446 research outputs found

    The algorithmic regulation of security: An infrastructural perspective

    Get PDF
    This article contributes to debates on algorithmic regulation by focusing on the domain of security. It develops an infrastructural perspective, by analyzing how algorithmic regulation is enacted through the custom‐built transatlantic data infrastructures of the EU‐U.S. Passenger Name Records and Terrorism Financing Tracking Program programs. Concerning regulation through algorithms, this approach analyzes how specific, commercial data are rendered transferable and meaningful in a security context. Concerning the regulation of algorithms, an infrastructural perspective examines how public values like privacy and accountability are built into international data infrastructures. The creation of data infrastructures affects existing modes of governance and fosters novel power relations among public and private actors. We highlight emergent modes of standard setting, thus enriching Yeung's (2018) taxonomy, and question the practical effects of operationalizing public values through infrastructural choices. Ultimately, the article offers a critical reading of algorithmic security, and how it materially, legally, and politically supports specific ways of doing security

    Co-Producing Security: Platform Content Moderation and European Security Integration

    Get PDF
    The European Union (EU) seeks to play a leading role in steering the private work of online content moderation, as demonstrated by numerous policy and legislative initiatives in the domain. Two initiatives, in particular, are shaping terrorist content moderation: the creation of a EU Internet Referral Unit and the adoption of a Regulation on preventing the online dissemination of terrorist content (TERREG). This article analyses these initiatives and their practical effects. In particular, it unpacks the legal and technological mechanisms at the core of EU regulation in the realm of online terrorist content moderation, and how they co-produce security decisions across public and private spheres. Based on interviews, fieldwork observations and document analysis, we show how processes of referral and removal, and processes of flagging and filtering are key to EU-directed content moderation. In conclusion, we reflect on content moderation as a novel form of European security integration
    corecore