{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:08Z","timestamp":1750220828975,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["771800"],"award-info":[{"award-number":["771800"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3359852.3359957","type":"proceedings-article","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:34:21Z","timestamp":1581604461000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Panopticities"],"prefix":"10.1145","author":[{"given":"Andreas","family":"Zingerle","sequence":"first","affiliation":[{"name":"KairUs Art+Research, Bergen, Norway"}]},{"given":"Linda","family":"Kronman","sequence":"additional","affiliation":[{"name":"The Department of Linguistic, Literary and Aesthetic, Studies\/University of Bergen, Bergen, Norway"}]}],"member":"320","published-online":{"date-parts":[[2020,2,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Strangers May Have Been Watching Too. The Intercept. Retrieved","author":"Biddle Sam","year":"2019","unstructured":"Sam Biddle. 2019. For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching Too. The Intercept. Retrieved August 28, 2019 from https:\/\/theintercept.com\/2019\/01\/10\/amazon-ring-security-camera\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Bridle James","year":"2013","unstructured":"James Bridle. 2013. Every CCTV Camera (N16). Retrieved August 28, 2019 from https:\/\/jamesbridle.com\/works\/every-cctv-camera-n16"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Chang Ben","year":"2003","unstructured":"Ben Chang, Silvia Ruzanka, and Dmitry Strakovsky. 2003. (In)Security Camera. Retrieved August 28, 2019 from https:\/\/bcchang.com\/insecurity-camera\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Coburn Tyler","year":"2016","unstructured":"Tyler Coburn. 2016. U. Retrieved August 28, 2019 from https:\/\/www.tylercoburn.com\/u.html"},{"key":"e_1_3_2_1_5_1","article-title":"IP security camera and network video surveillance visionary","author":"Compston Tim","year":"2016","unstructured":"Tim Compston. 2016. IP security camera and network video surveillance visionary. Security News Desk. Retrieved August 28, 2019 from https:\/\/securitynewsdesk.com\/ip-security-camera-and-network-video-surveillance-visionary\/","journal-title":"Security News Desk. Retrieved"},{"key":"e_1_3_2_1_6_1","volume-title":"Artificially intelligent security cameras are spotting crimes before they happen. Business Insider. Retrieved","author":"Del Prado Guia Marie","year":"2019","unstructured":"Guia Marie Del Prado. 2015. Artificially intelligent security cameras are spotting crimes before they happen. Business Insider. Retrieved September 2, 2019 from https:\/\/www.businessinsider.com\/security-cameras-use-artificial-intelligence-to-detect-crime-2015-8"},{"key":"e_1_3_2_1_7_1","volume-title":"Vice. Retrieved","author":"Franceschi-Bicchierai Lorenzo","year":"2016","unstructured":"Lorenzo Franceschi-Bicchierai. 2016. How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet. Vice. Retrieved August 28, 2019 from https:\/\/www.vice.com\/en_us\/article\/8q8dab\/15-million-connected-cameras-ddos-botnet-brian-krebs"},{"key":"e_1_3_2_1_8_1","volume-title":"City Watching: Closed-Circuit Television in Public Spaces","author":"Fyfe Nicholas","year":"2005","unstructured":"Nicholas Fyfe and Jon Bannister. 2005. City Watching: Closed-Circuit Television in Public Spaces. In The Urban Geography Reader, Nicholas Fyfe and Judith T. Kenny (eds.). Psychology Press."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Harvey Adam","year":"2019","unstructured":"Adam Harvey. MegaPixels. MegaPixels: Face Recognition Datasets. Retrieved August 28, 2019 from https:\/\/megapixels.cc\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Forbes. Retrieved","author":"Hill Kashmir","year":"2013","unstructured":"Kashmir Hill. 2013. \"Baby Monitor Hack\" Could Happen To 40,000 Other Foscam Users. Forbes. Retrieved August 28, 2019 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2013\/08\/27\/baby-monitor-hack-could-happen-to-40000-other-foscam-users\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Kronman Linda","year":"2018","unstructured":"Linda Kronman and Andreas Zingerle. 2018. Panopticities. Retrieved August 28, 2019 from http:\/\/kairus.org\/portfolio\/panopticities-2018\/"},{"key":"e_1_3_2_1_12_1","volume-title":"New Texture: New Media Art","author":"Kronman Linda","year":"2019","unstructured":"Linda Kronman and Andreas Zingerle. 2019. KairUs Art+Research. In New Texture: New Media Art 2019, Leejin Kim, Seungsub Baik, Heejin Kang, Seonyoung Im and Hyunjin Bang (eds.). CICA Press, Gimpo, Korea."},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Luksch Manu","year":"2007","unstructured":"Manu Luksch. 2007. FACELESS. Retrieved August 28, 2019 from http:\/\/www.manuluksch.com\/project\/faceless\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Luksch Manu","year":"2007","unstructured":"Manu Luksch. 2007. MANIFESTO FOR CCTV FILMMAKERS. Retrieved August 28, 2019 from http:\/\/www.manuluksch.com\/wp\/wp-content\/uploads\/MANIFESTO-FINAL-poster_ENG.pdf"},{"volume-title":"The Culture of Surveillance: Watching as a Way of Life (1 edition ed.)","author":"Lyon David","key":"e_1_3_2_1_15_1","unstructured":"David Lyon. 2018. The Culture of Surveillance: Watching as a Way of Life (1 edition ed.). Polity, Cambridge, UK Medford, MA."},{"key":"e_1_3_2_1_16_1","unstructured":"Jill Magid. 2002. System Azure Security Ornamentation. Retrieved from http:\/\/www.systemazure.com\/index.html"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Bitnik Mediengruppe","year":"2008","unstructured":"Mediengruppe Bitnik. 2008. CCTV - A Trail of Images. Retrieved August 28, 2019 from https:\/\/wwwwwwwwwwwwwwwwwwwwww.bitnik.org\/c\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Bitnik Mediengruppe","year":"2009","unstructured":"Mediengruppe Bitnik. 2009. Milit\u00e4rstrasse 105. Retrieved August 28, 2019 from https:\/\/wwwwwwwwwwwwwwwwwwwwww.bitnik.org\/m\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Bitnik Mediengruppe","year":"2012","unstructured":"Mediengruppe Bitnik. 2012. Surveillance Chess. Retrieved August 28, 2019 from https:\/\/wwwwwwwwwwwwwwwwwwwwww.bitnik.org\/s\/"},{"key":"e_1_3_2_1_20_1","volume-title":"F-Secure Blog. Retrieved","author":"Michael Melissa","year":"2017","unstructured":"Melissa Michael. 2017. Of Cameras & Compromise: How IoT Could Dull Your Competitive Edge. F-Secure Blog. Retrieved August 28, 2019 from https:\/\/blog.f-secure.com\/foscam_cameras_and_compromise\/"},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Nikonole Helena","year":"2017","unstructured":"Helena Nikonole. 2017. deus X mchn. Retrieved August 28, 2019 from http:\/\/nikonole.com\/deusxmchn"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Paglen Trevor","year":"2014","unstructured":"Trevor Paglen. 2014. Seeing Machines - Still searching - Fotomuseum Winterthur. Retrieved April 11, 2019 from http:\/\/www.fotomuseum.ch\/en\/explore\/still-searching\/articles\/26978_seeing_machines"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Scalco Dan","year":"2017","unstructured":"Dan Scalco. 2017. Why Home Security Systems Are on Track to Be a Multi-Billion-Dollar Market. Inc.com. Retrieved August 28, 2019 from https:\/\/www.inc.com\/dan-scalco\/why-home-security-systems-are-on-track-to-be-a-multi-billion-dollar-market.html"},{"volume-title":"The World Is Waiting. Retrieved","year":"2005","key":"e_1_3_2_1_24_1","unstructured":"Stanza. 2005. The World Is Watching, The World Is Waiting. Retrieved August 28, 2019 from http:\/\/www.stanza.co.uk\/watching_world\/index.html"},{"volume-title":"Retrieved","year":"2005","key":"e_1_3_2_1_25_1","unstructured":"Stanza. 2005. America Is Bleeding. Retrieved August 28, 2019 from http:\/\/www.stanza.co.uk\/new_york_stories\/index.html"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Teran Michelle","year":"2003","unstructured":"Michelle Teran. 2003. Life: a user's manual. Retrieved August 29, 2019 from http:\/\/www.ubermatic.org\/life\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Teran Michelle","year":"2008","unstructured":"Michelle Teran. 2008. Parasitic Video Interceptor (aka The Spy). Retrieved August 29, 2019 from http:\/\/www.ubermatic.org\/?p=205"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","author":"Teran Michelle","year":"2008","unstructured":"Michelle Teran. 2008. 17 Cities. Retrieved August 29, 2019 from http:\/\/www.ubermatic.org\/?p=203"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.808359"},{"key":"e_1_3_2_1_30_1","volume-title":"Artificial intelligence is going to supercharge surveillance. The Verge. Retrieved","author":"Vincent James","year":"2019","unstructured":"James Vincent. 2018. Artificial intelligence is going to supercharge surveillance. The Verge. Retrieved September 2, 2019 from https:\/\/www.theverge.com\/2018\/1\/23\/16907238\/artificial-intelligence-surveillance-cameras-security"},{"key":"e_1_3_2_1_31_1","volume-title":"The Verge. Retrieved","author":"Vincent James","year":"2018","unstructured":"James Vincent. 2018. This Japanese AI security camera shows the future of surveillance will be automated. The Verge. Retrieved August 28, 2019 from https:\/\/www.theverge.com\/2018\/6\/26\/17479068\/ai-guardman-security-camera-shoplifter-japan-automated-surveillance"},{"key":"e_1_3_2_1_32_1","volume-title":"Retrieved","author":"Wagenknecht Addie","year":"2013","unstructured":"Addie Wagenknecht. 2013. Asymmetric Love. Retrieved August 28, 2019 from http:\/\/www.placesiveneverbeen.com\/details\/asymmetric-love"},{"key":"e_1_3_2_1_33_1","volume-title":"Rashida Richardson, Jason Schultz, and Oscar Schwartz.","author":"Whittaker Meredith","year":"2018","unstructured":"Meredith Whittaker, Kate Crawford, Roel Dobbe, Genevieve Fried, Elizabeth Kaziunas, Varoon Mathur, Sarah Myers West, Rashida Richardson, Jason Schultz, and Oscar Schwartz. 2018. AI Now Report 2018. AI Now Institute, New York University. Retrieved August 28, 2019 from https:\/\/ainowinstitute.org\/AI_Now_2018_Report.pdf"},{"volume-title":"World crime trends and emerging issues and responses in the field of crime prevention and criminal justice","year":"2019","key":"e_1_3_2_1_34_1","unstructured":"2017. World crime trends and emerging issues and responses in the field of crime prevention and criminal justice. United Nations Economic and Social Council. Retrieved August 29, 2019 from https:\/\/www.unodc.org\/documents\/data-and-analysis\/statistics\/crime\/ccpj\/World_crime_trends_emerging_issues_E.pdf"},{"key":"e_1_3_2_1_35_1","volume-title":"WorldAtlas. Retrieved","author":"Spied Upon The Most","year":"2019","unstructured":"The Most Spied Upon Cities in the World. WorldAtlas. Retrieved August 28, 2019 from https:\/\/www.worldatlas.com\/articles\/most-spied-on-cities-in-the-world.html"},{"key":"e_1_3_2_1_36_1","unstructured":"Definition of SURVEILLANCE. Retrieved August 28 2019 from https:\/\/www.merriam-webster.com\/dictionary\/surveillance"}],"event":{"name":"ARTECH 2019: 9th International Conference on Digital and Interactive Arts","acronym":"ARTECH 2019","location":"Braga Portugal"},"container-title":["Proceedings of the 9th International Conference on Digital and Interactive Arts"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359852.3359957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359852.3359957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:27Z","timestamp":1750202007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359852.3359957"}},"subtitle":["Artwork submission"],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":36,"alternative-id":["10.1145\/3359852.3359957","10.1145\/3359852"],"URL":"https:\/\/doi.org\/10.1145\/3359852.3359957","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-02-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}