drawing intermediate lines and playback icon
This commit is contained in:
parent
e25960f2e0
commit
a15195237d
1 changed files with 657 additions and 14 deletions
655
canvas.html
655
canvas.html
|
@ -80,11 +80,46 @@
|
||||||
top: 0;
|
top: 0;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
div[data-custom-style='Body Text'] p {
|
div[data-custom-style='Body Text'] p {
|
||||||
padding: 1em 0;
|
padding: 1em 0;
|
||||||
margin: 0;
|
margin: 0;
|
||||||
background-color: rgba(255, 255, 255, 0.8);
|
background-color: rgba(255, 255, 255, 0.8);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
.anchor{
|
||||||
|
position: relative;
|
||||||
|
}
|
||||||
|
|
||||||
|
.anchor.active:not(.playing)::before{
|
||||||
|
content:'⏵';
|
||||||
|
position: absolute;
|
||||||
|
width: 40px;
|
||||||
|
height: 40px;
|
||||||
|
background:gray;
|
||||||
|
left: calc(50% - 20px);
|
||||||
|
top: calc(50% - 20px);
|
||||||
|
vertical-align: middle;
|
||||||
|
line-height: 35px;
|
||||||
|
border-radius: 5px;
|
||||||
|
color:white;
|
||||||
|
}
|
||||||
|
.anchor.active:not(.playing):hover::before{
|
||||||
|
background:black
|
||||||
|
}
|
||||||
|
.anchor.playing:hover::before{
|
||||||
|
content:'⏸︎';
|
||||||
|
position: absolute;
|
||||||
|
width: 40px;
|
||||||
|
height: 40px;
|
||||||
|
background:black;
|
||||||
|
left: calc(50% - 20px);
|
||||||
|
top: calc(50% - 20px);
|
||||||
|
vertical-align: middle;
|
||||||
|
line-height: 35px;
|
||||||
|
border-radius: 5px;
|
||||||
|
color:white;
|
||||||
|
}
|
||||||
</style>
|
</style>
|
||||||
<link rel="stylesheet" href="paper.css" />
|
<link rel="stylesheet" href="paper.css" />
|
||||||
<script src="assets/wNumb-1.2.0.min.js"></script>
|
<script src="assets/wNumb-1.2.0.min.js"></script>
|
||||||
|
@ -116,13 +151,21 @@
|
||||||
}
|
}
|
||||||
div.controls{display:none !important;}`
|
div.controls{display:none !important;}`
|
||||||
);
|
);
|
||||||
console.log(sheet, sheet.rules)
|
|
||||||
|
|
||||||
|
|
||||||
function easeInOutQuart(x) {
|
function easeInOutQuart(x) {
|
||||||
return x < 0.5 ? 8 * x * x * x * x : 1 - Math.pow(-2 * x + 2, 4) / 2;
|
return x < 0.5 ? 8 * x * x * x * x : 1 - Math.pow(-2 * x + 2, 4) / 2;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
function easeInOutBack(x) {
|
||||||
|
const c1 = 1.70158;
|
||||||
|
const c2 = c1 * 1.525;
|
||||||
|
|
||||||
|
return x < 0.5
|
||||||
|
? (Math.pow(2 * x, 2) * ((c2 + 1) * 2 * x - c2)) / 2
|
||||||
|
: (Math.pow(2 * x - 2, 2) * ((c2 + 1) * (x * 2 - 2) + c2) + 2) / 2;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
let scroll_offsets = []
|
let scroll_offsets = []
|
||||||
|
@ -154,10 +197,11 @@
|
||||||
paths.forEach((el) => el.style.strokeDasharray = Math.ceil(el.getTotalLength()) + 'px');
|
paths.forEach((el) => el.style.strokeDasharray = Math.ceil(el.getTotalLength()) + 'px');
|
||||||
|
|
||||||
const lastAnchorEl = anchorEls[anchorEls.length - 1];
|
const lastAnchorEl = anchorEls[anchorEls.length - 1];
|
||||||
console.log(lastAnchorEl)
|
|
||||||
|
|
||||||
for (const anchorEl of anchorEls) {
|
for (const anchorEl of anchorEls) {
|
||||||
anchorEl.addEventListener('click', ev => playerEls[anchorEl.dataset.i].annotator.playPause());
|
anchorEl.addEventListener('click', ev => playerEls[anchorEl.dataset.i].annotator.playPause());
|
||||||
|
playerEls[anchorEl.dataset.i].annotator.addEventListener('play', ev => anchorEl.classList.add('playing'));
|
||||||
|
playerEls[anchorEl.dataset.i].annotator.addEventListener('pause', ev => anchorEl.classList.remove('playing'));
|
||||||
}
|
}
|
||||||
for (const player of playerEls) {
|
for (const player of playerEls) {
|
||||||
player.shadowRoot.adoptedStyleSheets = [sheet];
|
player.shadowRoot.adoptedStyleSheets = [sheet];
|
||||||
|
@ -231,6 +275,7 @@
|
||||||
|
|
||||||
const t = Math.min(1, Math.max(0, (center_y - prev[0]) / (next[0] - prev[0])))
|
const t = Math.min(1, Math.max(0, (center_y - prev[0]) / (next[0] - prev[0])))
|
||||||
t_ease = easeInOutQuart(t)
|
t_ease = easeInOutQuart(t)
|
||||||
|
// t_ease = easeInOutBack(t)
|
||||||
|
|
||||||
const dx = target_pos[0] - source_pos[0];
|
const dx = target_pos[0] - source_pos[0];
|
||||||
const dy = target_pos[1] - source_pos[1];
|
const dy = target_pos[1] - source_pos[1];
|
||||||
|
@ -246,7 +291,6 @@
|
||||||
y = -1 * (source_pos[1] + dy * t_ease) * scale + window.innerHeight / 2;
|
y = -1 * (source_pos[1] + dy * t_ease) * scale + window.innerHeight / 2;
|
||||||
|
|
||||||
const color = (target_color - source_color) * t_ease + source_color
|
const color = (target_color - source_color) * t_ease + source_color
|
||||||
console.log(sheet)
|
|
||||||
// sheet.rules[0].style.setProperty('--override-color', `rgba(${color},${color},${color},0.7)`);
|
// sheet.rules[0].style.setProperty('--override-color', `rgba(${color},${color},${color},0.7)`);
|
||||||
sheet.rules[0].style.setProperty('--disactive-path', `rgba(${color},${color},${color},0.7)`);
|
sheet.rules[0].style.setProperty('--disactive-path', `rgba(${color},${color},${color},0.7)`);
|
||||||
|
|
||||||
|
@ -282,7 +326,6 @@
|
||||||
|
|
||||||
// calculate whether we're nearing the conlusion, and color accordingly
|
// calculate whether we're nearing the conlusion, and color accordingly
|
||||||
const last = Math.max(...Array.from(anchorEls).map((e) => e.getBoundingClientRect().bottom))
|
const last = Math.max(...Array.from(anchorEls).map((e) => e.getBoundingClientRect().bottom))
|
||||||
console.log(last)
|
|
||||||
if (last < 0) {
|
if (last < 0) {
|
||||||
for (const playerEl of playerEls) {
|
for (const playerEl of playerEls) {
|
||||||
playerEl.classList.add('ending')
|
playerEl.classList.add('ending')
|
||||||
|
@ -307,7 +350,7 @@
|
||||||
|
|
||||||
let options = {
|
let options = {
|
||||||
// root: document.querySelector("#scrollArea"), // viewport by default
|
// root: document.querySelector("#scrollArea"), // viewport by default
|
||||||
rootMargin: `${-Math.round(innerHeight / 3)}px`, //"0px",
|
rootMargin: `${-Math.floor((window.innerHeight-10) / 2)}px 0px`, //"0px",
|
||||||
threshold: 0,
|
threshold: 0,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -320,8 +363,10 @@
|
||||||
}
|
}
|
||||||
playerEl = windowEl.children[index];
|
playerEl = windowEl.children[index];
|
||||||
if (entry.isIntersecting) {
|
if (entry.isIntersecting) {
|
||||||
|
entry.target.classList.add('active');
|
||||||
playerEl.classList.add('active')
|
playerEl.classList.add('active')
|
||||||
} else {
|
} else {
|
||||||
|
entry.target.classList.remove('active');
|
||||||
playerEl.classList.remove('active')
|
playerEl.classList.remove('active')
|
||||||
if (typeof playerEl.annotator.paused !== 'undefined' && !playerEl.annotator.paused) {
|
if (typeof playerEl.annotator.paused !== 'undefined' && !playerEl.annotator.paused) {
|
||||||
console.log('pause', playerEl.annotator, playerEl.annotator.paused)
|
console.log('pause', playerEl.annotator, playerEl.annotator.paused)
|
||||||
|
@ -335,7 +380,7 @@
|
||||||
for (const anchorEl of anchorEls) {
|
for (const anchorEl of anchorEls) {
|
||||||
observer.observe(anchorEl)
|
observer.observe(anchorEl)
|
||||||
}
|
}
|
||||||
console.log(anchorEls)
|
// console.log(anchorEls)
|
||||||
// .forEach(el => observer.observe());
|
// .forEach(el => observer.observe());
|
||||||
|
|
||||||
|
|
||||||
|
@ -470,6 +515,8 @@
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<section id="part1">
|
<section id="part1">
|
||||||
|
<p> .... this is a demo to showcase how the chronodiagramming looks like in its interactive form. Please note
|
||||||
|
that this demo of the interface is not compatible with mobile devices ...</p>
|
||||||
<section id="managing-error-from-the-sublime-to-the-risky-algorithm" class="level2">
|
<section id="managing-error-from-the-sublime-to-the-risky-algorithm" class="level2">
|
||||||
<h2>3. Managing error: from the sublime to the risky algorithm</h2>
|
<h2>3. Managing error: from the sublime to the risky algorithm</h2>
|
||||||
<div data-custom-style="Body Text">
|
<div data-custom-style="Body Text">
|
||||||
|
@ -835,6 +882,602 @@
|
||||||
visibilization, invisibilization, responsibility and accountability.</p>
|
visibilization, invisibilization, responsibility and accountability.</p>
|
||||||
</div>
|
</div>
|
||||||
</section>
|
</section>
|
||||||
|
</section>
|
||||||
|
<section id="a-diagram-of-research" class="level1">
|
||||||
|
<h1>A diagram of research</h1>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>In this conclusion, we reflect upon a final dimension of the method
|
||||||
|
of diagraming in the context of figurations and configurations: its
|
||||||
|
potential as an alternative to the conventional research program.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>While writing this text, indeed, the search for a coherent structure
|
||||||
|
through which we could map the problems that emerged from analyzing the
|
||||||
|
diagrams in a straightforward narrative proved elusive. We considered
|
||||||
|
various organizational frameworks, but consistently encountered
|
||||||
|
resistance from one or two sections. It became evident that our
|
||||||
|
interviews yielded a rhizome of interrelated problems, creating a
|
||||||
|
multitude of possible inquiries and overlapping trajectories. Some
|
||||||
|
dimensions of these problems are related, but not to every problem.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>If we take for example the understanding of algorithmic security
|
||||||
|
vision as practices of error management as a starting point, we see how
|
||||||
|
the actors we interviewed have incorporated the societal critique of
|
||||||
|
algorithmic bias. This serves as a catalyst for novel strategies aimed
|
||||||
|
at mitigating the repercussions of imperfect systems. The societal
|
||||||
|
critique has driven the development of synthetic datasets, which promise
|
||||||
|
equitable representation across diverse demographic groups. It has also
|
||||||
|
been the reason for the reliance on institutionalized benchmarks to
|
||||||
|
assess the impartiality of algorithms. Moreover, different
|
||||||
|
configurations of the human-in-the-loop emerge, all promised to rectify
|
||||||
|
algorithmic fallibility. We see a causal chain there.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>But how does the question of algorithmic error relate to the shift
|
||||||
|
from photographic to cinematic vision that algorithmic security vision
|
||||||
|
brings about? Certainly, there are reverberations. The relegation of
|
||||||
|
stable identity that we outlined, could be seen as a way to mitigate the
|
||||||
|
impact of those errors. But it would be a leap to identify these
|
||||||
|
questions of error as the central driver for the increased incorporation
|
||||||
|
of moving images in algorithmic security vision.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>However, if we take as our starting point the formidable strides in
|
||||||
|
computing power and the advancements in camera technologies, we face
|
||||||
|
similar problems. These developments make the analysis of movement
|
||||||
|
possible while helping to elucidate the advances in the real-time
|
||||||
|
analysis that are required to remove the human-in-the-loop, as trialed
|
||||||
|
in the Burglary-Free Neighborhood. These developments account for the
|
||||||
|
feasibility of the synthetic data generation, a computing-intense
|
||||||
|
process which opens a vast horizon of possibilities for developers to
|
||||||
|
detect objects or actions. Such an account, however, does not address
|
||||||
|
the need for such a synthetic dataset. A focus on the computation of
|
||||||
|
movement, however, would highlight how a lack of training data
|
||||||
|
necessitates many of the practices described. Synthetic data is
|
||||||
|
necessitated by the glaring absence of pre-existing security datasets
|
||||||
|
that contain moving bodies. While facial recognition algorithms could be
|
||||||
|
trained and operated on quickly repurposed photographic datasets of
|
||||||
|
national identity cards or drivers’ license registries, no dataset for
|
||||||
|
moving bodies has been available to be repurposed by states or
|
||||||
|
corporations. This absence of training data requires programmers to
|
||||||
|
stage scenes for the camera. Thus, while one issue contains echoes of
|
||||||
|
the other, the network of interrelated problematizations cannot be
|
||||||
|
flattened into a single narrative.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Body Text">
|
||||||
|
<p>The constraints imposed by the linear structure of an academic
|
||||||
|
article certainly necessitate a specific ordering of sections. Yet the
|
||||||
|
different research directions we highlight form something else. The
|
||||||
|
multiple figurations analyzed here generate fresh tensions when put in
|
||||||
|
relation with security and political practices. What appears from the
|
||||||
|
diagrams is a network of figurations in various configurations. Instead
|
||||||
|
of a research <em>program</em>, our interviews point toward a larger
|
||||||
|
research <em>diagram</em> of interrelated questions, which invites us to
|
||||||
|
think in terms of pathways through this dynamic and evolving network of
|
||||||
|
relations.</p>
|
||||||
|
</div>
|
||||||
|
</section>
|
||||||
|
<section id="references" class="level1">
|
||||||
|
<h1>References</h1>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Ajana B (2013) <em>Governing Through Biometrics</em>. London:
|
||||||
|
Palgrave Macmillan UK. DOI: <a href="https://doi.org/10.1057/9781137290755"><span
|
||||||
|
data-custom-style="Hyperlink">10.1057/9781137290755</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Amicelle A, Aradau C and Jeandesboz J (2015) Questioning security
|
||||||
|
devices: Performativity, resistance, politics. <em>Security
|
||||||
|
Dialogue</em> 46(4): 293–306. DOI: <a href="https://doi.org/10.1177/0967010615586964"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010615586964</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Amoore L (2014) Security and the incalculable. <em>Security
|
||||||
|
Dialogue</em> 45(5). SAGE Publications Ltd: 423–439. DOI: <a
|
||||||
|
href="https://doi.org/10.1177/0967010614539719"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010614539719</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Amoore L (2019) Doubt and the algorithm: On the partial accounts of
|
||||||
|
machine learning. <em>Theory, Culture & Society</em> 36(6). SAGE
|
||||||
|
Publications Ltd: 147–169. DOI: <a href="https://doi.org/10.1177/0263276419851846"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0263276419851846</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Amoore L (2021) The deep border. <em>Political Geography</em>.
|
||||||
|
Elsevier: 102547.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Amoore L and De Goede M (2005) Governance, risk and dataveillance in
|
||||||
|
the war on terror. <em>Crime, Law and Social Change</em> 43(2): 149–173.
|
||||||
|
DOI: <a href="https://doi.org/10.1007/s10611-005-1717-8"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s10611-005-1717-8</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Andersen RS (2015) <em>Remediating Security</em>. 1. oplag.
|
||||||
|
Ph.d.-serien / københavns universitet, institut for statskundskab. Kbh.:
|
||||||
|
Københavns Universitet, Institut for Statskundskab.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Andersen RS (2018) The art of questioning lethal vision: Mosse’s
|
||||||
|
infra and militarized machine vision. In: <em>_Proceeding of EVA
|
||||||
|
copenhagen 2018_</em>, 2018.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Andrejevic M and Burdon M (2015) Defining the sensor society.
|
||||||
|
<em>Television & New Media</em> 16(1): 19–36. DOI: <a
|
||||||
|
href="https://doi.org/10.1177/1527476414541552"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/1527476414541552</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Aradau C and Blanke T (2015) The (big) data-security assemblage:
|
||||||
|
Knowledge and critique. <em>Big Data & Society</em> 2(2):
|
||||||
|
205395171560906. DOI: <a href="https://doi.org/10.1177/2053951715609066"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/2053951715609066</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Aradau C and Blanke T (2018) Governing others: Anomaly and the
|
||||||
|
algorithmic subject of security. <em>European Journal of International
|
||||||
|
Security</em> 3(1). Cambridge University Press: 1–21. DOI: <a
|
||||||
|
href="https://doi.org/10.1017/eis.2017.14"><span
|
||||||
|
data-custom-style="Hyperlink">10.1017/eis.2017.14</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Aradau C, Lobo-Guerrero L and Van Munster R (2008) Security,
|
||||||
|
technologies of risk, and the political: Guest editors’ introduction.
|
||||||
|
<em>Security Dialogue</em> 39(2-3): 147–154. DOI: <a
|
||||||
|
href="https://doi.org/10.1177/0967010608089159"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010608089159</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Azar M, Cox G and Impett L (2021) Introduction: Ways of machine
|
||||||
|
seeing. <em>AI & SOCIETY</em>. DOI: <a href="https://doi.org/10.1007/s00146-020-01124-6"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s00146-020-01124-6</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bae G, de La Gorce M, Baltrušaitis T, et al. (2023) DigiFace-1M: 1
|
||||||
|
million digital face images for face recognition. In: <em>2023 IEEE
|
||||||
|
Winter Conference on Applications of Computer Vision (WACV)</em>, 2023.
|
||||||
|
IEEE.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Barad KM (2007) <em>Meeting the Universe Halfway: Quantum Physics and
|
||||||
|
the Entanglement of Matter and Meaning</em>. Durham: Duke University
|
||||||
|
Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bellanova R, Irion K, Lindskov Jacobsen K, et al. (2021) Toward a
|
||||||
|
critique of algorithmic violence. <em>International Political
|
||||||
|
Sociology</em> 15(1): 121–150. DOI: <a href="https://doi.org/10.1093/ips/olab003"><span
|
||||||
|
data-custom-style="Hyperlink">10.1093/ips/olab003</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bigo D (2002) Security and immigration: Toward a critique of the
|
||||||
|
governmentality of unease. <em>Alternatives</em> 27. SAGE Publications
|
||||||
|
Inc: 63–92. DOI: <a href="https://doi.org/10.1177/03043754020270S105"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/03043754020270S105</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bigo D and Guild E (2005) Policing at a distance: Schengen visa
|
||||||
|
policies. In: <em>Controlling Frontiers. Free Movement into and Within
|
||||||
|
Europe</em>. Routledge, pp. 233–263.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bommasani R, Hudson DA, Adeli E, et al. (2022) On the opportunities
|
||||||
|
and risks of foundation models. Available at: <a href="http://arxiv.org/abs/2108.07258"><span
|
||||||
|
data-custom-style="Hyperlink">http://arxiv.org/abs/2108.07258</span></a>
|
||||||
|
(accessed 2 June 2023).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bousquet AJ (2018) <em>The Eye of War</em>. Minneapolis: University
|
||||||
|
of Minnesota Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Bucher T (2018) <em>If...Then: Algorithmic Power and Politics</em>.
|
||||||
|
New York: Oxford University Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Buolamwini J and Gebru T (2018) Gender shades: Intersectional
|
||||||
|
accuracy disparities in commercial gender classification.
|
||||||
|
<em>Proceedings of Machine Learning Research</em> 81.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Calhoun L (2023) Latency, uncertainty, contagion: Epistemologies of
|
||||||
|
risk-as-reform in crime forecasting software. <em>Environment and
|
||||||
|
Planning D: Society and Space</em>. SAGE Publications Ltd STM:
|
||||||
|
02637758231197012. DOI: <a href="https://doi.org/10.1177/02637758231197012"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/02637758231197012</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Carraro V (2021) Grounding the digital: A comparison of Waze’s ‘avoid
|
||||||
|
dangerous areas’ feature in Jerusalem, Rio de Janeiro and the US.
|
||||||
|
<em>GeoJournal</em> 86(3): 1121–1139. DOI: <a href="https://doi.org/10.1007/s10708-019-10117-y"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s10708-019-10117-y</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Dawson-Howe K (2014) <em>A Practical Introduction to Computer Vision
|
||||||
|
with OpenCV</em>. 1st edition. Chichester, West Sussex, United Kingdon;
|
||||||
|
Hoboken, NJ: Wiley.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Dijstelbloem H, van Reekum R and Schinkel W (2017) Surveillance at
|
||||||
|
sea: The transactional politics of border control in the Aegean.
|
||||||
|
<em>Security Dialogue</em> 48(3): 224–240. DOI: <a href="https://doi.org/10.1177/0967010617695714"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010617695714</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Farocki H (2004) Phantom images. <em>Public</em>. Available at: <a
|
||||||
|
href="https://public.journals.yorku.ca/index.php/public/article/view/30354"><span
|
||||||
|
data-custom-style="Hyperlink">https://public.journals.yorku.ca/index.php/public/article/view/30354</span></a>
|
||||||
|
(accessed 6 March 2023).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Fisher DXO (2018) Situating border control: Unpacking Spain’s SIVE
|
||||||
|
border surveillance assemblage. <em>Political Geography</em> 65: 67–76.
|
||||||
|
DOI: <a href="https://doi.org/10.1016/j.polgeo.2018.04.005"><span
|
||||||
|
data-custom-style="Hyperlink">10.1016/j.polgeo.2018.04.005</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Fourcade M and Gordon J (2020) Learning like a state: Statecraft in
|
||||||
|
the digital age32.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Fourcade M and Johns F (2020) Loops, ladders and links: The
|
||||||
|
recursivity of social and machine learning. <em>Theory and Society</em>:
|
||||||
|
1–30. DOI: <a href="https://doi.org/10.1007/s11186-020-09409-x"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s11186-020-09409-x</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Fraser A (2019) Curating digital geographies in an era of data
|
||||||
|
colonialism. <em>Geoforum</em> 104. Elsevier: 193–200.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Galton F (1879) Composite portraits, made by combining those of many
|
||||||
|
different persons into a single resultant figure. <em>The Journal of the
|
||||||
|
Anthropological Institute of Great Britain and Ireland</em> 8. [Royal
|
||||||
|
Anthropological Institute of Great Britain; Ireland, Wiley]: 132–144.
|
||||||
|
DOI: <a href="https://doi.org/10.2307/2841021"><span
|
||||||
|
data-custom-style="Hyperlink">10.2307/2841021</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Gandy OH (2021) <em>The Panoptic Sort: A Political Economy of
|
||||||
|
Personal Information</em>. Oxford University Press. Available at: <a
|
||||||
|
href="https://books.google.com?id=JOEsEAAAQBAJ"><span
|
||||||
|
data-custom-style="Hyperlink">https://books.google.com?id=JOEsEAAAQBAJ</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Gillespie T (2018) <em>Custodians of the Internet: Platforms, Content
|
||||||
|
Moderation, and the Hidden Decisions That Shape Social Media</em>.
|
||||||
|
Illustrated edition. Yale University Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Goodwin C (1994) Professional vision. <em>American
|
||||||
|
Anthropologist</em> 96(3).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Graham S (1998) Spaces of surveillant simulation: New technologies,
|
||||||
|
digital representations, and material geographies. <em>Environment and
|
||||||
|
Planning D: Society and Space</em> 16(4). SAGE Publications Sage UK:
|
||||||
|
London, England: 483–504.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Graham SD (2005) Software-sorted geographies. <em>Progress in human
|
||||||
|
geography</em> 29(5). Sage Publications Sage CA: Thousand Oaks, CA:
|
||||||
|
562–580.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Grasseni C (2004) Skilled vision. An apprenticeship in breeding
|
||||||
|
aesthetics. <em>Social Anthropology</em> 12(1): 41–55. DOI: <a
|
||||||
|
href="https://doi.org/10.1017/S0964028204000035"><span
|
||||||
|
data-custom-style="Hyperlink">10.1017/S0964028204000035</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Grasseni C (2018) Skilled vision. In: Callan H (ed.) <em>The
|
||||||
|
International Encyclopedia of Anthropology</em>. 1st ed. Wiley, pp. 1–7.
|
||||||
|
DOI: <a href="https://doi.org/10.1002/9781118924396.wbiea1657"><span
|
||||||
|
data-custom-style="Hyperlink">10.1002/9781118924396.wbiea1657</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Haraway D (1988) Situated knowledges: The science question in
|
||||||
|
feminism and the privilege of partial perspective. <em>Feminist
|
||||||
|
Studies</em> 14(3). Feminist Studies, Inc.: 575–599. DOI: <a
|
||||||
|
href="https://doi.org/10.2307/3178066"><span
|
||||||
|
data-custom-style="Hyperlink">10.2307/3178066</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Hoijtink M and Leese M (2019) How (not) to talk about technology
|
||||||
|
international relations and the question of agency. In: Hoijtink M and
|
||||||
|
Leese M (eds) <em>Technology and Agency in International Relations</em>.
|
||||||
|
Emerging technologies, ethics and international affairs. London ; New
|
||||||
|
York: Routledge, pp. 1–24.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Hopman R and M’charek A (2020) Facing the unknown suspect: Forensic
|
||||||
|
DNA phenotyping and the oscillation between the individual and the
|
||||||
|
collective. <em>BioSocieties</em> 15(3): 438–462. DOI: <a
|
||||||
|
href="https://doi.org/10.1057/s41292-020-00190-9"><span
|
||||||
|
data-custom-style="Hyperlink">10.1057/s41292-020-00190-9</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Hunger F (2023) <em>Unhype artificial ’intelligence’! A proposal to
|
||||||
|
replace the deceiving terminology of AI.</em> 12 April. Zenodo. DOI: <a
|
||||||
|
href="https://doi.org/10.5281/zenodo.7524493"><span
|
||||||
|
data-custom-style="Hyperlink">10.5281/zenodo.7524493</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Huysmans J (2022) Motioning the politics of security: The primacy of
|
||||||
|
movement and the subject of security. <em>Security Dialogue</em> 53(3):
|
||||||
|
238–255. DOI: <a href="https://doi.org/10.1177/09670106211044015"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/09670106211044015</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Isin E and Ruppert E (2020) The birth of sensory power: How a
|
||||||
|
pandemic made it visible? <em>Big Data & Society</em> 7(2). SAGE
|
||||||
|
Publications Ltd: 2053951720969208. DOI: <a href="https://doi.org/10.1177/2053951720969208"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/2053951720969208</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Jasanoff S (2004) <em>States of Knowledge: The Co-Production of
|
||||||
|
Science and Social Order</em>. Routledge Taylor & Francis Group.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Ji Z, Lee N, Frieske R, et al. (2023) Survey of hallucination in
|
||||||
|
natural language generation. <em>ACM Computing Surveys</em> 55(12):
|
||||||
|
1–38. DOI: <a href="https://doi.org/10.1145/3571730"><span
|
||||||
|
data-custom-style="Hyperlink">10.1145/3571730</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Keyes O (2019) The gardener’s vision of data: Data science reduces
|
||||||
|
people to subjects that can be mined for truth. <em>Real Life Mag</em>.
|
||||||
|
Available at: <a href="https://reallifemag.com/the-gardeners-vision-of-data/"><span
|
||||||
|
data-custom-style="Hyperlink">https://reallifemag.com/the-gardeners-vision-of-data/</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Latour B (2005) <em>Reassembling the Social: An Introduction to
|
||||||
|
Actor-Network-Theory</em>. Clarendon Lectures in Management Studies.
|
||||||
|
Oxford; New York: Oxford University Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Leese M (2015) ‘We were taken by surprise’: Body scanners, technology
|
||||||
|
adjustment, and the eradication of failure. <em>Critical Studies on
|
||||||
|
Security</em> 3(3). Routledge: 269–282. DOI: <a
|
||||||
|
href="https://doi.org/10.1080/21624887.2015.1124743"><span
|
||||||
|
data-custom-style="Hyperlink">10.1080/21624887.2015.1124743</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Leese M (2019) Configuring warfare: Automation, control, agency. In:
|
||||||
|
Hoijtink M and Leese M (eds) Technology and Agency in International
|
||||||
|
Relations. Emerging technologies, ethics and international affairs.
|
||||||
|
London ; New York: Routledge, pp. 42–65.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Lorusso S (2021) The user condition. Available at: <a href="https://theusercondition.computer/"><span
|
||||||
|
data-custom-style="Hyperlink">https://theusercondition.computer/</span></a>
|
||||||
|
(accessed 18 February 2021).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Lyon D (2003) <em>Surveillance as Social Sorting: Privacy, Risk, and
|
||||||
|
Digital Discrimination</em>. Psychology Press. Available at: <a
|
||||||
|
href="https://books.google.com?id=yCLFBfZwl08C"><span
|
||||||
|
data-custom-style="Hyperlink">https://books.google.com?id=yCLFBfZwl08C</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Mackenzie A (2017) <em>Machine Learners: Archaeology of a Data
|
||||||
|
Practice</em>. The MIT Press. DOI: <a href="https://doi.org/10.7551/mitpress/10302.001.0001"><span
|
||||||
|
data-custom-style="Hyperlink">10.7551/mitpress/10302.001.0001</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Maguire M, Frois C and Zurawski N (eds) (2014) <em>The Anthropology
|
||||||
|
of Security: Perspectives from the Frontline of Policing,
|
||||||
|
Counter-Terrorism and Border Control</em>. Anthropology, culture and
|
||||||
|
society. London: Pluto Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Mahony M (2021) Geographies of science and technology 1: Boundaries
|
||||||
|
and crossings. <em>Progress in Human Geography</em> 45(3): 586–595. DOI:
|
||||||
|
<a href="https://doi.org/10.1177/0309132520969824"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0309132520969824</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Markoff J (2020) Robots will need humans in future. <em>The New York
|
||||||
|
Times: Section B</em>, 22 May. New York. Available at: <a
|
||||||
|
href="https://www.nytimes.com/2020/05/21/technology/ben-shneiderman-automation-humans.html"><span
|
||||||
|
data-custom-style="Hyperlink">https://www.nytimes.com/2020/05/21/technology/ben-shneiderman-automation-humans.html</span></a>
|
||||||
|
(accessed 31 October 2023).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>McCosker A and Wilken R (2020) <em>Automating Vision: The Social
|
||||||
|
Impact of the New Camera Consciousness</em>. 1st edition. Routledge.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Møhl P (2021) Seeing threats, sensing flesh: Human–machine ensembles
|
||||||
|
at work. <em>AI & SOCIETY</em> 36(4): 1243–1252. DOI: <a
|
||||||
|
href="https://doi.org/10.1007/s00146-020-01064-1"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s00146-020-01064-1</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Muller B (2010) <em>Security, Risk and the Biometric State</em>.
|
||||||
|
Routledge. DOI: <a href="https://doi.org/10.4324/9780203858042"><span
|
||||||
|
data-custom-style="Hyperlink">10.4324/9780203858042</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>O’Sullivan S (2016) On the diagram (and a practice of diagrammatics).
|
||||||
|
In: Schneider K, Yasar B, and Lévy D (eds) <em>Situational Diagram</em>.
|
||||||
|
New York: Dominique Lévy, pp. 13–25.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Olwig KF, Grünenberg K, Møhl P, et al. (2019) <em>The Biometric
|
||||||
|
Border World: Technologies, Bodies and Identities on the Move</em>. 1st
|
||||||
|
ed. Routledge. DOI: <a href="https://doi.org/10.4324/9780367808464"><span
|
||||||
|
data-custom-style="Hyperlink">10.4324/9780367808464</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Pasquinelli M (2015) Anomaly detection: The mathematization of the
|
||||||
|
abnormal in the metadata society. Panel presentation.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Pasquinelli M (2019) How a machine learns and fails – a grammar of
|
||||||
|
error for artificial intelligence. Available at: <a
|
||||||
|
href="https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/"><span
|
||||||
|
data-custom-style="Hyperlink">https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/</span></a>
|
||||||
|
(accessed 13 January 2021).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Pugliese J (2010) <em>Biometrics: Bodies, Technologies,
|
||||||
|
Biopolitics</em>. New York: Routledge. DOI: <a href="https://doi.org/10.4324/9780203849415"><span
|
||||||
|
data-custom-style="Hyperlink">10.4324/9780203849415</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Schurr C, Marquardt N and Militz E (2023) Intimate technologies:
|
||||||
|
Towards a feminist perspective on geographies of technoscience.
|
||||||
|
<em>Progress in Human Geography</em>. SAGE Publications Ltd:
|
||||||
|
03091325231151673. DOI: <a href="https://doi.org/10.1177/03091325231151673"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/03091325231151673</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Soon W and Cox G (2021) <em>Aesthetic Programming: A Handbook of
|
||||||
|
Software Studies</em>. London: Open Humanities Press. Available at: <a
|
||||||
|
href="http://www.openhumanitiespress.org/books/titles/aesthetic-programming/"><span
|
||||||
|
data-custom-style="Hyperlink">http://www.openhumanitiespress.org/books/titles/aesthetic-programming/</span></a>
|
||||||
|
(accessed 9 March 2021).</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Srnicek N and De Sutter L (2017) <em>Platform Capitalism</em>. Theory
|
||||||
|
redux. Cambridge, UK ; Malden, MA: Polity.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Stevens N and Keyes O (2021) Seeing infrastructure: Race, facial
|
||||||
|
recognition and the politics of data. <em>Cultural Studies</em> 35(4-5):
|
||||||
|
833–853. DOI: <a href="https://doi.org/10.1080/09502386.2021.1895252"><span
|
||||||
|
data-custom-style="Hyperlink">10.1080/09502386.2021.1895252</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Suchman L (2006) <em>Human-Machine Reconfigurations: Plans and
|
||||||
|
Situated Actions</em>. 2nd edition. Cambridge University Press.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Suchman L (2012) Configuration. In: <em>Inventive Methods</em>.
|
||||||
|
Routledge, pp. 48–60.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Suchman L (2020) Algorithmic warfare and the reinvention of accuracy.
|
||||||
|
<em>Critical Studies on Security</em> 8(2). Routledge: 175–187. DOI: <a
|
||||||
|
href="https://doi.org/10.1080/21624887.2020.1760587"><span
|
||||||
|
data-custom-style="Hyperlink">10.1080/21624887.2020.1760587</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Sudmann A (2021) Artificial neural networks, postdigital
|
||||||
|
infrastructures and the politics of temporality. In: Volmar A and Stine
|
||||||
|
K (eds) <em>Media Infrastructures and the Politics of Digital Time</em>.
|
||||||
|
Amsterdam University Press, pp. 279–294. DOI: <a href="https://doi.org/10.1515/9789048550753-017"><span
|
||||||
|
data-custom-style="Hyperlink">10.1515/9789048550753-017</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Tazzioli M (2018) Spy, track and archive: The temporality of
|
||||||
|
visibility in Eurosur and Jora. <em>Security Dialogue</em> 49(4):
|
||||||
|
272–288. DOI: <a href="https://doi.org/10.1177/0967010618769812"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010618769812</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Thatcher J, O’Sullivan D and Mahmoudi D (2016) Data colonialism
|
||||||
|
through accumulation by dispossession: New metaphors for daily data.
|
||||||
|
<em>Environment and Planning D: Society and Space</em> 34(6). SAGE
|
||||||
|
Publications Ltd STM: 990–1006. DOI: <a href="https://doi.org/10.1177/0263775816633195"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0263775816633195</span></a>.
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Uliasz R (2020) Seeing like an algorithm: Operative images and
|
||||||
|
emergent subjects. <em>AI & SOCIETY</em>. DOI: <a
|
||||||
|
href="https://doi.org/10.1007/s00146-020-01067-y"><span
|
||||||
|
data-custom-style="Hyperlink">10.1007/s00146-020-01067-y</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>van de Ven R and Plájás IZ (2022) Inconsistent projections:
|
||||||
|
Con-figuring security vision through diagramming. <em>A Peer-Reviewed
|
||||||
|
Journal About</em> 11(1): 50–65. DOI: <a href="https://doi.org/10.7146/aprja.v11i1.134306"><span
|
||||||
|
data-custom-style="Hyperlink">10.7146/aprja.v11i1.134306</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Wilcox L (2017) Embodying algorithmic war: Gender, race, and the
|
||||||
|
posthuman in drone warfare. <em>Security Dialogue</em> 48(1): 11–28.
|
||||||
|
DOI: <a href="https://doi.org/10.1177/0967010616657947"><span
|
||||||
|
data-custom-style="Hyperlink">10.1177/0967010616657947</span></a>.</p>
|
||||||
|
</div>
|
||||||
|
<div data-custom-style="Bibliography">
|
||||||
|
<p>Zuboff S (2019) <em>The Age of Surveillance Capitalism: The Fight for
|
||||||
|
a Human Future at the New Frontier of Power</em>. First edition. New
|
||||||
|
York: Public Affairs.</p>
|
||||||
|
</div>
|
||||||
|
</section>
|
||||||
|
<section class="footnotes footnotes-end-of-document" role="doc-endnotes">
|
||||||
|
<hr />
|
||||||
|
<ol>
|
||||||
|
<li id="fn1" role="doc-endnote">
|
||||||
|
<div data-custom-style="Footnote Text">
|
||||||
|
<p><span data-custom-style="Footnote Characters"></span> The interface
|
||||||
|
software and code is available at <a
|
||||||
|
href="https://git.rubenvandeven.com/security_vision/svganim"><span
|
||||||
|
data-custom-style="Hyperlink">https://git.rubenvandeven.com/security_vision/svganim</span></a>
|
||||||
|
and <a href="https://gitlab.com/security-vision/chronodiagram"><span
|
||||||
|
data-custom-style="Hyperlink">https://gitlab.com/security-vision/chronodiagram</span></a>
|
||||||
|
</p>
|
||||||
|
</div>
|
||||||
|
<a href="#fnref1" class="footnote-back" role="doc-backlink">↩︎</a>
|
||||||
|
</li>
|
||||||
|
<li id="fn2" role="doc-endnote">
|
||||||
|
<div data-custom-style="Footnote Text">
|
||||||
|
<p><span data-custom-style="Footnote Characters"></span> The interviews
|
||||||
|
were conducted in several European countries: the majority in the
|
||||||
|
Netherlands, but also in Belgium, Hungary and Poland. Based on an
|
||||||
|
initial survey of algorithmic security vision practices in Europe we
|
||||||
|
identified various roles that are involved in such practices. Being a
|
||||||
|
rather small group of people, these interviewees do not serve as
|
||||||
|
“illustrative representatives” (Mol & Law 2002, 16-17) of the field
|
||||||
|
they work in. However, as the interviewees have different cultural and
|
||||||
|
institutional affiliations, and hold different positions in working with
|
||||||
|
algorithms, vision and security, they cover a wide spectrum of
|
||||||
|
engagements with our research object.</p>
|
||||||
|
</div>
|
||||||
|
<a href="#fnref2" class="footnote-back" role="doc-backlink">↩︎</a>
|
||||||
|
</li>
|
||||||
|
<li id="fn3" role="doc-endnote">
|
||||||
|
<div data-custom-style="Footnote Text">
|
||||||
|
<p><span data-custom-style="Footnote Characters"></span> The interviews
|
||||||
|
were conducted by the first two authors, and at a later stage by Clemens
|
||||||
|
Baier. The conversations were largely unstructured, but began with two
|
||||||
|
basic questions. First, we asked the interviewees if they use diagrams
|
||||||
|
in their daily practice. We then asked: “when we speak of ‘security
|
||||||
|
vision’ we speak of the use of computer vision in a security context.
|
||||||
|
Can you explain from your perspective what these concepts mean and how
|
||||||
|
they come together?” After the first few interviews, we identified some
|
||||||
|
recurrent themes, which we then specifically asked later interviewees to
|
||||||
|
discuss.</p>
|
||||||
|
</div>
|
||||||
|
<a href="#fnref3" class="footnote-back" role="doc-backlink">↩︎</a>
|
||||||
|
</li>
|
||||||
|
<li id="fn4" role="doc-endnote">
|
||||||
|
<div data-custom-style="Footnote Text">
|
||||||
|
<p><span data-custom-style="Footnote Characters"></span> Using
|
||||||
|
anthropomorphizing terms such as “neural networks,” “learning” and
|
||||||
|
“training” to denote algorithmic configurations and processes is
|
||||||
|
suggested to hype “artificial intelligence.” While we support the need
|
||||||
|
for an alternative terminology as proposed by Hunger (2023), here we
|
||||||
|
preserve the language of our interviewees.</p>
|
||||||
|
</div>
|
||||||
|
<a href="#fnref4" class="footnote-back" role="doc-backlink">↩︎</a>
|
||||||
|
</li>
|
||||||
|
</ol>
|
||||||
|
</section>
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
</html>
|
</html>
|
Loading…
Reference in a new issue