{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T15:45:34Z","timestamp":1765295134626,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vetenskapsr\u00e5det","award":["2017-04804"],"award-info":[{"award-number":["2017-04804"]}]},{"name":"Stiftelsen f\u00f6r Strategisk Forskning","award":["RIT15-0046"],"award-info":[{"award-number":["RIT15-0046"]}]},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","award":["Engineering the Interconnected Society: Information, Control, Interaction"],"award-info":[{"award-number":["Engineering the Interconnected Society: Information, Control, Interaction"]}],"id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376889","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T20:21:25Z","timestamp":1590610885000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Under Surveillance: Technology Practices of those Monitored by the State"],"prefix":"10.1145","author":[{"given":"Pedro","family":"Sanches","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Vasiliki","family":"Tsaknaki","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Asreen","family":"Rostami","sequence":"additional","affiliation":[{"name":"Stockholm University, Stockkholm, Sweden"}]},{"given":"Barry","family":"Brown","sequence":"additional","affiliation":[{"name":"Stockholm University, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/1527476414541552"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675156"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207009-0096-z"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/799147"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Boulus-R\u00f8dje Nina","year":"2019","unstructured":"Nina Boulus-R\u00f8dje and Pernille Bj\u00f8rn. 2019. Digital (Occupied) Palestine. Retrieved August 20, 2019 from https:\/\/forskning.ruc.dk\/en\/publications\/digitaloccupied-palestine"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1215\/9780822375302"},{"key":"e_1_3_2_1_7_1","volume-title":"Interoperability and Ethics in Emergency Response Systems of Systems. In 10th International ISCRAM Conference.","author":"Buscher Monika","year":"2013","unstructured":"Monika Buscher, Markus Bylund, Pedro Sanches, Leonardo Ramirez, and Lisa Wood. 2013. A New Manhattan Project? Interoperability and Ethics in Emergency Response Systems of Systems. In 10th International ISCRAM Conference."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458583.1458601"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/soc4030399"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300810"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322296"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"DiSalvo Carl","year":"2012","unstructured":"Carl DiSalvo. 2012. Adversarial Design as Inquiry and Practice. In Adversarial Design. MITP, 115--125. Retrieved December 18, 2019 from https:\/\/ieeexplore.ieee.org\/document\/7159941"},{"key":"e_1_3_2_1_13_1","volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"Eubanks Virginia","year":"2018","unstructured":"Virginia Eubanks. 2018. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin's Publishing Group."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Pedro Ferreira Pedro Sanches and Alexandra Weilenmann. 2013. Awareness Transience and Temporality: Design Opportunities from Rah Island. In Human-Computer Interaction -- INTERACT 2013 (Lecture Notes in Computer Science) 696--713.","DOI":"10.1007\/978-3-642-40480-1_48"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"volume-title":"The Culture of Control: Crime and Social Order in Contemporary Society","author":"Garland David","key":"e_1_3_2_1_16_1","unstructured":"David Garland. 2002. The Culture of Control: Crime and Social Order in Contemporary Society. University of Chicago Press, Chicago."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-anthro-081309-"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/00071310020015280"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2307\/3096941"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858565"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300569"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338103.3338106"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145230"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v16i3.6967"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1057\/9780230299047_18"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714541861"},{"volume-title":"Consent of the Networked: The Worldwide Struggle For Internet Freedom","author":"MacKinnon Rebecca","key":"e_1_3_2_1_30_1","unstructured":"Rebecca MacKinnon. 2012. Consent of the Networked: The Worldwide Struggle For Internet Freedom. Basic Books, New York."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3172\/JIE.15.2.37"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0048"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v8i1.3473"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Melville B. Nimmer. 1954. The right of publicity. Law and Contemporary problems 19 2: 203--223.","DOI":"10.2307\/1190488"},{"volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","key":"e_1_3_2_1_35_1","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2776885"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208540"},{"key":"e_1_3_2_1_39_1","first-page":"1162","article-title":"The Moral Character of Cryptographic Work","volume":"2015","author":"Rogaway Phillip","year":"2015","unstructured":"Phillip Rogaway. 2015. The Moral Character of Cryptographic Work. IACR Cryptology ePrint Archive 2015: 1162.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-011--9144-0"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274422"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v2n1p34"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979108"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979108"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620548"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v16i2.6823"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/2399808317712515"},{"key":"e_1_3_2_1_48_1","volume-title":"Meryem Atam, Kai Schubert, George P Yerousis, Dave Randall, and Markus Rohde.","author":"Wulf Volker","year":"2013","unstructured":"Volker Wulf, Konstantin Aal, Ibrahim Abu Ktesh, Meryem Atam, Kai Schubert, George P Yerousis, Dave Randall, and Markus Rohde. 2013. Fighting against the Wall: Social Media use by Political Activists in a Palestinian Village."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441935"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466468"},{"volume-title":"Why I Wrote PGP. Retrieved","year":"1991","key":"e_1_3_2_1_51_1","unstructured":"Zimmerman, Phil. 1991. Why I wrote PGP. Why I Wrote PGP. Retrieved September 18, 2019 from https:\/\/www.philzimmermann.com\/EN\/essays\/WhyIW rotePGP.html"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"},{"volume-title":"South China Morning Post. Retrieved","year":"2019","key":"e_1_3_2_1_53_1","unstructured":"2019. What is Telegram and why was the app so popular during Hong Kong protests? South China Morning Post. Retrieved September 19, 2019 from https:\/\/www.scmp.com\/tech\/appssocial\/article\/3014382\/what-telegram-and-why-didmessaging-app-prove-so-popular-during"},{"key":"e_1_3_2_1_54_1","unstructured":"Irdeto Global Consumer Piracy Survey Report. Retrieved September 11 2019 from https:\/\/resources.irdeto.com\/piracy-cybercrime\/irdetoglobal-cusumer-piracy-survey-report"},{"key":"e_1_3_2_1_55_1","unstructured":"Definition of SURVEILLANT. Retrieved September 18 2019 from https:\/\/www.merriamwebster.com\/dictionary\/surveillant"},{"key":"e_1_3_2_1_56_1","volume-title":"Retrieved","author":"Extremely Google Researchers","year":"2019","unstructured":"Google Researchers Found an Extremely Nasty iPhone Security Flaw. Time. Retrieved September 8, 2019 from https:\/\/time.com\/5665298\/iphone-security-applegoogle\/"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:46Z","timestamp":1750202626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":56,"alternative-id":["10.1145\/3313831.3376889","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376889","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}