{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T22:53:12Z","timestamp":1772232792670,"version":"3.50.1"},"reference-count":85,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,8,7]]},"DOI":"10.1080\/01972243.2016.1177765","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T23:49:02Z","timestamp":1464738542000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":31,"title":["Built to lie: Investigating technologies of deception, surveillance, and control"],"prefix":"10.1080","volume":"32","author":[{"given":"Torin","family":"Monahan","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,31]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1177\/1741659006065401"},{"key":"cit0002","first-page":"205","volume-title":"Shaping technology\/Building society: Studies in sociotechnical change","author":"Akrich M.","year":"1992"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1177\/10717919070130011101"},{"key":"cit0005","doi-asserted-by":"crossref","DOI":"10.1353\/book.119494","volume-title":"iSpy: Surveillance and power in the interactive era","author":"Andrejevic M.","year":"2007"},{"key":"cit0006","doi-asserted-by":"crossref","DOI":"10.4324\/9780203075319","volume-title":"Infoglut: How too much information is changing the way we think and know","author":"Andrejevic M.","year":"2013"},{"key":"cit0007","author":"Arabe K. C.","year":"2003","journal-title":"ThomasNet News"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1080\/03007766.2013.810849"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1080\/00236561003654776"},{"key":"cit0010","author":"Baral S.","year":"2012","journal-title":"Greener Ideal"},{"key":"cit0011","author":"Baraniuk C.","year":"2015","journal-title":"BBC.com"},{"key":"cit0012","author":"Barrett D.","year":"2014","journal-title":"Wall Street Journal"},{"key":"cit0013","volume-title":"Sorting things out: Classification and its consequences","author":"Bowker G. C.","year":"1999"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1215\/9780822375302"},{"issue":"3","key":"cit0016","doi-asserted-by":"crossref","first-page":"455","DOI":"10.24908\/ss.v13i3\/4.5421","volume":"13","author":"Brucato B.","year":"2015","journal-title":"Surveillance & Society"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i5.3493"},{"key":"cit0018","author":"Campbell-Dollaghan K.","year":"2013","journal-title":"Gizmodo"},{"key":"cit0019","volume-title":"Communication as culture: Essays on media and society","author":"Carey J. W.","year":"1992"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1515\/9781400842254"},{"key":"cit0022","volume-title":"The Routledge companion to semiotics and linguistics","author":"Cobley P.","year":"2001"},{"issue":"1","key":"cit0023","first-page":"181","volume":"75","author":"Cohen J. E.","year":"2008","journal-title":"University of Chicago Law Review"},{"key":"cit0024","volume-title":"Configuring the networked self: Law, code, and the play of everyday practice","author":"Cohen J. E.","year":"2012"},{"issue":"1","key":"cit0025","first-page":"5","volume":"22","author":"Cohen N. S.","year":"2008","journal-title":"Democratic Communiqu\u00e9"},{"key":"cit0026","first-page":"125","volume-title":"Surveillance and security: Technological politics and power in everyday life","author":"Cole S. A.","year":"2006"},{"key":"cit0027","volume-title":"Media rituals: A critical approach","author":"Couldry N.","year":"2003"},{"key":"cit0029","author":"Cushing T.","year":"2013","journal-title":"Techdirt"},{"key":"cit0031","author":"Dwoskin E.","year":"2014","journal-title":"Wall Street Journal"},{"key":"cit0032","author":"Fandos N.","year":"2015","journal-title":"New York Times"},{"key":"cit0033","author":"Farivar C.","year":"2014","journal-title":"Ars Technica"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1080\/10253860802033662"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1080\/10714420701715357"},{"key":"cit0036","volume-title":"SuperVision: An introduction to the surveillance society","author":"Gilliom J.","year":"2013"},{"key":"cit0037","author":"Gillum J.","year":"2015","journal-title":"Star Tribune"},{"issue":"3","key":"cit0038","doi-asserted-by":"crossref","first-page":"301","DOI":"10.24908\/ss.v11i3.4514","volume":"11","author":"Gregg M.","year":"2013","journal-title":"Surveillance & Society"},{"key":"cit0039","author":"Grochmal G.","year":"2013","journal-title":"EcoGreenHotel"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1080\/00071310020015280"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1215\/9780822375296"},{"key":"cit0042","doi-asserted-by":"crossref","DOI":"10.1515\/9780804797511","volume-title":"The transparency society","author":"Han B.-C.","year":"2015"},{"key":"cit0043","author":"Handley J.","year":"2014","journal-title":"In These Times"},{"key":"cit0044","author":"Harris S.","year":"2015","journal-title":"The Daily Beast"},{"key":"cit0045","author":"Hasek G.","year":"2011","journal-title":"Green Lodging News"},{"key":"cit0047","author":"Hoffelder N.","year":"2014","journal-title":"The Digital Reader"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572267"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.4018\/jdldc.2010100104"},{"issue":"4","key":"cit0052","doi-asserted-by":"crossref","first-page":"549","DOI":"10.22230\/cjc.2005v30n4a1671","volume":"30","author":"Kiss S.","year":"2005","journal-title":"Canadian Journal of Communication"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.32.2.311"},{"key":"cit0054","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9294.001.0001","volume-title":"Car crashes without cars: Lessons about simulation technology and organizational change from automotive design","author":"Leonardi P. M.","year":"2012"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714541861"},{"key":"cit0056","volume-title":"Surveillance after Snowden","author":"Lyon D.","year":"2015"},{"issue":"3","key":"cit0058","doi-asserted-by":"crossref","first-page":"192","DOI":"10.24908\/ss.v7i3\/4.4152","volume":"7","author":"Marx G. T.","year":"2010","journal-title":"Surveillance & Society"},{"issue":"2","key":"cit0059","doi-asserted-by":"crossref","first-page":"105","DOI":"10.24908\/ss.v10i2.4094","volume":"10","author":"Mason C.","year":"2012","journal-title":"Surveillance & Society"},{"key":"cit0060","volume-title":"Big data: A revolution that will transform how we live, work, and think","author":"Mayer-Sch\u00f6nberger V.","year":"2013"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1177\/1362480609102877"},{"key":"cit0062","volume-title":"Surveillance in the time of insecurity","author":"Monahan T.","year":"2010"},{"key":"cit0063","doi-asserted-by":"publisher","DOI":"10.1080\/14791420.2015.1006646"},{"key":"cit0064","author":"Morozov E.","year":"2013","journal-title":"Wall Street Journal"},{"key":"cit0065","volume-title":"To the cloud: Big data in a turbulent world","author":"Mosco V.","year":"2014"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1177\/0893318905276558"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1177\/1470593112467264"},{"key":"cit0070","first-page":"66","author":"Oatman M.","year":"2015","journal-title":"Mother Jones"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1177\/016224399902400204"},{"key":"cit0073","volume-title":"Communication matters: Materialist approaches to media, mobility and networks","author":"Packer J.","year":"2012"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226922638.001.0001"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1177\/016224399201700302"},{"key":"cit0078","author":"Plumer B.","year":"2015","journal-title":"Vox.com"},{"key":"cit0079","author":"Poulter S.","year":"2012","journal-title":"The Daily Mail"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.1101003"},{"issue":"1","key":"cit0083","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1093\/oxfordjournals.aje.a116413","volume":"136","author":"Rogot E.","year":"1992","journal-title":"American Journal of Epidemiology"},{"key":"cit0084","author":"Rosenthal E.","year":"2012","journal-title":"New York Times"},{"key":"cit0085","volume-title":"Mysterious unidentified spying cell towers found across","year":"2014"},{"key":"cit0086","author":"Sandberg J.","year":"2003","journal-title":"Wall Street Journal"},{"key":"cit0089","doi-asserted-by":"crossref","DOI":"10.1515\/9781400834655","volume-title":"Addiction by design: Machine gambling in Las Vegas","author":"Sch\u00fcll N. D.","year":"2012"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1215\/9780822378334"},{"key":"cit0091","volume-title":"Culture and technology: A primer","author":"Slack J. D.","year":"2005"},{"key":"cit0092","volume-title":"The dark side of interpersonal communication","author":"Spitzberg B. H.","year":"2011","edition":"2"},{"key":"cit0093","first-page":"3","volume-title":"The dark side of interpersonal communication","author":"Spitzberg B. H.","year":"2011"},{"key":"cit0094","volume-title":"Everyday surveillance: Vigilance and visibility in postmodern life","author":"Staples W. G.","year":"2014","edition":"2"},{"key":"cit0095","author":"Strohmeyer R.","year":"2011","journal-title":"PC World"},{"key":"cit0096","volume-title":"The principles of scientific management","author":"Taylor F. W.","year":"1911"},{"issue":"2","key":"cit0099","first-page":"32","volume":"9","author":"Wall T.","year":"2013","journal-title":"Socialist Studies"},{"key":"cit0100","doi-asserted-by":"publisher","DOI":"10.1080\/03085140802357950"},{"key":"cit0101","first-page":"121","volume":"109","author":"Winner L.","year":"1980","journal-title":"Daedalus"},{"key":"cit0102","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226902098.001.0001"},{"key":"cit0104","doi-asserted-by":"publisher","DOI":"10.2307\/254767"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2016.1177765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:37:02Z","timestamp":1718609822000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2016.1177765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,31]]},"references-count":85,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,5,31]]},"published-print":{"date-parts":[[2016,8,7]]}},"alternative-id":["10.1080\/01972243.2016.1177765"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2016.1177765","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}