{"id":"https://openalex.org/W2074194489","doi":"https://doi.org/10.4018/jitsa.2009070101","title":"From Synergy to Symbiosis","display_name":"From Synergy to Symbiosis","publication_year":2009,"publication_date":"2009-07-01","ids":{"openalex":"https://openalex.org/W2074194489","doi":"https://doi.org/10.4018/jitsa.2009070101","mag":"2074194489"},"language":"en","primary_location":{"id":"doi:10.4018/jitsa.2009070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jitsa.2009070101","pdf_url":null,"source":{"id":"https://openalex.org/S164667806","display_name":"International Journal of Information Technologies and Systems Approach","issn_l":"1935-570X","issn":["1935-570X","1935-5718"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technologies and Systems Approach","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037619435","display_name":"Vasilios Katos","orcid":"https://orcid.org/0000-0001-6132-3004"},"institutions":[{"id":"https://openalex.org/I147962203","display_name":"Democritus University of Thrace","ror":"https://ror.org/03bfqnx40","country_code":"GR","type":"education","lineage":["https://openalex.org/I147962203"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Vasilios Katos","raw_affiliation_strings":["Democritus University of Thrace, Greece"],"affiliations":[{"raw_affiliation_string":"Democritus University of Thrace, Greece","institution_ids":["https://openalex.org/I147962203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028724815","display_name":"Frank Stowell","orcid":"https://orcid.org/0000-0002-4763-660X"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Frank Stowell","raw_affiliation_strings":["University of Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"University of Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086765619","display_name":"Peter Bedn\u00e1r","orcid":"https://orcid.org/0000-0002-3631-2626"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]},{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB","SE"],"is_corresponding":false,"raw_author_name":"Peter Bednar","raw_affiliation_strings":["University of Portsmouth, UK and Lund University, Sweden"],"affiliations":[{"raw_affiliation_string":"University of Portsmouth, UK and Lund University, Sweden","institution_ids":["https://openalex.org/I63072094","https://openalex.org/I187531555"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037619435"],"corresponding_institution_ids":["https://openalex.org/I147962203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23125126,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"2","first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11042","display_name":"Corruption and Economic Development","score":0.8503999710083008,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11042","display_name":"Corruption and Economic Development","score":0.8503999710083008,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.7702999711036682,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6328833103179932},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5774757862091064},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.48496103286743164},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4732269048690796},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4509434998035431},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41865119338035583},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.39598628878593445},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.33821094036102295},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3255327045917511},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.254192054271698},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2048288881778717},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.17872294783592224},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.11479827761650085},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10748112201690674}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6328833103179932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5774757862091064},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.48496103286743164},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4732269048690796},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4509434998035431},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41865119338035583},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.39598628878593445},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.33821094036102295},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3255327045917511},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.254192054271698},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2048288881778717},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17872294783592224},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.11479827761650085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10748112201690674},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jitsa.2009070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jitsa.2009070101","pdf_url":null,"source":{"id":"https://openalex.org/S164667806","display_name":"International Journal of Information Technologies and Systems Approach","issn_l":"1935-570X","issn":["1935-570X","1935-5718"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technologies and Systems Approach","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jitsa0:v:2:y:2009:i:2:p:1-14","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitsa.2009070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2049150502","https://openalex.org/W2365751862","https://openalex.org/W2172599225","https://openalex.org/W2945191958","https://openalex.org/W4285411252","https://openalex.org/W2176627345","https://openalex.org/W2379531677","https://openalex.org/W2373948225","https://openalex.org/W2365537987","https://openalex.org/W2372385198"],"abstract_inverted_index":{"The":[0,37,103],"objective":[1],"of":[2,22,45,95],"this":[3,15,62],"article":[4,78,104],"reflects":[5],"upon":[6,121],"the":[7,20,48,77,93,100,107,115],"isomorphic":[8],"relationship":[9,49,63,69,108],"between":[10,50,109],"ideas":[11,33],"across":[12],"disciplines.":[13],"In":[14,76],"instance":[16],"we":[17,79,84],"are":[18],"considering":[19,46],"value":[21],"a":[23,43,67,73,81],"well":[24],"established":[25],"methodology,":[26,28],"cross":[27,38],"adopted":[29],"from":[30,34,72],"macroeconomics":[31],"and":[32,56,70,89,97,112,114,124],"political":[35],"science.":[36],"methodology":[39],"is":[40,64,105],"used":[41],"as":[42],"means":[44],"if":[47],"data":[51],"collected":[52],"for":[53],"security":[54,96],"proposes":[55],"individual":[57,122],"privacy.":[58],"We":[59],"argue":[60],"that":[61,117],"moving":[65],"towards":[66],"symbiotic":[68],"away":[71],"synergistic":[74],"one.":[75],"present":[80],"model":[82],"which":[83],"transform":[85],"using":[86],"system":[87],"thinking":[88],"applying":[90],"it":[91],"within":[92],"context":[94],"privacy":[98,123],"at":[99],"strategic":[101],"level.":[102],"about":[106],"security,":[110],"information":[111],"control":[113],"effect":[116],"increased":[118],"surveillance":[119],"has":[120],"freedom.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
