{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:19Z","timestamp":1750220239814,"version":"3.41.0"},"reference-count":5,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2021,7]]},"abstract":"<jats:p>\n            Being watched means much more than being seen. This forum investigates information flows of sensing culled from sources as diverse as temperature check and iris scans to sound and movement sensors across terrains. After Veillance discusses how these systems distribute risk unevenly and shape the lives of populations across the globe.\n            <jats:bold>--- Sareeta Amrute, Editor<\/jats:bold>\n          <\/jats:p>","DOI":"10.1145\/3470480","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T17:00:36Z","timestamp":1625072436000},"page":"68-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A conversation with Kamela Heyward-Rotimi"],"prefix":"10.1145","volume":"28","author":[{"given":"Sareeta","family":"Amrute","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Kamela","family":"Heyward-Rotimi","sequence":"additional","affiliation":[{"name":"Knowledge Exchange Research Group"}]}],"member":"320","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"UNCITRAL","author":"Ribadu N.","year":"2007","unstructured":"Ribadu , N. Cybercrime and National Fraud: A Nigerian Perspective . UNCITRAL , 2007 . Ribadu, N. Cybercrime and National Fraud: A Nigerian Perspective. UNCITRAL, 2007."},{"key":"e_1_2_1_2_1","volume-title":"Louisiana man charged in the Nigerian Prince scheme. New York Times","author":"Caron C.","year":"2017","unstructured":"Caron , C. Louisiana man charged in the Nigerian Prince scheme. New York Times . Dec. 31, 2017 ; https:\/\/www.nytimes.com\/2017\/12\/31\/us\/nigerian-prince-fraud.html Caron, C. Louisiana man charged in the Nigerian Prince scheme. New York Times. Dec. 31, 2017; https:\/\/www.nytimes.com\/2017\/12\/31\/us\/nigerian-prince-fraud.html"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00066"},{"key":"e_1_2_1_4_1","first-page":"12","volume":"14","author":"Aransiola J.O.","year":"2011","unstructured":"Aransiola , J.O. , and Asindemade , S.O. Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology Behavior and Social Networking 14 , 12 ( 2011 ). Aransiola, J.O., and Asindemade, S.O. Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology Behavior and Social Networking 14, 12 (2011).","journal-title":"Nigeria. Cyberpsychology Behavior and Social Networking"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2019.1603527"}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470480","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:26Z","timestamp":1750188626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470480"}},"subtitle":["part 1"],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":5,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10.1145\/3470480"],"URL":"https:\/\/doi.org\/10.1145\/3470480","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"type":"print","value":"1072-5520"},{"type":"electronic","value":"1558-3449"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"2021-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}