The algorithmic regulation of security: An infrastructural perspective

被引:47
作者
Bellanova, Rocco [1 ]
de Goede, Marieke [1 ]
机构
[1] Univ Amsterdam, Dept Polit Sci, Nieuwe Achtergracht 166, NL-1018 WV Amsterdam, Netherlands
基金
欧洲研究理事会;
关键词
algorithmic regulation; data; infrastructure; PNR; security; TFTP; POLITICS; INFORMATION; EMERGENCE; RISK;
D O I
10.1111/rego.12338
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article contributes to debates on algorithmic regulation by focusing on the domain of security. It develops aninfrastructuralperspective, by analyzing how algorithmic regulation is enacted through the custom-built transatlantic data infrastructures of the EU-U.S. Passenger Name Records and Terrorism Financing Tracking Program programs. Concerning regulationthroughalgorithms, this approach analyzes how specific, commercial data are rendered transferable and meaningful in a security context. Concerning the regulationofalgorithms, an infrastructural perspective examines how public values like privacy and accountability are built into international data infrastructures. The creation of data infrastructures affects existing modes of governance and fosters novel power relations among public and private actors. We highlightemergentmodes of standard setting, thus enriching Yeung's (2018) taxonomy, and question the practical effects of operationalizing public values through infrastructural choices. Ultimately, the article offers a critical reading of algorithmic security, and how it materially, legally, and politically supports specific ways of doing security.
引用
收藏
页码:102 / 118
页数:17
相关论文
共 86 条
[1]  
Akrich Madeleine., 1992, A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies
[2]   Lively Infrastructure [J].
Amin, Ash .
THEORY CULTURE & SOCIETY, 2014, 31 (7-8) :137-161
[3]  
Amoore L., 2016, ALGORITHMIC LIFE CAL, P1
[4]  
Amoore L., 2008, Risk and the war on terror
[5]   Securing with algorithms: Knowledge, decision, sovereignty [J].
Amoore, Louise ;
Raley, Rita .
SECURITY DIALOGUE, 2017, 48 (01) :3-10
[6]   Data Derivatives On the Emergence of a Security Risk Calculus for Our Times [J].
Amoore, Louise .
THEORY CULTURE & SOCIETY, 2011, 28 (06) :24-43
[7]  
Amoore Louise., 2013, The Politics of Possibility: Risk and Security Beyond Probability, DOI [https://doi.org/10.1515/9780822377269, DOI 10.1515/9780822377269]
[8]   Preemption, precaution, preparedness: Anticipatory action and future geographies [J].
Anderson, Ben .
PROGRESS IN HUMAN GEOGRAPHY, 2010, 34 (06) :777-798
[9]  
[Anonymous], 2007, Privacy Impact Assessment for the REAL ID Act, P12
[10]  
[Anonymous], 1999, Sorting Things Out: Classification and Its Consequences