Item Details
Skip Navigation Links
   ActiveUsers:1412Hits:19415179Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID157740
Title ProperGoverning others
Other Title Informationanomaly and the algorithmic subject of security
LanguageENG
AuthorAradau, Claudia ;  Blanke, Tobias
Summary / Abstract (Note)As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the ‘other’ is algorithmically produced as anomaly. Although anomaly has often been used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial ‘dots’, temporal ‘spikes’, and topological ‘nodes’. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.
`In' analytical NoteEuropean Journal of International Security Vol. 3, No.1; Feb 2018: p.1-21
Journal SourceEuropean Journal of International Security Vol: 3 No 1
Key WordsSecurity ;  Surveillance ;  Self ;  Algorithms ;  Other ;  Big Data ;  Anomaly


 
 
Media / Other Links  Full Text