{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:10:22Z","timestamp":1654135822127},"reference-count":35,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>The events of 9\/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.<\/p>","DOI":"10.4018\/jep.2013070102","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T19:37:27Z","timestamp":1384285047000},"page":"15-29","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in the 21st Century"],"prefix":"10.4018","volume":"4","author":[{"given":"Panagiotis","family":"Kitsos","sequence":"first","affiliation":[{"name":"UoM ITLaw Team, Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Aikaterini","family":"Yannoukakou","sequence":"additional","affiliation":[{"name":"UoM ITLaw Team, Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"2432","reference":[{"key":"jep.2013070102-0","unstructured":"Access Info. (2011, January 07). Beyond access: Open government data & the right to (re)use public information. Retrieved from http:\/\/www.access-info.org\/documents\/Access_Docs\/Advancing\/Beyo.nd_Access_7_January_2011_web.pdf"},{"key":"jep.2013070102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2009.05.002"},{"issue":"1","key":"jep.2013070102-2","first-page":"233","article-title":"Privay and law enforcement in the European Union: The data retention directive.","volume":"8","author":"F.Bingami","year":"2007","journal-title":"Chicago Journal of International Law"},{"key":"jep.2013070102-3","unstructured":"Cabinet Office, UK Ministry of the State for the Cabinet Office and Paymaster General. (2012). Open data white paper: Unleashing the potential (CM 8353). Retrieved from http:\/\/www.cabinetoffice.gov.uk\/sites\/default\/files\/resources\/CM8353_acc.pdf"},{"key":"jep.2013070102-4","unstructured":"Council of the European Union. (2011). Agreement between the United States of America and the European Union on the use and transfer of passenger name records to the United States Department of Homeland Security (17434\/11). Retrieved from http:\/\/register.consilium.europa.eu\/pdf\/en\/11\/st17\/st17434.en11.pdf"},{"key":"jep.2013070102-5","unstructured":"Digital Civil Rights in Europe. (2010, June 30). Same privacy concerns for the new Swift Treaty. Retrieved from http:\/\/www.edri.org\/edrigram\/number8.13\/new-swift-treaty-privacy-concerns"},{"key":"jep.2013070102-6","unstructured":"Digital Civil Rights in Europe. (2010, July 14). Swift agreement adopted by the European Parliament. Retrieved from http:\/\/www.edri.org\/edrigram\/number8.14\/swift-20-adopted-european-parliament"},{"key":"jep.2013070102-7","unstructured":"Essers, L. (2011, September 16). European data concerns cloud outlook for U.S. vendors. Computerworld. Retrieved from http:\/\/www.computerworld.com\/s\/article\/9220093\/European_data_concerns_cloud_outlook_for_U.S._vendors"},{"key":"jep.2013070102-8","unstructured":"European Commission. (2010). A comprehensive approach on personal data protection in the European Union (COM(2010) 609 final). Retrieved from http:\/\/ec.europa.eu\/justice\/news\/consulting_public\/0006\/com_2010_609_en.pdf"},{"key":"jep.2013070102-9","unstructured":"European Commission. (2011). Open data: An engine for innovation, growth and transparent governance (COM(2011) 882 final). Retrieved from http:\/\/ec.europa.eu\/information_society\/policy\/psi\/docs\/pdfs\/opendata2012\/open_data_communication\/en.pdf"},{"key":"jep.2013070102-10","year":"2006","journal-title":"Directive 2006\/24\/EC on the retention of data generated or processed in connection with the provision of publicly available electronic communication services or of public communication networks and amending directive 2002\/58\/EC (L105\/54)"},{"key":"jep.2013070102-11","unstructured":"Gellman, R. (2009, February). Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum. Retrieved from http:\/\/www.worldprivacyforum.org\/pdf\/WPF_Cloud_Privacy_Report.pdf"},{"key":"jep.2013070102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.05.003"},{"key":"jep.2013070102-13","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-624X(03)00057-1"},{"issue":"2","key":"jep.2013070102-14","doi-asserted-by":"crossref","DOI":"10.15353\/joci.v8i2.3042","article-title":"Open government data and the right to information: Opportunities and obstacles.","volume":"8","author":"K.Janssen","year":"2012","journal-title":"The Journal of Community Informatics"},{"key":"jep.2013070102-15","unstructured":"Karakostas, I. (2004). Protection of privacy in information society. Dikaio Meson Enemeroses kai Epikoinonias, 1, 54-60. In greek."},{"key":"jep.2013070102-16","first-page":"607","article-title":"Internet surveillance law after the USA PATRIOT Act: The big brother that isn't.","volume":"97","author":"O.Kerr","year":"2003","journal-title":"Northwestern University Law Review"},{"key":"jep.2013070102-17","unstructured":"Kitsos, P. (2011). The legal framework of personal data protection and private life with emphasis to telecommunications sector. (Unpublished doctoral dissertation). University of Macedonia, Thessaloniki. Retrieved from http:\/\/dspace.lib.uom.gr\/handle\/2159\/14739"},{"key":"jep.2013070102-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2006.07.002"},{"key":"jep.2013070102-19","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199548798.003.0019"},{"key":"jep.2013070102-20","unstructured":"Mitrou, L. (2001). Personal data protection. In D. Tsatsos, E. Venizelos, & X. Kontiades (Eds.), The new constitution (83-103). Athens, Greek: Ant. N. Sakkoulas."},{"key":"jep.2013070102-21","unstructured":"O'Hara, K. (2012). Transparent government, not transparent citizen: A report on privacy and transparency for the Cabinet Office. Retrieved from https:\/\/update.cabinetoffice.gov.uk\/sites\/default\/files\/resources\/transparency-and-privacy-review-annex-a.pdf"},{"key":"jep.2013070102-22","unstructured":"Open Government Partnership. (2011, September). Open government declaration. Retrieved from http:\/\/www.opengovpartnership.org\/open-government-declaration"},{"key":"jep.2013070102-23","unstructured":"Open Knowledge Foundation. (n.d.). Open government data. Retrieved from http:\/\/opengovernmentdata.org\/about\/"},{"key":"jep.2013070102-24","unstructured":"Organization for Economic Cooperation & Development, Committee for Information, Computer and Communication Policy, Working Party on Information Security and Privacy. (2011). The evolving privacy landscape: 30 years after the OECD privacy guidelines (DSTI\/ICCP\/REG(2010)6\/FINAL). Retrieved from http:\/\/www.oecd.org\/internet\/interneteconomy\/47683378.pdf"},{"key":"jep.2013070102-25","unstructured":"Singer, N. (2010, November 23). Privacy groups fault online health sites for sharing user data with marketers. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2010\/11\/24\/business\/24drug.html?_r=1&ref=healthinformationprivacy"},{"key":"jep.2013070102-26","first-page":"1701","article-title":"Reconstructing electronic surveillance law.","volume":"72","author":"D.Solove","year":"2004","journal-title":"The George Washington Law Review"},{"key":"jep.2013070102-27","author":"D.Solove","year":"2006","journal-title":"Privacy, information, and technology"},{"key":"jep.2013070102-28","unstructured":"Tsiavos, P. (2011, December 06). Open data. Retrieved from http:\/\/conferences.ellak.gr\/opendata2011\/files\/2011\/12\/E\u039b\u039bAK_03_12_11PDF.pdf"},{"key":"jep.2013070102-29","unstructured":"Tsolias, G. (2006). The conservation and data processing at the sector of telecommunications according to the Directive 2006\/24\/EC. Dikaio Meson Enemeroses kai Epikoinonias, 3, 347-352."},{"key":"jep.2013070102-30","year":"2001","journal-title":"Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA PATRIOT Act) Act of 2001 (PL107-56)"},{"key":"jep.2013070102-31","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"jep.2013070102-32","unstructured":"Whittaker, Z. (2011, November 08). Updated European law will close PATRIOT Act data access to loophole. Zdnet, Retrieved from http:\/\/www.zdnet.com\/blog\/london\/updated-european-law-will-close-patriot-act-data-access-loophole\/742"},{"key":"jep.2013070102-33","unstructured":"Yannoukakou, A. (2011). Electronic government: Its course in US, Europe and Greece. In M. Bottis, E. Alexandropoulou, & I. Iglezakis (Eds.), Values and freedoms in modern information law & ethics. Athens, Greek: Nomiki Bibliothiki."},{"key":"jep.2013070102-34","doi-asserted-by":"crossref","unstructured":"Yu, H., & Robinson, D. (2012). The new ambiguity of open government. UCLA Law Review Disclosure, 59, 178-208. Retrieved from http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2012489","DOI":"10.2139\/ssrn.2012489"}],"container-title":["International Journal of E-Politics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=93129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:33:17Z","timestamp":1654133597000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jep.2013070102"}},"subtitle":["From the \u201cDark Ages\u201d to \u201cEnlightenment\u201d?"],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jep.2013070102","relation":{},"ISSN":["1947-9131","1947-914X"],"issn-type":[{"value":"1947-9131","type":"print"},{"value":"1947-914X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}