{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:01:44Z","timestamp":1776099704246,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":108,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445055","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T07:01:49Z","timestamp":1620457309000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["\u201cYou Gotta Watch What You Say\u201d: Surveillance of Communication with Incarcerated People"],"prefix":"10.1145","author":[{"given":"Kentrell","family":"Owens","sequence":"first","affiliation":[{"name":"Carnegie Mellon University and University of Washington, United States"}]},{"given":"Camille","family":"Cobb","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Lorrie","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.77"},{"key":"e_1_3_2_1_2_1","unstructured":"Douglas Akney. 2019. Attorney-Client Privilege Under Attack in Jails Across the Nation. https:\/\/www.prisonlegalnews.org\/news\/2019\/may\/2\/attorney-client-privilege-under-attack-jails-across-nation\/ Douglas Akney. 2019. Attorney-Client Privilege Under Attack in Jails Across the Nation. https:\/\/www.prisonlegalnews.org\/news\/2019\/may\/2\/attorney-client-privilege-under-attack-jails-across-nation\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Drug\u00a0Policy Alliance. 2011. Mass Incarceration and Criminalization. http:\/\/www.drugpolicy.org\/issues\/mass-criminalization. Drug\u00a0Policy Alliance. 2011. Mass Incarceration and Criminalization. http:\/\/www.drugpolicy.org\/issues\/mass-criminalization."},{"key":"e_1_3_2_1_4_1","unstructured":"The\u00a0Internet Archive. 2001. Wayback Machine. https:\/\/web.archive.org\/ The\u00a0Internet Archive. 2001. Wayback Machine. https:\/\/web.archive.org\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-3729.2003.00195.x"},{"key":"e_1_3_2_1_6_1","unstructured":"Ken Armstrong. 2015. A Phone Call From Jail? Better Watch What You Say. https:\/\/www.themarshallproject.org\/2015\/09\/04\/a-phone-call-from-jail-better-watch-what-you-say Ken Armstrong. 2015. A Phone Call From Jail? Better Watch What You Say. https:\/\/www.themarshallproject.org\/2015\/09\/04\/a-phone-call-from-jail-better-watch-what-you-say"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v24i3.9657"},{"key":"e_1_3_2_1_8_1","volume-title":"Americans","author":"Auxier Brooke","year":"2019","unstructured":"Brooke Auxier , Lee Raine , Monica Anderson , Andrew Perrin , Madhu Kumar , and Erica Turner . 2019. Americans \u2019 attitudes and experiences with privacy policies and laws. https:\/\/www.pewresearch.org\/internet\/ 2019 \/11\/15\/americans-attitudes-and-experiences-with-privacy-policies-and-laws\/ Brooke Auxier, Lee Raine, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans\u2019 attitudes and experiences with privacy policies and laws. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-attitudes-and-experiences-with-privacy-policies-and-laws\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_1_10_1","unstructured":"Wanda Bertram. 2019. Victory for phone justice: Securus and ICSolutions abandon attempted merger. https:\/\/www.prisonpolicy.org\/blog\/2019\/04\/02\/securus-ics-merger\/. Wanda Bertram. 2019. Victory for phone justice: Securus and ICSolutions abandon attempted merger. https:\/\/www.prisonpolicy.org\/blog\/2019\/04\/02\/securus-ics-merger\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Honorable P.\u00a0Kevin Brobson. 2019. Wishnefsky v. Pennsylvania Department of Corrections. http:\/\/www.pacourts.us\/assets\/opinions\/Commonwealth\/out\/598CD19_11-8-19.pdf?cb=1. Honorable P.\u00a0Kevin Brobson. 2019. Wishnefsky v. Pennsylvania Department of Corrections. http:\/\/www.pacourts.us\/assets\/opinions\/Commonwealth\/out\/598CD19_11-8-19.pdf?cb=1."},{"key":"e_1_3_2_1_12_1","volume-title":"Dark matters: On the surveillance of blackness","author":"Browne Simone","unstructured":"Simone Browne . 2015. Dark matters: On the surveillance of blackness . Duke University Press , Durham and London. Simone Browne. 2015. Dark matters: On the surveillance of blackness. Duke University Press, Durham and London."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10677-013-9483-7"},{"key":"e_1_3_2_1_14_1","unstructured":"Albert\u00a0Fox Cahn Esq.2020. Listening Beyond the Bars: New York\u2019s Artificial Intelligence Surveillance of Prisoners and their Loved Ones.https:\/\/static1.squarespace.com\/static\/5c1bfc7eee175995a4ceb638\/t\/5f5ff0bd5b99c619be085e91\/1600123069848\/2020-9-15+Listening+Beyond+The+Bars.pdf Albert\u00a0Fox Cahn Esq.2020. Listening Beyond the Bars: New York\u2019s Artificial Intelligence Surveillance of Prisoners and their Loved Ones.https:\/\/static1.squarespace.com\/static\/5c1bfc7eee175995a4ceb638\/t\/5f5ff0bd5b99c619be085e91\/1600123069848\/2020-9-15+Listening+Beyond+The+Bars.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_3_2_1_16_1","volume-title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Chen Christine","year":"2019","unstructured":"Christine Chen , Nicola Dell , and Franziska Roesner . 2019 . Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 89\u2013104. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chen Christine Chen, Nicola Dell, and Franziska Roesner. 2019. Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 89\u2013104. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chen"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.lawsocsci.3.081806.112829"},{"key":"e_1_3_2_1_18_1","unstructured":"Smart Communications. 2018. Smart Communications Contract Redacted. https:\/\/cdn.muckrock.com\/foia_files\/2018\/10\/17\/Smart_Communications_Contract_Redacted.pdf. Smart Communications. 2018. Smart Communications Contract Redacted. https:\/\/cdn.muckrock.com\/foia_files\/2018\/10\/17\/Smart_Communications_Contract_Redacted.pdf."},{"key":"e_1_3_2_1_19_1","unstructured":"Global\u00a0Tel*Link Corporation. 2020. Privacy Policy. https:\/\/web.archive.org\/web\/20200521171846\/https:\/\/web.connectnetwork.com\/privacy-policy\/. Global\u00a0Tel*Link Corporation. 2020. Privacy Policy. https:\/\/web.archive.org\/web\/20200521171846\/https:\/\/web.connectnetwork.com\/privacy-policy\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Allegheny County. 2020. Before Visiting Allegheny County Jail. https:\/\/www.alleghenycounty.us\/jail\/visitors\/visitor-information.aspx Allegheny County. 2020. Before Visiting Allegheny County Jail. https:\/\/www.alleghenycounty.us\/jail\/visitors\/visitor-information.aspx"},{"key":"e_1_3_2_1_21_1","unstructured":"Allegheny County. 2020. What You Can Send to an Inmate. https:\/\/www.alleghenycounty.us\/jail\/inmate-mail.aspx. Allegheny County. 2020. What You Can Send to an Inmate. https:\/\/www.alleghenycounty.us\/jail\/inmate-mail.aspx."},{"key":"e_1_3_2_1_22_1","volume-title":"Technology-Filled World. In 10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Cranor Lorrie\u00a0Faith","year":"2014","unstructured":"Lorrie\u00a0Faith Cranor , Adam\u00a0 L. Durity , Abigail Marsh , and Blase Ur . 2014 . Parents\u2019 and Teens\u2019 Perspectives on Privacy In a Technology-Filled World. In 10th Symposium On Usable Privacy and Security (SOUPS 2014 ). USENIX Association, Menlo Park, CA, 19\u201335. https:\/\/www.usenix.org\/conference\/soups 2014\/proceedings\/presentation\/cranor Lorrie\u00a0Faith Cranor, Adam\u00a0L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents\u2019 and Teens\u2019 Perspectives on Privacy In a Technology-Filled World. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 19\u201335. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/cranor"},{"key":"e_1_3_2_1_23_1","unstructured":"Joel Currier. 2020. Prison phone calls lead to charges in 2017 double homicide in Carondelet neighborhood. https:\/\/www.stltoday.com\/news\/local\/crime-and-courts\/prison-phone-calls-lead-to-charges-in-2017-double-homicide-in-carondelet-neighborhood\/article_8e5ab8a0-9d5b-5d22-b2b7-48e803551965.html Joel Currier. 2020. Prison phone calls lead to charges in 2017 double homicide in Carondelet neighborhood. https:\/\/www.stltoday.com\/news\/local\/crime-and-courts\/prison-phone-calls-lead-to-charges-in-2017-double-homicide-in-carondelet-neighborhood\/article_8e5ab8a0-9d5b-5d22-b2b7-48e803551965.html"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/2111718"},{"key":"e_1_3_2_1_25_1","unstructured":"Zuri Davis. 2018. Pennsylvania\u2019s New $4 Million Prison Mail System Brings Privacy Concerns. https:\/\/reason.com\/2018\/10\/10\/pennsylvanias-4-million-prison-mail-scan\/. Zuri Davis. 2018. Pennsylvania\u2019s New $4 Million Prison Mail System Brings Privacy Concerns. https:\/\/reason.com\/2018\/10\/10\/pennsylvanias-4-million-prison-mail-scan\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20161503"},{"key":"e_1_3_2_1_27_1","unstructured":"Paul Egan. 2020. U.P. prison inmate wrote complaint about conditions. Then he was moved to solitary.https:\/\/web.archive.org\/web\/20200413000934\/https:\/\/www.freep.com\/story\/news\/local\/michigan\/2020\/02\/11\/chippewa-correctional-facility-michigan-prisoner-edward-walton\/4721477002\/ Paul Egan. 2020. U.P. prison inmate wrote complaint about conditions. Then he was moved to solitary.https:\/\/web.archive.org\/web\/20200413000934\/https:\/\/www.freep.com\/story\/news\/local\/michigan\/2020\/02\/11\/chippewa-correctional-facility-michigan-prisoner-edward-walton\/4721477002\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/2378023119829332"},{"key":"e_1_3_2_1_29_1","unstructured":"[ 29 ] Sandra Feder.2020. https:\/\/news.stanford.edu\/2020\/06\/08\/race-mass-criminalization-u-s\/ [29] Sandra Feder.2020. https:\/\/news.stanford.edu\/2020\/06\/08\/race-mass-criminalization-u-s\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Chris Francescani. 2019. US prisons and jails using AI to mass-monitor millions of inmate calls. https:\/\/web.archive.org\/web\/20200525045330\/https:\/\/abcnews.go.com\/Technology\/us-prisons-jails-ai-mass-monitor-millions-inmate\/story?id=66370244 Chris Francescani. 2019. US prisons and jails using AI to mass-monitor millions of inmate calls. https:\/\/web.archive.org\/web\/20200525045330\/https:\/\/abcnews.go.com\/Technology\/us-prisons-jails-ai-mass-monitor-millions-inmate\/story?id=66370244"},{"key":"e_1_3_2_1_31_1","first-page":"425","article-title":"Democratic Surveillance","volume":"30","author":"Franks Mary\u00a0Anne","year":"2017","unstructured":"Mary\u00a0Anne Franks . 2017 . Democratic Surveillance . Harvard Journal of Law and Technology 30 (2017), 425 . Mary\u00a0Anne Franks. 2017. Democratic Surveillance. Harvard Journal of Law and Technology 30 (2017), 425.","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_33_1","volume-title":"Privacy and Security Threat Models and Mitigation Strategies of Older Adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce Lee , Florian Schaub , and Serge Egelman . 2019 . Privacy and Security Threat Models and Mitigation Strategies of Older Adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA, 21\u201340. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/frik Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 21\u201340. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/frik"},{"key":"e_1_3_2_1_34_1","unstructured":"Elizabeth Gaynes. 2017. The Destructive Lie Behind \u201cMass Incarceration\u201d. https:\/\/time.com\/4786379\/the-destructive-lie-behind-mass-incarceration\/ Elizabeth Gaynes. 2017. The Destructive Lie Behind \u201cMass Incarceration\u201d. https:\/\/time.com\/4786379\/the-destructive-lie-behind-mass-incarceration\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_2_1_36_1","first-page":"128","article-title":"Families of incarcerated African American men: The impact on mothers and children","volume":"7","author":"Hattery J","year":"2014","unstructured":"Angela\u00a0 J Hattery and Earl Smith . 2014 . Families of incarcerated African American men: The impact on mothers and children . Journal of Pan African Studies 7 , 6 (2014), 128 \u2013 153 . Angela\u00a0J Hattery and Earl Smith. 2014. Families of incarcerated African American men: The impact on mothers and children. Journal of Pan African Studies 7, 6 (2014), 128\u2013153.","journal-title":"Journal of Pan African Studies"},{"key":"e_1_3_2_1_37_1","volume-title":"Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Havron Sam","year":"2019","unstructured":"Sam Havron , Diana Freed , Rahul Chatterjee , Damon McCoy , Nicola Dell , and Thomas Ristenpart . 2019 . Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 105\u2013122. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/havron Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 105\u2013122. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/havron"},{"key":"e_1_3_2_1_38_1","unstructured":"Mike Hynes and Nick Jordan. 2019. How to Cure Prisons\u2019 Contraband Mobile Phone Epidemic. https:\/\/www.securitymagazine.com\/articles\/90543-how-to-cure-prisons-contraband-mobile-phone-epidemic. Mike Hynes and Nick Jordan. 2019. How to Cure Prisons\u2019 Contraband Mobile Phone Epidemic. https:\/\/www.securitymagazine.com\/articles\/90543-how-to-cure-prisons-contraband-mobile-phone-epidemic."},{"key":"e_1_3_2_1_39_1","unstructured":"Prison\u00a0Policy Initiative. 2019. Regulating the prison phone industry. https:\/\/www.prisonpolicy.org\/phones\/ Prison\u00a0Policy Initiative. 2019. Regulating the prison phone industry. https:\/\/www.prisonpolicy.org\/phones\/"},{"key":"e_1_3_2_1_40_1","unstructured":"Prison\u00a0Policy Initiative. 2020. Pennsylvania profile. https:\/\/www.prisonpolicy.org\/profiles\/PA.html. Prison\u00a0Policy Initiative. 2020. Pennsylvania profile. https:\/\/www.prisonpolicy.org\/profiles\/PA.html."},{"key":"e_1_3_2_1_41_1","unstructured":"Rishi Iyengar. 2020. Apple\u2019s new iPhone ad puts privacy front and center again. https:\/\/madison.com\/lifestyles\/technology\/apples-new-iphone-ad-puts-privacy-front-and-center-again\/article_afb6f614-f806-5036-8eea-993c3bfdd28e.html Rishi Iyengar. 2020. Apple\u2019s new iPhone ad puts privacy front and center again. https:\/\/madison.com\/lifestyles\/technology\/apples-new-iphone-ad-puts-privacy-front-and-center-again\/article_afb6f614-f806-5036-8eea-993c3bfdd28e.html"},{"key":"e_1_3_2_1_42_1","unstructured":"George Joseph and Debbie Nathan. 2019. Prisons Across the U.S. Are Quietly Building Databases of Incarcerated People\u2019s Voice Prints. https:\/\/theintercept.com\/2019\/01\/30\/prison-voice-prints-databases-securus\/ George Joseph and Debbie Nathan. 2019. Prisons Across the U.S. Are Quietly Building Databases of Incarcerated People\u2019s Voice Prints. https:\/\/theintercept.com\/2019\/01\/30\/prison-voice-prints-databases-securus\/"},{"key":"e_1_3_2_1_43_1","unstructured":"Mariame Kaba. 2020. Opinion | Yes We Mean Literally Abolish the Police. https:\/\/www.nytimes.com\/2020\/06\/12\/opinion\/sunday\/floyd-abolish-defund-police.html Mariame Kaba. 2020. Opinion | Yes We Mean Literally Abolish the Police. https:\/\/www.nytimes.com\/2020\/06\/12\/opinion\/sunday\/floyd-abolish-defund-police.html"},{"key":"e_1_3_2_1_44_1","unstructured":"Charles\u00a0G. Koch and Mark\u00a0V. Holden. 2015. The Overcriminalization of America. https:\/\/www.politico.com\/magazine\/story\/2015\/01\/overcriminalization-of-america-113991.html Charles\u00a0G. Koch and Mark\u00a0V. Holden. 2015. The Overcriminalization of America. https:\/\/www.politico.com\/magazine\/story\/2015\/01\/overcriminalization-of-america-113991.html"},{"key":"e_1_3_2_1_45_1","unstructured":"Emily Lane. 2019. Tech Company Gave Two New Orleans-Area Sheriff\u2019s Offices Access to Track Cell Phones Without Warrants. https:\/\/theappeal.org\/louisiana-sheriffs-securus\/ Emily Lane. 2019. Tech Company Gave Two New Orleans-Area Sheriff\u2019s Offices Access to Track Cell Phones Without Warrants. https:\/\/theappeal.org\/louisiana-sheriffs-securus\/"},{"key":"e_1_3_2_1_46_1","unstructured":"Victoria Law. 2018. How Companies Make Millions Charging Prisoners to Send An Email. https:\/\/www.wired.com\/story\/jpay-securus-prison-email-charging-millions\/ Victoria Law. 2018. How Companies Make Millions Charging Prisoners to Send An Email. https:\/\/www.wired.com\/story\/jpay-securus-prison-email-charging-millions\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376339"},{"key":"e_1_3_2_1_48_1","unstructured":"M.\u00a0Elena Lopez Margaret Caspe and Lorette McWilliams. 2016. Public Libraries: A Vital Space for Family Engagement. https:\/\/globalfrp.org\/content\/download\/72\/431\/file\/Public%20Libraries-A%20Vital%20Space%20for%20Family%20Engagement_HFRP%20PLA_%20August-2-2016.pdf M.\u00a0Elena Lopez Margaret Caspe and Lorette McWilliams. 2016. Public Libraries: A Vital Space for Family Engagement. https:\/\/globalfrp.org\/content\/download\/72\/431\/file\/Public%20Libraries-A%20Vital%20Space%20for%20Family%20Engagement_HFRP%20PLA_%20August-2-2016.pdf"},{"key":"e_1_3_2_1_49_1","volume-title":"Surveillance as social sorting: Privacy, risk, and digital discrimination","author":"Lyon David","unstructured":"David Lyon . 2003. Surveillance as social sorting: Privacy, risk, and digital discrimination . Routledge , London and New York. David Lyon. 2003. Surveillance as social sorting: Privacy, risk, and digital discrimination. Routledge, London and New York."},{"key":"e_1_3_2_1_50_1","unstructured":"Mary Madden. 2017. Privacy security and digital inequality. https:\/\/datasociety.net\/wp-content\/uploads\/2017\/09\/DataAndSociety_PrivacySecurityandDigitalInequality.pdf. Mary Madden. 2017. Privacy security and digital inequality. https:\/\/datasociety.net\/wp-content\/uploads\/2017\/09\/DataAndSociety_PrivacySecurityandDigitalInequality.pdf."},{"key":"e_1_3_2_1_51_1","unstructured":"Alex Marthews and Catherine Tucker. 2017. Government Surveillance and Internet Search Behavior. 53\u00a0pages. http:\/\/www.ssrn.com\/abstract=2412564 Alex Marthews and Catherine Tucker. 2017. Government Surveillance and Internet Search Behavior. 53\u00a0pages. http:\/\/www.ssrn.com\/abstract=2412564"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-097086-8.64025-4"},{"key":"e_1_3_2_1_53_1","unstructured":"Thomas McMullan. 2015. What does the panopticon mean in the age of digital surveillance?https:\/\/www.theguardian.com\/technology\/2015\/jul\/23\/panopticon-digital-surveillance-jeremy-bentham Thomas McMullan. 2015. What does the panopticon mean in the age of digital surveillance?https:\/\/www.theguardian.com\/technology\/2015\/jul\/23\/panopticon-digital-surveillance-jeremy-bentham"},{"key":"e_1_3_2_1_54_1","unstructured":"Jamila Michener and Julilly Kohler-Hausmann. 2017. Opinion | Why We Shouldn\u2019t Drug Test Poor People. https:\/\/www.nytimes.com\/2017\/06\/28\/opinion\/drug-test-poor-medicaid-walker-trump.html Jamila Michener and Julilly Kohler-Hausmann. 2017. Opinion | Why We Shouldn\u2019t Drug Test Poor People. https:\/\/www.nytimes.com\/2017\/06\/28\/opinion\/drug-test-poor-medicaid-walker-trump.html"},{"key":"e_1_3_2_1_55_1","volume-title":"EvidenceProf Blog: Signed","author":"Miller Colin","year":"2015","unstructured":"Colin Miller . 2015. EvidenceProf Blog: Signed , Sealed, Delivered : The Different Prison Mail Policies of Different States . https:\/\/lawprofessors.typepad.com\/evidenceprof\/ 2015 \/02\/as-a-result-ofyesterdays-post-i-started-doing-some-research-into-the-prison-mail-reading-policies-in-various-states-if-you.html Colin Miller. 2015. EvidenceProf Blog: Signed, Sealed, Delivered: The Different Prison Mail Policies of Different States. https:\/\/lawprofessors.typepad.com\/evidenceprof\/2015\/02\/as-a-result-ofyesterdays-post-i-started-doing-some-research-into-the-prison-mail-reading-policies-in-various-states-if-you.html"},{"key":"e_1_3_2_1_56_1","unstructured":"Vincent\u00a0M Nathan. 2001. Evaluation of the inmate grievance system. https:\/\/www.law.umich.edu\/facultyhome\/margoschlanger\/Documents\/Resources\/Prison_and_Jail_Grievance_Policies\/Ohio_Nathan_Evaluation_Grievance_System.pdf Vincent\u00a0M Nathan. 2001. Evaluation of the inmate grievance system. https:\/\/www.law.umich.edu\/facultyhome\/margoschlanger\/Documents\/Resources\/Prison_and_Jail_Grievance_Policies\/Ohio_Nathan_Evaluation_Grievance_System.pdf"},{"key":"e_1_3_2_1_57_1","unstructured":"NCSL. 2020. Drug Testing for Welfare Recipients and Public Assistance. https:\/\/www.ncsl.org\/research\/human-services\/drug-testing-and-public-assistance.aspx NCSL. 2020. Drug Testing for Welfare Recipients and Public Assistance. https:\/\/www.ncsl.org\/research\/human-services\/drug-testing-and-public-assistance.aspx"},{"key":"e_1_3_2_1_58_1","unstructured":"Kristen Nugent. 2015. GTL\u2019s Location IQ\u2122 gives correctional facilities insight by pinpointing called party location. https:\/\/web.archive.org\/web\/20170715003108\/https:\/\/www.gtl.net\/gtls-location-iq-gives-correctional-facilities-insight-by-pinpointing-called-party-location\/. Kristen Nugent. 2015. GTL\u2019s Location IQ\u2122 gives correctional facilities insight by pinpointing called party location. https:\/\/web.archive.org\/web\/20170715003108\/https:\/\/www.gtl.net\/gtls-location-iq-gives-correctional-facilities-insight-by-pinpointing-called-party-location\/."},{"key":"e_1_3_2_1_59_1","unstructured":"PA\u00a0Department of Corrections. 2020. Mail. https:\/\/www.cor.pa.gov:443\/Pages\/Mail.aspx. PA\u00a0Department of Corrections. 2020. Mail. https:\/\/www.cor.pa.gov:443\/Pages\/Mail.aspx."},{"key":"e_1_3_2_1_60_1","unstructured":"PA\u00a0Department of Corrections. 2020. Video Visitation Program. https:\/\/web.archive.org\/web\/20200603124505\/https:\/\/www.cor.pa.gov\/family-and-friends\/Pages\/Video-Visitation.aspx. PA\u00a0Department of Corrections. 2020. Video Visitation Program. https:\/\/web.archive.org\/web\/20200603124505\/https:\/\/www.cor.pa.gov\/family-and-friends\/Pages\/Video-Visitation.aspx."},{"key":"e_1_3_2_1_61_1","unstructured":"PA\u00a0Department of Corrections. 2020. Visiting Rules. https:\/\/www.cor.pa.gov:443\/family-and-friends\/Pages\/Visiting-Rules.aspx PA\u00a0Department of Corrections. 2020. Visiting Rules. https:\/\/www.cor.pa.gov:443\/family-and-friends\/Pages\/Visiting-Rules.aspx"},{"key":"e_1_3_2_1_62_1","volume-title":"BOP: Community Ties. https:\/\/www.bop.gov\/inmates\/communications.jsp","author":"Federal\u00a0Bureau of Prisons.","year":"2020","unstructured":"Federal\u00a0Bureau of Prisons. 2020 . BOP: Community Ties. https:\/\/www.bop.gov\/inmates\/communications.jsp Federal\u00a0Bureau of Prisons. 2020. BOP: Community Ties. https:\/\/www.bop.gov\/inmates\/communications.jsp"},{"key":"e_1_3_2_1_63_1","unstructured":"Alameda County\u00a0DA\u2019s Office. 2005. Intercepting Prisoner Communications. 15\u201320\u00a0pages. https:\/\/le.alcoda.org\/publications\/point_of_view\/files\/IPC.pdf Alameda County\u00a0DA\u2019s Office. 2005. Intercepting Prisoner Communications. 15\u201320\u00a0pages. https:\/\/le.alcoda.org\/publications\/point_of_view\/files\/IPC.pdf"},{"key":"e_1_3_2_1_64_1","unstructured":"Information\u00a0Commisioner\u2019s Office. 2020. Principle (c): Data minimisation. https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/principles\/data-minimisation\/ Information\u00a0Commisioner\u2019s Office. 2020. Principle (c): Data minimisation. https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/principles\/data-minimisation\/"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376392"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300315"},{"key":"e_1_3_2_1_67_1","unstructured":"Pew\u00a0Center on\u00a0the States. 2011. State of recidivism: The revolving door of America\u2019s prisons. https:\/\/www.pewtrusts.org\/~\/media\/legacy\/uploadedfiles\/wwwpewtrustsorg\/reports\/sentencing_and_corrections\/staterecidivismrevolvingdooramericaprisons20pdf.pdf. Pew\u00a0Center on\u00a0the States. 2011. State of recidivism: The revolving door of America\u2019s prisons. https:\/\/www.pewtrusts.org\/~\/media\/legacy\/uploadedfiles\/wwwpewtrustsorg\/reports\/sentencing_and_corrections\/staterecidivismrevolvingdooramericaprisons20pdf.pdf."},{"key":"e_1_3_2_1_68_1","unstructured":"Families Outside. 2020. About Wesley Family Services. https:\/\/wfspa.org\/about\/. Accessed: 2020-06-11. Families Outside. 2020. About Wesley Family Services. https:\/\/wfspa.org\/about\/. Accessed: 2020-06-11."},{"key":"e_1_3_2_1_69_1","first-page":"117","article-title":"Chilling Effects: Online Surveillance and Wikipedia Use","volume":"31","author":"Penney W.","year":"2016","unstructured":"Jonathon\u00a0 W. Penney . 2016 . Chilling Effects: Online Surveillance and Wikipedia Use . Berkeley Technology Law Journal 31 , 1 (2016), 117 \u2013 182 . http:\/\/lawcat.berkeley.edu\/record\/1127413 Jonathon\u00a0W. Penney. 2016. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal 31, 1 (2016), 117\u2013182. http:\/\/lawcat.berkeley.edu\/record\/1127413","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663341"},{"key":"e_1_3_2_1_71_1","unstructured":"Bernadette Rabuy and Daniel Kopf. 2015. Separation by Bars and Miles: Visitation in state prisons. https:\/\/www.prisonpolicy.org\/reports\/prisonvisits.html Bernadette Rabuy and Daniel Kopf. 2015. Separation by Bars and Miles: Visitation in state prisons. https:\/\/www.prisonpolicy.org\/reports\/prisonvisits.html"},{"key":"e_1_3_2_1_72_1","unstructured":"Bernadette Rabuy and Peter Wagner. 2015. Screening Out Family Time: The for-profit video visitation industry in prisons and jails. https:\/\/www.prisonpolicy.org\/visitation\/report.html. Bernadette Rabuy and Peter Wagner. 2015. Screening Out Family Time: The for-profit video visitation industry in prisons and jails. https:\/\/www.prisonpolicy.org\/visitation\/report.html."},{"key":"e_1_3_2_1_73_1","unstructured":"Stephen Raher. 2016. You\u2019ve Got Mail: The promise of cyber communication in prisons and the need for regulation. https:\/\/www.prisonpolicy.org\/messaging\/report.html. Stephen Raher. 2016. You\u2019ve Got Mail: The promise of cyber communication in prisons and the need for regulation. https:\/\/www.prisonpolicy.org\/messaging\/report.html."},{"key":"e_1_3_2_1_74_1","unstructured":"Stephen Raher. 2017. The Wireless Prison: How Colorado\u2019s tablet computer program misses opportunities and monetizes the poor. https:\/\/www.prisonpolicy.org\/blog\/2017\/07\/06\/tablets\/ Stephen Raher. 2017. The Wireless Prison: How Colorado\u2019s tablet computer program misses opportunities and monetizes the poor. https:\/\/www.prisonpolicy.org\/blog\/2017\/07\/06\/tablets\/"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_3_2_1_76_1","first-page":"32","article-title":"The Dangers of Surveillance","volume":"126","author":"Richards M.","year":"2013","unstructured":"Neil\u00a0 M. Richards . 2013 . The Dangers of Surveillance . Harvard Law Review 126 (2013), 32 . Neil\u00a0M. Richards. 2013. The Dangers of Surveillance. Harvard Law Review 126(2013), 32.","journal-title":"Harvard Law Review"},{"key":"e_1_3_2_1_77_1","unstructured":"Matt Riley. 2017. Which states have the most smuggled prison cellphones?https:\/\/www.nbcnews.com\/news\/corrections\/southern-prisons-have-smuggled-cellphone-problem-n790251. Matt Riley. 2017. Which states have the most smuggled prison cellphones?https:\/\/www.nbcnews.com\/news\/corrections\/southern-prisons-have-smuggled-cellphone-problem-n790251."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","first-page":"611","DOI":"10.36646\/mjlr.42.3.one","article-title":"One of the Dirty Secrets of American Corrections\u201d: Retaliation, Surplus Power, and Whistleblowing Inmates","volume":"42","author":"Robertson E","year":"2009","unstructured":"James\u00a0 E Robertson . 2009 . \u201c One of the Dirty Secrets of American Corrections\u201d: Retaliation, Surplus Power, and Whistleblowing Inmates . University of Michigan Journal of Law Reform 42 , 3 (2009), 611 \u2013 649 . James\u00a0E Robertson. 2009. \u201c One of the Dirty Secrets of American Corrections\u201d: Retaliation, Surplus Power, and Whistleblowing Inmates. University of Michigan Journal of Law Reform 42, 3 (2009), 611\u2013649.","journal-title":"University of Michigan Journal of Law Reform"},{"key":"e_1_3_2_1_79_1","volume-title":"Proc. of the 2nd European Conference on Social Media 2015: ECSM 2015. ECSM, Portugal, 377\u2013382","author":"Romele Alberto","year":"2015","unstructured":"Alberto Romele , Camilla Emmenegger , Francesco Gallino , and Daniele Gorgone41. 2015 . Technologies of Voluntary Servitude (TovS): a post\u2013Foucauldian Perspective on Social Media . In Proc. of the 2nd European Conference on Social Media 2015: ECSM 2015. ECSM, Portugal, 377\u2013382 . Alberto Romele, Camilla Emmenegger, Francesco Gallino, and Daniele Gorgone41. 2015. Technologies of Voluntary Servitude (TovS): a post\u2013Foucauldian Perspective on Social Media. In Proc. of the 2nd European Conference on Social Media 2015: ECSM 2015. ECSM, Portugal, 377\u2013382."},{"key":"e_1_3_2_1_80_1","unstructured":"Nick Rummell. 2019. Recorded Prison Calls May Be Used Against You NY Court Rules. https:\/\/www.courthousenews.com\/recorded-prison-calls-may-be-used-against-you-ny-court-rules\/ Nick Rummell. 2019. Recorded Prison Calls May Be Used Against You NY Court Rules. https:\/\/www.courthousenews.com\/recorded-prison-calls-may-be-used-against-you-ny-court-rules\/"},{"key":"e_1_3_2_1_81_1","unstructured":"Leah Sakala. 2013. Return to Sender. https:\/\/www.prisonpolicy.org\/postcards\/report.html. Leah Sakala. 2013. Return to Sender. https:\/\/www.prisonpolicy.org\/postcards\/report.html."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1080\/02732173.2015.1110508"},{"key":"e_1_3_2_1_83_1","volume-title":"Mass Incarceration: The Whole Pie","author":"Sawyer Wendy","year":"2020","unstructured":"Wendy Sawyer and Peter Wagner . 2020 . Mass Incarceration: The Whole Pie 2020. https:\/\/www.prisonpolicy.org\/reports\/pie2020.html Wendy Sawyer and Peter Wagner. 2020. Mass Incarceration: The Whole Pie 2020. https:\/\/www.prisonpolicy.org\/reports\/pie2020.html"},{"key":"e_1_3_2_1_84_1","volume-title":"The Correspondence of Jeremy Bentham","unstructured":"P\u00a0(Ed). Schofield. 2017. The Correspondence of Jeremy Bentham , Volume 1 . UCL Press , London . P\u00a0(Ed). Schofield. 2017. The Correspondence of Jeremy Bentham, Volume 1. UCL Press, London."},{"key":"e_1_3_2_1_85_1","unstructured":"Mirela Silva and Daniela Oliveira. 2020. Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them. 6\u00a0pages. Mirela Silva and Daniela Oliveira. 2020. Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them. 6\u00a0pages."},{"key":"e_1_3_2_1_86_1","volume-title":"Computer Security and Privacy for Refugees in the United States. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Simko Lucy","year":"2018","unstructured":"Lucy Simko , Ada Lerner , Samia Ibtasam , Franziska Roesner , and Tadayoshi Kohno . 2018 . Computer Security and Privacy for Refugees in the United States. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE , San Francisco, CA, USA, 409\u2013423. Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer Security and Privacy for Refugees in the United States. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 409\u2013423."},{"key":"e_1_3_2_1_87_1","unstructured":"Jordan Smith and Micah Lee. 2015. Not So Securus: Massive Hack of 70 Million Prisoner Phone Calls Indicates Violations of Attorney-Client Privilege. https:\/\/theintercept.com\/2015\/11\/11\/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients\/ Jordan Smith and Micah Lee. 2015. Not So Securus: Massive Hack of 70 Million Prisoner Phone Calls Indicates Violations of Attorney-Client Privilege. https:\/\/theintercept.com\/2015\/11\/11\/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients\/"},{"key":"e_1_3_2_1_88_1","unstructured":"Pennsylvania\u00a0Prison Society. 2020. WHO WE ARE | paprisonsociety. https:\/\/www.prisonsociety.org\/about_us. Accessed: 2020-06-11. Pennsylvania\u00a0Prison Society. 2020. WHO WE ARE | paprisonsociety. https:\/\/www.prisonsociety.org\/about_us. Accessed: 2020-06-11."},{"key":"e_1_3_2_1_89_1","unstructured":"Securus Technologie. 2020. \u201dMoniteau County Sheriff\u2019s Office Saves Time and Manpower With Securus Technologies\u2019 Guarded Exchange\u201d. https:\/\/web.archive.org\/web\/20200526205257\/https:\/\/www.officer.com\/command-hq\/corrections\/press-release\/21129664\/securus-technologies-moniteau-county-sheriffs-office-saves-time-and-manpower-with-securus-technologies-guarded-exchange Securus Technologie. 2020. \u201dMoniteau County Sheriff\u2019s Office Saves Time and Manpower With Securus Technologies\u2019 Guarded Exchange\u201d. https:\/\/web.archive.org\/web\/20200526205257\/https:\/\/www.officer.com\/command-hq\/corrections\/press-release\/21129664\/securus-technologies-moniteau-county-sheriffs-office-saves-time-and-manpower-with-securus-technologies-guarded-exchange"},{"key":"e_1_3_2_1_90_1","unstructured":"Aventiv Technologies. 2019. Privacy and Data Processing Policy. https:\/\/web.archive.org\/web\/20200519044230\/https:\/\/www.aventiv.com\/privacy\/ Aventiv Technologies. 2019. Privacy and Data Processing Policy. https:\/\/web.archive.org\/web\/20200519044230\/https:\/\/www.aventiv.com\/privacy\/"},{"key":"e_1_3_2_1_91_1","unstructured":"GTL Technologies. 2014. Contract Between Commonwealth of Pennsylvania Department of Corrections and Global Tel*Link Contract No. AGR-13-346_2014. https:\/\/www.patreasury.gov\/transparency\/e-library\/ContractFiles\/285767_Corrected%20Treasury%20Contract%20Link%204400013765%20Kiosk%20RFP.pdf GTL Technologies. 2014. Contract Between Commonwealth of Pennsylvania Department of Corrections and Global Tel*Link Contract No. AGR-13-346_2014. https:\/\/www.patreasury.gov\/transparency\/e-library\/ContractFiles\/285767_Corrected%20Treasury%20Contract%20Link%204400013765%20Kiosk%20RFP.pdf"},{"key":"e_1_3_2_1_92_1","unstructured":"GTL Technologies. 2016. GTL\/ConnectNetwork.com Services Available at the PA DOC. https:\/\/www.gtl.net\/pa-doc-inmate-services-by-gtl\/ GTL Technologies. 2016. GTL\/ConnectNetwork.com Services Available at the PA DOC. https:\/\/www.gtl.net\/pa-doc-inmate-services-by-gtl\/"},{"key":"e_1_3_2_1_93_1","unstructured":"GTL Technologies. 2020. ConnectNetwork Help | FAQ about our services and features. https:\/\/web.connectnetwork.com\/help\/. GTL Technologies. 2020. ConnectNetwork Help | FAQ about our services and features. https:\/\/web.connectnetwork.com\/help\/."},{"key":"e_1_3_2_1_94_1","unstructured":"GTL Technologies. 2020. Inmate Telephone Systems | GTL. https:\/\/www.gtl.net\/correctional-facility-services\/communication-solutions\/inmate-telephone-systems\/. GTL Technologies. 2020. Inmate Telephone Systems | GTL. https:\/\/www.gtl.net\/correctional-facility-services\/communication-solutions\/inmate-telephone-systems\/."},{"key":"e_1_3_2_1_95_1","unstructured":"GTL Technologies. 2020. MyApps.GTL.Us Overview. https:\/\/myapps.gtl.us\/SSO.Help\/myapps.gtl.us_overview.htm. GTL Technologies. 2020. MyApps.GTL.Us Overview. https:\/\/myapps.gtl.us\/SSO.Help\/myapps.gtl.us_overview.htm."},{"key":"e_1_3_2_1_96_1","volume-title":"Privacy - Securus Technologies","author":"Technologies Securus","year":"2019","unstructured":"Securus Technologies . 2019. Privacy - Securus Technologies 2019 . https:\/\/web.archive.org\/web\/20190504193725\/https:\/\/securustech.net\/privacy\/index.html. Securus Technologies. 2019. Privacy - Securus Technologies 2019. https:\/\/web.archive.org\/web\/20190504193725\/https:\/\/securustech.net\/privacy\/index.html."},{"key":"e_1_3_2_1_97_1","unstructured":"Securus Technologies. 2020. Securus Video ConnectSM. https:\/\/securustechnologies.tech\/corrections\/communication\/video-visitation\/. Securus Technologies. 2020. Securus Video ConnectSM. https:\/\/securustechnologies.tech\/corrections\/communication\/video-visitation\/."},{"key":"e_1_3_2_1_98_1","unstructured":"Securus Technologies. 2020. Securus Video Visitation: A Better Way To Visit. https:\/\/securustechnologies.tech\/wp-content\/uploads\/2018\/08\/Securus-Video-Visit.pdf. Securus Technologies. 2020. Securus Video Visitation: A Better Way To Visit. https:\/\/securustechnologies.tech\/wp-content\/uploads\/2018\/08\/Securus-Video-Visit.pdf."},{"key":"e_1_3_2_1_99_1","unstructured":"Securus Technologies. 2020. Securus Video Visitation Tutorial. https:\/\/www.tcsheriff.org\/inmate-jail-info\/video-tutorial. Securus Technologies. 2020. Securus Video Visitation Tutorial. https:\/\/www.tcsheriff.org\/inmate-jail-info\/video-tutorial."},{"key":"e_1_3_2_1_100_1","unstructured":"Securus Technologies. 2020. TDCJ. https:\/\/securustech.net\/tdcj\/index.html. Securus Technologies. 2020. TDCJ. https:\/\/securustech.net\/tdcj\/index.html."},{"key":"e_1_3_2_1_101_1","unstructured":"Securus Technologies. 2020. Telephone Service. https:\/\/securustechnologies.tech\/corrections\/communication\/telephone-service\/. Securus Technologies. 2020. Telephone Service. https:\/\/securustechnologies.tech\/corrections\/communication\/telephone-service\/."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_2_1_103_1","volume-title":"Prisoners once removed: The impact of incarceration and reentry on children, families, and communities","author":"Travis Jeremy","unstructured":"Jeremy Travis and Michelle Waul . 2003. Prisoners once removed: The impact of incarceration and reentry on children, families, and communities . The Urban Insitute, Washington, DC, USA. Jeremy Travis and Michelle Waul. 2003. Prisoners once removed: The impact of incarceration and reentry on children, families, and communities. The Urban Insitute, Washington, DC, USA."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3185367"},{"key":"e_1_3_2_1_105_1","unstructured":"Peter Wagner. 2015. Jails matter. But who is listening?https:\/\/www.prisonpolicy.org\/blog\/2015\/08\/14\/jailsmatter\/ Peter Wagner. 2015. Jails matter. But who is listening?https:\/\/www.prisonpolicy.org\/blog\/2015\/08\/14\/jailsmatter\/"},{"key":"e_1_3_2_1_106_1","unstructured":"Peter Wagner and Alexi Jones. 2019. State of Phone Justice. https:\/\/www.prisonpolicy.org\/phones\/state_of_phone_justice.html Peter Wagner and Alexi Jones. 2019. State of Phone Justice. https:\/\/www.prisonpolicy.org\/phones\/state_of_phone_justice.html"},{"key":"e_1_3_2_1_107_1","volume-title":"States of Incarceration: The Global Context","author":"Wagner Peter","year":"2018","unstructured":"Peter Wagner and Wendy Sawyer . 2018. States of Incarceration: The Global Context 2018 . https:\/\/www.prisonpolicy.org\/global\/2018.html Peter Wagner and Wendy Sawyer. 2018. States of Incarceration: The Global Context 2018. https:\/\/www.prisonpolicy.org\/global\/2018.html"},{"key":"e_1_3_2_1_108_1","unstructured":"Shoshana Zuboff. 1988. In the age of the smart machine. Basic Book New York City. Shoshana Zuboff. 1988. In the age of the smart machine. Basic Book New York City."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:29Z","timestamp":1750195709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":108,"alternative-id":["10.1145\/3411764.3445055","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445055","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}