Postscript: Towards a Research Agenda on Security Practices

2020 ◽  
pp. 203-210
Author(s):  
Conrad Schetter
2021 ◽  
Vol 15 (1) ◽  
pp. 121-150
Author(s):  
Rocco Bellanova ◽  
Kristina Irion ◽  
Katja Lindskov Jacobsen ◽  
Francesco Ragazzi ◽  
Rune Saugmann ◽  
...  

Abstract Questions about how algorithms contribute to (in)security are under discussion across international political sociology. Building upon and adding to these debates, our collective discussion foregrounds questions about algorithmic violence. We argue that it is important to examine how algorithmic systems feed (into) specific forms of violence, and how they justify violent actions or redefine what forms of violence are deemed legitimate. Bringing together different disciplinary and conceptual vantage points, this collective discussion opens a conversation about algorithmic violence focusing both on its specific instances and on the challenges that arise in conceptualizing and studying it. Overall, the discussion converges on three areas of concern—the violence undergirding the creation and feeding of data infrastructures; the translation processes at play in the use of computer/machine vision across diverse security practices; and the institutional governing of algorithmic violence, especially its organization, limitation, and legitimation. Our two-fold aim is to show the potential of a cross-disciplinary conversation and to move toward an interactional research agenda. While our approaches diverge, they also enrich each other. Ultimately, we highlight the critical purchase of studying the role of algorithmic violence in the fabric of the international through a situated analysis of algorithmic systems as part of complex, and often messy, practices. Les questions concernant la manière dont les algorithmes affectent l’(in)sécurité deviennent de plus en plus courantes en sociologie politique internationale. Notre discussion collective s'appuie sur ces débats et les enrichit en abordant les questions portant sur la violence algorithmique. Nous soutenons qu'il est important d'analyser et de discuter de la manière dont les systèmes algorithmiques alimentent (et entretiennent) des formes spécifiques de violence, ainsi que de la façon dont ils justifient des actes violents ou redéfinissent les formes de violence jugées légitimes. Cette discussion collective réunit différents points de vue disciplinaires et conceptuels pour ouvrir un débat sur la violence algorithmique en se concentrant à la fois sur des exemples spécifiques et sur les défis à relever pour la conceptualiser et l’étudier. Cette discussion se concentre sur trois sujets de préoccupation : la violence qui sous-tend la création et l'alimentation des infrastructures de données, les processus de conversion en jeu dans l'utilisation de la vision informatique/machine à travers diverses pratiques de sécurité, et la gouvernance institutionnelle de la violence algorithmique, en particulier son organisation, sa limitation et sa légitimation. Notre double objectif est de montrer le potentiel d'une discussion interdisciplinaire et d'avancer vers un programme de recherche interactionnel. Bien que nos approches divergent, elles s'enrichissent mutuellement. Notre but est de mettre en évidence les possibilités analytiques ouvertes par l'étude de la violence algorithmique et de son role dans la fabrique des relations internationales, par le biais d'une étude des systèmes algorithmiques dans le cadre de pratiques complexes et désordonnées. Las preguntas acerca de cómo afectan los algoritmos a la (in)seguridad son cada vez más comunes en la Sociología Política Internacional. A fin de construir y sumar a estos debates, nuestro Debate Colectivo pone en primer plano las preguntas sobre la violencia algorítmica. Sostenemos que es importante abrir el debate acerca de cómo los sistemas algorítmicos alimentan (en) formas específicas de violencia, cómo justifican las acciones violentas o redefinen qué formas de violencia se consideran legítimas. A partir de la reunión de diferentes puntos de vista disciplinarios y conceptuales, este Debate Colectivo abre una conversación sobre la violencia algorítmica centrándose tanto en sus instancias específicas como en los desafíos de su conceptualización y estudio. En general, el debate converge en tres áreas de interés: la violencia que sustenta la creación y alimentación de las infraestructuras de datos, los procesos de traducción en juego en la utilización de la visión de la computadora/máquina a través de diversas prácticas de seguridad y el gobierno institucional de la violencia algorítmica, especialmente su organización, limitación y legitimación. Nuestro doble objetivo es mostrar el potencial de una conversación interdisciplinaria y avanzar hacia una agenda de investigación interactiva. Si bien nuestros abordajes divergen, se enriquecen mutuamente. Finalmente, destacamos la adquisición fundamental del estudio de las funciones de la violencia algorítmica en el tejido de lo internacional a través de un análisis situado de los sistemas algorítmicos como parte de prácticas complejas y, a menudo, desordenadas.


Author(s):  
Conrad Schetter

The chapter asks how the insights generated here can make a more general contribution to the future study of everyday security practices of marginalized groups. It emphasizes the importance of taking into account the factors of space and time when analyzing security. In particular, it supports calls to analyze security practices beyond the limiting framework of the 'nation-state'. A stronger focus on individual future-making activities may very much enrich security-related research. Moreover, the chapter asks to what extent the findings collected in this volume may similarly apply to marginalized – and often violently repressed – people in other parts of Central Asia.


Author(s):  
Corinne Bieder ◽  
Kenneth Pettersen Gould

Abstract This chapter discusses some of the research and management challenges related to the safety and security nexus. In the first part, we address the conceptual connections between safety and security and discuss how different perspectives on how they come together allows for characterizing the complexity and ambivalence of their interrelations. We then go on to identify tradeoffs between safety and security and show that these exist both in theory and practice. Managing both safety and security means tradeoffs and power relations between internal entities and professionals, but also beyond its own boundaries since some vulnerabilities escape the organization’s scope. In the final part of the chapter, we argue that addressing the interrelations between safety and security poses managerial and research challenges that call for global approaches to apprehend the multiple facets of the issue. We explain that little has been done on how the global trends of the risk society bring with them unanticipated and “hidden” effects on organizations safety and security practices and that it is here, as a macro-global oriented approach to organizational safety and security research, that the two fields of safety and security confront a shared research agenda.


2017 ◽  
Vol 48 (3) ◽  
pp. 187-205 ◽  
Author(s):  
Theodore Baird

This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.


2013 ◽  
Vol 11 (4) ◽  
pp. 392-404 ◽  
Author(s):  
Chad Whelan

Surveillance and security at sporting mega-events has been the subject of considerable recent scholarly attention. Sporting mega-events such as the Olympic Games and World Cup Football Finals have become occasions of almost unparalleled economic, political and social significance. In the lead up to the London 2012 Olympic Games, scholars have examined issues such as the ‘security legacies’ left by sporting mega-events, the infrastructures and technologies used in an attempt to secure these events, and the planning mentalities underpinning the staggering ‘security spectacle’ of sporting mega-events. This article deals with the subject of how surveillance and security practices at sporting mega-events are organised. It uses an emerging paradigm of ‘security networks’ to call attention to some of the important issues involving the entire ‘security assemblage’ that accompanies sporting mega-events. The article presents five levels of analysis – structural, cultural, policy, technological and relational – to examine these practices and present key areas for further research on sporting mega-events.


2018 ◽  
Vol 49 (6) ◽  
pp. 421-437 ◽  
Author(s):  
Michelle D Weitzel

Sound represents a salient yet rarely examined counterpoint to visuality and materiality in security, international bordering, and mobility literature. Using the context of sub-Saharan African migration as grounding for empirical analysis and drawing on fieldwork conducted in Morocco in 2015 and 2016, this article lays the foundation for a research agenda that understands voice, and the sonic body more broadly, as mechanisms of political power. In examining the central roles that sound, hearing, and voice play in strategies of individual resistance at border crossings, as well as in state, private, and transnational communication and surveillance regimes, it attends to the ways in which sound and the audialized body reconfigure power relations, and structure mobility and personal identity. This analysis contributes to the growing literature addressing biometric borders and the deterritorialization of security practices, and argues that sound, along with more familiar nodes of securitization, constitutes a critical site of governmentality and therefore of ethical and moral negotiation.


2020 ◽  
pp. 1-7
Author(s):  
Oliver Westerwinter

Abstract Friedrich Kratochwil engages critically with the emergence of a global administrative law and its consequences for the democratic legitimacy of global governance. While he makes important contributions to our understanding of global governance, he does not sufficiently discuss the differences in the institutional design of new forms of global law-making and their consequences for the effectiveness and legitimacy of global governance. I elaborate on these limitations and outline a comparative research agenda on the emergence, design, and effectiveness of the diverse arrangements that constitute the complex institutional architecture of contemporary global governance.


2002 ◽  
Vol 117 (2) ◽  
pp. 114-122 ◽  
Author(s):  
Martha M McKinney ◽  
Katherine M Marconi ◽  
Paul D Cleary ◽  
Jennifer Kates ◽  
Steven R Young ◽  
...  

2019 ◽  
Vol 50 (5-6) ◽  
pp. 292-304 ◽  
Author(s):  
Mario Wenzel ◽  
Marina Lind ◽  
Zarah Rowland ◽  
Daniela Zahn ◽  
Thomas Kubiak

Abstract. Evidence on the existence of the ego depletion phenomena as well as the size of the effects and potential moderators and mediators are ambiguous. Building on a crossover design that enables superior statistical power within a single study, we investigated the robustness of the ego depletion effect between and within subjects and moderating and mediating influences of the ego depletion manipulation checks. Our results, based on a sample of 187 participants, demonstrated that (a) the between- and within-subject ego depletion effects only had negligible effect sizes and that there was (b) large interindividual variability that (c) could not be explained by differences in ego depletion manipulation checks. We discuss the implications of these results and outline a future research agenda.


Sign in / Sign up

Export Citation Format

Share Document