User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Digital, politics, and algorithms: Governing digital data through the lens of data protection

  • Open access
  • PDF
  • 231.26 K
  1. Acuto Michele, Curtis Simon, Assemblage Thinking and International Relations, Reassembling International Theory (2014) ISBN:9781349480722 p.1-15, 10.1057/9781137383969_1
  2. Sociologie de la traduction : Textes fondateurs, ISBN:9782911762758, 10.4000/books.pressesmines.1181
  3. Akrich M, Shaping Technology/Building Society: Studies in Sociotechnical Change, 259 (1992)
  4. Amicelle Anthony, Aradau Claudia, Jeandesboz Julien, Questioning security devices: Performativity, resistance, politics, 10.1177/0967010615586964
  5. Amoore Louise, Data Derivatives : On the Emergence of a Security Risk Calculus for Our Times, 10.1177/0263276411417430
  6. Amoore Louise, The Politics of Possibility : Risk and Security Beyond Probability, ISBN:9780822377269, 10.1215/9780822377269
  7. Amoore Louise, de Goede Marieke, INTRODUCTION : Data and the war by other means, 10.1080/17530350.2012.640548
  8. Andrejevic M, Surveillance & Society, 12, 185 (2014)
  9. Aradau Claudia, Blanke Tobias, The (Big) Data-security assemblage: Knowledge and critique, 10.1177/2053951715609066
  10. Article 29 WP (2007) Opinion 4/2007 on the concept of personal data. Brussels: Article 29 Data Protection Working Party.
  11. Tranberg C. B., Proportionality and data protection in the case law of the European Court of Justice, 10.1093/idpl/ipr015
  12. Barry A, Political Machines: Governing a Technological Society (2001)
  13. Barry Andrew, The anti-political economy, 10.1080/03085140220123162
  14. Barry Andrew, Political situations: knowledge controversies in transnational governance, 10.1080/19460171.2012.699234
  15. Bauman Zygmunt, Bigo Didier, Esteves Paulo, Guild Elspeth, Jabri Vivienne, Lyon David, Walker R. B. J., After Snowden: Rethinking the Impact of Surveillance, 10.1111/ips.12048
  16. Bellanova R, European Foreign Affairs Review, 17, 109 (2012)
  17. Bennett C J, The Privacy Advocates: Resisting the Spread of Surveillance (2008)
  18. Bennett C J, The Governance of Privacy. Policy Instruments in Global Perspective (2006)
  19. Berry D M, Critical Theory and the Digital (2014)
  20. Bigo Didier, Globalized (in)security : The field and the ban-opticon, Terror, Insecurity and Liberty (2008) ISBN:9780415466288, 10.4324/9780203926765.ch2
  21. Bonditti P, Research Methods in Critical Security Studies: An Introduction, 101 (2012)
  22. boyd danah, Crawford Kate, CRITICAL QUESTIONS FOR BIG DATA : Provocations for a cultural, technological, and scholarly phenomenon, 10.1080/1369118x.2012.678878
  23. Bygrave LA, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002)
  24. Cadman Louisa, How (Not) to be Governed: Foucault, Critique, and the Political, 10.1068/d4509
  25. Callon M, Advances in Social Theory and Methodology: Toward an Integration of Micro- and Macro-Sociologies, 277 (1981)
  26. Cardon Dominique, Dans l'esprit du PageRank : Une enquête sur l'algorithme de Google, 10.3917/res.177.0063
  27. Cardon D, À quoi rêvent les algorithmes? (2015)
  28. Cavoukian A, Privacy by Design in the Age of Big Data (2012)
  29. Cheney-Lippold John, A New Algorithmic Identity : Soft Biopolitics and the Modulation of Control, 10.1177/0263276411424420
  30. Chun Wendy Hui Kyong, Programmed Visions : Software and Memory, ISBN:9780262015424, 10.7551/mitpress/9780262015424.001.0001
  31. Clarke R., An evaluation of privacy impact assessment guidance documents, 10.1093/idpl/ipr002
  32. Crawford Kate, Can an Algorithm be Agonistic? Ten Scenes from Life in Calculated Publics, 10.1177/0162243915589635
  33. Danezis G, Privacy and Data Protection by Design: From Policy to Engineering (2014)
  34. D’Aquisto G, Privacy by Design in Big Data: An Overview of Privacy Enhancing Technologies in the Era of Big Data Analytics (2015)
  35. Dean M, Governmentality: Power and Rule in Modern Society (1999)
  36. EP Press Service (2016) Data protection reform: Parliament approves new rules fit for the digital era. Strasbourg: European Parliament.
  37. European Commission (2009) Commission Recommendation of 12.5.2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification. Brussels: European Commission.
  38. European Commission (2012) Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) COM(2012) 11 final. Brussels: European Commission.
  39. European Parliament and Council (2016a) Directive (EU) of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or presecution of criminal offences or the execution of criminal penalities, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA. Luxembourg: Official Journal of the European Union.
  40. European Parliament and Council (2016b) Regulation (EU) of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Luxembourg: Official Journal of the European Union.
  41. Foucault M, Power/Knowledge: Selected Interviews and Other Writings, 1972–1977, 194 (1980)
  42. Foucault M, The Essential Foucault: Selections from Essential Works of Foucault, 1954–1984, 229 (2003)
  43. Foucault M, The Essential Foucault: Selections from Essential Works of Foucault, 1954–1984 (2003)
  44. Foucault M, Security, Territory, Population: Lectures at the Collège de France, 1977–1978 (2009)
  45. Gillespie Tarleton, The Relevance of Algorithms, Media Technologies (2014) ISBN:9780262525374 p.167-194, 10.7551/mitpress/9780262525374.003.0009
  46. Gitelman L, ‘Raw Data’ Is an Oxymoron, 1 (2013)
  47. Golder B, Foucault and the Politics of Rights (2015)
  48. González Fuster Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, ISBN:9783319050225, 10.1007/978-3-319-05023-2
  49. Fuster Gloria González, Gellert Raphaël, The fundamental right of data protection in the European Union: in search of an uncharted right, 10.1080/13600869.2012.646798
  50. Gürses S, Engineering Privacy by Design (2012)
  51. Gutwirth Serge, De Hert Paul, Regulating Profiling in a Democratic Constitutional State, Profiling the European Citizen (2008) ISBN:9781402069130 p.271-302, 10.1007/978-1-4020-6914-7_14
  52. Data Protection in a Profiled World, ISBN:9789048188642, 10.1007/978-90-481-8865-9
  53. Reinventing Data Protection?, ISBN:9781402094972, 10.1007/978-1-4020-9498-9
  54. D. Haggerty, Richard V. Ericson Kevin, The surveillant assemblage, 10.1080/00071310020015280
  55. Hallinan Blake, Striphas Ted, Recommended for you: The Netflix Prize and the production of algorithmic culture, 10.1177/1461444814538646
  56. Hansen Hans Krause, Numerical operations, transparency illusions and the datafication of governance, 10.1177/1368431014555260
  57. Hansen Magnus Paulsen, Non-normative critique : Foucault and pragmatic sociology as tactical re-politicization, 10.1177/1368431014562705
  58. Haraway D J, When Species Meet (2008)
  59. Hijmans H, Common Market Law Review, 43, 1313 (2006)
  60. Hood Christopher C., Margetts Helen Z., The Tools of Government in the Digital Age, ISBN:9780230001442, 10.1007/978-1-137-06154-6
  61. Introna L, Surveillance & Society, 2, 177 (2004)
  62. Isin E F, Being Digital Citizens (2015)
  63. Jacobsen Elida K. U., Unique Identification: Inclusion and surveillance in the Indian biometric assemblage, 10.1177/0967010612458336
  64. Kitchin Rob, The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences, ISBN:9781446287484, 10.4135/9781473909472
  65. Kitchin Rob, Dodge Martin, Code/Space : Software and Everyday Life, ISBN:9780262042482, 10.7551/mitpress/9780262042482.001.0001
  66. Latour B, Power, Action and Belief: A New Sociology of Knowledge?, 264 (1986)
  67. Latour B, Pandora’s Hope: Essays on the Reality of Science Studies (1999)
  68. Latour Bruno, Why Has Critique Run out of Steam? From Matters of Fact to Matters of Concern, 10.1086/421123
  69. Latour B, Reassembling the Social: An Introduction to Actor-Network-Theory (2005)
  70. Law J, After Method: Mess in Social Science Research (2004)
  71. Law J, Actor Network Theory and After (1999)
  72. Leese Matthias, The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union, 10.1177/0967010614544204
  73. Le Métayer Daniel, Privacy by Design: A Matter of Choice, Data Protection in a Profiled World (2010) ISBN:9789048188642 p.323-334, 10.1007/978-90-481-8865-9_20
  74. Lupton D, Digital Sociology (2015)
  75. Lupton Deborah, Digital companion species and eating data: Implications for theorising digital data–human assemblages, 10.1177/2053951715619947
  76. Lyon David, Surveillance, Snowden, and Big Data: Capacities, consequences, critique, 10.1177/2053951714541861
  77. Marlin-Bennett Renée, Everyday rules and embodied information: anti-money laundering/counter-terrorist financing practices and radio frequency identification tags as security politics, 10.1080/21624887.2016.1160199
  78. Matzner T, Surveillance & Society, 14, 197 (2016)
  79. Mayer-Schönberger V, Big Data: A Revolution That Will Transform How We Live, Work, and Think (2013)
  80. Miller P, Governing the Present: Administering Economic, Social and Personal Life (2008)
  81. O'Malley Pat, Weir Lorna, Shearing Clifford, Governmentality, criticism, politics, 10.1080/03085149700000026
  82. Pasquale Frank, The Black Box Society : The Secret Algorithms That Control Money and Information, ISBN:9780674736061, 10.4159/harvard.9780674736061
  83. Pontille David, Torny Didier, La manufacture de l'évaluation scientifique : Algorithmes, jeux de données et outils bibliométriques, 10.3917/res.177.0023
  84. Pottage Alain, The Materiality of What?, 10.1111/j.1467-6478.2012.00576.x
  85. Poullet Y, Défis du droit à la protection de la vie privée: Challenges of Privacy and Data Protection Law, 569 (2008)
  86. Raab Charles D., Co-Producing Data Protection, 10.1080/13600869755785
  87. Rabinow P, The Essential Foucault: Selections from Essential Works of Foucault, 1954–1984, vii (2003)
  88. Regan Priscilla M., Regulating surveillance technologies, Routledge Handbook of Surveillance Studies ISBN:9780203814949, 10.4324/9780203814949.ch4_2_a
  89. Rose N, Powers of Freedom: Reframing Political Thought (2004)
  90. Rose Nikolas, Miller Peter, Political Power beyond the State: Problematics of Government, 10.2307/591464
  91. Rouvroy A, Privacy, Due Process and the Computational Turn, 143 (2013)
  92. Rouvroy Antoinette, Berns Thomas, Gouvernementalité algorithmique et perspectives d'émancipation : Le disparate comme condition d'individuation par la relation ?, 10.3917/res.177.0163
  93. Rouvroy Antoinette, Poullet Yves, The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy, Reinventing Data Protection? (2009) ISBN:9781402094972 p.45-76, 10.1007/978-1-4020-9498-9_2
  94. Rubinstein I S, Berkeley Technology Law Journal, 26, 1409 (2011)
  95. Rubinstein I S, Berkeley Technology Law Journal, 28, 1333 (2013)
  96. Spiekermann Sarah, The challenges of privacy by design, 10.1145/2209249.2209263
  97. Spiekermann Sarah, The RFID PIA – Developed by Industry, Endorsed by Regulators, Privacy Impact Assessment (2012) ISBN:9789400754027 p.323-346, 10.1007/978-94-007-2543-0_15
  98. Supiot A, La Gouvernance par les nombres: Cours au Collège de France (2012–2014) (2015)
  99. Thatcher J, Environment and Planning D: Society and Space, 0, 1 (2016)
  100. Thomas Owen D., FoucaultianDispositifsas Methodology: The Case of Anonymous Exclusions by Unique Identification in India, 10.1111/ips.12050
  101. van Otterlo M, Privacy, Due Process and the Computational Turn, 41 (2013)
  102. Walters W, Governmentality: Critical Encounters (2012)
  103. Walters W, Governing Europe: Discourse, Governmentality and European Integration (2005)
  104. Privacy Impact Assessment, ISBN:9789400754027, 10.1007/978-94-007-2543-0
  105. Ziewitz Malte, Governing Algorithms : Myth, Mess, and Methods, 10.1177/0162243915608948
Bibliographic reference Bellanova, Rocco. Digital, politics, and algorithms: Governing digital data through the lens of data protection. In: European Journal of Social Theory, Vol. 20, no.3, p. 329-347 (2017)
Permanent URL http://hdl.handle.net/2078/188462