Fuzzy sets in data protection: Strategies and cardinalities