{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:43:37Z","timestamp":1730198617352,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/asonam49781.2020.9381412","type":"proceedings-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T20:17:37Z","timestamp":1616617057000},"page":"840-844","source":"Crossref","is-referenced-by-count":0,"title":["See it. Say it. Sorted. An empirical analysis of the influence of the British Vigilance Campaign"],"prefix":"10.1109","author":[{"given":"Victoria Sophie","family":"Hazebrouck","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"FEMA P-903","article-title":"FEMA, &#x201C;Improving the Public's Awareness and Reporting of Suspicious Activity","year":"2012","key":"ref10"},{"key":"ref11","first-page":"87","article-title":"Natural surveillance, crime prevention, and the effects of being seen","author":"parnaby","year":"2009","journal-title":"Surveillance Power Problems and Politics"},{"key":"ref12","article-title":"Making Public Places Safer","author":"welsh","year":"2009","journal-title":"Surveillance and Crime Prevention"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1057567707306577"},{"journal-title":"FOI Request","year":"0","key":"ref14"},{"journal-title":"#LondonIsOpen for summer campaign","article-title":"Mayoral Decision 2155","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/13639510210437023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2019.1607340"},{"journal-title":"Human factors in CCTV control rooms A best practice guide","article-title":"Centre for the Protection of National Infrastructure","year":"0","key":"ref3"},{"key":"ref6","first-page":"22","article-title":"In Germany, counterterrorism-measurements are often subject of criticism (e.g. full body scan at airports)","volume":"66","author":"fischer","year":"2016","journal-title":"2016 then minister of the Interior T De Maiziere appealed to German citizens to be more vigilant yet no VC followed This could also be based on historic and recent negative forms of Vigilantism - though this form of self policing has to be differentiated to vigilance as the latter is reinforced by governments Cf"},{"key":"ref5","first-page":"187","article-title":"Public vigilance campaigns and participatory surveillance","author":"larsen","year":"2009","journal-title":"Surveillance Power Problems and Politics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0263395717747129"},{"journal-title":"There when you need us Annual Report","article-title":"BTP","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.0309-1317.2004.00511.x"},{"key":"ref1","article-title":"7\/7 bombings","author":"smith","year":"2015","journal-title":"The Independent"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v15i1.5342"}],"event":{"name":"2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2020,12,7]]},"location":"The Hague, Netherlands","end":{"date-parts":[[2020,12,10]]}},"container-title":["2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9381192\/9381291\/09381412.pdf?arnumber=9381412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:48:09Z","timestamp":1656344889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9381412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/asonam49781.2020.9381412","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}