{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T12:42:40Z","timestamp":1708000960571},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Technol. Soc. Mag."],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/mts.2010.937030","type":"journal-article","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T18:45:41Z","timestamp":1276022741000},"page":"17-25","source":"Crossref","is-referenced-by-count":10,"title":["What is \u00dcberveillance? (And What Should Be Done About It?)"],"prefix":"10.1109","volume":"29","author":[{"given":"Roger","family":"Clarke","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"585","article-title":"A normative regulatory framework for computer matching","volume":"xiii","author":"clarke","year":"1995","journal-title":"Journal of Computer & Information Law"},{"key":"ref11","article-title":"Identified, anonymous and pseudonymous transactions: The spectrum of choice","author":"clarke","year":"1999","journal-title":"Proc User Identification & Privacy Protection Conf"},{"key":"ref12","article-title":"Why biometrics must be banned","author":"clarke","year":"2003","journal-title":"Cyberspace Law & Policy Centre Conf \"State Surveillance after September 11"},{"key":"ref13","article-title":"Human-artefact hybridisation and the digital persona","author":"clarke","year":"2005","journal-title":"Ars Electronica 2005 Symp Hybrid - Living"},{"key":"ref14","author":"clarke","year":"2007","journal-title":"Computer Security Privacy and Politics Current Issues Challenges and Solutions"},{"key":"ref15","article-title":"Evaluation or justification? The application of cost\/benefit analysis to computer matching schemes","author":"clarke","year":"1997","journal-title":"Proc Euro Conf Info Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/08109020601029961"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.002"},{"key":"ref4","first-page":"77","article-title":"666 or 616 (Rev 13:18): Arguments for the authentic reading of the Seer\"s conundrum","volume":"19","author":"michael","year":"2000","journal-title":"Bull Biblical Studies"},{"key":"ref3","first-page":"79","article-title":"For it is the number of a man","volume":"19","author":"michael","year":"2000","journal-title":"Bull Biblical Studies"},{"key":"ref6","author":"michael","year":"2006","journal-title":"Consequences of innovation"},{"key":"ref5","author":"michael","year":"2003","journal-title":"The canonical adventure of the apocalypse of John in the early church (A D 96-A D 377)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/08109020601029912"},{"key":"ref2","author":"michael","year":"1998","journal-title":"The Number of the Beast 666 (Revelation 13 16-18) An historical and theological investigation of Saint John's conundrum"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2006.43"},{"key":"ref9","first-page":"29","article-title":"Computer matching by government agencies: The failure of cost\/benefit analysis as a control mechanism","volume":"4","author":"clarke","year":"1995","journal-title":"Information Infrastructure & Policy"},{"key":"ref8a","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"ref8b","year":"1991","journal-title":"Controversies in Computing"}],"container-title":["IEEE Technology and Society Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/44\/5475068\/05475107.pdf?arnumber=5475107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:07:15Z","timestamp":1642003635000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5475107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":18,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mts.2010.937030","relation":{},"ISSN":["0278-0097"],"issn-type":[{"value":"0278-0097","type":"print"}],"subject":[],"published":{"date-parts":[[2010]]}}}