Switch to: References

Add citations

You must login to add citations.
  1. Digital Subjectivation and Financial Markets: Criticizing Social Studies of Finance with Lazzarato.Tim Christiaens - 2016 - Big Data and Society 3 (2):1-15.
    The recently rising field of Critical Data Studies is still facing fundamental questions. Among these is the enigma of digital subjectivation. Who are the subjects of Big Data? A field where this question is particularly pressing is finance. Since the 1990s traders have been steadily integrated into computerized data assemblages, which calls for an ontology that eliminates the distinction between human sovereign subjects and non-human instrumental objects. The latter subjectivize traders in pre-conscious ways, because human consciousness runs too slow to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup.Paolo Cardullo - 2015 - Big Data and Society 2 (1).
    The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter, I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Towards data justice? The ambiguity of anti-surveillance resistance in political activism.Jonathan Cable, Arne Hintz & Lina Dencik - 2016 - Big Data and Society 3 (2).
    The Snowden leaks, first published in June 2013, provided unprecedented insights into the operations of state-corporate surveillance, highlighting the extent to which everyday communication is integrated into an extensive regime of control that relies on the ‘datafication’ of social life. Whilst such data-driven forms of governance have significant implications for citizenship and society, resistance to surveillance in the wake of the Snowden leaks has predominantly centred on techno-legal responses relating to the development and use of encryption and policy advocacy around (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Digital phenotyping and the (data) shadow of Alzheimer's disease.Natassia Brenman, Alessia Costa & Richard Milne - 2022 - Big Data and Society 9 (1).
    In this paper, we examine the practice and promises of digital phenotyping. We build on work on the ‘data self’ to focus on a medical domain in which the value and nature of knowledge and relations with data have been played out with particular persistence, that of Alzheimer's disease research. Drawing on research with researchers and developers, we consider the intersection of hopes and concerns related to both digital tools and Alzheimer's disease using the metaphor of the ‘data shadow’. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical intervention into the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Politics of prediction: Security and the time/space of governmentality in the age of big data.Tobias Blanke & Claudia Aradau - 2017 - European Journal of Social Theory 20 (3):373-391.
    From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of (in)security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and big data. Unlike disciplinary and (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Digital, politics, and algorithms: Governing digital data through the lens of data protection.Rocco Bellanova - 2017 - European Journal of Social Theory 20 (3):329-347.
    Many actors mobilize the cognitive, legal and technical tool-box of data protection when they discuss and address controversial issues such as digital mass surveillance. Yet, critical approaches to the digital only barely explore the politics of data protection in relation to data-driven governance. Building on governmentality studies and Actor-Network-Theory, this article analyses the potential and limits of using data protection to critique the ‘digital age’. Using the conceptual tool of dispositifs, it sketches an analytics of data protection and the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The General Data Protection Regulation in the Age of Surveillance Capitalism.Jane Andrew & Max Baker - 2019 - Journal of Business Ethics 168 (3):565-578.
    Clicks, comments, transactions, and physical movements are being increasingly recorded and analyzed by Big Data processors who use this information to trace the sentiment and activities of markets and voters. While the benefits of Big Data have received considerable attention, it is the potential social costs of practices associated with Big Data that are of interest to us in this paper. Prior research has investigated the impact of Big Data on individual privacy rights, however, there is also growing recognition of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Encrypting human rights: The intertwining of resistant voices in the UK state surveillance debate.James Allen-Robertson & Amy Stevens - 2021 - Big Data and Society 8 (1).
    The Snowden revelations in 2013 redrew the lines of debate surrounding surveillance, exposing the extent of state surveillance across multiple nations and triggering legislative reform in many. In the UK, this was in the form of the Investigatory Powers Act. As a contribution to understanding resistance to expanding state surveillance activities, this article reveals the intertwining of diverse interests and voices which speak in opposition to UK state surveillance. Through a computational topic modelling-based mixed methods analysis of the submissions made (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Security Glitches: The Failure of the Universal Camouflage Pattern and the Fantasy of “Identity Intelligence”.Rebecca A. Adelman - 2018 - Science, Technology, and Human Values 43 (3):431-463.
    Focusing on the paradoxes revealed in the multibillion dollar mistake of the Universal Camouflage Pattern and the expansive ambit of a leaked National Security Agency briefing on its approach to “identity intelligence,” this article analyzes security glitches arising from the state’s application of mechanized logics to security and visibility. Presuming that a digital-looking pattern would be more deceptive than designs inspired by natural forms, in 2004, the US Army adopted a pixelated “digital” camouflage pattern, a print that rendered soldiers more, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Crowd-sourcing the smart city: Using big geosocial media metrics in urban governance.Matthew Zook - 2017 - Big Data and Society 4 (1).
    Using Big Data to better understand urban questions is an exciting field with challenging methodological and theoretical problems. It is also, however, potentially troubling when Big Data is applied uncritically to urban governance via the ideas and practices of “smart cities”. This essay reviews both the historical depth of central ideas within smart city governance —particular the idea that enough data/information/knowledge can solve society problems—but also the ways that the most recent version differs. Namely, that the motivations and ideological underpinning (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Data and agency.Jose van Dijck, Thomas Poell & Helen Kennedy - 2015 - Big Data and Society 2 (2).
    This introduction to the special issue on data and agency argues that datafication should not only be understood as the process of collecting and analysing data about Internet users, but also as feeding such data back to users, enabling them to orient themselves in the world. It is important that debates about data power recognise that data is also generated, collected and analysed by alternative actors, enhancing rather than undermining the agency of the public. Developing this argument, we first make (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Data feminism and border ethics: power, invisibility and indeterminacy.Georgiana Turculet - 2023 - Journal of Global Ethics 19 (3):323-334.
    Human activities are being increasingly regulated by means of technologies. Smart borders regulating human movement are no exception. I argue that the process of digitization – including through AI, Big Data and algorithmic processing – falls short of respecting (fundamental) rights to the extent to which it ignores what I term to be the problem of indeterminacy. While adopting a data feminist approach in this paper, assuming that data is the ‘new oil’, that is power, I begin theorizing indeterminacy from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Developing an Online Data Ethics Module Informed by an Ecology of Data Perspective.Xiaofeng Tang, Eduardo Mendieta & Thomas A. Litzinger - 2022 - Science and Engineering Ethics 28 (2):1-22.
    A self-perceived lack of training in ethical theories and related pedagogy has kept many engineering faculty members from teaching data ethics, an important aspect of engineering research that has become more salient in recent years. This paper describes the development of a module, which includes concepts, cases, policies, and best practices, to support the teaching of ethical data practice. Based on a user-oriented design approach and a moral literacy framework, the module was designed to be used in different courses and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Wireless Heart Patients and the Quantified Self.Mette Nordahl Svendsen & Julie Christina Grew - 2017 - Body and Society 23 (1):64-90.
    Remote monitoring of implantable cardioverter defibrillator (ICD) patients links patients wirelessly to the clinic via a box in their bedroom. The box transmits data from the ICD to a remote database accessible to clinicians without patient involvement. Data travel across time and space; clinicians can monitor patients from a distance and instantly know about cardiac events. Based on ethnographic fieldwork in two Danish hospitals, this article explores the configuration of the wireless ICD patient by following a number of patients through (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network.James Stewart & Ben Collier - 2022 - Science, Technology, and Human Values 47 (5):910-936.
    This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of “privacy worlds” to explore the values and design practices of the engineers of one of the world’s most notable privacy technologies: the Tor network. By following Tor’s design and development we show a privacy world emerging—one centered on a construction of privacy understood through the topology of structural power in the Internet backbone. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Algorithmic paranoia: the temporal governmentality of predictive policing.Bonnie Sheehey - 2019 - Ethics and Information Technology 21 (1):49-58.
    In light of the recent emergence of predictive techniques in law enforcement to forecast crimes before they occur, this paper examines the temporal operation of power exercised by predictive policing algorithms. I argue that predictive policing exercises power through a paranoid style that constitutes a form of temporal governmentality. Temporality is especially pertinent to understanding what is ethically at stake in predictive policing as it is continuous with a historical racialized practice of organizing, managing, controlling, and stealing time. After first (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Out of Proportion? On Surveillance and the Proportionality Requirement.Kira Vrist Rønn & Kasper Lippert-Rasmussen - 2020 - Ethical Theory and Moral Practice 23 (1):181-199.
    In this article, we critically scrutinize the principle of proportionality when used in the context of security and government surveillance. We argue that McMahan’s distinction from just warfare between narrow proportionality and wide proportionality can generally apply to the context of surveillance. We argue that narrow proportionality applies more or less directly to cases in which the surveilled is liable and that the wide proportionality principle applies to cases characterized by ‘collateral intrusion’. We argue, however, that a more demanding criterion (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Liberal luxury: Decentering Snowden, surveillance and privilege.Piro Rexhepi - 2016 - Big Data and Society 3 (2).
    This paper reflects on the continued potency of veillance theories to traverse beyond the taxonomies of surveillance inside liberal democracies. It provides a commentary on the ability of sousveillance to destabilise and disrupt suer/violence by shifting its focus from the centre to the periphery, where Big Data surveillance is tantamount to sur/violence. In these peripheral political spaces, surveillance is not framed by concerns over privacy, democracy and civil society; rather, it is a matter of life and death, a technique of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Materialities of digital disease control in Taiwan during COVID-19.Sung-Yueh Perng - 2022 - Big Data and Society 9 (1).
    During the course of the COVID-19 pandemic, a wide range of digital technologies and data analytics have been incorporated into pandemic response models globally, in the hope of better detecting, tracking, monitoring and containing outbreaks. This increased digital involvement in disease control has offered the prospect of heightened effectiveness in all of the above, but not without raising other concerns. This paper contributes to ongoing discussions of the digital transformation in disease control by proposing a materialist analysis of how such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Politics of Whistleblowing in Digitalized Societies.Thomas Olesen - 2019 - Politics and Society 47 (2):277-297.
    Works on whistleblowing are overwhelmingly found within disciplines such as business ethics, law, and the professions. Despite its undeniable political and social effects, it is surprisingly understudied in political science and sociology. Recent cases such as those of Chelsea Manning, Edward Snowden, Christopher Wylie, and the Panama Papers should prompt political scientists and sociologists to engage systematically with the phenomenon. This article offers a theoretically driven discussion of three complementary questions. What kind of political action is whistleblowing? What are its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical and Legal First Amendment Implications of FBI v. Apple: A Commentary on Etzioni’s ‘Apple: Good Business, Poor Citizen?’.Richard P. Nielsen - 2018 - Journal of Business Ethics 151 (1):17-28.
    This commentary proceeds as follows. First, it is argued from both ethical and legal perspectives through an analysis of Court precedents that Etzioni’s has improperly developed a too narrow First Amendment interpretation and conclusion that Apple should comply with the FBI’s demand to provide the FBI with a key to open iPhones. That is, broad First Amendment considerations and not solely narrow First Amendment “compelled speech” or only Fourth Amendment privacy issues are offered and analyzed from both ethical and legal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Algorithmic paranoia and the convivial alternative.Dan McQuillan - 2016 - Big Data and Society 3 (2).
    In a time of big data, thinking about how we are seen and how that affects our lives means changing our idea about who does the seeing. Data produced by machines is most often ‘seen’ by other machines; the eye is in question is algorithmic. Algorithmic seeing does not produce a computational panopticon but a mechanism of prediction. The authority of its predictions rests on a slippage of the scientific method in to the world of data. Data science inherits some (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Conceptualising the right to data protection in an era of Big Data.Yvonne McDermott - 2017 - Big Data and Society 4 (1).
    In 2009, with the enactment of the Lisbon Treaty, the Charter of Fundamental Rights of the European Union entered into force. Under Article 8 of the Charter, for the first time, a stand-alone fundamental right to data protection was declared. The creation of this right, standing as a distinct right to the right to privacy, is undoubtedly significant, and it is unique to the European legal order, being absent from other international human rights instruments. This commentary examines the parameters of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Challenging algorithmic profiling: The limits of data protection and anti-discrimination in responding to emergent discrimination.Tobias Matzner & Monique Mann - 2019 - Big Data and Society 6 (2).
    The potential for biases being built into algorithms has been known for some time, yet literature has only recently demonstrated the ways algorithmic profiling can result in social sorting and harm marginalised groups. We contend that with increased algorithmic complexity, biases will become more sophisticated and difficult to identify, control for, or contest. Our argument has four steps: first, we show how harnessing algorithms means that data gathered at a particular place and time relating to specific persons, can be used (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • The needle and the damage done: Of haystacks and anxious panopticons.Sarah Logan - 2017 - Big Data and Society 4 (2).
    How should we understand the surveillance state post Snowden? This paper is concerned with the relationship between increased surveillance capacity and state power. The paper begins by analysing two metaphors used in public post Snowden discourse to describe state surveillance practices: the haystack and the panopticon. It argues that these metaphors share a flawed common entailment regarding surveillance, knowledge and power which cannot accurately capture important aspects of state anxiety generated by mass surveillance in an age of big data. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Women’s Bodies and the Evolution of Anti-rape Technologies: From the Hoop Skirt to the Smart Frock.Robyn Lincoln, Alex Bevan & Caroline Wilson-Barnao - 2021 - Body and Society 27 (4):30-54.
    In this article, we explore smart deterrents and their historical precedents marketed to women and girls for the purpose of preventing harassment, sexual abuse and violence. Rape deterrents, as we define them, encompass customs, architectures, fashions, surveillant infrastructures, apps and devices conceived to manage and protect the body. Online searches reveal an array of technologies, and we engage with their prevention narratives and cultural construction discourses of the gendered body. Our critical analysis places recent rape deterrents in conversation with earlier (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Infosphere, Datafication, and Decision-Making Processes in the AI Era.Andrea Lavazza & Mirko Farina - 2023 - Topoi 42 (3):843-856.
    A recent interpretation of artificial intelligence (AI) (Floridi 2013, 2022) suggests that the implementation of AI demands the investigation of the binding conditions that make it possible to build and integrate artifacts into our lived world. Such artifacts can successfully interact with the world because our environment has been designed to be compatible with intelligent machines (such as robots). As the use of AI becomes ubiquitous in society, possibly leading to the formation of increasingly intelligent bio-technological unions, there will likely (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Chilling Effects of Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda.Michael Latzer, Noemi Festic & Moritz Büchi - 2022 - Big Data and Society 9 (1).
    People's sense of being subject to digital dataveillance can cause them to restrict their digital communication behavior. Such a chilling effect is essentially a form of self-censorship in everyday digital media use with the attendant risks of undermining individual autonomy and well-being. This article combines the existing theoretical and limited empirical work on surveillance and chilling effects across fields with an analysis of novel data toward a research agenda. The institutional practice of dataveillance—the automated, continuous, and unspecific collection, retention, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Recalibration in counting and accounting practices: Dealing with algorithmic output in public and private.Lotta Björklund Larsen & Farzana Dudhwala - 2019 - Big Data and Society 6 (2).
    Algorithms are increasingly affecting us in our daily lives. They seem to be everywhere, yet they are seldom seen by the humans dealing with the consequences that result from them. Yet, in recent theorisations, there is a risk that the algorithm is being given too much prominence. This article addresses the interaction between algorithmic outputs and the humans engaging with them by drawing on studies of two distinct empirical fields – self-quantification and audit controls of taxpayers. We explore recalibration as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The old in the new: Voter surveillance in political clientelism and datafied campaigning.Isabel Kusche - 2020 - Big Data and Society 7 (1).
    This article compares political clientelism and datafied campaigning as two modes of relating politicians/parties and voters that are centred around voter surveillance. It contributes to the discussion on consequences of Big Data by showing similarities of datafied campaigns with a type of electoral politics that pre-dates the advent of mass media and is usually regarded as deficient. It thus departs from the predominant perspective on datafication and surveillance, which draws on Foucault, in order to identify the particular challenges that datafication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Expectations of artificial intelligence and the performativity of ethics: Implications for communication governance.John D. Kelleher, Marguerite Barry & Aphra Kerr - 2020 - Big Data and Society 7 (1).
    This article draws on the sociology of expectations to examine the construction of expectations of ‘ethical AI’ and considers the implications of these expectations for communication governance. We first analyse a range of public documents to identify the key actors, mechanisms and issues which structure societal expectations around artificial intelligence and an emerging discourse on ethics. We then explore expectations of AI and ethics through a survey of members of the public. Finally, we discuss the implications of our findings for (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • ‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance.Becky Kazansky - 2021 - Big Data and Society 8 (1).
    While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements. The how and why of potential surveillance are thus wrapped in a form of continuously produced uncertainty. How then, do affected groups and individuals determine how to counter the threats and harms of surveillance? Responding to an interdisciplinary (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Democratizing cognitive technology: a proactive approach.Marcello Ienca - 2019 - Ethics and Information Technology 21 (4):267-280.
    Cognitive technology is an umbrella term sometimes used to designate the realm of technologies that assist, augment or simulate cognitive processes or that can be used for the achievement of cognitive aims. This technological macro-domain encompasses both devices that directly interface the human brain as well as external systems that use artificial intelligence to simulate or assist (aspects of) human cognition. As they hold the promise of assisting and augmenting human cognitive capabilities both individually and collectively, cognitive technologies could produce, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Restricting digital sites of dissent: commercial social media and free expression.Arne Hintz - 2016 - Critical Discourse Studies 13 (3):325-340.
    ABSTRACTThe widespread use of commercial social media platforms by protesters and activists has enhanced protest mobilisation and reporting but it has placed social media providers in the intermediary role as facilitators of dissent and has thereby created new challenges. Companies like Google and Facebook are increasingly restricting content that is published on or distributed through their platforms; they have been subject to obstruction by governments; and their services have been at the core of large-scale data collection and surveillance. This article (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The ghost in the legal machine: algorithmic governmentality, economy, and the practice of law.Adam Harkens - 2018 - Journal of Information, Communication and Ethics in Society 16 (1):16-31.
    PurposeThis paper aims to investigate algorithmic governmentality – as proposed by Antoinette Rouvroy – specifically in relation to law. It seeks to show how algorithmic profiling can be particularly attractive for those in legal practice, given restraints on time and resources. It deviates from Rouvroy in two ways. First, it argues that algorithmic governmentality does not contrast with neoliberal modes of government in that it allows indirect rule through economic calculations. Second, it argues that critique of such systems is possible, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An invitation to critical social science of big data: from critical theory and critical research to omniresistance.Ulaş Başar Gezgin - 2020 - AI and Society 35 (1):187-195.
    How a social science of big data would look like? In this article, we exemplify such a social science through a number of cases. We start our discussion with the epistemic qualities of big data. We point out to the fact that contrary to the big data champions, big data is neither new nor a miracle without any error nor reliable and rigorous as assumed by its cheer leaders. Secondly, we identify three types of big data: natural big data, artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
    PurposeThis paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.Design/methodology/approachThe authors conducted two focus groups with a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Framing Big Data: The discursive construction of a radio cell query in Germany.Charlotte Fischer & Christian Pentzold - 2017 - Big Data and Society 4 (2).
    The article examines the construction of “Big Data” in media discourse. Rather than asking what Big Data really is or is not, it deals with the discursive work that goes into making Big Data a socially relevant phenomenon and problem in the first place. It starts from the idea that in modern societies the public understanding of technology is largely driven by a media-based discourse, which is a key arena for circulating collectively shared meanings. This largely ignored dimension invites us (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Surveillance, Privacy and the Making of the Modern Subject: Habeas what kind of Corpus?Charlotte Epstein - 2016 - Body and Society 22 (2):28-57.
    In this article I consider how our experiences of bodily privacy are changing in the contemporary surveillance society. I use biometric technologies as a lens for tracking the changing relationships between the body and privacy. Adopting a broader genealogical perspective, I retrace the role of the body in the constitution of the modern liberal political subject. I consider two different understandings of the subject, the Foucauldian political subject, and the Lacanian psychoanalytic subject. The psychoanalytic perspective serves to appraise the importance (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation