{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:49:05Z","timestamp":1775198945226,"version":"3.50.1"},"reference-count":110,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[1994,4]]},"DOI":"10.1080\/01972243.1994.9960162","type":"journal-article","created":{"date-parts":[[2010,4,28]],"date-time":"2010-04-28T04:55:32Z","timestamp":1272430532000},"page":"101-127","source":"Crossref","is-referenced-by-count":216,"title":["Surveillance and capture: Two models of privacy"],"prefix":"10.1080","volume":"10","author":[{"given":"Philip E.","family":"Agre","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0002","volume-title":"Social and Interactional Dimensions of Human\u2010Computer Interfaces","author":"Agre P. E."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1994.9960163"},{"key":"CIT0004","first-page":"30","volume":"22","author":"Anonymous","year":"1990","journal-title":"Industrial Engineering"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2307\/201997"},{"key":"CIT0006","volume-title":"Computerization and Controversy: Value Conflicts and Social Choices","author":"Dunlop C."},{"key":"CIT0007","first-page":"46","volume":"14","author":"Baum D.","year":"1992","journal-title":"InfoWorld"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/25.69977"},{"key":"CIT0009","volume-title":"Contexts of Computer\u2010Mediated Communication","author":"Bowers J.","year":"1992"},{"key":"CIT0010","volume-title":"Readings in Knowledge Representation","author":"Brachman R. J.","year":"1985"},{"key":"CIT0011","doi-asserted-by":"crossref","DOI":"10.14452\/MR-026-03-1974-07_1","volume-title":"Labor and Monopoly Capital: The Degradation of Work in the Twentieth Century","author":"Braverman H.","year":"1974"},{"key":"CIT0012","volume-title":"Computerization and Controversy: Value Conflicts and Social Choices","author":"Bullen C.","year":"1991"},{"key":"CIT0013","volume-title":"The Rise of the Computer State","author":"Burnham D.","year":"1983"},{"key":"CIT0014","volume-title":"Future Tendencies in Computer Science, Control, and Applied Mathematics: 25th Anniversary of INRIA","author":"Carroll J. M.","year":"1992"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0603&4_1"},{"key":"CIT0016","volume-title":"Problems of Knowledge and Freedom: The Russell Lectures","author":"Chomsky N.","year":"1971"},{"key":"CIT0017","first-page":"145","volume":"21","author":"Ciborra C. U.","year":"1983","journal-title":"International Journal of Policy Analysis and Information Systems"},{"key":"CIT0018","volume-title":"Critical Issues in Information Systems Research","author":"Ciborra C. U.","year":"1987"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Ciborra, C. U. and Olson, M. H. Encountering electronic work groups: a transaction costs perspective. Proceedings of the Conference on Computer\u2010Supported Cooperative Work. September26\u2013291988, Portland, Oregon. pp.94\u2013101.","DOI":"10.1145\/62266.62274"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"CIT0021","unstructured":"Clawson, V. K. and Bostrom, R. P. Facilitation: the human side of Groupware. Paper presented at the Groupware \u201893 Conference. San Jose, California."},{"key":"CIT0022","volume-title":"The Political Economy of Information","author":"Clement A.","year":"1988"},{"key":"CIT0023","first-page":"385","volume":"4","author":"Coase R. H.","year":"1937","journal-title":"Economica NS"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1145\/356619.356621"},{"key":"CIT0025","volume-title":"Future Perfect","author":"Davis S. M.","year":"1987"},{"key":"CIT0027","unstructured":"Dourish, P. Culture and control in a media space. Proceedings of the Third European Conference on Computer\u2010Supported Cooperative Work: ECSCW'93. Edited by: deMichelis, G., Simone, C. and Schmidt, K. Dordrecht, The Netherlands: Kluwer."},{"key":"CIT0028","first-page":"211","volume":"10","author":"Duffy C. A.","year":"1993","journal-title":"PC Week"},{"key":"CIT0029","first-page":"15","volume":"8","author":"Eckerson W.","year":"1991","journal-title":"Network World"},{"key":"CIT0030","first-page":"71","year":"1993","journal-title":"The Economist"},{"key":"CIT0031","volume-title":"Contested Terrain: The Transformation of the Workplace in the Twentieth Century","author":"Edwards R.","year":"1979"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159626"},{"key":"CIT0033","first-page":"14","volume":"24","author":"Fales J. F.","year":"1992","journal-title":"Industrial Engineering"},{"key":"CIT0034","volume-title":"Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States","author":"Flaherty D. H.","year":"1989"},{"key":"CIT0035","volume-title":"Decision Support Systems: Issues and Challenges","author":"Flores F.","year":"1980"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1145\/45941.45943"},{"key":"CIT0037","first-page":"1F","author":"Flynn L.","year":"1993","journal-title":"San Jose Mercury News"},{"key":"CIT0038","volume-title":"The Panoptic Sort: A Political Economy of Personal Information","author":"Gandy O. H.","year":"1993"},{"key":"CIT0039","volume-title":"Studies in Eth\u2010nomethodology","author":"Garfinkel H.","year":"1984"},{"key":"CIT0040","volume-title":"The Electronic Sweatshop: How Computers Are Transforming the Office of the Future Into the Factory of the Past","author":"Garson B.","year":"1989"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/214427.214429"},{"key":"CIT0042","volume-title":"Primer of Scientific Management","author":"Gilbreth F. B.","year":"1912"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159598"},{"key":"CIT0044","first-page":"39","volume":"29","author":"Grant R. A.","year":"1988","journal-title":"Sloan Management Review"},{"key":"CIT0045","first-page":"104","volume":"68","author":"Hammer M.","year":"1990","journal-title":"Harvard Business Review"},{"key":"CIT0046","first-page":"31","volume":"101","author":"Hawker A.","year":"1991","journal-title":"Health Service Journal"},{"key":"CIT0047","volume-title":"Being and Time, translated by John Macquarrie and Edward Robinson","author":"Heidegger M.","year":"1961"},{"key":"CIT0048","first-page":"26","volume":"277","author":"Hoffman T.","year":"1990","journal-title":"Information Week"},{"key":"CIT0049","volume-title":"Applied Time and Motion Study","author":"Holmes W. G.","year":"1938"},{"key":"CIT0050","volume-title":"Brave New Workplace","author":"Howard R.","year":"1985"},{"key":"CIT0051","volume-title":"Technology and the Transformation of While\u2010Collar Work","author":"Iacono S.","year":"1987"},{"key":"CIT0052","doi-asserted-by":"crossref","DOI":"10.1525\/9780520915381","volume-title":"Downcast Eyes: The Denigration of Vision in Twentieth\u2010Century French Thought","author":"Jay M.","year":"1993"},{"key":"CIT0053","volume-title":"Relevance Lost: The Rise and Fall of Management Accounting","author":"Johnson H. T.","year":"1987"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1109\/6.83435"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1145\/356802.356806"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1984.tb00193.x"},{"key":"CIT0057","volume-title":"Perspectives on the Computer Revolution","author":"Kling R.","year":"1989","edition":"2"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1145\/125319.125396"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1993.9960128"},{"key":"CIT0060","volume-title":"The Death of Money","author":"Kurtzman J.","year":"1993"},{"key":"CIT0061","volume-title":"The Naked Consumer: How Our Private Lives Become Public Commodities","author":"Larson E.","year":"1992"},{"key":"CIT0062","first-page":"32","volume":"6","author":"Lawton G.","year":"1992","journal-title":"MacWEEK"},{"key":"CIT0063","first-page":"36","volume":"10","author":"Leibowitz E.","year":"1992","journal-title":"Teleconnect"},{"key":"CIT0064","first-page":"62","volume":"151","author":"Lenzner R.","year":"1993","journal-title":"Forbes"},{"key":"CIT0065","volume-title":"Planned Control in Manufacturing","author":"Lichtner W. O.","year":"1924"},{"key":"CIT0066","first-page":"47","volume":"10","author":"Loudermilk S.","year":"1993","journal-title":"PC Week"},{"key":"CIT0067","volume-title":"Computers and Conversation","author":"Luff P.","year":"1990"},{"key":"CIT0068","doi-asserted-by":"crossref","unstructured":"MacLean, A., Young, R. and Morgan, T. CHI 1989 Conference Proceedings. Edited by: Bice, K. and Lewis, C. pp.247\u2013252. New York: ACM Press.","DOI":"10.1145\/67450.67497"},{"key":"CIT0069","first-page":"1","volume":"16","author":"Marshak R. T.","year":"1993","journal-title":"Workflow Computing Report"},{"key":"CIT0070","volume-title":"Strategic Information Planning Methodologies","author":"Martin J.","year":"1989","edition":"2"},{"key":"CIT0071","first-page":"78","volume":"374","author":"McPartlin J. P.","year":"1992","journal-title":"Information Week"},{"key":"CIT0072","unstructured":"Medina\u2010Mora, R., Winograd, T., Flores, R. and Flores, R. The action workflow approach to workflow management technology. Proceedings of CSCW\u201092. 1992, Toronto, Ontario. pp.281\u2013288."},{"key":"CIT0073","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1162\/pres.1992.1.2.173","volume":"1","author":"Meyer K.","year":"1992","journal-title":"Presence"},{"key":"CIT0074","volume-title":"The Technopolis Phenomenon: Smart Cities, Fast Systems, Global Networks","author":"Mill P. A. D.","year":"1992"},{"key":"CIT0075","volume-title":"Conceptual Selling","author":"Miller R. B.","year":"1987"},{"key":"CIT0076","volume-title":"Gender, Time, and Reduced Wort","author":"Negrey C.","year":"1993"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1993.9960143"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.25.9.833"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1109\/21.135684"},{"key":"CIT0080","first-page":"124","volume":"10","author":"Piller C.","year":"1993","journal-title":"Macworld"},{"key":"CIT0081","volume-title":"Intelligent Enterprise: A Knowledge and Service Based Paradigm for Industry","author":"Quinn J. B.","year":"1992"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1109\/52.210612"},{"key":"CIT0083","volume-title":"The Political Economy of Information","author":"Robins K.","year":"1988"},{"key":"CIT0084","first-page":"52","volume":"36","author":"Romei L. K.","year":"1991","journal-title":"Modern Office Technology"},{"key":"CIT0085","volume-title":"Technological Interdependence in the American Economy, Inside the Black Box: Technology and Economics","author":"Rosenberg N.","year":"1982"},{"key":"CIT0086","volume-title":"Private Lives and Public Surveillance: Social Control in the Computer Age","author":"Rule J. B.","year":"1974"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1525\/sp.1989.36.3.03a00020"},{"key":"CIT0088","first-page":"41","volume":"66","author":"Sabetti T.","year":"1993","journal-title":"l&CS {Instrumentation & Control Systems)"},{"key":"CIT0089","first-page":"47","volume":"38","author":"Sacco S. R.","year":"1993","journal-title":"Modern Office Technology"},{"key":"CIT0090","volume-title":"The Political Economy of Information","author":"Schiller D.","year":"1988"},{"key":"CIT0091","volume-title":"Participatory Design: Principles and Practices","author":"Schuler D.","year":"1993"},{"key":"CIT0092","volume-title":"The Corporation of the 1990s: Information Technology and Organizational Transformation","author":"Scott Morton M. S.","year":"1991"},{"key":"CIT0093","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139173438","volume-title":"Speech Acts: An Essay in the Philosophy of Language","author":"Searle J. R.","year":"1969"},{"key":"CIT0094","volume-title":"Work Transformed: Automation and Labor in the Computer Age","author":"Shaiken H.","year":"1985"},{"key":"CIT0095","first-page":"22","volume":"23","author":"Simpson C. V.","year":"1989","journal-title":"Computerworld"},{"key":"CIT0096","volume-title":"Privacy: How to Protect What's Left of It","author":"Smith R. E.","year":"1979"},{"key":"CIT0097","volume-title":"New Technology and the Labour Process","author":"Smith S.","year":"1988"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1145\/357442.357445"},{"key":"CIT0099","volume-title":"Technology in Working Order: Studies of Work, Interaction, and Technology","author":"Suchman L.","year":"1992"},{"key":"CIT0100","unstructured":"Suchman, L. Do categories have politics? The language\/action perspective reconsidered. Proceedings of the Third European Conference on Computer\u2010Supported Cooperative Work: ECSCW'93. Edited by: de Michelis, G., Simone, C. and Schmidt, K. Dordrecht, The Netherlands: Kluwer."},{"key":"CIT0101","volume-title":"Women, Work and Computerization: Forming New Alliances","author":"Suchman L.","year":"1989"},{"key":"CIT0102","volume-title":"The Principles of Scientific Management","author":"Taylor F. W.","year":"1923"},{"key":"CIT0103","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-20028-3","volume-title":"The Nature of Work: An Introduction to Debates on the Labour Process","author":"Thompson P.","year":"1989","edition":"2"},{"key":"CIT0104","doi-asserted-by":"publisher","DOI":"10.1016\/0360-8352(91)90091-J"},{"key":"CIT0105","first-page":"22","volume":"23","author":"Von Simpson C.","year":"1989","journal-title":"Computerworld"},{"key":"CIT0106","volume-title":"Up and Running: Integrating Information Technology and the Organization","author":"Walton R. E.","year":"1989"},{"key":"CIT0107","doi-asserted-by":"publisher","DOI":"10.1145\/128756.128759"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1993.9960141"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1109\/2.237456"},{"key":"CIT0110","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195065909.001.0001","volume-title":"The Nature of the Firm: Origins, Evolution, and Development","author":"Williamson O. E.","year":"1991"},{"key":"CIT0111","volume-title":"Understanding Computers and Cognition: A New Foundation for Design","author":"Winograd T.","year":"1986"},{"key":"CIT0112","doi-asserted-by":"crossref","DOI":"10.56021\/9780801837579","volume-title":"Control Through Communication: The Rise of System in American Management","author":"Yates J.","year":"1989"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.1994.9960162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T07:43:29Z","timestamp":1740037409000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01972243.1994.9960162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,4]]},"references-count":110,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1994,4]]}},"alternative-id":["10.1080\/01972243.1994.9960162"],"URL":"https:\/\/doi.org\/10.1080\/01972243.1994.9960162","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,4]]}}}