{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:10:04Z","timestamp":1767665404313,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2020,11,2]]},"abstract":"<jats:p>\n            Being watched means much more than being seen. This forum investigates information flows of sensing culled from sources as diverse as temperature check and iris scans to sound and movement sensors across terrains. After Veillance discusses how these systems distribute risk unevenly and shape the lives of populations across the globe.\n            <jats:bold>--- Sareeta Amrute, Editor<\/jats:bold>\n          <\/jats:p>","DOI":"10.1145\/3428949","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:13:54Z","timestamp":1604351634000},"page":"76-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Aadhaar and the creation of barriers to welfare"],"prefix":"10.1145","volume":"27","author":[{"given":"Sareeta","family":"Amrute","sequence":"first","affiliation":[{"name":"University of Washington and the Data &amp; Society Research Institute"}]},{"given":"Reetika","family":"Khera","sequence":"additional","affiliation":[{"name":"IIT Delhi"}]},{"given":"Adam","family":"Willems","sequence":"additional","affiliation":[{"name":"Union Theological Seminary"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Surveillance Studies: A Reader","author":"Puar J.","year":"2018","unstructured":"Puar , J. Terrorist assemblages (excerpt) . In Surveillance Studies: A Reader . Oxford Univ. Press , 2018 , 367. Puar, J. Terrorist assemblages (excerpt). In Surveillance Studies: A Reader. Oxford Univ. Press, 2018, 367."},{"key":"e_1_2_1_2_1","unstructured":"https:\/\/twitter.com\/NirjhariSinha\/status\/1271776371061055488  https:\/\/twitter.com\/NirjhariSinha\/status\/1271776371061055488"},{"key":"e_1_2_1_3_1","unstructured":"https:\/\/twitter.com\/RaviRathorehot\/status\/1271079545953632256  https:\/\/twitter.com\/RaviRathorehot\/status\/1271079545953632256"},{"key":"e_1_2_1_4_1","unstructured":"https:\/\/twitter.com\/Aadhaar_Care\/status\/1265520384675393538  https:\/\/twitter.com\/Aadhaar_Care\/status\/1265520384675393538"},{"key":"e_1_2_1_5_1","volume-title":"10 minutes, and you have access to billion Aadhaar details. The Tribune","author":"Khaira R.","year":"2018","unstructured":"Khaira , R. Rs 50 0 , 10 minutes, and you have access to billion Aadhaar details. The Tribune . Jan. 3, 2018 ; https:\/\/www.tribuneindia.com\/news\/archive\/nation\/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details-523361 Khaira, R. Rs 500, 10 minutes, and you have access to billion Aadhaar details. The Tribune. Jan. 3, 2018; https:\/\/www.tribuneindia.com\/news\/archive\/nation\/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details-523361"},{"key":"e_1_2_1_6_1","volume-title":"India's Central Monitoring System (CMS): Something to worry about? The Centre for Internet and Society","author":"Xynou M.","year":"2014","unstructured":"Xynou , M. India's Central Monitoring System (CMS): Something to worry about? The Centre for Internet and Society . Jan. 30, 2014 ; https:\/\/cis-india.org\/internet-governance\/blog\/india-central-monitoring-system-something-to-worry-about Xynou, M. India's Central Monitoring System (CMS): Something to worry about? The Centre for Internet and Society. Jan. 30, 2014; https:\/\/cis-india.org\/internet-governance\/blog\/india-central-monitoring-system-something-to-worry-about"}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:32Z","timestamp":1750197752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":6,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11,2]]}},"alternative-id":["10.1145\/3428949"],"URL":"https:\/\/doi.org\/10.1145\/3428949","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"type":"print","value":"1072-5520"},{"type":"electronic","value":"1558-3449"}],"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}