Figures & data
Table 1 Mapping the consequences of enacting privacy safeguards
Table A1 Summary of data sources
![](/cms/asset/c2e1a7ef-c5b1-4619-96cb-f539562af43f/tjis_a_11934410_uf0001_ob.gif)
![](/cms/asset/cd5dd79f-2ff3-4f51-bbfe-4ada90981eb7/tjis_a_11934410_uf0002_ob.gif)
![](/cms/asset/8bece973-e0ff-40d8-ad3a-7c7fe41ca1ae/tjis_a_11934410_uf0003_ob.gif)
Table D1 Illustrative supporting data for unintended consequences
Table E1 Illustrative supporting data for intended or expected consequences
Table F1 Empirical grounding of the study
Table G1 Research process evaluation criteria
Table H1 Sample privacy and security assessment tool