A New Algorithmic Identity

Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an analysis of coded computer algorithms enables a supplement to Foucauldian thinking around biopolitics and biopower, of what I call soft biopower and soft biopolitics. These new conceptual devices allow us to better understand the workings of biopower at the level of the category, of using computer code, statistics and surveillance to construct categories within populations according to users’ surveilled internet history. Finally, the article will think through the nuanced ways that algorithmic inference works as a mode of control, of processes of identification that structure and regulate our lives online within the context of online marketing and algorithmic categorization.

[1]  Wendy H. Chun Control and Freedom: Power and Paranoia in the Age of Fiber Optics , 2005 .

[2]  N. Rose Inventing our Selves: Psychology, Power, and Personhood , 1996 .

[3]  S. Graham Software-sorted geographies , 2005 .

[4]  Ben Gerson The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture , 2005 .

[5]  Shlomo Argamon,et al.  Automatically Categorizing Written Texts by Author Gender , 2002, Lit. Linguistic Comput..

[6]  M. Foucault,et al.  The Order of Things , 2017 .

[7]  Matthew Fuller,et al.  Software Studies: a lexicon , 2008 .

[8]  Lisa Nakamura Cybertypes: Race, Ethnicity, and Identity on the Internet , 2002 .

[9]  Lois McNay Self as Enterprise , 2009 .

[10]  Louise Amoore,et al.  Biometric borders: Governing mobilities in the war on terror , 2006 .

[11]  V. Mosco political economy of communication , 1996 .

[12]  Angel J. Gordo-Lpez,et al.  Inventing our selves: Psychology, power, and personhood , 2000 .

[13]  Alexander Galloway,et al.  Protocol, or, How Control Exists after Decentralization , 2001 .

[14]  A. Arvidsson Brands: Meaning and Value in Media Culture , 2006 .

[15]  C. Webster,et al.  CCTV policy in the UK: Reconsidering the evidence base , 2009 .

[16]  D. Lyon Surveillance after September 11 , 2001 .

[17]  N. Rose Powers of Freedom: Reframing Political Thought , 1999 .

[18]  Stephen J. Collier Topologies of Power , 2009 .

[19]  Eugene Thacker Foreword: Protocol Is as Protocol Does , 2004 .

[20]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[21]  Joseph Turow,et al.  Niche Envy: Marketing Discrimination in the Digital Age , 2006 .

[22]  Nikolas Rose,et al.  Powers of Freedom: Contents , 1999 .

[23]  D. Macey Rethinking Biopolitics, Race and Power in the Wake of Foucault , 2009 .

[24]  Ingmar Weber,et al.  The demographics of web search , 2010, SIGIR.

[25]  Matthew Fuller,et al.  Behind the Blip: Essays on the Culture of Software , 2003 .

[26]  Sean P. Hier Probing the Surveillant Assemblage: on the dialectics of surveillance practices as processes of social control. , 2002 .

[27]  N. Rose Government and control , 2000 .

[28]  O. Gandy The Panoptic Sort: A Political Economy of Personal Information. Critical Studies in Communication and in the Cultural Industries. , 1993 .

[29]  Heidi Mork Lomell Targeting the Unwanted: Video Surveillance and Categorical Exclusion in Oslo, Norway , 2002 .

[30]  J. Revel Identity, Nature, Life , 2009 .