drawing intermediate lines and playback icon

This commit is contained in:
Ruben van de Ven 2023-12-19 08:35:00 +01:00
parent e25960f2e0
commit a15195237d

View file

@ -80,11 +80,46 @@
top: 0;
}
div[data-custom-style='Body Text'] p {
padding: 1em 0;
margin: 0;
background-color: rgba(255, 255, 255, 0.8);
}
.anchor{
position: relative;
}
.anchor.active:not(.playing)::before{
content:'⏵';
position: absolute;
width: 40px;
height: 40px;
background:gray;
left: calc(50% - 20px);
top: calc(50% - 20px);
vertical-align: middle;
line-height: 35px;
border-radius: 5px;
color:white;
}
.anchor.active:not(.playing):hover::before{
background:black
}
.anchor.playing:hover::before{
content:'⏸︎';
position: absolute;
width: 40px;
height: 40px;
background:black;
left: calc(50% - 20px);
top: calc(50% - 20px);
vertical-align: middle;
line-height: 35px;
border-radius: 5px;
color:white;
}
</style>
<link rel="stylesheet" href="paper.css" />
<script src="assets/wNumb-1.2.0.min.js"></script>
@ -116,13 +151,21 @@
}
div.controls{display:none !important;}`
);
console.log(sheet, sheet.rules)
function easeInOutQuart(x) {
return x < 0.5 ? 8 * x * x * x * x : 1 - Math.pow(-2 * x + 2, 4) / 2;
}
function easeInOutBack(x) {
const c1 = 1.70158;
const c2 = c1 * 1.525;
return x < 0.5
? (Math.pow(2 * x, 2) * ((c2 + 1) * 2 * x - c2)) / 2
: (Math.pow(2 * x - 2, 2) * ((c2 + 1) * (x * 2 - 2) + c2) + 2) / 2;
}
let scroll_offsets = []
@ -154,10 +197,11 @@
paths.forEach((el) => el.style.strokeDasharray = Math.ceil(el.getTotalLength()) + 'px');
const lastAnchorEl = anchorEls[anchorEls.length - 1];
console.log(lastAnchorEl)
for (const anchorEl of anchorEls) {
anchorEl.addEventListener('click', ev => playerEls[anchorEl.dataset.i].annotator.playPause());
playerEls[anchorEl.dataset.i].annotator.addEventListener('play', ev => anchorEl.classList.add('playing'));
playerEls[anchorEl.dataset.i].annotator.addEventListener('pause', ev => anchorEl.classList.remove('playing'));
}
for (const player of playerEls) {
player.shadowRoot.adoptedStyleSheets = [sheet];
@ -231,6 +275,7 @@
const t = Math.min(1, Math.max(0, (center_y - prev[0]) / (next[0] - prev[0])))
t_ease = easeInOutQuart(t)
// t_ease = easeInOutBack(t)
const dx = target_pos[0] - source_pos[0];
const dy = target_pos[1] - source_pos[1];
@ -246,7 +291,6 @@
y = -1 * (source_pos[1] + dy * t_ease) * scale + window.innerHeight / 2;
const color = (target_color - source_color) * t_ease + source_color
console.log(sheet)
// sheet.rules[0].style.setProperty('--override-color', `rgba(${color},${color},${color},0.7)`);
sheet.rules[0].style.setProperty('--disactive-path', `rgba(${color},${color},${color},0.7)`);
@ -282,7 +326,6 @@
// calculate whether we're nearing the conlusion, and color accordingly
const last = Math.max(...Array.from(anchorEls).map((e) => e.getBoundingClientRect().bottom))
console.log(last)
if (last < 0) {
for (const playerEl of playerEls) {
playerEl.classList.add('ending')
@ -307,7 +350,7 @@
let options = {
// root: document.querySelector("#scrollArea"), // viewport by default
rootMargin: `${-Math.round(innerHeight / 3)}px`, //"0px",
rootMargin: `${-Math.floor((window.innerHeight-10) / 2)}px 0px`, //"0px",
threshold: 0,
};
@ -320,8 +363,10 @@
}
playerEl = windowEl.children[index];
if (entry.isIntersecting) {
entry.target.classList.add('active');
playerEl.classList.add('active')
} else {
entry.target.classList.remove('active');
playerEl.classList.remove('active')
if (typeof playerEl.annotator.paused !== 'undefined' && !playerEl.annotator.paused) {
console.log('pause', playerEl.annotator, playerEl.annotator.paused)
@ -335,7 +380,7 @@
for (const anchorEl of anchorEls) {
observer.observe(anchorEl)
}
console.log(anchorEls)
// console.log(anchorEls)
// .forEach(el => observer.observe());
@ -470,6 +515,8 @@
</div>
</div>
<section id="part1">
<p> .... this is a demo to showcase how the chronodiagramming looks like in its interactive form. Please note
that this demo of the interface is not compatible with mobile devices ...</p>
<section id="managing-error-from-the-sublime-to-the-risky-algorithm" class="level2">
<h2>3. Managing error: from the sublime to the risky algorithm</h2>
<div data-custom-style="Body Text">
@ -835,6 +882,602 @@
visibilization, invisibilization, responsibility and accountability.</p>
</div>
</section>
</section>
<section id="a-diagram-of-research" class="level1">
<h1>A diagram of research</h1>
<div data-custom-style="Body Text">
<p>In this conclusion, we reflect upon a final dimension of the method
of diagraming in the context of figurations and configurations: its
potential as an alternative to the conventional research program.</p>
</div>
<div data-custom-style="Body Text">
<p>While writing this text, indeed, the search for a coherent structure
through which we could map the problems that emerged from analyzing the
diagrams in a straightforward narrative proved elusive. We considered
various organizational frameworks, but consistently encountered
resistance from one or two sections. It became evident that our
interviews yielded a rhizome of interrelated problems, creating a
multitude of possible inquiries and overlapping trajectories. Some
dimensions of these problems are related, but not to every problem.</p>
</div>
<div data-custom-style="Body Text">
<p>If we take for example the understanding of algorithmic security
vision as practices of error management as a starting point, we see how
the actors we interviewed have incorporated the societal critique of
algorithmic bias. This serves as a catalyst for novel strategies aimed
at mitigating the repercussions of imperfect systems. The societal
critique has driven the development of synthetic datasets, which promise
equitable representation across diverse demographic groups. It has also
been the reason for the reliance on institutionalized benchmarks to
assess the impartiality of algorithms. Moreover, different
configurations of the human-in-the-loop emerge, all promised to rectify
algorithmic fallibility. We see a causal chain there.</p>
</div>
<div data-custom-style="Body Text">
<p>But how does the question of algorithmic error relate to the shift
from photographic to cinematic vision that algorithmic security vision
brings about? Certainly, there are reverberations. The relegation of
stable identity that we outlined, could be seen as a way to mitigate the
impact of those errors. But it would be a leap to identify these
questions of error as the central driver for the increased incorporation
of moving images in algorithmic security vision.</p>
</div>
<div data-custom-style="Body Text">
<p>However, if we take as our starting point the formidable strides in
computing power and the advancements in camera technologies, we face
similar problems. These developments make the analysis of movement
possible while helping to elucidate the advances in the real-time
analysis that are required to remove the human-in-the-loop, as trialed
in the Burglary-Free Neighborhood. These developments account for the
feasibility of the synthetic data generation, a computing-intense
process which opens a vast horizon of possibilities for developers to
detect objects or actions. Such an account, however, does not address
the need for such a synthetic dataset. A focus on the computation of
movement, however, would highlight how a lack of training data
necessitates many of the practices described. Synthetic data is
necessitated by the glaring absence of pre-existing security datasets
that contain moving bodies. While facial recognition algorithms could be
trained and operated on quickly repurposed photographic datasets of
national identity cards or drivers license registries, no dataset for
moving bodies has been available to be repurposed by states or
corporations. This absence of training data requires programmers to
stage scenes for the camera. Thus, while one issue contains echoes of
the other, the network of interrelated problematizations cannot be
flattened into a single narrative.</p>
</div>
<div data-custom-style="Body Text">
<p>The constraints imposed by the linear structure of an academic
article certainly necessitate a specific ordering of sections. Yet the
different research directions we highlight form something else. The
multiple figurations analyzed here generate fresh tensions when put in
relation with security and political practices. What appears from the
diagrams is a network of figurations in various configurations. Instead
of a research <em>program</em>, our interviews point toward a larger
research <em>diagram</em> of interrelated questions, which invites us to
think in terms of pathways through this dynamic and evolving network of
relations.</p>
</div>
</section>
<section id="references" class="level1">
<h1>References</h1>
<div data-custom-style="Bibliography">
<p>Ajana B (2013) <em>Governing Through Biometrics</em>. London:
Palgrave Macmillan UK. DOI: <a href="https://doi.org/10.1057/9781137290755"><span
data-custom-style="Hyperlink">10.1057/9781137290755</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Amicelle A, Aradau C and Jeandesboz J (2015) Questioning security
devices: Performativity, resistance, politics. <em>Security
Dialogue</em> 46(4): 293306. DOI: <a href="https://doi.org/10.1177/0967010615586964"><span
data-custom-style="Hyperlink">10.1177/0967010615586964</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Amoore L (2014) Security and the incalculable. <em>Security
Dialogue</em> 45(5). SAGE Publications Ltd: 423439. DOI: <a
href="https://doi.org/10.1177/0967010614539719"><span
data-custom-style="Hyperlink">10.1177/0967010614539719</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Amoore L (2019) Doubt and the algorithm: On the partial accounts of
machine learning. <em>Theory, Culture &amp; Society</em> 36(6). SAGE
Publications Ltd: 147169. DOI: <a href="https://doi.org/10.1177/0263276419851846"><span
data-custom-style="Hyperlink">10.1177/0263276419851846</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Amoore L (2021) The deep border. <em>Political Geography</em>.
Elsevier: 102547.</p>
</div>
<div data-custom-style="Bibliography">
<p>Amoore L and De Goede M (2005) Governance, risk and dataveillance in
the war on terror. <em>Crime, Law and Social Change</em> 43(2): 149173.
DOI: <a href="https://doi.org/10.1007/s10611-005-1717-8"><span
data-custom-style="Hyperlink">10.1007/s10611-005-1717-8</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Andersen RS (2015) <em>Remediating Security</em>. 1. oplag.
Ph.d.-serien / københavns universitet, institut for statskundskab. Kbh.:
Københavns Universitet, Institut for Statskundskab.</p>
</div>
<div data-custom-style="Bibliography">
<p>Andersen RS (2018) The art of questioning lethal vision: Mosses
infra and militarized machine vision. In: <em>_Proceeding of EVA
copenhagen 2018_</em>, 2018.</p>
</div>
<div data-custom-style="Bibliography">
<p>Andrejevic M and Burdon M (2015) Defining the sensor society.
<em>Television &amp; New Media</em> 16(1): 1936. DOI: <a
href="https://doi.org/10.1177/1527476414541552"><span
data-custom-style="Hyperlink">10.1177/1527476414541552</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Aradau C and Blanke T (2015) The (big) data-security assemblage:
Knowledge and critique. <em>Big Data &amp; Society</em> 2(2):
205395171560906. DOI: <a href="https://doi.org/10.1177/2053951715609066"><span
data-custom-style="Hyperlink">10.1177/2053951715609066</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Aradau C and Blanke T (2018) Governing others: Anomaly and the
algorithmic subject of security. <em>European Journal of International
Security</em> 3(1). Cambridge University Press: 121. DOI: <a
href="https://doi.org/10.1017/eis.2017.14"><span
data-custom-style="Hyperlink">10.1017/eis.2017.14</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Aradau C, Lobo-Guerrero L and Van Munster R (2008) Security,
technologies of risk, and the political: Guest editors introduction.
<em>Security Dialogue</em> 39(2-3): 147154. DOI: <a
href="https://doi.org/10.1177/0967010608089159"><span
data-custom-style="Hyperlink">10.1177/0967010608089159</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Azar M, Cox G and Impett L (2021) Introduction: Ways of machine
seeing. <em>AI &amp; SOCIETY</em>. DOI: <a href="https://doi.org/10.1007/s00146-020-01124-6"><span
data-custom-style="Hyperlink">10.1007/s00146-020-01124-6</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bae G, de La Gorce M, Baltrušaitis T, et al. (2023) DigiFace-1M: 1
million digital face images for face recognition. In: <em>2023 IEEE
Winter Conference on Applications of Computer Vision (WACV)</em>, 2023.
IEEE.</p>
</div>
<div data-custom-style="Bibliography">
<p>Barad KM (2007) <em>Meeting the Universe Halfway: Quantum Physics and
the Entanglement of Matter and Meaning</em>. Durham: Duke University
Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bellanova R, Irion K, Lindskov Jacobsen K, et al. (2021) Toward a
critique of algorithmic violence. <em>International Political
Sociology</em> 15(1): 121150. DOI: <a href="https://doi.org/10.1093/ips/olab003"><span
data-custom-style="Hyperlink">10.1093/ips/olab003</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bigo D (2002) Security and immigration: Toward a critique of the
governmentality of unease. <em>Alternatives</em> 27. SAGE Publications
Inc: 6392. DOI: <a href="https://doi.org/10.1177/03043754020270S105"><span
data-custom-style="Hyperlink">10.1177/03043754020270S105</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bigo D and Guild E (2005) Policing at a distance: Schengen visa
policies. In: <em>Controlling Frontiers. Free Movement into and Within
Europe</em>. Routledge, pp. 233263.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bommasani R, Hudson DA, Adeli E, et al. (2022) On the opportunities
and risks of foundation models. Available at: <a href="http://arxiv.org/abs/2108.07258"><span
data-custom-style="Hyperlink">http://arxiv.org/abs/2108.07258</span></a>
(accessed 2 June 2023).</p>
</div>
<div data-custom-style="Bibliography">
<p>Bousquet AJ (2018) <em>The Eye of War</em>. Minneapolis: University
of Minnesota Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Bucher T (2018) <em>If...Then: Algorithmic Power and Politics</em>.
New York: Oxford University Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Buolamwini J and Gebru T (2018) Gender shades: Intersectional
accuracy disparities in commercial gender classification.
<em>Proceedings of Machine Learning Research</em> 81.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Calhoun L (2023) Latency, uncertainty, contagion: Epistemologies of
risk-as-reform in crime forecasting software. <em>Environment and
Planning D: Society and Space</em>. SAGE Publications Ltd STM:
02637758231197012. DOI: <a href="https://doi.org/10.1177/02637758231197012"><span
data-custom-style="Hyperlink">10.1177/02637758231197012</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Carraro V (2021) Grounding the digital: A comparison of Wazes avoid
dangerous areas feature in Jerusalem, Rio de Janeiro and the US.
<em>GeoJournal</em> 86(3): 11211139. DOI: <a href="https://doi.org/10.1007/s10708-019-10117-y"><span
data-custom-style="Hyperlink">10.1007/s10708-019-10117-y</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Dawson-Howe K (2014) <em>A Practical Introduction to Computer Vision
with OpenCV</em>. 1st edition. Chichester, West Sussex, United Kingdon;
Hoboken, NJ: Wiley.</p>
</div>
<div data-custom-style="Bibliography">
<p>Dijstelbloem H, van Reekum R and Schinkel W (2017) Surveillance at
sea: The transactional politics of border control in the Aegean.
<em>Security Dialogue</em> 48(3): 224240. DOI: <a href="https://doi.org/10.1177/0967010617695714"><span
data-custom-style="Hyperlink">10.1177/0967010617695714</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Farocki H (2004) Phantom images. <em>Public</em>. Available at: <a
href="https://public.journals.yorku.ca/index.php/public/article/view/30354"><span
data-custom-style="Hyperlink">https://public.journals.yorku.ca/index.php/public/article/view/30354</span></a>
(accessed 6 March 2023).</p>
</div>
<div data-custom-style="Bibliography">
<p>Fisher DXO (2018) Situating border control: Unpacking Spains SIVE
border surveillance assemblage. <em>Political Geography</em> 65: 6776.
DOI: <a href="https://doi.org/10.1016/j.polgeo.2018.04.005"><span
data-custom-style="Hyperlink">10.1016/j.polgeo.2018.04.005</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Fourcade M and Gordon J (2020) Learning like a state: Statecraft in
the digital age32.</p>
</div>
<div data-custom-style="Bibliography">
<p>Fourcade M and Johns F (2020) Loops, ladders and links: The
recursivity of social and machine learning. <em>Theory and Society</em>:
130. DOI: <a href="https://doi.org/10.1007/s11186-020-09409-x"><span
data-custom-style="Hyperlink">10.1007/s11186-020-09409-x</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Fraser A (2019) Curating digital geographies in an era of data
colonialism. <em>Geoforum</em> 104. Elsevier: 193200.</p>
</div>
<div data-custom-style="Bibliography">
<p>Galton F (1879) Composite portraits, made by combining those of many
different persons into a single resultant figure. <em>The Journal of the
Anthropological Institute of Great Britain and Ireland</em> 8. [Royal
Anthropological Institute of Great Britain; Ireland, Wiley]: 132144.
DOI: <a href="https://doi.org/10.2307/2841021"><span
data-custom-style="Hyperlink">10.2307/2841021</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Gandy OH (2021) <em>The Panoptic Sort: A Political Economy of
Personal Information</em>. Oxford University Press. Available at: <a
href="https://books.google.com?id=JOEsEAAAQBAJ"><span
data-custom-style="Hyperlink">https://books.google.com?id=JOEsEAAAQBAJ</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Gillespie T (2018) <em>Custodians of the Internet: Platforms, Content
Moderation, and the Hidden Decisions That Shape Social Media</em>.
Illustrated edition. Yale University Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Goodwin C (1994) Professional vision. <em>American
Anthropologist</em> 96(3).</p>
</div>
<div data-custom-style="Bibliography">
<p>Graham S (1998) Spaces of surveillant simulation: New technologies,
digital representations, and material geographies. <em>Environment and
Planning D: Society and Space</em> 16(4). SAGE Publications Sage UK:
London, England: 483504.</p>
</div>
<div data-custom-style="Bibliography">
<p>Graham SD (2005) Software-sorted geographies. <em>Progress in human
geography</em> 29(5). Sage Publications Sage CA: Thousand Oaks, CA:
562580.</p>
</div>
<div data-custom-style="Bibliography">
<p>Grasseni C (2004) Skilled vision. An apprenticeship in breeding
aesthetics. <em>Social Anthropology</em> 12(1): 4155. DOI: <a
href="https://doi.org/10.1017/S0964028204000035"><span
data-custom-style="Hyperlink">10.1017/S0964028204000035</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Grasseni C (2018) Skilled vision. In: Callan H (ed.) <em>The
International Encyclopedia of Anthropology</em>. 1st ed. Wiley, pp. 17.
DOI: <a href="https://doi.org/10.1002/9781118924396.wbiea1657"><span
data-custom-style="Hyperlink">10.1002/9781118924396.wbiea1657</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Haraway D (1988) Situated knowledges: The science question in
feminism and the privilege of partial perspective. <em>Feminist
Studies</em> 14(3). Feminist Studies, Inc.: 575599. DOI: <a
href="https://doi.org/10.2307/3178066"><span
data-custom-style="Hyperlink">10.2307/3178066</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Hoijtink M and Leese M (2019) How (not) to talk about technology
international relations and the question of agency. In: Hoijtink M and
Leese M (eds) <em>Technology and Agency in International Relations</em>.
Emerging technologies, ethics and international affairs. London ; New
York: Routledge, pp. 124.</p>
</div>
<div data-custom-style="Bibliography">
<p>Hopman R and Mcharek A (2020) Facing the unknown suspect: Forensic
DNA phenotyping and the oscillation between the individual and the
collective. <em>BioSocieties</em> 15(3): 438462. DOI: <a
href="https://doi.org/10.1057/s41292-020-00190-9"><span
data-custom-style="Hyperlink">10.1057/s41292-020-00190-9</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Hunger F (2023) <em>Unhype artificial intelligence! A proposal to
replace the deceiving terminology of AI.</em> 12 April. Zenodo. DOI: <a
href="https://doi.org/10.5281/zenodo.7524493"><span
data-custom-style="Hyperlink">10.5281/zenodo.7524493</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Huysmans J (2022) Motioning the politics of security: The primacy of
movement and the subject of security. <em>Security Dialogue</em> 53(3):
238255. DOI: <a href="https://doi.org/10.1177/09670106211044015"><span
data-custom-style="Hyperlink">10.1177/09670106211044015</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Isin E and Ruppert E (2020) The birth of sensory power: How a
pandemic made it visible? <em>Big Data &amp; Society</em> 7(2). SAGE
Publications Ltd: 2053951720969208. DOI: <a href="https://doi.org/10.1177/2053951720969208"><span
data-custom-style="Hyperlink">10.1177/2053951720969208</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Jasanoff S (2004) <em>States of Knowledge: The Co-Production of
Science and Social Order</em>. Routledge Taylor &amp; Francis Group.</p>
</div>
<div data-custom-style="Bibliography">
<p>Ji Z, Lee N, Frieske R, et al. (2023) Survey of hallucination in
natural language generation. <em>ACM Computing Surveys</em> 55(12):
138. DOI: <a href="https://doi.org/10.1145/3571730"><span
data-custom-style="Hyperlink">10.1145/3571730</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Keyes O (2019) The gardeners vision of data: Data science reduces
people to subjects that can be mined for truth. <em>Real Life Mag</em>.
Available at: <a href="https://reallifemag.com/the-gardeners-vision-of-data/"><span
data-custom-style="Hyperlink">https://reallifemag.com/the-gardeners-vision-of-data/</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Latour B (2005) <em>Reassembling the Social: An Introduction to
Actor-Network-Theory</em>. Clarendon Lectures in Management Studies.
Oxford; New York: Oxford University Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Leese M (2015) We were taken by surprise: Body scanners, technology
adjustment, and the eradication of failure. <em>Critical Studies on
Security</em> 3(3). Routledge: 269282. DOI: <a
href="https://doi.org/10.1080/21624887.2015.1124743"><span
data-custom-style="Hyperlink">10.1080/21624887.2015.1124743</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Leese M (2019) Configuring warfare: Automation, control, agency. In:
Hoijtink M and Leese M (eds) Technology and Agency in International
Relations. Emerging technologies, ethics and international affairs.
London; New York: Routledge, pp. 4265.</p>
</div>
<div data-custom-style="Bibliography">
<p>Lorusso S (2021) The user condition. Available at: <a href="https://theusercondition.computer/"><span
data-custom-style="Hyperlink">https://theusercondition.computer/</span></a>
(accessed 18 February 2021).</p>
</div>
<div data-custom-style="Bibliography">
<p>Lyon D (2003) <em>Surveillance as Social Sorting: Privacy, Risk, and
Digital Discrimination</em>. Psychology Press. Available at: <a
href="https://books.google.com?id=yCLFBfZwl08C"><span
data-custom-style="Hyperlink">https://books.google.com?id=yCLFBfZwl08C</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Mackenzie A (2017) <em>Machine Learners: Archaeology of a Data
Practice</em>. The MIT Press. DOI: <a href="https://doi.org/10.7551/mitpress/10302.001.0001"><span
data-custom-style="Hyperlink">10.7551/mitpress/10302.001.0001</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Maguire M, Frois C and Zurawski N (eds) (2014) <em>The Anthropology
of Security: Perspectives from the Frontline of Policing,
Counter-Terrorism and Border Control</em>. Anthropology, culture and
society. London: Pluto Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Mahony M (2021) Geographies of science and technology 1: Boundaries
and crossings. <em>Progress in Human Geography</em> 45(3): 586595. DOI:
<a href="https://doi.org/10.1177/0309132520969824"><span
data-custom-style="Hyperlink">10.1177/0309132520969824</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Markoff J (2020) Robots will need humans in future. <em>The New York
Times: Section B</em>, 22 May. New York. Available at: <a
href="https://www.nytimes.com/2020/05/21/technology/ben-shneiderman-automation-humans.html"><span
data-custom-style="Hyperlink">https://www.nytimes.com/2020/05/21/technology/ben-shneiderman-automation-humans.html</span></a>
(accessed 31 October 2023).</p>
</div>
<div data-custom-style="Bibliography">
<p>McCosker A and Wilken R (2020) <em>Automating Vision: The Social
Impact of the New Camera Consciousness</em>. 1st edition. Routledge.</p>
</div>
<div data-custom-style="Bibliography">
<p>Møhl P (2021) Seeing threats, sensing flesh: Humanmachine ensembles
at work. <em>AI &amp; SOCIETY</em> 36(4): 12431252. DOI: <a
href="https://doi.org/10.1007/s00146-020-01064-1"><span
data-custom-style="Hyperlink">10.1007/s00146-020-01064-1</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Muller B (2010) <em>Security, Risk and the Biometric State</em>.
Routledge. DOI: <a href="https://doi.org/10.4324/9780203858042"><span
data-custom-style="Hyperlink">10.4324/9780203858042</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>OSullivan S (2016) On the diagram (and a practice of diagrammatics).
In: Schneider K, Yasar B, and Lévy D (eds) <em>Situational Diagram</em>.
New York: Dominique Lévy, pp. 1325.</p>
</div>
<div data-custom-style="Bibliography">
<p>Olwig KF, Grünenberg K, Møhl P, et al. (2019) <em>The Biometric
Border World: Technologies, Bodies and Identities on the Move</em>. 1st
ed. Routledge. DOI: <a href="https://doi.org/10.4324/9780367808464"><span
data-custom-style="Hyperlink">10.4324/9780367808464</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Pasquinelli M (2015) Anomaly detection: The mathematization of the
abnormal in the metadata society. Panel presentation.</p>
</div>
<div data-custom-style="Bibliography">
<p>Pasquinelli M (2019) How a machine learns and fails a grammar of
error for artificial intelligence. Available at: <a
href="https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/"><span
data-custom-style="Hyperlink">https://spheres-journal.org/contribution/how-a-machine-learns-and-fails-a-grammar-of-error-for-artificial-intelligence/</span></a>
(accessed 13 January 2021).</p>
</div>
<div data-custom-style="Bibliography">
<p>Pugliese J (2010) <em>Biometrics: Bodies, Technologies,
Biopolitics</em>. New York: Routledge. DOI: <a href="https://doi.org/10.4324/9780203849415"><span
data-custom-style="Hyperlink">10.4324/9780203849415</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Schurr C, Marquardt N and Militz E (2023) Intimate technologies:
Towards a feminist perspective on geographies of technoscience.
<em>Progress in Human Geography</em>. SAGE Publications Ltd:
03091325231151673. DOI: <a href="https://doi.org/10.1177/03091325231151673"><span
data-custom-style="Hyperlink">10.1177/03091325231151673</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Soon W and Cox G (2021) <em>Aesthetic Programming: A Handbook of
Software Studies</em>. London: Open Humanities Press. Available at: <a
href="http://www.openhumanitiespress.org/books/titles/aesthetic-programming/"><span
data-custom-style="Hyperlink">http://www.openhumanitiespress.org/books/titles/aesthetic-programming/</span></a>
(accessed 9 March 2021).</p>
</div>
<div data-custom-style="Bibliography">
<p>Srnicek N and De Sutter L (2017) <em>Platform Capitalism</em>. Theory
redux. Cambridge, UK ; Malden, MA: Polity.</p>
</div>
<div data-custom-style="Bibliography">
<p>Stevens N and Keyes O (2021) Seeing infrastructure: Race, facial
recognition and the politics of data. <em>Cultural Studies</em> 35(4-5):
833853. DOI: <a href="https://doi.org/10.1080/09502386.2021.1895252"><span
data-custom-style="Hyperlink">10.1080/09502386.2021.1895252</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Suchman L (2006) <em>Human-Machine Reconfigurations: Plans and
Situated Actions</em>. 2nd edition. Cambridge University Press.</p>
</div>
<div data-custom-style="Bibliography">
<p>Suchman L (2012) Configuration. In: <em>Inventive Methods</em>.
Routledge, pp. 4860.</p>
</div>
<div data-custom-style="Bibliography">
<p>Suchman L (2020) Algorithmic warfare and the reinvention of accuracy.
<em>Critical Studies on Security</em> 8(2). Routledge: 175187. DOI: <a
href="https://doi.org/10.1080/21624887.2020.1760587"><span
data-custom-style="Hyperlink">10.1080/21624887.2020.1760587</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Sudmann A (2021) Artificial neural networks, postdigital
infrastructures and the politics of temporality. In: Volmar A and Stine
K (eds) <em>Media Infrastructures and the Politics of Digital Time</em>.
Amsterdam University Press, pp. 279294. DOI: <a href="https://doi.org/10.1515/9789048550753-017"><span
data-custom-style="Hyperlink">10.1515/9789048550753-017</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Tazzioli M (2018) Spy, track and archive: The temporality of
visibility in Eurosur and Jora. <em>Security Dialogue</em> 49(4):
272288. DOI: <a href="https://doi.org/10.1177/0967010618769812"><span
data-custom-style="Hyperlink">10.1177/0967010618769812</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Thatcher J, OSullivan D and Mahmoudi D (2016) Data colonialism
through accumulation by dispossession: New metaphors for daily data.
<em>Environment and Planning D: Society and Space</em> 34(6). SAGE
Publications Ltd STM: 9901006. DOI: <a href="https://doi.org/10.1177/0263775816633195"><span
data-custom-style="Hyperlink">10.1177/0263775816633195</span></a>.
</p>
</div>
<div data-custom-style="Bibliography">
<p>Uliasz R (2020) Seeing like an algorithm: Operative images and
emergent subjects. <em>AI &amp; SOCIETY</em>. DOI: <a
href="https://doi.org/10.1007/s00146-020-01067-y"><span
data-custom-style="Hyperlink">10.1007/s00146-020-01067-y</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>van de Ven R and Plájás IZ (2022) Inconsistent projections:
Con-figuring security vision through diagramming. <em>A Peer-Reviewed
Journal About</em> 11(1): 5065. DOI: <a href="https://doi.org/10.7146/aprja.v11i1.134306"><span
data-custom-style="Hyperlink">10.7146/aprja.v11i1.134306</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Wilcox L (2017) Embodying algorithmic war: Gender, race, and the
posthuman in drone warfare. <em>Security Dialogue</em> 48(1): 1128.
DOI: <a href="https://doi.org/10.1177/0967010616657947"><span
data-custom-style="Hyperlink">10.1177/0967010616657947</span></a>.</p>
</div>
<div data-custom-style="Bibliography">
<p>Zuboff S (2019) <em>The Age of Surveillance Capitalism: The Fight for
a Human Future at the New Frontier of Power</em>. First edition. New
York: Public Affairs.</p>
</div>
</section>
<section class="footnotes footnotes-end-of-document" role="doc-endnotes">
<hr />
<ol>
<li id="fn1" role="doc-endnote">
<div data-custom-style="Footnote Text">
<p><span data-custom-style="Footnote Characters"></span> The interface
software and code is available at <a
href="https://git.rubenvandeven.com/security_vision/svganim"><span
data-custom-style="Hyperlink">https://git.rubenvandeven.com/security_vision/svganim</span></a>
and <a href="https://gitlab.com/security-vision/chronodiagram"><span
data-custom-style="Hyperlink">https://gitlab.com/security-vision/chronodiagram</span></a>
</p>
</div>
<a href="#fnref1" class="footnote-back" role="doc-backlink">↩︎</a>
</li>
<li id="fn2" role="doc-endnote">
<div data-custom-style="Footnote Text">
<p><span data-custom-style="Footnote Characters"></span> The interviews
were conducted in several European countries: the majority in the
Netherlands, but also in Belgium, Hungary and Poland. Based on an
initial survey of algorithmic security vision practices in Europe we
identified various roles that are involved in such practices. Being a
rather small group of people, these interviewees do not serve as
“illustrative representatives” (Mol &amp; Law 2002, 16-17) of the field
they work in. However, as the interviewees have different cultural and
institutional affiliations, and hold different positions in working with
algorithms, vision and security, they cover a wide spectrum of
engagements with our research object.</p>
</div>
<a href="#fnref2" class="footnote-back" role="doc-backlink">↩︎</a>
</li>
<li id="fn3" role="doc-endnote">
<div data-custom-style="Footnote Text">
<p><span data-custom-style="Footnote Characters"></span> The interviews
were conducted by the first two authors, and at a later stage by Clemens
Baier. The conversations were largely unstructured, but began with two
basic questions. First, we asked the interviewees if they use diagrams
in their daily practice. We then asked: “when we speak of security
vision we speak of the use of computer vision in a security context.
Can you explain from your perspective what these concepts mean and how
they come together?” After the first few interviews, we identified some
recurrent themes, which we then specifically asked later interviewees to
discuss.</p>
</div>
<a href="#fnref3" class="footnote-back" role="doc-backlink">↩︎</a>
</li>
<li id="fn4" role="doc-endnote">
<div data-custom-style="Footnote Text">
<p><span data-custom-style="Footnote Characters"></span> Using
anthropomorphizing terms such as “neural networks,” “learning” and
“training” to denote algorithmic configurations and processes is
suggested to hype “artificial intelligence.” While we support the need
for an alternative terminology as proposed by Hunger (2023), here we
preserve the language of our interviewees.</p>
</div>
<a href="#fnref4" class="footnote-back" role="doc-backlink">↩︎</a>
</li>
</ol>
</section>
</body>
</html>