Switch to: Citations

Add references

You must login to add references.
  1. A New Algorithmic Identity.John Cheney-Lippold - 2011 - Theory, Culture and Society 28 (6):164-181.
    Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Data Derivatives.Louise Amoore - 2011 - Theory, Culture and Society 28 (6):24-43.
    In a quiet London office, a software designer muses on the algorithms that will make possible the risk flags to be visualized on the screens of border guards from Heathrow to St Pancras International. There is, he says, ‘real time decision making’ – to detain, to deport, to secondarily question or search – but there is also the ‘offline team who run the analytics and work out the best set of rules’. Writing the code that will decide the association rules (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • Prediction, pre-emption, presumption.Ian Kerr - 2013 - In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 91.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • visibility Before Privacy: A Theological Ethics of Surveillance as Social Sorting.Eric Stoddart - 2014 - Studies in Christian Ethics 27 (1):33-49.
    This article offers a theological ethics of surveillance in its form as social sorting. The skill of visibility is deployed as an analytical device to critique the saliency of privacy rights-talk, given the focus of surveillance having shifted from a panoptic gaze to actionable intelligence. The claim is made that an ideology of normativity and the political categories of ‘evil’ and ‘risky’ persons can be addressed by the notions of relational knowledge, the resurrection of the non-person and the power of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Governmental Topologies of Database Devices.Evelyn Ruppert - 2012 - Theory, Culture and Society 29 (4-5):116-136.
    In business and government, databases contain large quantities of digital transactional data (purchases made, services used, finances transferred, benefits received, licences acquired, borders crossed, tickets purchased). The data can be understood as ongoing and dynamic measurements of the activities and doings of people. In government, numerous database devices have been developed to connect such data across services to discover patterns and identify and evaluate the performance of individuals and populations. Under the UK’s New Labour government, the development of such devices (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Book review: Liquid Surveillance, Moral Blindness: The Loss of Sensitivity in Liquid Modernity. [REVIEW]Robin Vandevoordt - 2014 - Thesis Eleven 123 (1):138-141.
    ‘Tragedy’ is one of those curiously elastic words reserved for life's saddest spheres and events, irrespective of the forms in which they appear. Even though a vast body of genre studies has emerged, however, only a handful of studies have drawn cross-historical comparisons between tragic forms. This essay demonstrates how Walter Benjamin’s reflections on Attic tragedy may contribute to such a line of thought, focusing both on tragedies’ subversive potential and on the social-historical constellations in which they first emerged. In (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations