Cookies

We use cookies to ensure that we give you the best experience on our website. By continuing to browse this repository, you give consent for essential cookies to be used. You can read more about our Privacy and Cookie Policy.


Durham Research Online
You are in:

Data derivatives : on the emergence of a security risk calculus for our times.

Amoore, L.A. (2011) 'Data derivatives : on the emergence of a security risk calculus for our times.', Theory, culture & society., 28 (6). pp. 24-43.

Abstract

In a quiet London office, a software designer muses on the algorithms that will make possible the risk flags to be visualized on the screens of border guards from Heathrow to St Pancras International. There is, he says, ‘real time decision making’ – to detain, to deport, to secondarily question or search – but there is also the ‘offline team who run the analytics and work out the best set of rules’. Writing the code that will decide the association rules between items of data, prosaic and mundane – flight route, payment type, passport – the analysts derive a novel preemptive security measure. This paper proposes the analytic of the data derivative – a visualized risk flag or score drawn from an amalgam of disaggregated fragments of data, inferred from across the gaps between data and projected onto an array of uncertain futures. In contrast to disciplinary and enclosed techniques of collecting data to govern population, the data derivative functions via ‘differential curves of normality’, imagining a range of potential futures through the association rule, thus ‘opening up to let things happen’ (Foucault 2007). In some senses akin to the risk orientation of the financial derivative, itself indifferent to actual underlying people, places or events by virtue of modulated norms, the contemporary security derivative is not centred on who we are, nor even on what our data say about us, but on what can be imagined and inferred about who we might be – on our very proclivities and potentialities.

Item Type:Article
Keywords:Borderzones, Risk, Security, Technology.
Full text:PDF - Accepted Version (245Kb)
Status:Peer-reviewed
Publisher Web site:http://dx.doi.org/10.1177/0263276411417430
Publisher statement:The final definitive version of this article has been published in the Journal Theory, culture & society, 28/6, 2011 © SAGE Publications Ltd at the Theory, culture & society page: http://tcs.sagepub.com/ on SAGE Journals Online: http://online.sagepub.com/
Record Created:20 Mar 2012 12:05
Last Modified:27 Nov 2012 13:10

Social bookmarking: del.icio.usConnoteaBibSonomyCiteULikeFacebookTwitterExport: EndNote, Zotero | BibTex
Usage statisticsLook up in GoogleScholar | Find in a UK Library