Securing with algorithms: Knowledge, decision, sovereignty
暂无分享,去创建一个
[1] Priya Dixit. Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .
[2] Claudia Aradau. Making Things International 2: Catalysts and Reactions , 2016 .
[3] M. Cooper. Life as Surplus: Biotechnology and Capitalism in the Neoliberal Era , 2008 .
[4] G. Sullivan,et al. The politics of security lists , 2016 .
[5] Rebecca Lemov. Database of Dreams: The Lost Quest to Catalog Humanity , 2015 .
[6] L. Parisi. Contagious Architecture: Computation, Aesthetics, and Space , 2013 .
[7] Luke Harding,et al. The Snowden Files: The Inside Story of the World's Most Wanted Man , 2014 .
[8] Donna Harawy. Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective , 2022, Philosophical Literary Journal Logos.
[9] Louise Amoore. Cloud geographies , 2018, Cognitive Code.
[10] K. Crawford,et al. Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms , 2013 .
[11] Andrew Hoskins,et al. How we think: digital media and contemporary technogenesis , 2014 .
[12] Charlotte Heath-Kelly. Algorithmic autoimmunity in the NHS: Radicalisation and the clinic , 2017 .
[13] Ian R. Kerr,et al. Robot Law , 2016 .
[14] Ted Striphas. Algorithmic culture , 2015 .
[15] B. Anderson. Preemption, precaution, preparedness: Anticipatory action and future geographies , 2010 .
[16] Ian G.R. Shaw,et al. Predator Empire: Drone Warfare and Full Spectrum Dominance , 2016 .
[17] Lisa Parks,et al. Drones, Vertical Mediation, and the Targeted Class , 2022, Feminist Studies.
[18] Judy L. Klein,et al. How Reason Almost Lost Its Mind: The Strange Career of Cold War Rationality , 2013 .
[19] Mark B. Salter,et al. Making Things International 2: Catalysts and Reactions , 2016 .
[20] Glenn Greenwald,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .
[21] Pablo J. Boczkowski,et al. The Relevance of Algorithms , 2013 .
[22] Eric Gossett,et al. Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .
[23] Silvia Mollicchi,et al. Flatness versus depth: A study of algorithmically generated camouflage , 2017 .
[24] Richard A. Grusin. Premediation: Affect and Mediality After 9/11 , 2010 .
[25] J. Tambling. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics by N. Katherine Hayles (review) , 2001, Modern Language Review.
[26] M. Goede. Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .
[27] D. Gregory. From a View to a Kill , 2011 .
[28] Lauren Wilcox. Embodying algorithmic war: Gender, race, and the posthuman in drone warfare , 2017 .
[29] Jonathan Crary,et al. 24/7: Late Capitalism and the Ends of Sleep , 2013 .
[30] Peter Galison. The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision , 1994, Critical Inquiry.
[31] S. Elden. Secure the volume: Vertical geopolitics and the depth of power , 2013 .
[32] Benjamin H. Bratton,et al. The Stack: On Software and Sovereignty , 2016 .
[33] P. W. Singer,et al. Wired for War: The Robotics Revolution and Conflict in the 21st Century , 2009 .
[34] Claudia Aradau,et al. Politics of Catastrophe: Genealogies of the Unknown , 2011 .
[35] Louise Amoore,et al. The Politics of Possibility: Risk and Security Beyond Probability , 2013 .
[36] Nick Lally,et al. Crowdsourced surveillance and networked data , 2017 .
[37] Andra Giurgiu,et al. No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .
[38] Viktor Mayer-Schnberger,et al. Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2013 .
[39] Orit Halpern. Beautiful Data: A History of Vision and Reason since 1945 , 2015 .
[40] Stefan Elbe,et al. Catching the flu: Syndromic surveillance, algorithmic governmentality and global health security , 2017 .