{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:33:33Z","timestamp":1775698413795,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/ccece.2014.6901060","type":"proceedings-article","created":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T19:29:34Z","timestamp":1411759774000},"page":"1-10","source":"Crossref","is-referenced-by-count":14,"title":["Veillance flux, vixels, veillons: An information-bearing extramissive formulation of sensing, to measure surveillance and sousveillance"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Janzen","sequence":"first","affiliation":[]},{"given":"Steve","family":"Mann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2012.6334945"},{"key":"15","author":"kundu","year":"2008","journal-title":"Fluid Mechanics"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935706"},{"key":"13","author":"french","year":"1978","journal-title":"An Introduction to Quantum Physics"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1364\/AO.4.000767"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1037\/\/0003-066X.57.6-7.417"},{"key":"12","author":"mann","year":"1995","journal-title":"Theory of Darkness (An April Fool's Research Paper)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.2008.00793.x"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027673"},{"key":"1","first-page":"1","article-title":"Sousveillance, not just surveillance, in response to terrorism","volume":"6","author":"mann","year":"2002","journal-title":"Metal and Flesh"},{"key":"10","first-page":"313","volume":"1","author":"doesschate","year":"1962","journal-title":"Oxford and the Revival of Optics in the Thirteenth Century"},{"key":"7","first-page":"306","article-title":"Negative sousveillance","author":"reynolds","year":"2011","journal-title":"First International Conference of the International Association for Computing and Philosophy (IACAP11)"},{"key":"6","author":"fletcher","year":"2011","journal-title":"A Day in the Digital Life A Preliminary Sousveillance Study"},{"key":"5","author":"bradwell","year":"2012","journal-title":"Security Workshop Brings' Sousveillance'under the Microscope"},{"key":"4","author":"michael","year":"2012","journal-title":"Sousveillance and Point of View Technologies in Law Enforcement An Overview"},{"key":"9","author":"mann","year":"2012","journal-title":"Proposed Law on Sousveillance RESOLUTION 000001 (MANN-WASSELL LAW)"},{"key":"8","author":"bakir","year":"2010","journal-title":"Sousveillance Media and Strategic Political Communication"}],"event":{"name":"2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE)","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,5,4]]},"end":{"date-parts":[[2014,5,7]]}},"container-title":["2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6893068\/6900900\/06901060.pdf?arnumber=6901060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:35:29Z","timestamp":1490304929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6901060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccece.2014.6901060","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}