{"id":"https://openalex.org/W2024588145","doi":"https://doi.org/10.1145/276755.276761","title":"Cryptography, data retention, and the panopticon society (abstract)","display_name":"Cryptography, data retention, and the panopticon society (abstract)","publication_year":1998,"publication_date":"1998-06-01","ids":{"openalex":"https://openalex.org/W2024588145","doi":"https://doi.org/10.1145/276755.276761","mag":"2024588145"},"language":"en","primary_location":{"id":"doi:10.1145/276755.276761","is_oa":true,"landing_page_url":"https://doi.org/10.1145/276755.276761","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/276755.276761","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ethics and social impact component on Shaping policy in the information age","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/276755.276761","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010419709","display_name":"Jean\u2010Fran\u00e7ois Blanchette","orcid":"https://orcid.org/0000-0002-2397-4401"},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jean-Fran\u00e7ois Blanchette","raw_affiliation_strings":["Rensselaer Polytechnic Institute"],"affiliations":[{"raw_affiliation_string":"Rensselaer Polytechnic Institute","institution_ids":["https://openalex.org/I165799507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109418341","display_name":"Deborah G. Johnson","orcid":null},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deborah G. Johnson","raw_affiliation_strings":["Rensselaer Polytechnic Institute"],"affiliations":[{"raw_affiliation_string":"Rensselaer Polytechnic Institute","institution_ids":["https://openalex.org/I165799507"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010419709"],"corresponding_institution_ids":["https://openalex.org/I165799507"],"apc_list":null,"apc_paid":null,"fwci":1.0451,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82181183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.2401999980211258,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.2401999980211258,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/panopticon","display_name":"Panopticon","score":0.9642927646636963},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6281448006629944},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6152639389038086},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47759175300598145},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3213549852371216},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13230594992637634},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12094667553901672},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.08164152503013611}],"concepts":[{"id":"https://openalex.org/C138569888","wikidata":"https://www.wikidata.org/wiki/Q828310","display_name":"Panopticon","level":3,"score":0.9642927646636963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6281448006629944},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6152639389038086},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47759175300598145},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3213549852371216},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13230594992637634},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12094667553901672},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.08164152503013611}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/276755.276761","is_oa":true,"landing_page_url":"https://doi.org/10.1145/276755.276761","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/276755.276761","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ethics and social impact component on Shaping policy in the information age","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/276755.276761","is_oa":true,"landing_page_url":"https://doi.org/10.1145/276755.276761","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/276755.276761","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ethics and social impact component on Shaping policy in the information age","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2024588145.pdf","grobid_xml":"https://content.openalex.org/works/W2024588145.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2921107741","https://openalex.org/W2197002326","https://openalex.org/W4233922521","https://openalex.org/W3204968380","https://openalex.org/W1710116222","https://openalex.org/W2800383628","https://openalex.org/W2494728058","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"As":[0],"we":[1,16,135,150,180],"move":[2,151],"our":[3,153],"social":[4],"institutions":[5],"from":[6],"paper":[7],"and":[8,58,171],"ink":[9],"based":[10],"operations":[11],"to":[12,47,109],"the":[13,30,48,67,70,83,100,103,106,117,120,138,165],"electronic":[14,139],"medium,":[15],"invisibly":[17],"create":[18],"a":[19,24,96,184],"type":[20],"of":[21,73,105,119,147],"surveillance":[22,32,55,74],"society,":[23],"panopticon":[25,81],"society.":[26],"It":[27,65],"is":[28,53,82,114,142],"not":[29],"traditional":[31],"society":[33],"in":[34,89,95,116,131],"which":[35,90],"government":[36],"officials":[37],"follow":[38],"citizens":[39],"around":[40],"because":[41],"they":[42],"are":[43,93,181],"concerned":[44],"about":[45,145],"threats":[46],"political":[49],"order.":[50],"Instead":[51],"it":[52,63],"piecemeal":[54],"by":[56,87],"public":[57],"private":[59],"organizations.":[60],"Piecemeal":[61],"though":[62],"is,":[64],"creates":[66],"potential":[68],"for":[69],"old":[71],"kind":[72],"on":[75,130,164,173],"an":[76],"even":[77],"grander":[78],"scale.":[79],"The":[80,111],"prison":[84,91],"environment":[85],"described":[86],"Foucault":[88],"cells":[92],"arranged":[94],"large":[97],"circle":[98,107,121],"with":[99],"side":[101],"facing":[102],"inside":[104],"open":[108],"view.":[110],"guard":[112],"tower":[113],"placed":[115],"middle":[118],"so":[122,172],"that":[123,128,141,179],"guards":[124],"can":[125],"see":[126],"everything":[127],"goes":[129],"every":[132],"cell.":[133],"When":[134],"contemplate":[136],"all":[137],"data":[140],"now":[143],"gathered":[144],"each":[146],"us":[148],"as":[149],"through":[152],"everyday":[154],"lives":[155],"---":[156,174],"intelligent":[157],"highway":[158],"systems,":[159],"consumer":[160],"transactions,":[161],"traffic":[162],"patterns":[163],"internet,":[166],"medical":[167],"records,":[168,170],"financial":[169],"there":[175],"seems":[176],"little":[177],"doubt":[178],"moving":[182],"into":[183],"panopticon.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
