Accès à distance ? S'identifier sur le proxy UCLouvain
Composting and computing: On digital security compositions
Onglets principaux
- Open access
- 365.20 K
Type de document | Article de périodique (Journal article) – Article de recherche |
---|---|
Type d'accès | Accès libre |
Année de publication | 2019 |
Langue | Anglais |
Information sur le périodique | "European Journal of International Security" - Vol. 4, no.3, p. 345-365 (2019) |
Peer reviewed | oui |
Editeur | Cambridge University Press (CUP) |
issn | 2057-5637 |
e-issn | 2057-5645 |
Statut de la publication | Publié |
Affiliations |
USL-B
- Institut d'études européennes (IEE) USL-B - Centre de recherches en science politique (CReSPo) UCL - SSH/IRIS-L/IEE - Institut d'études européennes UCL - SSH/IRIS-L/CRSP - Centre de recherche en science politique |
Mots-clés | Digital Data ; Critical Security Studies ; STS ; Haraway ; Computing |
Liens |
- Guattari, The Guattari Effect, 45 (2011)
- During, continuum, 59 (2018)
- Amoore Louise, Biometric borders: Governing mobilities in the war on terror, 10.1016/j.polgeo.2006.02.001
- Bellanova Rocco, Fuster Gloria González, Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices, 10.1111/ips.12017
- Jeandesboz Julien, Smartening border security in the European Union: An associational inquiry, 10.1177/0967010616650226
- Salter Mark B., Passports, Mobility, and Security: How smart can the border be?, 10.1111/j.1528-3577.2004.00158.x
- Wilcox Lauren, Embodying algorithmic war: Gender, race, and the posthuman in drone warfare, 10.1177/0967010616657947
- Leese Matthias, The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union, 10.1177/0967010614544204
- De Goede Marieke, The Politics of Preemption and the War on Terror in Europe, 10.1177/1354066107087764
- Amicelle Anthony, Aradau Claudia, Jeandesboz Julien, Questioning security devices: Performativity, resistance, politics, 10.1177/0967010615586964
- Amoore Louise, Data Derivatives : On the Emergence of a Security Risk Calculus for Our Times, 10.1177/0263276411417430
- Aradau Claudia, Blanke Tobias, The (Big) Data-security assemblage: Knowledge and critique, 10.1177/2053951715609066
- Kaufmann Mareile, Egbert Simon, Leese Matthias, Predictive Policing and the Politics of Patterns, 10.1093/bjc/azy060
- Iliadis Andrew, Russo Federica, Critical data studies: An introduction, 10.1177/2053951716674238
- Kitchin Rob, Lauriault Tracey P., Toward Critical Data Studies: : Charting and Unpacking Data Assemblages and Their Work, Thinking Big Data in Geography ISBN:9781496205377 p.3-20, 10.2307/j.ctt21h4z6m.6
- Matzner Tobias, Beyond data as representation: The performativity of Big Data in surveillance, 10.24908/ss.v14i2.5831
- Van Dijck Jose, Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology, 10.24908/ss.v12i2.4776
- Sismondo, An Introduction to Science and Technology Studies, vii (2010)
- Latour, New Literary History, 41, 473 (2010)
- Stengers, Cosmopolitiques, 8, 15 (2004)
- Gutwirth, Les technologies de l'information au service des droits, 24 (2010)
- Haraway Donna J., Staying with the Trouble : Making Kin in the Chthulucene, ISBN:9780822373780, 10.1215/9780822373780
- Chun Wendy Hui Kyong, Programmed Visions : Software and Memory, ISBN:9780262015424, 10.7551/mitpress/9780262015424.001.0001
- Mayer-Schönberger, Big Data: A Revolution That Will Transform How We Live, Work, and Think, 78 (2013)
- Serres, The Parasite, 230 (1982)
- Rosenberg, ‘Raw Data’ is an Oxymoron, 15 (2013)
- Halpern, Beautiful Data: A History of Vision and Reason since 1945 (2014)
- Borgman Christine L., Big Data, Little Data, No Data : Scholarship in the Networked World, ISBN:9780262327862, 10.7551/mitpress/9963.001.0001
- Thatcher Jim, O’Sullivan David, Mahmoudi Dillon, Data colonialism through accumulation by dispossession: New metaphors for daily data, 10.1177/0263775816633195
- Dourish Paul, Gómez Cruz Edgar, Datafication and data fiction: Narrating data and narrating with data, 10.1177/2053951718784083
- Kassung, Navigating Noise, 77 (2017)
- Link, Archaeology of Algorithmic Artefacts, 69 (2016)
- Ihde, Listening and Voice, 6 (2007)
- Weitzel Michelle D, Audializing migrant bodies: Sound and security at the border, 10.1177/0967010618795788
- Guillaume Xavier, How to do things with silence: Rethinking the centrality of speech to the securitization framework, 10.1177/0967010618789755
- Bauman Zygmunt, Bigo Didier, Esteves Paulo, Guild Elspeth, Jabri Vivienne, Lyon David, Walker R. B. J., After Snowden: Rethinking the Impact of Surveillance, 10.1111/ips.12048
- Lyon David, Surveillance, Snowden, and Big Data: Capacities, consequences, critique, 10.1177/2053951714541861
- Bigo, Controlling Frontiers: Free Movement Into and Within Europe (2005)
- Broeders Dennis, The New Digital Borders of Europe : EU Databases and the Surveillance of Irregular Migrants, 10.1177/0268580907070126
- Muller Benjamin, Security, Risk and the Biometric State : Governing Borders and Bodies, ISBN:9780203858042, 10.4324/9780203858042
- Pallister-Wilkins Polly, How walls do work: Security barriers as devices of interruption and data capture, 10.1177/0967010615615729
- Amoore Louise, Piotukh Volha, Life beyond big data: governing with little analytics, 10.1080/03085147.2015.1043793
- Amoore Louise, De Goede Marieke, Governance, risk and dataveillance in the war on terror, 10.1007/s10611-005-1717-8
- Jeandesboz Julien, Justifying Control: EU Border Security and the Shifting Boundaries of Political Arrangement, EU Borders and Shifting Internal Security (2016) ISBN:9783319175591 p.221-238, 10.1007/978-3-319-17560-7_12
- Guittet, The Routledge Handbook of New Security Studies, 229 (2010)
- Valkenburg Govert, van der Ploeg Irma, Materialities between security and privacy: A constructivist account of airport security scanners, 10.1177/0967010615577855
- Lyon, Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination (2003)
- Bigo, Theorizing Surveillance, 46 (2006)
- Zureik, Global Surveillance and Policing: Borders, Security, Identity (2005)
- D. Haggerty, Richard V. Ericson Kevin, The surveillant assemblage, 10.1080/00071310020015280
- Sterne Jonathan, MP3 : The Meaning of a Format, ISBN:9780822352839, 10.1215/9780822395522
- Ruppert Evelyn, Isin Engin, Bigo Didier, Data politics, 10.1177/2053951717717749
- Bigo Didier, The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts, 10.1177/0967010614530459
- Bigo Didier, International flows, political order and social change: (in)security, by-product of the will of order over change, 10.1080/17440572.2017.1350428
- de Goede Marieke, Speculative Security : The Politics of Pursuing Terrorist Monies, ISBN:9780816675890, 10.5749/minnesota/9780816675890.001.0001
- Amoore Louise, The Politics of Possibility : Risk and Security Beyond Probability, ISBN:9780822355458, 10.1215/9780822377269
- Privacy Impact Assessment Update for the Automated Targeting System, 1 (2017)
- Manovich, The Language of New Media, 224 (2002)
- Tone, Noise Media Language, 85 (2007)
- Labelle, Background Noise: Perspectives on Sound Art, 218 (2015)
- Marclay, Audio Culture: Readings in Modern Music, 344 (2017)
- Bellanova Rocco, Digital, politics, and algorithms : Governing digital data through the lens of data protection, 10.1177/1368431016679167
- FUSTER GLORIA GONZÁLEZ, TRANSPARENCY AS TRANSLATION IN DATA PROTECTION, BEING PROFILED (2018) ISBN:9789048550180 p.52-57, 10.2307/j.ctvhrd092.12
- Rabinow, The Foucault Reader, 381 (1984)
- Final Report by the High Level Expert Group on Information Systems and Interoperability (HLEG) (2017)
- Hellberg Ann-Sofie, Grönlund Åke, Conflicts in implementing interoperability: Re-operationalizing basic values, 10.1016/j.giq.2012.10.006
- Leese Matthias, Standardizing security: the business case politics of borders, 10.1080/17450101.2017.1403777
- O’Grady Nathaniel, Data, interface, security: Assembling technologies that govern the future, 10.1016/j.geoforum.2015.06.015
- de Goede Marieke, The chain of security, 10.1017/s0260210517000353
- Glouftsios Georgios, Governing circulation through technology within EU border security practice-networks, 10.1080/17450101.2017.1403774
- Kirschenbaum, TEXT Technology, 13, 91 (2004)
- Austin Jonathan Luke, Security compositions, 10.1017/eis.2019.19
- Aradau Claudia, Security That Matters: Critical Infrastructure and Objects of Protection, 10.1177/0967010610382687
- Best Jacqueline, Walters William, “Actor-Network Theory” and International Relationality: Lost (and Found) in Translation : Introduction, 10.1111/ips.12026_1
- Balzacq Thierry, Cavelty Myriam Dunn, A theory of actor-network for cyber-security, 10.1017/eis.2016.8
- Science, Technology, and Art in International Relations, ISBN:9781315618371, 10.4324/9781315618371
- Haug, The Practical Handbook of Compost Engineering, 1 (1993)
- Abrahamsson Sebastian, Bertoni Filippo, Compost Politics: Experimenting with Togetherness in Vermicomposting, 10.1215/22011919-3614962
- Kitchin Rob, Big Data, new epistemologies and paradigm shifts, 10.1177/2053951714528481
- Hacking, Humanities in Society, 5, 279 (1982)
- Ulbricht Lena, When Big Data Meet Securitization. Algorithmic Regulation with Passenger Name Records, 10.1007/s41125-018-0030-3
- Dodge Martin, Kitchin Rob, Flying through Code/Space: The Real Virtuality of Air Travel, 10.1068/a3698
- Feasibility Study on a Centralised Routing Mechanism for Advance Passenger Information (and Passenger Name Records), Volume 1: Main Report (2019)
- Bellanova, European Foreign Affairs Review, 17, 109 (2012)
- Transparency Report 2017, 5 (2018)
- Hoquet, Critique, 860–861, 54 (2019)
- Austin Jonathan Luke, Bellanova Rocco, Kaufmann Mareile, Doing and mediating critique: An invitation to practice companionship, 10.1177/0967010618810925
- Amoore Louise, Raley Rita, Securing with algorithms: Knowledge, decision, sovereignty, 10.1177/0967010616680753
- Jeandesboz Julien, European border policing: EUROSUR, knowledge, calculation, 10.1080/17440572.2017.1347043
- Aloisio M., The Calculation of Easter Day, and the Origin and Use of the Word Computer, 10.1109/mahc.2004.17
- Ceruzzi Paul E., Computing : A Concise History, ISBN:9780262310383, 10.7551/mitpress/9426.001.0001
- Melfi, Hidden Figures (2016)
- Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America (1996)
- Pickering Andrew, The Cybernetic Brain : Sketches of Another Future, ISBN:9780226667904, 10.7208/chicago/9780226667928.001.0001
- Ceruzzi, A History of Modern Computing (2003)
- Hayles N. Katherine, My Mother Was a Computer : Digital Subjects and Literary Texts, ISBN:9780226321486, 10.7208/chicago/9780226321493.001.0001
- Blanchette Jean-François, A material history of bits, 10.1002/asi.21542
- Citron, Washington Law Review, 89, 1 (2014)
- Pasquale Frank, The Black Box Society : The Secret Algorithms That Control Money and Information, ISBN:9780674736061, 10.4159/harvard.9780674736061
- Ananny Mike, Crawford Kate, Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability, 10.1177/1461444816676645
- Kyong Chun Wendy Hui, Programmability, Software Studies (2008) ISBN:9780262062749 p.225-228, 10.7551/mitpress/9780262062749.003.0032
- Mahoney, Annals of the History of Computing, 10, 116 (1988)
- Mareis, Poetics and Politics of Data, 43 (2015)
- Lupi, Dear Data (2016)
- Hicks, Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing, 28 (2018)
- Cusick, Trans: Revista Transcultural de Música, 10 (2006)
- Goodman, Sonic Warfare: Sound, Affect, and the Ecology of Fear (2010)
- Volcler, Le son comme arme: Les usages policiers et militaires du son (2011)
- Apter, [Inaudible] A Politics of Listening in 4 Acts, 3 (2016)
- Eades Diana, Testing the Claims of Asylum Seekers: The Role of Language Analysis, 10.1080/15434300802606523
- EMN Synthesis Report for the EMN Focussed Study 2017: Challenges and Practices for Establishing the Identity of Third-Country Nationals in Migration Procedures (2017)
- Verified, LOID – Linguistic Origin Identification (2011)
- Language Analysis Version 21.0 (2018)
- Shapiro Michael J., Every Move You Make: Bodies, Surveillance, and Media, 10.1215/01642472-23-2_83-21
- Digitisation Agenda 2020: Success Stories and Future Digital Projects at the Federal Office for Migration and Refugees (BAMF), 34 (2018)
- Tangermann, Documenting and Establishing Identity in the Migration Process, Challenges and Practices in the German Context: Focussed study by the German National Contact Point for the European Migration Network (EMN) – Working Paper 76, 43 (2017)
- Broeders, Digitizing Identities, 242 (2016)
- Metcalfe Philippa, Dencik Lina, The politics of big borders: Data (in)justice and the governance of refugees, 10.5210/fm.v24i4.9934
- EPSTEIN CHARLOTTE, Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric Borders, 10.1111/j.1749-5687.2007.00010.x
- Latour, Knowledge and Society Studies in the Sociology of Culture Past and Present, 7 (1986)
- Schilling Natalie, Marsters Alexandria, Unmasking Identity: Speaker Profiling for Forensic Linguistic Purposes, 10.1017/s0267190514000282
- Aradau Claudia, Blanke Tobias, Governing others: Anomaly and the algorithmic subject of security, 10.1017/eis.2017.14
- Ginzburg Carlo, Morelli, Freud and Sherlock Holmes: Clues and Scientific Method*, 10.1093/hwj/9.1.5
- Ikeda, Formula, 7 (2002)
- Ikeda, Dataphonics (2007)
- Bowker, Memory Practices in the Sciences, 184 (2005)
- "Raw Data" Is an Oxymoron, ISBN:9780262312325, 10.7551/mitpress/9302.001.0001
- Barthes, Image, Music, Text, 153 (1977)
- Herzogenrath, Christina Kubisch Stromzeichnungen / Electrical Drawings: Arbeiten 1974–2008, 9 (2009)
- Kim-Cohen, In the Blink of an Ear: Toward a Non-Cochlear Sonic Art, 109 (2013)
- Khazam, Wellenfang, 49 (2010)
- Cox, Cabinet Magazine, 21, 94 (2006)
- Adorno, Essays on Music, 657 (2002)
- LaBelle, Sonic Agency: Sound and Emergent Forms of Resistance, 57 (2018)
- Gillespie, Media Technologies: Essays on Communication, Materiality, and Society, 168 (2014)
Référence bibliographique | Bellanova, Rocco ; González Fuster, Gloria. Composting and computing: On digital security compositions. In: European Journal of International Security, Vol. 4, no.3, p. 345-365 (2019) |
---|---|
Permalien | http://hdl.handle.net/2078.3/221362 |