Switch to: Citations

Add references

You must login to add references.
  1. Potential Politics and the Primacy of Preemption.Brian Massumi - 2007 - Theory and Event 10 (2).
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Biometrics, identification and surveillance.David Lyon - 2008 - Bioethics 22 (9):499-508.
    Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the lived experience of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • (2 other versions)The Philosophy of Money.Georg Simmel - 2004 - Routledge.
    This revised edition of the first complete translation of the seminal work 'Die Philosophie des Geldes' by Georg Simmel includes a new preface by David Frisby.
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  • Data Derivatives.Louise Amoore - 2011 - Theory, Culture and Society 28 (6):24-43.
    In a quiet London office, a software designer muses on the algorithms that will make possible the risk flags to be visualized on the screens of border guards from Heathrow to St Pancras International. There is, he says, ‘real time decision making’ – to detain, to deport, to secondarily question or search – but there is also the ‘offline team who run the analytics and work out the best set of rules’. Writing the code that will decide the association rules (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • A New Algorithmic Identity.John Cheney-Lippold - 2011 - Theory, Culture and Society 28 (6):164-181.
    Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • The Crisis of Invented Money: Liquidity Illusion and the Global Credit Meltdown.Anastasia Nesvetailova - 2010 - Theoretical Inquiries in Law 11 (1):125-147.
    In this Article I argue that the global credit crunch of 2007-2009 is the result of the multifaceted phenomenon of liquidity illusion. Fundamentally, the problem of liquidity illusion derives from the hollow conceptualization of "liquidity" in mainstream financial theory and practice. Represented most recently by the market completion theory, this paradigm has led to a widespread misunderstanding of the dynamics of the relationship between the process of financial innovation and the liquidity of the financial system. In order to unpack the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Conflicting Codes and Codings.Marc Lenglet - 2011 - Theory, Culture and Society 28 (6):44-66.
    Contemporary financial markets have recently witnessed a sea change with the ‘algorithmic revolution’, as trading automats are used to ease the execution sequences and reduce market impact. Being constantly monitored, they take an active part in the shaping of markets, and sometimes generate crises when ‘they mess up’ or when they entail situations where traders cannot go backwards. Algorithms are software codes coding practices in an IT significant ‘textual’ device, designed to replicate trading patterns. To be accepted, however, they need (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations