{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:40:04Z","timestamp":1654123204381},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7,1]]},"abstract":"<p>The objective of this article reflects upon the isomorphic relationship between ideas across disciplines. In this instance we are considering the value of a well established methodology, cross methodology, adopted from macroeconomics and ideas from political science. The cross methodology is used as a means of considering if the relationship between data collected for security proposes and individual privacy. We argue that this relationship is moving towards a symbiotic relationship and away from a synergistic one. In the article we present a model which we transform using system thinking and applying it within the context of security and privacy at the strategic level. The article is about the relationship between security, information and control and the effect that increased surveillance has upon individual privacy and freedom.<\/p>","DOI":"10.4018\/jitsa.2009070101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:56:35Z","timestamp":1297796195000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["From Synergy to Symbiosis"],"prefix":"10.4018","volume":"2","author":[{"given":"Vasilios","family":"Katos","sequence":"first","affiliation":[{"name":"Democritus University of Thrace, Greece"}]},{"given":"Frank","family":"Stowell","sequence":"additional","affiliation":[{"name":"University of Portsmouth, UK"}]},{"given":"Peter","family":"Bednar","sequence":"additional","affiliation":[{"name":"University of Portsmouth, UK and Lund University, Sweden"}]}],"member":"2432","container-title":["International Journal of Information Technologies and Systems Approach"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=4023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:10:12Z","timestamp":1654121412000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitsa.2009070101"}},"subtitle":["New Directions in Security and Privacy?"],"short-title":[],"issued":{"date-parts":[[2009,7,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jitsa.2009070101","relation":{},"ISSN":["1935-570X","1935-5718"],"issn-type":[{"value":"1935-570X","type":"print"},{"value":"1935-5718","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,1]]}}}