{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T06:34:08Z","timestamp":1723098848047},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11948-015-9691-8","type":"journal-article","created":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T08:50:57Z","timestamp":1440838257000},"page":"853-870","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Surveillance, Self and Smartphones: Tracking Practices in the Nightlife"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0630-3160","authenticated-orcid":false,"given":"Tjerk","family":"Timan","sequence":"first","affiliation":[]},{"given":"Anders","family":"Albrechtslund","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"9691_CR2","doi-asserted-by":"crossref","unstructured":"Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3).","DOI":"10.5210\/fm.v13i3.2142"},{"key":"9691_CR3","unstructured":"Albrechtslund, A., & Dubbeld, L. (2005). The plays and arts of surveillance: Studying surveillance as entertainment. Surveillance & Society, 3(2\/3)."},{"key":"9691_CR4","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.geoforum.2013.04.016","volume":"49","author":"A Albrechtslund","year":"2013","unstructured":"Albrechtslund, A., & Lauritsen, P. (2013). Spaces of everyday surveillance: Unfolding an analytical concept of participation. Geoforum, 49, 310\u2013316.","journal-title":"Geoforum"},{"key":"9691_CR7","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1177\/1350508405048578","volume":"12","author":"K Ball","year":"2005","unstructured":"Ball, K. (2005). Organization surveillance and the body: Towards a politics of resistance. Organization, 12, 89\u2013108.","journal-title":"Organization"},{"issue":"2","key":"9691_CR10","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/030851400360505","volume":"29","author":"R Boyne","year":"2000","unstructured":"Boyne, R. (2000). Post-panopticism. Economy and Society, 29(2), 285\u2013307.","journal-title":"Economy and Society"},{"key":"9691_CR11","volume-title":"Mobile communication and society. A global perspective","author":"M Castells","year":"2007","unstructured":"Castells, M., Fern\u00e1ndez-Ard\u00e8vol, M., Qiu, J. L., & Sey, A. (2007). Mobile communication and society. A global perspective. Cambridge, MA: MIT Press."},{"key":"9691_CR15","volume-title":"Discipline and punish: The birth of the prison","author":"M Foucault","year":"1977","unstructured":"Foucault, M. (1977). Discipline and punish: The birth of the prison. New York: Pantheon."},{"key":"9691_CR16","volume-title":"Technologies of the self: A seminar with Michel Foucault","author":"M Foucault","year":"1988","unstructured":"Foucault, M. (1988). Technologies of the self: A seminar with Michel Foucault. Amherst: University of Massachusetts Press."},{"issue":"3","key":"9691_CR100","doi-asserted-by":"crossref","first-page":"288","DOI":"10.24908\/ss.v8i3.4165","volume":"8","author":"C Fuchs","year":"2010","unstructured":"Fuchs, C. (2010). Web 2.0, prosumption, and surveillance. Surveillance & Society, 8(3), 288\u2013309.","journal-title":"Surveillance & Society"},{"issue":"4","key":"9691_CR101","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1080\/01972240290075129","volume":"18","author":"N Green","year":"2002","unstructured":"Green, N. (2002). On the move: Technology, mobility, and the mediation of social time and space. The information society, 18(4), 281\u2013292.","journal-title":"The information society"},{"key":"9691_CR17","unstructured":"Green, N. (2006). The information society: An International Journal On the Move: Technology, mobility, and the mediation of social time and space, (September 2012), 37\u201341."},{"issue":"4","key":"9691_CR18","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00071310020015280","volume":"51","author":"KD Haggerty","year":"2000","unstructured":"Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605\u2013622. doi: 10.1080\/00071310020015280 .","journal-title":"British Journal of Sociology"},{"issue":"4","key":"9691_CR19","doi-asserted-by":"crossref","first-page":"471","DOI":"10.24908\/ss.v8i4.4183","volume":"8","author":"KS Helgesson","year":"2011","unstructured":"Helgesson, K. S. (2011). Public-private partners against crime: Governance, surveillance and the limits of corporate accountability. Surveillance & Society, 8(4), 471\u2013484.","journal-title":"Surveillance & Society"},{"issue":"2","key":"9691_CR20","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1057\/palgrave.sj.8350089","volume":"23","author":"L Hinds","year":"2010","unstructured":"Hinds, L., & Grabosky, P. (2010). Responsibilisation revisited: From concept to attribution in crime control. Security Journal, 23(2), 95\u2013113.","journal-title":"Security Journal"},{"issue":"6","key":"9691_CR21","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1177\/0162243907303598","volume":"32","author":"C Hine","year":"2007","unstructured":"Hine, C. (2007). Multi-sited ethnography as a middle range methodology for contemporary STS. Science, Technology & Human Values, 32(6), 652\u2013671. doi: 10.1177\/0162243907303598 .","journal-title":"Science, Technology & Human Values"},{"issue":"1","key":"9691_CR22","first-page":"78","volume":"3","author":"A Hofheinz","year":"2005","unstructured":"Hofheinz, A. (2005). The internet in the Arab world: Playground for political liberalization. International Politics and Society, 3(1), 78\u201396.","journal-title":"International Politics and Society"},{"issue":"2\/3","key":"9691_CR23","first-page":"199","volume":"2","author":"H Koskela","year":"2004","unstructured":"Koskela, H. (2004). Webcams, TV shows and mobile phones: Empowering exhibitionism. Surveillance & Society, 2(2\/3), 199\u2013215.","journal-title":"Surveillance & Society"},{"issue":"1","key":"9691_CR24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1177\/1741659010369957","volume":"7","author":"H Koskela","year":"2011","unstructured":"Koskela, H. (2011). \u2018Don\u2019t mess with Texas!\u2019Texas Virtual Border Watch Program and the (botched) politics of responsibilization. Crime, Media, Culture, 7(1), 49\u201365.","journal-title":"Crime, Media, Culture"},{"issue":"2","key":"9691_CR1","doi-asserted-by":"crossref","first-page":"273","DOI":"10.24908\/ss.v12i2.4605","volume":"12","author":"FR Klauser","year":"2014","unstructured":"Klauser, F.R. & Albrechtslund, A. (2014). From self-tracking to smart urban infrastructures: towards an interdisciplinary research agenda on Big Data. Surveillance & Society, 12(2): 273-286.","journal-title":"Surveillance & Society"},{"key":"9691_CR25","unstructured":"Latour, B. (2005). Reassembling the social-an introduction to actor-network-theory (pp. 316). Oxford University Press."},{"key":"9691_CR26","volume-title":"Perpetual contact: Mobile communication, private talk, public performance","author":"R Ling","year":"2002","unstructured":"Ling, R., & Yttri, B. (2002). Hyper-coordination via mobile phones in Norway. In J. E. Katz & M. A. Aakhus (Eds.), Perpetual contact: Mobile communication, private talk, public performance. Cambridge: Cambridge University Press."},{"key":"9691_CR27","volume-title":"Surveillance society. Issues in society","author":"D Lyon","year":"2001","unstructured":"Lyon, D. (2001). Surveillance society. Issues in society. Buckingham: Open University."},{"issue":"3","key":"9691_CR28","doi-asserted-by":"crossref","first-page":"331","DOI":"10.24908\/ss.v1i3.3344","volume":"1","author":"S Mann","year":"2002","unstructured":"Mann, S., Nolan, J., & Wellman, B. (2002). Sousveillance: Inventing and using wearable computing devices as data collection in surveillance environments. Surveillance & Society, 1(3), 331\u2013355.","journal-title":"Surveillance & Society"},{"key":"9691_CR103","doi-asserted-by":"crossref","unstructured":"Miller, A. D., & Edwards, W. K. (2007). Give and take: a study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 347\u2013356). ACM.","DOI":"10.1145\/1240624.1240682"},{"issue":"3","key":"9691_CR29","first-page":"347","volume":"39","author":"L Mostmans","year":"2014","unstructured":"Mostmans, L., Bauwens, J., & Pierson, J. (2014). \u201cI would never post that\u201d: Children, moral sensitivity and online disclosure. Communications. European Journal of Communication Research, 39(3), 347\u2013367.","journal-title":"Communications. European Journal of Communication Research"},{"key":"9691_CR30","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press."},{"key":"9691_CR32","volume-title":"A networked self: Identity, community and culture on social network sites","author":"Z Papacharissi","year":"2011","unstructured":"Papacharissi, Z. (2011). A networked self: Identity, community and culture on social network sites. London: Taylor & Francis."},{"key":"9691_CR104","volume-title":"The mode of information","author":"M Poster","year":"1990","unstructured":"Poster, M. (1990). The mode of information. Chicago: University of Chicago Press."},{"issue":"4","key":"9691_CR33","doi-asserted-by":"crossref","first-page":"441","DOI":"10.24908\/ss.v8i4.4181","volume":"8","author":"J Taekke","year":"2011","unstructured":"Taekke, J. (2011). Digital panopticism and organizational power. Surveillance & Society, 8(4), 441\u2013454.","journal-title":"Surveillance & Society"},{"issue":"2","key":"9691_CR105","doi-asserted-by":"crossref","first-page":"167","DOI":"10.24908\/ss.v10i2.4440","volume":"10","author":"T Timan","year":"2012","unstructured":"Timan, T., & Oudshoorn, N. (2012). Mobile cameras as new technologies of surveillance? How citizens experience the use of mobile cameras in public nightscapes. Surveillance & Society, 10(2), 167\u2013181.","journal-title":"Surveillance & Society"},{"key":"9691_CR34","unstructured":"van House, N. A., & Davis, M. (2005). The social life of cameraphone images. In Proceedings of the Pervasive Image Capture and Sharing: New Social Practices and Implications for Technology Workshop (PICS 2005) at the Seventh International Conference on Ubiquitous Computing (UbiComp 2005)."},{"key":"9691_CR35","unstructured":"van Liempt, I., & van Aalst, I. (2012). Urban surveillance and the struggle between safe and exciting nightlife districts. Surveillance & Society 9(3), 280\u2013292. http:\/\/www.surveillance-and-society.org | ISSN: 1477-7487."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-015-9691-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-015-9691-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-015-9691-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-015-9691-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T00:19:27Z","timestamp":1567124367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-015-9691-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9691"],"URL":"https:\/\/doi.org\/10.1007\/s11948-015-9691-8","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,30]]}}}