{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:08:55Z","timestamp":1759961335283,"version":"3.41.2"},"reference-count":10,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2017,8,14]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to provide a non-academic perspective on the research reports of the JICES \u201cPost-Snowden\u201d special edition, from the viewpoint of a privacy advocate with an IT background.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This paper was written after reviewing the country reports for Japan, New Zealand, PRC and Taiwan, Spain and Sweden, as well as the Introduction paper. The author has also drawn on online sources such as news articles to substantiate his analysis of attitudes to technical privacy protection post-Snowden.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Post-Snowden, the general perception of threats to online privacy has shifted from a predominant focus on commercial threats to a recognition that government activities, in the sphere of intelligence and national security, also give rise to significant privacy risk. Snowden\u2019s disclosures have challenged many of our assumptions about effective oversight of interception capabilities. Citizens\u2019 expectations in this regard depend partly on national experience of the relationship between citizen and government, and can evolve rapidly. The tension between legitimate law enforcement access and personal privacy remains challenging to resolve.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>As a \u201cviewpoint\u201d paper, this submission draws heavily on the author\u2019s experience as a privacy and technology subject-matter expert. Although it therefore contains a higher proportion of opinion than the academic papers in this issue, his hope is that it will stimulate debate and further research.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-02-2017-0010","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T07:25:41Z","timestamp":1498634741000},"page":"328-335","source":"Crossref","is-referenced-by-count":5,"title":["After Snowden \u2013 the evolving landscape of privacy and technology"],"prefix":"10.1108","volume":"15","author":[{"given":"Robin","family":"Wilton","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2020120602374727200_ref001","unstructured":"Bentham-Project (2010), \u201cThe more strictly we are watched, the better we behave\u201d, The Bentham Project, University College London, available at: www.ucl.ac.uk\/Bentham-Project\/documents\/leaflets\/benthampanopticon.pdf"},{"key":"key2020120602374727200_ref002","unstructured":"Bitkower, D. (2016), \u201cUS department of justice\u201d, April 2016, available at: https:\/\/phys.org\/news\/2016-04-encryption-row-spotlights-privacy.html"},{"key":"key2020120602374727200_ref003","unstructured":"Bowcott, G. (2017), Cited in the Spanish research report for this issue."},{"key":"key2020120602374727200_ref004","unstructured":"Greer, S. (1997), \u201cThe exceptions to articles 8 and 11 of the ECHR\u201d, available at: www.echr.coe.int\/LibraryDocs\/DG2\/HRFILES\/DG2-EN-HRFILES-15(1997).pdf"},{"key":"key2020120602374727200_ref005","unstructured":"IETF (2014), \u201cInternet engineering task force\u201d, RFC7258, May 2014, available at: https:\/\/tools.ietf.org\/html\/rfc7258"},{"key":"key2020120602374727200_ref006","unstructured":"Intelligence Services Commissioner (2015), Annual Reports of the Intelligence Services Commissioner, available at: http:\/\/intelligencecommissioner.com\/content.asp?id=19"},{"key":"key2020120602374727200_ref007","unstructured":"Kelly, J. (2017), \u201cUS secretary of state for homeland security\u201d, February 2017, available at: www.nbcnews.com\/news\/us-news\/amp\/us-visitors-may-have-hand-over-social-media-passwords-kelly-n718216"},{"key":"key2020120602374727200_ref008","unstructured":"Korff, D. (2009), \u201cThe Standard Approach to Case Assessment Under Articles 8-11 and Article 2 ECHR\u201d, available at: http:\/\/ec.europa.eu\/justice\/news\/events\/conference_dp_2009\/presentations_speeches\/KORFF_Douwe_a.pdf"},{"key":"key2020120602374727200_ref009","unstructured":"Newsweek (2015), Newsweek Article on a Report by the Information Technology and Innovation Foundation, available at: http:\/\/europe.newsweek.com\/nsa-surveillance-may-cost-us-tech-companies-more-35-billion-328482"},{"key":"key2020120602374727200_ref010","unstructured":"Theguardian (2015), \u201cUK-US surveillance regime was \u201cunlawful for seven years\u201d \u2013 Guardian\u201d, 6th Feb 2015, available at: www.theguardian.com\/uk-news\/2015\/feb\/06\/gchq-mass-internet-surveillance-unlawful-court-nsa"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2017-0010\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2017-0010\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:09Z","timestamp":1753393089000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/15\/3\/328-335\/215157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,14]]}},"alternative-id":["10.1108\/JICES-02-2017-0010"],"URL":"https:\/\/doi.org\/10.1108\/jices-02-2017-0010","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2017,8,14]]}}}