scholarly journals Security in transition(s): The low-level security politics of electric vehicle range anxiety

2019 ◽  
Vol 50 (6) ◽  
pp. 547-563 ◽  
Author(s):  
Johannes Kester

By drawing on critical security studies in the context of a sociotechnical transition, this article calls for more attention to the presence and sometimes alternative use of mostly unobserved security practices in the materialization of everyday consumer goods and services. This call is illustrated through a discussion of the phenomenon of range anxiety and the intra-action between drivers of electric vehicles (EVs), designers, and algorithms that observe, estimate and nudge the remaining range of an EV. Inspired by Foucault and Barad, the range-anxiety discussion offers four alternative security insights. First, it supports an argument to include stress as an embodied instance of insecurity. Second, it draws attention to a security apparatus that is based on a constantly expanding assemblage around range estimates. Third, it shows how this apparatus rests on a novel algorithm that has a continuous instead of a binary output and is governed by a distributed sovereignty: where the driver simultaneously is the object of measurement, subject of governance for more efficient driving and the ultimate sovereign who decides on the trip. Lastly, the discussion highlights how range estimates not only mediate the materialization of EVs and their automobility but also (re)perform epistemological or ontological forms of uncertainty.

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Jenn-Jiang Hwang ◽  
Jia-Sheng Hu ◽  
Chih-Hong Lin

The range-extended electric vehicle is proposed to improve the range anxiety drivers have of electric vehicles. Conventionally, a gasoline/diesel generator increases the range of an electric vehicle. Due to the zero-CO2emission stipulations, utilizing fuel cells as generators raises concerns in society. This paper presents a novel charging strategy for fuel cell/battery electric vehicles. In comparison to the conventional switch control, a fuzzy control approach is employed to enhance the battery’s state of charge (SOC). This approach improves the quick loss problem of the system’s SOC and thus can achieve an extended driving range. Smooth steering experience and range extension are the main indexes for development of fuzzy rules, which are mainly based on the energy management in the urban driving model. Evaluation of the entire control system is performed by simulation, which demonstrates its effectiveness and feasibility.


2020 ◽  
Vol 1 ◽  
pp. 1-23
Author(s):  
Dominik Bucher ◽  
Henry Martin ◽  
Jannik Hamper ◽  
Atefeh Jaleh ◽  
Henrik Becker ◽  
...  

Abstract. The adoption of electric vehicles has the potential to help decarbonizing the transport sector if they are powered by renewable energy sources. Limitations commonly associated with e-cars are their comparatively short ranges and long recharging cycles, leading to anxiety when having to travel long distances. Other factors such as temperature, destination or weekday may influence people in choosing an e-car for a certain trip. Using a unique dataset of 129 people who own both an electric vehicle (EV) as well as one powered by an internal combustion engine (ICE), we analyze tracking data over a year in order to have an empirically verified choice model. Based on a wide range of predictors, this model tells us for an individual journey if the person would rather choose the EV or the ICE car. Our findings show that there are only weak relations between the predictor and target variables, indicating that for many people the switch to an e-car would not affect their lifestyle and the related range anxiety diminishes when actually owning an electric vehicle. In addition, we find that choice behavior does not generalize well over different users.


2019 ◽  
Vol 50 (6) ◽  
pp. 531-546 ◽  
Author(s):  
Linda Monsees

This article contributes to the emerging literature on publics within critical security studies. Its particular focus is on contestation in the context of diffuse security technology. Contemporary security practices are characterized by diffusion and dispersion. As a result, contestation of security technology is also dispersed and diffuse and requires an account of publics that is sensitive to this aspect. The article conceptualizes ‘multiple publics’ as a mode of fundamental contestation of established political institutions. In order to do so, it discusses previous approaches to sociotechnical controversies and material participation. As a result of this discussion, it becomes apparent that we need a concept of publics that does not reduce political contestation to a pre-existing set of institutions. I develop a notion of publicness that emphasizes the way in which publics are embedded in societal struggles. This is achieved by reading John Dewey as a theorist to whom contestation is a vital part of democracy. It becomes possible to understand contestation against diffuse security practices – such as surveillance – as forms of emerging publics, even though they might not feed back into governmental decisionmaking.


2021 ◽  
Author(s):  
Mario Herberz ◽  
Ulf Hahnel ◽  
Tobias Brosch

Abstract Electric vehicles are on the rise, but are still far from reaching the global market share required to achieve climate objectives. While financial and technological adoption barriers are increasingly removed, psychological barriers remain insufficiently addressed on a large scale. Here, we show that car owners substantially underestimate the compatibility of available battery capacities with their individual mobility needs, increasing the demand of long battery ranges and reducing willingness to adopt. We test a simple behavioral intervention in two randomized online experiments in Germany and the U.S.: providing tailored compatibility information reduced range anxiety and increased willingness to pay for electric vehicles. Compatibility information more strongly increased preferences than information about privileged access to charging infrastructure, and selectively increased preferences of car owners for whom an electric vehicle would yield higher financial benefits. This scalable intervention may complement classical policy approaches in achieving a resource-conscious and global electrification of mobility.


2018 ◽  
Vol 43 (4) ◽  
pp. 190-206
Author(s):  
Thorsten Bonacker

In this article, I examine the role security plays in creating a socioterritorial order in statebuilding policies. I argue that security contributes to the creation of center–periphery asymmetries, for example, through the portrayal of the center as threatened by a dangerous periphery or the periphery as disloyal and untrustworthy. In particular, I explore how security practices work in two distinct center–periphery figurations: in internal colonization, where a specific population, located within a dominant power, is subordinated; and in international intervention, where a society is internationally ruled. The article incorporates the literature on internal colonialism and international intervention from a critical security studies perspective to show how security functions as a mode of governing by creating specific center–periphery figurations in statebuilding. The overall aim is to provide a new theoretical perspective by intertwining critical security and postcolonial studies and to stimulate empirical research on the function of security as a principle of socioterritorial ordering.


2015 ◽  
Vol 46 (1) ◽  
pp. 3-14 ◽  
Author(s):  
Myriam Dunn Cavelty ◽  
Mareile Kaufmann ◽  
Kristian Søby Kristensen

Diverse, sometimes even contradictory concepts and practices of resilience have proliferated into a wide range of security policies. In introducing this special issue, we problematize and critically discuss how these forms of resilience change environments, create subjects, link temporalities, and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs to be conceptualized and investigated in plural terms. We use temporalities and subjectivities as key analytical aspects to investigate the plural instantiations of resilience in actual political practice. These two issues – subjectivity and temporality – form the overall context for the special issue and are core themes for all the articles collected here.


Author(s):  
Christopher Smith Ochoa ◽  
Frank Gadinger ◽  
Taylan Yildiz

Abstract Current debates about surveillance demonstrate the complexity of political controversies whose uncertainty and moral ambiguities render normative consensus difficult to achieve. The question of how to study political controversies remains a challenge for IR scholars. Critical security studies scholars have begun to examine political controversies around surveillance by exploring changing security practices in the everyday. Yet, (de)legitimation practices have hitherto not been the focus of analysis. Following recent practice-oriented research, we develop a conceptual framework based on the notion of ‘narrative legitimation politics’. We first introduce the concept of ‘tests’ from Boltanski's pragmatic sociology to categorise the discursive context and different moral reference points (truth, reality, existence). Second, we combine pragmatic sociology with narrative analysis to enable the study of dominant justificatory practices. Third, we develop the framework through a practice-oriented exploration of the Snowden controversy with a focus on the US and Germany. We identify distinct justificatory practices in each test format linked to narrative devices (for example, plots, roles, metaphors) whose fluid, contested dynamics have the potential to effect change. The framework is particularly relevant for IR scholars interested in legitimacy issues, the normativity of practices, and the power of narratives.


2020 ◽  
Vol 14 (4) ◽  
pp. 382-398 ◽  
Author(s):  
Tasniem Anwar

Abstract During terrorism trials, social media activities such as tweeting, Facebook posts, and WhatsApp conversations have become an essential part of the evidence presented. Amidst the complexity of prosecuting crimes with limited possibilities for criminal investigations and evidence collection, social media interactions can provide valuable information to reconstruct events that occurred there-and-then, to prosecute in the here-and-now. This paper follows social media objects as evidentiary objects in different court judgments to research how security practices and knowledge interact with legal practices in the court room. I build on the notion of the folding object as described by Bruno Latour and Amade M'charek to research the practices and arguments of the judges through which they unfold some of the histories, interpretations, and politics inside the object as reliable evidence. This concept allows for an in-depth examination of how histories are entangled in the presentation of an evidentiary object and how these references to histories are made (in)visible during legal discussions on security and terrorism. The paper therefore contributes to the field of critical security studies by focusing on how security practices are mediated in the everyday legal settings of domestic court rooms.


Author(s):  
Salami A. Nasirudeen ◽  
M. A. Aminu ◽  
M. S. Haruna ◽  
E. N. C. Okafor

Electric vehicle is a sustainable development which is capable of transforming the transport sector. It is a sustainable alternative to internal combustion engine-based vehicle. Its technology is based on utilization of sustainable energy resources which are eco-friendly and replenishes in nature. Wide deployment of electric vehicle is expected to minimize the challenge of fossil fuel depletion and greenhouse emissions are expected to be reduced. However, despite all aforementioned advantages of the electric vehicle, its wide deployment faces some challenges including cost, size and range anxiety. Electric vehicles have limited range which is one of the major factors affecting its market penetration.  Researchers highlighted several strategies/methods of extending its driving range. Thus, this work presents a review of different strategies proposed on range extension of the electric vehicle. The strengths and weaknesses of some of the proposed methods are also presented in this work.


2014 ◽  
Vol 12 (4) ◽  
pp. 485-501 ◽  
Author(s):  
Jeffrey Monaghan

Security agencies in Canada have become increasingly anxious regarding the threat of domestic radicalization. Defined loosely as “the process of moving from moderate beliefs to extremist belief,” inter-agency security practices aim to categorize and surveil populations deemed at-risk of radicalization in Canada, particularly young Muslims. To detail surveillance efforts against domestic radicalization, this article uses the Access to Information Act (ATIA) to detail the work of Canada’s inter-agency Combating Violent Extremism Working Group (CVEWG). As a network of security governance actors across Canada, the CVEWG is comprised of almost 20 departments and agencies with broad areas of expertise (intelligence, defence, policing, border security, transportation, immigration, etc.). Contributing to critical security studies and scholarship on the sociology of surveillance, this article maps the contours and activities of the CVEWG and uses the ATIA to narrate the production and iteration of radicalization threats through Canadian security governance networks. Tracing the influence of other states – the U.S. and U.K., in particular – the article highlights how surveillance practices that target radicalization are disembedded from particular contexts and, instead, framed around abstractions of menacing Islam. By way of conclusion, it casts aspersions on the expansion of counter-terrorism resources towards combating violent extremism; raising questions about the dubious categories and motives in contemporary practices of the “war on terror.” 


Sign in / Sign up

Export Citation Format

Share Document