{"id":"https://openalex.org/W7154335016","doi":"https://doi.org/10.1145/3773699.3774365","title":"Espionage and Dataveillance Technologies: Perspectives on Sound Surveillance in Surveillance Art Practices","display_name":"Espionage and Dataveillance Technologies: Perspectives on Sound Surveillance in Surveillance Art Practices","publication_year":2025,"publication_date":"2025-11-26","ids":{"openalex":"https://openalex.org/W7154335016","doi":"https://doi.org/10.1145/3773699.3774365"},"language":null,"primary_location":{"id":"doi:10.1145/3773699.3774365","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3773699.3774365","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 12th International Conference on Digital and Interactive Arts: Media Art Cultures, Communities &amp; Territories","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3773699.3774365","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010989893","display_name":"Lorena Ferreira Alves","orcid":"https://orcid.org/0000-0002-2890-201X"},"institutions":[{"id":"https://openalex.org/I135458274","display_name":"Citigroup","ror":"https://ror.org/032xgdx47","country_code":"US","type":"other","lineage":["https://openalex.org/I135458274"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lorena Ferreira Alves","raw_affiliation_strings":["CITAR - Research Center for Science and Technology of the Arts, Porto, Portugal"],"raw_orcid":"https://orcid.org/0000-0002-2890-201X","affiliations":[{"raw_affiliation_string":"CITAR - Research Center for Science and Technology of the Arts, Porto, Portugal","institution_ids":["https://openalex.org/I135458274"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5010989893"],"corresponding_institution_ids":["https://openalex.org/I135458274"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8043294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13380","display_name":"Sound Studies and Aurality","score":0.19830000400543213,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13380","display_name":"Sound Studies and Aurality","score":0.19830000400543213,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13308","display_name":"Cybernetics and Technology in Society","score":0.08479999750852585,"subfield":{"id":"https://openalex.org/subfields/1207","display_name":"History and Philosophy of Science"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.08370000123977661,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/panopticon","display_name":"Panopticon","score":0.4375},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.39640000462532043},{"id":"https://openalex.org/keywords/sound","display_name":"Sound (geography)","score":0.39419999718666077},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.3806999921798706},{"id":"https://openalex.org/keywords/situated","display_name":"Situated","score":0.3776000142097473},{"id":"https://openalex.org/keywords/espionage","display_name":"Espionage","score":0.3752000033855438},{"id":"https://openalex.org/keywords/electronic-surveillance","display_name":"Electronic surveillance","score":0.34310001134872437},{"id":"https://openalex.org/keywords/cyberculture","display_name":"Cyberculture","score":0.3352999985218048}],"concepts":[{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.4878000020980835},{"id":"https://openalex.org/C138569888","wikidata":"https://www.wikidata.org/wiki/Q828310","display_name":"Panopticon","level":3,"score":0.4375},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.39640000462532043},{"id":"https://openalex.org/C203718221","wikidata":"https://www.wikidata.org/wiki/Q491713","display_name":"Sound (geography)","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3840000033378601},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.3806999921798706},{"id":"https://openalex.org/C132829578","wikidata":"https://www.wikidata.org/wiki/Q581151","display_name":"Situated","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C558872910","wikidata":"https://www.wikidata.org/wiki/Q165950","display_name":"Espionage","level":2,"score":0.3752000033855438},{"id":"https://openalex.org/C2909731529","wikidata":"https://www.wikidata.org/wiki/Q334401","display_name":"Electronic surveillance","level":2,"score":0.34310001134872437},{"id":"https://openalex.org/C29595303","wikidata":"https://www.wikidata.org/wiki/Q165650","display_name":"Media studies","level":1,"score":0.33550000190734863},{"id":"https://openalex.org/C162695957","wikidata":"https://www.wikidata.org/wiki/Q863590","display_name":"Cyberculture","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C2779018934","wikidata":"https://www.wikidata.org/wiki/Q1129653","display_name":"Everyday life","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C2993458768","wikidata":"https://www.wikidata.org/wiki/Q3477549","display_name":"Special section","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3264000117778778},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3244999945163727},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.29670000076293945},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.289000004529953},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.28850001096725464},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.28349998593330383},{"id":"https://openalex.org/C2776327626","wikidata":"https://www.wikidata.org/wiki/Q3627138","display_name":"Performativity","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C2776552730","wikidata":"https://www.wikidata.org/wiki/Q189656","display_name":"Disinformation","level":3,"score":0.2653000056743622},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3773699.3774365","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3773699.3774365","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 12th International Conference on Digital and Interactive Arts: Media Art Cultures, Communities &amp; Territories","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3773699.3774365","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3773699.3774365","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 12th International Conference on Digital and Interactive Arts: Media Art Cultures, Communities &amp; Territories","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.771263837814331,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2018881137","https://openalex.org/W2147450516","https://openalex.org/W2346614589","https://openalex.org/W4214583137","https://openalex.org/W4389087129"],"related_works":[],"abstract_inverted_index":{"This":[0],"article":[1,171],"explores":[2],"the":[3,15,44,58,76,125,139,158,186,196,200,211],"relationship":[4],"between":[5],"art":[6],"and":[7,20,42,64,67,81,98,120,130,148,151,167,181,205,219],"surveillance":[8,19,34,79,89,106,142,175,190,218],"technologies,":[9],"with":[10,27,179],"a":[11,36,108],"particular":[12],"focus":[13],"on":[14],"sonic":[16,161],"dimension":[17],"of":[18,33,38,61,78,127,141,160,188,203,213,217],"its":[21],"intrinsic":[22],"connection":[23],"to":[24,30,113,185],"espionage.":[25],"Beginning":[26],"an":[28],"introduction":[29],"Foucault's":[31],"conception":[32],"as":[35,107,145],"mechanism":[37],"control":[39],"over":[40],"bodies":[41],"behaviors,":[43],"paper":[45,197],"argues":[46],"that,":[47],"in":[48,183],"contemporary":[49],"society,":[50],"this":[51],"practice":[52],"has":[53],"become":[54],"increasingly":[55],"sophisticated":[56],"through":[57,121],"voluntary":[59],"collection":[60],"digital":[62],"data":[63],"what":[65],"Rouvroy":[66],"Berns":[68],"term":[69],"\u201calgorithmic":[70],"governmentality.\u201d":[71],"The":[72,101,170],"second":[73],"section":[74,103],"discusses":[75],"development":[77],"technologies":[80],"their":[82],"social":[83],"impacts,":[84],"illustrated":[85],"by":[86,93,164,192],"examples":[87],"from":[88],"art,":[90,143],"including":[91],"works":[92],"Bruce":[94],"Nauman,":[95],"Jill":[96],"Magid,":[97],"Marie":[99],"Sester.":[100],"third":[102],"addresses":[104],"sound":[105,174],"less":[109],"explored":[110],"domain":[111],"compared":[112],"visual":[114,189],"surveillance,":[115],"analyzing":[116],"it":[117],"both":[118],"theoretically":[119],"artistic":[122],"practices.":[123],"Here,":[124],"studies":[126],"Dimitrios":[128],"Pavlounis":[129],"Audrey":[131],"Amsellem":[132],"are":[133],"highlighted,":[134],"alongside":[135],"artworks":[136],"situated":[137],"within":[138],"concept":[140],"such":[144],"Roslyn":[146],"Orlando's":[147],"Kyle":[149],"McDonald":[150],"Brian":[152],"House's":[153],"artworks,":[154],"which":[155],"critically":[156],"examine":[157],"vulnerability":[159],"privacy":[162],"perpetuated":[163],"major":[165],"technology":[166],"communication":[168],"companies.":[169],"contends":[172],"that":[173,199],"remains":[176],"strongly":[177],"associated":[178],"espionage":[180],"illegality,":[182],"contrast":[184],"normalization":[187],"propagated":[191],"CCTV":[193],"systems.":[194],"Finally,":[195],"cautions":[198],"increasing":[201],"integration":[202],"AI":[204],"automation":[206],"into":[207],"everyday":[208],"life":[209],"entails":[210],"acceptance":[212],"more":[214],"invasive":[215],"forms":[216],"bodily":[220],"control.":[221]},"counts_by_year":[],"updated_date":"2026-04-15T06:04:33.058270","created_date":"2026-04-15T00:00:00"}
