{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:53:34Z","timestamp":1744203214043,"version":"3.28.0"},"reference-count":114,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,12]]},"DOI":"10.1109\/istas50296.2020.9462205","type":"proceedings-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T22:31:27Z","timestamp":1624919487000},"page":"346-357","source":"Crossref","is-referenced-by-count":5,"title":["Understanding Surveillance Societies: Social Cognition and the Adoption of Surveillance Technologies"],"prefix":"10.1109","author":[{"given":"Jordan Richard","family":"Schoenherr","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Rise of Big Data Policing Surveillance Race and the Future of Law Enforcement","year":"2019","author":"ferguson","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1177\/1098611113497042"},{"key":"ref33","first-page":"208","article-title":"Internet of Things– some ethical issues","volume":"13","author":"popescul","year":"2014","journal-title":"The USV Annals of Economics and Public Administration"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2189204"},{"journal-title":"The Guardian","article-title":"Lancaster University Students Data Stolen in Cyber Attack","year":"2019","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30137-0"},{"key":"ref36","article-title":"Health Tech’s big moment squandered","author":"tahir","year":"2020","journal-title":"Politico"},{"article-title":"Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret","year":"2018","author":"valentino-devries","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"ref28","article-title":"Comprehensive Learner Record","author":"consortium","year":"2020","journal-title":"IMS Global\/IMS"},{"article-title":"Recommended Practice for Integrated Learner Record (ILR)","year":"2020","author":"committee","key":"ref27"},{"journal-title":"BBC News","article-title":"University of York students targeted in data hack","year":"2019","key":"ref29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/2667052"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0146167204264004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.4.797"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29053-5_3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138862"},{"journal-title":"Structures of social life The four elementary forms of human relations Communal sharing authority ranking equality matching market pricing","year":"1991","author":"fiske","key":"ref101"},{"article-title":"Can They Do That? Retaking Our Fundamental Rights in the Workplace","year":"2009","author":"maltby","key":"ref26"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1027\/1864-9335\/a000180"},{"key":"ref25","first-page":"345","article-title":"Affront to Human Dignity: Electronic Mail Monitoring in the Private Sector Workplace","volume":"8","author":"gantt","year":"1994","journal-title":"Harvard Journal of Law and Technology"},{"journal-title":"China bars millions from travel for ‘social credit’ offenses","year":"2019","author":"mcdonald","key":"ref50"},{"key":"ref51","article-title":"How the West Got China’s Social Credit System Wrong","author":"matsakis","year":"2019","journal-title":"Wired"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.7591\/9781501722134"},{"key":"ref58","article-title":"Health Information Seeking Behaviour, Risk Communication, and Mobility During COVID-19","author":"schoenherr","year":"2020","journal-title":"Proceedings of the IEEE International Symposium on Technology and Society 2020 IEEE Society on Social Implications of Technology"},{"key":"ref57","article-title":"Security lapse exposed a Chinese smart city surveillance system","author":"whittaker","year":"2019","journal-title":"Tech Crunch"},{"key":"ref56","article-title":"Facebook, Google discuss sharing smartphone data with government to fight coronavirus, but there are risks","author":"sheng","year":"2020","journal-title":"CNBC"},{"key":"ref55","article-title":"Toronto is gathering cellphone location data from telecoms to find out where people are still congregating amid coronavirus shutdown: Tory","author":"hemmadi","year":"2020","journal-title":"The Financial Post"},{"journal-title":"U S News","article-title":"European Mobile Operators Share Data for Coronavirus Fight","year":"2020","key":"ref54"},{"key":"ref53","article-title":"EU privacy rules no obstacle to coronavirus fight; smartphone tracking a no-no","author":"busvine","year":"2020","journal-title":"Reuters"},{"key":"ref52","article-title":"China’s Orwellian Social Credit Score Isn’t Real","author":"horseley","year":"2016","journal-title":"Foreign Policy"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842265"},{"journal-title":"Pew Research Center","article-title":"Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information","year":"2019","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1177\/0268580904042897","article-title":"Globalizing surveillance: Comparative and sociological perspectives","volume":"19","author":"l d","year":"2004","journal-title":"International Sociology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205.005"},{"journal-title":"The Identity Trade Selling Privacy and Reputation Online","year":"2019","author":"draper","key":"ref5"},{"key":"ref8","article-title":"China’s Golden Shield: corporations and the development of surveillance technology in the People’s Republic of China","author":"walton","year":"2001","journal-title":"International Centre for Human Rights"},{"key":"ref49","article-title":"The odd reality of life under China’s social rating system","author":"rollet","year":"2018","journal-title":"Wired"},{"key":"ref7","first-page":"94","article-title":"Is there a cost to privacy breaches? An event study","author":"acquisti","year":"2006","journal-title":"ICIS 2006 PProceedings"},{"key":"ref9","first-page":"154","article-title":"A taxonomy of privacy","volume":"477 560","author":"solove","year":"2005","journal-title":"University of Pennsylvania Law Review"},{"key":"ref46","article-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"zuboff","year":"2019","journal-title":"Profile Books"},{"journal-title":"Protecting Privacy in Surveillance Societies","year":"1989","author":"flaherty","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1177\/0268580904042900"},{"key":"ref47","article-title":"Companies scramble for consumer data","author":"steel","year":"2013","journal-title":"Financial Times"},{"key":"ref42","first-page":"55","article-title":"Big data and due process: toward a framework to redress predictive privacy harms","volume":"93 128","author":"crawford","year":"2014","journal-title":"Boston College Law Review"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0115"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.005"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205.004"},{"journal-title":"Privacy International","article-title":"The 2007 International Privacy Ranking","year":"2017","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2016.03.003"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.5195\/TLP.2013.123"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2389.00246"},{"key":"ref77","first-page":"591","article-title":"Factors Influencing on Awareness about Degree of Privacy Invasion and Possibility of Occur to Oneself in Korean Society","volume":"8","author":"kim","year":"2018","journal-title":"Asia-pacific Journal of Multimedia Services Convergent with Art Humanities and Sociology"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.91"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/0022022101032003002"},{"key":"ref78","first-page":"1","article-title":"Differences in online porivacy and security attitudes based on economic living standards: a global study of 24 countries","author":"rho","year":"2018","journal-title":"Twenty-Sixth European Conference on Information Systems (ECIS2018)"},{"key":"ref79","doi-asserted-by":"crossref","DOI":"10.4135\/9781529681451","author":"fiske","year":"2013","journal-title":"Social cognition From brains to culture Sage"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.1.35.12567"},{"journal-title":"Legislating Privacy Technology Social Values and Public Policy","year":"1995","author":"regan","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1038\/466029a"},{"key":"ref64","article-title":"The Geography of Thought: How Asians and Westerners Think Differently... and Why","author":"nisbett","year":"2004","journal-title":"Simon & Schuster"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1006\/jevp.1998.0103"},{"key":"ref66","first-page":"113","article-title":"The two western cultures of privacy: Dignity versus liberty","volume":"113","author":"whitman","year":"2003","journal-title":"The Yale Law Journal"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488037"},{"journal-title":"Privacy Studies in Social and Cultural History Studies in Social and Cultural History","year":"2017","author":"moore","key":"ref68"},{"key":"ref2","article-title":"The Global Expansion of AI Surveillance","author":"feldstein","year":"2019","journal-title":"Carnegie Endowment for International Peace"},{"key":"ref69","first-page":"2087","article-title":"Three concepts of privacy","volume":"89","author":"post","year":"2011","journal-title":"Georgetown Law Journal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1068\/d378t"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1515\/9780824857189"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.69.5.812"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1515\/9780824861834"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0501_4"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.4324\/9780429501142"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420220202"},{"key":"ref106","article-title":"American Nations: A History of the Eleven Rival Regional Cultures of North America","author":"woodard","year":"2011","journal-title":"Penguin"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1037\/h0028284"},{"article-title":"Across Cultural Divides: The Value of a Superordinate Identity, Russell Sage Foundation","year":"1999","author":"gaertner","key":"ref105"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1111\/j.1548-1433.2011.01369.x"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1037\/a0015141"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0022656"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1126\/science.1137651","article-title":"The new synthesis in moral psychology","volume":"316","author":"h j","year":"2007","journal-title":"Science"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.99.4.689"},{"journal-title":"The Anatomy of Dependence","year":"1981","author":"doi","key":"ref111"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1093\/0199262055.001.0001"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1126\/science.1246850"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2006.01793.x"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1037\/h0062326"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1093\/scan\/nsq011"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.110465"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"20160115","DOI":"10.1098\/rsta.2016.0115","article-title":"The ethics of smart cities and urban science","volume":"374","author":"r","year":"2016","journal-title":"Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/00236561003654776"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/00236561003654776"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00380360"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1993.tb01101.x"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00036104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.36.8.816"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2007.01983.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1037\/h0025902"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11692-015-9320-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1207\/S15324834BASP2401_6"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.72.1.143"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/BF03180447"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1126\/science.1197754"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1177\/1368430205056464","article-title":"Group size and conformity","volume":"8","author":"r","year":"2005","journal-title":"Group Processes & Intergroup Relations"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.821"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.8.2.100"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/0047-2484(92)90081-J"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.8.2.111"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2012.0332"}],"event":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2020,11,12]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2020,11,15]]}},"container-title":["2020 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9462115\/9462166\/09462205.pdf?arnumber=9462205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T21:29:25Z","timestamp":1725312565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9462205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,12]]},"references-count":114,"URL":"https:\/\/doi.org\/10.1109\/istas50296.2020.9462205","relation":{},"subject":[],"published":{"date-parts":[[2020,11,12]]}}}