<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2448-6442</journal-id>
<journal-title><![CDATA[Estudios sociológicos]]></journal-title>
<abbrev-journal-title><![CDATA[Estud. sociol]]></abbrev-journal-title>
<issn>2448-6442</issn>
<publisher>
<publisher-name><![CDATA[El Colegio de México A.C., Centro de Estudios Sociológicos]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2448-64422025000100106</article-id>
<article-id pub-id-type="doi">10.24201/es.2025v43.e2764</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Los teléfonos celulares y las prácticas de vigilancia en la pareja]]></article-title>
<article-title xml:lang="en"><![CDATA[Smartphones and Surveillance Practices in Couples]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Salazar]]></surname>
<given-names><![CDATA[Tania]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[Guadalajara ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<volume>43</volume>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2448-64422025000100106&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2448-64422025000100106&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2448-64422025000100106&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Se analizan prácticas de vigilancia interpersonal en parejas heterosexuales a través de teléfonos celulares, mediante un enfoque que combina tipos de vigilancia con metáforas de juego. Se encontraron diferencias en las narrativas sobre vigilar o ser vigilado y que estas prácticas están inmersas en interacciones de ocultamiento, búsqueda, persecución, aniquilamiento o colaboración. Se destaca la mayor prevalencia de la vigilancia de control y se perfila una tendencia de las mujeres hacia la vigilancia táctica, y de los hombres, hacia la vigilancia estratégica y a la autovigilancia. Asimismo, se observan actividades de vigilancia de cuidados que oscilan entre lo auténtico y lo ambiguo, así como formas de vigilancia participativa, que implican la intervención de terceros para constatar actos transgresivos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Interpersonal surveillance practices in heterosexual couples through smartphones in couples are analyzed with an approach that combines a surveillance typology with game metaphors. Differences were found in the narratives concerning surveillance and being surveilled, revealing that these practices are embedded in interactions of concealment, pursuit, persecution, annihilation, or collaboration. The greater prevalence of control surveillance is highlighted, and a tendency toward tactical surveillance among women and strategic surveillance and self-surveillance among men is outlined. Likewise, care surveillance activities are observed that range to the ambiguous, as well as participatory surveillance, which involves the participation of third parties to record transgressive acts.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[vigilancia social]]></kwd>
<kwd lng="es"><![CDATA[parejas]]></kwd>
<kwd lng="es"><![CDATA[teléfonos celulares inteligentes]]></kwd>
<kwd lng="es"><![CDATA[metáforas de juego]]></kwd>
<kwd lng="en"><![CDATA[social surveillance]]></kwd>
<kwd lng="en"><![CDATA[couples]]></kwd>
<kwd lng="en"><![CDATA[smartphones]]></kwd>
<kwd lng="en"><![CDATA[playful metaphors]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albrechtslund]]></surname>
<given-names><![CDATA[Anders]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online Social Networking as Participatory Surveillance]]></article-title>
<source><![CDATA[First Monday]]></source>
<year>2008</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Work of Watching One Another: Lateral Surveillance, Risk, and Governance]]></article-title>
<source><![CDATA[Surveillance &amp; Society]]></source>
<year>2002</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>479-97</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ubiquitous Computing and the Digital Enclosure Movement]]></article-title>
<source><![CDATA[Media International Australia]]></source>
<year>2007</year>
<volume>125</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>106-17</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
<name>
<surname><![CDATA[Davies]]></surname>
<given-names><![CDATA[Hugh]]></given-names>
</name>
<name>
<surname><![CDATA[DeSouza]]></surname>
<given-names><![CDATA[Ruth]]></given-names>
</name>
<name>
<surname><![CDATA[Hjorth]]></surname>
<given-names><![CDATA[Larissa]]></given-names>
</name>
<name>
<surname><![CDATA[Richardson]]></surname>
<given-names><![CDATA[Ingrid]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Situating &#8216;Careful Surveillance&#8217;]]></article-title>
<source><![CDATA[International Journal of Cultural Studies]]></source>
<year>2021</year>
<volume>24</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>567-83</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casado]]></surname>
<given-names><![CDATA[Elena]]></given-names>
</name>
<name>
<surname><![CDATA[Lasén]]></surname>
<given-names><![CDATA[Amparo]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Whatis Disturbing and Whynotto Disturb. On Mobile Phones, Gender, and Privacy within Heterosexual Intimacy]]></article-title>
<source><![CDATA[Mobile media &amp; Communication]]></source>
<year>2014</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>249-64</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[Candace]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotions and Micropolitics in Everyday Life: Some Patterns and Paradoxes of Place]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kemper]]></surname>
<given-names><![CDATA[Theodor D]]></given-names>
</name>
</person-group>
<source><![CDATA[Research Agendas in the Sociology of Emotions]]></source>
<year>1990</year>
<page-range>305-33</page-range><publisher-loc><![CDATA[Albany ]]></publisher-loc>
<publisher-name><![CDATA[State University of New York Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Certeau]]></surname>
<given-names><![CDATA[Michel]]></given-names>
</name>
</person-group>
<source><![CDATA[La invención de lo cotidiano I. Artes de hacer]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[Instituto Tecnológico y de Estudios Superiores de Occidente/ Universidad Iberoamericana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[Robert L]]></given-names>
</name>
<name>
<surname><![CDATA[Kelly]]></surname>
<given-names><![CDATA[Lynne]]></given-names>
</name>
<name>
<surname><![CDATA[Rotaru]]></surname>
<given-names><![CDATA[Teodora]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mobile Phones in Romantic Relationships and the Dialectic of Autonomy vs. Connection]]></article-title>
<source><![CDATA[Communication Quarterly]]></source>
<year>2011</year>
<volume>59</volume>
<page-range>19-36</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foucault]]></surname>
<given-names><![CDATA[Michel]]></given-names>
</name>
</person-group>
<source><![CDATA[Vigilar y castigar. El nacimiento de la prisión]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Siglo XXI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frampton]]></surname>
<given-names><![CDATA[Jessica]]></given-names>
</name>
<name>
<surname><![CDATA[Fox]]></surname>
<given-names><![CDATA[Jesse]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Media&#8217;s Role in Romantic partners&#8217; Retroactive Jealousy: Social Comparison, Uncertainty, and Information Seeking]]></article-title>
<source><![CDATA[Social Media + Society]]></source>
<year>2018</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[Marie-Carmen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Entre la familia y el amor: tensiones de género entre los amantes]]></article-title>
<source><![CDATA[Revista Española de Investigaciones Sociológicas]]></source>
<year>2021</year>
<volume>175</volume>
<page-range>47-62</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[Nicola]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Who&#8217;s Watching Whom? Monitoring and Accountability in Mobile Relations]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[Barry]]></given-names>
</name>
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[Nicola]]></given-names>
</name>
<name>
<surname><![CDATA[Harper]]></surname>
<given-names><![CDATA[Richard]]></given-names>
</name>
</person-group>
<source><![CDATA[Wireless World: Social and Interactional Aspects of the Mobile Age]]></source>
<year>2002</year>
<page-range>32-45</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harris]]></surname>
<given-names><![CDATA[Bridget A.]]></given-names>
</name>
<name>
<surname><![CDATA[Woodlock]]></surname>
<given-names><![CDATA[Delanie]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>2019</year>
<volume>59</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>530-50</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hasinoff]]></surname>
<given-names><![CDATA[Amy A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Where Are You? Location Tracking and the Promise of Child Safety]]></article-title>
<source><![CDATA[Television &amp; New Media]]></source>
<year>2017</year>
<volume>18</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>496-512</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Havard]]></surname>
<given-names><![CDATA[Tirion]]></given-names>
</name>
<name>
<surname><![CDATA[Lefevre]]></surname>
<given-names><![CDATA[Michelle]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beyond the Power and Control Wheel: How Abusive Men Manipulate Mobile Phone Technologies to Facilitate Coercive Control]]></article-title>
<source><![CDATA[Journal of Gender-Based Violence]]></source>
<year>2020</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>223-39</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haggerty]]></surname>
<given-names><![CDATA[Kevin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tear Down the Walls: On Demolishing the Panopticon]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[Theorizing Surveillance the Panopticon and Beyond]]></source>
<year>2006</year>
<page-range>23-45</page-range><publisher-loc><![CDATA[Devon ]]></publisher-loc>
<publisher-name><![CDATA[Willan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hertlein]]></surname>
<given-names><![CDATA[Katherine M]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Jenna]]></given-names>
</name>
<name>
<surname><![CDATA[VanYperen]]></surname>
<given-names><![CDATA[Ashley]]></given-names>
</name>
<name>
<surname><![CDATA[Fatkin]]></surname>
<given-names><![CDATA[Kenneth]]></given-names>
</name>
<name>
<surname><![CDATA[Nakamura]]></surname>
<given-names><![CDATA[Shelby]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Experiences After Infidelity Via Internet Communication: Surveillance, Ambivalence, and Termination]]></article-title>
<source><![CDATA[Journal of the British Association for Sexual and Relationship Therapy]]></source>
<year>2022</year>
<volume>37</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>537-56</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[Jorge A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Convergencia, hipermediatización y ecología móvil. Retos y desafíos]]></article-title>
<source><![CDATA[Significações e estratégias midiáticas]]></source>
<year>2019</year>
<page-range>337-58</page-range><publisher-loc><![CDATA[Aveiro ]]></publisher-loc>
<publisher-name><![CDATA[Ria Editorial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hjorth]]></surname>
<given-names><![CDATA[Larissa]]></given-names>
</name>
<name>
<surname><![CDATA[Pink]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
<name>
<surname><![CDATA[Horst]]></surname>
<given-names><![CDATA[Heather A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Being at Home with Privacy: Privacy and Mundane Intimacy Through Same-Sex Locative Media Practices]]></article-title>
<source><![CDATA[International Journal of Communication]]></source>
<year>2018</year>
<volume>12</volume>
<page-range>1209-27</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Humphreys]]></surname>
<given-names><![CDATA[Lee]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Who&#8217;s Watching Whom? A Study of Interactive Technology and Surveillance]]></article-title>
<source><![CDATA[Journal of Communication]]></source>
<year>2011</year>
<volume>61</volume>
<page-range>575-95</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kolehmainen]]></surname>
<given-names><![CDATA[Marjo]]></given-names>
</name>
<name>
<surname><![CDATA[Juvonen]]></surname>
<given-names><![CDATA[Tuula]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction. Thinking with and through Affective Inequalities]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Juvonen]]></surname>
<given-names><![CDATA[Tuula]]></given-names>
</name>
<name>
<surname><![CDATA[Kolehmainen]]></surname>
<given-names><![CDATA[Marjo]]></given-names>
</name>
</person-group>
<source><![CDATA[Affective Inequalities in Intimate Relationships]]></source>
<year>2018</year>
<page-range>1-15</page-range><publisher-loc><![CDATA[Abingdon ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koskela]]></surname>
<given-names><![CDATA[Hille]]></given-names>
</name>
<name>
<surname><![CDATA[Mäkinen]]></surname>
<given-names><![CDATA[Liisa A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ludic Encounters - Understanding Surveillance through Game Metaphors]]></article-title>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2015</year>
<volume>19</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1523-38</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lasén]]></surname>
<given-names><![CDATA[Amparo]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Remediaciones móviles de subjetividades y sujeciones en relaciones de pareja]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lasén]]></surname>
<given-names><![CDATA[Amparo]]></given-names>
</name>
<name>
<surname><![CDATA[Casado]]></surname>
<given-names><![CDATA[Elena]]></given-names>
</name>
</person-group>
<source><![CDATA[Mediaciones tecnológicas. Cuerpos, afectos y subjetividades]]></source>
<year>2014</year>
<page-range>19-35</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Complutense de Madrid, CIS-Centro de Investigaciones Sociológicas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lasén]]></surname>
<given-names><![CDATA[Amparo]]></given-names>
</name>
<name>
<surname><![CDATA[Hjorth]]></surname>
<given-names><![CDATA[Larissa]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Inscribing Intimacy: Conceptual Frames for Understanding Mobile Media Affect]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Serrano Tellería]]></surname>
<given-names><![CDATA[Ana]]></given-names>
</name>
</person-group>
<source><![CDATA[Between the Public and Private in Mobile Communication]]></source>
<year>2017</year>
<page-range>120-36</page-range><publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Search for Surveillance Theories]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[Theorizing Surveillance. The Panopticon and Beyond]]></source>
<year>2006</year>
<page-range>3-20</page-range><publisher-loc><![CDATA[Devon ]]></publisher-loc>
<publisher-name><![CDATA[Willan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[Surveillance Studies: An Overview]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Polity Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Surveillance, Power and Everyday Life]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kalantzis-Cope]]></surname>
<given-names><![CDATA[Phillipe]]></given-names>
</name>
<name>
<surname><![CDATA[Gherab-Martín]]></surname>
<given-names><![CDATA[Karim]]></given-names>
</name>
</person-group>
<source><![CDATA[Emerging Digital Spaces in Contem-porary Society]]></source>
<year>2010</year>
<page-range>107-20</page-range><publisher-loc><![CDATA[Hampshire ]]></publisher-loc>
<publisher-name><![CDATA[Palgrave Macmillan UK]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Surveillance]]></article-title>
<source><![CDATA[Internet Policy Review]]></source>
<year>2022</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macnisch]]></surname>
<given-names><![CDATA[Kevin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Surveillance Ethics]]></article-title>
<source><![CDATA[The Internet Encyclopedia of Philosophy. A Peer-Reviewed Academic Resource]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mäkinen]]></surname>
<given-names><![CDATA[Liisa A]]></given-names>
</name>
</person-group>
<source><![CDATA[Ludic Surveillance. Examining Mundane Surveillance Practices at the Interface of Control and Play]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Helsinki ]]></publisher-loc>
<publisher-name><![CDATA[Faculty of Social Sciences of the University of Helsinki]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marwick]]></surname>
<given-names><![CDATA[Alice]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Public Domain: Surveillance in Everyday Life]]></article-title>
<source><![CDATA[Surveillance &amp; Society]]></source>
<year>2012</year>
<volume>9</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>378-93</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montero-Fernández]]></surname>
<given-names><![CDATA[Delia]]></given-names>
</name>
<name>
<surname><![CDATA[Hernando-Gómez]]></surname>
<given-names><![CDATA[Ángel]]></given-names>
</name>
<name>
<surname><![CDATA[García-Rojas]]></surname>
<given-names><![CDATA[Antonio D]]></given-names>
</name>
<name>
<surname><![CDATA[Del Río Olvera]]></surname>
<given-names><![CDATA[Francisco J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Click Surveillance of Your Partner! Digital Violence among University Students in England]]></article-title>
<source><![CDATA[Social Sciences (Basel, Switzer-land)]]></source>
<year>2023</year>
<volume>12</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parra]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
</person-group>
<source><![CDATA[Prácticas de vigilancia y control a través de los teléfonos móviles inteligentes en noviazgos y parejas de jóvenes mexicanos]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Querétaro ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Autónoma de Querétaro]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Richardson]]></surname>
<given-names><![CDATA[Ingrid]]></given-names>
</name>
<name>
<surname><![CDATA[Hjorth]]></surname>
<given-names><![CDATA[Larissa]]></given-names>
</name>
<name>
<surname><![CDATA[Strengers]]></surname>
<given-names><![CDATA[Yolande]]></given-names>
</name>
<name>
<surname><![CDATA[Balmford]]></surname>
<given-names><![CDATA[William]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Careful Surveillance at Play: Human-Animal Relations and Mobile Media in the Home]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gómez Cruz]]></surname>
<given-names><![CDATA[Edgar]]></given-names>
</name>
<name>
<surname><![CDATA[Sumartojo]]></surname>
<given-names><![CDATA[Shanti]]></given-names>
</name>
<name>
<surname><![CDATA[Pink]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
</person-group>
<source><![CDATA[Refiguring Techniques in Digital Visual Research]]></source>
<year>2017</year>
<page-range>105-16</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Palgrave Macmillan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[Tania]]></given-names>
</name>
</person-group>
<source><![CDATA[Los celos y las infidelidades: tecnologías, emociones y poder]]></source>
<year>2022</year>
<publisher-loc><![CDATA[Guadalajara ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Guadalajara]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[Tania]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La vigilancia interpersonal en parejas establecidas: aportes cuantitativos]]></article-title>
<source><![CDATA[ComHumanitas: Revista Científica de Comunicación]]></source>
<year>2024</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>188-213</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ruggieri]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
<name>
<surname><![CDATA[Bonfanti]]></surname>
<given-names><![CDATA[Rubinia]]></given-names>
</name>
<name>
<surname><![CDATA[Passanisi]]></surname>
<given-names><![CDATA[Alessia]]></given-names>
</name>
<name>
<surname><![CDATA[Pace]]></surname>
<given-names><![CDATA[Ugo,]]></given-names>
</name>
<name>
<surname><![CDATA[Schimmenti]]></surname>
<given-names><![CDATA[Adriano]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Electronic Surveillance in the Couple: The Role of Self-Efficacy and Commitment]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2021</year>
<volume>114</volume>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez de Puerta]]></surname>
<given-names><![CDATA[Fernando]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Los tipos ideales en la práctica: significados, construcciones, aplicaciones]]></article-title>
<source><![CDATA[Empiria. Revista de Metodología de Ciencias Sociales]]></source>
<year>2006</year>
<volume>11</volume>
<page-range>11-32</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[Evan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Looking Beyond Domestic Violence: Policing Coercive Control]]></article-title>
<source><![CDATA[Journal of Police Crisis Negotiations]]></source>
<year>2012</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>199-217</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thomsen]]></surname>
<given-names><![CDATA[Frej K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Concepts of Surveillance and Sousveillance: A Critical Analysis]]></article-title>
<source><![CDATA[Social Science Information]]></source>
<year>2019</year>
<volume>58</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>701-13</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Timan]]></surname>
<given-names><![CDATA[Tjerk]]></given-names>
</name>
<name>
<surname><![CDATA[Albrechtslund]]></surname>
<given-names><![CDATA[Anders]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Surveillance, Self and Smartphones: Tracking Practices in the Nightlife]]></article-title>
<source><![CDATA[Science and Engineering Ethics]]></source>
<year>2018</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[Robert S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Networking Site or Social Surveillance Site? Understanding the Use of Interpersonal Electronic Surveillance in Romantic Relationships]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2011</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>705-13</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[Robert S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Interpersonal Surveillance over Social Network Sites]]></article-title>
<source><![CDATA[Journal of Social and Personal Relationships]]></source>
<year>2016</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>171-90</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Troullinou]]></surname>
<given-names><![CDATA[Pinelopi]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploring the Subjective Experience of Everyday Surveillance: The Case of Smartphone Devices as Means of Facilitating &#8216;Seductive&#8217; Surveillance]]></source>
<year>2017</year>
<publisher-name><![CDATA[The Open University, ProQuest Dissertations Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tseng]]></surname>
<given-names><![CDATA[Emily]]></given-names>
</name>
<name>
<surname><![CDATA[Bellini]]></surname>
<given-names><![CDATA[Rossana]]></given-names>
</name>
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[Nora]]></given-names>
</name>
<name>
<surname><![CDATA[Danos]]></surname>
<given-names><![CDATA[Matan]]></given-names>
</name>
<name>
<surname><![CDATA[Greenstadt]]></surname>
<given-names><![CDATA[Rachel]]></given-names>
</name>
<name>
<surname><![CDATA[McCoy]]></surname>
<given-names><![CDATA[Damon]]></given-names>
</name>
<name>
<surname><![CDATA[Dell]]></surname>
<given-names><![CDATA[Nicola,]]></given-names>
</name>
<name>
<surname><![CDATA[Ristenpart]]></surname>
<given-names><![CDATA[Thomas]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums]]></article-title>
<source><![CDATA[29th USENIX Security Symposium]]></source>
<year>2020</year>
<page-range>1893-909</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vega Montiel]]></surname>
<given-names><![CDATA[Aimé]]></given-names>
</name>
<name>
<surname><![CDATA[Esquivel Domínguez]]></surname>
<given-names><![CDATA[Daniela]]></given-names>
</name>
<name>
<surname><![CDATA[Barrera Hernández]]></surname>
<given-names><![CDATA[Adina del Carmen]]></given-names>
</name>
<name>
<surname><![CDATA[Pacheco Luna]]></surname>
<given-names><![CDATA[Carolina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La violencia sociodigital contra las mujeres]]></article-title>
<source><![CDATA[Atlánticas-Revista Internacional de Estudios Feministas]]></source>
<year>2024</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>29-42</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[Miranda]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[Eric]]></given-names>
</name>
<name>
<surname><![CDATA[Kohno]]></surname>
<given-names><![CDATA[Tadayoshi,]]></given-names>
</name>
<name>
<surname><![CDATA[Roesner]]></surname>
<given-names><![CDATA[Franziska]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships]]></article-title>
<source><![CDATA[Proceedings of the Eighteenth Symposium on Usable Privacy and Security]]></source>
<year>2022</year>
<publisher-loc><![CDATA[Boston ]]></publisher-loc>
<publisher-name><![CDATA[Usenix]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Widmer]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
<name>
<surname><![CDATA[Albrechtslund]]></surname>
<given-names><![CDATA[Anders]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Ambiguities of Surveillance as Care and Control: Struggles in the Domestication of Location-Tracking Applications by Danish Parents]]></article-title>
<source><![CDATA[Nordicom Review]]></source>
<year>2021</year>
<volume>42</volume>
<numero>s4</numero>
<issue>s4</issue>
<page-range>79-93</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
