4.3 Article

The algorithmic regulation of security: An infrastructural perspective

期刊

REGULATION & GOVERNANCE
卷 16, 期 1, 页码 102-118

出版社

WILEY
DOI: 10.1111/rego.12338

关键词

algorithmic regulation; data; infrastructure; PNR; security; TFTP

资金

  1. European Research Council (ERC) under the European Union [ERC-2015-CoG 682317]

向作者/读者索取更多资源

This article contributes to the debates on algorithmic regulation in the context of security. It examines the implementation of algorithmic regulation through analyzing the transatlantic data infrastructures of the EU-U.S. Passenger Name Records and Terrorism Financing Tracking Program programs. The article explores how specific data are rendered transferable and meaningful in a security context and examines the integration of public values into international data infrastructures. Additionally, it highlights the emergence of new modes of standard setting and questions the practical effects of operationalizing public values through infrastructural choices.
This article contributes to debates on algorithmic regulation by focusing on the domain of security. It develops aninfrastructuralperspective, by analyzing how algorithmic regulation is enacted through the custom-built transatlantic data infrastructures of the EU-U.S. Passenger Name Records and Terrorism Financing Tracking Program programs. Concerning regulationthroughalgorithms, this approach analyzes how specific, commercial data are rendered transferable and meaningful in a security context. Concerning the regulationofalgorithms, an infrastructural perspective examines how public values like privacy and accountability are built into international data infrastructures. The creation of data infrastructures affects existing modes of governance and fosters novel power relations among public and private actors. We highlightemergentmodes of standard setting, thus enriching Yeung's (2018) taxonomy, and question the practical effects of operationalizing public values through infrastructural choices. Ultimately, the article offers a critical reading of algorithmic security, and how it materially, legally, and politically supports specific ways of doing security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据