Data Politics 2019
DOI: 10.4324/9781315167305-8
|View full text |Cite
|
Sign up to set email alerts
|

Seeing like Big Tech

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Effectively, these private actors are playing a key role in the development and implementation of the nascent online CT/CVE regime. Somewhat similar to terrorism financing which is more codified, this is indicative of a new logic of governance in the policy areas of online CT/CVE, where platform firms have become a "link" in the "chain of security" (de Goede, 2018) by virtue of their self-regulation, and in the logic of "global security assemblages" (Abrahamsen and Williams, 2010;Tréguer, 2019). Whether these findings are applicable to other tech firms, especially non-Western ones and in non-Western contexts, is an interesting question for future research, as indicated by TikTok's failed attempt (so far) to join the GIFCT (Birnbaum, 2019).…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Effectively, these private actors are playing a key role in the development and implementation of the nascent online CT/CVE regime. Somewhat similar to terrorism financing which is more codified, this is indicative of a new logic of governance in the policy areas of online CT/CVE, where platform firms have become a "link" in the "chain of security" (de Goede, 2018) by virtue of their self-regulation, and in the logic of "global security assemblages" (Abrahamsen and Williams, 2010;Tréguer, 2019). Whether these findings are applicable to other tech firms, especially non-Western ones and in non-Western contexts, is an interesting question for future research, as indicated by TikTok's failed attempt (so far) to join the GIFCT (Birnbaum, 2019).…”
Section: Discussionmentioning
confidence: 99%
“…France, the United Kingdom, and Germany actively sanctioned algorithmic moderation by encouraging it through the EU Internet Forum, to the point that the European Commission's initial proposal for the TERREG sought to impose the use of "proactive measures" similar to those deployed by Google, Facebook, and Twitter, on all platforms vulnerable to terrorist exploitation. This illustrates Félix Tréguer's observation that security assemblages may be used by states to bypass their own legal constraints and commitments, in the name of the efficiency of national security (Tréguer, 2019). Indeed, the "proactive measures" provision was scrapped by the EU Parliament for violating the e-Commerce Directive's prohibition of "general obligation[s] (.…”
Section: Content Moderationmentioning
confidence: 91%
See 3 more Smart Citations