diff --git a/canvas.html b/canvas.html index 71227ad..34a671b 100644 --- a/canvas.html +++ b/canvas.html @@ -44,7 +44,7 @@ margin: 0.5rem auto; } - .anchor{ + .anchor { cursor: pointer; } @@ -80,10 +80,45 @@ top: 0; } - div[data-custom-style='Body Text'] p{ + + div[data-custom-style='Body Text'] p { padding: 1em 0; margin: 0; - background-color: rgba(255,255,255, 0.8); + background-color: rgba(255, 255, 255, 0.8); + } + + .anchor{ + position: relative; + } + + .anchor.active:not(.playing)::before{ + content:'⏵'; + position: absolute; + width: 40px; + height: 40px; + background:gray; + left: calc(50% - 20px); + top: calc(50% - 20px); + vertical-align: middle; + line-height: 35px; + border-radius: 5px; + color:white; + } + .anchor.active:not(.playing):hover::before{ + background:black + } + .anchor.playing:hover::before{ + content:'⏸︎'; + position: absolute; + width: 40px; + height: 40px; + background:black; + left: calc(50% - 20px); + top: calc(50% - 20px); + vertical-align: middle; + line-height: 35px; + border-radius: 5px; + color:white; } @@ -116,13 +151,21 @@ } div.controls{display:none !important;}` ); - console.log(sheet, sheet.rules) function easeInOutQuart(x) { return x < 0.5 ? 8 * x * x * x * x : 1 - Math.pow(-2 * x + 2, 4) / 2; } + function easeInOutBack(x) { + const c1 = 1.70158; + const c2 = c1 * 1.525; + + return x < 0.5 + ? (Math.pow(2 * x, 2) * ((c2 + 1) * 2 * x - c2)) / 2 + : (Math.pow(2 * x - 2, 2) * ((c2 + 1) * (x * 2 - 2) + c2) + 2) / 2; + + } let scroll_offsets = [] @@ -154,10 +197,11 @@ paths.forEach((el) => el.style.strokeDasharray = Math.ceil(el.getTotalLength()) + 'px'); const lastAnchorEl = anchorEls[anchorEls.length - 1]; - console.log(lastAnchorEl) for (const anchorEl of anchorEls) { anchorEl.addEventListener('click', ev => playerEls[anchorEl.dataset.i].annotator.playPause()); + playerEls[anchorEl.dataset.i].annotator.addEventListener('play', ev => anchorEl.classList.add('playing')); + playerEls[anchorEl.dataset.i].annotator.addEventListener('pause', ev => anchorEl.classList.remove('playing')); } for (const player of playerEls) { player.shadowRoot.adoptedStyleSheets = [sheet]; @@ -182,7 +226,7 @@ let source_pos, target_pos, source_scale, target_scale, source_color, target_color, source_x_offset, target_x_offset; - const x_column_width = window.innerWidth - document.body.getBoundingClientRect().width+200; // for some reason the 200 is neccesary + const x_column_width = window.innerWidth - document.body.getBoundingClientRect().width + 200; // for some reason the 200 is neccesary const x_center_map = x_column_width / 2; const x_center_column = document.body.getBoundingClientRect().left + document.body.getBoundingClientRect().width / 2; @@ -231,6 +275,7 @@ const t = Math.min(1, Math.max(0, (center_y - prev[0]) / (next[0] - prev[0]))) t_ease = easeInOutQuart(t) + // t_ease = easeInOutBack(t) const dx = target_pos[0] - source_pos[0]; const dy = target_pos[1] - source_pos[1]; @@ -246,7 +291,6 @@ y = -1 * (source_pos[1] + dy * t_ease) * scale + window.innerHeight / 2; const color = (target_color - source_color) * t_ease + source_color - console.log(sheet) // sheet.rules[0].style.setProperty('--override-color', `rgba(${color},${color},${color},0.7)`); sheet.rules[0].style.setProperty('--disactive-path', `rgba(${color},${color},${color},0.7)`); @@ -259,11 +303,11 @@ else { // no paths paths.forEach((el, idx) => { - if (idx >= step_idx ) { + if (idx >= step_idx) { el.style.strokeDashoffset = Math.ceil(el.getTotalLength()) + 'px'; - } else if (idx == step_idx-1 ) { + } else if (idx == step_idx - 1) { // console.log('anim', el) - el.style.strokeDashoffset = Math.ceil(el.getTotalLength() - el.getTotalLength()*t_ease) + 'px'; + el.style.strokeDashoffset = Math.ceil(el.getTotalLength() - el.getTotalLength() * t_ease) + 'px'; } else { el.style.strokeDashoffset = 0; } @@ -282,7 +326,6 @@ // calculate whether we're nearing the conlusion, and color accordingly const last = Math.max(...Array.from(anchorEls).map((e) => e.getBoundingClientRect().bottom)) - console.log(last) if (last < 0) { for (const playerEl of playerEls) { playerEl.classList.add('ending') @@ -307,7 +350,7 @@ let options = { // root: document.querySelector("#scrollArea"), // viewport by default - rootMargin: `${-Math.round(innerHeight / 3)}px`, //"0px", + rootMargin: `${-Math.floor((window.innerHeight-10) / 2)}px 0px`, //"0px", threshold: 0, }; @@ -320,10 +363,12 @@ } playerEl = windowEl.children[index]; if (entry.isIntersecting) { + entry.target.classList.add('active'); playerEl.classList.add('active') } else { + entry.target.classList.remove('active'); playerEl.classList.remove('active') - if(typeof playerEl.annotator.paused !== 'undefined' && !playerEl.annotator.paused){ + if (typeof playerEl.annotator.paused !== 'undefined' && !playerEl.annotator.paused) { console.log('pause', playerEl.annotator, playerEl.annotator.paused) playerEl.annotator.pause() } @@ -335,7 +380,7 @@ for (const anchorEl of anchorEls) { observer.observe(anchorEl) } - console.log(anchorEls) + // console.log(anchorEls) // .forEach(el => observer.observe()); @@ -470,6 +515,8 @@
+

.... this is a demo to showcase how the chronodiagramming looks like in its interactive form. Please note + that this demo of the interface is not compatible with mobile devices ...

3. Managing error: from the sublime to the risky algorithm

@@ -835,6 +882,602 @@ visibilization, invisibilization, responsibility and accountability.

+
+
+

A diagram of research

+
+

In this conclusion, we reflect upon a final dimension of the method + of diagraming in the context of figurations and configurations: its + potential as an alternative to the conventional research program.

+
+
+

While writing this text, indeed, the search for a coherent structure + through which we could map the problems that emerged from analyzing the + diagrams in a straightforward narrative proved elusive. We considered + various organizational frameworks, but consistently encountered + resistance from one or two sections. It became evident that our + interviews yielded a rhizome of interrelated problems, creating a + multitude of possible inquiries and overlapping trajectories. Some + dimensions of these problems are related, but not to every problem.

+
+
+

If we take for example the understanding of algorithmic security + vision as practices of error management as a starting point, we see how + the actors we interviewed have incorporated the societal critique of + algorithmic bias. This serves as a catalyst for novel strategies aimed + at mitigating the repercussions of imperfect systems. The societal + critique has driven the development of synthetic datasets, which promise + equitable representation across diverse demographic groups. It has also + been the reason for the reliance on institutionalized benchmarks to + assess the impartiality of algorithms. Moreover, different + configurations of the human-in-the-loop emerge, all promised to rectify + algorithmic fallibility. We see a causal chain there.

+
+
+

But how does the question of algorithmic error relate to the shift + from photographic to cinematic vision that algorithmic security vision + brings about? Certainly, there are reverberations. The relegation of + stable identity that we outlined, could be seen as a way to mitigate the + impact of those errors. But it would be a leap to identify these + questions of error as the central driver for the increased incorporation + of moving images in algorithmic security vision.

+
+
+

However, if we take as our starting point the formidable strides in + computing power and the advancements in camera technologies, we face + similar problems. These developments make the analysis of movement + possible while helping to elucidate the advances in the real-time + analysis that are required to remove the human-in-the-loop, as trialed + in the Burglary-Free Neighborhood. These developments account for the + feasibility of the synthetic data generation, a computing-intense + process which opens a vast horizon of possibilities for developers to + detect objects or actions. Such an account, however, does not address + the need for such a synthetic dataset. A focus on the computation of + movement, however, would highlight how a lack of training data + necessitates many of the practices described. Synthetic data is + necessitated by the glaring absence of pre-existing security datasets + that contain moving bodies. While facial recognition algorithms could be + trained and operated on quickly repurposed photographic datasets of + national identity cards or drivers’ license registries, no dataset for + moving bodies has been available to be repurposed by states or + corporations. This absence of training data requires programmers to + stage scenes for the camera. Thus, while one issue contains echoes of + the other, the network of interrelated problematizations cannot be + flattened into a single narrative.

+
+
+

The constraints imposed by the linear structure of an academic + article certainly necessitate a specific ordering of sections. Yet the + different research directions we highlight form something else. The + multiple figurations analyzed here generate fresh tensions when put in + relation with security and political practices. What appears from the + diagrams is a network of figurations in various configurations. Instead + of a research program, our interviews point toward a larger + research diagram of interrelated questions, which invites us to + think in terms of pathways through this dynamic and evolving network of + relations.

+
+
+
+

References

+
+

Ajana B (2013) Governing Through Biometrics. London: + Palgrave Macmillan UK. DOI: 10.1057/9781137290755.

+
+
+

Amicelle A, Aradau C and Jeandesboz J (2015) Questioning security + devices: Performativity, resistance, politics. Security + Dialogue 46(4): 293–306. DOI: 10.1177/0967010615586964.

+
+
+

Amoore L (2014) Security and the incalculable. Security + Dialogue 45(5). SAGE Publications Ltd: 423–439. DOI: 10.1177/0967010614539719.

+
+
+

Amoore L (2019) Doubt and the algorithm: On the partial accounts of + machine learning. Theory, Culture & Society 36(6). SAGE + Publications Ltd: 147–169. DOI: 10.1177/0263276419851846.

+
+
+

Amoore L (2021) The deep border. Political Geography. + Elsevier: 102547.

+
+
+

Amoore L and De Goede M (2005) Governance, risk and dataveillance in + the war on terror. Crime, Law and Social Change 43(2): 149–173. + DOI: 10.1007/s10611-005-1717-8.

+
+
+

Andersen RS (2015) Remediating Security. 1. oplag. + Ph.d.-serien / københavns universitet, institut for statskundskab. Kbh.: + Københavns Universitet, Institut for Statskundskab.

+
+
+

Andersen RS (2018) The art of questioning lethal vision: Mosse’s + infra and militarized machine vision. In: _Proceeding of EVA + copenhagen 2018_, 2018.

+
+
+

Andrejevic M and Burdon M (2015) Defining the sensor society. + Television & New Media 16(1): 19–36. DOI: 10.1177/1527476414541552. +

+
+
+

Aradau C and Blanke T (2015) The (big) data-security assemblage: + Knowledge and critique. Big Data & Society 2(2): + 205395171560906. DOI: 10.1177/2053951715609066.

+
+
+

Aradau C and Blanke T (2018) Governing others: Anomaly and the + algorithmic subject of security. European Journal of International + Security 3(1). Cambridge University Press: 1–21. DOI: 10.1017/eis.2017.14.

+
+
+

Aradau C, Lobo-Guerrero L and Van Munster R (2008) Security, + technologies of risk, and the political: Guest editors’ introduction. + Security Dialogue 39(2-3): 147–154. DOI: 10.1177/0967010608089159. +

+
+
+

Azar M, Cox G and Impett L (2021) Introduction: Ways of machine + seeing. AI & SOCIETY. DOI: 10.1007/s00146-020-01124-6.

+
+
+

Bae G, de La Gorce M, Baltrušaitis T, et al. (2023) DigiFace-1M: 1 + million digital face images for face recognition. In: 2023 IEEE + Winter Conference on Applications of Computer Vision (WACV), 2023. + IEEE.

+
+
+

Barad KM (2007) Meeting the Universe Halfway: Quantum Physics and + the Entanglement of Matter and Meaning. Durham: Duke University + Press.

+
+
+

Bellanova R, Irion K, Lindskov Jacobsen K, et al. (2021) Toward a + critique of algorithmic violence. International Political + Sociology 15(1): 121–150. DOI: 10.1093/ips/olab003.

+
+
+

Bigo D (2002) Security and immigration: Toward a critique of the + governmentality of unease. Alternatives 27. SAGE Publications + Inc: 63–92. DOI: 10.1177/03043754020270S105.

+
+
+

Bigo D and Guild E (2005) Policing at a distance: Schengen visa + policies. In: Controlling Frontiers. Free Movement into and Within + Europe. Routledge, pp. 233–263.

+
+
+

Bommasani R, Hudson DA, Adeli E, et al. (2022) On the opportunities + and risks of foundation models. Available at: http://arxiv.org/abs/2108.07258 + (accessed 2 June 2023).

+
+
+

Bousquet AJ (2018) The Eye of War. Minneapolis: University + of Minnesota Press.

+
+
+

Bucher T (2018) If...Then: Algorithmic Power and Politics. + New York: Oxford University Press.

+
+
+

Buolamwini J and Gebru T (2018) Gender shades: Intersectional + accuracy disparities in commercial gender classification. + Proceedings of Machine Learning Research 81. +

+
+
+

Calhoun L (2023) Latency, uncertainty, contagion: Epistemologies of + risk-as-reform in crime forecasting software. Environment and + Planning D: Society and Space. SAGE Publications Ltd STM: + 02637758231197012. DOI: 10.1177/02637758231197012.

+
+
+

Carraro V (2021) Grounding the digital: A comparison of Waze’s ‘avoid + dangerous areas’ feature in Jerusalem, Rio de Janeiro and the US. + GeoJournal 86(3): 1121–1139. DOI: 10.1007/s10708-019-10117-y. +

+
+
+

Dawson-Howe K (2014) A Practical Introduction to Computer Vision + with OpenCV. 1st edition. Chichester, West Sussex, United Kingdon; + Hoboken, NJ: Wiley.

+
+
+

Dijstelbloem H, van Reekum R and Schinkel W (2017) Surveillance at + sea: The transactional politics of border control in the Aegean. + Security Dialogue 48(3): 224–240. DOI: 10.1177/0967010617695714. +

+
+
+

Farocki H (2004) Phantom images. Public. Available at: https://public.journals.yorku.ca/index.php/public/article/view/30354 + (accessed 6 March 2023).

+
+
+

Fisher DXO (2018) Situating border control: Unpacking Spain’s SIVE + border surveillance assemblage. Political Geography 65: 67–76. + DOI: 10.1016/j.polgeo.2018.04.005.

+
+
+

Fourcade M and Gordon J (2020) Learning like a state: Statecraft in + the digital age32.

+
+
+

Fourcade M and Johns F (2020) Loops, ladders and links: The + recursivity of social and machine learning. Theory and Society: + 1–30. DOI: 10.1007/s11186-020-09409-x.

+
+
+

Fraser A (2019) Curating digital geographies in an era of data + colonialism. Geoforum 104. Elsevier: 193–200.

+
+
+

Galton F (1879) Composite portraits, made by combining those of many + different persons into a single resultant figure. The Journal of the + Anthropological Institute of Great Britain and Ireland 8. [Royal + Anthropological Institute of Great Britain; Ireland, Wiley]: 132–144. + DOI: 10.2307/2841021.

+
+
+

Gandy OH (2021) The Panoptic Sort: A Political Economy of + Personal Information. Oxford University Press. Available at: https://books.google.com?id=JOEsEAAAQBAJ.

+
+
+

Gillespie T (2018) Custodians of the Internet: Platforms, Content + Moderation, and the Hidden Decisions That Shape Social Media. + Illustrated edition. Yale University Press.

+
+
+

Goodwin C (1994) Professional vision. American + Anthropologist 96(3).

+
+
+

Graham S (1998) Spaces of surveillant simulation: New technologies, + digital representations, and material geographies. Environment and + Planning D: Society and Space 16(4). SAGE Publications Sage UK: + London, England: 483–504.

+
+
+

Graham SD (2005) Software-sorted geographies. Progress in human + geography 29(5). Sage Publications Sage CA: Thousand Oaks, CA: + 562–580.

+
+
+

Grasseni C (2004) Skilled vision. An apprenticeship in breeding + aesthetics. Social Anthropology 12(1): 41–55. DOI: 10.1017/S0964028204000035.

+
+
+

Grasseni C (2018) Skilled vision. In: Callan H (ed.) The + International Encyclopedia of Anthropology. 1st ed. Wiley, pp. 1–7. + DOI: 10.1002/9781118924396.wbiea1657.

+
+
+

Haraway D (1988) Situated knowledges: The science question in + feminism and the privilege of partial perspective. Feminist + Studies 14(3). Feminist Studies, Inc.: 575–599. DOI: 10.2307/3178066.

+
+
+

Hoijtink M and Leese M (2019) How (not) to talk about technology + international relations and the question of agency. In: Hoijtink M and + Leese M (eds) Technology and Agency in International Relations. + Emerging technologies, ethics and international affairs. London ; New + York: Routledge, pp. 1–24.

+
+
+

Hopman R and M’charek A (2020) Facing the unknown suspect: Forensic + DNA phenotyping and the oscillation between the individual and the + collective. BioSocieties 15(3): 438–462. DOI: 10.1057/s41292-020-00190-9.

+
+
+

Hunger F (2023) Unhype artificial ’intelligence’! A proposal to + replace the deceiving terminology of AI. 12 April. Zenodo. DOI: 10.5281/zenodo.7524493.

+
+
+

Huysmans J (2022) Motioning the politics of security: The primacy of + movement and the subject of security. Security Dialogue 53(3): + 238–255. DOI: 10.1177/09670106211044015.

+
+
+

Isin E and Ruppert E (2020) The birth of sensory power: How a + pandemic made it visible? Big Data & Society 7(2). SAGE + Publications Ltd: 2053951720969208. DOI: 10.1177/2053951720969208.

+
+
+

Jasanoff S (2004) States of Knowledge: The Co-Production of + Science and Social Order. Routledge Taylor & Francis Group.

+
+
+

Ji Z, Lee N, Frieske R, et al. (2023) Survey of hallucination in + natural language generation. ACM Computing Surveys 55(12): + 1–38. DOI: 10.1145/3571730.

+
+
+

Keyes O (2019) The gardener’s vision of data: Data science reduces + people to subjects that can be mined for truth. Real Life Mag. + Available at: https://reallifemag.com/the-gardeners-vision-of-data/. +

+
+
+

Latour B (2005) Reassembling the Social: An Introduction to + Actor-Network-Theory. Clarendon Lectures in Management Studies. + Oxford; New York: Oxford University Press.

+
+
+

Leese M (2015) ‘We were taken by surprise’: Body scanners, technology + adjustment, and the eradication of failure. Critical Studies on + Security 3(3). Routledge: 269–282. DOI: 10.1080/21624887.2015.1124743.

+
+
+

Leese M (2019) Configuring warfare: Automation, control, agency. In: + Hoijtink M and Leese M (eds) Technology and Agency in International + Relations. Emerging technologies, ethics and international affairs. + London ; New York: Routledge, pp. 42–65.

+
+
+

Lorusso S (2021) The user condition. Available at: https://theusercondition.computer/ + (accessed 18 February 2021).

+
+
+

Lyon D (2003) Surveillance as Social Sorting: Privacy, Risk, and + Digital Discrimination. Psychology Press. Available at: https://books.google.com?id=yCLFBfZwl08C.

+
+
+

Mackenzie A (2017) Machine Learners: Archaeology of a Data + Practice. The MIT Press. DOI: 10.7551/mitpress/10302.001.0001.

+
+
+

Maguire M, Frois C and Zurawski N (eds) (2014) The Anthropology + of Security: Perspectives from the Frontline of Policing, + Counter-Terrorism and Border Control. Anthropology, culture and + society. London: Pluto Press.

+
+
+

Mahony M (2021) Geographies of science and technology 1: Boundaries + and crossings. Progress in Human Geography 45(3): 586–595. DOI: + 10.1177/0309132520969824. +

+
+
+

Markoff J (2020) Robots will need humans in future. The New York + Times: Section B, 22 May. New York. Available at: https://www.nytimes.com/2020/05/21/technology/ben-shneiderman-automation-humans.html + (accessed 31 October 2023).

+
+
+

McCosker A and Wilken R (2020) Automating Vision: The Social + Impact of the New Camera Consciousness. 1st edition. Routledge.

+
+
+

Møhl P (2021) Seeing threats, sensing flesh: Human–machine ensembles + at work. AI & SOCIETY 36(4): 1243–1252. DOI: 10.1007/s00146-020-01064-1.

+
+
+

Muller B (2010) Security, Risk and the Biometric State. + Routledge. DOI: 10.4324/9780203858042.

+
+
+

O’Sullivan S (2016) On the diagram (and a practice of diagrammatics). + In: Schneider K, Yasar B, and Lévy D (eds) Situational Diagram. + New York: Dominique Lévy, pp. 13–25.

+
+
+

Olwig KF, Grünenberg K, Møhl P, et al. (2019) The Biometric + Border World: Technologies, Bodies and Identities on the Move. 1st + ed. Routledge. DOI: 10.4324/9780367808464.

+
+
+

Pasquinelli M (2015) Anomaly detection: The mathematization of the + abnormal in the metadata society. Panel presentation.

+
+
+

Pasquinelli M (2019) How a machine learns and fails – a grammar of + error for artificial intelligence. Available at: https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/ + (accessed 13 January 2021).

+
+
+

Pugliese J (2010) Biometrics: Bodies, Technologies, + Biopolitics. New York: Routledge. DOI: 10.4324/9780203849415.

+
+
+

Schurr C, Marquardt N and Militz E (2023) Intimate technologies: + Towards a feminist perspective on geographies of technoscience. + Progress in Human Geography. SAGE Publications Ltd: + 03091325231151673. DOI: 10.1177/03091325231151673. +

+
+
+

Soon W and Cox G (2021) Aesthetic Programming: A Handbook of + Software Studies. London: Open Humanities Press. Available at: http://www.openhumanitiespress.org/books/titles/aesthetic-programming/ + (accessed 9 March 2021).

+
+
+

Srnicek N and De Sutter L (2017) Platform Capitalism. Theory + redux. Cambridge, UK ; Malden, MA: Polity.

+
+
+

Stevens N and Keyes O (2021) Seeing infrastructure: Race, facial + recognition and the politics of data. Cultural Studies 35(4-5): + 833–853. DOI: 10.1080/09502386.2021.1895252.

+
+
+

Suchman L (2006) Human-Machine Reconfigurations: Plans and + Situated Actions. 2nd edition. Cambridge University Press.

+
+
+

Suchman L (2012) Configuration. In: Inventive Methods. + Routledge, pp. 48–60.

+
+
+

Suchman L (2020) Algorithmic warfare and the reinvention of accuracy. + Critical Studies on Security 8(2). Routledge: 175–187. DOI: 10.1080/21624887.2020.1760587. +

+
+
+

Sudmann A (2021) Artificial neural networks, postdigital + infrastructures and the politics of temporality. In: Volmar A and Stine + K (eds) Media Infrastructures and the Politics of Digital Time. + Amsterdam University Press, pp. 279–294. DOI: 10.1515/9789048550753-017.

+
+
+

Tazzioli M (2018) Spy, track and archive: The temporality of + visibility in Eurosur and Jora. Security Dialogue 49(4): + 272–288. DOI: 10.1177/0967010618769812.

+
+
+

Thatcher J, O’Sullivan D and Mahmoudi D (2016) Data colonialism + through accumulation by dispossession: New metaphors for daily data. + Environment and Planning D: Society and Space 34(6). SAGE + Publications Ltd STM: 990–1006. DOI: 10.1177/0263775816633195. +

+
+
+

Uliasz R (2020) Seeing like an algorithm: Operative images and + emergent subjects. AI & SOCIETY. DOI: 10.1007/s00146-020-01067-y.

+
+
+

van de Ven R and Plájás IZ (2022) Inconsistent projections: + Con-figuring security vision through diagramming. A Peer-Reviewed + Journal About 11(1): 50–65. DOI: 10.7146/aprja.v11i1.134306.

+
+
+

Wilcox L (2017) Embodying algorithmic war: Gender, race, and the + posthuman in drone warfare. Security Dialogue 48(1): 11–28. + DOI: 10.1177/0967010616657947.

+
+
+

Zuboff S (2019) The Age of Surveillance Capitalism: The Fight for + a Human Future at the New Frontier of Power. First edition. New + York: Public Affairs.

+
+
+
+
+
    +
  1. +
    +

    The interface + software and code is available at https://git.rubenvandeven.com/security_vision/svganim + and https://gitlab.com/security-vision/chronodiagram +

    +
    + ↩︎ +
  2. +
  3. +
    +

    The interviews + were conducted in several European countries: the majority in the + Netherlands, but also in Belgium, Hungary and Poland. Based on an + initial survey of algorithmic security vision practices in Europe we + identified various roles that are involved in such practices. Being a + rather small group of people, these interviewees do not serve as + “illustrative representatives” (Mol & Law 2002, 16-17) of the field + they work in. However, as the interviewees have different cultural and + institutional affiliations, and hold different positions in working with + algorithms, vision and security, they cover a wide spectrum of + engagements with our research object.

    +
    + ↩︎ +
  4. +
  5. +
    +

    The interviews + were conducted by the first two authors, and at a later stage by Clemens + Baier. The conversations were largely unstructured, but began with two + basic questions. First, we asked the interviewees if they use diagrams + in their daily practice. We then asked: “when we speak of ‘security + vision’ we speak of the use of computer vision in a security context. + Can you explain from your perspective what these concepts mean and how + they come together?” After the first few interviews, we identified some + recurrent themes, which we then specifically asked later interviewees to + discuss.

    +
    + ↩︎ +
  6. +
  7. +
    +

    Using + anthropomorphizing terms such as “neural networks,” “learning” and + “training” to denote algorithmic configurations and processes is + suggested to hype “artificial intelligence.” While we support the need + for an alternative terminology as proposed by Hunger (2023), here we + preserve the language of our interviewees.

    +
    + ↩︎ +
  8. +
+
\ No newline at end of file