{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:54Z","timestamp":1767262074980,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2013,11]]},"abstract":"<jats:p>Considering the ethical questions raised by technologies that are moving from knowing what we are doing (and where) to knowing who we are.<\/jats:p>","DOI":"10.1145\/2527187","type":"journal-article","created":{"date-parts":[[2013,10,23]],"date-time":"2013-10-23T15:29:17Z","timestamp":1382542157000},"page":"26-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["No limits to watching?"],"prefix":"10.1145","volume":"56","author":[{"given":"Katina","family":"Michael","sequence":"first","affiliation":[{"name":"University of Wollongong, NSW, Australia"}]},{"given":"MG","family":"Michael","sequence":"additional","affiliation":[{"name":"University of Wollongong, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2013,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.2011040102"},{"key":"e_1_2_1_2_1","unstructured":"Creative Commons: Attribution 2.0 Generic n.d. http:\/\/creativecommons.org\/licenses\/by\/2.0\/.  Creative Commons: Attribution 2.0 Generic n.d. http:\/\/creativecommons.org\/licenses\/by\/2.0\/."},{"key":"e_1_2_1_3_1","unstructured":"Electrical and Computer Engineering ECE1766 Final Course Project. Wearcam.org (1998) http:\/\/www.wearcam.org\/students.htm.  Electrical and Computer Engineering ECE1766 Final Course Project. Wearcam.org (1998) http:\/\/www.wearcam.org\/students.htm."},{"key":"e_1_2_1_4_1","unstructured":"ENISA. To log or not to log?: Risks and benefits of emerging life-logging applications. European Network and Information Security Agency. (2011) http:\/\/www.enisa.europa.eu\/activities\/risk-management\/emerging-and-future-risk\/deliverables\/life-logging-risk-assessment\/to-log-or-not-to-log-risks-and-benefits-of-emerging-life-logging-applications.  ENISA. To log or not to log?: Risks and benefits of emerging life-logging applications. European Network and Information Security Agency . (2011) http:\/\/www.enisa.europa.eu\/activities\/risk-management\/emerging-and-future-risk\/deliverables\/life-logging-risk-assessment\/to-log-or-not-to-log-risks-and-benefits-of-emerging-life-logging-applications."},{"key":"e_1_2_1_5_1","unstructured":"Gray C. H. Cyborgs Aufmerkamkeit and Aesthetik {transl. Cyborgs Attention & Aesthetics}. Kunstforum (Dec.--Jan. 1998); http:\/\/www.chrishablesgray.org\/CyborgCitizen\/kunst.html.  Gray C. H. Cyborgs Aufmerkamkeit and Aesthetik {transl. Cyborgs Attention & Aesthetics}. Kunstforum (Dec.--Jan. 1998); http:\/\/www.chrishablesgray.org\/CyborgCitizen\/kunst.html."},{"key":"e_1_2_1_6_1","unstructured":"Henry A. Best sleep tracking gadget or app? (2013); http:\/\/lifehacker.com\/5992653\/best-sleep-tracking-gadget-or-app.  Henry A. Best sleep tracking gadget or app? (2013); http:\/\/lifehacker.com\/5992653\/best-sleep-tracking-gadget-or-app."},{"key":"e_1_2_1_7_1","unstructured":"Henry A. Sleep time alarm clock for android watches your sleep cycles wakes you gently (2012); http:\/\/lifehacker.com\/5942519\/sleep-time-alarm-clock-for-android-watches-your-sleep-cycles-wakes-you-gently.  Henry A. Sleep time alarm clock for android watches your sleep cycles wakes you gently (2012); http:\/\/lifehacker.com\/5942519\/sleep-time-alarm-clock-for-android-watches-your-sleep-cycles-wakes-you-gently."},{"volume-title":"Wired: Gadget Lab (Apr. 17, 2013","year":"2013","author":"Kravets D.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Mann S. Learn by being: Thirty years of cyborg existemology. The International Handbook of Virtual Learning Environments (2006) 1571--1592.  Mann S. Learn by being: Thirty years of cyborg existemology. The International Handbook of Virtual Learning Environments (2006) 1571--1592.","DOI":"10.1007\/978-1-4020-3803-7_63"},{"volume-title":"Ed.","year":"2009","author":"Marcuse H.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.03.004"},{"volume-title":"Proceedings of the 6th Workshop on the Social Implications of National Security","year":"2012","author":"Michael K.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.196"},{"volume-title":"Crown","year":"2011","author":"Skloot R.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","unstructured":"Weil J. Forget big brother. Little brother is the real threat. (Sept. 22 2010); http:\/\/www.thenextgreatgeneration.com\/2010\/11\/forget-big-brother-little-brother-is-the-real-threat\/.  Weil J. Forget big brother. Little brother is the real threat. (Sept. 22 2010); http:\/\/www.thenextgreatgeneration.com\/2010\/11\/forget-big-brother-little-brother-is-the-real-threat\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.195"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2527187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2527187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:28Z","timestamp":1750232068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2527187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["10.1145\/2527187"],"URL":"https:\/\/doi.org\/10.1145\/2527187","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2013,11]]},"assertion":[{"value":"2013-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}