{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T10:04:41Z","timestamp":1776247481207,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","funder":[{"name":"FCT - Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["CEECINST\/00070\/2021\/CP1778\/CT00013"],"award-info":[{"award-number":["CEECINST\/00070\/2021\/CP1778\/CT00013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,26]]},"DOI":"10.1145\/3773699.3774365","type":"proceedings-article","created":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T05:05:31Z","timestamp":1776143131000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Espionage and Dataveillance Technologies: Perspectives on Sound Surveillance in Surveillance Art Practices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2890-201X","authenticated-orcid":false,"given":"Lorena","family":"Ferreira Alves","sequence":"first","affiliation":[{"name":"CITAR - Research Center for Science and Technology of the Arts, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"The History of Sexuality, Volume I: An Introduction","author":"Foucault Michel","unstructured":"Michel Foucault. 1978. The History of Sexuality, Volume I: An Introduction. Pantheon Books, New York."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.29146\/eco-pos.v18i2.2662"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v3i2\/3.3501"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/20551940.2023.2286769"},{"key":"e_1_3_3_1_5_2","unstructured":"Dimitrios Pavlounis. 2016. Sound Evidence: An Archaeology of Audio Recording and Surveillance in Popular Film and Media. PhD dissertation. Screen Arts and Cultures University of Michigan Ann Arbor."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v7i2.4142"},{"key":"e_1_3_3_1_7_2","unstructured":"Michel Foucault. 1999. Vigiar e Punir: nascimento da pris\u00e3o. (20a ed.). Vozes Rio de Janeiro."},{"key":"e_1_3_3_1_8_2","unstructured":"Zygmunt Bauman and David Lyon. 2014. Vigil\u00e2ncia l\u00edquida: Di\u00e1logos com David Lyon. Zahar Rio de Janeiro."},{"key":"e_1_3_3_1_9_2","volume-title":"The Surveillance Society: The Threat of 1984-Style Techniques. The Futurist (July","author":"Marx Gary T.","year":"1985","unstructured":"Gary T. Marx. 1985. The Surveillance Society: The Threat of 1984-Style Techniques. The Futurist (July 1985), 21\u201326. https:\/\/web.mit.edu\/gtmarx\/www\/futurist_surv_soc.pdf"},{"key":"e_1_3_3_1_10_2","volume-title":"Levin, Thomas Y","author":"Zbikowski D\u00f6rte","unstructured":"D\u00f6rte Zbikowski. 2002. Bruce Nauman. In Levin, Thomas Y; Frohne, Ursula; Weibel, Peter (eds.). CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big Brother. MIT Press, Cambridge, MA."},{"key":"e_1_3_3_1_11_2","unstructured":"Jill Magid. 2002. System Azure Security Ornamentation. https:\/\/www.jillmagid.com\/projects\/system-azure- security-ornamentation"},{"key":"e_1_3_3_1_12_2","unstructured":"Heather Dewey-Hagborg. 2013. Stranger Visions. https:\/\/deweyhagborg.com\/projects\/stranger-visions"},{"key":"e_1_3_3_1_13_2","unstructured":"Trevor Paglen and Kate Crawford. 2019. Training Humans [Exhibition]. Fondazione Prada. https:\/\/www.fondazioneprada.org\/project\/training-humans\/?lang=en"},{"key":"e_1_3_3_1_14_2","volume-title":"CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big Brother","author":"Levin Thomas Y","unstructured":"Thomas Y Levin, Ursula Frohne, and Peter Weibel (Eds.). CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big Brother. MIT Press, Cambridge, MA."},{"key":"e_1_3_3_1_15_2","unstructured":"Paula Sibilia. 2005. El hombre postorg\u00e1nico: Cuerpo subjetividad y tecnolog\u00edas digitales. Fondo de Cultura Econ\u00f3mica Buenos Aires."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"},{"key":"e_1_3_3_1_17_2","unstructured":"Krzysztof Sliwinski. 2024. Artificial intelligence and international military conflicts \u2013 The case of war in Ukraine. World and New World Journal. https:\/\/worldnewworld.com\/page\/content.php?no=3970"},{"key":"e_1_3_3_1_18_2","unstructured":"Al Jazeera. 2023. The Gospel: Israel turns to a new AI system in the Gaza war. The Listening Post. December 9. https:\/\/www.aljazeera.com\/program\/the-listening-post\/2023\/12\/9\/the-gospel-israel-turns-to-a-new-ai-system-in-the-gaza-war"},{"key":"e_1_3_3_1_19_2","volume-title":"Retrieved","author":"Sester Marie","year":"2005","unstructured":"Marie Sester. 2005\u20132007. Threatbox.us. Retrieved June 28, 2025. https:\/\/sester.net\/threatbox-us\/"},{"key":"e_1_3_3_1_20_2","volume-title":"Their Origins & Applications","author":"Petersen Julie K.","unstructured":"Julie K. Petersen. 2001. Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications. CRC Press."},{"key":"e_1_3_3_1_21_2","unstructured":"Dimitrios Pavlounis. 2016. Sound Evidence: An Archaeology of Audio Recording and Surveillance in Popular Film and Media. PhD dissertation. Screen Arts and Cultures University of Michigan Ann Arbor."},{"key":"e_1_3_3_1_22_2","volume-title":"They've got it taped","author":"Campbell Duncan","year":"1988","unstructured":"Duncan Campbell. 1988. They've got it taped. New Statesman Society. Aug. 12. https:\/\/www.duncancampbell.org\/menu\/journalism\/newstatesman\/newstatesman-1988\/They've%20got%20it%20taped.pdf"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v3i2\/3.3501"},{"key":"e_1_3_3_1_24_2","volume-title":"Levin, Thomas Y","author":"Zbikowski D\u00f6rte","unstructured":"D\u00f6rte Zbikowski. 2002. The Listening Ear: Phenomena of Acoustic Surveillance. In Levin, Thomas Y; Frohne, Ursula; Weibel, Peter (eds.). CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big Brother. MIT Press, Cambridge, MA."},{"key":"e_1_3_3_1_25_2","volume-title":"Retrieved","author":"Orlando Roslyn","year":"2021","unstructured":"Roslyn Orlando. 2021. Evasion Score. Retrieved June 28, 2025 from https:\/\/firstdraft.org.au\/soft-power-pages\/evasion-score-roslyn-orlando"},{"key":"e_1_3_3_1_26_2","volume-title":"Wired. Retrieved","author":"Greenberg Andy","year":"2014","unstructured":"Andy Greenberg. 2014. An Eavesdropping Lamp That Livetweets Private Conversations. Wired. Retrieved June 28, 2025. https:\/\/www.wired.com\/2014\/04\/coversnitch-eavesdropping-lightbulb\/"}],"event":{"name":"ARTECH 2025: 12th International Conference on Digital and Interactive Arts: Media Art Cultures, Communities & Territories","location":"Braga Portugal","acronym":"ARTECH 2025"},"container-title":["Proceedings of the 2025 12th International Conference on Digital and Interactive Arts: Media Art Cultures, Communities &amp; Territories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773699.3774365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T09:04:56Z","timestamp":1776243896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773699.3774365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":26,"alternative-id":["10.1145\/3773699.3774365","10.1145\/3773699"],"URL":"https:\/\/doi.org\/10.1145\/3773699.3774365","relation":{},"subject":[],"published":{"date-parts":[[2025,11,26]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}