User menu

Accès à distance en utilisant le proxy de l'UCL :

https://proxy.bib.ucl.ac.be/proxy-dial

Composting and computing: On digital security compositions

  • Open access
  • PDF
  • 365.20 K
  1. Guattari, The Guattari Effect, 45 (2011)
  2. During, continuum, 59 (2018)
  3. Amoore Louise, Biometric borders: Governing mobilities in the war on terror, 10.1016/j.polgeo.2006.02.001
  4. Bellanova Rocco, Fuster Gloria González, Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices, 10.1111/ips.12017
  5. Jeandesboz Julien, Smartening border security in the European Union: An associational inquiry, 10.1177/0967010616650226
  6. Salter Mark B., Passports, Mobility, and Security: How smart can the border be?, 10.1111/j.1528-3577.2004.00158.x
  7. Wilcox Lauren, Embodying algorithmic war: Gender, race, and the posthuman in drone warfare, 10.1177/0967010616657947
  8. Leese Matthias, The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union, 10.1177/0967010614544204
  9. De Goede Marieke, The Politics of Preemption and the War on Terror in Europe, 10.1177/1354066107087764
  10. Amicelle Anthony, Aradau Claudia, Jeandesboz Julien, Questioning security devices: Performativity, resistance, politics, 10.1177/0967010615586964
  11. Amoore Louise, Data Derivatives : On the Emergence of a Security Risk Calculus for Our Times, 10.1177/0263276411417430
  12. Aradau Claudia, Blanke Tobias, The (Big) Data-security assemblage: Knowledge and critique, 10.1177/2053951715609066
  13. Kaufmann Mareile, Egbert Simon, Leese Matthias, Predictive Policing and the Politics of Patterns, 10.1093/bjc/azy060
  14. Iliadis Andrew, Russo Federica, Critical data studies: An introduction, 10.1177/2053951716674238
  15. Kitchin Rob, Lauriault Tracey P., Toward Critical Data Studies: : Charting and Unpacking Data Assemblages and Their Work, Thinking Big Data in Geography ISBN:9781496205377 p.3-20, 10.2307/j.ctt21h4z6m.6
  16. Matzner Tobias, Beyond data as representation: The performativity of Big Data in surveillance, 10.24908/ss.v14i2.5831
  17. Van Dijck Jose, Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology, 10.24908/ss.v12i2.4776
  18. Sismondo, An Introduction to Science and Technology Studies, vii (2010)
  19. Latour, New Literary History, 41, 473 (2010)
  20. Stengers, Cosmopolitiques, 8, 15 (2004)
  21. Gutwirth, Les technologies de l'information au service des droits, 24 (2010)
  22. Haraway Donna J., Staying with the Trouble : Making Kin in the Chthulucene, ISBN:9780822373780, 10.1215/9780822373780
  23. Chun Wendy Hui Kyong, Programmed Visions : Software and Memory, ISBN:9780262015424, 10.7551/mitpress/9780262015424.001.0001
  24. Mayer-Schönberger, Big Data: A Revolution That Will Transform How We Live, Work, and Think, 78 (2013)
  25. Serres, The Parasite, 230 (1982)
  26. Rosenberg, ‘Raw Data’ is an Oxymoron, 15 (2013)
  27. Halpern, Beautiful Data: A History of Vision and Reason since 1945 (2014)
  28. Borgman Christine L., Big Data, Little Data, No Data : Scholarship in the Networked World, ISBN:9780262327862, 10.7551/mitpress/9963.001.0001
  29. Thatcher Jim, O’Sullivan David, Mahmoudi Dillon, Data colonialism through accumulation by dispossession: New metaphors for daily data, 10.1177/0263775816633195
  30. Dourish Paul, Gómez Cruz Edgar, Datafication and data fiction: Narrating data and narrating with data, 10.1177/2053951718784083
  31. Kassung, Navigating Noise, 77 (2017)
  32. Link, Archaeology of Algorithmic Artefacts, 69 (2016)
  33. Ihde, Listening and Voice, 6 (2007)
  34. Weitzel Michelle D, Audializing migrant bodies: Sound and security at the border, 10.1177/0967010618795788
  35. Guillaume Xavier, How to do things with silence: Rethinking the centrality of speech to the securitization framework, 10.1177/0967010618789755
  36. Bauman Zygmunt, Bigo Didier, Esteves Paulo, Guild Elspeth, Jabri Vivienne, Lyon David, Walker R. B. J., After Snowden: Rethinking the Impact of Surveillance, 10.1111/ips.12048
  37. Lyon David, Surveillance, Snowden, and Big Data: Capacities, consequences, critique, 10.1177/2053951714541861
  38. Bigo, Controlling Frontiers: Free Movement Into and Within Europe (2005)
  39. Broeders Dennis, The New Digital Borders of Europe : EU Databases and the Surveillance of Irregular Migrants, 10.1177/0268580907070126
  40. Muller Benjamin, Security, Risk and the Biometric State : Governing Borders and Bodies, ISBN:9780203858042, 10.4324/9780203858042
  41. Pallister-Wilkins Polly, How walls do work: Security barriers as devices of interruption and data capture, 10.1177/0967010615615729
  42. Amoore Louise, Piotukh Volha, Life beyond big data: governing with little analytics, 10.1080/03085147.2015.1043793
  43. Amoore Louise, De Goede Marieke, Governance, risk and dataveillance in the war on terror, 10.1007/s10611-005-1717-8
  44. Jeandesboz Julien, Justifying Control: EU Border Security and the Shifting Boundaries of Political Arrangement, EU Borders and Shifting Internal Security (2016) ISBN:9783319175591 p.221-238, 10.1007/978-3-319-17560-7_12
  45. Guittet, The Routledge Handbook of New Security Studies, 229 (2010)
  46. Valkenburg Govert, van der Ploeg Irma, Materialities between security and privacy: A constructivist account of airport security scanners, 10.1177/0967010615577855
  47. Lyon, Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination (2003)
  48. Bigo, Theorizing Surveillance, 46 (2006)
  49. Zureik, Global Surveillance and Policing: Borders, Security, Identity (2005)
  50. D. Haggerty, Richard V. Ericson Kevin, The surveillant assemblage, 10.1080/00071310020015280
  51. Sterne Jonathan, MP3 : The Meaning of a Format, ISBN:9780822352839, 10.1215/9780822395522
  52. Ruppert Evelyn, Isin Engin, Bigo Didier, Data politics, 10.1177/2053951717717749
  53. Bigo Didier, The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts, 10.1177/0967010614530459
  54. Bigo Didier, International flows, political order and social change: (in)security, by-product of the will of order over change, 10.1080/17440572.2017.1350428
  55. de Goede Marieke, Speculative Security : The Politics of Pursuing Terrorist Monies, ISBN:9780816675890, 10.5749/minnesota/9780816675890.001.0001
  56. Amoore Louise, The Politics of Possibility : Risk and Security Beyond Probability, ISBN:9780822355458, 10.1215/9780822377269
  57. Privacy Impact Assessment Update for the Automated Targeting System, 1 (2017)
  58. Manovich, The Language of New Media, 224 (2002)
  59. Tone, Noise Media Language, 85 (2007)
  60. Labelle, Background Noise: Perspectives on Sound Art, 218 (2015)
  61. Marclay, Audio Culture: Readings in Modern Music, 344 (2017)
  62. Bellanova Rocco, Digital, politics, and algorithms : Governing digital data through the lens of data protection, 10.1177/1368431016679167
  63. FUSTER GLORIA GONZÁLEZ, TRANSPARENCY AS TRANSLATION IN DATA PROTECTION, BEING PROFILED (2018) ISBN:9789048550180 p.52-57, 10.2307/j.ctvhrd092.12
  64. Rabinow, The Foucault Reader, 381 (1984)
  65. Final Report by the High Level Expert Group on Information Systems and Interoperability (HLEG) (2017)
  66. Hellberg Ann-Sofie, Grönlund Åke, Conflicts in implementing interoperability: Re-operationalizing basic values, 10.1016/j.giq.2012.10.006
  67. Leese Matthias, Standardizing security: the business case politics of borders, 10.1080/17450101.2017.1403777
  68. O’Grady Nathaniel, Data, interface, security: Assembling technologies that govern the future, 10.1016/j.geoforum.2015.06.015
  69. de Goede Marieke, The chain of security, 10.1017/s0260210517000353
  70. Glouftsios Georgios, Governing circulation through technology within EU border security practice-networks, 10.1080/17450101.2017.1403774
  71. Kirschenbaum, TEXT Technology, 13, 91 (2004)
  72. Austin Jonathan Luke, Security compositions, 10.1017/eis.2019.19
  73. Aradau Claudia, Security That Matters: Critical Infrastructure and Objects of Protection, 10.1177/0967010610382687
  74. Best Jacqueline, Walters William, “Actor-Network Theory” and International Relationality: Lost (and Found) in Translation : Introduction, 10.1111/ips.12026_1
  75. Balzacq Thierry, Cavelty Myriam Dunn, A theory of actor-network for cyber-security, 10.1017/eis.2016.8
  76. Science, Technology, and Art in International Relations, ISBN:9781315618371, 10.4324/9781315618371
  77. Haug, The Practical Handbook of Compost Engineering, 1 (1993)
  78. Abrahamsson Sebastian, Bertoni Filippo, Compost Politics: Experimenting with Togetherness in Vermicomposting, 10.1215/22011919-3614962
  79. Kitchin Rob, Big Data, new epistemologies and paradigm shifts, 10.1177/2053951714528481
  80. Hacking, Humanities in Society, 5, 279 (1982)
  81. Ulbricht Lena, When Big Data Meet Securitization. Algorithmic Regulation with Passenger Name Records, 10.1007/s41125-018-0030-3
  82. Dodge Martin, Kitchin Rob, Flying through Code/Space: The Real Virtuality of Air Travel, 10.1068/a3698
  83. Feasibility Study on a Centralised Routing Mechanism for Advance Passenger Information (and Passenger Name Records), Volume 1: Main Report (2019)
  84. Bellanova, European Foreign Affairs Review, 17, 109 (2012)
  85. Transparency Report 2017, 5 (2018)
  86. Hoquet, Critique, 860–861, 54 (2019)
  87. Austin Jonathan Luke, Bellanova Rocco, Kaufmann Mareile, Doing and mediating critique: An invitation to practice companionship, 10.1177/0967010618810925
  88. Amoore Louise, Raley Rita, Securing with algorithms: Knowledge, decision, sovereignty, 10.1177/0967010616680753
  89. Jeandesboz Julien, European border policing: EUROSUR, knowledge, calculation, 10.1080/17440572.2017.1347043
  90. Aloisio M., The Calculation of Easter Day, and the Origin and Use of the Word Computer, 10.1109/mahc.2004.17
  91. Ceruzzi Paul E., Computing : A Concise History, ISBN:9780262310383, 10.7551/mitpress/9426.001.0001
  92. Melfi, Hidden Figures (2016)
  93. Edwards, The Closed World: Computers and the Politics of Discourse in Cold War America (1996)
  94. Pickering Andrew, The Cybernetic Brain : Sketches of Another Future, ISBN:9780226667904, 10.7208/chicago/9780226667928.001.0001
  95. Ceruzzi, A History of Modern Computing (2003)
  96. Hayles N. Katherine, My Mother Was a Computer : Digital Subjects and Literary Texts, ISBN:9780226321486, 10.7208/chicago/9780226321493.001.0001
  97. Blanchette Jean-François, A material history of bits, 10.1002/asi.21542
  98. Citron, Washington Law Review, 89, 1 (2014)
  99. Pasquale Frank, The Black Box Society : The Secret Algorithms That Control Money and Information, ISBN:9780674736061, 10.4159/harvard.9780674736061
  100. Ananny Mike, Crawford Kate, Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability, 10.1177/1461444816676645
  101. Kyong Chun Wendy Hui, Programmability, Software Studies (2008) ISBN:9780262062749 p.225-228, 10.7551/mitpress/9780262062749.003.0032
  102. Mahoney, Annals of the History of Computing, 10, 116 (1988)
  103. Mareis, Poetics and Politics of Data, 43 (2015)
  104. Lupi, Dear Data (2016)
  105. Hicks, Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing, 28 (2018)
  106. Cusick, Trans: Revista Transcultural de Música, 10 (2006)
  107. Goodman, Sonic Warfare: Sound, Affect, and the Ecology of Fear (2010)
  108. Volcler, Le son comme arme: Les usages policiers et militaires du son (2011)
  109. Apter, [Inaudible] A Politics of Listening in 4 Acts, 3 (2016)
  110. Eades Diana, Testing the Claims of Asylum Seekers: The Role of Language Analysis, 10.1080/15434300802606523
  111. EMN Synthesis Report for the EMN Focussed Study 2017: Challenges and Practices for Establishing the Identity of Third-Country Nationals in Migration Procedures (2017)
  112. Verified, LOID – Linguistic Origin Identification (2011)
  113. Language Analysis Version 21.0 (2018)
  114. Shapiro Michael J., Every Move You Make: Bodies, Surveillance, and Media, 10.1215/01642472-23-2_83-21
  115. Digitisation Agenda 2020: Success Stories and Future Digital Projects at the Federal Office for Migration and Refugees (BAMF), 34 (2018)
  116. Tangermann, Documenting and Establishing Identity in the Migration Process, Challenges and Practices in the German Context: Focussed study by the German National Contact Point for the European Migration Network (EMN) – Working Paper 76, 43 (2017)
  117. Broeders, Digitizing Identities, 242 (2016)
  118. Metcalfe Philippa, Dencik Lina, The politics of big borders: Data (in)justice and the governance of refugees, 10.5210/fm.v24i4.9934
  119. EPSTEIN CHARLOTTE, Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric Borders, 10.1111/j.1749-5687.2007.00010.x
  120. Latour, Knowledge and Society Studies in the Sociology of Culture Past and Present, 7 (1986)
  121. Schilling Natalie, Marsters Alexandria, Unmasking Identity: Speaker Profiling for Forensic Linguistic Purposes, 10.1017/s0267190514000282
  122. Aradau Claudia, Blanke Tobias, Governing others: Anomaly and the algorithmic subject of security, 10.1017/eis.2017.14
  123. Ginzburg Carlo, Morelli, Freud and Sherlock Holmes: Clues and Scientific Method*, 10.1093/hwj/9.1.5
  124. Ikeda, Formula, 7 (2002)
  125. Ikeda, Dataphonics (2007)
  126. Bowker, Memory Practices in the Sciences, 184 (2005)
  127. "Raw Data" Is an Oxymoron, ISBN:9780262312325, 10.7551/mitpress/9302.001.0001
  128. Barthes, Image, Music, Text, 153 (1977)
  129. Herzogenrath, Christina Kubisch Stromzeichnungen / Electrical Drawings: Arbeiten 1974–2008, 9 (2009)
  130. Kim-Cohen, In the Blink of an Ear: Toward a Non-Cochlear Sonic Art, 109 (2013)
  131. Khazam, Wellenfang, 49 (2010)
  132. Cox, Cabinet Magazine, 21, 94 (2006)
  133. Adorno, Essays on Music, 657 (2002)
  134. LaBelle, Sonic Agency: Sound and Emergent Forms of Resistance, 57 (2018)
  135. Gillespie, Media Technologies: Essays on Communication, Materiality, and Society, 168 (2014)
Bibliographic reference Bellanova, Rocco ; González Fuster, Gloria. Composting and computing: On digital security compositions. In: European Journal of International Security, Vol. 4, no.3, p. 345-365 (2019)
Permanent URL http://hdl.handle.net/2078.3/221362