Skip to main content

Research Repository

Advanced Search

Outputs (2)

Securing with Algorithms: Knowledge, Decision, Sovereignty (2016)
Journal Article
Amoore, L., & Raley, R. (2017). Securing with Algorithms: Knowledge, Decision, Sovereignty. Security Dialogue, 48(1), 3-10. https://doi.org/10.1177/0967010616680753

Amid the deployment of algorithmic techniques for security – from the gathering of intelligence data to the proliferation of smart borders and predictive policing – what are the political and ethical stakes involved in securing with algorithms? Takin... Read More about Securing with Algorithms: Knowledge, Decision, Sovereignty.

Cloud Geographies: Computing, Data, Sovereignty (2016)
Journal Article
Amoore, L. (2018). Cloud Geographies: Computing, Data, Sovereignty. Progress in Human Geography, 42(1), 4-24. https://doi.org/10.1177/0309132516662147

The architecture of cloud computing is becoming ever more closely intertwined with geopolitics – from the sharing of intelligence data, to border controls, immigration decisions, and drone strikes. Developing an analogy with the cloud chamber of earl... Read More about Cloud Geographies: Computing, Data, Sovereignty.