% |
National service in Singapore | 1 | 0.1% |
Nationwide Suspicious Activity Reporting Initiative | 1 | 0.1% |
Natural environment | 1 | 0.1% |
Natural justice | 1 | 0.1% |
Natural law | 1 | 0.1% |
Natural resource | 1 | 0.1% |
Navigation | 1 | 0.1% |
Necessity (criminal law) | 1 | 0.1% |
Neil Gorsuch | 1 | 0.1% |
Network sovereignty | 1 | 0.1% |
Newsnight | 1 | 0.1% |
Nicolás Maduro | 1 | 0.1% |
Nigel Farage | 1 | 0.1% |
Nikol Pashinyan | 1 | 0.1% |
No-knock warrant | 1 | 0.1% |
Nolo contendere | 1 | 0.1% |
Non-coding DNA | 1 | 0.1% |
Non-disclosure agreement | 1 | 0.1% |
Nondelegation doctrine | 1 | 0.1% |
Nonprofit organization | 1 | 0.1% |
Nonviolence | 1 | 0.1% |
Normative | 1 | 0.1% |
North Atlantic Treaty | 1 | 0.1% |
Nosedive (Black Mirror) | 1 | 0.1% |
Novichok agent | 1 | 0.1% |
Nudge theory | 1 | 0.1% |
Nursing home care | 1 | 0.1% |
Object (computer science) | 1 | 0.1% |
Oculus Rift | 1 | 0.1% |
On-board diagnostics | 1 | 0.1% |
On-premises software | 1 | 0.1% |
Online Copyright Infringement Liability Limitation Act | 1 | 0.1% |
Online community | 1 | 0.1% |
Online dating application | 1 | 0.1% |
Operation Fortitude | 1 | 0.1% |
Opinion | 1 | 0.1% |
Opioid epidemic in the United States | 1 | 0.1% |
Organ donation | 1 | 0.1% |
Over-the-top media services | 1 | 0.1% |
PAYGO | 1 | 0.1% |
Packaging machinery | 1 | 0.1% |
Packingham v. North Carolina | 1 | 0.1% |
Palestinian territories | 1 | 0.1% |
Pan-European identity | 1 | 0.1% |
Pandemic | 1 | 0.1% |
Panorama (British TV programme) | 1 | 0.1% |
Parameter | 1 | 0.1% |
Pardon | 1 | 0.1% |
Parental controls | 1 | 0.1% |
Parenting | 1 | 0.1% |
Parking | 1 | 0.1% |
Parliamentary Ombudsman | 1 | 0.1% |
Parliamentary privilege | 1 | 0.1% |
Parliamentary sovereignty | 1 | 0.1% |
Parole | 1 | 0.1% |
Party (law) | 1 | 0.1% |
Passports of the European Union | 1 | 0.1% |
Password manager | 1 | 0.1% |
Patient | 1 | 0.1% |
Patrick Leahy | 1 | 0.1% |
Paul Ekman | 1 | 0.1% |
Paul Rübig | 1 | 0.1% |
Paul Virilio | 1 | 0.1% |
Payment Card Industry Data Security Standard | 1 | 0.1% |
Pedestrian | 1 | 0.1% |
Pegasus Project (investigation) | 1 | 0.1% |
Penal Code (Singapore) | 1 | 0.1% |
Pepper spray | 1 | 0.1% |
Peremptory norm | 1 | 0.1% |
Person of color | 1 | 0.1% |
Personal digital assistant | 1 | 0.1% |
Personal health record | 1 | 0.1% |
Personal identification | 1 | 0.1% |
Personal identification number | 1 | 0.1% |
Personal, Social, Health and Economic (PSHE) education | 1 | 0.1% |
Personhood | 1 | 0.1% |
Peter Pomerantsev | 1 | 0.1% |
PewDiePie | 1 | 0.1% |
Photojournalism | 1 | 0.1% |
Physical Security Interoperability Alliance | 1 | 0.1% |
Physician | 1 | 0.1% |
Pickpocketing | 1 | 0.1% |
Pickup artist | 1 | 0.1% |
Plandemic | 1 | 0.1% |
Plato | 1 | 0.1% |
Plea bargain | 1 | 0.1% |
Pledge of Allegiance | 1 | 0.1% |
Pluralism (political philosophy) | 1 | 0.1% |
Podcast | 1 | 0.1% |
Police use of deadly force in the United States | 1 | 0.1% |
Political action committee | 1 | 0.1% |
Political bias | 1 | 0.1% |
Political communication | 1 | 0.1% |
Political repression | 1 | 0.1% |
Politics and technology | 1 | 0.1% |
Politics of the Republic of China | 1 | 0.1% |
Politics of the United States | 1 | 0.1% |
Polling place | 1 | 0.1% |
Port San Antonio | 1 | 0.1% |
Port security | 1 | 0.1% |
Posse Comitatus Act | 1 | 0.1% |
Posse comitatus | 1 | 0.1% |
Post-Soviet states | 1 | 0.1% |
Post-quantum cryptography | 1 | 0.1% |
Potential enlargement of the European Union | 1 | 0.1% |
Precision and recall | 1 | 0.1% |
Precision medicine | 1 | 0.1% |
Prejudice | 1 | 0.1% |
Preliminary injunction | 1 | 0.1% |
Preliminary ruling | 1 | 0.1% |
Presidency of Joe Biden | 1 | 0.1% |
Press release | 1 | 0.1% |
Prevention | 1 | 0.1% |
Prigg v. Pennsylvania | 1 | 0.1% |
Prior probability | 1 | 0.1% |
Privacy concerns with social networking services | 1 | 0.1% |
Private Securities Litigation Reform Act | 1 | 0.1% |
Private biometrics | 1 | 0.1% |
Pro se legal representation in the United States | 1 | 0.1% |
Procès-verbal | 1 | 0.1% |
Professional and Amateur Sports Protection Act of 1992 | 1 | 0.1% |
Professional ethics | 1 | 0.1% |
Professor | 1 | 0.1% |
Progress | 1 | 0.1% |
Project Griffin | 1 | 0.1% |
Project Initiation Documentation | 1 | 0.1% |
Project Solarium | 1 | 0.1% |
Proof of concept | 1 | 0.1% |
Propaganda in China | 1 | 0.1% |
Prostitution | 1 | 0.1% |
Protect America Act of 2007 | 1 | 0.1% |
Protected health information | 1 | 0.1% |
Protection from Online Falsehoods and Manipulation Act | 1 | 0.1% |
Protection of Freedoms Act 2012 | 1 | 0.1% |
Prototype | 1 | 0.1% |
Provinces and territories of Canada | 1 | 0.1% |
Proxemics | 1 | 0.1% |
Proxy server | 1 | 0.1% |
Proxy war | 1 | 0.1% |
Pseudonym | 1 | 0.1% |
Pseudoscience | 1 | 0.1% |
Public defender (United States) | 1 | 0.1% |
Public diplomacy | 1 | 0.1% |
Public relations | 1 | 0.1% |
Public services | 1 | 0.1% |
Publication ban | 1 | 0.1% |
Quadrilateral Security Dialogue | 1 | 0.1% |
Quality of life | 1 | 0.1% |
Quantitative research | 1 | 0.1% |
Quantum computing | 1 | 0.1% |
Quartile | 1 | 0.1% |
Quasi-experiment | 1 | 0.1% |
Quebec Charter of Human Rights and Freedoms | 1 | 0.1% |
REvil | 1 | 0.1% |
Racialization | 1 | 0.1% |
Rafael Correa | 1 | 0.1% |
Rampart scandal | 1 | 0.1% |
Ramzan Kadyrov | 1 | 0.1% |
Random checkpoint | 1 | 0.1% |
Rationality | 1 | 0.1% |
ReCAPTCHA | 1 | 0.1% |
Real-name system | 1 | 0.1% |
Reality | 1 | 0.1% |
Reasonable doubt | 1 | 0.1% |
Red light camera | 1 | 0.1% |
Regulation of algorithms | 1 | 0.1% |
Rehabilitation (penology) | 1 | 0.1% |
Reinforcement learning | 1 | 0.1% |
Relational model | 1 | 0.1% |
Religious intolerance | 1 | 0.1% |
Remote keyless system | 1 | 0.1% |
Republic (Plato) | 1 | 0.1% |
Reputation | 1 | 0.1% |
Reputation management | 1 | 0.1% |
Request for proposal | 1 | 0.1% |
Resilience (organizational) | 1 | 0.1% |
Resource | 1 | 0.1% |
Resource Description Framework | 1 | 0.1% |
Reuse | 1 | 0.1% |
Revenge porn | 1 | 0.1% |
Right on Crime | 1 | 0.1% |
Right to Information Act, 2005 | 1 | 0.1% |
Right to disconnect | 1 | 0.1% |
Right to know | 1 | 0.1% |
Right to property | 1 | 0.1% |
Right-wing politics | 1 | 0.1% |
Right-wing populism | 1 | 0.1% |
Rikers Island | 1 | 0.1% |
Rita v. United States | 1 | 0.1% |
Roaming | 1 | 0.1% |
Robert Muggah | 1 | 0.1% |
Robert Winston | 1 | 0.1% |
Robocall | 1 | 0.1% |
Robot ethics | 1 | 0.1% |
Rodrigo Duterte | 1 | 0.1% |
Rohingya people | 1 | 0.1% |
Roman Giertych | 1 | 0.1% |
Roulette | 1 | 0.1% |
Royalty payment | 1 | 0.1% |
Russian foreign agent law | 1 | 0.1% |
Russian language | 1 | 0.1% |
Russian military deception | 1 | 0.1% |
Russian military intervention in Ukraine (2014–present) | 1 | 0.1% |
Russo-Georgian War | 1 | 0.1% |
Rwandan genocide | 1 | 0.1% |
Résumé | 1 | 0.1% |
SAT | 1 | 0.1% |
Sam Leith | 1 | 0.1% |
Sampling (statistics) | 1 | 0.1% |
Sarfraz Manzoor | 1 | 0.1% |
Satellite | 1 | 0.1% |
Satellite navigation device | 1 | 0.1% |
Scenario planning | 1 | 0.1% |
Science and Technology Options Assessment | 1 | 0.1% |
Scientific misconduct | 1 | 0.1% |
Score (statistics) | 1 | 0.1% |
Scots law | 1 | 0.1% |
Scottish statutory instrument | 1 | 0.1% |
Screenshot | 1 | 0.1% |
Search neutrality | 1 | 0.1% |
Second Chechen War | 1 | 0.1% |
Secondary Security Screening Selection | 1 | 0.1% |
Secrecy | 1 | 0.1% |
Secrecy of correspondence | 1 | 0.1% |
Secretary General of NATO | 1 | 0.1% |
Secure Digital | 1 | 0.1% |
Security of person | 1 | 0.1% |
Sedition | 1 | 0.1% |
Sedition Act (Singapore) | 1 | 0.1% |
Select committee (United Kingdom) | 1 | 0.1% |
Selective exposure theory | 1 | 0.1% |
Self-assembly | 1 | 0.1% |
Selfie | 1 | 0.1% |
Semantic Web | 1 | 0.1% |
Semantics | 1 | 0.1% |
Semiconductor device fabrication | 1 | 0.1% |
Sensitive Security Information | 1 | 0.1% |
Sensitivity and specificity | 1 | 0.1% |
Sentiment analysis | 1 | 0.1% |
Separation of powers | 1 | 0.1% |
Sergei Skripal | 1 | 0.1% |
Sesame Credit | 1 | 0.1% |
Severability | 1 | 0.1% |
Severe acute respiratory syndrome coronavirus 2 | 1 | 0.1% |
Sex worker | 1 | 0.1% |
Sexual orientation | 1 | 0.1% |
Sharyl Attkisson | 1 | 0.1% |
Sheriffs in the United States | 1 | 0.1% |
Shoshana Zuboff | 1 | 0.1% |
Signals intelligence | 1 | 0.1% |
Sikhs | 1 | 0.1% |
Skinner v. Railway Labor Executives Ass'n | 1 | 0.1% |
Smart power | 1 | 0.1% |
Smart transducer | 1 | 0.1% |
Smoking | 1 | 0.1% |
Social Security (United States) | 1 | 0.1% |
Social contract | 1 | 0.1% |
Social control | 1 | 0.1% |
Social equality | 1 | 0.1% |
Social inequality | 1 | 0.1% |
Social media analytics | 1 | 0.1% |
Social media measurement | 1 | 0.1% |
Social movement | 1 | 0.1% |
Social responsibility | 1 | 0.1% |
Social stigma | 1 | 0.1% |
Socialism | 1 | 0.1% |
Sociology | 1 | 0.1% |
Socrates | 1 | 0.1% |
Soft law | 1 | 0.1% |
Softmax function | 1 | 0.1% |
Software agent | 1 | 0.1% |
Software as a service | 1 | 0.1% |
Solicitor | 1 | 0.1% |
Solid-state drive | 1 | 0.1% |
Sortition | 1 | 0.1% |
Sound recording and reproduction | 1 | 0.1% |
Sousveillance | 1 | 0.1% |
South Asia | 1 | 0.1% |
Sovereign immunity | 1 | 0.1% |
Space exploration | 1 | 0.1% |
Spanish pronouns | 1 | 0.1% |
Speaker of the House of Representatives (Netherlands) | 1 | 0.1% |
Special needs exception | 1 | 0.1% |
Speech | 1 | 0.1% |
Speed limit | 1 | 0.1% |
Sphere of influence | 1 | 0.1% |
Sport | 1 | 0.1% |
Sports betting | 1 | 0.1% |
Sri Lankan Tamils | 1 | 0.1% |
Standard deviation | 1 | 0.1% |
Standard of review | 1 | 0.1% |
State law (United States) | 1 | 0.1% |
State of nature | 1 | 0.1% |
State of the Union | 1 | 0.1% |
States' rights | 1 | 0.1% |
Statistical model | 1 | 0.1% |
Statistical significance | 1 | 0.1% |
Statutory interpretation | 1 | 0.1% |
Statutory law | 1 | 0.1% |
Steganography | 1 | 0.1% |
Steve Bannon | 1 | 0.1% |
Steven Brill (journalist) | 1 | 0.1% |
Stimulus modality | 1 | 0.1% |
Stock market | 1 | 0.1% |
Stop-and-frisk in New York City | 1 | 0.1% |
Strategic planning | 1 | 0.1% |
Streisand effect | 1 | 0.1% |
Strict liability | 1 | 0.1% |
Stylometry | 1 | 0.1% |
Subpoena | 1 | 0.1% |
Subsidiarity | 1 | 0.1% |
Substance abuse | 1 | 0.1% |
Suicide attack | 1 | 0.1% |
Summary offence | 1 | 0.1% |
Supercomputer | 1 | 0.1% |
Supermarket | 1 | 0.1% |
Supervised learning | 1 | 0.1% |
Supplemental Security Income | 1 | 0.1% |
Support-vector machine | 1 | 0.1% |
Surveillance issues in smart cities | 1 | 0.1% |
Suspicious activity report | 1 | 0.1% |
Sustainable procurement | 1 | 0.1% |
Swing state | 1 | 0.1% |
Sylvia Lim | 1 | 0.1% |
Systematic review | 1 | 0.1% |
Systems engineering | 1 | 0.1% |
Tamim bin Hamad Al Thani | 1 | 0.1% |
Targeted killing | 1 | 0.1% |
Taser | 1 | 0.1% |
Task switching (psychology) | 1 | 0.1% |
Tax credit overpayment | 1 | 0.1% |
Taylor v Attorney-General | 1 | 0.1% |
Teacher | 1 | 0.1% |
Teachta Dála | 1 | 0.1% |
Technology policy | 1 | 0.1% |
Technology roadmap | 1 | 0.1% |
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 | 1 | 0.1% |
Telecommunications Act of 1996 | 1 | 0.1% |
Telecommunications in Angola | 1 | 0.1% |
Telegraphy | 1 | 0.1% |
Telematics | 1 | 0.1% |
Telephone Consumer Protection Act of 1991 | 1 | 0.1% |
Telepresence | 1 | 0.1% |
Television licensing in the United Kingdom | 1 | 0.1% |
Tempora | 1 | 0.1% |
Tenant screening | 1 | 0.1% |
Tenth Amendment to the United States Constitution | 1 | 0.1% |
Terrorist Surveillance Program | 1 | 0.1% |
Test (assessment) | 1 | 0.1% |
Text messaging | 1 | 0.1% |
Texture mapping | 1 | 0.1% |
The Circle (Eggers novel) | 1 | 0.1% |
The Emergency (India) | 1 | 0.1% |
Theory | 1 | 0.1% |
Theory of change | 1 | 0.1% |
Thesis | 1 | 0.1% |
Thomas Hobbes | 1 | 0.1% |
Three warfares | 1 | 0.1% |
Time limit | 1 | 0.1% |
Time series | 1 | 0.1% |
Tokenization (data security) | 1 | 0.1% |
Toleration | 1 | 0.1% |
Toll road | 1 | 0.1% |
Tonino Picula | 1 | 0.1% |
Tony Hall, Baron Hall of Birkenhead | 1 | 0.1% |
Tool | 1 | 0.1% |
Tor (network) | 1 | 0.1% |
Touchpoint | 1 | 0.1% |
Touchscreen | 1 | 0.1% |
Town and Country Planning Act 1990 | 1 | 0.1% |
Traceability | 1 | 0.1% |
Trade and Technology Council | 1 | 0.1% |
Trade-off | 1 | 0.1% |
Traffic light | 1 | 0.1% |
Training and development | 1 | 0.1% |
Trans-Pacific Partnership | 1 | 0.1% |
Transcoding | 1 | 0.1% |
Transitional justice | 1 | 0.1% |
Transmitter | 1 | 0.1% |
Transnational organized crime | 1 | 0.1% |
Trash (computing) | 1 | 0.1% |
Trickbot | 1 | 0.1% |
Trim (computing) | 1 | 0.1% |
Trolley problem | 1 | 0.1% |
Trump administration family separation policy | 1 | 0.1% |
Trump wall | 1 | 0.1% |
Trust service provider | 1 | 0.1% |
Trustee | 1 | 0.1% |
Turing test | 1 | 0.1% |
Two Treatises of Government | 1 | 0.1% |
UKUSA Agreement | 1 | 0.1% |
USB | 1 | 0.1% |
Unaccompanied Alien Children | 1 | 0.1% |
Unaccompanied minor | 1 | 0.1% |
Unattended ground sensor | 1 | 0.1% |
Unconscionability | 1 | 0.1% |
Unfair Commercial Practices Directive 2005 | 1 | 0.1% |
United Kingdom European Union membership referendum, 2016 | 1 | 0.1% |
United Nations Convention against Torture | 1 | 0.1% |
United Nations special rapporteur | 1 | 0.1% |
United States Federal Sentencing Guidelines | 1 | 0.1% |
United States Foreign Intelligence Surveillance Court of Review | 1 | 0.1% |
United States budget process | 1 | 0.1% |
United States courts of appeals | 1 | 0.1% |
United States cyber-diplomacy | 1 | 0.1% |
United States elections, 2018 | 1 | 0.1% |
United States nationality law | 1 | 0.1% |
United States presidential election, 2016 | 1 | 0.1% |
United States v. Causby | 1 | 0.1% |
United States v. Google Inc. | 1 | 0.1% |
United States v. Warshak | 1 | 0.1% |
University and college admission | 1 | 0.1% |
Unmanned combat aerial vehicle | 1 | 0.1% |
Unstructured data | 1 | 0.1% |
Unsupervised learning | 1 | 0.1% |
Use of UAVs in law enforcement | 1 | 0.1% |
User activity monitoring | 1 | 0.1% |
User interface | 1 | 0.1% |
User-centered design | 1 | 0.1% |
Utilitarianism | 1 | 0.1% |
Vaccine hesitancy | 1 | 0.1% |
Vaccine passports during the COVID-19 pandemic | 1 | 0.1% |
Value (economics) | 1 | 0.1% |
Value chain | 1 | 0.1% |
Vanita Gupta | 1 | 0.1% |
Vehicular ad-hoc network | 1 | 0.1% |
Vein matching | 1 | 0.1% |
Venture capital | 1 | 0.1% |
Vernonia School District 47J v. Acton | 1 | 0.1% |
Veto | 1 | 0.1% |
Victims' rights | 1 | 0.1% |
Victoria Derbyshire | 1 | 0.1% |
Video manipulation | 1 | 0.1% |
Viktor Orbán | 1 | 0.1% |
Viktor Yanukovych | 1 | 0.1% |
Viktor Yushchenko | 1 | 0.1% |
Violent crime | 1 | 0.1% |
Viral phenomenon | 1 | 0.1% |
Virtual reality headset | 1 | 0.1% |
Virtual world | 1 | 0.1% |
Vision | 1 | 0.1% |
Volkswagen emissions scandal | 1 | 0.1% |
Volodymyr Zelenskyy | 1 | 0.1% |
Voluntary Voting System Guidelines | 1 | 0.1% |
Voter-verified paper audit trail | 1 | 0.1% |
Voting behavior | 1 | 0.1% |
Voyeurism | 1 | 0.1% |
Věra Jourová | 1 | 0.1% |
Warfare | 1 | 0.1% |
Washington v. Davis | 1 | 0.1% |
Watch | 1 | 0.1% |
Web Content Accessibility Guidelines | 1 | 0.1% |
Web beacon | 1 | 0.1% |
Web browsing history | 1 | 0.1% |
Web content | 1 | 0.1% |
Web service | 1 | 0.1% |
West Bank | 1 | 0.1% |
Whalen v. Roe | 1 | 0.1% |
Wicked problem | 1 | 0.1% |
Wiki | 1 | 0.1% |
Wildlife trade | 1 | 0.1% |
Wind power | 1 | 0.1% |
Wireless | 1 | 0.1% |
Wissenschaft | 1 | 0.1% |
Woman | 1 | 0.1% |
Workplace impact of artificial intelligence | 1 | 0.1% |
World Internet Conference | 1 | 0.1% |
World War I | 1 | 0.1% |
Write amplification | 1 | 0.1% |
Xbox | 1 | 0.1% |
Xinjiang internment camps | 1 | 0.1% |
Xinjiang re-education camps | 1 | 0.1% |
Yahoo! data breaches | 1 | 0.1% |
Yevgeny Prigozhin | 1 | 0.1% |
Yoko Ono | 1 | 0.1% |
abs | rel | |
---|---|---|
Active Measures Working Group | 1 | 100.0% |
Artificial intelligence | 1 | 100.0% |
Big data | 1 | 100.0% |
Computer security | 1 | 100.0% |
Countering Foreign Propaganda and Disinformation Act | 1 | 100.0% |
Counterintelligence | 1 | 100.0% |
Cyberattack | 1 | 100.0% |
Cyberspace | 1 | 100.0% |
Cyberwarfare | 1 | 100.0% |
Deception | 1 | 100.0% |
Disinformation | 1 | 100.0% |
Fake news | 1 | 100.0% |
Governance | 1 | 100.0% |
Government | 1 | 100.0% |
Human activities | 1 | 100.0% |
Information | 1 | 100.0% |
Information Age | 1 | 100.0% |
Information warfare | 1 | 100.0% |
Infrastructure | 1 | 100.0% |
Innovation | 1 | 100.0% |
Intelligence | 1 | 100.0% |
Internet | 1 | 100.0% |
Internet bot | 1 | 100.0% |
Issues in ethics | 1 | 100.0% |
Misinformation | 1 | 100.0% |
National security | 1 | 100.0% |
News | 1 | 100.0% |
Policy | 1 | 100.0% |
Political warfare | 1 | 100.0% |
Politics | 1 | 100.0% |
President of the United States | 1 | 100.0% |
Privacy | 1 | 100.0% |
Proactive cyber defence | 1 | 100.0% |
Propaganda | 1 | 100.0% |
Psychological warfare | 1 | 100.0% |
Security | 1 | 100.0% |
Social media | 1 | 100.0% |
Soft power | 1 | 100.0% |
Strategy | 1 | 100.0% |
Tallinn Manual | 1 | 100.0% |
abs | rel | |
---|---|---|
Access control | 1 | 100.0% |
Airport | 1 | 100.0% |
Airport security | 1 | 100.0% |
Authentication | 1 | 100.0% |
Automated fingerprint identification | 1 | 100.0% |
Background check | 1 | 100.0% |
Biometrics | 1 | 100.0% |
Boarding pass | 1 | 100.0% |
Border control | 1 | 100.0% |
Computer-Assisted Passenger Prescreening System | 1 | 100.0% |
Counter-terrorism | 1 | 100.0% |
Criminal record | 1 | 100.0% |
Facial recognition system | 1 | 100.0% |
Fingerprint | 1 | 100.0% |
Government | 1 | 100.0% |
Human activities | 1 | 100.0% |
Identity document | 1 | 100.0% |
Identity theft | 1 | 100.0% |
Integrated Automated Fingerprint Identification System | 1 | 100.0% |
Iris recognition | 1 | 100.0% |
National security | 1 | 100.0% |
Passport | 1 | 100.0% |
Patriot Act | 1 | 100.0% |
Privacy | 1 | 100.0% |
Security | 1 | 100.0% |
Security technology | 1 | 100.0% |
Smart card | 1 | 100.0% |
Surveillance | 1 | 100.0% |
Technology | 1 | 100.0% |
Travel visa | 1 | 100.0% |
abs | rel | |
---|---|---|
Foreign Intelligence Surveillance Act | 2 | 100.0% |
Government | 2 | 100.0% |
Human activities | 2 | 100.0% |
Justice | 2 | 100.0% |
Law | 2 | 100.0% |
National security | 2 | 100.0% |
Patriot Act | 2 | 100.0% |
Politics | 2 | 100.0% |
Probable cause | 2 | 100.0% |
Public sphere | 2 | 100.0% |
Social institutions | 2 | 100.0% |
Surveillance | 2 | 100.0% |
Telephone tapping | 2 | 100.0% |
Closed-circuit television | 1 | 50.0% |
Counter-terrorism | 1 | 50.0% |
Counterintelligence | 1 | 50.0% |
Crime | 1 | 50.0% |
Detention (imprisonment) | 1 | 50.0% |
ECHELON | 1 | 50.0% |
Espionage | 1 | 50.0% |
Expectation of privacy | 1 | 50.0% |
Facial recognition system | 1 | 50.0% |
Fourth Amendment to the United States Constitution | 1 | 50.0% |
Genetic testing | 1 | 50.0% |
Genetics | 1 | 50.0% |
Hijackers in the September 11 attacks | 1 | 50.0% |
Identity document | 1 | 50.0% |
Law enforcement | 1 | 50.0% |
Mass surveillance | 1 | 50.0% |
Medical privacy | 1 | 50.0% |
Pen register | 1 | 50.0% |
Personally identifiable information | 1 | 50.0% |
Privacy | 1 | 50.0% |
Privacy law | 1 | 50.0% |
Prosecutor | 1 | 50.0% |
Public law | 1 | 50.0% |
Radio-frequency identification | 1 | 50.0% |
Search and seizure | 1 | 50.0% |
Search warrant | 1 | 50.0% |
Security | 1 | 50.0% |
Terrorism | 1 | 50.0% |
Total Information Awareness | 1 | 50.0% |
Travel visa | 1 | 50.0% |
United States Constitution | 1 | 50.0% |
abs | rel | |
---|---|---|
Biometrics | 2 | 100.0% |
Government | 2 | 100.0% |
Human activities | 2 | 100.0% |
National security | 2 | 100.0% |
Politics | 2 | 100.0% |
Bill (law) | 1 | 50.0% |
Biometric passport | 1 | 50.0% |
Code of Virginia | 1 | 50.0% |
Common law | 1 | 50.0% |
Constitution of the United States | 1 | 50.0% |
Counter-terrorism | 1 | 50.0% |
Crime | 1 | 50.0% |
Criminal justice | 1 | 50.0% |
Criminal law | 1 | 50.0% |
Facial recognition system | 1 | 50.0% |
Fingerprint | 1 | 50.0% |
Fourth Amendment to the United States Constitution | 1 | 50.0% |
Homeland Security Act of 2002 | 1 | 50.0% |
Identity document | 1 | 50.0% |
Integrated Automated Fingerprint Identification System | 1 | 50.0% |
Intelligence analysis | 1 | 50.0% |
Internet privacy | 1 | 50.0% |
Iris recognition | 1 | 50.0% |
Issues in ethics | 1 | 50.0% |
Justice | 1 | 50.0% |
Katz v. United States | 1 | 50.0% |
Law | 1 | 50.0% |
Law enforcement | 1 | 50.0% |
Passenger name record | 1 | 50.0% |
Passport | 1 | 50.0% |
Policy | 1 | 50.0% |
Privacy | 1 | 50.0% |
Privacy law | 1 | 50.0% |
Public law | 1 | 50.0% |
Public sphere | 1 | 50.0% |
Search and seizure | 1 | 50.0% |
Secure Flight | 1 | 50.0% |
Security | 1 | 50.0% |
September 11 attacks | 1 | 50.0% |
Social institutions | 1 | 50.0% |
Social issues | 1 | 50.0% |
Surveillance | 1 | 50.0% |
Telephone tapping | 1 | 50.0% |
Terrorism | 1 | 50.0% |
Travel visa | 1 | 50.0% |
Virtue | 1 | 50.0% |
Visa Waiver Program | 1 | 50.0% |
abs | rel | |
---|---|---|
Computer security | 3 | 100.0% |
Facial recognition system | 3 | 100.0% |
Government | 3 | 100.0% |
Human activities | 3 | 100.0% |
Justice | 3 | 100.0% |
National security | 3 | 100.0% |
Privacy | 3 | 100.0% |
Security | 3 | 100.0% |
Surveillance | 3 | 100.0% |
Anonymity | 2 | 66.7% |
Applied ethics | 2 | 66.7% |
Bioterrorism | 2 | 66.7% |
Computing | 2 | 66.7% |
Crime prevention | 2 | 66.7% |
De-identification | 2 | 66.7% |
Health Insurance Portability and Accountability Act | 2 | 66.7% |
Latanya Sweeney | 2 | 66.7% |
Social issues | 2 | 66.7% |
Technology | 2 | 66.7% |
Webcam | 2 | 66.7% |
World Wide Web | 2 | 66.7% |
Biometric passport | 1 | 33.3% |
Biometrics | 1 | 33.3% |
Border control | 1 | 33.3% |
Brandon Mayfield | 1 | 33.3% |
Communications Assistance for Law Enforcement Act | 1 | 33.3% |
Computer-Assisted Passenger Prescreening System | 1 | 33.3% |
Counter-terrorism | 1 | 33.3% |
Cybercrime | 1 | 33.3% |
Data retention | 1 | 33.3% |
Database | 1 | 33.3% |
Detention (imprisonment) | 1 | 33.3% |
ECHELON | 1 | 33.3% |
Espionage | 1 | 33.3% |
Government and personhood | 1 | 33.3% |
Identity Cards Act 2006 | 1 | 33.3% |
Identity document | 1 | 33.3% |
Information privacy | 1 | 33.3% |
Internet | 1 | 33.3% |
Law | 1 | 33.3% |
Law enforcement | 1 | 33.3% |
Maher Arar | 1 | 33.3% |
Mass surveillance | 1 | 33.3% |
Money laundering | 1 | 33.3% |
Passenger name record | 1 | 33.3% |
Passport | 1 | 33.3% |
Patriot Act | 1 | 33.3% |
Personally identifiable information | 1 | 33.3% |
Politics | 1 | 33.3% |
Privacy law | 1 | 33.3% |
Public sphere | 1 | 33.3% |
Radio-frequency identification | 1 | 33.3% |
Remand (detention) | 1 | 33.3% |
Risk | 1 | 33.3% |
Search and seizure | 1 | 33.3% |
Secure Flight | 1 | 33.3% |
Security certificate | 1 | 33.3% |
September 11 attacks | 1 | 33.3% |
Social institutions | 1 | 33.3% |
Telephone tapping | 1 | 33.3% |
Terrorism | 1 | 33.3% |
Torture | 1 | 33.3% |
Travel visa | 1 | 33.3% |
abs | rel | |
---|---|---|
Human activities | 5 | 71.4% |
Government | 4 | 57.1% |
Politics | 4 | 57.1% |
Culture | 3 | 42.9% |
John Lennon | 3 | 42.9% |
National security | 3 | 42.9% |
Privacy | 3 | 42.9% |
Public sphere | 3 | 42.9% |
Computer security | 2 | 28.6% |
Crime | 2 | 28.6% |
Cyberattack | 2 | 28.6% |
Cyberwarfare | 2 | 28.6% |
Information | 2 | 28.6% |
Internet | 2 | 28.6% |
Justice | 2 | 28.6% |
Law | 2 | 28.6% |
News | 2 | 28.6% |
Research | 2 | 28.6% |
Social institutions | 2 | 28.6% |
Social media | 2 | 28.6% |
Soft power | 2 | 28.6% |
Accountability | 1 | 14.3% |
Act of Parliament | 1 | 14.3% |
Advertising | 1 | 14.3% |
Alternative dispute resolution | 1 | 14.3% |
Analytics | 1 | 14.3% |
Anonymity | 1 | 14.3% |
Arms control | 1 | 14.3% |
Arrest | 1 | 14.3% |
Artificial intelligence | 1 | 14.3% |
Australian administrative law | 1 | 14.3% |
Authoritarianism | 1 | 14.3% |
Automatic number-plate recognition | 1 | 14.3% |
Bankruptcy | 1 | 14.3% |
Biometrics | 1 | 14.3% |
Business | 1 | 14.3% |
Censorship | 1 | 14.3% |
Cold War | 1 | 14.3% |
Communication | 1 | 14.3% |
Consent | 1 | 14.3% |
Contract | 1 | 14.3% |
Counter-terrorism | 1 | 14.3% |
Credit bureau | 1 | 14.3% |
Credit card | 1 | 14.3% |
Credit history | 1 | 14.3% |
Credit score | 1 | 14.3% |
Damages | 1 | 14.3% |
Darfur | 1 | 14.3% |
Data breach | 1 | 14.3% |
Data quality | 1 | 14.3% |
Data security | 1 | 14.3% |
Democracy | 1 | 14.3% |
Denial-of-service attack | 1 | 14.3% |
Detention (imprisonment) | 1 | 14.3% |
Deterrence theory | 1 | 14.3% |
Direct marketing | 1 | 14.3% |
Discovery (law) | 1 | 14.3% |
Education | 1 | 14.3% |
Election | 1 | 14.3% |
Emergency | 1 | 14.3% |
Emergency management | 1 | 14.3% |
Emergency services | 1 | 14.3% |
Eric Rosenbach | 1 | 14.3% |
Espionage | 1 | 14.3% |
Expert | 1 | 14.3% |
Fake news | 1 | 14.3% |
Freedom of Information Act (United States) | 1 | 14.3% |
Freedom of information laws by country | 1 | 14.3% |
Health care | 1 | 14.3% |
Health informatics | 1 | 14.3% |
Incident Command System | 1 | 14.3% |
Information privacy | 1 | 14.3% |
Information sensitivity | 1 | 14.3% |
Information warfare | 1 | 14.3% |
Institutional review board | 1 | 14.3% |
Intelligence-led policing | 1 | 14.3% |
International relations | 1 | 14.3% |
Internet bot | 1 | 14.3% |
Internet of things | 1 | 14.3% |
Interoperability | 1 | 14.3% |
Interrogation | 1 | 14.3% |
Intranet | 1 | 14.3% |
Issues in ethics | 1 | 14.3% |
Joseph Nye | 1 | 14.3% |
Law enforcement | 1 | 14.3% |
Law enforcement agency | 1 | 14.3% |
Legal action | 1 | 14.3% |
Legal person | 1 | 14.3% |
Machine learning | 1 | 14.3% |
Mass media | 1 | 14.3% |
Money laundering | 1 | 14.3% |
Nuclear weapon | 1 | 14.3% |
Personally identifiable information | 1 | 14.3% |
Photography | 1 | 14.3% |
Police officer | 1 | 14.3% |
Policy | 1 | 14.3% |
Political campaign | 1 | 14.3% |
Political science | 1 | 14.3% |
Powers of the police in England and Wales | 1 | 14.3% |
Privacy Act 1988 | 1 | 14.3% |
Privacy Act of 1974 | 1 | 14.3% |
Privacy Commissioner (New Zealand) | 1 | 14.3% |
Privacy law | 1 | 14.3% |
Privacy policy | 1 | 14.3% |
Project Griffin | 1 | 14.3% |
Public health | 1 | 14.3% |
Public safety | 1 | 14.3% |
Reasonable person | 1 | 14.3% |
Regulatory compliance | 1 | 14.3% |
Right to privacy | 1 | 14.3% |
Right to privacy in New Zealand | 1 | 14.3% |
Russian interference in the 2016 United States elections | 1 | 14.3% |
Security | 1 | 14.3% |
September 11 attacks | 1 | 14.3% |
States and territories of Australia | 1 | 14.3% |
Technology | 1 | 14.3% |
Terrorism | 1 | 14.3% |
Terrorism Act 2000 | 1 | 14.3% |
Virtue | 1 | 14.3% |
Yoko Ono | 1 | 14.3% |
abs | rel | |
---|---|---|
Human activities | 8 | 100.0% |
Privacy | 8 | 100.0% |
Government | 7 | 87.5% |
National security | 7 | 87.5% |
Security | 6 | 75.0% |
Justice | 5 | 62.5% |
Law | 5 | 62.5% |
Personal data | 5 | 62.5% |
Politics | 5 | 62.5% |
Surveillance | 5 | 62.5% |
Information | 4 | 50.0% |
Regulatory compliance | 4 | 50.0% |
Data mining | 3 | 37.5% |
Policy | 3 | 37.5% |
Privacy Impact Assessment | 3 | 37.5% |
Public sphere | 3 | 37.5% |
Risk | 3 | 37.5% |
Social institutions | 3 | 37.5% |
Technology | 3 | 37.5% |
Terrorism | 3 | 37.5% |
Accountability | 2 | 25.0% |
Automated Targeting System | 2 | 25.0% |
Computer network | 2 | 25.0% |
Computing | 2 | 25.0% |
Constitution of the United States | 2 | 25.0% |
Crime | 2 | 25.0% |
Data | 2 | 25.0% |
Data analysis | 2 | 25.0% |
Database | 2 | 25.0% |
E-government | 2 | 25.0% |
Federal Information Security Management Act of 2002 | 2 | 25.0% |
Fourth Amendment to the United States Constitution | 2 | 25.0% |
Freedom of Information Act (United States) | 2 | 25.0% |
Information technology | 2 | 25.0% |
Link analysis | 2 | 25.0% |
Mining | 2 | 25.0% |
Privacy Act of 1974 | 2 | 25.0% |
Privacy engineering | 2 | 25.0% |
Privacy law | 2 | 25.0% |
Privacy policy | 2 | 25.0% |
Research | 2 | 25.0% |
Secure Flight | 2 | 25.0% |
September 11 attacks | 2 | 25.0% |
World Wide Web | 2 | 25.0% |
Access control | 1 | 12.5% |
Airline | 1 | 12.5% |
Airport | 1 | 12.5% |
Airport security | 1 | 12.5% |
Ambient intelligence | 1 | 12.5% |
Attitude (psychology) | 1 | 12.5% |
Audit | 1 | 12.5% |
Background check | 1 | 12.5% |
Bank Secrecy Act | 1 | 12.5% |
Biometrics | 1 | 12.5% |
Blog | 1 | 12.5% |
Boarding pass | 1 | 12.5% |
Business | 1 | 12.5% |
COINTELPRO | 1 | 12.5% |
Cargo | 1 | 12.5% |
Civil liberties | 1 | 12.5% |
Classified information | 1 | 12.5% |
Closed-circuit television | 1 | 12.5% |
Commercial off-the-shelf | 1 | 12.5% |
Computer security | 1 | 12.5% |
Consensus decision-making | 1 | 12.5% |
Copyright infringement | 1 | 12.5% |
Counter-terrorism | 1 | 12.5% |
Credit | 1 | 12.5% |
Credit card | 1 | 12.5% |
Culture | 1 | 12.5% |
Cyberspace | 1 | 12.5% |
Data Protection Directive | 1 | 12.5% |
Data quality | 1 | 12.5% |
Data retention | 1 | 12.5% |
Debate | 1 | 12.5% |
Decision-making | 1 | 12.5% |
Democracy | 1 | 12.5% |
Director of National Intelligence | 1 | 12.5% |
Due process | 1 | 12.5% |
Education | 1 | 12.5% |
Equal Protection Clause | 1 | 12.5% |
Espionage | 1 | 12.5% |
Evaluation | 1 | 12.5% |
Facial recognition system | 1 | 12.5% |
False positives and false negatives | 1 | 12.5% |
Fifth Amendment to the United States Constitution | 1 | 12.5% |
Florida v. Riley | 1 | 12.5% |
Foreign Intelligence Surveillance Act | 1 | 12.5% |
Freedom of information laws by country | 1 | 12.5% |
Gender | 1 | 12.5% |
Geospatial intelligence | 1 | 12.5% |
Google Drive | 1 | 12.5% |
HTTP cookie | 1 | 12.5% |
Identity (social science) | 1 | 12.5% |
Identity document | 1 | 12.5% |
Information Age | 1 | 12.5% |
Information privacy | 1 | 12.5% |
Information security | 1 | 12.5% |
Intelligence analysis | 1 | 12.5% |
Intelligence-led policing | 1 | 12.5% |
Internet | 1 | 12.5% |
Internet privacy | 1 | 12.5% |
Iris recognition | 1 | 12.5% |
Issues in ethics | 1 | 12.5% |
Lawyer | 1 | 12.5% |
Management | 1 | 12.5% |
Microchip implant (human) | 1 | 12.5% |
Money laundering | 1 | 12.5% |
No Fly List | 1 | 12.5% |
Object (computer science) | 1 | 12.5% |
Online and offline | 1 | 12.5% |
Passport | 1 | 12.5% |
Personally identifiable information | 1 | 12.5% |
Precedent | 1 | 12.5% |
Profiling (information science) | 1 | 12.5% |
Proxemics | 1 | 12.5% |
Public key infrastructure | 1 | 12.5% |
Radio-frequency identification | 1 | 12.5% |
Right to privacy | 1 | 12.5% |
Right to privacy in New Zealand | 1 | 12.5% |
Rights | 1 | 12.5% |
Scientific method | 1 | 12.5% |
Search and seizure | 1 | 12.5% |
Search warrant | 1 | 12.5% |
Secondary Security Screening Selection | 1 | 12.5% |
Secrecy | 1 | 12.5% |
Social issues | 1 | 12.5% |
Software framework | 1 | 12.5% |
Space | 1 | 12.5% |
System | 1 | 12.5% |
Terrorist Screening Database | 1 | 12.5% |
Terrorist Surveillance Program | 1 | 12.5% |
Terry v. Ohio | 1 | 12.5% |
Transparency (behavior) | 1 | 12.5% |
United States Code | 1 | 12.5% |
Violence | 1 | 12.5% |
Virtual reality | 1 | 12.5% |
Web 2.0 | 1 | 12.5% |
Wiki | 1 | 12.5% |
abs | rel | |
---|---|---|
Data retention | 2 | 100.0% |
Freedom of Information Act (United States) | 2 | 100.0% |
Government | 2 | 100.0% |
Human activities | 2 | 100.0% |
Identity document | 2 | 100.0% |
Information | 2 | 100.0% |
Privacy | 2 | 100.0% |
Privacy Act of 1974 | 2 | 100.0% |
Privacy policy | 2 | 100.0% |
Regulatory compliance | 2 | 100.0% |
Access control | 1 | 50.0% |
Airline | 1 | 50.0% |
Airport | 1 | 50.0% |
Airport security | 1 | 50.0% |
Anonymity | 1 | 50.0% |
Bankruptcy | 1 | 50.0% |
Biometrics | 1 | 50.0% |
Boarding pass | 1 | 50.0% |
Business | 1 | 50.0% |
Capacity (law) | 1 | 50.0% |
Commercial off-the-shelf | 1 | 50.0% |
Complaint | 1 | 50.0% |
Consent | 1 | 50.0% |
Contract | 1 | 50.0% |
Credit bureau | 1 | 50.0% |
Credit card | 1 | 50.0% |
Credit history | 1 | 50.0% |
Credit score | 1 | 50.0% |
Data breach | 1 | 50.0% |
Data quality | 1 | 50.0% |
Data security | 1 | 50.0% |
Debt collection | 1 | 50.0% |
Direct marketing | 1 | 50.0% |
Discovery (law) | 1 | 50.0% |
Ethics | 1 | 50.0% |
Federal Information Security Management Act of 2002 | 1 | 50.0% |
Freedom of information laws by country | 1 | 50.0% |
Health | 1 | 50.0% |
Health care | 1 | 50.0% |
Health informatics | 1 | 50.0% |
Human rights | 1 | 50.0% |
Identity theft | 1 | 50.0% |
Information privacy | 1 | 50.0% |
Information sensitivity | 1 | 50.0% |
Institutional review board | 1 | 50.0% |
Journalism | 1 | 50.0% |
Justice | 1 | 50.0% |
Law | 1 | 50.0% |
Law enforcement agency | 1 | 50.0% |
Law of Australia | 1 | 50.0% |
Loan | 1 | 50.0% |
Marketing | 1 | 50.0% |
Money laundering | 1 | 50.0% |
National security | 1 | 50.0% |
No Fly List | 1 | 50.0% |
Passenger name record | 1 | 50.0% |
Personal data | 1 | 50.0% |
Personally identifiable information | 1 | 50.0% |
Politics | 1 | 50.0% |
Privacy Act 1988 | 1 | 50.0% |
Privacy Commissioner (New Zealand) | 1 | 50.0% |
Privacy Impact Assessment | 1 | 50.0% |
Privacy law | 1 | 50.0% |
Public health | 1 | 50.0% |
Public sphere | 1 | 50.0% |
Publishing | 1 | 50.0% |
Radio-frequency identification | 1 | 50.0% |
Research | 1 | 50.0% |
Right to privacy in New Zealand | 1 | 50.0% |
Risk | 1 | 50.0% |
Secure Flight | 1 | 50.0% |
Security | 1 | 50.0% |
Social institutions | 1 | 50.0% |
States and territories of Australia | 1 | 50.0% |
Surveillance | 1 | 50.0% |
Terrorist Screening Database | 1 | 50.0% |
Tribunal | 1 | 50.0% |
abs | rel | |
---|---|---|
Government | 4 | 100.0% |
Human activities | 4 | 100.0% |
Law | 4 | 100.0% |
Politics | 4 | 100.0% |
Privacy | 4 | 100.0% |
Public sphere | 4 | 100.0% |
Social institutions | 4 | 100.0% |
Justice | 3 | 75.0% |
Fourth Amendment to the United States Constitution | 2 | 50.0% |
National security | 2 | 50.0% |
United States Constitution | 2 | 50.0% |
Virtue | 2 | 50.0% |
Accountability | 1 | 25.0% |
Anonymity | 1 | 25.0% |
Applied ethics | 1 | 25.0% |
Audit | 1 | 25.0% |
Chandler v. Miller | 1 | 25.0% |
Closed-circuit television | 1 | 25.0% |
Computer network | 1 | 25.0% |
Computer security | 1 | 25.0% |
Consensus decision-making | 1 | 25.0% |
Counter-terrorism | 1 | 25.0% |
Crime | 1 | 25.0% |
Culture | 1 | 25.0% |
Cyberspace | 1 | 25.0% |
Data retention | 1 | 25.0% |
Domain Name System | 1 | 25.0% |
Domain name | 1 | 25.0% |
Drug test | 1 | 25.0% |
E-commerce | 1 | 25.0% |
Employment | 1 | 25.0% |
End-to-end principle | 1 | 25.0% |
Expectation of privacy | 1 | 25.0% |
Federal Information Security Management Act of 2002 | 1 | 25.0% |
Freedom of Information Act (United States) | 1 | 25.0% |
Governance | 1 | 25.0% |
Human rights | 1 | 25.0% |
IT law | 1 | 25.0% |
Identity document | 1 | 25.0% |
Information privacy | 1 | 25.0% |
Information sensitivity | 1 | 25.0% |
Information technology | 1 | 25.0% |
Injunction | 1 | 25.0% |
Internet | 1 | 25.0% |
Internet governance | 1 | 25.0% |
Katz v. United States | 1 | 25.0% |
Law and economics | 1 | 25.0% |
Law enforcement | 1 | 25.0% |
Lawsuit | 1 | 25.0% |
Louis Brandeis | 1 | 25.0% |
Metadata | 1 | 25.0% |
Non-governmental organization | 1 | 25.0% |
Olmstead v. United States | 1 | 25.0% |
P3P | 1 | 25.0% |
Peer-to-peer | 1 | 25.0% |
Public law | 1 | 25.0% |
Public safety | 1 | 25.0% |
Reasonable suspicion | 1 | 25.0% |
Regulatory compliance | 1 | 25.0% |
Risk | 1 | 25.0% |
Roulette | 1 | 25.0% |
Safety | 1 | 25.0% |
Search and seizure | 1 | 25.0% |
Security | 1 | 25.0% |
Separation of powers | 1 | 25.0% |
Skinner v. Railway Labor Executives Ass'n | 1 | 25.0% |
Social issues | 1 | 25.0% |
Sovereign state | 1 | 25.0% |
Sovereignty | 1 | 25.0% |
Special agent | 1 | 25.0% |
Substance abuse | 1 | 25.0% |
Surveillance | 1 | 25.0% |
Teacher | 1 | 25.0% |
Technology | 1 | 25.0% |
Terrorism | 1 | 25.0% |
U.S. state | 1 | 25.0% |
Value (ethics) | 1 | 25.0% |
Vernonia School District 47J v. Acton | 1 | 25.0% |
abs | rel | |
---|---|---|
Privacy | 5 | 100.0% |
Technology | 5 | 100.0% |
Biometrics | 4 | 80.0% |
Computer network | 4 | 80.0% |
Computing | 4 | 80.0% |
Facial recognition system | 4 | 80.0% |
Information privacy | 4 | 80.0% |
Information technology | 4 | 80.0% |
Surveillance | 4 | 80.0% |
Biometric passport | 3 | 60.0% |
Database | 3 | 60.0% |
Government | 3 | 60.0% |
Identity management | 3 | 60.0% |
Information | 3 | 60.0% |
Internet | 3 | 60.0% |
Personal data | 3 | 60.0% |
Risk | 3 | 60.0% |
Accountability | 2 | 40.0% |
Charter of Fundamental Rights of the European Union | 2 | 40.0% |
Closed-circuit television | 2 | 40.0% |
Contactless payment | 2 | 40.0% |
European Union law | 2 | 40.0% |
Evaluation | 2 | 40.0% |
FeliCa | 2 | 40.0% |
Human activities | 2 | 40.0% |
Identity (social science) | 2 | 40.0% |
Information Age | 2 | 40.0% |
Information and communications technology | 2 | 40.0% |
Information security | 2 | 40.0% |
Internet of things | 2 | 40.0% |
Iris recognition | 2 | 40.0% |
Justice | 2 | 40.0% |
Law | 2 | 40.0% |
MIFARE | 2 | 40.0% |
Mobile phone | 2 | 40.0% |
National security | 2 | 40.0% |
Near-field communication | 2 | 40.0% |
OV-chipkaart | 2 | 40.0% |
Octopus card | 2 | 40.0% |
Panopticon | 2 | 40.0% |
Personally identifiable information | 2 | 40.0% |
Politics | 2 | 40.0% |
Privacy law | 2 | 40.0% |
Radio-frequency identification | 2 | 40.0% |
Regulatory compliance | 2 | 40.0% |
Research | 2 | 40.0% |
Road pricing | 2 | 40.0% |
SIM card | 2 | 40.0% |
Service industries | 2 | 40.0% |
Smart card | 2 | 40.0% |
Suica | 2 | 40.0% |
Traffic | 2 | 40.0% |
Airport security | 1 | 20.0% |
Applied ethics | 1 | 20.0% |
Area of freedom, security and justice | 1 | 20.0% |
Authentication | 1 | 20.0% |
Binding corporate rules | 1 | 20.0% |
Border | 1 | 20.0% |
Border control | 1 | 20.0% |
Business | 1 | 20.0% |
Camera | 1 | 20.0% |
Citizenship | 1 | 20.0% |
Civil liberties | 1 | 20.0% |
Classified information | 1 | 20.0% |
Cloud computing | 1 | 20.0% |
Computer data storage | 1 | 20.0% |
Consent | 1 | 20.0% |
Contract | 1 | 20.0% |
Crime | 1 | 20.0% |
Cybercrime | 1 | 20.0% |
Data | 1 | 20.0% |
Data Protection Directive | 1 | 20.0% |
Data retention | 1 | 20.0% |
Democracy | 1 | 20.0% |
Design | 1 | 20.0% |
Directive (European Union) | 1 | 20.0% |
Discrimination | 1 | 20.0% |
Dutch passport | 1 | 20.0% |
E-governance | 1 | 20.0% |
E-services | 1 | 20.0% |
Emergency management | 1 | 20.0% |
Employment | 1 | 20.0% |
Empowerment | 1 | 20.0% |
End user | 1 | 20.0% |
Ethics | 1 | 20.0% |
European Convention on Human Rights | 1 | 20.0% |
Fingerprint | 1 | 20.0% |
Forensic science | 1 | 20.0% |
Fraud | 1 | 20.0% |
Full body scanner | 1 | 20.0% |
Globalization | 1 | 20.0% |
Government and personhood | 1 | 20.0% |
Human rights | 1 | 20.0% |
Identity document | 1 | 20.0% |
Identity theft | 1 | 20.0% |
Institutions of the European Union | 1 | 20.0% |
Interoperability | 1 | 20.0% |
Issues in ethics | 1 | 20.0% |
Mass surveillance | 1 | 20.0% |
Member state of the European Union | 1 | 20.0% |
Mexico–United States border | 1 | 20.0% |
Outsourcing | 1 | 20.0% |
Parliament | 1 | 20.0% |
Passenger name record | 1 | 20.0% |
Passport | 1 | 20.0% |
Policy | 1 | 20.0% |
Privacy Impact Assessment | 1 | 20.0% |
Privacy and Electronic Communications Directive 2002 | 1 | 20.0% |
Privacy by design | 1 | 20.0% |
Prosecutor | 1 | 20.0% |
Prototype | 1 | 20.0% |
Public sphere | 1 | 20.0% |
Reliability engineering | 1 | 20.0% |
Requirement | 1 | 20.0% |
Rights | 1 | 20.0% |
Risk management | 1 | 20.0% |
Schengen Area | 1 | 20.0% |
Security | 1 | 20.0% |
Social institutions | 1 | 20.0% |
Sustainability | 1 | 20.0% |
System | 1 | 20.0% |
Transparency (behavior) | 1 | 20.0% |
Travel document | 1 | 20.0% |
Travel visa | 1 | 20.0% |
Treaties of the European Union | 1 | 20.0% |
Treaty | 1 | 20.0% |
Treaty of Lisbon | 1 | 20.0% |
Treaty on the Functioning of the European Union | 1 | 20.0% |
U.S. state | 1 | 20.0% |
Usability | 1 | 20.0% |
Visa Information System | 1 | 20.0% |
abs | rel | |
---|---|---|
Human activities | 4 | 100.0% |
Information privacy | 4 | 100.0% |
Research | 4 | 100.0% |
Technology | 4 | 100.0% |
Branches of science | 2 | 50.0% |
Closed-circuit television | 2 | 50.0% |
Computer vision | 2 | 50.0% |
Information | 2 | 50.0% |
Privacy | 2 | 50.0% |
Risk | 2 | 50.0% |
Rita Cucchiara | 2 | 50.0% |
Video content analysis | 2 | 50.0% |
Access control | 1 | 25.0% |
Advertising | 1 | 25.0% |
Authentication | 1 | 25.0% |
Biometric passport | 1 | 25.0% |
Biometrics | 1 | 25.0% |
Border control | 1 | 25.0% |
Business | 1 | 25.0% |
Business ethics | 1 | 25.0% |
Charter of Fundamental Rights of the European Union | 1 | 25.0% |
Computer data storage | 1 | 25.0% |
Computer network | 1 | 25.0% |
Computing | 1 | 25.0% |
Contactless smart card | 1 | 25.0% |
Crime | 1 | 25.0% |
Culture | 1 | 25.0% |
DNA sequencing | 1 | 25.0% |
Data Protection Directive | 1 | 25.0% |
Data Retention Directive | 1 | 25.0% |
Data retention | 1 | 25.0% |
Database | 1 | 25.0% |
Digital rights management | 1 | 25.0% |
Directive (European Union) | 1 | 25.0% |
Do Not Track | 1 | 25.0% |
Economics | 1 | 25.0% |
End user | 1 | 25.0% |
European Convention on Human Rights | 1 | 25.0% |
European Union law | 1 | 25.0% |
Facial recognition system | 1 | 25.0% |
Fingerprint | 1 | 25.0% |
Government | 1 | 25.0% |
HTTP cookie | 1 | 25.0% |
Human rights | 1 | 25.0% |
Identity (social science) | 1 | 25.0% |
Identity document | 1 | 25.0% |
Identity theft | 1 | 25.0% |
Information security | 1 | 25.0% |
Infrared | 1 | 25.0% |
Innovation | 1 | 25.0% |
Intellectual property | 1 | 25.0% |
Internet | 1 | 25.0% |
Internet privacy | 1 | 25.0% |
Internet service provider | 1 | 25.0% |
Interoperability | 1 | 25.0% |
Iridology | 1 | 25.0% |
Iris recognition | 1 | 25.0% |
Justice | 1 | 25.0% |
Law | 1 | 25.0% |
Market (economics) | 1 | 25.0% |
Marketing | 1 | 25.0% |
Medical imaging | 1 | 25.0% |
Member state of the European Union | 1 | 25.0% |
Passport | 1 | 25.0% |
Password | 1 | 25.0% |
Perception | 1 | 25.0% |
Personally identifiable information | 1 | 25.0% |
Policy | 1 | 25.0% |
Politics | 1 | 25.0% |
Price | 1 | 25.0% |
Price discrimination | 1 | 25.0% |
Privacy and Electronic Communications Directive 2002 | 1 | 25.0% |
Privacy by design | 1 | 25.0% |
Privacy law | 1 | 25.0% |
Privacy policy | 1 | 25.0% |
Public sphere | 1 | 25.0% |
Radio-frequency identification | 1 | 25.0% |
Receiver operating characteristic | 1 | 25.0% |
Right to be forgotten | 1 | 25.0% |
Right to privacy | 1 | 25.0% |
Science | 1 | 25.0% |
Security technology | 1 | 25.0% |
Security token | 1 | 25.0% |
Smart card | 1 | 25.0% |
Social institutions | 1 | 25.0% |
Social networking service | 1 | 25.0% |
Speaker recognition | 1 | 25.0% |
Surveillance | 1 | 25.0% |
System | 1 | 25.0% |
Targeted advertising | 1 | 25.0% |
Technological convergence | 1 | 25.0% |
Telecommunication | 1 | 25.0% |
Transparency (behavior) | 1 | 25.0% |
Travel visa | 1 | 25.0% |
Treaty | 1 | 25.0% |
Treaty of Lisbon | 1 | 25.0% |
Treaty of Rome | 1 | 25.0% |
Treaty on the Functioning of the European Union | 1 | 25.0% |
Trust (social science) | 1 | 25.0% |
Type I and type II errors | 1 | 25.0% |
Usability | 1 | 25.0% |
Visa Information System | 1 | 25.0% |
abs | rel | |
---|---|---|
Human activities | 7 | 100.0% |
Privacy | 7 | 100.0% |
Biometrics | 5 | 71.4% |
Government | 5 | 71.4% |
Information privacy | 5 | 71.4% |
Privacy law | 5 | 71.4% |
Public sphere | 5 | 71.4% |
Information technology | 4 | 57.1% |
Internet privacy | 4 | 57.1% |
Justice | 4 | 57.1% |
Law | 4 | 57.1% |
National security | 4 | 57.1% |
Personal data | 4 | 57.1% |
Politics | 4 | 57.1% |
Social institutions | 4 | 57.1% |
Surveillance | 4 | 57.1% |
Computing | 3 | 42.9% |
Cyberspace | 3 | 42.9% |
Facial recognition system | 3 | 42.9% |
Fingerprint | 3 | 42.9% |
Identity theft | 3 | 42.9% |
Information Age | 3 | 42.9% |
Personally identifiable information | 3 | 42.9% |
Privacy policy | 3 | 42.9% |
Technology | 3 | 42.9% |
Advertising | 2 | 28.6% |
Anonymity | 2 | 28.6% |
Applied ethics | 2 | 28.6% |
Area of freedom, security and justice | 2 | 28.6% |
Automation | 2 | 28.6% |
Border control | 2 | 28.6% |
Business | 2 | 28.6% |
Children's Online Privacy Protection Act | 2 | 28.6% |
Consumer privacy | 2 | 28.6% |
Crime | 2 | 28.6% |
Data laws | 2 | 28.6% |
Data retention | 2 | 28.6% |
Database | 2 | 28.6% |
Discrimination | 2 | 28.6% |
Do Not Track | 2 | 28.6% |
Do Not Track legislation | 2 | 28.6% |
European Union law | 2 | 28.6% |
Identity document | 2 | 28.6% |
Information | 2 | 28.6% |
Information management | 2 | 28.6% |
Internet | 2 | 28.6% |
Interoperability | 2 | 28.6% |
Issues in ethics | 2 | 28.6% |
Member state of the European Union | 2 | 28.6% |
Mobile app | 2 | 28.6% |
Passenger name record | 2 | 28.6% |
Passport | 2 | 28.6% |
Policy | 2 | 28.6% |
Racial profiling | 2 | 28.6% |
Schengen Area | 2 | 28.6% |
Schengen Information System | 2 | 28.6% |
Social networking service | 2 | 28.6% |
Travel visa | 2 | 28.6% |
Visa Information System | 2 | 28.6% |
World Wide Web | 2 | 28.6% |
Access control | 1 | 14.3% |
Adware | 1 | 14.3% |
Android (operating system) | 1 | 14.3% |
Audit | 1 | 14.3% |
Authentication | 1 | 14.3% |
Biometric passport | 1 | 14.3% |
Birth certificate | 1 | 14.3% |
Citizenship | 1 | 14.3% |
Cloud computing | 1 | 14.3% |
Communication | 1 | 14.3% |
Computer and network surveillance | 1 | 14.3% |
Computer network | 1 | 14.3% |
Computer security | 1 | 14.3% |
Criminal intelligence | 1 | 14.3% |
Data | 1 | 14.3% |
Data management | 1 | 14.3% |
Data security | 1 | 14.3% |
De-identification | 1 | 14.3% |
Deep packet inspection | 1 | 14.3% |
Digital technology | 1 | 14.3% |
Driver's license | 1 | 14.3% |
Driver's licenses in the United States | 1 | 14.3% |
Dublin Regulation | 1 | 14.3% |
E-government | 1 | 14.3% |
Electronics industry | 1 | 14.3% |
Expectation of privacy | 1 | 14.3% |
FTC fair information practice | 1 | 14.3% |
Fair Credit Reporting Act | 1 | 14.3% |
Fourth Amendment to the United States Constitution | 1 | 14.3% |
Fraud | 1 | 14.3% |
Freedom of speech | 1 | 14.3% |
Government and personhood | 1 | 14.3% |
Gramm–Leach–Bliley Act | 1 | 14.3% |
HTTP cookie | 1 | 14.3% |
Health Information Technology for Economic and Clinical Health Act | 1 | 14.3% |
Health Insurance Portability and Accountability Act | 1 | 14.3% |
Human rights | 1 | 14.3% |
Illegal immigration | 1 | 14.3% |
Image sharing | 1 | 14.3% |
Immigration | 1 | 14.3% |
Information and communications technology | 1 | 14.3% |
Information broker | 1 | 14.3% |
Information governance | 1 | 14.3% |
Information system | 1 | 14.3% |
Information technology management | 1 | 14.3% |
Intelligence-led policing | 1 | 14.3% |
International Safe Harbor Privacy Principles | 1 | 14.3% |
Internet of things | 1 | 14.3% |
Internet service provider | 1 | 14.3% |
Law enforcement agency | 1 | 14.3% |
Malware | 1 | 14.3% |
Management | 1 | 14.3% |
Mobile phone | 1 | 14.3% |
Mobile phone tracking | 1 | 14.3% |
Mobile web | 1 | 14.3% |
Multistakeholder governance | 1 | 14.3% |
Online advertising | 1 | 14.3% |
Opt-out | 1 | 14.3% |
Personal health record | 1 | 14.3% |
Personal identification | 1 | 14.3% |
Prison | 1 | 14.3% |
Privacy by design | 1 | 14.3% |
Privacy settings | 1 | 14.3% |
Property | 1 | 14.3% |
Radio-frequency identification | 1 | 14.3% |
Real ID Act | 1 | 14.3% |
Reasonable suspicion | 1 | 14.3% |
Regulatory compliance | 1 | 14.3% |
Research | 1 | 14.3% |
Right to privacy | 1 | 14.3% |
Search and seizure | 1 | 14.3% |
Search warrant | 1 | 14.3% |
Smartphone | 1 | 14.3% |
Social Security number | 1 | 14.3% |
Social media | 1 | 14.3% |
Spyware | 1 | 14.3% |
Tag (metadata) | 1 | 14.3% |
Targeted advertising | 1 | 14.3% |
Telecommunications | 1 | 14.3% |
Telephone tapping | 1 | 14.3% |
Terry v. Ohio | 1 | 14.3% |
U.S. state | 1 | 14.3% |
United States v. Jones | 1 | 14.3% |
Visa policy of the Schengen Area | 1 | 14.3% |
Web beacon | 1 | 14.3% |
abs | rel | |
---|---|---|
Human activities | 7 | 87.5% |
Privacy | 6 | 75.0% |
Authentication | 5 | 62.5% |
Biometrics | 5 | 62.5% |
Identity document | 5 | 62.5% |
Computing | 4 | 50.0% |
Government | 4 | 50.0% |
Information privacy | 4 | 50.0% |
Law | 4 | 50.0% |
Technology | 4 | 50.0% |
Facial recognition system | 3 | 37.5% |
Fingerprint | 3 | 37.5% |
Internet | 3 | 37.5% |
Internet privacy | 3 | 37.5% |
Justice | 3 | 37.5% |
Personally identifiable information | 3 | 37.5% |
Politics | 3 | 37.5% |
Public sphere | 3 | 37.5% |
Research | 3 | 37.5% |
Social networking service | 3 | 37.5% |
Surveillance | 3 | 37.5% |
Advertising | 2 | 25.0% |
Algorithm | 2 | 25.0% |
Anonymity | 2 | 25.0% |
Best practice | 2 | 25.0% |
BioAPI | 2 | 25.0% |
Contrast (vision) | 2 | 25.0% |
Culture | 2 | 25.0% |
Data | 2 | 25.0% |
Data Protection Directive | 2 | 25.0% |
Database | 2 | 25.0% |
Do Not Track | 2 | 25.0% |
Experiment | 2 | 25.0% |
Identity theft | 2 | 25.0% |
Image resolution | 2 | 25.0% |
Image scanner | 2 | 25.0% |
Information | 2 | 25.0% |
Issues in ethics | 2 | 25.0% |
Optics | 2 | 25.0% |
Pixel | 2 | 25.0% |
Policy | 2 | 25.0% |
Privacy law | 2 | 25.0% |
Privacy laws of the United States | 2 | 25.0% |
Receiver operating characteristic | 2 | 25.0% |
Right to privacy | 2 | 25.0% |
Search and seizure | 2 | 25.0% |
Smartphone | 2 | 25.0% |
Social institutions | 2 | 25.0% |
Spectral density | 2 | 25.0% |
Statistics | 2 | 25.0% |
Targeted advertising | 2 | 25.0% |
Accuracy and precision | 1 | 12.5% |
Area of freedom, security and justice | 1 | 12.5% |
Assumption | 1 | 12.5% |
Behavioral targeting | 1 | 12.5% |
Biometric passport | 1 | 12.5% |
Body area network | 1 | 12.5% |
Certificate authority | 1 | 12.5% |
Charter of Fundamental Rights of the European Union | 1 | 12.5% |
Child | 1 | 12.5% |
Closed-circuit television | 1 | 12.5% |
Cloud computing | 1 | 12.5% |
Common law | 1 | 12.5% |
Computer security | 1 | 12.5% |
Consent | 1 | 12.5% |
Curtilage | 1 | 12.5% |
Data retention | 1 | 12.5% |
Digital identity | 1 | 12.5% |
Digital native | 1 | 12.5% |
E-government | 1 | 12.5% |
Economics | 1 | 12.5% |
Electronic authentication | 1 | 12.5% |
European Union law | 1 | 12.5% |
European Union legislative procedure | 1 | 12.5% |
Expectation of privacy | 1 | 12.5% |
FTC fair information practice | 1 | 12.5% |
First Amendment to the United States Constitution | 1 | 12.5% |
Florida v. Jardines | 1 | 12.5% |
Florida v. Riley | 1 | 12.5% |
Forensic identification | 1 | 12.5% |
Fourth Amendment to the United States Constitution | 1 | 12.5% |
General Data Protection Regulation | 1 | 12.5% |
Google Glass | 1 | 12.5% |
Governance | 1 | 12.5% |
Health care | 1 | 12.5% |
Human rights | 1 | 12.5% |
Identity management | 1 | 12.5% |
Information technology | 1 | 12.5% |
Innovation | 1 | 12.5% |
Internet of things | 1 | 12.5% |
Interoperability | 1 | 12.5% |
Katz v. United States | 1 | 12.5% |
Market (economics) | 1 | 12.5% |
Member state of the European Union | 1 | 12.5% |
Mobile device | 1 | 12.5% |
National security | 1 | 12.5% |
Pan-European identity | 1 | 12.5% |
Password | 1 | 12.5% |
Personal data | 1 | 12.5% |
Precautionary principle | 1 | 12.5% |
Privacy and Electronic Communications Directive 2002 | 1 | 12.5% |
Privacy policy | 1 | 12.5% |
Public key infrastructure | 1 | 12.5% |
Public law | 1 | 12.5% |
Regulation | 1 | 12.5% |
Regulatory compliance | 1 | 12.5% |
Score (statistics) | 1 | 12.5% |
Search warrant | 1 | 12.5% |
Self-driving car | 1 | 12.5% |
Sensor | 1 | 12.5% |
Social media | 1 | 12.5% |
Statistical model | 1 | 12.5% |
Time | 1 | 12.5% |
Treaty | 1 | 12.5% |
Treaty of Lisbon | 1 | 12.5% |
Treaty on the Functioning of the European Union | 1 | 12.5% |
U.S. state | 1 | 12.5% |
United States v. Jones | 1 | 12.5% |
Unmanned aerial vehicle | 1 | 12.5% |
abs | rel | |
---|---|---|
Government | 10 | 90.9% |
Human activities | 10 | 90.9% |
Surveillance | 10 | 90.9% |
Privacy | 9 | 81.8% |
Politics | 8 | 72.7% |
Justice | 7 | 63.6% |
Policy | 7 | 63.6% |
Public sphere | 7 | 63.6% |
Information | 6 | 54.5% |
Information privacy | 6 | 54.5% |
Law | 6 | 54.5% |
Social institutions | 6 | 54.5% |
Computer security | 5 | 45.5% |
Information technology | 5 | 45.5% |
Internet | 5 | 45.5% |
National security | 5 | 45.5% |
Privacy law | 5 | 45.5% |
Technology | 5 | 45.5% |
Computing | 4 | 36.4% |
Fourth Amendment to the United States Constitution | 4 | 36.4% |
Personally identifiable information | 4 | 36.4% |
Right to privacy | 4 | 36.4% |
Big data | 3 | 27.3% |
Biometrics | 3 | 27.3% |
Business | 3 | 27.3% |
Culture | 3 | 27.3% |
Database | 3 | 27.3% |
Privacy policy | 3 | 27.3% |
Research | 3 | 27.3% |
Search and seizure | 3 | 27.3% |
Accountability | 2 | 18.2% |
Classified information | 2 | 18.2% |
Closed-circuit television | 2 | 18.2% |
Computer network | 2 | 18.2% |
Crime | 2 | 18.2% |
Cyberspace | 2 | 18.2% |
Data | 2 | 18.2% |
Data Protection Directive | 2 | 18.2% |
Digital technology | 2 | 18.2% |
Directive (European Union) | 2 | 18.2% |
European Union law | 2 | 18.2% |
Expectation of privacy | 2 | 18.2% |
FTC fair information practice | 2 | 18.2% |
First Amendment to the United States Constitution | 2 | 18.2% |
Freedom of Information Act (United States) | 2 | 18.2% |
Human rights | 2 | 18.2% |
Information Age | 2 | 18.2% |
Information security | 2 | 18.2% |
Information system | 2 | 18.2% |
Internet of things | 2 | 18.2% |
Issues in ethics | 2 | 18.2% |
Law enforcement agency | 2 | 18.2% |
Management | 2 | 18.2% |
Member state of the European Union | 2 | 18.2% |
Mobile phone | 2 | 18.2% |
Patriot Act | 2 | 18.2% |
Personal data | 2 | 18.2% |
Privacy and Electronic Communications Directive 2002 | 2 | 18.2% |
Privacy by design | 2 | 18.2% |
Regulatory compliance | 2 | 18.2% |
Risk | 2 | 18.2% |
Search warrant | 2 | 18.2% |
Security | 2 | 18.2% |
Social media | 2 | 18.2% |
Unmanned aerial vehicle | 2 | 18.2% |
Virtue | 2 | 18.2% |
Access control | 1 | 9.1% |
Advertising | 1 | 9.1% |
Aerial photography | 1 | 9.1% |
Air traffic control | 1 | 9.1% |
Aircraft | 1 | 9.1% |
Algorithm | 1 | 9.1% |
Analytics | 1 | 9.1% |
Anomaly detection | 1 | 9.1% |
Anonymity | 1 | 9.1% |
Anti-Counterfeiting Trade Agreement | 1 | 9.1% |
Applied ethics | 1 | 9.1% |
Area of freedom, security and justice | 1 | 9.1% |
Asylum seeker | 1 | 9.1% |
Audit | 1 | 9.1% |
Authentication | 1 | 9.1% |
Automatic number-plate recognition | 1 | 9.1% |
Automation | 1 | 9.1% |
Bill (law) | 1 | 9.1% |
Biometric passport | 1 | 9.1% |
Bluetooth | 1 | 9.1% |
Border control | 1 | 9.1% |
Car | 1 | 9.1% |
Case study | 1 | 9.1% |
Charter of Fundamental Rights of the European Union | 1 | 9.1% |
Chief information officer | 1 | 9.1% |
Chief privacy officer | 1 | 9.1% |
Citizenship | 1 | 9.1% |
Civil liberties | 1 | 9.1% |
Climate change mitigation | 1 | 9.1% |
Cloud computing | 1 | 9.1% |
Communications Assistance for Law Enforcement Act | 1 | 9.1% |
Complaint | 1 | 9.1% |
Computer data storage | 1 | 9.1% |
Conflict of interest | 1 | 9.1% |
Connected car | 1 | 9.1% |
Consumer privacy | 1 | 9.1% |
Contract | 1 | 9.1% |
Credit bureau | 1 | 9.1% |
Credit card | 1 | 9.1% |
Credit score | 1 | 9.1% |
Cyberattack | 1 | 9.1% |
Cybercrime | 1 | 9.1% |
Cyberwarfare | 1 | 9.1% |
Data Protection Act 1998 | 1 | 9.1% |
Data analysis | 1 | 9.1% |
Data mining | 1 | 9.1% |
Data retention | 1 | 9.1% |
Data security | 1 | 9.1% |
Democracy | 1 | 9.1% |
Digital footprint | 1 | 9.1% |
Digital forensics | 1 | 9.1% |
Discovery (law) | 1 | 9.1% |
Discrimination | 1 | 9.1% |
Do Not Track | 1 | 9.1% |
Do Not Track legislation | 1 | 9.1% |
Dublin Regulation | 1 | 9.1% |
E-commerce | 1 | 9.1% |
E-services | 1 | 9.1% |
Economics | 1 | 9.1% |
Education | 1 | 9.1% |
Educational technology | 1 | 9.1% |
Edward Snowden | 1 | 9.1% |
Electronics industry | 1 | 9.1% |
Emergency management | 1 | 9.1% |
Employment | 1 | 9.1% |
Encryption | 1 | 9.1% |
Ethics | 1 | 9.1% |
European Convention on Human Rights | 1 | 9.1% |
Evaluation | 1 | 9.1% |
Fair Credit Reporting Act | 1 | 9.1% |
Federal Information Security Management Act of 2002 | 1 | 9.1% |
Fingerprint | 1 | 9.1% |
Freedom of speech | 1 | 9.1% |
GPS tracking unit | 1 | 9.1% |
General Data Protection Regulation | 1 | 9.1% |
Governance | 1 | 9.1% |
HTTP cookie | 1 | 9.1% |
Harmonisation of law | 1 | 9.1% |
Health Insurance Portability and Accountability Act | 1 | 9.1% |
Health care | 1 | 9.1% |
Health informatics | 1 | 9.1% |
Identity document | 1 | 9.1% |
Identity management | 1 | 9.1% |
Illegal immigration | 1 | 9.1% |
Immigration | 1 | 9.1% |
Incentive | 1 | 9.1% |
Information Sharing Environment | 1 | 9.1% |
Information and communications technology | 1 | 9.1% |
Information management | 1 | 9.1% |
Information sensitivity | 1 | 9.1% |
Informed consent | 1 | 9.1% |
Infrastructure | 1 | 9.1% |
Innovation | 1 | 9.1% |
Intelligence-led policing | 1 | 9.1% |
International Safe Harbor Privacy Principles | 1 | 9.1% |
Internet privacy | 1 | 9.1% |
Internet protocol suite | 1 | 9.1% |
Interoperability | 1 | 9.1% |
Investigatory Powers Act 2016 | 1 | 9.1% |
John Locke | 1 | 9.1% |
Katz v. United States | 1 | 9.1% |
Law and economics | 1 | 9.1% |
Law of the United States | 1 | 9.1% |
Leadership | 1 | 9.1% |
Liberalism | 1 | 9.1% |
Liberty | 1 | 9.1% |
Marketing | 1 | 9.1% |
Mass surveillance | 1 | 9.1% |
Median | 1 | 9.1% |
Medicine | 1 | 9.1% |
Mobile ad hoc network | 1 | 9.1% |
Mobile app | 1 | 9.1% |
Morality | 1 | 9.1% |
NIST Special Publication 800-53 | 1 | 9.1% |
National Defense Authorization Act for Fiscal Year 2012 | 1 | 9.1% |
Natural and legal rights | 1 | 9.1% |
Natural law | 1 | 9.1% |
Near-field communication | 1 | 9.1% |
Next Generation Air Transportation System | 1 | 9.1% |
Nuisance in English law | 1 | 9.1% |
Olmstead v. United States | 1 | 9.1% |
Online advertising | 1 | 9.1% |
Open government | 1 | 9.1% |
Opt-out | 1 | 9.1% |
Organization | 1 | 9.1% |
Outlier | 1 | 9.1% |
Panopticon | 1 | 9.1% |
Passenger name record | 1 | 9.1% |
Passport | 1 | 9.1% |
Philosophy | 1 | 9.1% |
Plato | 1 | 9.1% |
Polymerase chain reaction | 1 | 9.1% |
Posse Comitatus Act | 1 | 9.1% |
Posse comitatus | 1 | 9.1% |
Precedent | 1 | 9.1% |
Predictive medicine | 1 | 9.1% |
Privacy Act of 1974 | 1 | 9.1% |
Privacy Impact Assessment | 1 | 9.1% |
Privacy engineering | 1 | 9.1% |
Privacy laws of the United States | 1 | 9.1% |
Proactive cyber defence | 1 | 9.1% |
Property | 1 | 9.1% |
Quartile | 1 | 9.1% |
Racial profiling | 1 | 9.1% |
Radio-frequency identification | 1 | 9.1% |
Random checkpoint | 1 | 9.1% |
Regulation | 1 | 9.1% |
Regulation of Investigatory Powers Act 2000 | 1 | 9.1% |
Republic (Plato) | 1 | 9.1% |
Right to privacy in New Zealand | 1 | 9.1% |
Rights | 1 | 9.1% |
Safety | 1 | 9.1% |
Schengen Area | 1 | 9.1% |
Schengen Information System | 1 | 9.1% |
Secure Flight | 1 | 9.1% |
Security clearance | 1 | 9.1% |
Smart meter | 1 | 9.1% |
Social contract | 1 | 9.1% |
Social issues | 1 | 9.1% |
Society | 1 | 9.1% |
Socrates | 1 | 9.1% |
Sovereign state | 1 | 9.1% |
Sovereignty | 1 | 9.1% |
Standardization | 1 | 9.1% |
State (polity) | 1 | 9.1% |
State of nature | 1 | 9.1% |
Statistics | 1 | 9.1% |
Sustainability | 1 | 9.1% |
Targeted advertising | 1 | 9.1% |
Telecommunication | 1 | 9.1% |
Telephone tapping | 1 | 9.1% |
Third-party doctrine | 1 | 9.1% |
Thomas Hobbes | 1 | 9.1% |
Time | 1 | 9.1% |
Toll road | 1 | 9.1% |
Tort | 1 | 9.1% |
Traffic | 1 | 9.1% |
Transparency (behavior) | 1 | 9.1% |
Transport | 1 | 9.1% |
Travel visa | 1 | 9.1% |
Treaty | 1 | 9.1% |
Trespass | 1 | 9.1% |
Two Treatises of Government | 1 | 9.1% |
U.S. state | 1 | 9.1% |
Unattended ground sensor | 1 | 9.1% |
United States Code | 1 | 9.1% |
United States Constitution | 1 | 9.1% |
United States Secretary of Defense | 1 | 9.1% |
United States v. Jones | 1 | 9.1% |
United States v. Warshak | 1 | 9.1% |
Value (ethics) | 1 | 9.1% |
Vehicular ad-hoc network | 1 | 9.1% |
Veto | 1 | 9.1% |
Video | 1 | 9.1% |
Visa Information System | 1 | 9.1% |
Visa policy of the Schengen Area | 1 | 9.1% |
Western world | 1 | 9.1% |
World Wide Web | 1 | 9.1% |
abs | rel | |
---|---|---|
Human activities | 28 | 100.0% |
Privacy | 24 | 85.7% |
Technology | 22 | 78.6% |
Surveillance | 21 | 75.0% |
Government | 20 | 71.4% |
Law | 20 | 71.4% |
Public sphere | 19 | 67.9% |
Justice | 18 | 64.3% |
Information privacy | 17 | 60.7% |
Computing | 16 | 57.1% |
Politics | 15 | 53.6% |
Social institutions | 15 | 53.6% |
Information | 14 | 50.0% |
Policy | 14 | 50.0% |
Facial recognition system | 11 | 39.3% |
Information technology | 11 | 39.3% |
Internet | 11 | 39.3% |
Personally identifiable information | 11 | 39.3% |
Privacy law | 11 | 39.3% |
Biometrics | 10 | 35.7% |
Computer security | 10 | 35.7% |
National security | 10 | 35.7% |
Research | 10 | 35.7% |
Accountability | 9 | 32.1% |
Business | 9 | 32.1% |
Closed-circuit television | 8 | 28.6% |
Identity document | 8 | 28.6% |
Data Protection Directive | 7 | 25.0% |
Database | 7 | 25.0% |
Internet of things | 7 | 25.0% |
Personal data | 7 | 25.0% |
Regulatory compliance | 7 | 25.0% |
Applied ethics | 6 | 21.4% |
Biometric passport | 6 | 21.4% |
Culture | 6 | 21.4% |
Data | 6 | 21.4% |
Evaluation | 6 | 21.4% |
Human rights | 6 | 21.4% |
Iris recognition | 6 | 21.4% |
Privacy by design | 6 | 21.4% |
Transparency (behavior) | 6 | 21.4% |
Analytics | 5 | 17.9% |
Authentication | 5 | 17.9% |
Crime | 5 | 17.9% |
European Convention on Human Rights | 5 | 17.9% |
Fingerprint | 5 | 17.9% |
Internet privacy | 5 | 17.9% |
Privacy policy | 5 | 17.9% |
Rights | 5 | 17.9% |
Risk | 5 | 17.9% |
Schengen Area | 5 | 17.9% |
Social media | 5 | 17.9% |
System | 5 | 17.9% |
Unmanned aerial vehicle | 5 | 17.9% |
Advertising | 4 | 14.3% |
Anonymity | 4 | 14.3% |
Best practice | 4 | 14.3% |
Digital rights | 4 | 14.3% |
Discovery (law) | 4 | 14.3% |
Freedom of Information Act (United States) | 4 | 14.3% |
General Data Protection Regulation | 4 | 14.3% |
Image scanner | 4 | 14.3% |
Mass surveillance | 4 | 14.3% |
Privacy Act of 1974 | 4 | 14.3% |
Privacy and Electronic Communications Directive 2002 | 4 | 14.3% |
Social issues | 4 | 14.3% |
Telecommunication | 4 | 14.3% |
Virtue | 4 | 14.3% |
Wearable technology | 4 | 14.3% |
Access control | 3 | 10.7% |
Algorithm | 3 | 10.7% |
Automatic number-plate recognition | 3 | 10.7% |
Big data | 3 | 10.7% |
Camera | 3 | 10.7% |
Charter of Fundamental Rights of the European Union | 3 | 10.7% |
Cloud computing | 3 | 10.7% |
Computer network | 3 | 10.7% |
Contract | 3 | 10.7% |
Data retention | 3 | 10.7% |
Edward Snowden | 3 | 10.7% |
Encryption | 3 | 10.7% |
Ethical principles | 3 | 10.7% |
European Union law | 3 | 10.7% |
Freedom of speech | 3 | 10.7% |
HTTP cookie | 3 | 10.7% |
Infrared | 3 | 10.7% |
Medical imaging | 3 | 10.7% |
Privacy Impact Assessment | 3 | 10.7% |
Schengen Information System | 3 | 10.7% |
Security | 3 | 10.7% |
Spoofing attack | 3 | 10.7% |
United States Code | 3 | 10.7% |
Video | 3 | 10.7% |
Vulnerability (computing) | 3 | 10.7% |
World Wide Web | 3 | 10.7% |
2.5D | 2 | 7.1% |
3D computer graphics | 2 | 7.1% |
3D printing | 2 | 7.1% |
3D scanning | 2 | 7.1% |
Access to information | 2 | 7.1% |
Accuracy and precision | 2 | 7.1% |
Aerial photography | 2 | 7.1% |
Audit | 2 | 7.1% |
Automation | 2 | 7.1% |
Bank | 2 | 7.1% |
Border control | 2 | 7.1% |
Children's Online Privacy Protection Act | 2 | 7.1% |
Common Criteria | 2 | 7.1% |
Computer | 2 | 7.1% |
Consumer privacy | 2 | 7.1% |
Credit bureau | 2 | 7.1% |
Cyberspace | 2 | 7.1% |
Data mining | 2 | 7.1% |
Data portability | 2 | 7.1% |
Data quality | 2 | 7.1% |
Digital signage | 2 | 7.1% |
Directive (European Union) | 2 | 7.1% |
Discrimination | 2 | 7.1% |
Do Not Track legislation | 2 | 7.1% |
Domain name | 2 | 7.1% |
Electronic health record | 2 | 7.1% |
Emergency management | 2 | 7.1% |
Employment | 2 | 7.1% |
Ethics | 2 | 7.1% |
European Neighbourhood Policy | 2 | 7.1% |
Experiment | 2 | 7.1% |
Extraterritoriality | 2 | 7.1% |
FTC fair information practice | 2 | 7.1% |
Fair Credit Reporting Act | 2 | 7.1% |
Family Educational Rights and Privacy Act | 2 | 7.1% |
Federal Information Security Management Act of 2002 | 2 | 7.1% |
Federal Trade Commission Act of 1914 | 2 | 7.1% |
FinFisher | 2 | 7.1% |
Fingerprint Verification Competition | 2 | 7.1% |
First Amendment to the United States Constitution | 2 | 7.1% |
Forensic science | 2 | 7.1% |
Future enlargement of the European Union | 2 | 7.1% |
Generic top-level domain | 2 | 7.1% |
Governance | 2 | 7.1% |
Government and personhood | 2 | 7.1% |
Gramm–Leach–Bliley Act | 2 | 7.1% |
Graphics display resolution | 2 | 7.1% |
Health Insurance Portability and Accountability Act | 2 | 7.1% |
Health informatics | 2 | 7.1% |
IPhone | 2 | 7.1% |
Identity management | 2 | 7.1% |
Identity theft | 2 | 7.1% |
Image resolution | 2 | 7.1% |
Image segmentation | 2 | 7.1% |
Information retrieval | 2 | 7.1% |
Information science | 2 | 7.1% |
Information security | 2 | 7.1% |
Information sensitivity | 2 | 7.1% |
Information technology management | 2 | 7.1% |
International Covenant on Civil and Political Rights | 2 | 7.1% |
International law | 2 | 7.1% |
Internet censorship | 2 | 7.1% |
Internet governance | 2 | 7.1% |
Kinect | 2 | 7.1% |
Law and economics | 2 | 7.1% |
Management | 2 | 7.1% |
Marketing | 2 | 7.1% |
Mass media | 2 | 7.1% |
Member state of the European Union | 2 | 7.1% |
Mobile app | 2 | 7.1% |
Multimodal interaction | 2 | 7.1% |
NetMundial Initiative | 2 | 7.1% |
Online advertising | 2 | 7.1% |
PRISM (surveillance program) | 2 | 7.1% |
Passport | 2 | 7.1% |
Photograph | 2 | 7.1% |
Pixel | 2 | 7.1% |
Printer (computing) | 2 | 7.1% |
Radio | 2 | 7.1% |
Request for Comments | 2 | 7.1% |
Retail | 2 | 7.1% |
Right to privacy | 2 | 7.1% |
Security technology | 2 | 7.1% |
Signage | 2 | 7.1% |
Smart meter | 2 | 7.1% |
Social networking service | 2 | 7.1% |
Sovereign state | 2 | 7.1% |
Statistical classification | 2 | 7.1% |
Telephone tapping | 2 | 7.1% |
Thermography | 2 | 7.1% |
Tort | 2 | 7.1% |
Touch ID | 2 | 7.1% |
Training, validation, and test sets | 2 | 7.1% |
U.S. state | 2 | 7.1% |
United Nations Guiding Principles on Business and Human Rights | 2 | 7.1% |
Visa Information System | 2 | 7.1% |
Voice over IP | 2 | 7.1% |
Webcam | 2 | 7.1% |
World Summit on the Information Society | 2 | 7.1% |
3D modeling | 1 | 3.6% |
Aadhaar | 1 | 3.6% |
Activity tracker | 1 | 3.6% |
Air traffic control | 1 | 3.6% |
Aircraft | 1 | 3.6% |
Aircraft pilot | 1 | 3.6% |
Airport | 1 | 3.6% |
Android (operating system) | 1 | 3.6% |
Area of freedom, security and justice | 1 | 3.6% |
Areas of computer science | 1 | 3.6% |
Article 8 of the European Convention on Human Rights | 1 | 3.6% |
Attention | 1 | 3.6% |
Automated Targeting System | 1 | 3.6% |
Aviation | 1 | 3.6% |
Background check | 1 | 3.6% |
Bank Secrecy Act | 1 | 3.6% |
Bill of lading | 1 | 3.6% |
Binding corporate rules | 1 | 3.6% |
Biobank | 1 | 3.6% |
Body worn video (police equipment) | 1 | 3.6% |
Brandon Mayfield | 1 | 3.6% |
Broadcasting | 1 | 3.6% |
Bullrun (decryption program) | 1 | 3.6% |
Cargo | 1 | 3.6% |
Case study | 1 | 3.6% |
Chief information officer | 1 | 3.6% |
Civil rights and liberties | 1 | 3.6% |
Classified information | 1 | 3.6% |
Cluster analysis | 1 | 3.6% |
Cognitive science | 1 | 3.6% |
Communication | 1 | 3.6% |
Community | 1 | 3.6% |
Complaint | 1 | 3.6% |
Confidentiality | 1 | 3.6% |
Consent | 1 | 3.6% |
Contractual term | 1 | 3.6% |
Copyright | 1 | 3.6% |
Credit card | 1 | 3.6% |
Crime prevention | 1 | 3.6% |
Criminal justice | 1 | 3.6% |
Criminal procedure in South Africa | 1 | 3.6% |
Criminal record | 1 | 3.6% |
Crowdsourcing | 1 | 3.6% |
Crown copyright | 1 | 3.6% |
Customs | 1 | 3.6% |
Cyberattack | 1 | 3.6% |
DNA profiling | 1 | 3.6% |
Data Protection Act 1998 | 1 | 3.6% |
Data Retention Directive | 1 | 3.6% |
Data analysis | 1 | 3.6% |
Data model | 1 | 3.6% |
Data type | 1 | 3.6% |
Data visualization | 1 | 3.6% |
Database index | 1 | 3.6% |
Dataveillance | 1 | 3.6% |
Design | 1 | 3.6% |
Digital evidence | 1 | 3.6% |
Direct marketing | 1 | 3.6% |
Discipline and Punish | 1 | 3.6% |
Display resolution | 1 | 3.6% |
Drone journalism | 1 | 3.6% |
Dublin Regulation | 1 | 3.6% |
E-government | 1 | 3.6% |
Economic development | 1 | 3.6% |
Economics | 1 | 3.6% |
Education | 1 | 3.6% |
End user | 1 | 3.6% |
Expectation of privacy | 1 | 3.6% |
Expert | 1 | 3.6% |
Florida v. Riley | 1 | 3.6% |
Fourth Amendment to the United States Constitution | 1 | 3.6% |
Fraud | 1 | 3.6% |
Freedom of Information Act 2000 | 1 | 3.6% |
Freedom of information | 1 | 3.6% |
Freight forwarder | 1 | 3.6% |
Global Positioning System | 1 | 3.6% |
Global surveillance disclosures (2013–present) | 1 | 3.6% |
Graphical user interface | 1 | 3.6% |
Heartbleed | 1 | 3.6% |
IOS | 1 | 3.6% |
IOS 8 | 1 | 3.6% |
IPad | 1 | 3.6% |
Icon (computing) | 1 | 3.6% |
Information and communications technology | 1 | 3.6% |
Infrastructure | 1 | 3.6% |
Institution | 1 | 3.6% |
Intelligence analysis | 1 | 3.6% |
Intelligent agent | 1 | 3.6% |
International Safe Harbor Privacy Principles | 1 | 3.6% |
International relations | 1 | 3.6% |
Internet access | 1 | 3.6% |
Interoperability | 1 | 3.6% |
Journalism | 1 | 3.6% |
Judge | 1 | 3.6% |
Judgment (law) | 1 | 3.6% |
Laboratory | 1 | 3.6% |
Legal person | 1 | 3.6% |
Liberty | 1 | 3.6% |
Light-emitting diode | 1 | 3.6% |
Lighting | 1 | 3.6% |
Link analysis | 1 | 3.6% |
1 | 3.6% | |
Marriage | 1 | 3.6% |
Medical prescription | 1 | 3.6% |
Metadata | 1 | 3.6% |
Microchip implant (human) | 1 | 3.6% |
Mining | 1 | 3.6% |
Money laundering | 1 | 3.6% |
Multi-stakeholder governance | 1 | 3.6% |
Nanosensor | 1 | 3.6% |
National Information Exchange Model | 1 | 3.6% |
Next Generation Air Transportation System | 1 | 3.6% |
Nuisance in English law | 1 | 3.6% |
Ombudsman | 1 | 3.6% |
Online and offline | 1 | 3.6% |
P3P | 1 | 3.6% |
Panopticon | 1 | 3.6% |
Performance indicator | 1 | 3.6% |
Photography | 1 | 3.6% |
Predictive analytics | 1 | 3.6% |
Prison | 1 | 3.6% |
Privacy engineering | 1 | 3.6% |
Privacy laws of the United States | 1 | 3.6% |
Privacy settings | 1 | 3.6% |
Private biometrics | 1 | 3.6% |
Profiling (information science) | 1 | 3.6% |
Provenance | 1 | 3.6% |
Public key infrastructure | 1 | 3.6% |
Radio-frequency identification | 1 | 3.6% |
Regulation of Investigatory Powers Act 2000 | 1 | 3.6% |
Relational model | 1 | 3.6% |
Reliability engineering | 1 | 3.6% |
Requirement | 1 | 3.6% |
Resource Description Framework | 1 | 3.6% |
Right to be forgotten | 1 | 3.6% |
Risk management | 1 | 3.6% |
Safety | 1 | 3.6% |
Satellite | 1 | 3.6% |
Scientific misconduct | 1 | 3.6% |
Search engine optimization | 1 | 3.6% |
Search warrant | 1 | 3.6% |
Security of person | 1 | 3.6% |
Self-assembly | 1 | 3.6% |
Self-driving car | 1 | 3.6% |
Semantic Web | 1 | 3.6% |
Semantics | 1 | 3.6% |
Sensitive Security Information | 1 | 3.6% |
Sensor | 1 | 3.6% |
Situation awareness | 1 | 3.6% |
Smart card | 1 | 3.6% |
SmartGate | 1 | 3.6% |
Smartphone | 1 | 3.6% |
Software framework | 1 | 3.6% |
Sound recording and reproduction | 1 | 3.6% |
Standardization | 1 | 3.6% |
Standards organization | 1 | 3.6% |
State (polity) | 1 | 3.6% |
Stimulus modality | 1 | 3.6% |
Tag (metadata) | 1 | 3.6% |
Telecommunications | 1 | 3.6% |
Telecommunications Act of 1996 | 1 | 3.6% |
Tempora | 1 | 3.6% |
Terrorist Finance Tracking Program | 1 | 3.6% |
Texture mapping | 1 | 3.6% |
Trade secret | 1 | 3.6% |
Traffic | 1 | 3.6% |
Trespass | 1 | 3.6% |
Ubiquitous computing | 1 | 3.6% |
United States passport | 1 | 3.6% |
Universal Declaration of Human Rights | 1 | 3.6% |
Unstructured data | 1 | 3.6% |
Usability | 1 | 3.6% |
User-centered design | 1 | 3.6% |
Verification and validation | 1 | 3.6% |
Videotelephony | 1 | 3.6% |
Voyeurism | 1 | 3.6% |
Wearable computer | 1 | 3.6% |
Web 2.0 | 1 | 3.6% |
Web application | 1 | 3.6% |
Website | 1 | 3.6% |
Xbox | 1 | 3.6% |
abs | rel | |
---|---|---|
Human activities | 25 | 100.0% |
Privacy | 18 | 72.0% |
Public sphere | 15 | 60.0% |
Government | 14 | 56.0% |
Politics | 14 | 56.0% |
Social institutions | 14 | 56.0% |
Technology | 14 | 56.0% |
National security | 13 | 52.0% |
Surveillance | 13 | 52.0% |
Justice | 12 | 48.0% |
Law | 12 | 48.0% |
Computer security | 10 | 40.0% |
Computing | 10 | 40.0% |
Crime | 9 | 36.0% |
Facial recognition system | 8 | 32.0% |
Internet of things | 8 | 32.0% |
Personally identifiable information | 8 | 32.0% |
Biometrics | 7 | 28.0% |
Internet | 7 | 28.0% |
Regulatory compliance | 7 | 28.0% |
Computer network | 6 | 24.0% |
Information privacy | 6 | 24.0% |
Security | 6 | 24.0% |
Authentication | 5 | 20.0% |
Cyberattack | 5 | 20.0% |
Identity document | 5 | 20.0% |
Policy | 5 | 20.0% |
Public law | 5 | 20.0% |
Social media | 5 | 20.0% |
Autonomy | 4 | 16.0% |
Biometric passport | 4 | 16.0% |
Culture | 4 | 16.0% |
Cyberwarfare | 4 | 16.0% |
Fingerprint | 4 | 16.0% |
Information | 4 | 16.0% |
Information Age | 4 | 16.0% |
Information technology | 4 | 16.0% |
Innovation | 4 | 16.0% |
Law enforcement | 4 | 16.0% |
Personal data | 4 | 16.0% |
Privacy law | 4 | 16.0% |
Prosecutor | 4 | 16.0% |
Retail | 4 | 16.0% |
Risk | 4 | 16.0% |
U.S. state | 4 | 16.0% |
Unmanned aerial vehicle | 4 | 16.0% |
Wi-Fi | 4 | 16.0% |
World Wide Web | 4 | 16.0% |
Applied ethics | 3 | 12.0% |
Arrest | 3 | 12.0% |
Artificial intelligence | 3 | 12.0% |
Audit | 3 | 12.0% |
Branches of science | 3 | 12.0% |
Closed-circuit television | 3 | 12.0% |
Communication | 3 | 12.0% |
Cybercrime | 3 | 12.0% |
Cyberspace | 3 | 12.0% |
Database | 3 | 12.0% |
Employment | 3 | 12.0% |
Fourth Amendment to the United States Constitution | 3 | 12.0% |
Infrastructure | 3 | 12.0% |
Iris recognition | 3 | 12.0% |
Member state of the European Union | 3 | 12.0% |
News | 3 | 12.0% |
Passport | 3 | 12.0% |
Research | 3 | 12.0% |
Social issues | 3 | 12.0% |
Travel visa | 3 | 12.0% |
Virtue | 3 | 12.0% |
Accountability | 2 | 8.0% |
Activity tracker | 2 | 8.0% |
Augmented reality | 2 | 8.0% |
Barcode | 2 | 8.0% |
Bias | 2 | 8.0% |
Big data | 2 | 8.0% |
Bluetooth | 2 | 8.0% |
Body worn video | 2 | 8.0% |
Border control | 2 | 8.0% |
Business | 2 | 8.0% |
Civil liberties | 2 | 8.0% |
Cloud computing | 2 | 8.0% |
Common Security and Defence Policy | 2 | 8.0% |
Common law | 2 | 8.0% |
Computer forensics | 2 | 8.0% |
Connected car | 2 | 8.0% |
Contactless smart card | 2 | 8.0% |
Counter-terrorism | 2 | 8.0% |
Criminal justice | 2 | 8.0% |
Criminal law | 2 | 8.0% |
Cyber-security regulation | 2 | 8.0% |
Digital forensics | 2 | 8.0% |
Echo chamber (media) | 2 | 8.0% |
Economics | 2 | 8.0% |
Espionage | 2 | 8.0% |
Ethical principles | 2 | 8.0% |
Fake news | 2 | 8.0% |
Filter bubble | 2 | 8.0% |
First Amendment to the United States Constitution | 2 | 8.0% |
General Data Protection Regulation | 2 | 8.0% |
Globalization | 2 | 8.0% |
Government and personhood | 2 | 8.0% |
Health | 2 | 8.0% |
Human rights | 2 | 8.0% |
Immigration | 2 | 8.0% |
International law | 2 | 8.0% |
Internet governance | 2 | 8.0% |
Interoperability | 2 | 8.0% |
MIFARE | 2 | 8.0% |
Malware | 2 | 8.0% |
Management | 2 | 8.0% |
Mass media | 2 | 8.0% |
Mass surveillance | 2 | 8.0% |
Mobile app | 2 | 8.0% |
Mobile broadband | 2 | 8.0% |
Near-field communication | 2 | 8.0% |
Physical fitness | 2 | 8.0% |
Political science | 2 | 8.0% |
Privacy policy | 2 | 8.0% |
Proactive cyber defence | 2 | 8.0% |
Probable cause | 2 | 8.0% |
Radio-frequency identification | 2 | 8.0% |
Rights | 2 | 8.0% |
Risk management | 2 | 8.0% |
Robot | 2 | 8.0% |
Schengen Area | 2 | 8.0% |
Search warrant | 2 | 8.0% |
Self-driving car | 2 | 8.0% |
Situation awareness | 2 | 8.0% |
Smart card | 2 | 8.0% |
Smart city | 2 | 8.0% |
Smartwatch | 2 | 8.0% |
Stuxnet | 2 | 8.0% |
Tallinn Manual | 2 | 8.0% |
Telecommunication | 2 | 8.0% |
United States v. Jones | 2 | 8.0% |
Vulnerability (computing) | 2 | 8.0% |
War | 2 | 8.0% |
Weapon | 2 | 8.0% |
Wearable technology | 2 | 8.0% |
2015 San Bernardino attack | 1 | 4.0% |
Aadhaar | 1 | 4.0% |
Access control | 1 | 4.0% |
Accuracy and precision | 1 | 4.0% |
Advertising | 1 | 4.0% |
Airport | 1 | 4.0% |
Algorithm | 1 | 4.0% |
Analytics | 1 | 4.0% |
Anonymity | 1 | 4.0% |
Applications of cryptography | 1 | 4.0% |
Arrest warrant | 1 | 4.0% |
Asylum seeker | 1 | 4.0% |
Authentication methods | 1 | 4.0% |
Automatic identification and data capture | 1 | 4.0% |
Automatic number-plate recognition | 1 | 4.0% |
Automation | 1 | 4.0% |
Bank | 1 | 4.0% |
Blockchain | 1 | 4.0% |
Body worn video (police equipment) | 1 | 4.0% |
Business model | 1 | 4.0% |
Citizenship of the United States | 1 | 4.0% |
City | 1 | 4.0% |
Civil and political rights | 1 | 4.0% |
Civil rights and liberties | 1 | 4.0% |
Cognition | 1 | 4.0% |
Compassionate release | 1 | 4.0% |
Complaint | 1 | 4.0% |
Computer science | 1 | 4.0% |
Consensus decision-making | 1 | 4.0% |
Content (media) | 1 | 4.0% |
Contract | 1 | 4.0% |
Credit bureau | 1 | 4.0% |
Credit card | 1 | 4.0% |
Credit history | 1 | 4.0% |
Credit score | 1 | 4.0% |
Credit score in the United States | 1 | 4.0% |
Crime prevention | 1 | 4.0% |
Criminal record | 1 | 4.0% |
Crisis management | 1 | 4.0% |
Crowdsourcing | 1 | 4.0% |
DNA profiling | 1 | 4.0% |
Data | 1 | 4.0% |
Data Protection Act 1998 | 1 | 4.0% |
Data Protection Directive | 1 | 4.0% |
Data breach | 1 | 4.0% |
Data re-identification | 1 | 4.0% |
Data retention | 1 | 4.0% |
Death of Freddie Gray | 1 | 4.0% |
Debt | 1 | 4.0% |
Deception | 1 | 4.0% |
Demand | 1 | 4.0% |
Democracy | 1 | 4.0% |
Development aid | 1 | 4.0% |
Digital divide | 1 | 4.0% |
Digital technology | 1 | 4.0% |
Dignity | 1 | 4.0% |
Discovery (law) | 1 | 4.0% |
Discretion | 1 | 4.0% |
Driver's license | 1 | 4.0% |
Dynamic pricing | 1 | 4.0% |
E-government | 1 | 4.0% |
Education | 1 | 4.0% |
Electronic Communications Privacy Act | 1 | 4.0% |
Elizabeth Denham | 1 | 4.0% |
Email Privacy Act | 1 | 4.0% |
Emotion | 1 | 4.0% |
Employee retention | 1 | 4.0% |
Ethics | 1 | 4.0% |
European Convention on Human Rights | 1 | 4.0% |
Evaluation | 1 | 4.0% |
Evidence | 1 | 4.0% |
Expectation of privacy | 1 | 4.0% |
Experiment | 1 | 4.0% |
Expert | 1 | 4.0% |
FTC fair information practice | 1 | 4.0% |
Facebook Safety Check | 1 | 4.0% |
Fair Credit Reporting Act | 1 | 4.0% |
Feasibility study | 1 | 4.0% |
Felony | 1 | 4.0% |
Forensic science | 1 | 4.0% |
Freedom of information laws by country | 1 | 4.0% |
General Atomics MQ-9 Reaper | 1 | 4.0% |
General Schedule (US civil service pay scale) | 1 | 4.0% |
Glik v. Cunniffe | 1 | 4.0% |
Global Positioning System | 1 | 4.0% |
Gorgon Stare | 1 | 4.0% |
HTTP cookie | 1 | 4.0% |
Hand | 1 | 4.0% |
Health Insurance Portability and Accountability Act | 1 | 4.0% |
Heisei | 1 | 4.0% |
Image scanner | 1 | 4.0% |
Industry (economics) | 1 | 4.0% |
Information and communications technology | 1 | 4.0% |
Information broker | 1 | 4.0% |
Inquiry | 1 | 4.0% |
Insurance | 1 | 4.0% |
Integrated Automated Fingerprint Identification System | 1 | 4.0% |
Internal control | 1 | 4.0% |
International development | 1 | 4.0% |
Issues in ethics | 1 | 4.0% |
Jencks Act | 1 | 4.0% |
Jun Murai | 1 | 4.0% |
Jury | 1 | 4.0% |
Katz v. United States | 1 | 4.0% |
Law and economics | 1 | 4.0% |
Law enforcement techniques | 1 | 4.0% |
Lawyer | 1 | 4.0% |
Leadership | 1 | 4.0% |
Learning | 1 | 4.0% |
Legal action | 1 | 4.0% |
Loan | 1 | 4.0% |
Machine learning | 1 | 4.0% |
MagicBands | 1 | 4.0% |
Market segmentation | 1 | 4.0% |
Marketing | 1 | 4.0% |
Mug shot | 1 | 4.0% |
Navigation | 1 | 4.0% |
News Feed | 1 | 4.0% |
Office of Inspector General (United States) | 1 | 4.0% |
Omnibus Crime Control and Safe Streets Act of 1968 | 1 | 4.0% |
Online advertising | 1 | 4.0% |
P-value | 1 | 4.0% |
Pardon | 1 | 4.0% |
Password | 1 | 4.0% |
Patrick Leahy | 1 | 4.0% |
Perception | 1 | 4.0% |
Person | 1 | 4.0% |
Personal Information Protection and Electronic Documents Act | 1 | 4.0% |
Personalization | 1 | 4.0% |
Police accountability | 1 | 4.0% |
Police brutality | 1 | 4.0% |
Police officer | 1 | 4.0% |
Pricing | 1 | 4.0% |
Prison | 1 | 4.0% |
Privacy Act of 1974 | 1 | 4.0% |
Privacy Commissioner (New Zealand) | 1 | 4.0% |
Privacy Impact Assessment | 1 | 4.0% |
Privacy and Electronic Communications Directive 2002 | 1 | 4.0% |
Productivity | 1 | 4.0% |
Professor | 1 | 4.0% |
Project Initiation Documentation | 1 | 4.0% |
Psychological concepts | 1 | 4.0% |
Public opinion | 1 | 4.0% |
Racial profiling | 1 | 4.0% |
Ransomware | 1 | 4.0% |
Reasonable suspicion | 1 | 4.0% |
Recidivism | 1 | 4.0% |
Recruitment | 1 | 4.0% |
Refugee | 1 | 4.0% |
Right to privacy in New Zealand | 1 | 4.0% |
Robotics | 1 | 4.0% |
Satellite navigation device | 1 | 4.0% |
Schengen Information System | 1 | 4.0% |
Science, technology, engineering, and mathematics | 1 | 4.0% |
Search and seizure | 1 | 4.0% |
Search neutrality | 1 | 4.0% |
Security technology | 1 | 4.0% |
Sexual harassment | 1 | 4.0% |
SmartGate | 1 | 4.0% |
Smartphone | 1 | 4.0% |
Society | 1 | 4.0% |
Speaker recognition | 1 | 4.0% |
Special agent | 1 | 4.0% |
State (polity) | 1 | 4.0% |
Statistics | 1 | 4.0% |
Streaming media | 1 | 4.0% |
Survey methodology | 1 | 4.0% |
Sustainable Development Goals | 1 | 4.0% |
System | 1 | 4.0% |
Targeted advertising | 1 | 4.0% |
Technological singularity | 1 | 4.0% |
Telecommuting | 1 | 4.0% |
Telephone tapping | 1 | 4.0% |
Terrorism | 1 | 4.0% |
Transmitter | 1 | 4.0% |
Transparency (behavior) | 1 | 4.0% |
Trust (social science) | 1 | 4.0% |
Turnover (employment) | 1 | 4.0% |
Type I and type II errors | 1 | 4.0% |
United States Attorney | 1 | 4.0% |
United States Constitution | 1 | 4.0% |
United States passport | 1 | 4.0% |
Use of UAVs in law enforcement | 1 | 4.0% |
Use of force | 1 | 4.0% |
Vanita Gupta | 1 | 4.0% |
Victimology | 1 | 4.0% |
Violence | 1 | 4.0% |
Visa policy of the Schengen Area | 1 | 4.0% |
Watch | 1 | 4.0% |
Website | 1 | 4.0% |
abs | rel | |
---|---|---|
Human activities | 73 | 96.1% |
Privacy | 56 | 73.7% |
Government | 42 | 55.3% |
Politics | 41 | 53.9% |
Technology | 41 | 53.9% |
Law | 40 | 52.6% |
Justice | 36 | 47.4% |
Public sphere | 35 | 46.1% |
Social institutions | 30 | 39.5% |
Risk | 29 | 38.2% |
Surveillance | 29 | 38.2% |
Information | 28 | 36.8% |
Artificial intelligence | 27 | 35.5% |
Social media | 26 | 34.2% |
Computing | 25 | 32.9% |
Computer security | 24 | 31.6% |
Information privacy | 23 | 30.3% |
National security | 23 | 30.3% |
General Data Protection Regulation | 22 | 28.9% |
Culture | 21 | 27.6% |
Internet | 21 | 27.6% |
Internet of things | 21 | 27.6% |
Policy | 21 | 27.6% |
Research | 21 | 27.6% |
Big data | 18 | 23.7% |
Machine learning | 18 | 23.7% |
Biometrics | 17 | 22.4% |
Personal data | 17 | 22.4% |
Applied ethics | 16 | 21.1% |
Data | 16 | 21.1% |
Human rights | 16 | 21.1% |
Personally identifiable information | 16 | 21.1% |
Analytics | 15 | 19.7% |
Automation | 15 | 19.7% |
Crime | 15 | 19.7% |
Decision-making | 14 | 18.4% |
Facial recognition system | 14 | 18.4% |
Ethics | 13 | 17.1% |
Right to privacy | 13 | 17.1% |
Rights | 13 | 17.1% |
Issues in ethics | 12 | 15.8% |
News | 12 | 15.8% |
Transparency (behavior) | 12 | 15.8% |
Cyberwarfare | 11 | 14.5% |
Data Protection Directive | 11 | 14.5% |
Regulatory compliance | 11 | 14.5% |
Science | 11 | 14.5% |
Security | 11 | 14.5% |
Virtue | 11 | 14.5% |
Cognitive science | 10 | 13.2% |
Governance | 10 | 13.2% |
Privacy law | 10 | 13.2% |
Social issues | 10 | 13.2% |
Closed-circuit television | 9 | 11.8% |
Communication | 9 | 11.8% |
Concepts in metaphysics | 9 | 11.8% |
Information technology | 9 | 11.8% |
Mass media | 9 | 11.8% |
Public law | 9 | 11.8% |
Algorithm | 8 | 10.5% |
Autonomy | 8 | 10.5% |
Bias | 8 | 10.5% |
Branches of science | 8 | 10.5% |
Computer network | 8 | 10.5% |
Data analysis | 8 | 10.5% |
Data retention | 8 | 10.5% |
Fingerprint | 8 | 10.5% |
Robot | 8 | 10.5% |
Accountability | 7 | 9.2% |
Consent | 7 | 9.2% |
Cyberattack | 7 | 9.2% |
Database | 7 | 9.2% |
Information security | 7 | 9.2% |
Internet privacy | 7 | 9.2% |
Ownership | 7 | 9.2% |
Privacy and Electronic Communications Directive 2002 | 7 | 9.2% |
Property | 7 | 9.2% |
Advertising | 6 | 7.9% |
Algorithmic bias | 6 | 7.9% |
Border control | 6 | 7.9% |
Criminal justice | 6 | 7.9% |
Cyberspace | 6 | 7.9% |
Ethical principles | 6 | 7.9% |
European Convention on Human Rights | 6 | 7.9% |
Filter bubble | 6 | 7.9% |
Fourth Amendment to the United States Constitution | 6 | 7.9% |
Freedom of speech | 6 | 7.9% |
Human | 6 | 7.9% |
Identity document | 6 | 7.9% |
Intelligence | 6 | 7.9% |
Learning | 6 | 7.9% |
Privacy policy | 6 | 7.9% |
Search and seizure | 6 | 7.9% |
Self-driving car | 6 | 7.9% |
System | 6 | 7.9% |
Travel visa | 6 | 7.9% |
U.S. state | 6 | 7.9% |
Unmanned aerial vehicle | 6 | 7.9% |
Audit | 5 | 6.6% |
Authentication | 5 | 6.6% |
Cognition | 5 | 6.6% |
Crime prevention | 5 | 6.6% |
Cybercrime | 5 | 6.6% |
Dignity | 5 | 6.6% |
Discovery (law) | 5 | 6.6% |
Discrimination | 5 | 6.6% |
Education | 5 | 6.6% |
Forensic science | 5 | 6.6% |
Health | 5 | 6.6% |
Innovation | 5 | 6.6% |
Intellectual property | 5 | 6.6% |
Mobile app | 5 | 6.6% |
Privacy Act of 1974 | 5 | 6.6% |
Prosecutor | 5 | 6.6% |
Psychology | 5 | 6.6% |
Robotics | 5 | 6.6% |
Society | 5 | 6.6% |
Terrorism | 5 | 6.6% |
United States v. Jones | 5 | 6.6% |
Business | 4 | 5.3% |
Charter of Fundamental Rights of the European Union | 4 | 5.3% |
Cloud computing | 4 | 5.3% |
Common law | 4 | 5.3% |
Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the Application of Biology and Medicine | 4 | 5.3% |
Counter-terrorism | 4 | 5.3% |
Criminal law | 4 | 5.3% |
DNA profiling | 4 | 5.3% |
De-identification | 4 | 5.3% |
Design | 4 | 5.3% |
Emergency management | 4 | 5.3% |
Emerging technologies | 4 | 5.3% |
Employment | 4 | 5.3% |
Evaluation | 4 | 5.3% |
Evidence | 4 | 5.3% |
Experiment | 4 | 5.3% |
Fake news | 4 | 5.3% |
Freedom of Information Act (United States) | 4 | 5.3% |
Informed consent | 4 | 5.3% |
Interoperability | 4 | 5.3% |
Law enforcement | 4 | 5.3% |
Lawsuit | 4 | 5.3% |
Malware | 4 | 5.3% |
Privacy by design | 4 | 5.3% |
Profiling (information science) | 4 | 5.3% |
Right to be forgotten | 4 | 5.3% |
Search warrant | 4 | 5.3% |
Targeted advertising | 4 | 5.3% |
Technological convergence | 4 | 5.3% |
Accuracy and precision | 3 | 3.9% |
Act of Parliament (UK) | 3 | 3.9% |
Article 8 of the European Convention on Human Rights | 3 | 3.9% |
Automated Targeting System | 3 | 3.9% |
Best practice | 3 | 3.9% |
Car | 3 | 3.9% |
Contract | 3 | 3.9% |
DNA | 3 | 3.9% |
DNA database | 3 | 3.9% |
Data Protection Act 1998 | 3 | 3.9% |
Data Retention Directive | 3 | 3.9% |
Data science | 3 | 3.9% |
Echo chamber (media) | 3 | 3.9% |
Edward Snowden | 3 | 3.9% |
Emotion | 3 | 3.9% |
Executive Order 13769 | 3 | 3.9% |
Expert | 3 | 3.9% |
Government and personhood | 3 | 3.9% |
Health Insurance Portability and Accountability Act | 3 | 3.9% |
Immigration | 3 | 3.9% |
Information Age | 3 | 3.9% |
Information sensitivity | 3 | 3.9% |
Investigatory Powers Act 2016 | 3 | 3.9% |
Judgment (law) | 3 | 3.9% |
Jury | 3 | 3.9% |
Market (economics) | 3 | 3.9% |
Mass surveillance | 3 | 3.9% |
Metadata | 3 | 3.9% |
Misinformation | 3 | 3.9% |
Money laundering | 3 | 3.9% |
Personalized search | 3 | 3.9% |
Persuasion | 3 | 3.9% |
Police officer | 3 | 3.9% |
Prediction | 3 | 3.9% |
Privacy laws of the United States | 3 | 3.9% |
Psychological concepts | 3 | 3.9% |
Risk assessment | 3 | 3.9% |
Risk management | 3 | 3.9% |
Road | 3 | 3.9% |
Scientific method | 3 | 3.9% |
Software | 3 | 3.9% |
The Right to Privacy (article) | 3 | 3.9% |
Thought | 3 | 3.9% |
Treaty | 3 | 3.9% |
Trust (emotion) | 3 | 3.9% |
United Kingdom National DNA Database | 3 | 3.9% |
User-generated content | 3 | 3.9% |
Vehicular automation | 3 | 3.9% |
Vulnerability (computing) | 3 | 3.9% |
Wearable technology | 3 | 3.9% |
Witness | 3 | 3.9% |
Advanced driver-assistance systems | 2 | 2.6% |
Adversarial system | 2 | 2.6% |
Air traffic control | 2 | 2.6% |
Aircraft | 2 | 2.6% |
Aircraft pilot | 2 | 2.6% |
Airspace | 2 | 2.6% |
Analysis | 2 | 2.6% |
Arrest | 2 | 2.6% |
Artificial general intelligence | 2 | 2.6% |
Assumption | 2 | 2.6% |
Attention | 2 | 2.6% |
Augmented reality | 2 | 2.6% |
Bail | 2 | 2.6% |
Behavior | 2 | 2.6% |
Bill (law) | 2 | 2.6% |
Blockchain | 2 | 2.6% |
Border Force | 2 | 2.6% |
Botnet | 2 | 2.6% |
Brexit | 2 | 2.6% |
Capitalism | 2 | 2.6% |
Cargo | 2 | 2.6% |
Catherine Tucker | 2 | 2.6% |
Census | 2 | 2.6% |
Child | 2 | 2.6% |
Children's Online Privacy Protection Act | 2 | 2.6% |
Computer | 2 | 2.6% |
Computer science | 2 | 2.6% |
Confidentiality | 2 | 2.6% |
Copyright | 2 | 2.6% |
Creativity | 2 | 2.6% |
Credit score | 2 | 2.6% |
Crime scene | 2 | 2.6% |
Critical infrastructure protection | 2 | 2.6% |
DNA sequencing | 2 | 2.6% |
Data laws | 2 | 2.6% |
Data management | 2 | 2.6% |
Data portability | 2 | 2.6% |
Data re-identification | 2 | 2.6% |
Data sharing | 2 | 2.6% |
Deep learning | 2 | 2.6% |
Defamation | 2 | 2.6% |
Digital economy | 2 | 2.6% |
Disinformation | 2 | 2.6% |
Donald Trump | 2 | 2.6% |
Duty of care | 2 | 2.6% |
Economic inequality | 2 | 2.6% |
Economics | 2 | 2.6% |
Empowerment | 2 | 2.6% |
Encryption | 2 | 2.6% |
Entrepreneurship | 2 | 2.6% |
Espionage | 2 | 2.6% |
Evidence (law) | 2 | 2.6% |
Expectation of privacy | 2 | 2.6% |
Face | 2 | 2.6% |
Fact-checking | 2 | 2.6% |
Fake news website | 2 | 2.6% |
First Amendment to the United States Constitution | 2 | 2.6% |
Fourteenth Amendment to the United States Constitution | 2 | 2.6% |
Freedom of information laws by country | 2 | 2.6% |
Gillick competence | 2 | 2.6% |
Human nature | 2 | 2.6% |
Identity management | 2 | 2.6% |
Information privacy law | 2 | 2.6% |
Information science | 2 | 2.6% |
Insurance | 2 | 2.6% |
Iris recognition | 2 | 2.6% |
Journalism | 2 | 2.6% |
Judge | 2 | 2.6% |
Judiciaries | 2 | 2.6% |
Lawyer | 2 | 2.6% |
Legal procedure | 2 | 2.6% |
Low copy number | 2 | 2.6% |
Microsatellite | 2 | 2.6% |
Mirai (malware) | 2 | 2.6% |
Negligence | 2 | 2.6% |
News Feed | 2 | 2.6% |
Omnibus Crime Control and Safe Streets Act of 1968 | 2 | 2.6% |
Parent | 2 | 2.6% |
Persuasive technology | 2 | 2.6% |
Phishing | 2 | 2.6% |
Predictive policing | 2 | 2.6% |
Prison | 2 | 2.6% |
Privacy Impact Assessment | 2 | 2.6% |
Probable cause | 2 | 2.6% |
Problem solving | 2 | 2.6% |
Productivity | 2 | 2.6% |
Propaganda | 2 | 2.6% |
Psychological resilience | 2 | 2.6% |
Racism | 2 | 2.6% |
Ransomware | 2 | 2.6% |
Rape | 2 | 2.6% |
Reason | 2 | 2.6% |
Recidivism | 2 | 2.6% |
Reliability engineering | 2 | 2.6% |
Science, technology, engineering, and mathematics | 2 | 2.6% |
Security hacker | 2 | 2.6% |
Sexual assault | 2 | 2.6% |
Smart city | 2 | 2.6% |
Smartphone | 2 | 2.6% |
Social network | 2 | 2.6% |
Social networking service | 2 | 2.6% |
Social science | 2 | 2.6% |
Standardization | 2 | 2.6% |
Supplemental Nutrition Assistance Program | 2 | 2.6% |
Survey methodology | 2 | 2.6% |
Sustainable Development Goals | 2 | 2.6% |
Targeted surveillance | 2 | 2.6% |
Telephone tapping | 2 | 2.6% |
Temporary Assistance for Needy Families | 2 | 2.6% |
Tesla Autopilot | 2 | 2.6% |
Tort | 2 | 2.6% |
Trespass | 2 | 2.6% |
Type I and type II errors | 2 | 2.6% |
University | 2 | 2.6% |
Video | 2 | 2.6% |
Video game | 2 | 2.6% |
Visa policy of the Schengen Area | 2 | 2.6% |
Visa policy of the United Kingdom | 2 | 2.6% |
Y-STR | 2 | 2.6% |
4chan | 1 | 1.3% |
Aadhaar | 1 | 1.3% |
Access control | 1 | 1.3% |
Access to information | 1 | 1.3% |
Activity tracker | 1 | 1.3% |
Actuator | 1 | 1.3% |
Admissible evidence | 1 | 1.3% |
Adolescence | 1 | 1.3% |
Adoption | 1 | 1.3% |
Affidavit | 1 | 1.3% |
Agile software development | 1 | 1.3% |
Agriculture | 1 | 1.3% |
Alex Jones | 1 | 1.3% |
Algorithms | 1 | 1.3% |
Alt-right | 1 | 1.3% |
Amicus curiae | 1 | 1.3% |
Android (robot) | 1 | 1.3% |
Anonymity | 1 | 1.3% |
Anthropomorphism | 1 | 1.3% |
Anti-spam techniques | 1 | 1.3% |
Apple ID | 1 | 1.3% |
Areas of computer science | 1 | 1.3% |
Arrest warrant | 1 | 1.3% |
Artificial cardiac pacemaker | 1 | 1.3% |
Assault | 1 | 1.3% |
Automata theory | 1 | 1.3% |
Automated driving system | 1 | 1.3% |
Bank | 1 | 1.3% |
Basic income | 1 | 1.3% |
Belmont Report | 1 | 1.3% |
Biology | 1 | 1.3% |
Biometric passport | 1 | 1.3% |
Biotechnology | 1 | 1.3% |
Boarding pass | 1 | 1.3% |
Body worn video | 1 | 1.3% |
Burden of proof (law) | 1 | 1.3% |
CBRN defense | 1 | 1.3% |
COINTELPRO | 1 | 1.3% |
Camera | 1 | 1.3% |
Card security code | 1 | 1.3% |
Centrality | 1 | 1.3% |
Chaos theory | 1 | 1.3% |
Chief mate | 1 | 1.3% |
Children's rights | 1 | 1.3% |
Citizenship | 1 | 1.3% |
Citizenship of the United States | 1 | 1.3% |
Civil and political rights | 1 | 1.3% |
Civil liberties | 1 | 1.3% |
Civil society | 1 | 1.3% |
Classified information | 1 | 1.3% |
Climate change | 1 | 1.3% |
Climate resilience | 1 | 1.3% |
Code of Criminal Procedure (India) | 1 | 1.3% |
Cognitive bias | 1 | 1.3% |
Combined DNA Index System | 1 | 1.3% |
Community | 1 | 1.3% |
Competition (companies) | 1 | 1.3% |
Complexity | 1 | 1.3% |
Computer data | 1 | 1.3% |
Computer data storage | 1 | 1.3% |
Computer file | 1 | 1.3% |
Computer vision | 1 | 1.3% |
Concealed carry in the United States | 1 | 1.3% |
Confrontation Clause | 1 | 1.3% |
Conspiracy theory | 1 | 1.3% |
Consumer protection | 1 | 1.3% |
Convention on Cybercrime | 1 | 1.3% |
Convention on the Rights of the Child | 1 | 1.3% |
Copyright infringement | 1 | 1.3% |
Counterterrorism | 1 | 1.3% |
Court | 1 | 1.3% |
Courtroom | 1 | 1.3% |
Creative Commons license | 1 | 1.3% |
Criminal procedure in South Africa | 1 | 1.3% |
Criminal record | 1 | 1.3% |
Criminology | 1 | 1.3% |
Cuckservative | 1 | 1.3% |
Cultural Marxism conspiracy theory | 1 | 1.3% |
Cybersecurity Information Sharing Act | 1 | 1.3% |
Cyborg | 1 | 1.3% |
Damages | 1 | 1.3% |
Data mining | 1 | 1.3% |
Data security | 1 | 1.3% |
Data type | 1 | 1.3% |
Database Directive | 1 | 1.3% |
Daubert standard | 1 | 1.3% |
Delivery drone | 1 | 1.3% |
Department of Motor Vehicles | 1 | 1.3% |
Dependent and independent variables | 1 | 1.3% |
Detective | 1 | 1.3% |
Deterrence theory | 1 | 1.3% |
Deviance (sociology) | 1 | 1.3% |
Digital evidence | 1 | 1.3% |
Digital forensics | 1 | 1.3% |
Digital rights | 1 | 1.3% |
Digital technology | 1 | 1.3% |
Digitization | 1 | 1.3% |
Directive (European Union) | 1 | 1.3% |
Disparate impact | 1 | 1.3% |
Doctor of Philosophy | 1 | 1.3% |
Doklam | 1 | 1.3% |
Donald Trump on social media | 1 | 1.3% |
Doping in sport | 1 | 1.3% |
Dublin Regulation | 1 | 1.3% |
Due Process Clause | 1 | 1.3% |
Due diligence | 1 | 1.3% |
Dystopia | 1 | 1.3% |
E-book | 1 | 1.3% |
Ecolabel | 1 | 1.3% |
Economic globalization | 1 | 1.3% |
Educational assessment | 1 | 1.3% |
Electronic Communications Privacy Act | 1 | 1.3% |
Electronic health record | 1 | 1.3% |
Empathy | 1 | 1.3% |
Engineering | 1 | 1.3% |
Equality Act 2010 | 1 | 1.3% |
European Union law | 1 | 1.3% |
Expert witness | 1 | 1.3% |
Extract, transform, load | 1 | 1.3% |
FTC fair information practice | 1 | 1.3% |
Face Recognition Vendor Test | 1 | 1.3% |
Fair Credit Reporting Act | 1 | 1.3% |
Family Educational Rights and Privacy Act | 1 | 1.3% |
Federal Information Security Management Act of 2002 | 1 | 1.3% |
Felony | 1 | 1.3% |
Feminism | 1 | 1.3% |
Florida v. Riley | 1 | 1.3% |
Foreign fighters in the Syrian and Iraqi Civil Wars | 1 | 1.3% |
Form I-94 | 1 | 1.3% |
Freedom of Information Act 2000 | 1 | 1.3% |
Fundamental rights in India | 1 | 1.3% |
Future | 1 | 1.3% |
G20 | 1 | 1.3% |
Gamergate controversy | 1 | 1.3% |
Gatekeeping (communication) | 1 | 1.3% |
Genetics | 1 | 1.3% |
Genome | 1 | 1.3% |
Government institutions | 1 | 1.3% |
Gramm–Leach–Bliley Act | 1 | 1.3% |
Green card | 1 | 1.3% |
Griswold v. Connecticut | 1 | 1.3% |
HTTP cookie | 1 | 1.3% |
HTTPS | 1 | 1.3% |
Hard disk drive | 1 | 1.3% |
Hashtag | 1 | 1.3% |
Hate speech | 1 | 1.3% |
Health data | 1 | 1.3% |
Heuristic | 1 | 1.3% |
Human genome | 1 | 1.3% |
Human rights defender | 1 | 1.3% |
Human subject research | 1 | 1.3% |
Hyde Amendment | 1 | 1.3% |
IT law | 1 | 1.3% |
Identity theft | 1 | 1.3% |
Image segmentation | 1 | 1.3% |
Immersion (virtual reality) | 1 | 1.3% |
Industry self-regulation | 1 | 1.3% |
Information Sharing Environment | 1 | 1.3% |
Information broker | 1 | 1.3% |
Information governance | 1 | 1.3% |
Information management | 1 | 1.3% |
Information retrieval | 1 | 1.3% |
Information technology management | 1 | 1.3% |
Informational self-determination | 1 | 1.3% |
Institution | 1 | 1.3% |
Institutional review board | 1 | 1.3% |
Integrated Automated Fingerprint Identification System | 1 | 1.3% |
Intelligent agent | 1 | 1.3% |
Intelligent transportation system | 1 | 1.3% |
Interdisciplinarity | 1 | 1.3% |
International Safe Harbor Privacy Principles | 1 | 1.3% |
International law | 1 | 1.3% |
Internet troll | 1 | 1.3% |
Interpersonal relationship | 1 | 1.3% |
Jeff Moss (hacker) | 1 | 1.3% |
Jihadism | 1 | 1.3% |
Jurisdiction | 1 | 1.3% |
Knowledge | 1 | 1.3% |
Kulbhushan Jadhav | 1 | 1.3% |
Labour economics | 1 | 1.3% |
Law and economics | 1 | 1.3% |
Law of the United States | 1 | 1.3% |
Lawful permanent residents (United States) | 1 | 1.3% |
Leadership | 1 | 1.3% |
Legal action | 1 | 1.3% |
Legal challenges to the Trump travel ban | 1 | 1.3% |
Legal liability | 1 | 1.3% |
Legal person | 1 | 1.3% |
Liability insurance | 1 | 1.3% |
License | 1 | 1.3% |
Life sciences | 1 | 1.3% |
Life-cycle assessment | 1 | 1.3% |
Literacy | 1 | 1.3% |
Live scan | 1 | 1.3% |
Loan | 1 | 1.3% |
Lone wolf attacks | 1 | 1.3% |
Louis Brandeis | 1 | 1.3% |
Management | 1 | 1.3% |
Manosphere | 1 | 1.3% |
Mark Zuckerberg | 1 | 1.3% |
Marketing | 1 | 1.3% |
Marvin Minsky | 1 | 1.3% |
Mathematics | 1 | 1.3% |
Media literacy | 1 | 1.3% |
Median | 1 | 1.3% |
Medicine | 1 | 1.3% |
Member state of the European Union | 1 | 1.3% |
Memory | 1 | 1.3% |
Men's movement | 1 | 1.3% |
Men's rights movement | 1 | 1.3% |
Menlo Report | 1 | 1.3% |
Mental Health Act 1983 | 1 | 1.3% |
Mental disorder | 1 | 1.3% |
Microwork | 1 | 1.3% |
Millennials | 1 | 1.3% |
Mind | 1 | 1.3% |
Misconduct | 1 | 1.3% |
Mobile phone | 1 | 1.3% |
Morality | 1 | 1.3% |
Motivation | 1 | 1.3% |
Mug shot | 1 | 1.3% |
Multi-factor authentication | 1 | 1.3% |
Multistakeholder governance | 1 | 1.3% |
Murder | 1 | 1.3% |
National Information Exchange Model | 1 | 1.3% |
National security letter | 1 | 1.3% |
National service in Singapore | 1 | 1.3% |
Nationwide Suspicious Activity Reporting Initiative | 1 | 1.3% |
Natural and legal rights | 1 | 1.3% |
Newspaper | 1 | 1.3% |
Non-coding DNA | 1 | 1.3% |
Notice and take down | 1 | 1.3% |
Nursing home care | 1 | 1.3% |
Office of Inspector General (United States) | 1 | 1.3% |
Online advertising | 1 | 1.3% |
Organization | 1 | 1.3% |
Outlier | 1 | 1.3% |
Packaging machinery | 1 | 1.3% |
Pandemic | 1 | 1.3% |
Passenger name record | 1 | 1.3% |
Passport | 1 | 1.3% |
Password | 1 | 1.3% |
Patent | 1 | 1.3% |
Paul Rübig | 1 | 1.3% |
Pen register | 1 | 1.3% |
Performance indicator | 1 | 1.3% |
Personhood | 1 | 1.3% |
Photograph | 1 | 1.3% |
Physical Security Interoperability Alliance | 1 | 1.3% |
Physical fitness | 1 | 1.3% |
Pizzagate conspiracy theory | 1 | 1.3% |
Plea | 1 | 1.3% |
Plea bargain | 1 | 1.3% |
Police National Computer | 1 | 1.3% |
Police body camera | 1 | 1.3% |
Political science | 1 | 1.3% |
Polymerase chain reaction | 1 | 1.3% |
Poverty | 1 | 1.3% |
Predictive analytics | 1 | 1.3% |
Predictive modelling | 1 | 1.3% |
Price | 1 | 1.3% |
Prisoner | 1 | 1.3% |
Privacy Commissioner (New Zealand) | 1 | 1.3% |
Pro se legal representation in the United States | 1 | 1.3% |
Progress | 1 | 1.3% |
Propaganda in the Russian Federation | 1 | 1.3% |
Proportionality (law) | 1 | 1.3% |
Protection of Freedoms Act 2012 | 1 | 1.3% |
Prüm Convention | 1 | 1.3% |
Pseudonymization | 1 | 1.3% |
Psychiatry | 1 | 1.3% |
Public defender (United States) | 1 | 1.3% |
Public opinion | 1 | 1.3% |
Public–private partnership | 1 | 1.3% |
Question | 1 | 1.3% |
Race (human categorization) | 1 | 1.3% |
Race and ethnicity in the United States Census | 1 | 1.3% |
Racial profiling | 1 | 1.3% |
Radicalization | 1 | 1.3% |
Radio-frequency identification | 1 | 1.3% |
Recycling | 1 | 1.3% |
Regression analysis | 1 | 1.3% |
Regulation of Investigatory Powers Act 2000 | 1 | 1.3% |
Rehabilitation (penology) | 1 | 1.3% |
Requirement | 1 | 1.3% |
Right to a fair trial | 1 | 1.3% |
Right to explanation | 1 | 1.3% |
Right to privacy in New Zealand | 1 | 1.3% |
Right to silence | 1 | 1.3% |
Riley v. California | 1 | 1.3% |
Roaming | 1 | 1.3% |
Robbery | 1 | 1.3% |
Roe v. Wade | 1 | 1.3% |
Rule of law | 1 | 1.3% |
Rundfunkstaatsvertrag | 1 | 1.3% |
S and Marper v United Kingdom | 1 | 1.3% |
Safety | 1 | 1.3% |
Sampling (statistics) | 1 | 1.3% |
Schengen Area | 1 | 1.3% |
Secure Flight | 1 | 1.3% |
Security certificate | 1 | 1.3% |
Security engineering | 1 | 1.3% |
Security technology | 1 | 1.3% |
Self-incrimination | 1 | 1.3% |
Sentence (law) | 1 | 1.3% |
Simulation | 1 | 1.3% |
Single-nucleotide polymorphism | 1 | 1.3% |
Sixth Amendment to the United States Constitution | 1 | 1.3% |
Smart TV | 1 | 1.3% |
Smoking | 1 | 1.3% |
Social equality | 1 | 1.3% |
Social exclusion | 1 | 1.3% |
Social network analysis | 1 | 1.3% |
Social robot | 1 | 1.3% |
Sociological theories | 1 | 1.3% |
Sociology | 1 | 1.3% |
Software framework | 1 | 1.3% |
Sovereignty | 1 | 1.3% |
Spamming | 1 | 1.3% |
Specification (technical standard) | 1 | 1.3% |
Sport | 1 | 1.3% |
Standard deviation | 1 | 1.3% |
Standards organization | 1 | 1.3% |
Startup company | 1 | 1.3% |
State (polity) | 1 | 1.3% |
Statistics | 1 | 1.3% |
Stingray phone tracker | 1 | 1.3% |
Streaming media | 1 | 1.3% |
Stuxnet | 1 | 1.3% |
Sustainability | 1 | 1.3% |
Sustainable development | 1 | 1.3% |
Sylvia Lim | 1 | 1.3% |
Systems engineering | 1 | 1.3% |
Task switching (psychology) | 1 | 1.3% |
Telecommunication | 1 | 1.3% |
Telepresence | 1 | 1.3% |
Television | 1 | 1.3% |
Testimony | 1 | 1.3% |
The Circle (Eggers novel) | 1 | 1.3% |
Time | 1 | 1.3% |
Total Defence | 1 | 1.3% |
Total Information Awareness | 1 | 1.3% |
Touchpoint | 1 | 1.3% |
Town and Country Planning Act 1990 | 1 | 1.3% |
Trade-off | 1 | 1.3% |
Traffic | 1 | 1.3% |
Traffic collision | 1 | 1.3% |
Transparency report | 1 | 1.3% |
Tribunal | 1 | 1.3% |
Truth | 1 | 1.3% |
Unemployment | 1 | 1.3% |
United States Constitution | 1 | 1.3% |
Usability | 1 | 1.3% |
Value (economics) | 1 | 1.3% |
Value (ethics) | 1 | 1.3% |
Verification and validation | 1 | 1.3% |
Victimology | 1 | 1.3% |
Video content analysis | 1 | 1.3% |
Videotelephony | 1 | 1.3% |
Violent extremism | 1 | 1.3% |
Virtual private network | 1 | 1.3% |
Virtual reality | 1 | 1.3% |
Visa Waiver Program | 1 | 1.3% |
Vision | 1 | 1.3% |
Vladimir Putin | 1 | 1.3% |
Web 2.0 | 1 | 1.3% |
Web analytics | 1 | 1.3% |
Web service | 1 | 1.3% |
Webcam | 1 | 1.3% |
Weev | 1 | 1.3% |
Welfare | 1 | 1.3% |
Whistleblower | 1 | 1.3% |
Workforce | 1 | 1.3% |
World Wide Web | 1 | 1.3% |
abs | rel | |
---|---|---|
Human activities | 121 | 96.8% |
Government | 89 | 71.2% |
Politics | 88 | 70.4% |
Privacy | 87 | 69.6% |
Public sphere | 85 | 68.0% |
Law | 73 | 58.4% |
Social institutions | 66 | 52.8% |
Justice | 63 | 50.4% |
Technology | 57 | 45.6% |
Computer security | 51 | 40.8% |
Information privacy | 50 | 40.0% |
General Data Protection Regulation | 49 | 39.2% |
Computing | 44 | 35.2% |
Artificial intelligence | 43 | 34.4% |
Surveillance | 43 | 34.4% |
Internet | 42 | 33.6% |
Culture | 41 | 32.8% |
Social media | 40 | 32.0% |
National security | 37 | 29.6% |
Information technology | 35 | 28.0% |
Personally identifiable information | 35 | 28.0% |
Policy | 31 | 24.8% |
Information | 30 | 24.0% |
Risk | 30 | 24.0% |
Applied ethics | 29 | 23.2% |
Facial recognition system | 28 | 22.4% |
Crime | 26 | 20.8% |
Communication | 25 | 20.0% |
Biometrics | 24 | 19.2% |
Personal data | 24 | 19.2% |
Regulatory compliance | 24 | 19.2% |
Virtue | 23 | 18.4% |
Privacy law | 22 | 17.6% |
Research | 22 | 17.6% |
News | 21 | 16.8% |
Transparency (behavior) | 21 | 16.8% |
Human rights | 20 | 16.0% |
Public law | 19 | 15.2% |
Advertising | 18 | 14.4% |
Employment | 18 | 14.4% |
Mass media | 18 | 14.4% |
Social issues | 18 | 14.4% |
Automation | 17 | 13.6% |
Cyberattack | 17 | 13.6% |
Data | 17 | 13.6% |
Governance | 16 | 12.8% |
Machine learning | 16 | 12.8% |
Cyberwarfare | 15 | 12.0% |
Data Protection Directive | 15 | 12.0% |
Ethics | 15 | 12.0% |
Fake news | 15 | 12.0% |
Identity document | 15 | 12.0% |
Issues in ethics | 15 | 12.0% |
Accountability | 14 | 11.2% |
Ethical principles | 14 | 11.2% |
Information Age | 14 | 11.2% |
Innovation | 14 | 11.2% |
Internet of things | 14 | 11.2% |
Rights | 14 | 11.2% |
Security | 14 | 11.2% |
Big data | 13 | 10.4% |
Closed-circuit television | 13 | 10.4% |
Bias | 12 | 9.6% |
Consent | 12 | 9.6% |
Decision-making | 12 | 9.6% |
Freedom of speech | 12 | 9.6% |
Fingerprint | 11 | 8.8% |
Information governance | 11 | 8.8% |
Analytics | 10 | 8.0% |
Cloud computing | 10 | 8.0% |
Contract | 10 | 8.0% |
Crime prevention | 10 | 8.0% |
Cyberspace | 10 | 8.0% |
Database | 10 | 8.0% |
Discrimination | 10 | 8.0% |
Information security | 10 | 8.0% |
Right to privacy | 10 | 8.0% |
System | 10 | 8.0% |
Autonomy | 9 | 7.2% |
Business | 9 | 7.2% |
Cognitive science | 9 | 7.2% |
Computer network | 9 | 7.2% |
Cybercrime | 9 | 7.2% |
Data analysis | 9 | 7.2% |
Democracy | 9 | 7.2% |
Disinformation | 9 | 7.2% |
Filter bubble | 9 | 7.2% |
Journalism | 9 | 7.2% |
Mass surveillance | 9 | 7.2% |
Mobile app | 9 | 7.2% |
Algorithm | 8 | 6.4% |
Arrest | 8 | 6.4% |
Data Protection Act 1998 | 8 | 6.4% |
Data retention | 8 | 6.4% |
Fourth Amendment to the United States Constitution | 8 | 6.4% |
Misinformation | 8 | 6.4% |
Privacy policy | 8 | 6.4% |
Right to be forgotten | 8 | 6.4% |
Data laws | 7 | 5.6% |
Information technology management | 7 | 5.6% |
Internet privacy | 7 | 5.6% |
Internet service provider | 7 | 5.6% |
Law enforcement | 7 | 5.6% |
Telecommunication | 7 | 5.6% |
U.S. state | 7 | 5.6% |
Algorithmic bias | 6 | 4.8% |
Authentication | 6 | 4.8% |
Automatic number-plate recognition | 6 | 4.8% |
Border control | 6 | 4.8% |
DNA profiling | 6 | 4.8% |
Encryption | 6 | 4.8% |
Government and personhood | 6 | 4.8% |
HTTP cookie | 6 | 4.8% |
Human | 6 | 4.8% |
Intelligence | 6 | 4.8% |
Metadata | 6 | 4.8% |
Privacy by design | 6 | 4.8% |
Robot | 6 | 4.8% |
Society | 6 | 4.8% |
Telephone tapping | 6 | 4.8% |
Vulnerability (computing) | 6 | 4.8% |
Audit | 5 | 4.0% |
Best practice | 5 | 4.0% |
Bill (law) | 5 | 4.0% |
Blockchain | 5 | 4.0% |
Branches of science | 5 | 4.0% |
Civil rights and liberties | 5 | 4.0% |
Common law | 5 | 4.0% |
Computer | 5 | 4.0% |
Consumer protection | 5 | 4.0% |
Criminal justice | 5 | 4.0% |
Criminal record | 5 | 4.0% |
Data breach | 5 | 4.0% |
Data management | 5 | 4.0% |
Discovery (law) | 5 | 4.0% |
Education | 5 | 4.0% |
European Convention on Human Rights | 5 | 4.0% |
European Union law | 5 | 4.0% |
Facebook–Cambridge Analytica data scandal | 5 | 4.0% |
Immigration | 5 | 4.0% |
Mark Zuckerberg | 5 | 4.0% |
Net neutrality | 5 | 4.0% |
News Feed | 5 | 4.0% |
Profiling (information science) | 5 | 4.0% |
Propaganda | 5 | 4.0% |
Racial profiling | 5 | 4.0% |
Search and seizure | 5 | 4.0% |
Search warrant | 5 | 4.0% |
Self-driving car | 5 | 4.0% |
Targeted advertising | 5 | 4.0% |
Terrorism | 5 | 4.0% |
Act of Parliament | 4 | 3.2% |
Behavior | 4 | 3.2% |
Brexit | 4 | 3.2% |
Cognition | 4 | 3.2% |
Concepts in metaphysics | 4 | 3.2% |
Counter-terrorism | 4 | 3.2% |
Criminal law | 4 | 3.2% |
DNA database | 4 | 3.2% |
Data portability | 4 | 3.2% |
De-identification | 4 | 3.2% |
Department of Motor Vehicles | 4 | 3.2% |
Deterrence theory | 4 | 3.2% |
Donald Trump | 4 | 3.2% |
E-commerce | 4 | 3.2% |
Edward Snowden | 4 | 3.2% |
Fact-checking | 4 | 3.2% |
Freedom of Information Act (United States) | 4 | 3.2% |
Gender | 4 | 3.2% |
Health | 4 | 3.2% |
Health Insurance Portability and Accountability Act | 4 | 3.2% |
Identity theft | 4 | 3.2% |
Information science | 4 | 3.2% |
Information sensitivity | 4 | 3.2% |
International Covenant on Civil and Political Rights | 4 | 3.2% |
Internet bot | 4 | 3.2% |
Jurisdiction | 4 | 3.2% |
Lawyer | 4 | 3.2% |
Learning | 4 | 3.2% |
Malware | 4 | 3.2% |
Member state of the European Union | 4 | 3.2% |
Money laundering | 4 | 3.2% |
Non-governmental organization | 4 | 3.2% |
Privacy Commissioner (New Zealand) | 4 | 3.2% |
Propaganda in the Russian Federation | 4 | 3.2% |
Public opinion | 4 | 3.2% |
Reason | 4 | 3.2% |
Right to privacy in New Zealand | 4 | 3.2% |
Rule of law | 4 | 3.2% |
Schengen Area | 4 | 3.2% |
Value (ethics) | 4 | 3.2% |
Aadhaar | 3 | 2.4% |
Act of Parliament (UK) | 3 | 2.4% |
Airport security | 3 | 2.4% |
Augmented reality | 3 | 2.4% |
Car | 3 | 2.4% |
Carpenter v. United States | 3 | 2.4% |
Charter of Fundamental Rights of the European Union | 3 | 2.4% |
Committee of Ministers of the Council of Europe | 3 | 2.4% |
Computer science | 3 | 2.4% |
Consumer privacy | 3 | 2.4% |
Copyright infringement | 3 | 2.4% |
Cryptography | 3 | 2.4% |
Damages | 3 | 2.4% |
Deep learning | 3 | 2.4% |
Deepfake | 3 | 2.4% |
Design | 3 | 2.4% |
Digitization | 3 | 2.4% |
Directive (European Union) | 3 | 2.4% |
Disability | 3 | 2.4% |
Echo chamber (media) | 3 | 2.4% |
Economic inequality | 3 | 2.4% |
Election | 3 | 2.4% |
Electronic Communications Privacy Act | 3 | 2.4% |
Emergency management | 3 | 2.4% |
Expert | 3 | 2.4% |
Foreign Intelligence Surveillance Act | 3 | 2.4% |
Forensic science | 3 | 2.4% |
Freedom of information laws by country | 3 | 2.4% |
Full body scanner | 3 | 2.4% |
Hate speech | 3 | 2.4% |
Illegal immigration | 3 | 2.4% |
International law | 3 | 2.4% |
Internet troll | 3 | 2.4% |
Interoperability | 3 | 2.4% |
Investigatory Powers Act 2016 | 3 | 2.4% |
Judge | 3 | 2.4% |
Law and economics | 3 | 2.4% |
Legal remedy | 3 | 2.4% |
Monopoly | 3 | 2.4% |
Netzwerkdurchsetzungsgesetz | 3 | 2.4% |
Organization | 3 | 2.4% |
Pizzagate conspiracy theory | 3 | 2.4% |
Police National Computer | 3 | 2.4% |
Police and Criminal Evidence Act 1984 | 3 | 2.4% |
Political campaign | 3 | 2.4% |
Political science | 3 | 2.4% |
Political warfare | 3 | 2.4% |
Prediction | 3 | 2.4% |
Privacy and Electronic Communications Directive 2002 | 3 | 2.4% |
Probable cause | 3 | 2.4% |
Prosecutor | 3 | 2.4% |
Race (human categorization) | 3 | 2.4% |
Reliability engineering | 3 | 2.4% |
Right to explanation | 3 | 2.4% |
Risk management | 3 | 2.4% |
Robotics | 3 | 2.4% |
Russian interference in the 2016 United States elections | 3 | 2.4% |
Sanctuary city | 3 | 2.4% |
Science | 3 | 2.4% |
Smartphone | 3 | 2.4% |
Social networking service | 3 | 2.4% |
Standardization | 3 | 2.4% |
Technological convergence | 3 | 2.4% |
United Kingdom National DNA Database | 3 | 2.4% |
Visa policy of the Schengen Area | 3 | 2.4% |
Vladimir Putin | 3 | 2.4% |
Voting | 3 | 2.4% |
WannaCry ransomware attack | 3 | 2.4% |
Web search engine | 3 | 2.4% |
World Wide Web | 3 | 2.4% |
2016 Democratic National Committee email leak | 2 | 1.6% |
API | 2 | 1.6% |
Access to information | 2 | 1.6% |
Anonymity | 2 | 1.6% |
Area of freedom, security and justice | 2 | 1.6% |
Artificial neural network | 2 | 1.6% |
Autonomous car | 2 | 1.6% |
Bank | 2 | 1.6% |
Border search exception | 2 | 1.6% |
Campaign advertising | 2 | 1.6% |
Causality | 2 | 1.6% |
Citizenship | 2 | 1.6% |
Civil and political rights | 2 | 1.6% |
Civil liberties | 2 | 1.6% |
Communications Assistance for Law Enforcement Act | 2 | 1.6% |
Competition | 2 | 1.6% |
Competition (companies) | 2 | 1.6% |
Competition law | 2 | 1.6% |
Computer data | 2 | 1.6% |
Computer vision | 2 | 1.6% |
Confidentiality | 2 | 1.6% |
Conspiracy theory | 2 | 1.6% |
Constitution | 2 | 1.6% |
Constitution of the United States | 2 | 1.6% |
Content-control software | 2 | 1.6% |
Countering America's Adversaries Through Sanctions Act | 2 | 1.6% |
Creative Commons license | 2 | 1.6% |
Criminal procedure in South Africa | 2 | 1.6% |
Critical infrastructure protection | 2 | 1.6% |
Cyber-security regulation | 2 | 1.6% |
DNA | 2 | 1.6% |
Data quality | 2 | 1.6% |
Data security | 2 | 1.6% |
Digital rights | 2 | 1.6% |
Director of National Intelligence | 2 | 1.6% |
Electronic Commerce Directive 2000 | 2 | 1.6% |
Equal opportunity | 2 | 1.6% |
Espionage | 2 | 1.6% |
Ethics of artificial intelligence | 2 | 1.6% |
Executive Order 13769 | 2 | 1.6% |
Expectation of privacy | 2 | 1.6% |
Fake news website | 2 | 1.6% |
Federal Information Security Management Act of 2002 | 2 | 1.6% |
Freedom of information | 2 | 1.6% |
Global surveillance disclosures (2013–present) | 2 | 1.6% |
Hand luggage | 2 | 1.6% |
Health care | 2 | 1.6% |
Home automation | 2 | 1.6% |
Human factors and ergonomics | 2 | 1.6% |
Illegal immigration to the United States | 2 | 1.6% |
Immigration and Nationality Act Section 287(g) | 2 | 1.6% |
Information retrieval | 2 | 1.6% |
Information system | 2 | 1.6% |
International human rights law | 2 | 1.6% |
Judgment (law) | 2 | 1.6% |
Law enforcement agency | 2 | 1.6% |
Law enforcement in the United Kingdom | 2 | 1.6% |
Leadership | 2 | 1.6% |
Legal person | 2 | 1.6% |
Liberty | 2 | 1.6% |
Literacy | 2 | 1.6% |
Media pluralism | 2 | 1.6% |
Mind | 2 | 1.6% |
Multistakeholder governance | 2 | 1.6% |
Net neutrality in the United States | 2 | 1.6% |
News aggregator | 2 | 1.6% |
Online advertising | 2 | 1.6% |
Online and offline | 2 | 1.6% |
Parallel construction | 2 | 1.6% |
Password | 2 | 1.6% |
Personal Information Protection and Electronic Documents Act | 2 | 1.6% |
Personalization | 2 | 1.6% |
Petya (malware) | 2 | 1.6% |
Phishing | 2 | 1.6% |
Plaintext | 2 | 1.6% |
Post-truth politics | 2 | 1.6% |
Precautionary principle | 2 | 1.6% |
Presidency of Donald Trump | 2 | 1.6% |
Priority Enforcement Program | 2 | 1.6% |
Prison | 2 | 1.6% |
Privacy Act of 1974 | 2 | 1.6% |
Privacy Impact Assessment | 2 | 1.6% |
Privacy laws of the United States | 2 | 1.6% |
Proportionality (law) | 2 | 1.6% |
Real ID Act | 2 | 1.6% |
Recommender system | 2 | 1.6% |
Regulation | 2 | 1.6% |
Requirement | 2 | 1.6% |
S and Marper v United Kingdom | 2 | 1.6% |
Safety | 2 | 1.6% |
Science and technology | 2 | 1.6% |
Search engine | 2 | 1.6% |
Search engine optimization | 2 | 1.6% |
Secure communication | 2 | 1.6% |
Smart city | 2 | 1.6% |
Social norm | 2 | 1.6% |
Software | 2 | 1.6% |
Spamming | 2 | 1.6% |
State (polity) | 2 | 1.6% |
Statistics | 2 | 1.6% |
Targeted surveillance | 2 | 1.6% |
Telecommunications | 2 | 1.6% |
Territories of the United States | 2 | 1.6% |
The Right to Privacy (article) | 2 | 1.6% |
Transparency report | 2 | 1.6% |
Travel visa | 2 | 1.6% |
Treaty | 2 | 1.6% |
Uncertainty | 2 | 1.6% |
United States Constitution | 2 | 1.6% |
Unmanned aerial vehicle | 2 | 1.6% |
Vehicular automation | 2 | 1.6% |
Verification and validation | 2 | 1.6% |
Violence | 2 | 1.6% |
Virtual private network | 2 | 1.6% |
Voice over IP | 2 | 1.6% |
Wealth | 2 | 1.6% |
XKeyscore | 2 | 1.6% |
Xi Jinping | 2 | 1.6% |
2016 United Kingdom European Union membership referendum | 1 | 0.8% |
2017–18 Qatar diplomatic crisis | 1 | 0.8% |
4chan | 1 | 0.8% |
5G | 1 | 0.8% |
Abmahnung | 1 | 0.8% |
Abuse | 1 | 0.8% |
Access control | 1 | 0.8% |
Access to Information Act | 1 | 0.8% |
Accuracy and precision | 1 | 0.8% |
Addiction | 1 | 0.8% |
Adoption | 1 | 0.8% |
Advanced persistent threat | 1 | 0.8% |
African Americans | 1 | 0.8% |
Agenda-setting theory | 1 | 0.8% |
Air traffic control | 1 | 0.8% |
Alex Jones | 1 | 0.8% |
Alexander Nix | 1 | 0.8% |
Alliance for Securing Democracy | 1 | 0.8% |
Alt-right | 1 | 0.8% |
Ambulance | 1 | 0.8% |
Amicus curiae | 1 | 0.8% |
Application software | 1 | 0.8% |
Areas of computer science | 1 | 0.8% |
Arron Banks | 1 | 0.8% |
Article 8 of the European Convention on Human Rights | 1 | 0.8% |
Artificial general intelligence | 1 | 0.8% |
Assault | 1 | 0.8% |
Assumption | 1 | 0.8% |
Asylum seeker | 1 | 0.8% |
Authenticator | 1 | 0.8% |
Autocorrelation | 1 | 0.8% |
Automated Targeting System | 1 | 0.8% |
Automatic identification and data capture | 1 | 0.8% |
Avatar (computing) | 1 | 0.8% |
Aviation | 1 | 0.8% |
Bail | 1 | 0.8% |
Bank Secrecy Act | 1 | 0.8% |
Barack Obama | 1 | 0.8% |
Barack Obama citizenship conspiracy theories | 1 | 0.8% |
Basic income | 1 | 0.8% |
Basuki Tjahaja Purnama | 1 | 0.8% |
Benjamin Zand | 1 | 0.8% |
Bicycle helmet | 1 | 0.8% |
Biometric passport | 1 | 0.8% |
Body worn video | 1 | 0.8% |
Brute-force attack | 1 | 0.8% |
Bundesdatenschutzgesetz | 1 | 0.8% |
Bürgerliches Gesetzbuch | 1 | 0.8% |
CLOUD Act | 1 | 0.8% |
COINTELPRO | 1 | 0.8% |
COMPAS (software) | 1 | 0.8% |
Cabinet (government) | 1 | 0.8% |
Cable television | 1 | 0.8% |
Canadian Charter of Rights and Freedoms | 1 | 0.8% |
Cancer | 1 | 0.8% |
Capacity building | 1 | 0.8% |
Cause of action | 1 | 0.8% |
Central Monitoring System | 1 | 0.8% |
Charitable organization | 1 | 0.8% |
Chess | 1 | 0.8% |
Child | 1 | 0.8% |
Child custody | 1 | 0.8% |
Children's rights | 1 | 0.8% |
Christopher Wylie | 1 | 0.8% |
Citizenship of the United States | 1 | 0.8% |
Civic engagement | 1 | 0.8% |
Civil society | 1 | 0.8% |
Class action | 1 | 0.8% |
Classification of ethnicity in the United Kingdom | 1 | 0.8% |
Classified information | 1 | 0.8% |
Clipper chip | 1 | 0.8% |
Cognitive ergonomics | 1 | 0.8% |
Cold calling | 1 | 0.8% |
Commerce Clause | 1 | 0.8% |
Common Foreign and Security Policy | 1 | 0.8% |
Common Security and Defence Policy | 1 | 0.8% |
Common carrier | 1 | 0.8% |
Communications Act of 1934 | 1 | 0.8% |
Community | 1 | 0.8% |
Comprehensive Economic and Trade Agreement | 1 | 0.8% |
Comprehensive and Progressive Agreement for Trans-Pacific Partnership | 1 | 0.8% |
Computer and network surveillance | 1 | 0.8% |
Computer forensics | 1 | 0.8% |
Consciousness | 1 | 0.8% |
Consent decree | 1 | 0.8% |
Constitutional amendment | 1 | 0.8% |
Constitutional law | 1 | 0.8% |
Consumer | 1 | 0.8% |
Contravention | 1 | 0.8% |
Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the Application of Biology and Medicine | 1 | 0.8% |
Convention on the Rights of the Child | 1 | 0.8% |
Convolutional neural network | 1 | 0.8% |
Copyright | 1 | 0.8% |
Corporate social responsibility | 1 | 0.8% |
Correlation and dependence | 1 | 0.8% |
Countering Foreign Propaganda and Disinformation Act | 1 | 0.8% |
Countermeasure (computer) | 1 | 0.8% |
Countries applying biometrics | 1 | 0.8% |
Credibility | 1 | 0.8% |
Crime scene | 1 | 0.8% |
Criminal law of Canada | 1 | 0.8% |
Cryptocurrency | 1 | 0.8% |
Cuckservative | 1 | 0.8% |
Cuius est solum, eius est usque ad coelum et ad inferos | 1 | 0.8% |
Cultural diversity | 1 | 0.8% |
Cyber insurance | 1 | 0.8% |
Cybernetics | 1 | 0.8% |
Dark web | 1 | 0.8% |
Darknet market | 1 | 0.8% |
Data Protection Act, 2012 | 1 | 0.8% |
Data Protection Officer | 1 | 0.8% |
Data Retention Directive | 1 | 0.8% |
Data at rest | 1 | 0.8% |
Data custodian | 1 | 0.8% |
Data re-identification | 1 | 0.8% |
Database Directive | 1 | 0.8% |
Death of Freddie Gray | 1 | 0.8% |
Decentralization | 1 | 0.8% |
Deep Blue (chess computer) | 1 | 0.8% |
Defamation | 1 | 0.8% |
Delphi method | 1 | 0.8% |
Democratic National Committee cyber attacks | 1 | 0.8% |
Deportation | 1 | 0.8% |
Digital Millennium Copyright Act | 1 | 0.8% |
Digital electronics | 1 | 0.8% |
Digital evidence | 1 | 0.8% |
Digital forensics | 1 | 0.8% |
Digital security | 1 | 0.8% |
Dignity | 1 | 0.8% |
Discharge (sentence) | 1 | 0.8% |
Doctor of Philosophy | 1 | 0.8% |
Doxing | 1 | 0.8% |
Dual-use technology | 1 | 0.8% |
Dublin Regulation | 1 | 0.8% |
Due diligence | 1 | 0.8% |
Durbin–Watson statistic | 1 | 0.8% |
E-democracy | 1 | 0.8% |
E-government | 1 | 0.8% |
Economic globalization | 1 | 0.8% |
Economics | 1 | 0.8% |
Economy | 1 | 0.8% |
Effect size | 1 | 0.8% |
Electronic evidence | 1 | 0.8% |
Electronic health record | 1 | 0.8% |
Email spam | 1 | 0.8% |
Emergence | 1 | 0.8% |
Emergency | 1 | 0.8% |
Emergency medical services | 1 | 0.8% |
Emotion | 1 | 0.8% |
Empowerment | 1 | 0.8% |
End-to-end encryption | 1 | 0.8% |
Entertainment | 1 | 0.8% |
Entrepreneurship | 1 | 0.8% |
Espionage techniques | 1 | 0.8% |
Evaluation | 1 | 0.8% |
Evidence | 1 | 0.8% |
Evidence (law) | 1 | 0.8% |
Executive Order 13768 | 1 | 0.8% |
Existential risk from artificial general intelligence | 1 | 0.8% |
Expert witness | 1 | 0.8% |
Export | 1 | 0.8% |
FTC fair information practice | 1 | 0.8% |
Fact checking | 1 | 0.8% |
Fair use | 1 | 0.8% |
False positives and false negatives | 1 | 0.8% |
Federal Information Technology Acquisition Reform Act | 1 | 0.8% |
Feminism | 1 | 0.8% |
Firefighter | 1 | 0.8% |
Five-year plans of China | 1 | 0.8% |
Fog computing | 1 | 0.8% |
Foreign Agents Registration Act | 1 | 0.8% |
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 | 1 | 0.8% |
Fourth Industrial Revolution | 1 | 0.8% |
Framing (social sciences) | 1 | 0.8% |
Fraud | 1 | 0.8% |
Freedom of Information Act 2000 | 1 | 0.8% |
Freedom of movement | 1 | 0.8% |
Freedom of the press | 1 | 0.8% |
Fundamental rights | 1 | 0.8% |
Fuzzing | 1 | 0.8% |
Gamergate controversy | 1 | 0.8% |
Glenn Greenwald | 1 | 0.8% |
Goal | 1 | 0.8% |
Google Spain v AEPD and Mario Costeja González | 1 | 0.8% |
Government agencies | 1 | 0.8% |
Government agency | 1 | 0.8% |
Gramm–Leach–Bliley Act | 1 | 0.8% |
Hacker | 1 | 0.8% |
Hashtag | 1 | 0.8% |
Health data | 1 | 0.8% |
Hernandez v. Mesa | 1 | 0.8% |
High Representative of the Union for Foreign Affairs and Security Policy | 1 | 0.8% |
Hillary Clinton | 1 | 0.8% |
Hispanic and Latino Americans | 1 | 0.8% |
Homomorphic encryption | 1 | 0.8% |
Human nature | 1 | 0.8% |
Human rights and encryption | 1 | 0.8% |
Human rights in China | 1 | 0.8% |
Hypothesis | 1 | 0.8% |
IPhone | 1 | 0.8% |
IT law | 1 | 0.8% |
Icon (computing) | 1 | 0.8% |
Identity (social science) | 1 | 0.8% |
Identity management | 1 | 0.8% |
Immigration officer | 1 | 0.8% |
Influence of mass media | 1 | 0.8% |
Influencer marketing | 1 | 0.8% |
Information and communications technology | 1 | 0.8% |
Information management | 1 | 0.8% |
Information privacy law | 1 | 0.8% |
Information society | 1 | 0.8% |
Informed consent | 1 | 0.8% |
Infrastructure | 1 | 0.8% |
Institution | 1 | 0.8% |
Insurance | 1 | 0.8% |
Intellectual property | 1 | 0.8% |
Intelligence analysis | 1 | 0.8% |
Intelligence assessment | 1 | 0.8% |
Intelligence cycle management | 1 | 0.8% |
International Safe Harbor Privacy Principles | 1 | 0.8% |
International development | 1 | 0.8% |
International sanctions during the Ukrainian crisis | 1 | 0.8% |
Internet censorship | 1 | 0.8% |
Internet governance | 1 | 0.8% |
Investor | 1 | 0.8% |
Iris recognition | 1 | 0.8% |
Iyad Rahwan | 1 | 0.8% |
J. Edgar Hoover | 1 | 0.8% |
Joy Buolamwini | 1 | 0.8% |
Judicial review | 1 | 0.8% |
Judiciary | 1 | 0.8% |
Jury | 1 | 0.8% |
Key (cryptography) | 1 | 0.8% |
Key size | 1 | 0.8% |
Kris Kobach | 1 | 0.8% |
Kriti Sharma | 1 | 0.8% |
Labour economics | 1 | 0.8% |
Laura Poitras | 1 | 0.8% |
Law of Canada | 1 | 0.8% |
Law of the United States | 1 | 0.8% |
Law review | 1 | 0.8% |
Lawful interception | 1 | 0.8% |
Lawsuit | 1 | 0.8% |
Legal guardian | 1 | 0.8% |
Legal liability | 1 | 0.8% |
Li-Fi | 1 | 0.8% |
Limited partnership | 1 | 0.8% |
Machine | 1 | 0.8% |
Machine ethics | 1 | 0.8% |
Magnitsky Act | 1 | 0.8% |
Mainstream media | 1 | 0.8% |
Management | 1 | 0.8% |
Manosphere | 1 | 0.8% |
Marc Rotenberg | 1 | 0.8% |
Master of Laws | 1 | 0.8% |
Max Weber | 1 | 0.8% |
Media (communication) | 1 | 0.8% |
Media analysis | 1 | 0.8% |
Media literacy | 1 | 0.8% |
Media manipulation | 1 | 0.8% |
Men's movement | 1 | 0.8% |
Men's rights movement | 1 | 0.8% |
Military police of the United Kingdom | 1 | 0.8% |
Missing person | 1 | 0.8% |
Mobile phone | 1 | 0.8% |
Mortgage law | 1 | 0.8% |
Mug shot | 1 | 0.8% |
Multi-stakeholder governance | 1 | 0.8% |
Murphy v. National Collegiate Athletic Association | 1 | 0.8% |
Narrative | 1 | 0.8% |
National Defense Authorization Act for Fiscal Year 2012 | 1 | 0.8% |
New Zealand Bill of Rights Act 1990 | 1 | 0.8% |
New media | 1 | 0.8% |
Newspaper | 1 | 0.8% |
Normative | 1 | 0.8% |
Nosedive (Black Mirror) | 1 | 0.8% |
Nudge (book) | 1 | 0.8% |
Omission (law) | 1 | 0.8% |
Omnibus Crime Control and Safe Streets Act of 1968 | 1 | 0.8% |
Online Copyright Infringement Liability Limitation Act | 1 | 0.8% |
Online shopping | 1 | 0.8% |
Open government | 1 | 0.8% |
Open-source model | 1 | 0.8% |
Opt-out | 1 | 0.8% |
Outlier | 1 | 0.8% |
Over-the-top media services | 1 | 0.8% |
P-value | 1 | 0.8% |
Parliamentary sovereignty | 1 | 0.8% |
Partnership | 1 | 0.8% |
Passport | 1 | 0.8% |
Passports of the European Union | 1 | 0.8% |
Pedestrian | 1 | 0.8% |
Pen register | 1 | 0.8% |
Persuasive technology | 1 | 0.8% |
Philosophy | 1 | 0.8% |
Pickup artist | 1 | 0.8% |
Police body camera | 1 | 0.8% |
Police officer | 1 | 0.8% |
Poverty | 1 | 0.8% |
Powers of the police in England and Wales | 1 | 0.8% |
Precedent | 1 | 0.8% |
Predictive analytics | 1 | 0.8% |
Predictive policing | 1 | 0.8% |
Preliminary injunction | 1 | 0.8% |
Printz v. United States | 1 | 0.8% |
Proactive cyber defence | 1 | 0.8% |
Problem solving | 1 | 0.8% |
Procurator fiscal | 1 | 0.8% |
Procurement | 1 | 0.8% |
Productivity | 1 | 0.8% |
Professional and Amateur Sports Protection Act of 1992 | 1 | 0.8% |
Protect America Act of 2007 | 1 | 0.8% |
Provinces and territories of Canada | 1 | 0.8% |
Proxy server | 1 | 0.8% |
Pseudonymization | 1 | 0.8% |
Psychological concepts | 1 | 0.8% |
Psychological manipulation | 1 | 0.8% |
Psychology | 1 | 0.8% |
Public policy | 1 | 0.8% |
Public-key cryptography | 1 | 0.8% |
Punishment | 1 | 0.8% |
Quasi-experiment | 1 | 0.8% |
Quebec Charter of Human Rights and Freedoms | 1 | 0.8% |
Question | 1 | 0.8% |
Race and ethnicity in the United States Census | 1 | 0.8% |
Rape | 1 | 0.8% |
Rationality | 1 | 0.8% |
Real-time computing | 1 | 0.8% |
Reasonable suspicion | 1 | 0.8% |
Recidivism | 1 | 0.8% |
Refugee | 1 | 0.8% |
Regression analysis | 1 | 0.8% |
Regulation of algorithms | 1 | 0.8% |
Reno v. Flores | 1 | 0.8% |
Reputation management | 1 | 0.8% |
Request for Comments | 1 | 0.8% |
Resilience (organizational) | 1 | 0.8% |
Right to disconnect | 1 | 0.8% |
Right to silence | 1 | 0.8% |
Rikers Island | 1 | 0.8% |
Riley v. California | 1 | 0.8% |
Risk assessment | 1 | 0.8% |
Rulemaking | 1 | 0.8% |
Rundfunkstaatsvertrag | 1 | 0.8% |
Sam Leith | 1 | 0.8% |
Sanitization (classified information) | 1 | 0.8% |
Schengen Information System | 1 | 0.8% |
Scottish statutory instrument | 1 | 0.8% |
Section summary of the Patriot Act, Title II | 1 | 0.8% |
Secure Flight | 1 | 0.8% |
Security certificate | 1 | 0.8% |
Security engineering | 1 | 0.8% |
Security technology | 1 | 0.8% |
Sedition | 1 | 0.8% |
Sedition Act (Singapore) | 1 | 0.8% |
Selective exposure theory | 1 | 0.8% |
Sensationalism | 1 | 0.8% |
September 11 attacks | 1 | 0.8% |
Sesame Credit | 1 | 0.8% |
Signals intelligence | 1 | 0.8% |
Smart manufacturing | 1 | 0.8% |
Social Security (United States) | 1 | 0.8% |
Social Security number | 1 | 0.8% |
Social exclusion | 1 | 0.8% |
Social science | 1 | 0.8% |
Sociological theories | 1 | 0.8% |
Sociotechnical system | 1 | 0.8% |
Sovereignty | 1 | 0.8% |
Sports betting | 1 | 0.8% |
Standards organization | 1 | 0.8% |
Statistical hypothesis testing | 1 | 0.8% |
Statistical significance | 1 | 0.8% |
Statute | 1 | 0.8% |
Statutory instrument (UK) | 1 | 0.8% |
Stereotype | 1 | 0.8% |
Steve Bannon | 1 | 0.8% |
Steven Brill (journalist) | 1 | 0.8% |
Stingray phone tracker | 1 | 0.8% |
Stored Communications Act | 1 | 0.8% |
Subscription business model | 1 | 0.8% |
Suicide attack | 1 | 0.8% |
Summary offence | 1 | 0.8% |
Survey methodology | 1 | 0.8% |
Sustainable Development Goals | 1 | 0.8% |
Systems science | 1 | 0.8% |
Tamim bin Hamad Al Thani | 1 | 0.8% |
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 | 1 | 0.8% |
Telegram (service) | 1 | 0.8% |
Tenth Amendment to the United States Constitution | 1 | 0.8% |
Terms of service | 1 | 0.8% |
Terrorism Act 2000 | 1 | 0.8% |
Testimony | 1 | 0.8% |
Thesis | 1 | 0.8% |
Third-party doctrine | 1 | 0.8% |
Thought | 1 | 0.8% |
Threat (computer) | 1 | 0.8% |
Three Laws of Robotics | 1 | 0.8% |
Time series | 1 | 0.8% |
Tor (anonymity network) | 1 | 0.8% |
Tort | 1 | 0.8% |
Trade | 1 | 0.8% |
Trade union | 1 | 0.8% |
Trans-Pacific Partnership | 1 | 0.8% |
Translation | 1 | 0.8% |
Transport Layer Security | 1 | 0.8% |
Treaty on European Union | 1 | 0.8% |
Tribunal | 1 | 0.8% |
Trolley problem | 1 | 0.8% |
Trust (emotion) | 1 | 0.8% |
UKUSA Agreement | 1 | 0.8% |
USA Freedom Act | 1 | 0.8% |
Unaccompanied minor | 1 | 0.8% |
Understanding | 1 | 0.8% |
Unemployment | 1 | 0.8% |
United Kingdom company law | 1 | 0.8% |
United Nations Guiding Principles on Business and Human Rights | 1 | 0.8% |
United States Code | 1 | 0.8% |
United States presidential election, 2016 | 1 | 0.8% |
United States v. Causby | 1 | 0.8% |
Universal Declaration of Human Rights | 1 | 0.8% |
University | 1 | 0.8% |
Unmanned combat aerial vehicle | 1 | 0.8% |
Usability | 1 | 0.8% |
User (computing) | 1 | 0.8% |
User interface | 1 | 0.8% |
Utilitarianism | 1 | 0.8% |
Uyghurs | 1 | 0.8% |
Video content analysis | 1 | 0.8% |
Viktor Yanukovych | 1 | 0.8% |
Viktor Yushchenko | 1 | 0.8% |
Visa Information System | 1 | 0.8% |
Voting behavior | 1 | 0.8% |
War | 1 | 0.8% |
Weapon | 1 | 0.8% |
Web 2.0 | 1 | 0.8% |
Web analytics | 1 | 0.8% |
Weev | 1 | 0.8% |
Witness | 1 | 0.8% |
Workforce | 1 | 0.8% |
World Internet Conference | 1 | 0.8% |
abs | rel | |
---|---|---|
Human activities | 249 | 96.1% |
Politics | 185 | 71.4% |
Government | 183 | 70.7% |
Public sphere | 171 | 66.0% |
Law | 152 | 58.7% |
Privacy | 149 | 57.5% |
Social institutions | 146 | 56.4% |
Justice | 128 | 49.4% |
Technology | 123 | 47.5% |
Artificial intelligence | 110 | 42.5% |
Policy | 97 | 37.5% |
Social media | 90 | 34.7% |
Culture | 86 | 33.2% |
Internet | 86 | 33.2% |
National security | 83 | 32.0% |
Information privacy | 78 | 30.1% |
Computer security | 76 | 29.3% |
General Data Protection Regulation | 76 | 29.3% |
Surveillance | 75 | 29.0% |
Applied ethics | 72 | 27.8% |
Communication | 66 | 25.5% |
Computing | 65 | 25.1% |
Facial recognition system | 60 | 23.2% |
Information | 59 | 22.8% |
Social issues | 58 | 22.4% |
Human rights | 56 | 21.6% |
Research | 53 | 20.5% |
Biometrics | 50 | 19.3% |
Personal data | 49 | 18.9% |
Rights | 49 | 18.9% |
Risk | 47 | 18.1% |
Information technology | 46 | 17.8% |
News | 46 | 17.8% |
Mass media | 44 | 17.0% |
Advertising | 42 | 16.2% |
Fake news | 42 | 16.2% |
Transparency (behavior) | 41 | 15.8% |
Democracy | 40 | 15.4% |
Disinformation | 39 | 15.1% |
Personally identifiable information | 39 | 15.1% |
Privacy law | 39 | 15.1% |
Crime | 37 | 14.3% |
Freedom of speech | 37 | 14.3% |
Accountability | 36 | 13.9% |
Cyberwarfare | 35 | 13.5% |
Issues in ethics | 34 | 13.1% |
Virtue | 34 | 13.1% |
Regulatory compliance | 33 | 12.7% |
Ethics | 29 | 11.2% |
Public law | 29 | 11.2% |
Ethical principles | 28 | 10.8% |
Information Age | 28 | 10.8% |
Intelligence | 27 | 10.4% |
Journalism | 26 | 10.0% |
Cyberspace | 25 | 9.7% |
Governance | 25 | 9.7% |
Computer network | 24 | 9.3% |
Government and personhood | 24 | 9.3% |
Information security | 24 | 9.3% |
Automation | 23 | 8.9% |
Cyberattack | 23 | 8.9% |
Innovation | 23 | 8.9% |
Identity document | 22 | 8.5% |
Security | 22 | 8.5% |
Data | 21 | 8.1% |
Election | 21 | 8.1% |
Internet of things | 21 | 8.1% |
Machine learning | 21 | 8.1% |
Bias | 20 | 7.7% |
Data laws | 20 | 7.7% |
Deepfake | 20 | 7.7% |
Discrimination | 20 | 7.7% |
Misinformation | 20 | 7.7% |
Business | 19 | 7.3% |
Closed-circuit television | 19 | 7.3% |
Decision-making | 19 | 7.3% |
Society | 19 | 7.3% |
Big data | 17 | 6.6% |
Data Protection Directive | 17 | 6.6% |
Crime prevention | 16 | 6.2% |
Political science | 16 | 6.2% |
Civil rights and liberties | 15 | 5.8% |
Contract | 15 | 5.8% |
Cybercrime | 15 | 5.8% |
Employment | 15 | 5.8% |
Information governance | 15 | 5.8% |
Algorithmic bias | 14 | 5.4% |
Consent | 14 | 5.4% |
European Convention on Human Rights | 14 | 5.4% |
Fact-checking | 14 | 5.4% |
Fourth Amendment to the United States Constitution | 14 | 5.4% |
Freedom of the press | 14 | 5.4% |
Identity theft | 14 | 5.4% |
Information sensitivity | 14 | 5.4% |
Law enforcement | 14 | 5.4% |
Propaganda | 14 | 5.4% |
Self-driving car | 14 | 5.4% |
Authentication | 13 | 5.0% |
Cognitive science | 13 | 5.0% |
Common law | 13 | 5.0% |
Consumer protection | 13 | 5.0% |
Data security | 13 | 5.0% |
Database | 13 | 5.0% |
Filter bubble | 13 | 5.0% |
Member state of the European Union | 13 | 5.0% |
System | 13 | 5.0% |
Vulnerability (computing) | 13 | 5.0% |
Autonomy | 12 | 4.6% |
Behavior | 12 | 4.6% |
Criminal justice | 12 | 4.6% |
Digital media | 12 | 4.6% |
Internet bot | 12 | 4.6% |
Internet privacy | 12 | 4.6% |
Internet troll | 12 | 4.6% |
Russian interference in the 2016 United States elections | 12 | 4.6% |
Border control | 11 | 4.2% |
Evaluation | 11 | 4.2% |
Law and economics | 11 | 4.2% |
Mass surveillance | 11 | 4.2% |
Public opinion | 11 | 4.2% |
Right to privacy | 11 | 4.2% |
Algorithm | 10 | 3.9% |
Anonymity | 10 | 3.9% |
Assumption | 10 | 3.9% |
Cloud computing | 10 | 3.9% |
Cognition | 10 | 3.9% |
Computer | 10 | 3.9% |
Criminal law | 10 | 3.9% |
Encryption | 10 | 3.9% |
First Amendment to the United States Constitution | 10 | 3.9% |
Political campaign | 10 | 3.9% |
Privacy policy | 10 | 3.9% |
Psychological concepts | 10 | 3.9% |
Right to be forgotten | 10 | 3.9% |
Science | 10 | 3.9% |
Targeted advertising | 10 | 3.9% |
U.S. state | 10 | 3.9% |
Violence | 10 | 3.9% |
Audit | 9 | 3.5% |
Data analysis | 9 | 3.5% |
Fingerprint | 9 | 3.5% |
Hate speech | 9 | 3.5% |
Law enforcement techniques | 9 | 3.5% |
Organization | 9 | 3.5% |
Privacy by design | 9 | 3.5% |
Regulation | 9 | 3.5% |
Children's Online Privacy Protection Act | 8 | 3.1% |
Competition | 8 | 3.1% |
Data management | 8 | 3.1% |
Data retention | 8 | 3.1% |
Discovery (law) | 8 | 3.1% |
European Union law | 8 | 3.1% |
FTC fair information practice | 8 | 3.1% |
Market (economics) | 8 | 3.1% |
Online advertising | 8 | 3.1% |
Robot | 8 | 3.1% |
Sustainability | 8 | 3.1% |
Treaty | 8 | 3.1% |
Voting | 8 | 3.1% |
Accuracy and precision | 7 | 2.7% |
Censorship | 7 | 2.7% |
De-identification | 7 | 2.7% |
Deep learning | 7 | 2.7% |
Digital rights | 7 | 2.7% |
Economics | 7 | 2.7% |
Face | 7 | 2.7% |
Fake news website | 7 | 2.7% |
Freedom of Information Act (United States) | 7 | 2.7% |
Immigration | 7 | 2.7% |
Information warfare | 7 | 2.7% |
Learning | 7 | 2.7% |
Malware | 7 | 2.7% |
Media manipulation | 7 | 2.7% |
Probable cause | 7 | 2.7% |
Property | 7 | 2.7% |
Safety of journalists | 7 | 2.7% |
Access to information | 6 | 2.3% |
Branches of science | 6 | 2.3% |
Charter of Fundamental Rights of the European Union | 6 | 2.3% |
Copyright | 6 | 2.3% |
Data breach | 6 | 2.3% |
Donald Trump | 6 | 2.3% |
Education | 6 | 2.3% |
Fourteenth Amendment to the United States Constitution | 6 | 2.3% |
Health | 6 | 2.3% |
Health Insurance Portability and Accountability Act | 6 | 2.3% |
Health care | 6 | 2.3% |
Human | 6 | 2.3% |
Information technology management | 6 | 2.3% |
International Covenant on Civil and Political Rights | 6 | 2.3% |
Jessikka Aro | 6 | 2.3% |
Liberal democracy | 6 | 2.3% |
Liberty | 6 | 2.3% |
Non-governmental organization | 6 | 2.3% |
Profiling (information science) | 6 | 2.3% |
Prosecutor | 6 | 2.3% |
Race (human categorization) | 6 | 2.3% |
Racial profiling | 6 | 2.3% |
Risk management | 6 | 2.3% |
Rule of law | 6 | 2.3% |
Safety | 6 | 2.3% |
Schengen Area | 6 | 2.3% |
Search warrant | 6 | 2.3% |
Security engineering | 6 | 2.3% |
State (polity) | 6 | 2.3% |
Strategic communication | 6 | 2.3% |
Sustainable Development Goals | 6 | 2.3% |
Vladimir Putin | 6 | 2.3% |
War | 6 | 2.3% |
5G | 5 | 1.9% |
Amazon Rekognition | 5 | 1.9% |
Arrest | 5 | 1.9% |
Authoritarianism | 5 | 1.9% |
Automatic number-plate recognition | 5 | 1.9% |
Blockchain | 5 | 1.9% |
Business ethics | 5 | 1.9% |
Camera | 5 | 1.9% |
Campaign advertising | 5 | 1.9% |
Carpenter v. United States | 5 | 1.9% |
Citizenship | 5 | 1.9% |
Cognitive ergonomics | 5 | 1.9% |
Competition law | 5 | 1.9% |
Computer science | 5 | 1.9% |
Cyber-security regulation | 5 | 1.9% |
Data portability | 5 | 1.9% |
Defamation | 5 | 1.9% |
E-commerce | 5 | 1.9% |
EU–US Privacy Shield | 5 | 1.9% |
Emmanuel Macron | 5 | 1.9% |
Emotion | 5 | 1.9% |
Espionage | 5 | 1.9% |
Europe | 5 | 1.9% |
Expert | 5 | 1.9% |
Federal preemption | 5 | 1.9% |
Forensic science | 5 | 1.9% |
Fraud | 5 | 1.9% |
Fundamental rights | 5 | 1.9% |
Gramm–Leach–Bliley Act | 5 | 1.9% |
HTTP cookie | 5 | 1.9% |
Human factors and ergonomics | 5 | 1.9% |
Institution | 5 | 1.9% |
Jurisdiction | 5 | 1.9% |
Lawsuit | 5 | 1.9% |
Leadership | 5 | 1.9% |
Literacy | 5 | 1.9% |
Net neutrality | 5 | 1.9% |
New media | 5 | 1.9% |
Personalization | 5 | 1.9% |
Philosophy | 5 | 1.9% |
Police body camera | 5 | 1.9% |
Prediction | 5 | 1.9% |
Privacy Act of 1974 | 5 | 1.9% |
Privacy and Electronic Communications Directive 2002 | 5 | 1.9% |
Privacy-enhancing technologies | 5 | 1.9% |
Section 230 of the Communications Decency Act | 5 | 1.9% |
Smart city | 5 | 1.9% |
Terrorism | 5 | 1.9% |
Understanding | 5 | 1.9% |
Unmanned aerial vehicle | 5 | 1.9% |
WHOIS | 5 | 1.9% |
2016 United Kingdom European Union membership referendum | 4 | 1.5% |
Access control | 4 | 1.5% |
Analytics | 4 | 1.5% |
Annexation of Crimea by the Russian Federation | 4 | 1.5% |
Attitude (psychology) | 4 | 1.5% |
Bill (law) | 4 | 1.5% |
Civil liberties | 4 | 1.5% |
Computer law | 4 | 1.5% |
Constitution of the United States | 4 | 1.5% |
Consumer privacy | 4 | 1.5% |
Counter-terrorism | 4 | 1.5% |
DNA profiling | 4 | 1.5% |
Data Protection Act 1998 | 4 | 1.5% |
Design | 4 | 1.5% |
Deterrence theory | 4 | 1.5% |
Dignity | 4 | 1.5% |
Directive (European Union) | 4 | 1.5% |
Electronic voting | 4 | 1.5% |
Empowerment | 4 | 1.5% |
Entertainment | 4 | 1.5% |
Facebook–Cambridge Analytica data scandal | 4 | 1.5% |
Foreign Intelligence Surveillance Act | 4 | 1.5% |
Fundamental rights in India | 4 | 1.5% |
Gender | 4 | 1.5% |
Information privacy law | 4 | 1.5% |
Insurance | 4 | 1.5% |
International Safe Harbor Privacy Principles | 4 | 1.5% |
Internet service provider | 4 | 1.5% |
Journalism ethics and standards | 4 | 1.5% |
Lawyer | 4 | 1.5% |
Money laundering | 4 | 1.5% |
Narrative | 4 | 1.5% |
Netzwerkdurchsetzungsgesetz | 4 | 1.5% |
Personal Information Protection and Electronic Documents Act | 4 | 1.5% |
Phishing | 4 | 1.5% |
Populism | 4 | 1.5% |
Propaganda in the Russian Federation | 4 | 1.5% |
Pseudonymization | 4 | 1.5% |
Racism | 4 | 1.5% |
Reason | 4 | 1.5% |
S and Marper v United Kingdom | 4 | 1.5% |
Stereotype | 4 | 1.5% |
Training, validation, and test sets | 4 | 1.5% |
Travel visa | 4 | 1.5% |
Type I and type II errors | 4 | 1.5% |
United Nations Guiding Principles on Business and Human Rights | 4 | 1.5% |
World Wide Web | 4 | 1.5% |
2016 Democratic National Committee email leak | 3 | 1.2% |
Aid | 3 | 1.2% |
Airport security | 3 | 1.2% |
Artificial neural network | 3 | 1.2% |
Bank | 3 | 1.2% |
Body worn video | 3 | 1.2% |
Bosnian War | 3 | 1.2% |
Chatbot | 3 | 1.2% |
Civil society | 3 | 1.2% |
Classification of ethnicity in the United Kingdom | 3 | 1.2% |
Classified information | 3 | 1.2% |
Combined DNA Index System | 3 | 1.2% |
Commerce Clause | 3 | 1.2% |
Communications Decency Act | 3 | 1.2% |
Complaint | 3 | 1.2% |
Computer data | 3 | 1.2% |
Concepts in metaphysics | 3 | 1.2% |
Conversation | 3 | 1.2% |
Credential | 3 | 1.2% |
Criminal record | 3 | 1.2% |
Cryptography | 3 | 1.2% |
DNA database | 3 | 1.2% |
Debate | 3 | 1.2% |
Department of motor vehicles | 3 | 1.2% |
Digital image | 3 | 1.2% |
Economic development | 3 | 1.2% |
Email spam | 3 | 1.2% |
Emergence | 3 | 1.2% |
Emergency management | 3 | 1.2% |
Engineering | 3 | 1.2% |
Expectation of privacy | 3 | 1.2% |
Experiment | 3 | 1.2% |
Fair Credit Reporting Act | 3 | 1.2% |
Focus group | 3 | 1.2% |
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 | 3 | 1.2% |
Forensic identification | 3 | 1.2% |
Freedom of information laws by country | 3 | 1.2% |
Health data | 3 | 1.2% |
Home automation | 3 | 1.2% |
Human rights defender | 3 | 1.2% |
Information and communications technology | 3 | 1.2% |
Information management | 3 | 1.2% |
Information retrieval | 3 | 1.2% |
Informed consent | 3 | 1.2% |
Institutions of the European Union | 3 | 1.2% |
International sanctions during the Ukrainian crisis | 3 | 1.2% |
Internet forum | 3 | 1.2% |
Iris recognition | 3 | 1.2% |
Judge | 3 | 1.2% |
Knowledge | 3 | 1.2% |
Legal person | 3 | 1.2% |
Malaysia Airlines Flight 17 | 3 | 1.2% |
Management | 3 | 1.2% |
Marc Rotenberg | 3 | 1.2% |
Max Schrems | 3 | 1.2% |
Media (communication) | 3 | 1.2% |
Morality | 3 | 1.2% |
Nationalism | 3 | 1.2% |
Notice and take down | 3 | 1.2% |
Opt-out | 3 | 1.2% |
Ownership | 3 | 1.2% |
Passenger name record | 3 | 1.2% |
Passport | 3 | 1.2% |
Powers of the police in England and Wales | 3 | 1.2% |
Privacy Impact Assessment | 3 | 1.2% |
Psychology | 3 | 1.2% |
Public engagement | 3 | 1.2% |
Public safety | 3 | 1.2% |
Publishing | 3 | 1.2% |
Ransomware | 3 | 1.2% |
Refugee | 3 | 1.2% |
Right to education | 3 | 1.2% |
Right to privacy in New Zealand | 3 | 1.2% |
Rumor | 3 | 1.2% |
Search and seizure | 3 | 1.2% |
Secure Flight | 3 | 1.2% |
Secure communication | 3 | 1.2% |
Security technology | 3 | 1.2% |
Situation awareness | 3 | 1.2% |
Sociological theories | 3 | 1.2% |
Software | 3 | 1.2% |
Telecommunication | 3 | 1.2% |
Telephone tapping | 3 | 1.2% |
Treaties of the European Union | 3 | 1.2% |
Treaty of Rome | 3 | 1.2% |
Unfunded mandate | 3 | 1.2% |
Universal Declaration of Human Rights | 3 | 1.2% |
Video | 3 | 1.2% |
Wi-Fi | 3 | 1.2% |
Xenophobia | 3 | 1.2% |
Yellow vests movement | 3 | 1.2% |
2016 United States presidential election | 2 | 0.8% |
4G | 2 | 0.8% |
Abuse | 2 | 0.8% |
Adoption | 2 | 0.8% |
Airport | 2 | 0.8% |
Ann Cavoukian | 2 | 0.8% |
Areas of computer science | 2 | 0.8% |
Arrest warrant | 2 | 0.8% |
Article 8 of the European Convention on Human Rights | 2 | 0.8% |
Artificial general intelligence | 2 | 0.8% |
Attention | 2 | 0.8% |
Best practice | 2 | 0.8% |
Board of directors | 2 | 0.8% |
Boarding pass | 2 | 0.8% |
Body worn video (police equipment) | 2 | 0.8% |
Brexit | 2 | 0.8% |
Business model | 2 | 0.8% |
California Consumer Privacy Act | 2 | 0.8% |
Causality | 2 | 0.8% |
Charitable organization | 2 | 0.8% |
Chemical weapon | 2 | 0.8% |
Clint Watts | 2 | 0.8% |
Cold War | 2 | 0.8% |
Committee of Ministers of the Council of Europe | 2 | 0.8% |
Communication protocol | 2 | 0.8% |
Complexity | 2 | 0.8% |
Computer networks | 2 | 0.8% |
Computer vision | 2 | 0.8% |
Confidentiality | 2 | 0.8% |
Constitution | 2 | 0.8% |
Convolutional neural network | 2 | 0.8% |
Court | 2 | 0.8% |
Credit | 2 | 0.8% |
Credit bureau | 2 | 0.8% |
Credit score | 2 | 0.8% |
DNA sequencing | 2 | 0.8% |
Darrell M. West | 2 | 0.8% |
Data re-identification | 2 | 0.8% |
Data sharing | 2 | 0.8% |
DataWorks Plus | 2 | 0.8% |
Digital forensics | 2 | 0.8% |
Digital identity | 2 | 0.8% |
Digital transformation | 2 | 0.8% |
Diplomacy | 2 | 0.8% |
Domain name | 2 | 0.8% |
Dual-use technology | 2 | 0.8% |
Echo chamber (media) | 2 | 0.8% |
Economy | 2 | 0.8% |
Electronic health record | 2 | 0.8% |
End user | 2 | 0.8% |
Ethics of artificial intelligence | 2 | 0.8% |
Executive Order 13769 | 2 | 0.8% |
Family Educational Rights and Privacy Act | 2 | 0.8% |
Federalism | 2 | 0.8% |
Foreign direct investment | 2 | 0.8% |
Free will | 2 | 0.8% |
Freedom of information | 2 | 0.8% |
Freedom of thought | 2 | 0.8% |
Future enlargement of the European Union | 2 | 0.8% |
Gambling | 2 | 0.8% |
Ghouta chemical attack | 2 | 0.8% |
Goal | 2 | 0.8% |
Great Firewall | 2 | 0.8% |
Guccifer 2.0 | 2 | 0.8% |
Hacker | 2 | 0.8% |
Hashtag | 2 | 0.8% |
High Representative of the Union for Foreign Affairs and Security Policy | 2 | 0.8% |
Hillary Clinton | 2 | 0.8% |
IPhone | 2 | 0.8% |
Imagine (John Lennon album) | 2 | 0.8% |
Influencer marketing | 2 | 0.8% |
Information Sharing Environment | 2 | 0.8% |
Information broker | 2 | 0.8% |
Information science | 2 | 0.8% |
Infrastructure | 2 | 0.8% |
Intelligent transportation system | 2 | 0.8% |
Interest | 2 | 0.8% |
Internally displaced person | 2 | 0.8% |
International law | 2 | 0.8% |
International relations | 2 | 0.8% |
International sanctions during the Russo-Ukrainian War | 2 | 0.8% |
Investigatory Powers Act 2016 | 2 | 0.8% |
Jamal Khashoggi | 2 | 0.8% |
Jan Philipp Albrecht | 2 | 0.8% |
John Lennon | 2 | 0.8% |
Journalist | 2 | 0.8% |
Judiciary | 2 | 0.8% |
Landlord | 2 | 0.8% |
Leasehold estate | 2 | 0.8% |
Legal action | 2 | 0.8% |
Legislative branch of the United States government | 2 | 0.8% |
Liberalism | 2 | 0.8% |
Lock and key | 2 | 0.8% |
London Underground | 2 | 0.8% |
Louis Brandeis | 2 | 0.8% |
Media development | 2 | 0.8% |
Media literacy | 2 | 0.8% |
Media pluralism | 2 | 0.8% |
Microsatellite | 2 | 0.8% |
Military strategy | 2 | 0.8% |
Minority group | 2 | 0.8% |
Mobile app | 2 | 0.8% |
Mobile phone | 2 | 0.8% |
Multi-factor authentication | 2 | 0.8% |
Multistakeholder governance model | 2 | 0.8% |
Narendra Modi | 2 | 0.8% |
Native advertising | 2 | 0.8% |
News agency | 2 | 0.8% |
Newspaper | 2 | 0.8% |
Office 365 | 2 | 0.8% |
Ombudsman | 2 | 0.8% |
Once-only principle | 2 | 0.8% |
Online and offline | 2 | 0.8% |
Open science | 2 | 0.8% |
Opinion poll | 2 | 0.8% |
Organizational culture | 2 | 0.8% |
PRISM (surveillance program) | 2 | 0.8% |
Parliamentary system | 2 | 0.8% |
Password | 2 | 0.8% |
Patch (computing) | 2 | 0.8% |
Pattern recognition | 2 | 0.8% |
Perception | 2 | 0.8% |
Petya (malware) | 2 | 0.8% |
Photo manipulation | 2 | 0.8% |
Polarization (politics) | 2 | 0.8% |
Police car | 2 | 0.8% |
Police officer | 2 | 0.8% |
Post-truth politics | 2 | 0.8% |
Price | 2 | 0.8% |
Price discrimination | 2 | 0.8% |
Psychological resilience | 2 | 0.8% |
Public-key cryptography | 2 | 0.8% |
Qualitative research | 2 | 0.8% |
Radicalization | 2 | 0.8% |
Rape | 2 | 0.8% |
Recommender system | 2 | 0.8% |
Regulatory risk differentiation | 2 | 0.8% |
Retail | 2 | 0.8% |
Rulemaking | 2 | 0.8% |
Russia under Vladimir Putin | 2 | 0.8% |
Russian web brigades | 2 | 0.8% |
Sabre (computer system) | 2 | 0.8% |
Samuel Alito | 2 | 0.8% |
Sanctuary city | 2 | 0.8% |
Self-censorship | 2 | 0.8% |
Social networking service | 2 | 0.8% |
Sociotechnical system | 2 | 0.8% |
Software-defined networking | 2 | 0.8% |
Source protection | 2 | 0.8% |
Sovereign state | 2 | 0.8% |
Spamming | 2 | 0.8% |
Standardization | 2 | 0.8% |
Standing (law) | 2 | 0.8% |
Startup company | 2 | 0.8% |
State secrets privilege | 2 | 0.8% |
Superintelligence | 2 | 0.8% |
Technological convergence | 2 | 0.8% |
Terrorist Finance Tracking Program | 2 | 0.8% |
Third country resettlement | 2 | 0.8% |
Torture | 2 | 0.8% |
Traffic | 2 | 0.8% |
Traffic stop | 2 | 0.8% |
Training | 2 | 0.8% |
Transparency report | 2 | 0.8% |
Transphobia | 2 | 0.8% |
USA Freedom Act | 2 | 0.8% |
United States Code | 2 | 0.8% |
United States Constitution | 2 | 0.8% |
Use case | 2 | 0.8% |
User-generated content | 2 | 0.8% |
Validity (statistics) | 2 | 0.8% |
Value (ethics) | 2 | 0.8% |
Violent extremism | 2 | 0.8% |
Visa Information System | 2 | 0.8% |
Voter registration | 2 | 0.8% |
Weapon | 2 | 0.8% |
Website | 2 | 0.8% |
Western world | 2 | 0.8% |
Witness | 2 | 0.8% |
X Article | 2 | 0.8% |
2019 Balakot airstrike | 1 | 0.4% |
2019 Indian general election | 1 | 0.4% |
3D modeling | 1 | 0.4% |
API | 1 | 0.4% |
Aadhaar | 1 | 0.4% |
Access to Information Act | 1 | 0.4% |
Access to public information in Europe | 1 | 0.4% |
Accessibility | 1 | 0.4% |
Act of Parliament | 1 | 0.4% |
Advanced persistent threat | 1 | 0.4% |
Affective computing | 1 | 0.4% |
Affordance | 1 | 0.4% |
Agenda-setting theory | 1 | 0.4% |
Aggression | 1 | 0.4% |
Aimee Van Wynsberghe | 1 | 0.4% |
Airline | 1 | 0.4% |
Ajit Pai | 1 | 0.4% |
American Convention on Human Rights | 1 | 0.4% |
Android (operating system) | 1 | 0.4% |
Application programming interface | 1 | 0.4% |
Application security | 1 | 0.4% |
Application software | 1 | 0.4% |
Arizona v. Evans | 1 | 0.4% |
Arms control | 1 | 0.4% |
Artificial objects | 1 | 0.4% |
Artistic freedom | 1 | 0.4% |
Asia | 1 | 0.4% |
Asian Americans | 1 | 0.4% |
Assassination of Jamal Khashoggi | 1 | 0.4% |
Assault | 1 | 0.4% |
Audience measurement | 1 | 0.4% |
Audiovisual | 1 | 0.4% |
Augmented reality | 1 | 0.4% |
Authenticity (philosophy) | 1 | 0.4% |
Authorization | 1 | 0.4% |
Automated Targeting System | 1 | 0.4% |
Automated border control system | 1 | 0.4% |
Autoregulation | 1 | 0.4% |
Background check | 1 | 0.4% |
Bank Secrecy Act | 1 | 0.4% |
Bankruptcy | 1 | 0.4% |
Basic Law for the Federal Republic of Germany | 1 | 0.4% |
Battles and conflicts without fatalities | 1 | 0.4% |
Belt and Road Initiative | 1 | 0.4% |
Biometric passport | 1 | 0.4% |
Botnet | 1 | 0.4% |
Brand | 1 | 0.4% |
Brett Kavanaugh | 1 | 0.4% |
Broadcasting | 1 | 0.4% |
Budget | 1 | 0.4% |
Bundesdatenschutzgesetz | 1 | 0.4% |
Burden of proof (law) | 1 | 0.4% |
Bureaucracy | 1 | 0.4% |
California Unfair Competition Law | 1 | 0.4% |
Canadian Charter of Rights and Freedoms | 1 | 0.4% |
Capitalism | 1 | 0.4% |
Carjacking | 1 | 0.4% |
Central American migrant caravans | 1 | 0.4% |
Central Europe | 1 | 0.4% |
Certification | 1 | 0.4% |
Chairperson | 1 | 0.4% |
Chaos Monkey | 1 | 0.4% |
Chief information officer | 1 | 0.4% |
Chief privacy officer | 1 | 0.4% |
China–United States trade war | 1 | 0.4% |
Chowkidar Chor Hai | 1 | 0.4% |
Citizenship of the European Union | 1 | 0.4% |
Citizenship of the United States | 1 | 0.4% |
Civil Rights Act of 1964 | 1 | 0.4% |
Civil and political rights | 1 | 0.4% |
Civil defense | 1 | 0.4% |
Civil law (common law) | 1 | 0.4% |
Civilian oversight | 1 | 0.4% |
Clickbait | 1 | 0.4% |
Climate change mitigation | 1 | 0.4% |
Clinical trial | 1 | 0.4% |
Color | 1 | 0.4% |
Commission de la carte d'identité des journalistes professionnels | 1 | 0.4% |
Commissioner | 1 | 0.4% |
Committee | 1 | 0.4% |
Common good | 1 | 0.4% |
Community | 1 | 0.4% |
Competition (companies) | 1 | 0.4% |
Computational learning theory | 1 | 0.4% |
Computer Fraud and Abuse Act | 1 | 0.4% |
Computer and network surveillance | 1 | 0.4% |
Computer data storage | 1 | 0.4% |
Computer program | 1 | 0.4% |
Computer security exploits | 1 | 0.4% |
Concept | 1 | 0.4% |
Conflict of interest | 1 | 0.4% |
Consciousness | 1 | 0.4% |
Consent search | 1 | 0.4% |
Content creation | 1 | 0.4% |
Control (social and political) | 1 | 0.4% |
Copyright Act of Canada | 1 | 0.4% |
Copyright infringement | 1 | 0.4% |
Corporate social responsibility | 1 | 0.4% |
Counterfeit | 1 | 0.4% |
Creativity | 1 | 0.4% |
Credit freeze | 1 | 0.4% |
Credit history | 1 | 0.4% |
Credit score in the United States | 1 | 0.4% |
Crime scene | 1 | 0.4% |
Crimea | 1 | 0.4% |
Criminology | 1 | 0.4% |
Crisis | 1 | 0.4% |
Cryptocurrency | 1 | 0.4% |
Cubby, Inc. v. CompuServe Inc. | 1 | 0.4% |
Cultural diversity | 1 | 0.4% |
Customer satisfaction | 1 | 0.4% |
Customs | 1 | 0.4% |
CyberPatriot | 1 | 0.4% |
Cyberbullying | 1 | 0.4% |
Cybernetics | 1 | 0.4% |
Cyberpunk themes | 1 | 0.4% |
Cyberterrorism | 1 | 0.4% |
DNA | 1 | 0.4% |
Damages | 1 | 0.4% |
Daphne Caruana Galizia | 1 | 0.4% |
Dark web | 1 | 0.4% |
Data Protection Officer | 1 | 0.4% |
Data at rest | 1 | 0.4% |
Data center | 1 | 0.4% |
Data compression | 1 | 0.4% |
Data governance | 1 | 0.4% |
Data integrity | 1 | 0.4% |
Data mining | 1 | 0.4% |
Data processing | 1 | 0.4% |
Data protection | 1 | 0.4% |
Data quality | 1 | 0.4% |
Debt | 1 | 0.4% |
Decision | 1 | 0.4% |
Deep packet inspection | 1 | 0.4% |
DeepFace | 1 | 0.4% |
Democratization | 1 | 0.4% |
Denial-of-service attack | 1 | 0.4% |
Detective | 1 | 0.4% |
Development aid | 1 | 0.4% |
Deviance (sociology) | 1 | 0.4% |
Digital Revolution | 1 | 0.4% |
Digital divide | 1 | 0.4% |
Digital economy | 1 | 0.4% |
Digital journalism | 1 | 0.4% |
Digital marketing | 1 | 0.4% |
Digital signature | 1 | 0.4% |
Digitization | 1 | 0.4% |
Directive 2014/65/EU | 1 | 0.4% |
Director of the Federal Bureau of Investigation | 1 | 0.4% |
Disability | 1 | 0.4% |
Disparate impact | 1 | 0.4% |
Distance | 1 | 0.4% |
Do Not Track legislation | 1 | 0.4% |
Documentation | 1 | 0.4% |
Door | 1 | 0.4% |
Dormant Commerce Clause | 1 | 0.4% |
Driver's license | 1 | 0.4% |
Dual federalism | 1 | 0.4% |
Due Process Clause | 1 | 0.4% |
Duty of care | 1 | 0.4% |
Dystopia | 1 | 0.4% |
E-governance | 1 | 0.4% |
Earmark (politics) | 1 | 0.4% |
Economic growth | 1 | 0.4% |
Economic sanctions | 1 | 0.4% |
Educational technology | 1 | 0.4% |
Edward Snowden | 1 | 0.4% |
Eigenface | 1 | 0.4% |
Electrical grid | 1 | 0.4% |
Electronic Commerce Directive 2000 | 1 | 0.4% |
Electronic documents | 1 | 0.4% |
Electronic evidence | 1 | 0.4% |
Elevator | 1 | 0.4% |
Emergency | 1 | 0.4% |
Emergency services | 1 | 0.4% |
Emerging technologies | 1 | 0.4% |
Emma Barnett | 1 | 0.4% |
Emotional self-regulation | 1 | 0.4% |
End-to-end auditable voting systems | 1 | 0.4% |
End-to-end encryption | 1 | 0.4% |
Energy policy of the European Union | 1 | 0.4% |
Environmental resource management | 1 | 0.4% |
Espionage techniques | 1 | 0.4% |
Estoppel | 1 | 0.4% |
Ethical code | 1 | 0.4% |
Ethnic group | 1 | 0.4% |
Ethnography | 1 | 0.4% |
Event data recorder | 1 | 0.4% |
Evidence | 1 | 0.4% |
Evidence-based medicine | 1 | 0.4% |
Exclusionary rule | 1 | 0.4% |
Executive Order 13780 | 1 | 0.4% |
Experience | 1 | 0.4% |
Expert witness | 1 | 0.4% |
Export of cryptography from the United States | 1 | 0.4% |
Extortion | 1 | 0.4% |
Extremism | 1 | 0.4% |
Face ID | 1 | 0.4% |
Face Recognition Vendor Test | 1 | 0.4% |
FaceApp | 1 | 0.4% |
Facial composite | 1 | 0.4% |
False positives and false negatives | 1 | 0.4% |
Feature (machine learning) | 1 | 0.4% |
Federal Information Security Management Act of 2002 | 1 | 0.4% |
Federal Trade Commission Act of 1914 | 1 | 0.4% |
Federalism in the United States | 1 | 0.4% |
Felony | 1 | 0.4% |
Finance | 1 | 0.4% |
Financial technology | 1 | 0.4% |
Fine (penalty) | 1 | 0.4% |
Forced disappearance | 1 | 0.4% |
Forensic dentistry | 1 | 0.4% |
Franchising | 1 | 0.4% |
Freedom of association | 1 | 0.4% |
Full body scanner | 1 | 0.4% |
Function (mathematics) | 1 | 0.4% |
Genealogy | 1 | 0.4% |
Generative adversarial network | 1 | 0.4% |
Genetic genealogy | 1 | 0.4% |
Geopolitics | 1 | 0.4% |
Geprüfte Sicherheit | 1 | 0.4% |
Global Counterterrorism Forum | 1 | 0.4% |
Global warming | 1 | 0.4% |
Globalization | 1 | 0.4% |
Green card | 1 | 0.4% |
HONR Network | 1 | 0.4% |
HTTPS | 1 | 0.4% |
Hair analysis | 1 | 0.4% |
Hard disk drive | 1 | 0.4% |
Hatred | 1 | 0.4% |
Heisei | 1 | 0.4% |
History | 1 | 0.4% |
Honeypot (computing) | 1 | 0.4% |
Human Rights Impact Assessment | 1 | 0.4% |
Human subject research | 1 | 0.4% |
Hybrid warfare | 1 | 0.4% |
Hyperlink | 1 | 0.4% |
IMSI-catcher | 1 | 0.4% |
IPhone X | 1 | 0.4% |
IT law | 1 | 0.4% |
Identity (social science) | 1 | 0.4% |
Illinois Brick Co. v. Illinois | 1 | 0.4% |
Image editing | 1 | 0.4% |
Image quality | 1 | 0.4% |
Incentive | 1 | 0.4% |
Incitement | 1 | 0.4% |
Information Technology Act, 2000 | 1 | 0.4% |
Information policy | 1 | 0.4% |
Infrared | 1 | 0.4% |
Input/output | 1 | 0.4% |
Insight | 1 | 0.4% |
Institutional racism | 1 | 0.4% |
Int'l Refugee Assistance Project v. Trump | 1 | 0.4% |
Integrated Automated Fingerprint Identification System | 1 | 0.4% |
Intelligence analysis | 1 | 0.4% |
Internal audit | 1 | 0.4% |
International Convention on the Elimination of All Forms of Racial Discrimination | 1 | 0.4% |
International Mobile Equipment Identity | 1 | 0.4% |
International development | 1 | 0.4% |
International human rights law | 1 | 0.4% |
International mobile subscriber identity | 1 | 0.4% |
Internet access | 1 | 0.4% |
Internet governance | 1 | 0.4% |
Interoperability | 1 | 0.4% |
Islam in the United States | 1 | 0.4% |
Islamic terrorism | 1 | 0.4% |
Jair Bolsonaro | 1 | 0.4% |
Janai Nelson | 1 | 0.4% |
Jean-Luc Mélenchon | 1 | 0.4% |
Jeremy Hunt | 1 | 0.4% |
Joy Buolamwini | 1 | 0.4% |
Judgment (law) | 1 | 0.4% |
Jury | 1 | 0.4% |
Katz v. United States | 1 | 0.4% |
Key (cryptography) | 1 | 0.4% |
Key size | 1 | 0.4% |
Keychain | 1 | 0.4% |
Kill chain | 1 | 0.4% |
Ko Wen-je | 1 | 0.4% |
Laboratory | 1 | 0.4% |
Languages of India | 1 | 0.4% |
Law (principle) | 1 | 0.4% |
Law enforcement agency | 1 | 0.4% |
Lease | 1 | 0.4% |
Leonard Pozner | 1 | 0.4% |
Library | 1 | 0.4% |
License | 1 | 0.4% |
Lighting | 1 | 0.4% |
Loan | 1 | 0.4% |
Lynching | 1 | 0.4% |
Machine | 1 | 0.4% |
1 | 0.4% | |
Main Intelligence Directorate | 1 | 0.4% |
Marci Harris | 1 | 0.4% |
Mark Zuckerberg | 1 | 0.4% |
Marketing | 1 | 0.4% |
Marketing research | 1 | 0.4% |
Markets in Financial Instruments Directive 2004 | 1 | 0.4% |
Mean time between failures | 1 | 0.4% |
Media of Ukraine | 1 | 0.4% |
Mediation | 1 | 0.4% |
Medical billing | 1 | 0.4% |
Medical ethics | 1 | 0.4% |
Medical imaging | 1 | 0.4% |
Mens rea | 1 | 0.4% |
Mental disorder | 1 | 0.4% |
Metagenomics | 1 | 0.4% |
Michael Geist | 1 | 0.4% |
Microsoft account | 1 | 0.4% |
Military intelligence | 1 | 0.4% |
Miscarriage of justice | 1 | 0.4% |
Misconduct | 1 | 0.4% |
Moderation system | 1 | 0.4% |
Mohammad bin Salman | 1 | 0.4% |
Monopoly | 1 | 0.4% |
Motivation | 1 | 0.4% |
Motor vehicle exception | 1 | 0.4% |
Mug shot | 1 | 0.4% |
Multi-stakeholder governance | 1 | 0.4% |
Multiculturalism | 1 | 0.4% |
Multistakeholder governance | 1 | 0.4% |
Municipal broadband | 1 | 0.4% |
Murder of Balbir Singh Sodhi | 1 | 0.4% |
Nancy Pelosi | 1 | 0.4% |
National identification number | 1 | 0.4% |
National security letter | 1 | 0.4% |
Natural environment | 1 | 0.4% |
Newsnight | 1 | 0.4% |
No Fly List | 1 | 0.4% |
Non-disclosure agreement | 1 | 0.4% |
North Atlantic Treaty | 1 | 0.4% |
Novichok agent | 1 | 0.4% |
Nuclear proliferation | 1 | 0.4% |
Nuclear weapon | 1 | 0.4% |
Office of Inspector General (United States) | 1 | 0.4% |
Omnibus Crime Control and Safe Streets Act of 1968 | 1 | 0.4% |
On-board diagnostics | 1 | 0.4% |
Online community | 1 | 0.4% |
Online newspaper | 1 | 0.4% |
Online shopping | 1 | 0.4% |
Open data | 1 | 0.4% |
Open government | 1 | 0.4% |
Optics | 1 | 0.4% |
Organ donation | 1 | 0.4% |
Organized crime | 1 | 0.4% |
Panorama (British TV programme) | 1 | 0.4% |
Parameter | 1 | 0.4% |
Parenting | 1 | 0.4% |
Parliamentary privilege | 1 | 0.4% |
Password manager | 1 | 0.4% |
Peer-to-peer | 1 | 0.4% |
Performance indicator | 1 | 0.4% |
Person of color | 1 | 0.4% |
Photography | 1 | 0.4% |
Photojournalism | 1 | 0.4% |
Physical security | 1 | 0.4% |
Physician | 1 | 0.4% |
Pizzagate conspiracy theory | 1 | 0.4% |
Plaintext | 1 | 0.4% |
Poisoning of Sergei and Yulia Skripal | 1 | 0.4% |
Police National Computer | 1 | 0.4% |
Police surveillance in New York City | 1 | 0.4% |
Political action committee | 1 | 0.4% |
Political communication | 1 | 0.4% |
Political theories | 1 | 0.4% |
Politics of the Republic of China | 1 | 0.4% |
Politics of the United States | 1 | 0.4% |
Polymerase chain reaction | 1 | 0.4% |
Port San Antonio | 1 | 0.4% |
Poverty | 1 | 0.4% |
Predictive analytics | 1 | 0.4% |
Predictive modelling | 1 | 0.4% |
Predictive policing | 1 | 0.4% |
Prevention | 1 | 0.4% |
Prigg v. Pennsylvania | 1 | 0.4% |
Printz v. United States | 1 | 0.4% |
Prior probability | 1 | 0.4% |
Prison | 1 | 0.4% |
Privacy engineering | 1 | 0.4% |
Privacy laws of the United States | 1 | 0.4% |
Proactive cyber defence | 1 | 0.4% |
Productivity | 1 | 0.4% |
Professional ethics | 1 | 0.4% |
Proof of concept | 1 | 0.4% |
Proportionality (law) | 1 | 0.4% |
Protected health information | 1 | 0.4% |
Prüm Convention | 1 | 0.4% |
Psychiatry | 1 | 0.4% |
Psychological warfare | 1 | 0.4% |
Public key infrastructure | 1 | 0.4% |
Public participation | 1 | 0.4% |
Public policy | 1 | 0.4% |
Public relations | 1 | 0.4% |
Public services | 1 | 0.4% |
Public–private partnership | 1 | 0.4% |
Quantitative research | 1 | 0.4% |
Quantum computing | 1 | 0.4% |
Race and ethnicity in the United States Census | 1 | 0.4% |
Race and ethnicity in the United States census | 1 | 0.4% |
Radio-frequency identification | 1 | 0.4% |
Rapid DNA | 1 | 0.4% |
Ratification | 1 | 0.4% |
Real ID Act | 1 | 0.4% |
Real-name system | 1 | 0.4% |
Real-time computing | 1 | 0.4% |
Reality | 1 | 0.4% |
Reasonable person | 1 | 0.4% |
Red light camera | 1 | 0.4% |
Redlining | 1 | 0.4% |
Regulation of Investigatory Powers Act 2000 | 1 | 0.4% |
Reliability engineering | 1 | 0.4% |
Religious intolerance | 1 | 0.4% |
Remand (detention) | 1 | 0.4% |
Remote keyless system | 1 | 0.4% |
Reputation | 1 | 0.4% |
Research and development | 1 | 0.4% |
Right to explanation | 1 | 0.4% |
Right-wing politics | 1 | 0.4% |
Riley v. California | 1 | 0.4% |
Risk assessment | 1 | 0.4% |
Robbery | 1 | 0.4% |
Robotics | 1 | 0.4% |
Rodrigo Duterte | 1 | 0.4% |
Rohingya people | 1 | 0.4% |
Romance scam | 1 | 0.4% |
Russian military intervention in Ukraine (2014–present) | 1 | 0.4% |
SIM card | 1 | 0.4% |
Sandra Wachter | 1 | 0.4% |
Sarfraz Manzoor | 1 | 0.4% |
Schengen Agreement | 1 | 0.4% |
Schengen Information System | 1 | 0.4% |
Science and Technology Options Assessment | 1 | 0.4% |
Science and technology | 1 | 0.4% |
Scientific method | 1 | 0.4% |
Secretary General of NATO | 1 | 0.4% |
Section summary of the Patriot Act, Title II | 1 | 0.4% |
Security guard | 1 | 0.4% |
Sensor | 1 | 0.4% |
Sergei Skripal | 1 | 0.4% |
Sexual harassment | 1 | 0.4% |
Shoshana Zuboff | 1 | 0.4% |
Sikhs | 1 | 0.4% |
Simulation | 1 | 0.4% |
Single-nucleotide polymorphism | 1 | 0.4% |
Smart TV | 1 | 0.4% |
Smart manufacturing | 1 | 0.4% |
SmartGate | 1 | 0.4% |
Smartphone | 1 | 0.4% |
Social Security number | 1 | 0.4% |
Social engineering (security) | 1 | 0.4% |
Social movement | 1 | 0.4% |
Social norm | 1 | 0.4% |
Social responsibility | 1 | 0.4% |
Social stigma | 1 | 0.4% |
Soft power | 1 | 0.4% |
Softmax function | 1 | 0.4% |
Software agent | 1 | 0.4% |
Space | 1 | 0.4% |
Speech recognition | 1 | 0.4% |
Sphere of influence | 1 | 0.4% |
States' rights | 1 | 0.4% |
Statistical classification | 1 | 0.4% |
Statute | 1 | 0.4% |
Steganography | 1 | 0.4% |
Stingray phone tracker | 1 | 0.4% |
Stop Enabling Sex Traffickers Act | 1 | 0.4% |
Stored Communications Act | 1 | 0.4% |
Strategic planning | 1 | 0.4% |
Stuxnet | 1 | 0.4% |
Subscription business model | 1 | 0.4% |
Supermarket | 1 | 0.4% |
Surveillance capitalism | 1 | 0.4% |
Suspicious activity report | 1 | 0.4% |
Swing state | 1 | 0.4% |
Synthetic media | 1 | 0.4% |
Target audience | 1 | 0.4% |
Targeted killing | 1 | 0.4% |
Taser | 1 | 0.4% |
Tax | 1 | 0.4% |
Technological singularity | 1 | 0.4% |
Telecommunications | 1 | 0.4% |
Telegram (service) | 1 | 0.4% |
Terms of service | 1 | 0.4% |
Testimony | 1 | 0.4% |
The Right to Privacy (article) | 1 | 0.4% |
Theory of change | 1 | 0.4% |
Think tank | 1 | 0.4% |
Third-party doctrine | 1 | 0.4% |
Three Laws of Robotics | 1 | 0.4% |
Time | 1 | 0.4% |
Time limit | 1 | 0.4% |
Tokenization (data security) | 1 | 0.4% |
Toleration | 1 | 0.4% |
Tool | 1 | 0.4% |
Tor (anonymity network) | 1 | 0.4% |
Tort | 1 | 0.4% |
Traffic light | 1 | 0.4% |
Translation | 1 | 0.4% |
Transport | 1 | 0.4% |
Transport Layer Security | 1 | 0.4% |
Treaty of Lisbon | 1 | 0.4% |
Treaty on European Union | 1 | 0.4% |
Treaty on the Functioning of the European Union | 1 | 0.4% |
Trust (emotion) | 1 | 0.4% |
Trust (social science) | 1 | 0.4% |
Truth | 1 | 0.4% |
Unconscionability | 1 | 0.4% |
United Kingdom European Union membership referendum, 2016 | 1 | 0.4% |
United Kingdom National DNA Database | 1 | 0.4% |
United States elections, 2018 | 1 | 0.4% |
United States passport | 1 | 0.4% |
United States v. Google Inc. | 1 | 0.4% |
United States v. Jones | 1 | 0.4% |
User (computing) | 1 | 0.4% |
User activity monitoring | 1 | 0.4% |
Vehicle registration plate | 1 | 0.4% |
Venture capital | 1 | 0.4% |
Verification and validation | 1 | 0.4% |
Video content analysis | 1 | 0.4% |
Viktor Orbán | 1 | 0.4% |
Vine (service) | 1 | 0.4% |
Violence against women | 1 | 0.4% |
Violent crime | 1 | 0.4% |
Virtual reality | 1 | 0.4% |
Visa policy of the Schengen Area | 1 | 0.4% |
Voice over IP | 1 | 0.4% |
Voluntary Voting System Guidelines | 1 | 0.4% |
Voter-verified paper audit trail | 1 | 0.4% |
WannaCry ransomware attack | 1 | 0.4% |
Warfare | 1 | 0.4% |
Wearable technology | 1 | 0.4% |
Web content | 1 | 0.4% |
Webcam | 1 | 0.4% |
Welfare | 1 | 0.4% |
Wicked problem | 1 | 0.4% |
World War II | 1 | 0.4% |
Y-STR | 1 | 0.4% |
Yahoo! data breaches | 1 | 0.4% |
abs | rel | |
---|---|---|
Human activities | 235 | 94.8% |
Politics | 191 | 77.0% |
Government | 189 | 76.2% |
Public sphere | 167 | 67.3% |
Policy | 166 | 66.9% |
Law | 165 | 66.5% |
Privacy | 151 | 60.9% |
Justice | 145 | 58.5% |
Social institutions | 141 | 56.9% |
Technology | 120 | 48.4% |
Surveillance | 101 | 40.7% |
Personal data | 97 | 39.1% |
Artificial intelligence | 94 | 37.9% |
Information privacy | 93 | 37.5% |
Facial recognition system | 82 | 33.1% |
Applied ethics | 77 | 31.0% |
Risk | 77 | 31.0% |
General Data Protection Regulation | 71 | 28.6% |
Social media | 70 | 28.2% |
Biometrics | 66 | 26.6% |
National security | 61 | 24.6% |
Communication | 55 | 22.2% |
Human rights | 55 | 22.2% |
Research | 55 | 22.2% |
Information | 53 | 21.4% |
Rights | 50 | 20.2% |
Social issues | 50 | 20.2% |
Computing | 47 | 19.0% |
Internet | 46 | 18.5% |
Computer security | 44 | 17.7% |
Crime | 42 | 16.9% |
Issues in ethics | 42 | 16.9% |
Regulatory compliance | 41 | 16.5% |
Accountability | 40 | 16.1% |
Governance | 37 | 14.9% |
Information technology | 36 | 14.5% |
Public law | 35 | 14.1% |
Virtue | 34 | 13.7% |
Bias | 32 | 12.9% |
Ethical principles | 32 | 12.9% |
Privacy law | 32 | 12.9% |
Transparency (behavior) | 31 | 12.5% |
Freedom of speech | 29 | 11.7% |
Identity document | 29 | 11.7% |
Authentication | 27 | 10.9% |
Disinformation | 27 | 10.9% |
News | 27 | 10.9% |
System | 27 | 10.9% |
Closed-circuit television | 26 | 10.5% |
Cyberspace | 25 | 10.1% |
Government and personhood | 25 | 10.1% |
Fake news | 24 | 9.7% |
Advertising | 23 | 9.3% |
Audit | 23 | 9.3% |
Ethics | 23 | 9.3% |
Business | 22 | 8.9% |
Democracy | 22 | 8.9% |
Discrimination | 22 | 8.9% |
Innovation | 22 | 8.9% |
Mass media | 22 | 8.9% |
Cyberwarfare | 21 | 8.5% |
Deepfake | 21 | 8.5% |
Security | 21 | 8.5% |
Fingerprint | 20 | 8.1% |
Information Age | 20 | 8.1% |
Data | 19 | 7.7% |
Automation | 18 | 7.3% |
Data Protection Directive | 18 | 7.3% |
Branches of science | 17 | 6.9% |
Intelligence | 17 | 6.9% |
Machine learning | 17 | 6.9% |
Border control | 16 | 6.5% |
Data retention | 16 | 6.5% |
Political science | 16 | 6.5% |
European Convention on Human Rights | 15 | 6.0% |
European Union law | 15 | 6.0% |
Mass surveillance | 15 | 6.0% |
Misinformation | 15 | 6.0% |
Accuracy and precision | 14 | 5.6% |
COVID-19 pandemic | 14 | 5.6% |
Consent | 14 | 5.6% |
Database | 14 | 5.6% |
Information security | 14 | 5.6% |
Information sensitivity | 14 | 5.6% |
Internet of things | 14 | 5.6% |
Journalism | 14 | 5.6% |
Prosecutor | 14 | 5.6% |
Treaty | 14 | 5.6% |
Algorithm | 13 | 5.2% |
Civil rights and liberties | 13 | 5.2% |
Cloud computing | 13 | 5.2% |
Common law | 13 | 5.2% |
Computer network | 13 | 5.2% |
Criminal law | 13 | 5.2% |
Fact-checking | 13 | 5.2% |
Right to privacy | 13 | 5.2% |
Type I and type II errors | 13 | 5.2% |
Crime prevention | 12 | 4.8% |
Cybercrime | 12 | 4.8% |
Fundamental rights | 12 | 4.8% |
Mobile app | 12 | 4.8% |
Privacy and Electronic Communications Directive 2002 | 12 | 4.8% |
Access to information | 11 | 4.4% |
Cognitive science | 11 | 4.4% |
Culture | 11 | 4.4% |
Cyberattack | 11 | 4.4% |
Forensic science | 11 | 4.4% |
Malware | 11 | 4.4% |
Rule of law | 11 | 4.4% |
Vulnerability (computing) | 11 | 4.4% |
World Wide Web | 11 | 4.4% |
Best practice | 10 | 4.0% |
Campaign advertising | 10 | 4.0% |
DNA profiling | 10 | 4.0% |
Directive (European Union) | 10 | 4.0% |
Education | 10 | 4.0% |
Encryption | 10 | 4.0% |
First Amendment to the United States Constitution | 10 | 4.0% |
International Covenant on Civil and Political Rights | 10 | 4.0% |
Interoperability | 10 | 4.0% |
Arrest | 9 | 3.6% |
Autonomy | 9 | 3.6% |
Big data | 9 | 3.6% |
Censorship | 9 | 3.6% |
Cognition | 9 | 3.6% |
Decision-making | 9 | 3.6% |
Deep learning | 9 | 3.6% |
Election | 9 | 3.6% |
Hate speech | 9 | 3.6% |
Iris recognition | 9 | 3.6% |
Lawsuit | 9 | 3.6% |
Self-driving car | 9 | 3.6% |
Training, validation, and test sets | 9 | 3.6% |
Violence | 9 | 3.6% |
Analytics | 8 | 3.2% |
Civil liberties | 8 | 3.2% |
Contract | 8 | 3.2% |
Ethics of artificial intelligence | 8 | 3.2% |
Face Recognition Vendor Test | 8 | 3.2% |
Fourth Amendment to the United States Constitution | 8 | 3.2% |
Law enforcement | 8 | 3.2% |
Privacy policy | 8 | 3.2% |
Visa policy of the Schengen Area | 8 | 3.2% |
5G | 7 | 2.8% |
Carpenter v. United States | 7 | 2.8% |
Data laws | 7 | 2.8% |
Discovery (law) | 7 | 2.8% |
Donald Trump | 7 | 2.8% |
Face | 7 | 2.8% |
Freedom of the press | 7 | 2.8% |
Health | 7 | 2.8% |
Information broker | 7 | 2.8% |
Information governance | 7 | 2.8% |
Internet privacy | 7 | 2.8% |
Market (economics) | 7 | 2.8% |
Predictive policing | 7 | 2.8% |
Privacy Impact Assessment | 7 | 2.8% |
Probable cause | 7 | 2.8% |
Regulation | 7 | 2.8% |
Safety of journalists | 7 | 2.8% |
Schengen Area | 7 | 2.8% |
Society | 7 | 2.8% |
Algorithmic bias | 6 | 2.4% |
Authoritarianism | 6 | 2.4% |
Charter of Fundamental Rights of the European Union | 6 | 2.4% |
Criminal justice | 6 | 2.4% |
DNA database | 6 | 2.4% |
Data Protection Act 1998 | 6 | 2.4% |
Dignity | 6 | 2.4% |
Evaluation | 6 | 2.4% |
Fraud | 6 | 2.4% |
Information technology management | 6 | 2.4% |
Internet bot | 6 | 2.4% |
Negligence | 6 | 2.4% |
Phishing | 6 | 2.4% |
Privacy Act of 1974 | 6 | 2.4% |
Propaganda | 6 | 2.4% |
Racial profiling | 6 | 2.4% |
Robot | 6 | 2.4% |
Robotics | 6 | 2.4% |
Search warrant | 6 | 2.4% |
Smart city | 6 | 2.4% |
United States Code | 6 | 2.4% |
Unmanned aerial vehicle | 6 | 2.4% |
Abuse | 5 | 2.0% |
Amazon Rekognition | 5 | 2.0% |
Artificial neural network | 5 | 2.0% |
Automatic number-plate recognition | 5 | 2.0% |
Computer file | 5 | 2.0% |
Consumer protection | 5 | 2.0% |
Customs | 5 | 2.0% |
Cyber-security regulation | 5 | 2.0% |
Damages | 5 | 2.0% |
Data management | 5 | 2.0% |
Data re-identification | 5 | 2.0% |
Defamation | 5 | 2.0% |
Detective | 5 | 2.0% |
Deterrence theory | 5 | 2.0% |
Due diligence | 5 | 2.0% |
Employment | 5 | 2.0% |
Executive Order 13769 | 5 | 2.0% |
False positives and false negatives | 5 | 2.0% |
Freedom of Information Act (United States) | 5 | 2.0% |
Health care | 5 | 2.0% |
Law enforcement agency | 5 | 2.0% |
Mark Zuckerberg | 5 | 2.0% |
Max Schrems | 5 | 2.0% |
Mens rea | 5 | 2.0% |
Metadata | 5 | 2.0% |
Online advertising | 5 | 2.0% |
Passenger name record | 5 | 2.0% |
Passport | 5 | 2.0% |
Pseudonymization | 5 | 2.0% |
Psychological concepts | 5 | 2.0% |
Public engagement | 5 | 2.0% |
Ransomware | 5 | 2.0% |
Russian interference in the 2016 United States elections | 5 | 2.0% |
Section 230 | 5 | 2.0% |
Speech recognition | 5 | 2.0% |
Sustainability | 5 | 2.0% |
Tort | 5 | 2.0% |
Travel visa | 5 | 2.0% |
Treaty on European Union | 5 | 2.0% |
Trust (social science) | 5 | 2.0% |
2019–20 coronavirus outbreak | 4 | 1.6% |
Access control | 4 | 1.6% |
Airport security | 4 | 1.6% |
Biometric passport | 4 | 1.6% |
Blockchain | 4 | 1.6% |
California Consumer Privacy Act | 4 | 1.6% |
Children's rights | 4 | 1.6% |
Citizenship of the United States | 4 | 1.6% |
Competition | 4 | 1.6% |
Computer | 4 | 1.6% |
Computer data storage | 4 | 1.6% |
Concentration of media ownership | 4 | 1.6% |
Concepts in metaphysics | 4 | 1.6% |
Constitution of the United States | 4 | 1.6% |
Crime scene | 4 | 1.6% |
Criminal record | 4 | 1.6% |
Cyberbullying | 4 | 1.6% |
EU–US Privacy Shield | 4 | 1.6% |
Expert | 4 | 1.6% |
Forensic identification | 4 | 1.6% |
Gender | 4 | 1.6% |
Housing discrimination in the United States | 4 | 1.6% |
Human Rights Act 1998 | 4 | 1.6% |
Identity theft | 4 | 1.6% |
International law | 4 | 1.6% |
Investigatory Powers Act 2016 | 4 | 1.6% |
Law enforcement techniques | 4 | 1.6% |
Learning | 4 | 1.6% |
Legal person | 4 | 1.6% |
Media (communication) | 4 | 1.6% |
Media literacy | 4 | 1.6% |
Media manipulation | 4 | 1.6% |
Media pluralism | 4 | 1.6% |
Minority group | 4 | 1.6% |
Money laundering | 4 | 1.6% |
Multistakeholder governance model | 4 | 1.6% |
Natural language processing | 4 | 1.6% |
Netzwerkdurchsetzungsgesetz | 4 | 1.6% |
Police body camera | 4 | 1.6% |
Political campaign | 4 | 1.6% |
Political polarization | 4 | 1.6% |
Precedent | 4 | 1.6% |
Proactive cyber defence | 4 | 1.6% |
Prüm Convention | 4 | 1.6% |
Public opinion | 4 | 1.6% |
Recommender system | 4 | 1.6% |
Risk assessment | 4 | 1.6% |
Safety | 4 | 1.6% |
Science | 4 | 1.6% |
Science, technology, engineering, and mathematics | 4 | 1.6% |
Search and seizure | 4 | 1.6% |
Section 230 of the Communications Decency Act | 4 | 1.6% |
Targeted advertising | 4 | 1.6% |
Terrorism | 4 | 1.6% |
The Right to Privacy (article) | 4 | 1.6% |
Treaties of the European Union | 4 | 1.6% |
United States v. Jones | 4 | 1.6% |
Universal Declaration of Human Rights | 4 | 1.6% |
Voting | 4 | 1.6% |
Whistleblower | 4 | 1.6% |
2016 United Kingdom European Union membership referendum | 3 | 1.2% |
Actus reus | 3 | 1.2% |
Agriculture | 3 | 1.2% |
Airline | 3 | 1.2% |
Algorithmic trading | 3 | 1.2% |
Amicus curiae | 3 | 1.2% |
Antivirus software | 3 | 1.2% |
Application programming interface | 3 | 1.2% |
Area of freedom, security and justice | 3 | 1.2% |
Artificial general intelligence | 3 | 1.2% |
Assumption | 3 | 1.2% |
Background check | 3 | 1.2% |
Bail | 3 | 1.2% |
Behavior | 3 | 1.2% |
Biodiversity | 3 | 1.2% |
Business model | 3 | 1.2% |
Census | 3 | 1.2% |
Climate resilience | 3 | 1.2% |
Combined DNA Index System | 3 | 1.2% |
Committee | 3 | 1.2% |
Committee of Ministers of the Council of Europe | 3 | 1.2% |
Computer vision | 3 | 1.2% |
Congressional oversight | 3 | 1.2% |
Consumer privacy | 3 | 1.2% |
Control (social and political) | 3 | 1.2% |
Copyright infringement | 3 | 1.2% |
Coronavirus disease 2019 | 3 | 1.2% |
Data quality | 3 | 1.2% |
Deception | 3 | 1.2% |
Digital Revolution | 3 | 1.2% |
Digital rights | 3 | 1.2% |
Echo chamber (media) | 3 | 1.2% |
Economic growth | 3 | 1.2% |
Economic inequality | 3 | 1.2% |
Electronic Commerce Directive 2000 | 3 | 1.2% |
Electronic evidence | 3 | 1.2% |
Emergency management | 3 | 1.2% |
Entertainment | 3 | 1.2% |
Espionage | 3 | 1.2% |
Evidence | 3 | 1.2% |
Expectation of privacy | 3 | 1.2% |
FTC fair information practice | 3 | 1.2% |
Fault (law) | 3 | 1.2% |
Genetics | 3 | 1.2% |
Global Entry | 3 | 1.2% |
Human | 3 | 1.2% |
Human rights and encryption | 3 | 1.2% |
Immigration | 3 | 1.2% |
Information science | 3 | 1.2% |
Infrastructure | 3 | 1.2% |
Internet access | 3 | 1.2% |
Internet governance | 3 | 1.2% |
Internet service provider | 3 | 1.2% |
Jury | 3 | 1.2% |
Katz v. United States | 3 | 1.2% |
Language | 3 | 1.2% |
Legal action | 3 | 1.2% |
Legal liability | 3 | 1.2% |
Literacy | 3 | 1.2% |
Management | 3 | 1.2% |
Media bias | 3 | 1.2% |
Member state of the European Union | 3 | 1.2% |
Meredith Whittaker | 3 | 1.2% |
Misinformation related to the COVID-19 pandemic | 3 | 1.2% |
Mobile phone | 3 | 1.2% |
Moderation system | 3 | 1.2% |
Morality | 3 | 1.2% |
Net neutrality | 3 | 1.2% |
Newspaper | 3 | 1.2% |
Omission (law) | 3 | 1.2% |
Organization | 3 | 1.2% |
Password | 3 | 1.2% |
Personal Information Protection and Electronic Documents Act | 3 | 1.2% |
Philosophy | 3 | 1.2% |
Privacy by design | 3 | 1.2% |
Privacy engineering | 3 | 1.2% |
Product liability | 3 | 1.2% |
Profiling (information science) | 3 | 1.2% |
Proportionality (law) | 3 | 1.2% |
Public participation | 3 | 1.2% |
Race (human categorization) | 3 | 1.2% |
Receiver operating characteristic | 3 | 1.2% |
Remand (detention) | 3 | 1.2% |
Retail | 3 | 1.2% |
Right to be forgotten | 3 | 1.2% |
Schengen Information System | 3 | 1.2% |
Sex robot | 3 | 1.2% |
Sexual harassment | 3 | 1.2% |
Shoplifting | 3 | 1.2% |
Software | 3 | 1.2% |
Speaker recognition | 3 | 1.2% |
State of emergency | 3 | 1.2% |
Statistical classification | 3 | 1.2% |
Sustainable Development Goals | 3 | 1.2% |
Telecommunication | 3 | 1.2% |
Terms of service | 3 | 1.2% |
Traffic collision | 3 | 1.2% |
Transparency of media ownership in Europe | 3 | 1.2% |
Transparency report | 3 | 1.2% |
U.S. state | 3 | 1.2% |
United Kingdom National DNA Database | 3 | 1.2% |
User-generated content | 3 | 1.2% |
Vladimir Putin | 3 | 1.2% |
Waste | 3 | 1.2% |
Weapon | 3 | 1.2% |
Website | 3 | 1.2% |
Witness | 3 | 1.2% |
Advanced persistent threat | 2 | 0.8% |
Airport | 2 | 0.8% |
Android (operating system) | 2 | 0.8% |
Anonymity | 2 | 0.8% |
Application software | 2 | 0.8% |
Attack on Pearl Harbor | 2 | 0.8% |
Attitude (psychology) | 2 | 0.8% |
Attorney general | 2 | 0.8% |
Automated Targeting System | 2 | 0.8% |
Backup | 2 | 0.8% |
Belt and Road Initiative | 2 | 0.8% |
Big Tech | 2 | 0.8% |
Bill (law) | 2 | 0.8% |
Brexit withdrawal agreement | 2 | 0.8% |
CSI effect | 2 | 0.8% |
Camera | 2 | 0.8% |
Capitalism | 2 | 0.8% |
Censorship in China | 2 | 0.8% |
Check-in | 2 | 0.8% |
Chokehold | 2 | 0.8% |
Citizenship | 2 | 0.8% |
Civic space | 2 | 0.8% |
Civil Rights Act of 1968 | 2 | 0.8% |
Communications Decency Act | 2 | 0.8% |
Community | 2 | 0.8% |
Complaint | 2 | 0.8% |
Computational linguistics | 2 | 0.8% |
Computer and network surveillance | 2 | 0.8% |
Computer data | 2 | 0.8% |
Computer science | 2 | 0.8% |
Computer virus | 2 | 0.8% |
Confidentiality | 2 | 0.8% |
Contact tracing | 2 | 0.8% |
Convention on Cybercrime | 2 | 0.8% |
Convolutional neural network | 2 | 0.8% |
Copyright | 2 | 0.8% |
Corporate governance | 2 | 0.8% |
Counter-terrorism | 2 | 0.8% |
Credit history | 2 | 0.8% |
Cryptography | 2 | 0.8% |
Curriculum | 2 | 0.8% |
Cybersecurity Law of the People's Republic of China | 2 | 0.8% |
DNA | 2 | 0.8% |
Daphne Caruana Galizia | 2 | 0.8% |
Dark web | 2 | 0.8% |
Data Retention Directive | 2 | 0.8% |
Data breach | 2 | 0.8% |
Data governance | 2 | 0.8% |
Data portability | 2 | 0.8% |
Data security | 2 | 0.8% |
Data sharing | 2 | 0.8% |
De-identification | 2 | 0.8% |
Deadly force | 2 | 0.8% |
Department of Motor Vehicles | 2 | 0.8% |
Deviance (sociology) | 2 | 0.8% |
Differential privacy | 2 | 0.8% |
Digital privacy | 2 | 0.8% |
Discretion | 2 | 0.8% |
Domain name | 2 | 0.8% |
Driver's license | 2 | 0.8% |
Dual-use technology | 2 | 0.8% |
Duty of care | 2 | 0.8% |
E-commerce | 2 | 0.8% |
E-government | 2 | 0.8% |
Emergency services | 2 | 0.8% |
Emotion | 2 | 0.8% |
End user | 2 | 0.8% |
Enlargement of the European Union | 2 | 0.8% |
Europe | 2 | 0.8% |
FaceApp | 2 | 0.8% |
Financial technology | 2 | 0.8% |
Flanders | 2 | 0.8% |
Florida v. Riley | 2 | 0.8% |
Foreign Intelligence Surveillance Act | 2 | 0.8% |
Fourteenth Amendment to the United States Constitution | 2 | 0.8% |
Freedom of information laws by country | 2 | 0.8% |
Fundamental rights in India | 2 | 0.8% |
Green card | 2 | 0.8% |
Health Insurance Portability and Accountability Act | 2 | 0.8% |
Homelessness | 2 | 0.8% |
Human rights defender | 2 | 0.8% |
IPhone X | 2 | 0.8% |
Identity management | 2 | 0.8% |
Implied cause of action | 2 | 0.8% |
Infection | 2 | 0.8% |
Information and communications technology | 2 | 0.8% |
Information management | 2 | 0.8% |
Information privacy law | 2 | 0.8% |
Information retrieval | 2 | 0.8% |
Institutional review board | 2 | 0.8% |
Intelligence analysis | 2 | 0.8% |
Interactive kiosk | 2 | 0.8% |
International Safe Harbor Privacy Principles | 2 | 0.8% |
International relations | 2 | 0.8% |
Internet censorship in China | 2 | 0.8% |
Internet troll | 2 | 0.8% |
Internet universality | 2 | 0.8% |
Judge | 2 | 0.8% |
Jurisdiction | 2 | 0.8% |
Law Enforcement Support Office | 2 | 0.8% |
Lawyer | 2 | 0.8% |
Legal remedy | 2 | 0.8% |
Life-cycle assessment | 2 | 0.8% |
Lynching | 2 | 0.8% |
Lynching in the United States | 2 | 0.8% |
Mass surveillance in China | 2 | 0.8% |
Monopoly | 2 | 0.8% |
Murder of Ján Kuciak | 2 | 0.8% |
New media | 2 | 0.8% |
Non-governmental organization | 2 | 0.8% |
Omnibus Crime Control and Safe Streets Act of 1968 | 2 | 0.8% |
Online and offline | 2 | 0.8% |
Online hate speech | 2 | 0.8% |
Open-source model | 2 | 0.8% |
Operating system | 2 | 0.8% |
Opt-out | 2 | 0.8% |
Opt-outs in the European Union | 2 | 0.8% |
Patent | 2 | 0.8% |
Patriot Act | 2 | 0.8% |
Perception | 2 | 0.8% |
Performance indicator | 2 | 0.8% |
Petya (malware) | 2 | 0.8% |
Photography | 2 | 0.8% |
Pluralism (political theory) | 2 | 0.8% |
Police car | 2 | 0.8% |
Police officer | 2 | 0.8% |
Prediction | 2 | 0.8% |
Privacy-enhancing technologies | 2 | 0.8% |
Process (computing) | 2 | 0.8% |
Psychological warfare | 2 | 0.8% |
Psychology | 2 | 0.8% |
Public broadcasting | 2 | 0.8% |
Radicalization | 2 | 0.8% |
Reason | 2 | 0.8% |
Records management | 2 | 0.8% |
Red team | 2 | 0.8% |
Regulation of Investigatory Powers Act 2000 | 2 | 0.8% |
Rehabilitation Act of 1973 | 2 | 0.8% |
Resisting arrest | 2 | 0.8% |
Right to a fair trial | 2 | 0.8% |
Right to privacy in New Zealand | 2 | 0.8% |
Schengen Agreement | 2 | 0.8% |
Section 504 of the Rehabilitation Act | 2 | 0.8% |
Security engineering | 2 | 0.8% |
Security hacker | 2 | 0.8% |
Security technology | 2 | 0.8% |
Shamoon | 2 | 0.8% |
Simulation | 2 | 0.8% |
Smartphone | 2 | 0.8% |
Social Security number | 2 | 0.8% |
Social networking service | 2 | 0.8% |
Soft power | 2 | 0.8% |
Spamming | 2 | 0.8% |
Spyware | 2 | 0.8% |
Standardization | 2 | 0.8% |
Statistics | 2 | 0.8% |
Strategic communication | 2 | 0.8% |
Strategic lawsuit against public participation | 2 | 0.8% |
Strategy | 2 | 0.8% |
Stuxnet | 2 | 0.8% |
Surveillance capitalism | 2 | 0.8% |
Telecommuting | 2 | 0.8% |
Testimony | 2 | 0.8% |
ToTok (app) | 2 | 0.8% |
Transphobia | 2 | 0.8% |
Treaty of Lisbon | 2 | 0.8% |
Trial | 2 | 0.8% |
Tribunal | 2 | 0.8% |
Turing Research | 2 | 0.8% |
United Nations Guiding Principles on Business and Human Rights | 2 | 0.8% |
United States passport | 2 | 0.8% |
Unmanned underwater vehicle | 2 | 0.8% |
Use of force | 2 | 0.8% |
Uyghurs | 2 | 0.8% |
Value (ethics) | 2 | 0.8% |
Video | 2 | 0.8% |
Vine (service) | 2 | 0.8% |
Virtual assistant | 2 | 0.8% |
Visa Information System | 2 | 0.8% |
Voter suppression in the United States | 2 | 0.8% |
WHOIS | 2 | 0.8% |
Waiver | 2 | 0.8% |
War | 2 | 0.8% |
Xi Jinping | 2 | 0.8% |
Zeus (malware) | 2 | 0.8% |
18th National Congress of the Communist Party of China | 1 | 0.4% |
2011 Canadian federal election voter suppression scandal | 1 | 0.4% |
2018 North Korea–United States Singapore Summit | 1 | 0.4% |
2019 Canadian federal election | 1 | 0.4% |
2019–20 coronavirus pandemic | 1 | 0.4% |
Aadhaar | 1 | 0.4% |
Accident | 1 | 0.4% |
Acquittal | 1 | 0.4% |
Active measures | 1 | 0.4% |
Activism | 1 | 0.4% |
Address geocoding | 1 | 0.4% |
Adjudication | 1 | 0.4% |
Administrative Procedure Act (United States) | 1 | 0.4% |
Administrative law judge | 1 | 0.4% |
Admissible evidence | 1 | 0.4% |
Admission to the bar in the United States | 1 | 0.4% |
Aerial photography | 1 | 0.4% |
Africa | 1 | 0.4% |
African Americans | 1 | 0.4% |
Alien (law) | 1 | 0.4% |
Amazon Alexa | 1 | 0.4% |
Amitav Acharya | 1 | 0.4% |
Anna Politkovskaya | 1 | 0.4% |
Anti-Counterfeiting Trade Agreement | 1 | 0.4% |
Anti-discrimination law | 1 | 0.4% |
Anti-spam techniques | 1 | 0.4% |
Appeal | 1 | 0.4% |
Archive | 1 | 0.4% |
Arms control | 1 | 0.4% |
Art | 1 | 0.4% |
Article 101 of the Treaty on the Functioning of the European Union | 1 | 0.4% |
Article Three of the United States Constitution | 1 | 0.4% |
Artistic freedom | 1 | 0.4% |
Asia | 1 | 0.4% |
Assault | 1 | 0.4% |
Attorney's fee | 1 | 0.4% |
Augmented reality | 1 | 0.4% |
BBC iPlayer | 1 | 0.4% |
Ballot | 1 | 0.4% |
Bank | 1 | 0.4% |
Bank Secrecy Act | 1 | 0.4% |
Bioethics | 1 | 0.4% |
Biology | 1 | 0.4% |
Biometric Information Privacy Act | 1 | 0.4% |
Biometric device | 1 | 0.4% |
Biostatistics | 1 | 0.4% |
Blog | 1 | 0.4% |
Body camera | 1 | 0.4% |
Body worn video (police equipment) | 1 | 0.4% |
Border search exception | 1 | 0.4% |
Botnet | 1 | 0.4% |
Brain | 1 | 0.4% |
Brand | 1 | 0.4% |
Brazilian Civil Rights Framework for the Internet | 1 | 0.4% |
Brexit | 1 | 0.4% |
Brief (law) | 1 | 0.4% |
Burden of proof (law) | 1 | 0.4% |
Business ethics | 1 | 0.4% |
CAPTCHA | 1 | 0.4% |
CLOUD Act | 1 | 0.4% |
COMPAS (software) | 1 | 0.4% |
COVID-19 apps | 1 | 0.4% |
COVID-19 misinformation | 1 | 0.4% |
Cabinet (government) | 1 | 0.4% |
Cambodian Americans | 1 | 0.4% |
Campaign finance | 1 | 0.4% |
Campaign finance in the United States | 1 | 0.4% |
Canadian federalism | 1 | 0.4% |
Capital punishment | 1 | 0.4% |
Carter Page | 1 | 0.4% |
Causality | 1 | 0.4% |
Chairperson | 1 | 0.4% |
Charter of the United Nations | 1 | 0.4% |
Chatbot | 1 | 0.4% |
Chief information officer | 1 | 0.4% |
Child | 1 | 0.4% |
Child protection | 1 | 0.4% |
Children's Online Privacy Protection Act | 1 | 0.4% |
China–United States trade war | 1 | 0.4% |
Christine Blasey Ford | 1 | 0.4% |
Citizenship of the European Union | 1 | 0.4% |
Civil Rights Act of 1964 | 1 | 0.4% |
Civil and political rights | 1 | 0.4% |
Civil law (legal system) | 1 | 0.4% |
Civil service | 1 | 0.4% |
Civil society | 1 | 0.4% |
Class action | 1 | 0.4% |
Codification (law) | 1 | 0.4% |
Commerce Clause | 1 | 0.4% |
Common Foreign and Security Policy | 1 | 0.4% |
Communication protocol | 1 | 0.4% |
Community media | 1 | 0.4% |
Community radio | 1 | 0.4% |
Competition (economics) | 1 | 0.4% |
Computer Fraud and Abuse Act | 1 | 0.4% |
Computer forensics | 1 | 0.4% |
Computer program | 1 | 0.4% |
Conceptual model | 1 | 0.4% |
Conference on the Future of Europe | 1 | 0.4% |
Consciousness | 1 | 0.4% |
Consensus decision-making | 1 | 0.4% |
Conservatism | 1 | 0.4% |
Constitution | 1 | 0.4% |
Constitution of Finland | 1 | 0.4% |
Constitutional review | 1 | 0.4% |
Contractual term | 1 | 0.4% |
Convention on the Rights of the Child | 1 | 0.4% |
Coronavirus Act 2020 | 1 | 0.4% |
Corporate surveillance | 1 | 0.4% |
Corruption | 1 | 0.4% |
Counterfeit consumer goods | 1 | 0.4% |
Court | 1 | 0.4% |
Crime analysis | 1 | 0.4% |
Criminal Code of Finland | 1 | 0.4% |
Criminal procedure in South Africa | 1 | 0.4% |
Criminology | 1 | 0.4% |
Crisis management | 1 | 0.4% |
Crossfire Hurricane (FBI investigation) | 1 | 0.4% |
Cruise ship | 1 | 0.4% |
Cryptocurrency | 1 | 0.4% |
Cubby, Inc. v. CompuServe Inc. | 1 | 0.4% |
Customary international law | 1 | 0.4% |
Customer | 1 | 0.4% |
Customer experience | 1 | 0.4% |
Cyberwarfare by Russia | 1 | 0.4% |
Darknet market | 1 | 0.4% |
Dassault/Dornier Alpha Jet | 1 | 0.4% |
Data analysis | 1 | 0.4% |
Data center | 1 | 0.4% |
Data sovereignty | 1 | 0.4% |
DataWorks Plus | 1 | 0.4% |
Death of Freddie Gray | 1 | 0.4% |
Debate | 1 | 0.4% |
Declaration on the Rights of Indigenous Peoples | 1 | 0.4% |
DeepFace | 1 | 0.4% |
Demography | 1 | 0.4% |
Denial-of-service attack | 1 | 0.4% |
Dependent and independent variables | 1 | 0.4% |
Deplatforming | 1 | 0.4% |
Design | 1 | 0.4% |
Digital divide | 1 | 0.4% |
Digital economy | 1 | 0.4% |
Digital forensics | 1 | 0.4% |
Digital image | 1 | 0.4% |
Digital journalism | 1 | 0.4% |
Digital literacy | 1 | 0.4% |
Digital marketing | 1 | 0.4% |
Digital media | 1 | 0.4% |
Digital signature | 1 | 0.4% |
Digital transformation | 1 | 0.4% |
Diplomacy | 1 | 0.4% |
Disability | 1 | 0.4% |
Disparate impact | 1 | 0.4% |
Dmitry Medvedev | 1 | 0.4% |
Domain Name System | 1 | 0.4% |
Domestic violence | 1 | 0.4% |
Donald Trump on social media | 1 | 0.4% |
Dormant Commerce Clause | 1 | 0.4% |
Doxing | 1 | 0.4% |
Due Process Clause | 1 | 0.4% |
E-democracy | 1 | 0.4% |
E-services | 1 | 0.4% |
EHealth | 1 | 0.4% |
East Africa | 1 | 0.4% |
Economic sanctions | 1 | 0.4% |
Economics | 1 | 0.4% |
Economies of scale | 1 | 0.4% |
Economy | 1 | 0.4% |
Edi Rama | 1 | 0.4% |
Educational technology | 1 | 0.4% |
Edward Snowden | 1 | 0.4% |
Elections to the European Parliament | 1 | 0.4% |
Electroencephalography | 1 | 0.4% |
Electronic Communications Privacy Act | 1 | 0.4% |
Emergency | 1 | 0.4% |
Emerging technologies | 1 | 0.4% |
Employment discrimination law in the United States | 1 | 0.4% |
Equal Protection Clause | 1 | 0.4% |
Eur-Lex | 1 | 0.4% |
Euro | 1 | 0.4% |
Euroscepticism | 1 | 0.4% |
Evidence (law) | 1 | 0.4% |
Exif | 1 | 0.4% |
Existential risk from artificial general intelligence | 1 | 0.4% |
Experience curve effects | 1 | 0.4% |
Experiment | 1 | 0.4% |
Expert system | 1 | 0.4% |
Expert witness | 1 | 0.4% |
Export | 1 | 0.4% |
Exposure (photography) | 1 | 0.4% |
Exposure Notification | 1 | 0.4% |
Extremism | 1 | 0.4% |
FBI–Apple encryption dispute | 1 | 0.4% |
Face ID | 1 | 0.4% |
Face perception | 1 | 0.4% |
Facial expression | 1 | 0.4% |
Facilitator | 1 | 0.4% |
Fair Credit Reporting Act | 1 | 0.4% |
Fair Housing Council of San Fernando Valley v. Roommates.com, LLC | 1 | 0.4% |
Fake news website | 1 | 0.4% |
FedRAMP | 1 | 0.4% |
Federal Information Security Management Act of 2002 | 1 | 0.4% |
Federal preemption | 1 | 0.4% |
Federica Mogherini | 1 | 0.4% |
Felony | 1 | 0.4% |
File system | 1 | 0.4% |
Filter bubble | 1 | 0.4% |
Financial intelligence | 1 | 0.4% |
First Nations | 1 | 0.4% |
First They Killed My Father (film) | 1 | 0.4% |
Focus group | 1 | 0.4% |
Forensic dentistry | 1 | 0.4% |
Forgery | 1 | 0.4% |
Freedom of information | 1 | 0.4% |
Freedom of speech in the United States | 1 | 0.4% |
Fulton MacGregor | 1 | 0.4% |
Futures studies | 1 | 0.4% |
Félicien Kabuga | 1 | 0.4% |
Genetic testing | 1 | 0.4% |
Geneva Conventions | 1 | 0.4% |
Genocide | 1 | 0.4% |
Geographic information system | 1 | 0.4% |
Geolocation | 1 | 0.4% |
Giovanni Buttarelli | 1 | 0.4% |
Google Drive | 1 | 0.4% |
Government agency | 1 | 0.4% |
Government by algorithm | 1 | 0.4% |
Great Firewall | 1 | 0.4% |
Guccifer 2.0 | 1 | 0.4% |
HKmap.live | 1 | 0.4% |
Hacker | 1 | 0.4% |
Hair analysis | 1 | 0.4% |
Hashtag | 1 | 0.4% |
Hate crime | 1 | 0.4% |
Hatred | 1 | 0.4% |
Health informatics | 1 | 0.4% |
Health technology in the United States | 1 | 0.4% |
Hearsay | 1 | 0.4% |
High Representative of the Union for Foreign Affairs and Security Policy | 1 | 0.4% |
Hillary Clinton | 1 | 0.4% |
Huang Jing (academic) | 1 | 0.4% |
Human nature | 1 | 0.4% |
Human subject research | 1 | 0.4% |
Human trafficking | 1 | 0.4% |
Hybrid warfare | 1 | 0.4% |
Hypothesis | 1 | 0.4% |
IDENT1 | 1 | 0.4% |
IOS | 1 | 0.4% |
IPhone | 1 | 0.4% |
IT law | 1 | 0.4% |
Illiberal democracy | 1 | 0.4% |
Illinois v. Gates | 1 | 0.4% |
Immersion (virtual reality) | 1 | 0.4% |
Impressionism | 1 | 0.4% |
Incentive | 1 | 0.4% |
Industry (economics) | 1 | 0.4% |
Inference | 1 | 0.4% |
Information Technology Act, 2000 | 1 | 0.4% |
Information system | 1 | 0.4% |
Information warfare | 1 | 0.4% |
Informed consent | 1 | 0.4% |
Initiative | 1 | 0.4% |
Injunction | 1 | 0.4% |
Inspection | 1 | 0.4% |
Inspector General report on the Crossfire Hurricane investigation | 1 | 0.4% |
Insurance | 1 | 0.4% |
Interdisciplinarity | 1 | 0.4% |
Internal control | 1 | 0.4% |
International Convention on the Elimination of All Forms of Racial Discrimination | 1 | 0.4% |
International Emergency Economic Powers Act | 1 | 0.4% |
International Traffic in Arms Regulations | 1 | 0.4% |
International criminal law | 1 | 0.4% |
International human rights law | 1 | 0.4% |
International humanitarian law | 1 | 0.4% |
International sanctions during the Ukrainian crisis | 1 | 0.4% |
Internet celebrity | 1 | 0.4% |
Internet censorship | 1 | 0.4% |
Internet fraud | 1 | 0.4% |
Internet geolocation | 1 | 0.4% |
Internet manipulation | 1 | 0.4% |
Internet meme | 1 | 0.4% |
Internet protocol suite | 1 | 0.4% |
Intrusion detection system | 1 | 0.4% |
Inventory | 1 | 0.4% |
Investment | 1 | 0.4% |
Investment Advisers Act of 1940 | 1 | 0.4% |
Istanbul Protocol | 1 | 0.4% |
Ivan Golunov | 1 | 0.4% |
Jeremy Corbyn | 1 | 0.4% |
Jessikka Aro | 1 | 0.4% |
Joan Donovan | 1 | 0.4% |
Journalism ethics and standards | 1 | 0.4% |
Juan Guaidó | 1 | 0.4% |
Judgment (law) | 1 | 0.4% |
Judicial disqualification | 1 | 0.4% |
Juvenile delinquency | 1 | 0.4% |
Karrie Karahalios | 1 | 0.4% |
Khadija Ismayilova | 1 | 0.4% |
Knowledge | 1 | 0.4% |
Knowledge representation and reasoning | 1 | 0.4% |
Kommunikationsbehörde Austria | 1 | 0.4% |
Kronstadt | 1 | 0.4% |
Laboratory | 1 | 0.4% |
Languages of the European Union | 1 | 0.4% |
Law enforcement in the United States | 1 | 0.4% |
Law of the United States | 1 | 0.4% |
Law of war | 1 | 0.4% |
Leadership | 1 | 0.4% |
Legal certainty | 1 | 0.4% |
Legal concepts | 1 | 0.4% |
Liberalism | 1 | 0.4% |
Liberty | 1 | 0.4% |
Likelihood function | 1 | 0.4% |
Lockheed Martin F-35 Lightning II | 1 | 0.4% |
Logarithm | 1 | 0.4% |
Logic | 1 | 0.4% |
Margin of appreciation | 1 | 0.4% |
Mariano-Florentino Cuéllar | 1 | 0.4% |
Marketing strategy | 1 | 0.4% |
Maryland v. King | 1 | 0.4% |
Mass atrocity crimes | 1 | 0.4% |
Master of Laws | 1 | 0.4% |
Mayor | 1 | 0.4% |
McCleskey v. Kemp | 1 | 0.4% |
Media analysis | 1 | 0.4% |
Media development | 1 | 0.4% |
Media independence | 1 | 0.4% |
Medical ethics | 1 | 0.4% |
Medical imaging | 1 | 0.4% |
Medical privacy | 1 | 0.4% |
Mexico–United States border | 1 | 0.4% |
Microtargeting | 1 | 0.4% |
Mike Pompeo | 1 | 0.4% |
Military science | 1 | 0.4% |
Milorad Dodik | 1 | 0.4% |
Mind | 1 | 0.4% |
Minnesota Protocol | 1 | 0.4% |
Miscarriage of justice | 1 | 0.4% |
Misconduct | 1 | 0.4% |
Misdemeanor | 1 | 0.4% |
Misinformation related to the 2019–20 coronavirus pandemic | 1 | 0.4% |
Mobile device forensics | 1 | 0.4% |
Mobile phone tracking | 1 | 0.4% |
Mobile security | 1 | 0.4% |
Mueller Report | 1 | 0.4% |
Mug shot | 1 | 0.4% |
Multi-stakeholder governance | 1 | 0.4% |
Multilateralism | 1 | 0.4% |
National Instant Criminal Background Check System | 1 | 0.4% |
National security letter | 1 | 0.4% |
Natural resource | 1 | 0.4% |
Nervous system | 1 | 0.4% |
Neural network | 1 | 0.4% |
Neuron | 1 | 0.4% |
New Zealand Bill of Rights Act 1990 | 1 | 0.4% |
Nick Bostrom | 1 | 0.4% |
Nicolás Maduro | 1 | 0.4% |
Nigel Farage | 1 | 0.4% |
Nikol Pashinyan | 1 | 0.4% |
Nolo contendere | 1 | 0.4% |
Non-lethal weapon | 1 | 0.4% |
Nonprofit organization | 1 | 0.4% |
Notice and take down | 1 | 0.4% |
Nuclear proliferation | 1 | 0.4% |
Online dating application | 1 | 0.4% |
Online newspaper | 1 | 0.4% |
Open data | 1 | 0.4% |
Open source | 1 | 0.4% |
Opinion | 1 | 0.4% |
Opioid epidemic in the United States | 1 | 0.4% |
Optical character recognition | 1 | 0.4% |
Organized crime | 1 | 0.4% |
Ownership | 1 | 0.4% |
P3P | 1 | 0.4% |
Packingham v. North Carolina | 1 | 0.4% |
Parliamentary Ombudsman | 1 | 0.4% |
Parole | 1 | 0.4% |
Party (law) | 1 | 0.4% |
Paul Virilio | 1 | 0.4% |
Paywall | 1 | 0.4% |
Peremptory norm | 1 | 0.4% |
Persuasion | 1 | 0.4% |
PewDiePie | 1 | 0.4% |
Photograph manipulation | 1 | 0.4% |
Physical security | 1 | 0.4% |
Pickpocketing | 1 | 0.4% |
Pixel | 1 | 0.4% |
Plea | 1 | 0.4% |
Podcast | 1 | 0.4% |
Poisoning of Sergei and Yulia Skripal | 1 | 0.4% |
Politics and technology | 1 | 0.4% |
Polling place | 1 | 0.4% |
Polymerase chain reaction | 1 | 0.4% |
Port security | 1 | 0.4% |
Poverty | 1 | 0.4% |
Prejudice | 1 | 0.4% |
Presidency of Donald Trump | 1 | 0.4% |
President of the United States | 1 | 0.4% |
Presumption of innocence | 1 | 0.4% |
Prisoner | 1 | 0.4% |
Privacy Commissioner (New Zealand) | 1 | 0.4% |
Privacy laws of the United States | 1 | 0.4% |
Private Securities Litigation Reform Act | 1 | 0.4% |
Procurator fiscal | 1 | 0.4% |
Procurement | 1 | 0.4% |
Productivity | 1 | 0.4% |
Project Solarium | 1 | 0.4% |
Psychological manipulation | 1 | 0.4% |
Public health | 1 | 0.4% |
Public–private partnership | 1 | 0.4% |
Punishment | 1 | 0.4% |
Qualitative research | 1 | 0.4% |
Quality assurance | 1 | 0.4% |
Quality of life | 1 | 0.4% |
Racism | 1 | 0.4% |
Radio-frequency identification | 1 | 0.4% |
Rafael Correa | 1 | 0.4% |
Ramzan Kadyrov | 1 | 0.4% |
Rape | 1 | 0.4% |
Rapid DNA | 1 | 0.4% |
ReCAPTCHA | 1 | 0.4% |
Real ID Act | 1 | 0.4% |
Reasonable doubt | 1 | 0.4% |
Recidivism | 1 | 0.4% |
Record linkage | 1 | 0.4% |
Refugee | 1 | 0.4% |
Regulatory risk differentiation | 1 | 0.4% |
Relevance (law) | 1 | 0.4% |
Requirement | 1 | 0.4% |
Research and development | 1 | 0.4% |
Resource | 1 | 0.4% |
Riley v. California | 1 | 0.4% |
Risk management | 1 | 0.4% |
Robert Muggah | 1 | 0.4% |
Robert Winston | 1 | 0.4% |
Robocall | 1 | 0.4% |
Robot ethics | 1 | 0.4% |
Romance scam | 1 | 0.4% |
Rome Statute of the International Criminal Court | 1 | 0.4% |
Rulemaking | 1 | 0.4% |
Russian language | 1 | 0.4% |
Russian military deception | 1 | 0.4% |
Rwandan genocide | 1 | 0.4% |
S and Marper v United Kingdom | 1 | 0.4% |
Sanitization (classified information) | 1 | 0.4% |
Screenshot | 1 | 0.4% |
Search engine | 1 | 0.4% |
Secure Flight | 1 | 0.4% |
Security token | 1 | 0.4% |
Self-censorship | 1 | 0.4% |
Selfie | 1 | 0.4% |
Sensor | 1 | 0.4% |
September 11 attacks | 1 | 0.4% |
Sex worker | 1 | 0.4% |
Sharyl Attkisson | 1 | 0.4% |
Sheriffs in the United States | 1 | 0.4% |
Signature | 1 | 0.4% |
Smart power | 1 | 0.4% |
Smart transducer | 1 | 0.4% |
Social inequality | 1 | 0.4% |
Social justice | 1 | 0.4% |
Social norm | 1 | 0.4% |
Socialism | 1 | 0.4% |
Sociological theories | 1 | 0.4% |
Sociotechnical system | 1 | 0.4% |
Solid-state drive | 1 | 0.4% |
Sortition | 1 | 0.4% |
Sousveillance | 1 | 0.4% |
South Asia | 1 | 0.4% |
Speaker of the House of Representatives (Netherlands) | 1 | 0.4% |
Special agent | 1 | 0.4% |
Special needs exception | 1 | 0.4% |
Speech | 1 | 0.4% |
Speed limit | 1 | 0.4% |
Standards organization | 1 | 0.4% |
Standing (law) | 1 | 0.4% |
Startup company | 1 | 0.4% |
State law (United States) | 1 | 0.4% |
State media | 1 | 0.4% |
State of the Union | 1 | 0.4% |
Statistical hypothesis testing | 1 | 0.4% |
Statutory interpretation | 1 | 0.4% |
Statutory law | 1 | 0.4% |
Stingray phone tracker | 1 | 0.4% |
Stop Enabling Sex Traffickers Act | 1 | 0.4% |
Stop-and-frisk in New York City | 1 | 0.4% |
Stored Communications Act | 1 | 0.4% |
Stylometry | 1 | 0.4% |
Subversion | 1 | 0.4% |
Sunset provision | 1 | 0.4% |
Supercomputer | 1 | 0.4% |
Superpower | 1 | 0.4% |
Supplemental Security Income | 1 | 0.4% |
Supply chain | 1 | 0.4% |
Supply chain attack | 1 | 0.4% |
Support-vector machine | 1 | 0.4% |
Systemic risk | 1 | 0.4% |
Tallinn Manual | 1 | 0.4% |
Targeted surveillance | 1 | 0.4% |
Tax | 1 | 0.4% |
Taylor v Attorney-General | 1 | 0.4% |
Technological singularity | 1 | 0.4% |
Technology roadmap | 1 | 0.4% |
Telephone Consumer Protection Act of 1991 | 1 | 0.4% |
Television | 1 | 0.4% |
Television licensing in the United Kingdom | 1 | 0.4% |
Terrorism financing | 1 | 0.4% |
Terrorist Finance Tracking Program | 1 | 0.4% |
Test (assessment) | 1 | 0.4% |
Text messaging | 1 | 0.4% |
The Emergency (India) | 1 | 0.4% |
Think tank | 1 | 0.4% |
Third-party doctrine | 1 | 0.4% |
Thought | 1 | 0.4% |
Threat (computer) | 1 | 0.4% |
Time | 1 | 0.4% |
Tony Hall, Baron Hall of Birkenhead | 1 | 0.4% |
Tor (anonymity network) | 1 | 0.4% |
Torture | 1 | 0.4% |
Trade | 1 | 0.4% |
Traffic | 1 | 0.4% |
Training | 1 | 0.4% |
Transnational organized crime | 1 | 0.4% |
Trash (computing) | 1 | 0.4% |
Treaty on the Functioning of the European Union | 1 | 0.4% |
Trim (computing) | 1 | 0.4% |
Trust law | 1 | 0.4% |
Truth | 1 | 0.4% |
Turing test | 1 | 0.4% |
Understanding | 1 | 0.4% |
United Kingdom company law | 1 | 0.4% |
United States courts of appeals | 1 | 0.4% |
United States cyber-diplomacy | 1 | 0.4% |
United States federal probation and supervised release | 1 | 0.4% |
United States nationality law | 1 | 0.4% |
Universal jurisdiction | 1 | 0.4% |
Vehicular automation | 1 | 0.4% |
Verification and validation | 1 | 0.4% |
Victimology | 1 | 0.4% |
Victoria Derbyshire | 1 | 0.4% |
Violent extremism | 1 | 0.4% |
Virtual private network | 1 | 0.4% |
Virtual reality | 1 | 0.4% |
Visa Waiver Program | 1 | 0.4% |
Voice user interface | 1 | 0.4% |
War crime | 1 | 0.4% |
Washington v. Davis | 1 | 0.4% |
Web scraping | 1 | 0.4% |
Wildlife trade | 1 | 0.4% |
Wind power | 1 | 0.4% |
World Summit on the Information Society | 1 | 0.4% |
World War II | 1 | 0.4% |
Write amplification | 1 | 0.4% |
Xinjiang re-education camps | 1 | 0.4% |
Y-STR | 1 | 0.4% |
abs | rel | |
---|---|---|
Human activities | 282 | 94.6% |
Politics | 248 | 83.2% |
Policy | 214 | 71.8% |
Government | 211 | 70.8% |
Issues in ethics | 203 | 68.1% |
Law | 201 | 67.4% |
Justice | 195 | 65.4% |
Applied ethics | 176 | 59.1% |
Artificial intelligence | 157 | 52.7% |
Privacy | 152 | 51.0% |
Public sphere | 142 | 47.7% |
Social institutions | 140 | 47.0% |
Technology | 137 | 46.0% |
Risk | 113 | 37.9% |
Surveillance | 106 | 35.6% |
Biometrics | 104 | 34.9% |
Facial recognition system | 96 | 32.2% |
Personal data | 94 | 31.5% |
Human rights | 93 | 31.2% |
Information privacy | 93 | 31.2% |
Social media | 90 | 30.2% |
Rights | 88 | 29.5% |
Crime | 84 | 28.2% |
General Data Protection Regulation | 79 | 26.5% |
Information | 78 | 26.2% |
Transparency (behavior) | 76 | 25.5% |
Communication | 74 | 24.8% |
Social issues | 70 | 23.5% |
Freedom of speech | 67 | 22.5% |
Ethical principles | 61 | 20.5% |
Research | 59 | 19.8% |
Computer security | 56 | 18.8% |
Internet | 55 | 18.5% |
National security | 55 | 18.5% |
Regulatory compliance | 55 | 18.5% |
Bias | 54 | 18.1% |
Ethics | 54 | 18.1% |
Governance | 54 | 18.1% |
Computing | 51 | 17.1% |
Democracy | 50 | 16.8% |
Public law | 47 | 15.8% |
Accountability | 44 | 14.8% |
Discrimination | 44 | 14.8% |
Identity document | 44 | 14.8% |
Disinformation | 41 | 13.8% |
System | 40 | 13.4% |
Machine learning | 38 | 12.8% |
Misinformation | 37 | 12.4% |
European Union law | 36 | 12.1% |
Political science | 35 | 11.7% |
Closed-circuit television | 34 | 11.4% |
Authentication | 29 | 9.7% |
COVID-19 pandemic | 29 | 9.7% |
Safety | 29 | 9.7% |
Health | 28 | 9.4% |
Information technology | 28 | 9.4% |
Mass media | 28 | 9.4% |
News | 28 | 9.4% |
Advertising | 27 | 9.1% |
Right to privacy | 27 | 9.1% |
Censorship | 26 | 8.7% |
Directive (European Union) | 26 | 8.7% |
Government and personhood | 26 | 8.7% |
Privacy law | 26 | 8.7% |
Fact-checking | 24 | 8.1% |
Human nature | 24 | 8.1% |
Mass surveillance | 24 | 8.1% |
Branches of science | 23 | 7.7% |
Civil rights and liberties | 23 | 7.7% |
Anonymity | 22 | 7.4% |
Audit | 22 | 7.4% |
Data | 22 | 7.4% |
European Convention on Human Rights | 22 | 7.4% |
Decision-making | 21 | 7.0% |
Deepfake | 21 | 7.0% |
Education | 21 | 7.0% |
Fingerprint | 21 | 7.0% |
Intelligence | 21 | 7.0% |
Treaty on European Union | 21 | 7.0% |
Common law | 20 | 6.7% |
Consent | 20 | 6.7% |
Fundamental rights | 20 | 6.7% |
Journalism | 20 | 6.7% |
Accuracy and precision | 19 | 6.4% |
Automation | 19 | 6.4% |
Propaganda | 19 | 6.4% |
Algorithm | 18 | 6.0% |
Citizenship | 18 | 6.0% |
Cyberspace | 18 | 6.0% |
Fake news | 18 | 6.0% |
Innovation | 18 | 6.0% |
Prosecutor | 18 | 6.0% |
Rule of law | 18 | 6.0% |
Security | 18 | 6.0% |
Contract | 17 | 5.7% |
Fundamental rights in India | 17 | 5.7% |
Occupational safety and health | 17 | 5.7% |
Concepts in metaphysics | 16 | 5.4% |
International Covenant on Civil and Political Rights | 16 | 5.4% |
Online and offline | 16 | 5.4% |
Treaty | 16 | 5.4% |
Arrest | 15 | 5.0% |
Border control | 15 | 5.0% |
CE marking | 15 | 5.0% |
Charter of Fundamental Rights of the European Union | 15 | 5.0% |
Discovery (law) | 15 | 5.0% |
Election | 15 | 5.0% |
Reason | 15 | 5.0% |
Algorithmic bias | 14 | 4.7% |
Behavior | 14 | 4.7% |
Criminal justice | 14 | 4.7% |
Criminal law | 14 | 4.7% |
Data Protection Directive | 14 | 4.7% |
Data retention | 14 | 4.7% |
Database | 14 | 4.7% |
Information Age | 14 | 4.7% |
Notified body | 14 | 4.7% |
Profiling (information science) | 14 | 4.7% |
Analytics | 13 | 4.4% |
Civil society | 13 | 4.4% |
Cyberwarfare | 13 | 4.4% |
Deep learning | 13 | 4.4% |
Electronic Commerce Directive 2000 | 13 | 4.4% |
Internet of things | 13 | 4.4% |
Law enforcement | 13 | 4.4% |
Regulation | 13 | 4.4% |
Risk management | 13 | 4.4% |
Strategic lawsuit against public participation | 13 | 4.4% |
Business | 12 | 4.0% |
Cyberattack | 12 | 4.0% |
Freedom of the press | 12 | 4.0% |
Online advertising | 12 | 4.0% |
Proportionality (law) | 12 | 4.0% |
Schengen Area | 12 | 4.0% |
Terrorism | 12 | 4.0% |
Transparency of media ownership in Europe | 12 | 4.0% |
Visa policy of the Schengen Area | 12 | 4.0% |
Concentration of media ownership | 11 | 3.7% |
Evaluation | 11 | 3.7% |
Forensic science | 11 | 3.7% |
Information sensitivity | 11 | 3.7% |
Member state of the European Union | 11 | 3.7% |
Network Enforcement Act | 11 | 3.7% |
Training, validation, and test sets | 11 | 3.7% |
Violence | 11 | 3.7% |
COVID-19 misinformation | 10 | 3.4% |
Digital rights | 10 | 3.4% |
Economic, social and cultural rights | 10 | 3.4% |
Internet privacy | 10 | 3.4% |
Police body camera | 10 | 3.4% |
Privacy policy | 10 | 3.4% |
Risk assessment | 10 | 3.4% |
Schengen Information System | 10 | 3.4% |
Travel visa | 10 | 3.4% |
World Wide Web | 10 | 3.4% |
Authoritarianism | 9 | 3.0% |
Digital Services Act | 9 | 3.0% |
Expert | 9 | 3.0% |
Freedom of information | 9 | 3.0% |
Human rights defender | 9 | 3.0% |
Inference | 9 | 3.0% |
Information security | 9 | 3.0% |
Interoperability | 9 | 3.0% |
Judiciary | 9 | 3.0% |
Jurisdiction | 9 | 3.0% |
Media pluralism | 9 | 3.0% |
Predictive policing | 9 | 3.0% |
Racism | 9 | 3.0% |
Requirement | 9 | 3.0% |
Section 230 | 9 | 3.0% |
Social dialogue | 9 | 3.0% |
Treaty on the Functioning of the European Union | 9 | 3.0% |
Vulnerability (computing) | 9 | 3.0% |
Big data | 8 | 2.7% |
Blockchain | 8 | 2.7% |
Cloud computing | 8 | 2.7% |
Criminal record | 8 | 2.7% |
Cybercrime | 8 | 2.7% |
Defamation | 8 | 2.7% |
European Arrest Warrant | 8 | 2.7% |
Evidence | 8 | 2.7% |
Freedom of information laws by country | 8 | 2.7% |
Hate speech | 8 | 2.7% |
Iris recognition | 8 | 2.7% |
Judgment (law) | 8 | 2.7% |
Lawsuit | 8 | 2.7% |
Learning | 8 | 2.7% |
Reliability engineering | 8 | 2.7% |
Remand (detention) | 8 | 2.7% |
Science | 8 | 2.7% |
Type approval | 8 | 2.7% |
Universal Declaration of Human Rights | 8 | 2.7% |
Unmanned aerial vehicle | 8 | 2.7% |
Witness | 8 | 2.7% |
5G | 7 | 2.3% |
Automatic number-plate recognition | 7 | 2.3% |
Civic space | 7 | 2.3% |
Competition | 7 | 2.3% |
Computer network | 7 | 2.3% |
Constitution of the United States | 7 | 2.3% |
Coronavirus disease 2019 | 7 | 2.3% |
Crime prevention | 7 | 2.3% |
Digital identity | 7 | 2.3% |
Digital literacy | 7 | 2.3% |
Emotion | 7 | 2.3% |
Encryption | 7 | 2.3% |
Face | 7 | 2.3% |
First Amendment to the United States Constitution | 7 | 2.3% |
Literacy | 7 | 2.3% |
Market (economics) | 7 | 2.3% |
Medical device | 7 | 2.3% |
Mobile app | 7 | 2.3% |
Non-governmental organization | 7 | 2.3% |
Social partners | 7 | 2.3% |
Artificial neural network | 6 | 2.0% |
Border | 6 | 2.0% |
Conference on the Future of Europe | 6 | 2.0% |
Copyright infringement | 6 | 2.0% |
Deception | 6 | 2.0% |
Dignity | 6 | 2.0% |
European Citizens' Initiative | 6 | 2.0% |
Fraud | 6 | 2.0% |
International Covenant on Economic, Social and Cultural Rights | 6 | 2.0% |
Internet censorship | 6 | 2.0% |
Max Schrems | 6 | 2.0% |
Multistakeholder governance | 6 | 2.0% |
Passport | 6 | 2.0% |
Privacy and Electronic Communications Directive 2002 | 6 | 2.0% |
Self-driving car | 6 | 2.0% |
Software | 6 | 2.0% |
Specification (technical standard) | 6 | 2.0% |
Strategy | 6 | 2.0% |
User-generated content | 6 | 2.0% |
Verification and validation | 6 | 2.0% |
Automated decision-making | 5 | 1.7% |
Biometric passport | 5 | 1.7% |
Cognition | 5 | 1.7% |
Copyright | 5 | 1.7% |
Data governance | 5 | 1.7% |
Data laws | 5 | 1.7% |
Data re-identification | 5 | 1.7% |
Detention (imprisonment) | 5 | 1.7% |
Digital economy | 5 | 1.7% |
Driver's license | 5 | 1.7% |
Educational technology | 5 | 1.7% |
Employment | 5 | 1.7% |
Fake news website | 5 | 1.7% |
Freedom of movement | 5 | 1.7% |
Gender | 5 | 1.7% |
Goal | 5 | 1.7% |
Great Firewall | 5 | 1.7% |
Information technology management | 5 | 1.7% |
Informed consent | 5 | 1.7% |
Infrastructure | 5 | 1.7% |
International law | 5 | 1.7% |
Investigatory Powers Act 2016 | 5 | 1.7% |
Knowledge representation and reasoning | 5 | 1.7% |
Leadership | 5 | 1.7% |
Malware | 5 | 1.7% |
Market surveillance (products) | 5 | 1.7% |
Misinformation related to the COVID-19 pandemic | 5 | 1.7% |
Money laundering | 5 | 1.7% |
Organized crime | 5 | 1.7% |
Pegasus (spyware) | 5 | 1.7% |
Privacy Impact Assessment | 5 | 1.7% |
Probable cause | 5 | 1.7% |
Procurement | 5 | 1.7% |
Race (human categorization) | 5 | 1.7% |
Right to be forgotten | 5 | 1.7% |
Schengen Agreement | 5 | 1.7% |
Search warrant | 5 | 1.7% |
Society | 5 | 1.7% |
Strategic communication | 5 | 1.7% |
Targeted advertising | 5 | 1.7% |
Telecommunication | 5 | 1.7% |
Treaties of the European Union | 5 | 1.7% |
Truth | 5 | 1.7% |
Type I and type II errors | 5 | 1.7% |
U.S. state | 5 | 1.7% |
Abuse | 4 | 1.3% |
Access to information | 4 | 1.3% |
Amazon Rekognition | 4 | 1.3% |
Application software | 4 | 1.3% |
Autonomy | 4 | 1.3% |
Big Tech | 4 | 1.3% |
Brexit | 4 | 1.3% |
California Consumer Privacy Act | 4 | 1.3% |
Campaign advertising | 4 | 1.3% |
Certification | 4 | 1.3% |
Citizenship of the European Union | 4 | 1.3% |
Confidentiality | 4 | 1.3% |
Conspiracy theory | 4 | 1.3% |
Cryptocurrency | 4 | 1.3% |
DNA profiling | 4 | 1.3% |
Data Protection Act 1998 | 4 | 1.3% |
Data breach | 4 | 1.3% |
Data security | 4 | 1.3% |
Dialogue | 4 | 1.3% |
Digital Markets Act | 4 | 1.3% |
Digital Single Market | 4 | 1.3% |
Digital forensics | 4 | 1.3% |
Donald Trump | 4 | 1.3% |
Due diligence | 4 | 1.3% |
Echo chamber (media) | 4 | 1.3% |
Emotion recognition | 4 | 1.3% |
Expert system | 4 | 1.3% |
Freedom of Information Act (United States) | 4 | 1.3% |
Google Spain v AEPD and Mario Costeja González | 4 | 1.3% |
Health care | 4 | 1.3% |
Image sharing | 4 | 1.3% |
Immigration | 4 | 1.3% |
Inductive reasoning | 4 | 1.3% |
Intellectual property | 4 | 1.3% |
Internet troll | 4 | 1.3% |
Language | 4 | 1.3% |
Legal liability | 4 | 1.3% |
Minority group | 4 | 1.3% |
Notice and take down | 4 | 1.3% |
Online hate speech | 4 | 1.3% |
Opt-out | 4 | 1.3% |
Overfitting | 4 | 1.3% |
Password | 4 | 1.3% |
Philosophy | 4 | 1.3% |
Polygraph | 4 | 1.3% |
Privacy by design | 4 | 1.3% |
Prüm Convention | 4 | 1.3% |
Pseudonymization | 4 | 1.3% |
Psychology | 4 | 1.3% |
Quality management system | 4 | 1.3% |
Racial profiling | 4 | 1.3% |
Recidivism | 4 | 1.3% |
Recruitment | 4 | 1.3% |
Regulatory risk differentiation | 4 | 1.3% |
Right of asylum | 4 | 1.3% |
Robot | 4 | 1.3% |
Router (computing) | 4 | 1.3% |
Smart city | 4 | 1.3% |
Supply chain | 4 | 1.3% |
Target audience | 4 | 1.3% |
Trust (social science) | 4 | 1.3% |
United Kingdom labour law | 4 | 1.3% |
Value (ethics) | 4 | 1.3% |
Vladimir Putin | 4 | 1.3% |
Whistleblower | 4 | 1.3% |
3D printing | 3 | 1.0% |
Access control | 3 | 1.0% |
Accessibility | 3 | 1.0% |
Agile software development | 3 | 1.0% |
Android (operating system) | 3 | 1.0% |
Attitude (psychology) | 3 | 1.0% |
Automation bias | 3 | 1.0% |
Basic Law for the Federal Republic of Germany | 3 | 1.0% |
Best practice | 3 | 1.0% |
Bill (law) | 3 | 1.0% |
Brain | 3 | 1.0% |
Burden of proof (law) | 3 | 1.0% |
Business model | 3 | 1.0% |
Carpenter v. United States | 3 | 1.0% |
Child migration | 3 | 1.0% |
Climate resilience | 3 | 1.0% |
Common Foreign and Security Policy | 3 | 1.0% |
Communications Decency Act | 3 | 1.0% |
Computer | 3 | 1.0% |
Computer and network surveillance | 3 | 1.0% |
Computer program | 3 | 1.0% |
Conformance testing | 3 | 1.0% |
Consumer privacy | 3 | 1.0% |
Consumer protection | 3 | 1.0% |
Corporate governance | 3 | 1.0% |
Credibility | 3 | 1.0% |
Cryptography | 3 | 1.0% |
Cyber-physical system | 3 | 1.0% |
Damages | 3 | 1.0% |
Data management | 3 | 1.0% |
De-identification | 3 | 1.0% |
Debate | 3 | 1.0% |
Denial-of-service attack | 3 | 1.0% |
Design | 3 | 1.0% |
Disability | 3 | 1.0% |
Disparate impact | 3 | 1.0% |
Do Not Track | 3 | 1.0% |
EU–US Privacy Shield | 3 | 1.0% |
Electronic Communications Privacy Act | 3 | 1.0% |
End user | 3 | 1.0% |
Europe | 3 | 1.0% |
Experiment | 3 | 1.0% |
False positives and false negatives | 3 | 1.0% |
Filter bubble | 3 | 1.0% |
Foreign Intelligence Surveillance Act | 3 | 1.0% |
Fourth Industrial Revolution | 3 | 1.0% |
Free will | 3 | 1.0% |
Goal setting | 3 | 1.0% |
Government by algorithm | 3 | 1.0% |
HTTP cookie | 3 | 1.0% |
Happiness | 3 | 1.0% |
Hatred | 3 | 1.0% |
Health data | 3 | 1.0% |
High Representative of the Union for Foreign Affairs and Security Policy | 3 | 1.0% |
Information governance | 3 | 1.0% |
Information warfare | 3 | 1.0% |
Institution | 3 | 1.0% |
Integrity | 3 | 1.0% |
Intelligence analysis | 3 | 1.0% |
International human rights law | 3 | 1.0% |
Judge | 3 | 1.0% |
Lawyer | 3 | 1.0% |
Liberal democracy | 3 | 1.0% |
Liberty | 3 | 1.0% |
Life-cycle assessment | 3 | 1.0% |
Logic | 3 | 1.0% |
Metadata | 3 | 1.0% |
Moderation system | 3 | 1.0% |
Negligence | 3 | 1.0% |
Net neutrality | 3 | 1.0% |
Network effect | 3 | 1.0% |
Obscenity | 3 | 1.0% |
Passenger name record | 3 | 1.0% |
Prediction | 3 | 1.0% |
Product liability | 3 | 1.0% |
Public health | 3 | 1.0% |
Ransomware | 3 | 1.0% |
Recommender system | 3 | 1.0% |
Records management | 3 | 1.0% |
Regulation of artificial intelligence | 3 | 1.0% |
Right to a fair trial | 3 | 1.0% |
Right to explanation | 3 | 1.0% |
Robotics | 3 | 1.0% |
Rulemaking | 3 | 1.0% |
Russian interference in the 2016 United States elections | 3 | 1.0% |
Safety of journalists | 3 | 1.0% |
Sandra Wachter | 3 | 1.0% |
Security token | 3 | 1.0% |
Sentence (law) | 3 | 1.0% |
Situation awareness | 3 | 1.0% |
Social exclusion | 3 | 1.0% |
Social networking service | 3 | 1.0% |
Soft power | 3 | 1.0% |
Standardization | 3 | 1.0% |
Stored Communications Act | 3 | 1.0% |
Sustainability | 3 | 1.0% |
Telecommunications | 3 | 1.0% |
Terms of service | 3 | 1.0% |
User (computing) | 3 | 1.0% |
Video | 3 | 1.0% |
Activism | 2 | 0.7% |
Africa | 2 | 0.7% |
Alexei Navalny | 2 | 0.7% |
Annexation of Crimea by the Russian Federation | 2 | 0.7% |
Anti-discrimination law | 2 | 0.7% |
Argument | 2 | 0.7% |
Arrest warrant | 2 | 0.7% |
Article 8 of the European Convention on Human Rights | 2 | 0.7% |
Assault | 2 | 0.7% |
Backdoor (computing) | 2 | 0.7% |
Backup | 2 | 0.7% |
Bail | 2 | 0.7% |
Bank | 2 | 0.7% |
Barrister | 2 | 0.7% |
Belief | 2 | 0.7% |
Belt and Road Initiative | 2 | 0.7% |
Botnet | 2 | 0.7% |
Brain–computer interface | 2 | 0.7% |
Business ethics | 2 | 0.7% |
COMPAS (software) | 2 | 0.7% |
Capital Requirements Directives | 2 | 0.7% |
Categorization | 2 | 0.7% |
Chatbot | 2 | 0.7% |
Child | 2 | 0.7% |
Children's Online Privacy Protection Act | 2 | 0.7% |
Children's rights | 2 | 0.7% |
Civil liberties | 2 | 0.7% |
Cognitive science | 2 | 0.7% |
Collective bargaining | 2 | 0.7% |
Committee | 2 | 0.7% |
Committee of Ministers of the Council of Europe | 2 | 0.7% |
Communications Act of 1934 | 2 | 0.7% |
Complaint | 2 | 0.7% |
Computer file | 2 | 0.7% |
Concepts in ethics | 2 | 0.7% |
Congressional oversight | 2 | 0.7% |
Consciousness | 2 | 0.7% |
Constitutional amendment | 2 | 0.7% |
Counter-terrorism | 2 | 0.7% |
Countering Foreign Propaganda and Disinformation Act | 2 | 0.7% |
Court | 2 | 0.7% |
Curriculum | 2 | 0.7% |
Cyber-security regulation | 2 | 0.7% |
DNA | 2 | 0.7% |
DNA database | 2 | 0.7% |
Dark pattern | 2 | 0.7% |
Data analysis | 2 | 0.7% |
Data mining | 2 | 0.7% |
Deterrence theory | 2 | 0.7% |
Digital evidence | 2 | 0.7% |
Digital media | 2 | 0.7% |
Digital transformation | 2 | 0.7% |
Diplomacy | 2 | 0.7% |
Disease | 2 | 0.7% |
Doğu Perinçek | 2 | 0.7% |
Duty of care | 2 | 0.7% |
Educational assessment | 2 | 0.7% |
Electroencephalography | 2 | 0.7% |
Espionage | 2 | 0.7% |
Euro | 2 | 0.7% |
European Union legislative procedure | 2 | 0.7% |
Face Recognition Vendor Test | 2 | 0.7% |
Financial risk | 2 | 0.7% |
Fourth Amendment to the United States Constitution | 2 | 0.7% |
Freedom of expression | 2 | 0.7% |
G7 Rapid Response Mechanism | 2 | 0.7% |
Genealogy | 2 | 0.7% |
Genocide | 2 | 0.7% |
George Floyd protests | 2 | 0.7% |
Guccifer 2.0 | 2 | 0.7% |
Harmonisation of law | 2 | 0.7% |
Health Insurance Portability and Accountability Act | 2 | 0.7% |
Human migration | 2 | 0.7% |
Hybrid warfare | 2 | 0.7% |
IT law | 2 | 0.7% |
Identity management | 2 | 0.7% |
Identity theft | 2 | 0.7% |
Illiberal democracy | 2 | 0.7% |
Incitement | 2 | 0.7% |
Information literacy | 2 | 0.7% |
Information system | 2 | 0.7% |
Insurance | 2 | 0.7% |
International Safe Harbor Privacy Principles | 2 | 0.7% |
International relations | 2 | 0.7% |
International sanctions | 2 | 0.7% |
Internet Protocol | 2 | 0.7% |
Internet bot | 2 | 0.7% |
Internet forum | 2 | 0.7% |
Internet geolocation | 2 | 0.7% |
Internet service provider | 2 | 0.7% |
Juridical person | 2 | 0.7% |
Latin America | 2 | 0.7% |
Law enforcement techniques | 2 | 0.7% |
Legal certainty | 2 | 0.7% |
Legal remedy | 2 | 0.7% |
Legislation | 2 | 0.7% |
License | 2 | 0.7% |
Lightweight Directory Access Protocol | 2 | 0.7% |
Lobbying | 2 | 0.7% |
Media (communication) | 2 | 0.7% |
Media literacy | 2 | 0.7% |
Mediation | 2 | 0.7% |
Newspaper | 2 | 0.7% |
Nudge (book) | 2 | 0.7% |
Nudity | 2 | 0.7% |
Ombudsman | 2 | 0.7% |
Online Privacy Protection Act | 2 | 0.7% |
Open-source intelligence | 2 | 0.7% |
Oppression | 2 | 0.7% |
Organization | 2 | 0.7% |
Partnership | 2 | 0.7% |
Patriot Act | 2 | 0.7% |
Perinçek v. Switzerland | 2 | 0.7% |
Physiognomy | 2 | 0.7% |
Pluralism (political theory) | 2 | 0.7% |
Police accountability | 2 | 0.7% |
Police misconduct | 2 | 0.7% |
Political polarization | 2 | 0.7% |
Political theories | 2 | 0.7% |
Political warfare | 2 | 0.7% |
Powers of the police in England and Wales | 2 | 0.7% |
Precedent | 2 | 0.7% |
President of the United States | 2 | 0.7% |
Price discrimination | 2 | 0.7% |
Principles | 2 | 0.7% |
Prison | 2 | 0.7% |
Privacy Act of 1974 | 2 | 0.7% |
Proactive cyber defence | 2 | 0.7% |
Propaganda in the Russian Federation | 2 | 0.7% |
Property | 2 | 0.7% |
Public engagement | 2 | 0.7% |
Public safety | 2 | 0.7% |
Quality assurance | 2 | 0.7% |
Question | 2 | 0.7% |
Regulation (European Union) | 2 | 0.7% |
Regulation of Investigatory Powers Act 2000 | 2 | 0.7% |
Right to education | 2 | 0.7% |
Right to privacy in New Zealand | 2 | 0.7% |
Right to social security | 2 | 0.7% |
Romance scam | 2 | 0.7% |
Russian interference in the 2020 United States elections | 2 | 0.7% |
SORM | 2 | 0.7% |
Sanitization (classified information) | 2 | 0.7% |
School-to-prison pipeline | 2 | 0.7% |
Science and technology | 2 | 0.7% |
Self-censorship | 2 | 0.7% |
Service-level agreement | 2 | 0.7% |
Smartphone | 2 | 0.7% |
Social work | 2 | 0.7% |
Speaker recognition | 2 | 0.7% |
Standards organization | 2 | 0.7% |
State of emergency | 2 | 0.7% |
Statistical classification | 2 | 0.7% |
Statistics | 2 | 0.7% |
Statute | 2 | 0.7% |
Stock | 2 | 0.7% |
Subversion | 2 | 0.7% |
The Right to Privacy (article) | 2 | 0.7% |
Timnit Gebru | 2 | 0.7% |
Trade secret | 2 | 0.7% |
Transport Layer Security | 2 | 0.7% |
Treaty of Lisbon | 2 | 0.7% |
United Nations Guiding Principles on Business and Human Rights | 2 | 0.7% |
United States Code | 2 | 0.7% |
University | 2 | 0.7% |
Vessel monitoring system | 2 | 0.7% |
Virtual private network | 2 | 0.7% |
Visa Information System | 2 | 0.7% |
Women's rights | 2 | 0.7% |
XML | 2 | 0.7% |
2016 United States presidential election | 1 | 0.3% |
API | 1 | 0.3% |
ARPANET | 1 | 0.3% |
Access to public information in Europe | 1 | 0.3% |
Active Measures Working Group | 1 | 0.3% |
Active measures | 1 | 0.3% |
Address geocoding | 1 | 0.3% |
Adolescence | 1 | 0.3% |
Adoption | 1 | 0.3% |
Advanced persistent threat | 1 | 0.3% |
Advertising revenue | 1 | 0.3% |
Age of Enlightenment | 1 | 0.3% |
Age verification system | 1 | 0.3% |
Agenda (meeting) | 1 | 0.3% |
Aggravated sexual assault | 1 | 0.3% |
Alan Rusbridger | 1 | 0.3% |
Alternative dispute resolution | 1 | 0.3% |
Alternative facts | 1 | 0.3% |
Americans with Disabilities Act of 1990 | 1 | 0.3% |
Amicus curiae | 1 | 0.3% |
Analysis | 1 | 0.3% |
Andrei Soldatov | 1 | 0.3% |
Andrii Derkach | 1 | 0.3% |
Anthony D. Romero | 1 | 0.3% |
Arbitration | 1 | 0.3% |
Area of freedom, security and justice | 1 | 0.3% |
Armenian Genocide | 1 | 0.3% |
Art | 1 | 0.3% |
Article 101 of the Treaty on the Functioning of the European Union | 1 | 0.3% |
Artificial general intelligence | 1 | 0.3% |
Auction | 1 | 0.3% |
Augmented reality | 1 | 0.3% |
Authenticator | 1 | 0.3% |
Authorization bill | 1 | 0.3% |
Automated Targeting System | 1 | 0.3% |
Automated fingerprint identification | 1 | 0.3% |
Background check | 1 | 0.3% |
Baltic states | 1 | 0.3% |
Bank Secrecy Act | 1 | 0.3% |
Barristers in England and Wales | 1 | 0.3% |
Beeban Kidron | 1 | 0.3% |
Best interests | 1 | 0.3% |
Biodiversity | 1 | 0.3% |
Blog | 1 | 0.3% |
Board of directors | 1 | 0.3% |
Breach of contract | 1 | 0.3% |
Brett Tolman | 1 | 0.3% |
Broadcasting | 1 | 0.3% |
Bullying | 1 | 0.3% |
CAPTCHA | 1 | 0.3% |
COVID-19 apps | 1 | 0.3% |
COVID-19 pandemic in the United Kingdom | 1 | 0.3% |
CSI effect | 1 | 0.3% |
Cairo Declaration on Human Rights in Islam | 1 | 0.3% |
California Public Records Act | 1 | 0.3% |
Camera | 1 | 0.3% |
Capital punishment | 1 | 0.3% |
Capitalism | 1 | 0.3% |
Cartography | 1 | 0.3% |
Censorship in China | 1 | 0.3% |
Census | 1 | 0.3% |
Chad Wolf | 1 | 0.3% |
Chief privacy officer | 1 | 0.3% |
Chinese cyberwarfare | 1 | 0.3% |
Chinese intelligence activity abroad | 1 | 0.3% |
Chris Hoofnagle | 1 | 0.3% |
Citizen journalism | 1 | 0.3% |
Civil and political rights | 1 | 0.3% |
Civility | 1 | 0.3% |
Claas Relotius | 1 | 0.3% |
Class action | 1 | 0.3% |
Classification of ethnicity in the United Kingdom | 1 | 0.3% |
Clinical trial | 1 | 0.3% |
Cluster analysis | 1 | 0.3% |
Cognitive bias | 1 | 0.3% |
Collaboration | 1 | 0.3% |
Colonialism | 1 | 0.3% |
Common Security and Defence Policy | 1 | 0.3% |
Common carrier | 1 | 0.3% |
Communication protocol | 1 | 0.3% |
Communications Act 2003 | 1 | 0.3% |
Community | 1 | 0.3% |
CompStat | 1 | 0.3% |
Competition law | 1 | 0.3% |
Computer data | 1 | 0.3% |
Computer data storage | 1 | 0.3% |
Computer science | 1 | 0.3% |
Computer vision | 1 | 0.3% |
Conceptual model | 1 | 0.3% |
Conflict of interest | 1 | 0.3% |
Conformity | 1 | 0.3% |
Conscience | 1 | 0.3% |
Consent decree | 1 | 0.3% |
Constable | 1 | 0.3% |
Constitution | 1 | 0.3% |
Constitutional law | 1 | 0.3% |
Contact tracing | 1 | 0.3% |
Contractual term | 1 | 0.3% |
Convention on Cybercrime | 1 | 0.3% |
Convention on the Rights of Persons with Disabilities | 1 | 0.3% |
Corruption | 1 | 0.3% |
Counterintelligence | 1 | 0.3% |
Credential | 1 | 0.3% |
Criminal procedure | 1 | 0.3% |
Crisis management | 1 | 0.3% |
Critical thinking | 1 | 0.3% |
Cryptographic hash function | 1 | 0.3% |
Customs | 1 | 0.3% |
Cyberbullying | 1 | 0.3% |
DNA phenotyping | 1 | 0.3% |
Danish Penal Code | 1 | 0.3% |
Data science | 1 | 0.3% |
DataWorks Plus | 1 | 0.3% |
Daubert standard | 1 | 0.3% |
David Lewis (philosopher) | 1 | 0.3% |
Decentralization | 1 | 0.3% |
Democratic backsliding | 1 | 0.3% |
Demography | 1 | 0.3% |
Dependent and independent variables | 1 | 0.3% |
Derivative work | 1 | 0.3% |
Digital Economy Act 2017 | 1 | 0.3% |
Digital Revolution | 1 | 0.3% |
Digital citizen | 1 | 0.3% |
Digital data | 1 | 0.3% |
Digital divide | 1 | 0.3% |
Digital health | 1 | 0.3% |
Digital image | 1 | 0.3% |
Digital security | 1 | 0.3% |
Digital subscriber line | 1 | 0.3% |
Digital wallet | 1 | 0.3% |
Directive on Copyright in the Digital Single Market | 1 | 0.3% |
Discoverability | 1 | 0.3% |
Discretion | 1 | 0.3% |
Distraint | 1 | 0.3% |
Domestic violence | 1 | 0.3% |
Dual-use technology | 1 | 0.3% |
Due process | 1 | 0.3% |
Dynamic consent | 1 | 0.3% |
E-democracy | 1 | 0.3% |
E-participation | 1 | 0.3% |
E. Tendayi Achiume | 1 | 0.3% |
Economic growth | 1 | 0.3% |
Economics | 1 | 0.3% |
Edmund Burke | 1 | 0.3% |
Edward Snowden | 1 | 0.3% |
Electoral fraud | 1 | 0.3% |
Electronic authentication | 1 | 0.3% |
Electronic monitoring in the United States | 1 | 0.3% |
Electronic tagging | 1 | 0.3% |
Email spam | 1 | 0.3% |
Employment discrimination | 1 | 0.3% |
Empowerment | 1 | 0.3% |
End-to-end encryption | 1 | 0.3% |
Engineering | 1 | 0.3% |
Environmental impact assessment | 1 | 0.3% |
Equality Act (United States) | 1 | 0.3% |
Equality Act 2010 | 1 | 0.3% |
Equity (law) | 1 | 0.3% |
Ethics of artificial intelligence | 1 | 0.3% |
European migrant crisis | 1 | 0.3% |
Expense | 1 | 0.3% |
Expert witness | 1 | 0.3% |
Explainable artificial intelligence | 1 | 0.3% |
Extract, transform, load | 1 | 0.3% |
Extreme poverty | 1 | 0.3% |
Eye | 1 | 0.3% |
FCC Open Internet Order 2010 | 1 | 0.3% |
FTC fair information practice | 1 | 0.3% |
Fair use | 1 | 0.3% |
Federated learning | 1 | 0.3% |
Fiduciary | 1 | 0.3% |
Fifth Amendment to the United States Constitution | 1 | 0.3% |
Financial inclusion | 1 | 0.3% |
Financial intelligence | 1 | 0.3% |
Firehose of falsehood | 1 | 0.3% |
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 | 1 | 0.3% |
Forensic identification | 1 | 0.3% |
Forgery | 1 | 0.3% |
Future | 1 | 0.3% |
GPS tracking unit | 1 | 0.3% |
Gang | 1 | 0.3% |
Generative adversarial network | 1 | 0.3% |
Genetic genealogy | 1 | 0.3% |
Genetic testing | 1 | 0.3% |
Geographic information system | 1 | 0.3% |
Global Positioning System | 1 | 0.3% |
Global surveillance disclosures (2013–present) | 1 | 0.3% |
Globalization | 1 | 0.3% |
Government procurement in the European Union | 1 | 0.3% |
Gross domestic product | 1 | 0.3% |
Ground truth | 1 | 0.3% |
Harm reduction | 1 | 0.3% |
Hate crime | 1 | 0.3% |
History | 1 | 0.3% |
Hong Kong Basic Law | 1 | 0.3% |
Housing discrimination in the United States | 1 | 0.3% |
Human | 1 | 0.3% |
Human Rights Act 1998 | 1 | 0.3% |
Human Rights Impact Assessment | 1 | 0.3% |
Human capital | 1 | 0.3% |
Human resource management | 1 | 0.3% |
Human resources | 1 | 0.3% |
Human rights and encryption | 1 | 0.3% |
Human subject research | 1 | 0.3% |
Human-centered design | 1 | 0.3% |
Identification | 1 | 0.3% |
Identity (social science) | 1 | 0.3% |
Identity verification service | 1 | 0.3% |
Ideology | 1 | 0.3% |
Industrial espionage | 1 | 0.3% |
Industry self-regulation | 1 | 0.3% |
Infection | 1 | 0.3% |
Influence of mass media | 1 | 0.3% |
Information and media literacy | 1 | 0.3% |
Information broker | 1 | 0.3% |
Information retrieval | 1 | 0.3% |
Information science | 1 | 0.3% |
Input/output | 1 | 0.3% |
Institutional racism | 1 | 0.3% |
Intelligence, surveillance, target acquisition, and reconnaissance | 1 | 0.3% |
Intention | 1 | 0.3% |
International Convention on the Elimination of All Forms of Racial Discrimination | 1 | 0.3% |
International humanitarian law | 1 | 0.3% |
International sanctions during the Russo-Ukrainian War | 1 | 0.3% |
Internet activism | 1 | 0.3% |
Internet censorship in China | 1 | 0.3% |
Internet censorship in Russia | 1 | 0.3% |
Internet censorship in Thailand | 1 | 0.3% |
Internet culture | 1 | 0.3% |
Internet governance | 1 | 0.3% |
Internet manipulation | 1 | 0.3% |
Internet meme | 1 | 0.3% |
Internet protocol suite | 1 | 0.3% |
Interpellation (philosophy) | 1 | 0.3% |
Interpol notice | 1 | 0.3% |
Jack Balkin | 1 | 0.3% |
Joan Donovan | 1 | 0.3% |
Joe Biden | 1 | 0.3% |
Joel Kaplan | 1 | 0.3% |
Journalism ethics and standards | 1 | 0.3% |
Judiciaries | 1 | 0.3% |
Jurisprudence | 1 | 0.3% |
Jury | 1 | 0.3% |
K. S. Puttaswamy | 1 | 0.3% |
Kathryn Parsons | 1 | 0.3% |
Katz v. United States | 1 | 0.3% |
Kleptocracy | 1 | 0.3% |
Knowledge | 1 | 0.3% |
Knowledge economy | 1 | 0.3% |
Kosciuszko Institute | 1 | 0.3% |
Law enforcement agency | 1 | 0.3% |
Layoff | 1 | 0.3% |
Lethal autonomous weapon | 1 | 0.3% |
Library | 1 | 0.3% |
Lie detection | 1 | 0.3% |
Linguistics | 1 | 0.3% |
Lèse majesté in Thailand | 1 | 0.3% |
Lèse-majesté in Thailand | 1 | 0.3% |
Maria Ressa | 1 | 0.3% |
Mark Zuckerberg | 1 | 0.3% |
Market research | 1 | 0.3% |
Marriage | 1 | 0.3% |
Mass media in China | 1 | 0.3% |
Mathematical model | 1 | 0.3% |
Media bias | 1 | 0.3% |
Media manipulation | 1 | 0.3% |
Medical diagnosis | 1 | 0.3% |
Medical ethics | 1 | 0.3% |
Medicine | 1 | 0.3% |
Mens rea | 1 | 0.3% |
Metrology | 1 | 0.3% |
Microblogging | 1 | 0.3% |
Microsatellite | 1 | 0.3% |
Military deception | 1 | 0.3% |
Military doctrine | 1 | 0.3% |
Military simulation | 1 | 0.3% |
Military strategy | 1 | 0.3% |
Mind | 1 | 0.3% |
Misconduct | 1 | 0.3% |
Mobile phone | 1 | 0.3% |
Modem | 1 | 0.3% |
Montreal Institute for Genocide and Human Rights Studies | 1 | 0.3% |
Morality | 1 | 0.3% |
Multi-factor authentication | 1 | 0.3% |
Multiculturalism | 1 | 0.3% |
Multimedia | 1 | 0.3% |
Municipal Police (France) | 1 | 0.3% |
Narrative | 1 | 0.3% |
National Defense Authorization Act for Fiscal Year 2012 | 1 | 0.3% |
National security letter | 1 | 0.3% |
Natural language processing | 1 | 0.3% |
Necessity (criminal law) | 1 | 0.3% |
Nervous system | 1 | 0.3% |
Network sovereignty | 1 | 0.3% |
Neural network | 1 | 0.3% |
Neuron | 1 | 0.3% |
New media | 1 | 0.3% |
News Feed | 1 | 0.3% |
News aggregator | 1 | 0.3% |
Nick Bostrom | 1 | 0.3% |
Nonviolence | 1 | 0.3% |
Office of Inspector General (United States) | 1 | 0.3% |
On-premises software | 1 | 0.3% |
Open access | 1 | 0.3% |
Open data | 1 | 0.3% |
Operation Fortitude | 1 | 0.3% |
Optical character recognition | 1 | 0.3% |
Outsourcing | 1 | 0.3% |
Palestinian territories | 1 | 0.3% |
Parental controls | 1 | 0.3% |
Patch (computing) | 1 | 0.3% |
Paul Ekman | 1 | 0.3% |
Payment Card Industry Data Security Standard | 1 | 0.3% |
Performance appraisal | 1 | 0.3% |
Personal, Social, Health and Economic (PSHE) education | 1 | 0.3% |
Personalization | 1 | 0.3% |
Persuasion | 1 | 0.3% |
Petya (malware) | 1 | 0.3% |
Phishing | 1 | 0.3% |
Photograph manipulation | 1 | 0.3% |
Pixel | 1 | 0.3% |
Plea | 1 | 0.3% |
Pluralism (political philosophy) | 1 | 0.3% |
Poisoning of Sergei and Yulia Skripal | 1 | 0.3% |
Police brutality | 1 | 0.3% |
Police surveillance in New York City | 1 | 0.3% |
Political bias | 1 | 0.3% |
Political repression | 1 | 0.3% |
Populism | 1 | 0.3% |
Pornography | 1 | 0.3% |
Post-Soviet states | 1 | 0.3% |
Potential enlargement of the European Union | 1 | 0.3% |
Poverty | 1 | 0.3% |
Precision and recall | 1 | 0.3% |
Predictive analytics | 1 | 0.3% |
Predictive medicine | 1 | 0.3% |
Preliminary ruling | 1 | 0.3% |
Presumption of innocence | 1 | 0.3% |
Privacy concerns with social networking services | 1 | 0.3% |
Privacy engineering | 1 | 0.3% |
Privacy settings | 1 | 0.3% |
Privacy-enhancing technologies | 1 | 0.3% |
Procès-verbal | 1 | 0.3% |
Productivity | 1 | 0.3% |
Propaganda in China | 1 | 0.3% |
Prostitution | 1 | 0.3% |
Protection from Online Falsehoods and Manipulation Act | 1 | 0.3% |
Provenance | 1 | 0.3% |
Proxy war | 1 | 0.3% |
Pseudonym | 1 | 0.3% |
Pseudoscience | 1 | 0.3% |
Psychological resilience | 1 | 0.3% |
Psychological warfare | 1 | 0.3% |
Public diplomacy | 1 | 0.3% |
Public participation | 1 | 0.3% |
Public policy | 1 | 0.3% |
Publishing | 1 | 0.3% |
Punishment | 1 | 0.3% |
Quadrilateral Security Dialogue | 1 | 0.3% |
Qualitative research | 1 | 0.3% |
Quantum network | 1 | 0.3% |
Race and ethnicity in the United States Census | 1 | 0.3% |
Race and ethnicity in the United States census | 1 | 0.3% |
Racialization | 1 | 0.3% |
Radicalization | 1 | 0.3% |
Radio | 1 | 0.3% |
Radio-frequency identification | 1 | 0.3% |
Rampart scandal | 1 | 0.3% |
Rape | 1 | 0.3% |
Ratification | 1 | 0.3% |
Reasonable person | 1 | 0.3% |
Record linkage | 1 | 0.3% |
Regression analysis | 1 | 0.3% |
Reinforcement learning | 1 | 0.3% |
Request for proposal | 1 | 0.3% |
Research and development | 1 | 0.3% |
Retail | 1 | 0.3% |
Retinal scan | 1 | 0.3% |
Right on Crime | 1 | 0.3% |
Right to Information Act, 2005 | 1 | 0.3% |
Right to know | 1 | 0.3% |
Right-wing populism | 1 | 0.3% |
Royalty payment | 1 | 0.3% |
SAT | 1 | 0.3% |
Scientific method | 1 | 0.3% |
Search and seizure | 1 | 0.3% |
Search engine optimization | 1 | 0.3% |
Secrecy of correspondence | 1 | 0.3% |
Section summary of the Patriot Act, Title II | 1 | 0.3% |
Secure Flight | 1 | 0.3% |
Security guard | 1 | 0.3% |
Select committee (United Kingdom) | 1 | 0.3% |
Self-incrimination | 1 | 0.3% |
Semiconductor device fabrication | 1 | 0.3% |
Sensationalism | 1 | 0.3% |
Sensitivity and specificity | 1 | 0.3% |
Sentiment analysis | 1 | 0.3% |
Service industries | 1 | 0.3% |
Severability | 1 | 0.3% |
Severe acute respiratory syndrome coronavirus 2 | 1 | 0.3% |
Shoplifting | 1 | 0.3% |
Signature | 1 | 0.3% |
Simulation | 1 | 0.3% |
Sixth Amendment to the United States Constitution | 1 | 0.3% |
Social Security number | 1 | 0.3% |
Social control | 1 | 0.3% |
Social justice | 1 | 0.3% |
Social media analytics | 1 | 0.3% |
Social media measurement | 1 | 0.3% |
Social network | 1 | 0.3% |
Social network analysis | 1 | 0.3% |
Social norm | 1 | 0.3% |
Sociotechnical system | 1 | 0.3% |
Solicitor | 1 | 0.3% |
Spamming | 1 | 0.3% |
Spanish pronouns | 1 | 0.3% |
Special agent | 1 | 0.3% |
Spyware | 1 | 0.3% |
Standard of review | 1 | 0.3% |
Standing (law) | 1 | 0.3% |
State (polity) | 1 | 0.3% |
State media | 1 | 0.3% |
Statutory instrument (UK) | 1 | 0.3% |
Stock market | 1 | 0.3% |
Streisand effect | 1 | 0.3% |
Strict liability | 1 | 0.3% |
Subpoena | 1 | 0.3% |
Subsidiarity | 1 | 0.3% |
Superpower | 1 | 0.3% |
Supervised learning | 1 | 0.3% |
Surveillance capitalism | 1 | 0.3% |
Sustainable Development Goals | 1 | 0.3% |
Sustainable development | 1 | 0.3% |
Synthetic media | 1 | 0.3% |
Systematic review | 1 | 0.3% |
Systemic risk | 1 | 0.3% |
Systems science | 1 | 0.3% |
Targeted surveillance | 1 | 0.3% |
Teachta Dála | 1 | 0.3% |
Technological singularity | 1 | 0.3% |
Technology policy | 1 | 0.3% |
Telegraphy | 1 | 0.3% |
Telematics | 1 | 0.3% |
Telephone tapping | 1 | 0.3% |
Terrorist Screening Database | 1 | 0.3% |
Theft | 1 | 0.3% |
Think tank | 1 | 0.3% |
Tonino Picula | 1 | 0.3% |
Tor (anonymity network) | 1 | 0.3% |
Tort | 1 | 0.3% |
Total Defence | 1 | 0.3% |
Trade union | 1 | 0.3% |
Traffic collision | 1 | 0.3% |
Transcoding | 1 | 0.3% |
Transparency report | 1 | 0.3% |
Transphobia | 1 | 0.3% |
Trial | 1 | 0.3% |
Trump wall | 1 | 0.3% |
UNICRI Centre for AI and Robotics | 1 | 0.3% |
United Kingdom National DNA Database | 1 | 0.3% |
United Nations special rapporteur | 1 | 0.3% |
United States Attorney | 1 | 0.3% |
United States Foreign Intelligence Surveillance Court of Review | 1 | 0.3% |
United States Secretary of Defense | 1 | 0.3% |
United States federal probation and supervised release | 1 | 0.3% |
United States v. Jones | 1 | 0.3% |
University and college admission | 1 | 0.3% |
Unsupervised learning | 1 | 0.3% |
Use of force | 1 | 0.3% |
Validity (statistics) | 1 | 0.3% |
Value chain | 1 | 0.3% |
Vehicular automation | 1 | 0.3% |
Victimology | 1 | 0.3% |
Victims' rights | 1 | 0.3% |
Virtual world | 1 | 0.3% |
Voting | 1 | 0.3% |
War | 1 | 0.3% |
Weapon | 1 | 0.3% |
Web application | 1 | 0.3% |
Web browsing history | 1 | 0.3% |
Web search engine | 1 | 0.3% |
Website | 1 | 0.3% |
Welfare | 1 | 0.3% |
West Bank | 1 | 0.3% |
Whalen v. Roe | 1 | 0.3% |
Windhoek Declaration | 1 | 0.3% |
Wissenschaft | 1 | 0.3% |
World War I | 1 | 0.3% |
Xinjiang internment camps | 1 | 0.3% |
Zero-day (computing) | 1 | 0.3% |
abs | rel | |
---|---|---|
Issues in ethics | 110 | 80.3% |
Politics | 98 | 71.5% |
Government | 78 | 56.9% |
Technology | 74 | 54.0% |
Law | 73 | 53.3% |
Privacy | 69 | 50.4% |
Justice | 68 | 49.6% |
Artificial intelligence | 61 | 44.5% |
Applied ethics | 60 | 43.8% |
Public sphere | 44 | 32.1% |
Surveillance | 43 | 31.4% |
Facial recognition system | 41 | 29.9% |
Biometrics | 38 | 27.7% |
General Data Protection Regulation | 38 | 27.7% |
Risk | 38 | 27.7% |
Information privacy | 37 | 27.0% |
Computing | 35 | 25.5% |
Human activities | 35 | 25.5% |
Personal data | 35 | 25.5% |
Social institutions | 35 | 25.5% |
Information | 34 | 24.8% |
Social media | 32 | 23.4% |
Computer security | 31 | 22.6% |
Research | 29 | 21.2% |
Branches of science | 26 | 19.0% |
Governance | 26 | 19.0% |
Crime | 25 | 18.2% |
Human rights | 25 | 18.2% |
National security | 25 | 18.2% |
Social issues | 25 | 18.2% |
Internet | 24 | 17.5% |
Communication | 22 | 16.1% |
Cyberwarfare | 22 | 16.1% |
Identity document | 22 | 16.1% |
Information Age | 22 | 16.1% |
Information technology | 21 | 15.3% |
Policy | 21 | 15.3% |
System | 20 | 14.6% |
Health | 19 | 13.9% |
Machine learning | 19 | 13.9% |
Accountability | 18 | 13.1% |
Bias | 18 | 13.1% |
Rights | 18 | 13.1% |
Cyberspace | 17 | 12.4% |
Ethical principles | 17 | 12.4% |
Ethics | 16 | 11.7% |
Transparency (behavior) | 16 | 11.7% |
Discrimination | 15 | 10.9% |
Internet of things | 15 | 10.9% |
Public law | 15 | 10.9% |
Security | 15 | 10.9% |
Cyberattack | 14 | 10.2% |
Deepfake | 14 | 10.2% |
Fingerprint | 14 | 10.2% |
Authentication | 13 | 9.5% |
Automation | 13 | 9.5% |
Closed-circuit television | 13 | 9.5% |
Freedom of speech | 13 | 9.5% |
Regulatory compliance | 13 | 9.5% |
Data | 12 | 8.8% |
Democracy | 12 | 8.8% |
Misinformation | 12 | 8.8% |
News | 12 | 8.8% |
Safety | 12 | 8.8% |
Disinformation | 11 | 8.0% |
Employment | 11 | 8.0% |
European Union law | 11 | 8.0% |
Political science | 11 | 8.0% |
Right to privacy | 11 | 8.0% |
Common law | 10 | 7.3% |
Cybercrime | 10 | 7.3% |
Mass surveillance | 10 | 7.3% |
Vulnerability (computing) | 10 | 7.3% |
Audit | 9 | 6.6% |
COVID-19 pandemic | 9 | 6.6% |
Cognition | 9 | 6.6% |
Decision-making | 9 | 6.6% |
Fake news | 9 | 6.6% |
Informed consent | 9 | 6.6% |
Innovation | 9 | 6.6% |
Privacy law | 9 | 6.6% |
Algorithmic bias | 8 | 5.8% |
Border control | 8 | 5.8% |
Consent | 8 | 5.8% |
Criminal law | 8 | 5.8% |
Directive (European Union) | 8 | 5.8% |
Fundamental rights in India | 8 | 5.8% |
Law enforcement | 8 | 5.8% |
Mass media | 8 | 5.8% |
Pegasus (spyware) | 8 | 5.8% |
Algorithm | 7 | 5.1% |
Analytics | 7 | 5.1% |
Automated decision-making | 7 | 5.1% |
Business | 7 | 5.1% |
Cognitive science | 7 | 5.1% |
Contract | 7 | 5.1% |
Freedom of information | 7 | 5.1% |
Regulation | 7 | 5.1% |
Arrest | 6 | 4.4% |
Autonomy | 6 | 4.4% |
CE marking | 6 | 4.4% |
Censorship | 6 | 4.4% |
Concepts in metaphysics | 6 | 4.4% |
Criminal justice | 6 | 4.4% |
Database | 6 | 4.4% |
Education | 6 | 4.4% |
Evaluation | 6 | 4.4% |
Freedom of the press | 6 | 4.4% |
Information security | 6 | 4.4% |
Journalism | 6 | 4.4% |
Occupational safety and health | 6 | 4.4% |
Phishing | 6 | 4.4% |
Prosecutor | 6 | 4.4% |
Recruitment | 6 | 4.4% |
Treaty | 6 | 4.4% |
Advertising | 5 | 3.6% |
Best practice | 5 | 3.6% |
Civil rights and liberties | 5 | 3.6% |
Data Protection Directive | 5 | 3.6% |
Deep learning | 5 | 3.6% |
Digital Services Act | 5 | 3.6% |
Emotion recognition | 5 | 3.6% |
Forensic science | 5 | 3.6% |
Information warfare | 5 | 3.6% |
Malware | 5 | 3.6% |
Pseudonymization | 5 | 3.6% |
Treaty on the Functioning of the European Union | 5 | 3.6% |
Trust (social science) | 5 | 3.6% |
Violence | 5 | 3.6% |
Vladimir Putin | 5 | 3.6% |
Amazon Rekognition | 4 | 2.9% |
Anonymity | 4 | 2.9% |
Behavior | 4 | 2.9% |
Big Tech | 4 | 2.9% |
Big data | 4 | 2.9% |
Constitution of the United States | 4 | 2.9% |
Crime prevention | 4 | 2.9% |
Cyber-security regulation | 4 | 2.9% |
Digital identity | 4 | 2.9% |
Discovery (law) | 4 | 2.9% |
Dmitry Muratov | 4 | 2.9% |
Emotion | 4 | 2.9% |
European Arrest Warrant | 4 | 2.9% |
Fact-checking | 4 | 2.9% |
Fourth Amendment to the United States Constitution | 4 | 2.9% |
Fraud | 4 | 2.9% |
Freedom of information laws by country | 4 | 2.9% |
Government and personhood | 4 | 2.9% |
Infrastructure | 4 | 2.9% |
Intelligence | 4 | 2.9% |
Internet censorship | 4 | 2.9% |
Internet privacy | 4 | 2.9% |
Learning | 4 | 2.9% |
Medical device | 4 | 2.9% |
Online advertising | 4 | 2.9% |
Police body camera | 4 | 2.9% |
Ransomware | 4 | 2.9% |
Regulation of artificial intelligence | 4 | 2.9% |
Reliability engineering | 4 | 2.9% |
Remand (detention) | 4 | 2.9% |
Risk assessment | 4 | 2.9% |
Russo-Ukrainian War | 4 | 2.9% |
Search warrant | 4 | 2.9% |
Trial | 4 | 2.9% |
Whistleblower | 4 | 2.9% |
Witness | 4 | 2.9% |
World Wide Web | 4 | 2.9% |
Accuracy and precision | 3 | 2.2% |
Anxiety | 3 | 2.2% |
Asylum seeker | 3 | 2.2% |
Battles and conflicts without fatalities | 3 | 2.2% |
Bill (law) | 3 | 2.2% |
Burden of proof (law) | 3 | 2.2% |
Carpenter v. United States | 3 | 2.2% |
Categorization | 3 | 2.2% |
Cloud computing | 3 | 2.2% |
Computer law | 3 | 2.2% |
Computer network | 3 | 2.2% |
Court | 3 | 2.2% |
Criminology | 3 | 2.2% |
Data retention | 3 | 2.2% |
Digitization | 3 | 2.2% |
Disability | 3 | 2.2% |
European Convention on Human Rights | 3 | 2.2% |
Evidence | 3 | 2.2% |
Fine (penalty) | 3 | 2.2% |
Freedom of movement | 3 | 2.2% |
Gender | 3 | 2.2% |
Human | 3 | 2.2% |
Identity theft | 3 | 2.2% |
Information technology management | 3 | 2.2% |
International Covenant on Civil and Political Rights | 3 | 2.2% |
Internet censorship circumvention | 3 | 2.2% |
Internet troll | 3 | 2.2% |
Interoperability | 3 | 2.2% |
Iris recognition | 3 | 2.2% |
Language | 3 | 2.2% |
Lawsuit | 3 | 2.2% |
Legal action | 3 | 2.2% |
Logic | 3 | 2.2% |
Market surveillance (products) | 3 | 2.2% |
Media pluralism | 3 | 2.2% |
Medical ethics | 3 | 2.2% |
Misconduct | 3 | 2.2% |
Money laundering | 3 | 2.2% |
Organization | 3 | 2.2% |
Privacy policy | 3 | 2.2% |
Proportionality (law) | 3 | 2.2% |
Remote work | 3 | 2.2% |
Robot | 3 | 2.2% |
Russian interference in the 2016 United States elections | 3 | 2.2% |
Safety of journalists | 3 | 2.2% |
Self-driving car | 3 | 2.2% |
Speaker recognition | 3 | 2.2% |
Spyware | 3 | 2.2% |
Standardization | 3 | 2.2% |
Sustainability | 3 | 2.2% |
Sustainable Development Goals | 3 | 2.2% |
Telecommunications | 3 | 2.2% |
Trade union | 3 | 2.2% |
Training | 3 | 2.2% |
Travel visa | 3 | 2.2% |
Treaty on European Union | 3 | 2.2% |
Usability | 3 | 2.2% |
Violence against women | 3 | 2.2% |
Wearable technology | 3 | 2.2% |
2017 cyberattacks on Ukraine | 2 | 1.5% |
Abuse | 2 | 1.5% |
Amicus curiae | 2 | 1.5% |
Analysis | 2 | 1.5% |
Anti-discrimination law | 2 | 1.5% |
Application software | 2 | 1.5% |
Asset forfeiture | 2 | 1.5% |
Authoritarianism | 2 | 1.5% |
Automatic number-plate recognition | 2 | 1.5% |
Blockchain | 2 | 1.5% |
Board of directors | 2 | 1.5% |
COVID-19 misinformation | 2 | 1.5% |
Certificate authority | 2 | 1.5% |
Charter of Fundamental Rights of the European Union | 2 | 1.5% |
Collective bargaining | 2 | 1.5% |
Confidentiality | 2 | 1.5% |
Consumer protection | 2 | 1.5% |
Corruption | 2 | 1.5% |
Counterterrorism | 2 | 1.5% |
Crime scene | 2 | 1.5% |
Customs | 2 | 1.5% |
Cyber-physical system | 2 | 1.5% |
DNA profiling | 2 | 1.5% |
Dark web | 2 | 1.5% |
Data Protection Act 1998 | 2 | 1.5% |
Data analysis | 2 | 1.5% |
Data breach | 2 | 1.5% |
Data re-identification | 2 | 1.5% |
Data sharing | 2 | 1.5% |
De-identification | 2 | 1.5% |
Defamation | 2 | 1.5% |
Digital Markets Act | 2 | 1.5% |
Digital forensics | 2 | 1.5% |
Digital literacy | 2 | 1.5% |
Dignity | 2 | 1.5% |
Educational technology | 2 | 1.5% |
Electronic identification | 2 | 1.5% |
Emerging technologies | 2 | 1.5% |
Employee monitoring | 2 | 1.5% |
Encryption | 2 | 1.5% |
Evidence (law) | 2 | 1.5% |
Expert | 2 | 1.5% |
Eyewitness memory | 2 | 1.5% |
Face | 2 | 1.5% |
Filter bubble | 2 | 1.5% |
Fourth Industrial Revolution | 2 | 1.5% |
Freedom of Information Act (United States) | 2 | 1.5% |
General Conference (Methodism) | 2 | 1.5% |
Hacktivism | 2 | 1.5% |
Health care | 2 | 1.5% |
Human factors and ergonomics | 2 | 1.5% |
Human migration | 2 | 1.5% |
Human resource management | 2 | 1.5% |
Identity management | 2 | 1.5% |
Immigration | 2 | 1.5% |
Imprisonment | 2 | 1.5% |
Incarceration in the United States | 2 | 1.5% |
Inference | 2 | 1.5% |
Inference engine | 2 | 1.5% |
Insurance | 2 | 1.5% |
International relations | 2 | 1.5% |
Internet governance | 2 | 1.5% |
Jury | 2 | 1.5% |
Knowledge | 2 | 1.5% |
Life-cycle assessment | 2 | 1.5% |
Malaysia Airlines Flight 17 | 2 | 1.5% |
Market (economics) | 2 | 1.5% |
Mass media in Russia | 2 | 1.5% |
Metaverse | 2 | 1.5% |
Mobile app | 2 | 1.5% |
Multistakeholder governance | 2 | 1.5% |
Non-governmental organization | 2 | 1.5% |
Nordic countries | 2 | 1.5% |
Notified body | 2 | 1.5% |
Online and offline | 2 | 1.5% |
Open government | 2 | 1.5% |
Passport | 2 | 1.5% |
Password | 2 | 1.5% |
Perception | 2 | 1.5% |
Predictive analytics | 2 | 1.5% |
Pricing | 2 | 1.5% |
Prison | 2 | 1.5% |
Privacy and Electronic Communications Directive 2002 | 2 | 1.5% |
Probable cause | 2 | 1.5% |
Procurement | 2 | 1.5% |
Product certification | 2 | 1.5% |
Product lifecycle | 2 | 1.5% |
Productivity | 2 | 1.5% |
Propaganda | 2 | 1.5% |
Punishment | 2 | 1.5% |
Qualified immunity | 2 | 1.5% |
Race (human categorization) | 2 | 1.5% |
Reason | 2 | 1.5% |
Refugee | 2 | 1.5% |
Robotics | 2 | 1.5% |
Rulemaking | 2 | 1.5% |
S and Marper v United Kingdom | 2 | 1.5% |
Schengen Area | 2 | 1.5% |
Science | 2 | 1.5% |
Search engine | 2 | 1.5% |
Section 230 | 2 | 1.5% |
Security engineering | 2 | 1.5% |
Security technology | 2 | 1.5% |
Sentence (law) | 2 | 1.5% |
Smartphone | 2 | 1.5% |
Social justice | 2 | 1.5% |
Social robot | 2 | 1.5% |
Software | 2 | 1.5% |
Space | 2 | 1.5% |
TVET (Technical and Vocational Education and Training) | 2 | 1.5% |
Telephone tapping | 2 | 1.5% |
Terms of service | 2 | 1.5% |
Type approval | 2 | 1.5% |
Universal Declaration of Human Rights | 2 | 1.5% |
Unmanned aerial vehicle | 2 | 1.5% |
Verification and validation | 2 | 1.5% |
Visa Waiver Program | 2 | 1.5% |
Vocational education | 2 | 1.5% |
Wearable computer | 2 | 1.5% |
Website | 2 | 1.5% |
Working time | 2 | 1.5% |
Workplace bullying | 2 | 1.5% |
2015 European migrant crisis | 1 | 0.7% |
3D computer graphics | 1 | 0.7% |
Aadhaar | 1 | 0.7% |
Aarogya Setu | 1 | 0.7% |
Abortion | 1 | 0.7% |
Abortion in the United States | 1 | 0.7% |
Access to public information in Europe | 1 | 0.7% |
Accessibility | 1 | 0.7% |
Acquittal | 1 | 0.7% |
Active measures | 1 | 0.7% |
Administrative Procedure Act (United States) | 1 | 0.7% |
Admissible evidence | 1 | 0.7% |
Africa | 1 | 0.7% |
Airport | 1 | 0.7% |
Alexei Navalny | 1 | 0.7% |
Alternative dispute resolution | 1 | 0.7% |
Amazon Alexa | 1 | 0.7% |
Amazon Echo | 1 | 0.7% |
Analytical chemistry | 1 | 0.7% |
Andrei Soldatov | 1 | 0.7% |
Android (operating system) | 1 | 0.7% |
Annexation of Crimea by the Russian Federation | 1 | 0.7% |
Anti-Terrorism Act of 2020 | 1 | 0.7% |
Anti-satellite weapon | 1 | 0.7% |
Antonin Scalia | 1 | 0.7% |
Apprendi v. New Jersey | 1 | 0.7% |
Appropriations bill (United States) | 1 | 0.7% |
Arbitration | 1 | 0.7% |
Area of freedom, security and justice | 1 | 0.7% |
Arrest warrant | 1 | 0.7% |
Artificial Intelligence for IT Operations | 1 | 0.7% |
Artificial general intelligence | 1 | 0.7% |
Artificial neural network | 1 | 0.7% |
Assault | 1 | 0.7% |
Attitude (psychology) | 1 | 0.7% |
Augmented reality | 1 | 0.7% |
Automated fingerprint identification | 1 | 0.7% |
Autonomous robot | 1 | 0.7% |
Barack Obama | 1 | 0.7% |
Batticaloa | 1 | 0.7% |
Biodiversity | 1 | 0.7% |
Biometric passport | 1 | 0.7% |
Botnet | 1 | 0.7% |
Brady disclosure | 1 | 0.7% |
Bullying | 1 | 0.7% |
Campaign advertising | 1 | 0.7% |
Capital Requirements Directives | 1 | 0.7% |
Card reader | 1 | 0.7% |
Carding (fraud) | 1 | 0.7% |
CatalanGate | 1 | 0.7% |
Chatbot | 1 | 0.7% |
Child pornography | 1 | 0.7% |
Children's rights | 1 | 0.7% |
Choice architecture | 1 | 0.7% |
Chokehold | 1 | 0.7% |
Civil and political rights | 1 | 0.7% |
Civil forfeiture in the United States | 1 | 0.7% |
Class action | 1 | 0.7% |
Clickbait | 1 | 0.7% |
Climate change | 1 | 0.7% |
Climate change mitigation | 1 | 0.7% |
Cognitive bias | 1 | 0.7% |
Collaboration | 1 | 0.7% |
Committee | 1 | 0.7% |
Committee of Ministers of the Council of Europe | 1 | 0.7% |
Common good | 1 | 0.7% |
Community | 1 | 0.7% |
Competition | 1 | 0.7% |
Competition (economics) | 1 | 0.7% |
Competition law | 1 | 0.7% |
Computer | 1 | 0.7% |
Computer and network surveillance | 1 | 0.7% |
Computer science | 1 | 0.7% |
Concentration of media ownership | 1 | 0.7% |
Confidence | 1 | 0.7% |
Confirmation bias | 1 | 0.7% |
Confiscation | 1 | 0.7% |
Congressional Review Act | 1 | 0.7% |
Congressional oversight | 1 | 0.7% |
Conspiracy theory | 1 | 0.7% |
Constitution | 1 | 0.7% |
Constitution of Finland | 1 | 0.7% |
Consumer behaviour | 1 | 0.7% |
Content (media) | 1 | 0.7% |
Content delivery network | 1 | 0.7% |
Continuing resolution | 1 | 0.7% |
Copyright infringement | 1 | 0.7% |
Correlation | 1 | 0.7% |
Counterintelligence | 1 | 0.7% |
Credit card | 1 | 0.7% |
Credit card fraud | 1 | 0.7% |
Crimes against humanity | 1 | 0.7% |
Criminal Code of Finland | 1 | 0.7% |
Criminal justice reform in the United States | 1 | 0.7% |
Crisis | 1 | 0.7% |
Cryptography | 1 | 0.7% |
Customary international law | 1 | 0.7% |
Cyberbullying | 1 | 0.7% |
Cyberstalking | 1 | 0.7% |
Cyberwarfare by Russia | 1 | 0.7% |
Data management | 1 | 0.7% |
Data portability | 1 | 0.7% |
Daubert standard | 1 | 0.7% |
Daubert v. Merrell Dow Pharmaceuticals, Inc. | 1 | 0.7% |
De-escalation | 1 | 0.7% |
Deadly force | 1 | 0.7% |
Debt | 1 | 0.7% |
Definition | 1 | 0.7% |
Deplatforming | 1 | 0.7% |
Derek Chauvin | 1 | 0.7% |
Detective | 1 | 0.7% |
Deterrence (penology) | 1 | 0.7% |
Deviance (sociology) | 1 | 0.7% |
Dialect | 1 | 0.7% |
Digital Single Market | 1 | 0.7% |
Digital cloning | 1 | 0.7% |
Digital divide | 1 | 0.7% |
Digital economy | 1 | 0.7% |
Digital rights | 1 | 0.7% |
Digital signature | 1 | 0.7% |
Digital twin | 1 | 0.7% |
Discretion | 1 | 0.7% |
Disparate impact | 1 | 0.7% |
Domain name | 1 | 0.7% |
Donald Trump | 1 | 0.7% |
Driver's license | 1 | 0.7% |
Drug liberalization | 1 | 0.7% |
Dual-use technology | 1 | 0.7% |
Dublin Regulation | 1 | 0.7% |
Due Process Clause | 1 | 0.7% |
Dynamic pricing | 1 | 0.7% |
EIDAS | 1 | 0.7% |
EUR-Lex | 1 | 0.7% |
Echo chamber (media) | 1 | 0.7% |
Ecological footprint | 1 | 0.7% |
Economic growth | 1 | 0.7% |
Economic, social and cultural rights | 1 | 0.7% |
Economics | 1 | 0.7% |
Election | 1 | 0.7% |
Electrical grid | 1 | 0.7% |
Electronic Commerce Directive 2000 | 1 | 0.7% |
Electronic Communications Privacy Act | 1 | 0.7% |
Electronic signature | 1 | 0.7% |
Elon Musk | 1 | 0.7% |
Emergency | 1 | 0.7% |
Emergency services | 1 | 0.7% |
Emotional self-regulation | 1 | 0.7% |
Empathy | 1 | 0.7% |
Employee retention | 1 | 0.7% |
Engineering | 1 | 0.7% |
Enlargement of the European Union | 1 | 0.7% |
Environmental impact assessment | 1 | 0.7% |
Equality Act 2010 | 1 | 0.7% |
Espionage | 1 | 0.7% |
Ethics of artificial intelligence | 1 | 0.7% |
Euro | 1 | 0.7% |
Europe | 1 | 0.7% |
European Union legislative procedure | 1 | 0.7% |
Exculpatory evidence | 1 | 0.7% |
Expectation of privacy (United States) | 1 | 0.7% |
Explainable artificial intelligence | 1 | 0.7% |
Exploit (computer security) | 1 | 0.7% |
Export control | 1 | 0.7% |
Eye tracking | 1 | 0.7% |
Eyewitness identification | 1 | 0.7% |
FTC fair information practice | 1 | 0.7% |
Fair use | 1 | 0.7% |
Feasibility study | 1 | 0.7% |
Federal preemption | 1 | 0.7% |
Federated learning | 1 | 0.7% |
Fiduciary | 1 | 0.7% |
Fifth Amendment to the United States Constitution | 1 | 0.7% |
First Amendment to the United States Constitution | 1 | 0.7% |
Food | 1 | 0.7% |
Force | 1 | 0.7% |
Forced displacement | 1 | 0.7% |
Foreign Intelligence Surveillance Act | 1 | 0.7% |
Forensic identification | 1 | 0.7% |
Forgery | 1 | 0.7% |
Fundamental rights | 1 | 0.7% |
Future | 1 | 0.7% |
Gaza Strip | 1 | 0.7% |
Gender equality | 1 | 0.7% |
General principles of European Union law | 1 | 0.7% |
Generation Z | 1 | 0.7% |
Geneva Conventions | 1 | 0.7% |
Genocide | 1 | 0.7% |
Genomics | 1 | 0.7% |
Geographic information system | 1 | 0.7% |
Geopolitics | 1 | 0.7% |
Geospatial intelligence | 1 | 0.7% |
Gerasimov doctrine | 1 | 0.7% |
Gift card | 1 | 0.7% |
Globalization | 1 | 0.7% |
Government institutions | 1 | 0.7% |
Gundy v. United States | 1 | 0.7% |
HADOPI law | 1 | 0.7% |
HTTP cookie | 1 | 0.7% |
Harassment | 1 | 0.7% |
Hashtag | 1 | 0.7% |
Hatch Act of 1939 | 1 | 0.7% |
Hate speech | 1 | 0.7% |
Hatred | 1 | 0.7% |
Health Insurance Portability and Accountability Act | 1 | 0.7% |
Health data | 1 | 0.7% |
Health information on the Internet | 1 | 0.7% |
Hearsay | 1 | 0.7% |
Home automation | 1 | 0.7% |
Housing discrimination in the United States | 1 | 0.7% |
Human resource management system | 1 | 0.7% |
Human rights defender | 1 | 0.7% |
Human subject research | 1 | 0.7% |
Human–computer interaction | 1 | 0.7% |
Hybrid warfare | 1 | 0.7% |
IT security standards | 1 | 0.7% |
Identity fraud | 1 | 0.7% |
Identity verification service | 1 | 0.7% |
Igor Sergun | 1 | 0.7% |
Image scanner | 1 | 0.7% |
Immersion (virtual reality) | 1 | 0.7% |
Incapacitation (penology) | 1 | 0.7% |
Incentive | 1 | 0.7% |
Industrial and organizational psychology | 1 | 0.7% |
Information and communications technology | 1 | 0.7% |
Information broker | 1 | 0.7% |
Information literacy | 1 | 0.7% |
Information science | 1 | 0.7% |
Information seeking | 1 | 0.7% |
Instant messaging | 1 | 0.7% |
Institutional review board | 1 | 0.7% |
Intellectual property | 1 | 0.7% |
Intelligence, surveillance, target acquisition, and reconnaissance | 1 | 0.7% |
Intention | 1 | 0.7% |
International Convention on the Elimination of All Forms of Racial Discrimination | 1 | 0.7% |
International criminal law | 1 | 0.7% |
International human rights law | 1 | 0.7% |
International humanitarian law | 1 | 0.7% |
International law | 1 | 0.7% |
International security | 1 | 0.7% |
Internet access | 1 | 0.7% |
Internet celebrity | 1 | 0.7% |
Internet outage | 1 | 0.7% |
Internet universality | 1 | 0.7% |
Interpol notice | 1 | 0.7% |
Istanbul Protocol | 1 | 0.7% |
Job interview | 1 | 0.7% |
Judiciaries | 1 | 0.7% |
Jurisdiction | 1 | 0.7% |
Jury trial | 1 | 0.7% |
Katz v. United States | 1 | 0.7% |
Labour economics | 1 | 0.7% |
Labour law | 1 | 0.7% |
Language assessment | 1 | 0.7% |
Law enforcement in the United States | 1 | 0.7% |
Leadership | 1 | 0.7% |
Legal liability | 1 | 0.7% |
Legal procedure | 1 | 0.7% |
Legislative branch of the United States government | 1 | 0.7% |
License | 1 | 0.7% |
Lilian Edwards | 1 | 0.7% |
Linguistics | 1 | 0.7% |
Literacy | 1 | 0.7% |
Logistics | 1 | 0.7% |
Louis Brandeis | 1 | 0.7% |
Low-carbon economy | 1 | 0.7% |
Machine-readable passport | 1 | 0.7% |
Management | 1 | 0.7% |
Margarita Simonyan | 1 | 0.7% |
Maria Cantwell | 1 | 0.7% |
Mark Zuckerberg | 1 | 0.7% |
Mass atrocity crimes | 1 | 0.7% |
Max Schrems | 1 | 0.7% |
Media (communication) | 1 | 0.7% |
Media literacy | 1 | 0.7% |
Medical imaging | 1 | 0.7% |
Metadata | 1 | 0.7% |
Microtargeting | 1 | 0.7% |
Military doctrine | 1 | 0.7% |
Mind | 1 | 0.7% |
Minnesota Protocol | 1 | 0.7% |
Miscarriage of justice | 1 | 0.7% |
Mixed reality | 1 | 0.7% |
Morality | 1 | 0.7% |
Murder | 1 | 0.7% |
Murder of Seth Rich | 1 | 0.7% |
NHS Connecting for Health | 1 | 0.7% |
Nation | 1 | 0.7% |
National Environmental Policy Act | 1 | 0.7% |
National Pupil Database | 1 | 0.7% |
Natural justice | 1 | 0.7% |
Natural language processing | 1 | 0.7% |
Near-field communication | 1 | 0.7% |
Neil Gorsuch | 1 | 0.7% |
Net neutrality | 1 | 0.7% |
Newspaper | 1 | 0.7% |
No-knock warrant | 1 | 0.7% |
Non-lethal weapon | 1 | 0.7% |
Nondelegation doctrine | 1 | 0.7% |
Nuclear weapon | 1 | 0.7% |
Nudge theory | 1 | 0.7% |
Oculus Rift | 1 | 0.7% |
Online hate speech | 1 | 0.7% |
Online newspaper | 1 | 0.7% |
Open access | 1 | 0.7% |
Open data | 1 | 0.7% |
Open source | 1 | 0.7% |
Open-source intelligence | 1 | 0.7% |
Organized crime | 1 | 0.7% |
Outsourcing | 1 | 0.7% |
Overfitting | 1 | 0.7% |
PAYGO | 1 | 0.7% |
Parking | 1 | 0.7% |
Patient | 1 | 0.7% |
Paywall | 1 | 0.7% |
Pegasus Project (investigation) | 1 | 0.7% |
Penal Code (Singapore) | 1 | 0.7% |
Pepper spray | 1 | 0.7% |
Performance appraisal | 1 | 0.7% |
Personal Information Protection and Electronic Documents Act | 1 | 0.7% |
Personalization | 1 | 0.7% |
Peter Pomerantsev | 1 | 0.7% |
Plandemic | 1 | 0.7% |
Pledge of Allegiance | 1 | 0.7% |
Police accountability | 1 | 0.7% |
Police car | 1 | 0.7% |
Police misconduct | 1 | 0.7% |
Police officer | 1 | 0.7% |
Police use of deadly force in the United States | 1 | 0.7% |
Political warfare | 1 | 0.7% |
Polygraph | 1 | 0.7% |
Post-quantum cryptography | 1 | 0.7% |
Powers of the police in England and Wales | 1 | 0.7% |
Precision medicine | 1 | 0.7% |
Prediction | 1 | 0.7% |
Predictive policing | 1 | 0.7% |
Presidency of Joe Biden | 1 | 0.7% |
Press release | 1 | 0.7% |
Privacy by design | 1 | 0.7% |
Privacy engineering | 1 | 0.7% |
Privacy settings | 1 | 0.7% |
Proactive cyber defence | 1 | 0.7% |
Product liability | 1 | 0.7% |
Profiling (information science) | 1 | 0.7% |
Propaganda in the Russian Federation | 1 | 0.7% |
Property | 1 | 0.7% |
Psychological resilience | 1 | 0.7% |
Psychological warfare | 1 | 0.7% |
Psychology | 1 | 0.7% |
Public broadcasting | 1 | 0.7% |
Public engagement | 1 | 0.7% |
Public key infrastructure | 1 | 0.7% |
Public safety | 1 | 0.7% |
Publication ban | 1 | 0.7% |
Quantum network | 1 | 0.7% |
REvil | 1 | 0.7% |
Racial profiling | 1 | 0.7% |
Real-time computing | 1 | 0.7% |
Recidivism | 1 | 0.7% |
Recommender system | 1 | 0.7% |
Records management | 1 | 0.7% |
Recycling | 1 | 0.7% |
Redlining | 1 | 0.7% |
Regulation of Investigatory Powers Act 2000 | 1 | 0.7% |
Rehabilitation Act of 1973 | 1 | 0.7% |
Relevance (law) | 1 | 0.7% |
Reuse | 1 | 0.7% |
Right of asylum | 1 | 0.7% |
Right to a fair trial | 1 | 0.7% |
Right to explanation | 1 | 0.7% |
Right to property | 1 | 0.7% |
Risk management | 1 | 0.7% |
Rita v. United States | 1 | 0.7% |
Roe v. Wade | 1 | 0.7% |
Roman Giertych | 1 | 0.7% |
Rome Statute of the International Criminal Court | 1 | 0.7% |
Rule of law | 1 | 0.7% |
Russian foreign agent law | 1 | 0.7% |
Russian interference in the 2020 United States elections | 1 | 0.7% |
Russo-Georgian War | 1 | 0.7% |
Résumé | 1 | 0.7% |
Samuel Alito | 1 | 0.7% |
Sandra Wachter | 1 | 0.7% |
Scenario planning | 1 | 0.7% |
Schengen Information System | 1 | 0.7% |
Scientific method | 1 | 0.7% |
Search and seizure | 1 | 0.7% |
Second Chechen War | 1 | 0.7% |
Secure communication | 1 | 0.7% |
Security hacker | 1 | 0.7% |
Self-censorship | 1 | 0.7% |
Sensationalism | 1 | 0.7% |
September 11 attacks | 1 | 0.7% |
Sexual orientation | 1 | 0.7% |
Simulation | 1 | 0.7% |
Sixth Amendment to the United States Constitution | 1 | 0.7% |
Smart card | 1 | 0.7% |
Smart city | 1 | 0.7% |
Social engineering (security) | 1 | 0.7% |
Social norm | 1 | 0.7% |
Society | 1 | 0.7% |
Soft law | 1 | 0.7% |
Sovereign immunity | 1 | 0.7% |
Space exploration | 1 | 0.7% |
Sri Lankan Tamils | 1 | 0.7% |
State media | 1 | 0.7% |
Statistics | 1 | 0.7% |
Stingray phone tracker | 1 | 0.7% |
Strategic lawsuit against public participation | 1 | 0.7% |
Strategy | 1 | 0.7% |
Supply chain attack | 1 | 0.7% |
Surveillance issues in smart cities | 1 | 0.7% |
Sustainable procurement | 1 | 0.7% |
Synthetic media | 1 | 0.7% |
Targeted advertising | 1 | 0.7% |
Tax credit overpayment | 1 | 0.7% |
Technological convergence | 1 | 0.7% |
Telecommunications in Angola | 1 | 0.7% |
Tenant screening | 1 | 0.7% |
Terrorism Act 2000 | 1 | 0.7% |
Terrorism financing | 1 | 0.7% |
Testimony | 1 | 0.7% |
Theft | 1 | 0.7% |
Theory | 1 | 0.7% |
Third country resettlement | 1 | 0.7% |
Threat (computer) | 1 | 0.7% |
Tor (network) | 1 | 0.7% |
Tort | 1 | 0.7% |
Torture | 1 | 0.7% |
Traceability | 1 | 0.7% |
Trade and Technology Council | 1 | 0.7% |
Traffic | 1 | 0.7% |
Training and development | 1 | 0.7% |
Training, validation, and test sets | 1 | 0.7% |
Transitional justice | 1 | 0.7% |
Transparency of media ownership in Europe | 1 | 0.7% |
Travel document | 1 | 0.7% |
Tribunal | 1 | 0.7% |
Trickbot | 1 | 0.7% |
Trust law | 1 | 0.7% |
Trust service provider | 1 | 0.7% |
Trustee | 1 | 0.7% |
Truth | 1 | 0.7% |
Turnover (employment) | 1 | 0.7% |
Type I and type II errors | 1 | 0.7% |
UNICRI Centre for AI and Robotics | 1 | 0.7% |
Ubiquitous computing | 1 | 0.7% |
Unfair Commercial Practices Directive 2005 | 1 | 0.7% |
United Nations Convention against Torture | 1 | 0.7% |
United States Code | 1 | 0.7% |
United States Federal Sentencing Guidelines | 1 | 0.7% |
United States budget process | 1 | 0.7% |
United States v. Jones | 1 | 0.7% |
Universal jurisdiction | 1 | 0.7% |
Use of force | 1 | 0.7% |
User-generated content | 1 | 0.7% |
Vaccine hesitancy | 1 | 0.7% |
Vaccine passports during the COVID-19 pandemic | 1 | 0.7% |
Vehicle registration plate | 1 | 0.7% |
Victimisation | 1 | 0.7% |
Video | 1 | 0.7% |
Video content analysis | 1 | 0.7% |
Viral phenomenon | 1 | 0.7% |
Virtual assistant | 1 | 0.7% |
Virtual reality | 1 | 0.7% |
Virtual reality headset | 1 | 0.7% |
Visa Information System | 1 | 0.7% |
Visa policy of the Schengen Area | 1 | 0.7% |
Voice user interface | 1 | 0.7% |
Volodymyr Zelenskyy | 1 | 0.7% |
Věra Jourová | 1 | 0.7% |
WannaCry ransomware attack | 1 | 0.7% |
War | 1 | 0.7% |
War crime | 1 | 0.7% |
Web Content Accessibility Guidelines | 1 | 0.7% |
Web scraping | 1 | 0.7% |
Wi-Fi | 1 | 0.7% |
Windhoek Declaration | 1 | 0.7% |
Woman | 1 | 0.7% |
Workplace impact of artificial intelligence | 1 | 0.7% |
Yevgeny Prigozhin | 1 | 0.7% |
Zero-day (computing) | 1 | 0.7% |
abs | rel | |
---|---|---|
Human activities | 25 | 89.3% |
Government | 22 | 78.6% |
Politics | 22 | 78.6% |
Privacy | 21 | 75.0% |
Justice | 19 | 67.9% |
Law | 19 | 67.9% |
Applied ethics | 16 | 57.1% |
Public sphere | 16 | 57.1% |
Policy | 14 | 50.0% |
Social institutions | 14 | 50.0% |
Technology | 14 | 50.0% |
Artificial intelligence | 13 | 46.4% |
Information privacy | 13 | 46.4% |
Personal data | 13 | 46.4% |
Social issues | 12 | 42.9% |
General Data Protection Regulation | 11 | 39.3% |
Surveillance | 11 | 39.3% |
Biometrics | 10 | 35.7% |
Computing | 9 | 32.1% |
Facial recognition system | 9 | 32.1% |
Issues in ethics | 9 | 32.1% |
National security | 8 | 28.6% |
Ethical principles | 7 | 25.0% |
Human rights | 7 | 25.0% |
Information technology | 7 | 25.0% |
Rights | 7 | 25.0% |
Risk | 7 | 25.0% |
Freedom of speech | 6 | 21.4% |
Governance | 6 | 21.4% |
Government and personhood | 6 | 21.4% |
Regulatory compliance | 6 | 21.4% |
Bias | 5 | 17.9% |
Crime | 5 | 17.9% |
Directive (European Union) | 5 | 17.9% |
Information | 5 | 17.9% |
Public law | 5 | 17.9% |
Virtue | 5 | 17.9% |
Accountability | 4 | 14.3% |
Authentication | 4 | 14.3% |
Computer security | 4 | 14.3% |
Ethics | 4 | 14.3% |
Fundamental rights in India | 4 | 14.3% |
Identity document | 4 | 14.3% |
Research | 4 | 14.3% |
Social media | 4 | 14.3% |
Transparency (behavior) | 4 | 14.3% |
Big data | 3 | 10.7% |
Civil rights and liberties | 3 | 10.7% |
Closed-circuit television | 3 | 10.7% |
Data Protection Directive | 3 | 10.7% |
Discrimination | 3 | 10.7% |
Education | 3 | 10.7% |
Fingerprint | 3 | 10.7% |
Fundamental rights | 3 | 10.7% |
Information technology management | 3 | 10.7% |
Innovation | 3 | 10.7% |
Internet of things | 3 | 10.7% |
Iris recognition | 3 | 10.7% |
Machine learning | 3 | 10.7% |
Privacy and Electronic Communications Directive 2002 | 3 | 10.7% |
Access to information | 2 | 7.1% |
Analytics | 2 | 7.1% |
Automatic number-plate recognition | 2 | 7.1% |
Branches of science | 2 | 7.1% |
Business | 2 | 7.1% |
Charter of Fundamental Rights of the European Union | 2 | 7.1% |
Cloud computing | 2 | 7.1% |
Common law | 2 | 7.1% |
Computer network | 2 | 7.1% |
Consensus decision-making | 2 | 7.1% |
Consent | 2 | 7.1% |
Crime prevention | 2 | 7.1% |
Criminal justice | 2 | 7.1% |
Cultural diversity | 2 | 7.1% |
Culture | 2 | 7.1% |
Data | 2 | 7.1% |
Data laws | 2 | 7.1% |
Data retention | 2 | 7.1% |
Data security | 2 | 7.1% |
Database | 2 | 7.1% |
Deepfake | 2 | 7.1% |
Digital technology | 2 | 7.1% |
Foreign Intelligence Surveillance Act | 2 | 7.1% |
Fraud | 2 | 7.1% |
Identity theft | 2 | 7.1% |
Information broker | 2 | 7.1% |
Internet | 2 | 7.1% |
Interoperability | 2 | 7.1% |
Law enforcement in the United Kingdom | 2 | 7.1% |
Mass surveillance | 2 | 7.1% |
Media pluralism | 2 | 7.1% |
News | 2 | 7.1% |
Personal Information Protection and Electronic Documents Act | 2 | 7.1% |
Personally identifiable information | 2 | 7.1% |
Pluralism (political theory) | 2 | 7.1% |
Privacy Impact Assessment | 2 | 7.1% |
Privacy law | 2 | 7.1% |
Right to privacy | 2 | 7.1% |
Search warrant | 2 | 7.1% |
Security | 2 | 7.1% |
Smart city | 2 | 7.1% |
Society | 2 | 7.1% |
Speaker recognition | 2 | 7.1% |
3G | 1 | 3.6% |
Aadhaar | 1 | 3.6% |
Access control | 1 | 3.6% |
Areas of computer science | 1 | 3.6% |
Arrest | 1 | 3.6% |
Assumption | 1 | 3.6% |
Audit | 1 | 3.6% |
Automation | 1 | 3.6% |
Autonomy | 1 | 3.6% |
Barcode reader | 1 | 3.6% |
Bill (law) | 1 | 3.6% |
BioAPI | 1 | 3.6% |
Biometric passport | 1 | 3.6% |
Bluetooth | 1 | 3.6% |
Border control | 1 | 3.6% |
Business process | 1 | 3.6% |
Cabinet (government) | 1 | 3.6% |
Camera | 1 | 3.6% |
Card reader | 1 | 3.6% |
Carpenter v. United States | 1 | 3.6% |
Civil and political rights | 1 | 3.6% |
Civil liberties | 1 | 3.6% |
Civil society | 1 | 3.6% |
Classified information | 1 | 3.6% |
Classified information in the United States | 1 | 3.6% |
Clinical governance | 1 | 3.6% |
Committee | 1 | 3.6% |
Communication | 1 | 3.6% |
Competition | 1 | 3.6% |
Computer data storage | 1 | 3.6% |
Concepts in metaphysics | 1 | 3.6% |
Confidentiality | 1 | 3.6% |
Congressional oversight | 1 | 3.6% |
Consumer privacy | 1 | 3.6% |
Consumer protection | 1 | 3.6% |
Contactless smart card | 1 | 3.6% |
Conversation | 1 | 3.6% |
Credit | 1 | 3.6% |
Credit bureau | 1 | 3.6% |
Credit history | 1 | 3.6% |
Credit score | 1 | 3.6% |
Crime analysis | 1 | 3.6% |
Criminal law | 1 | 3.6% |
Criminal record | 1 | 3.6% |
Cybercrime | 1 | 3.6% |
Cyberwarfare | 1 | 3.6% |
DNA profiling | 1 | 3.6% |
Data Protection Act 1998 | 1 | 3.6% |
Data analysis | 1 | 3.6% |
Data breach | 1 | 3.6% |
Data management | 1 | 3.6% |
Deborah Raji | 1 | 3.6% |
Defeat device | 1 | 3.6% |
Democracy | 1 | 3.6% |
Department of motor vehicles | 1 | 3.6% |
Digital camera | 1 | 3.6% |
Digital identity | 1 | 3.6% |
Digital identity in Australia | 1 | 3.6% |
Dignity | 1 | 3.6% |
Director of National Intelligence | 1 | 3.6% |
Discovery (law) | 1 | 3.6% |
Disinformation | 1 | 3.6% |
Dots per inch | 1 | 3.6% |
Economic development | 1 | 3.6% |
Economic inequality | 1 | 3.6% |
Economy | 1 | 3.6% |
Edge computing | 1 | 3.6% |
Electronic Communications Privacy Act | 1 | 3.6% |
Electronic identification | 1 | 3.6% |
Electronics | 1 | 3.6% |
Employment | 1 | 3.6% |
Encryption | 1 | 3.6% |
Environmental impact assessment | 1 | 3.6% |
Environmental impact statement | 1 | 3.6% |
Equal opportunity | 1 | 3.6% |
European Convention on Human Rights | 1 | 3.6% |
European Union law | 1 | 3.6% |
Evaluation | 1 | 3.6% |
Expectation of privacy (United States) | 1 | 3.6% |
Expert | 1 | 3.6% |
Face | 1 | 3.6% |
Fax | 1 | 3.6% |
Federal Information Security Management Act of 2002 | 1 | 3.6% |
Feminism | 1 | 3.6% |
Forecasting | 1 | 3.6% |
Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 | 1 | 3.6% |
Forensic identification | 1 | 3.6% |
Forensic science | 1 | 3.6% |
Fourth Amendment to the United States Constitution | 1 | 3.6% |
Freedom of Information Act (United States) | 1 | 3.6% |
Freedom of movement | 1 | 3.6% |
Global surveillance disclosures (2013–present) | 1 | 3.6% |
Graphics display resolution | 1 | 3.6% |
Health | 1 | 3.6% |
Health care | 1 | 3.6% |
Human Rights Impact Assessment | 1 | 3.6% |
IEEE 802.11 | 1 | 3.6% |
Illegal immigration | 1 | 3.6% |
Image resolution | 1 | 3.6% |
Image scanner | 1 | 3.6% |
Immigration | 1 | 3.6% |
Industry (economics) | 1 | 3.6% |
Information Age | 1 | 3.6% |
Information governance | 1 | 3.6% |
Information security | 1 | 3.6% |
Information sensitivity | 1 | 3.6% |
Infrastructure | 1 | 3.6% |
Integrated Automated Fingerprint Identification System | 1 | 3.6% |
Internal control | 1 | 3.6% |
International security | 1 | 3.6% |
Internet access | 1 | 3.6% |
Internet governance | 1 | 3.6% |
Internet privacy | 1 | 3.6% |
Interview | 1 | 3.6% |
Intranet | 1 | 3.6% |
Investigatory Powers Act 2016 | 1 | 3.6% |
Joe Biden | 1 | 3.6% |
Joy Buolamwini | 1 | 3.6% |
Judgment (law) | 1 | 3.6% |
Jurisdiction | 1 | 3.6% |
Law and economics | 1 | 3.6% |
Law enforcement in the United States | 1 | 3.6% |
Lawyer | 1 | 3.6% |
Leadership | 1 | 3.6% |
Legitimacy (political) | 1 | 3.6% |
License | 1 | 3.6% |
Lip reading | 1 | 3.6% |
Management | 1 | 3.6% |
Medical imaging | 1 | 3.6% |
Mobile device | 1 | 3.6% |
Money laundering | 1 | 3.6% |
Morality | 1 | 3.6% |
Multistakeholder governance model | 1 | 3.6% |
National Environmental Policy Act | 1 | 3.6% |
Near-field communication | 1 | 3.6% |
Netzwerkdurchsetzungsgesetz | 1 | 3.6% |
Non-governmental organization | 1 | 3.6% |
Notified body | 1 | 3.6% |
Online and offline | 1 | 3.6% |
Online hate speech | 1 | 3.6% |
Operating system | 1 | 3.6% |
Organization | 1 | 3.6% |
Parliament | 1 | 3.6% |
Password | 1 | 3.6% |
Patriot Act | 1 | 3.6% |
Perception | 1 | 3.6% |
Person | 1 | 3.6% |
Personal digital assistant | 1 | 3.6% |
Personal identification number | 1 | 3.6% |
Pixel | 1 | 3.6% |
Police National Computer | 1 | 3.6% |
Pornography | 1 | 3.6% |
Predictive policing | 1 | 3.6% |
Priority Enforcement Program | 1 | 3.6% |
Probable cause | 1 | 3.6% |
Procurator fiscal | 1 | 3.6% |
Procurement | 1 | 3.6% |
Propaganda | 1 | 3.6% |
Proportionality (law) | 1 | 3.6% |
Prosecutor | 1 | 3.6% |
Radio-frequency identification | 1 | 3.6% |
Records management | 1 | 3.6% |
Reno v. Flores | 1 | 3.6% |
Research and development | 1 | 3.6% |
Retinal scan | 1 | 3.6% |
Revenge porn | 1 | 3.6% |
Right to a fair trial | 1 | 3.6% |
Right to be forgotten | 1 | 3.6% |
Risk management | 1 | 3.6% |
Science | 1 | 3.6% |
Scots law | 1 | 3.6% |
Section summary of the Patriot Act, Title II | 1 | 3.6% |
Secure Digital | 1 | 3.6% |
Security clearance | 1 | 3.6% |
Security technology | 1 | 3.6% |
Self-driving car | 1 | 3.6% |
Signature | 1 | 3.6% |
Situation awareness | 1 | 3.6% |
Smart card | 1 | 3.6% |
Software as a service | 1 | 3.6% |
Standardization | 1 | 3.6% |
Sunset provision | 1 | 3.6% |
Survey methodology | 1 | 3.6% |
System | 1 | 3.6% |
Technological singularity | 1 | 3.6% |
Telecommunication | 1 | 3.6% |
Telephone tapping | 1 | 3.6% |
Terrorism financing | 1 | 3.6% |
Three warfares | 1 | 3.6% |
Touchscreen | 1 | 3.6% |
Trade secret | 1 | 3.6% |
Treaties of the European Union | 1 | 3.6% |
Trump administration family separation policy | 1 | 3.6% |
Trust law | 1 | 3.6% |
Type approval | 1 | 3.6% |
USA Freedom Act | 1 | 3.6% |
USB | 1 | 3.6% |
Unaccompanied Alien Children | 1 | 3.6% |
Vein matching | 1 | 3.6% |
Victimisation | 1 | 3.6% |
Video manipulation | 1 | 3.6% |
Voice user interface | 1 | 3.6% |
Volkswagen emissions scandal | 1 | 3.6% |
Wi-Fi | 1 | 3.6% |
Wireless | 1 | 3.6% |
World Summit on the Information Society | 1 | 3.6% |