Toward a Critique of Algorithmic Violence external link

Bellanova, R., Irion, K., Lindskov Jacobsen, K., Ragazzi, F., Saugmann, R. & Suchman, L.
International Political Sociology, vol. 15, num: 1, pp: 121–150, 2021

Abstract

Questions about how algorithms contribute to (in)security are under discussion across international political sociology. Building upon and adding to these debates, our collective discussion foregrounds questions about algorithmic violence. We argue that it is important to examine how algorithmic systems feed (into) specific forms of violence, and how they justify violent actions or redefine what forms of violence are deemed legitimate. Bringing together different disciplinary and conceptual vantage points, this collective discussion opens a conversation about algorithmic violence focusing both on its specific instances and on the challenges that arise in conceptualizing and studying it. Overall, the discussion converges on three areas of concern—the violence undergirding the creation and feeding of data infrastructures; the translation processes at play in the use of computer/machine vision across diverse security practices; and the institutional governing of algorithmic violence, especially its organization, limitation, and legitimation.

affordences, algorithmic violence, Artificial intelligence, cloud computing, frontpage, governance, harm, interdisciplinary, machine learning

Bibtex

Article{Bellanova2021, title = {Toward a Critique of Algorithmic Violence}, author = {Bellanova, R. and Irion, K. and Lindskov Jacobsen, K. and Ragazzi, F. and Saugmann, R. and Suchman, L.}, doi = {https://doi.org/https://doi.org/10.1093/ips/olab003}, year = {0329}, date = {2021-03-29}, journal = {International Political Sociology}, volume = {15}, number = {1}, pages = {121–150}, abstract = {Questions about how algorithms contribute to (in)security are under discussion across international political sociology. Building upon and adding to these debates, our collective discussion foregrounds questions about algorithmic violence. We argue that it is important to examine how algorithmic systems feed (into) specific forms of violence, and how they justify violent actions or redefine what forms of violence are deemed legitimate. Bringing together different disciplinary and conceptual vantage points, this collective discussion opens a conversation about algorithmic violence focusing both on its specific instances and on the challenges that arise in conceptualizing and studying it. Overall, the discussion converges on three areas of concern—the violence undergirding the creation and feeding of data infrastructures; the translation processes at play in the use of computer/machine vision across diverse security practices; and the institutional governing of algorithmic violence, especially its organization, limitation, and legitimation.}, keywords = {affordences, algorithmic violence, Artificial intelligence, cloud computing, frontpage, governance, harm, interdisciplinary, machine learning}, }

Your Digital Home is No Longer Your Castle: How Cloud Computing Transforms the (Legal) Relationship between Individuals and Their Personal Records external link

International Journal of Law and Information Technology, vol. 23, num: 4, pp: 348-371., 2015

Abstract

In line with the overall trend individuals’ personal affairs, too, are composed of digital records to an increasing amount. At about the same time, the era of local storage in end user equipment is about to give way to remote computing where data resides on third party equipment (cloud computing). Once information, and even the most personal one, is no longer stored on personal equipment the relationship between individual users and their digital assets belonging to them is becoming increasingly abstract. This contribution focuses on the implications of cloud computing for individuals’ unpublicized digital records. The question to be answered is whether - taken together - the progressing virtualization and the disruption of physical control produce a backslide for individual positions of rights. The paper introduces the legal treatment of users’ digital personal records and how a technical transformation in combination with disparate legal protection and prevailing commercial practices are bound to impact the distribution of rights and obligations.

cloud computing, Consumer law, control, EU law, Grondrechten, Privacy, security

Bibtex

Article{nokey, title = {Your Digital Home is No Longer Your Castle: How Cloud Computing Transforms the (Legal) Relationship between Individuals and Their Personal Records}, author = {Irion, K.}, url = {http://www.ivir.nl/publicaties/download/1584.pdf}, doi = {https://doi.org/10.1093/ijlit/eav015}, year = {0929}, date = {2015-09-29}, journal = {International Journal of Law and Information Technology}, volume = {23}, number = {4}, pages = {348-371.}, abstract = {In line with the overall trend individuals’ personal affairs, too, are composed of digital records to an increasing amount. At about the same time, the era of local storage in end user equipment is about to give way to remote computing where data resides on third party equipment (cloud computing). Once information, and even the most personal one, is no longer stored on personal equipment the relationship between individual users and their digital assets belonging to them is becoming increasingly abstract. This contribution focuses on the implications of cloud computing for individuals’ unpublicized digital records. The question to be answered is whether - taken together - the progressing virtualization and the disruption of physical control produce a backslide for individual positions of rights. The paper introduces the legal treatment of users’ digital personal records and how a technical transformation in combination with disparate legal protection and prevailing commercial practices are bound to impact the distribution of rights and obligations.}, keywords = {cloud computing, Consumer law, control, EU law, Grondrechten, Privacy, security}, }