References
- Abrahamsen, R., and M. C. Williams. 2009. “Security Beyond the State: Global Security Assemblages in International Politics.” International Political Sociology 3 (1): 1–17. https://doi.org/10.1111/j.1749-5687.2008.00060.x.
- Amicelle, A., and E. K. U. Jacobsen. 2016. “The Cross-Colonization of Finance and Security Through Lists: Banking Policing in the UK and India.” Environment and Planning D: Society and Space 34 (1): 89–106. https://doi.org/10.1177/0263775815623276.
- Amoore, L., and R. Raley. 2017. “Securing with Algorithms: Knowledge, Decision, Sovereignty.” Security Dialogue 48 (1): 3–10. https://doi.org/10.1177/0967010616680753.
- Ananny, M., and K. Crawford. 2018. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media and Society 20 (3): 973–989. https://doi.org/10.1177/1461444816676645.
- Aradau, C., and T. Blanke. 2017. “Politics of Prediction: Security and the Time/Space of Governmentality in the Age of Big Data.” European Journal of Social Theory 20 (3): 373–391. https://doi.org/10.1177/1368431016667623.
- Aradau, C., J. Huysmans, A. Neal, and N. Voelkner, Eds. 2014. Critical Security Methods: New Frameworks for Analysis. Routledge. https://doi.org/10.4324/9781315881549.
- Avant, D., and L. Sigelman. 2010. “Private Security and Democracy: Lessons from the US in Iraq.” Security Studies 19 (2): 230–265. https://doi.org/10.1080/09636412.2010.480906.
- Bellanova, R., and M. de Goede. 2021. “Co-Producing Security: Platform Content Moderation and European Security Integration.” JCMS: Journal of Common Market Studies 60 (5): 1316–1334. https://doi.org/10.1111/JCMS.13306.
- Birch, K., and D. T. Cochrane. 2022. “Big Tech: Four Emerging Forms of Digital Rentiership.” Science as Culture 31 (1): 44–58. https://doi.org/10.1080/09505431.2021.1932794.
- Bures, O., and H. Carrapico. 2017. “Private Security Beyond Private Military and Security Companies: Exploring Diversity within Private-Public Collaborations and Its Consequences for Security Governance.” Crime, Law and Social Change 67 (3): 229–243. https://doi.org/10.1007/s10611-016-9651-5.
- Cattien, J., and R. J. Stopford. 2022. “The Appropriating Subject: Cultural Appreciation, Property and Entitlement.” Philosophy & Social Criticism 01914537211059515. https://doi.org/10.1177/01914537211059515.
- Cloud Security Command Center. n.d. “Cloud SCC conceptual overview.” Google Cloud. Accessed November 21, 2019. https://cloud.google.com/security-command-center/docs/concepts-security-command-center-overview.
- Cohen, J. 2016. “Protecting the world’s news from digital attack.” Google The Keyword, February 25. https://blog.google/alphabet/protecting-worlds-news-digital-attack/.
- Coleman, L., and D. Rosenow. 2016. “Security (studies) and the limits of critique: Why we should think through struggle.” Critical Studies on Security 4 (2): 202–220. https://doi.org/10.1080/21624887.2016.1174807.
- Conger, K. 2018a. “Google Employees Resign in Protest Against Pentagon Contract.” Gizmodo, May 14. https://gizmodo.com/google-employees-resign-in-protest-against-pentagon-con-1825729300.
- Conger, K. 2018b.” Google Plans Not to Renew Its Contract for Project Maven, a Controversial Pentagon Drone AI Imaging Program.” Gizmodo, June 1. https://gizmodo.com/google-plans-not-to-renew-its-contract-for-project-mave-1826488620.
- Crespin, R., and P. Lascoumes. 2000. “Régulation de la carrière d’un instrument de santé: Les parcours de l’usage du test du VIH dans l’emploi en France et aux États-Unis.” Sociologie du Travail 42 (1): 133. https://doi.org/10.4000/sdt.36626.
- Cross Border Law Enforcement Requests White Paper. 2017. Google. https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/CrossBorderLawEnforcementRequestsWhitePaper_2.pdf.
- Cutler, A. C. 2009. “The legitimacy of private transnational governance: Experts and the transnational market for force.” Socio-Economic Review 8 (1): 157–185. https://doi.org/10.1093/ser/mwp027.
- Dauba-Pantanacce, A., and J. Albers. 2017. “Protect Your Election: Helping Everyone Get The Full Story.” Medium, March 21. https://medium.com/jigsaw/protect-your-election-helping-everyone-get-the-full-story-faea40934dd2.
- De Goede, M. 2018. “The Chain of Security.” Review of International Studies 44 (1): 24–42. https://doi.org/10.1017/S0260210517000353.
- Downs, J. 2016. “Introducing YouTube Creators for Change.” Google The Keyword, September 22. https://blog.google/products/youtube/introducing-youtube-creators-for-change/.
- Favarel-Garrigues, G., T. Godefroy, and P. Lascoumes. 2008. “Sentinels in the Banking Industry: Private Actors and the Fight against Money Laundering in France.” The British Journal of Criminology 48 (1): 1–19. https://doi.org/10.1093/bjc/azm059.
- Favarel-Garrigues, G., T. Godefroy, and P. Lascoumes. 2011. “Special Issue on the Global Governance of Security and Finance Reluctant Partners? Banks in the Fight Against Money Laundering and Terrorism Financing in France.” Security Dialogue 42 (2): 179–196. https://doi.org/10.1177/0967010611399615.
- Gibbs, S. 2018. “EU gives Facebook and Google three months to tackle extremist content.” The Guardian, March 1. https://www.theguardian.com/technology/2018/mar/01/eu-facebook-google-youtube-twitter-extremist-content.
- GIFCT. 2017. Global Internet Forum to Counter Terrorism, June 26. https://blog.twitter.com/en_us/topics/company/2017/Global-Internet-Forum-to-Counter-Terrorism.
- Gillespie, T. 2010. “The politics of ‘platforms’.” New Media and Society 12 (3): 347–364. https://doi.org/10.1177/1461444809342738.
- Gillett, S. 2018. “Give Good the Advantage.” Medium, December 14. https://medium.com/chronicle-blog/give-good-the-advantage-75ab2c242e45.
- Gorwa, R., R. Binns, and C. Katzenbach. 2020. “Algorithmic content moderation: Technical and political challenges in the automation of platform governance.” Big Data & Society 7 (1): 205395171989794. https://doi.org/10.1177/2053951719897945.
- Grosse, E. 2012. “Security warnings for suspected state-sponsored attacks.” Google Online Security Blog, June 5. https://security.googleblog.com/2012/06/security-warnings-for-suspected-state.html.
- Heath-Kelly, C. 2017. “Algorithmic Autoimmunity in the NHS: Radicalisation and the Clinic.” Security Dialogue 48 (1): 29–45. https://doi.org/10.1177/0967010616671642.
- Hoijtink, M. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. https://doi.org/10.1177/0967010614544312.
- Hoijtink, M., and A. Planqué-van Hardeveld. 2022. “Machine Learning and the Platformization of the Military: A Study of Google’s Machine Learning Platform TensorFlow.” International Political Sociology 8:1–19. https://doi.org/10.1093/IPS/OLAB036.
- Krahmann, E. 2017. “From Performance to Performativity: The Legitimization of US Security Contracting and Its Consequences.” Security Dialogue 48 (6): 541–559. https://doi.org/10.1177/0967010617722650.
- Leander, A. 2005a. “The Market for Force and Public Security: The Destabilizing Consequences of Private Military Companies.” Journal of Peace Research 42 (5): 605–622. https://doi.org/10.1177/0022343305056237.
- Leander, A. 2005b. “The Power to Construct International Security: On the Significance of Private Military Companies.” Millennium: Journal of International Studies 33 (3): 803–825. https://doi.org/10.1177/03058298050330030601.
- Leander, A. 2010. “The Paradoxical Impunity of Private Military Companies: Authority and the Limits to Legal Accountability.” Security Dialogue 41 (5): 467–490. https://doi.org/10.1177/0967010610382108.
- Letter to Google C.E.O. 2018. n/a. Accessed November 21, 2019. https://static01.nyt.com/files/2018/technology/googleletter.pdf.
- MacMillan, D. 2018. “Google’s Empty Chair Gets Starring Role at Hearing.” The Wall Street Journal, September 5. https://www.wsj.com/articles/googles-empty-chair-gets-starring-role-at-hearing-1536176002.
- McMillan, D., and R. MacMillan. 2018. “Google Exposed User Data, Feared Repercussions of Disclosing to Public.” The Wall Street Journal, October 8. https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194.
- Murray Li, T. 2007. “Practices of Assemblage and Community Forest Management.” Economy and Society 36 (2): 263–293. https://doi.org/10.1080/03085140701254308.
- Page, L., S. Brin, R. Motwani, and T. Winograd. 1998. “The PageRank Citation Ranking: Bringing Order to the Web. Technical Report.” Stanford InfoLab. http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf.
- Pichai, S. 2015. Alphabet Investor Relations. Alphabet Investor Relations. https://abc.xyz/investor/founders-letters/2015/.
- Pichai, S. 2018. AI at Google: Our principles. Google, June 7. https://blog.google/technology/ai/ai-principles/.
- Project Shield. 2019. “Project Shield FAQ.” Accessed November 21, 2019. https://projectshield.withgoogle.com/faq.
- Rieder, B., and G. Sire. 2014. “Conflicts of Interest and Incentives to Bias: A Microeconomic Critique of Google’s Tangled Position on the Web.” New Media and Society 16 (2): 195–211. https://doi.org/10.1177/1461444813481195.
- Salgado, R. 2015. “New data, more facts: An update to the Transparency Report” Google The Keyword, May 14. https://blog.google/outreach-initiatives/public-policy/new-data-more-facts-update-to/.
- Salgado, R. 2016. “Sharing National Security Letters with the public.” Google The Keyword, December 13. https://blog.google/outreach-initiatives/public-policy/sharing-national-security-letters-public/.
- Schmidt, E. 2016. “Google Ideas Becomes Jigsaw.” Medium, February 17. https://medium.com/jigsaw/google-ideas-becomes-jigsaw-bcb5bd08c423.
- Shane, S., and D. Wakabayashi 2018. “‘The Business of War’: Google Employees Protest Work for the Pentagon.” The New York Times, April 4. https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html.
- Suchman, L. 2020. “Algorithmic warfare and the reinvention of accuracy.” 8 (2): 175–187. https://doi.org/10.1080/21624887.2020.1760587.
- Taylor, B. 2007. “Thanks for all the spam reports.” Official Gmail Blog, July 19. https://gmail.googleblog.com/2007/07/thanks-for-all-spam-reports.html.
- Transparency Report Google. 2019. “Legal process for user data requests FAQs—Transparency Report Help Center.” August 2. https://web.archive.org/web/20190802130044/https:/support.google.com/transparencyreport/answer/7381738?hl=en&ref_topic=7380433.
- Transparency Report Google. n.d. “Government requests to remove content.” https://transparencyreport.google.com/government-removals/overview?hl=en.
- Transparency Report YouTube. n.d. “YouTube Community Guidelines enforcement – Violent Extremism.” https://transparencyreport.google.com/youtube-policy/featured-policies/violent-extremism.
- Tucker, P. 2019. “Google Wants More Work from the Defense Department.” Defense One, November 6. https://www.defenseone.com/technology/2019/11/google-we-want-more-work-defense-department/161133/.
- Vaidhyanathan, S. 2012. The Googlization of Everything: (And Why We Should Worry), Updated Edition. https://doi.org/10.1525/9780520952454.
- van Dijck, J. 2020a. “Governing digital societies: Private platforms, public values.” Computer Law & Security Review 36:36. https://doi.org/10.1016/j.clsr.2019.105377.
- Van Dijck, J. 2020b. “Seeing the forest for the trees: Visualizing platformization and its governance.” New Media and Society 23 (9): 2801–2819. https://doi.org/10.1177/1461444820940293.
- Van Dijck, J., T. Poell, and M. de Waal. 2018. The Platform Society. Oxford Academic. https://doi.org/10.1093/oso/9780190889760.001.0001.
- Walker, K. 2017. Four steps we’re taking today to fight terrorism online. Google The Keyword, June 18. https://blog.google/around-the-globe/google-europe/four-steps-were-taking-today-fight-online-terror/.
- Wojcicki, S. 2009. Making ads more interesting Google Official Blog. https://googleblog.blogspot.com/2009/03/making-ads-more-interesting.html
- Wood, D. M., and T. Monahan. 2019. “Editorial: Platform Surveillance.” Surveillance & Society 17 (1/2): 1–6. https://doi.org/10.24908/ss.v17i1/2.13237.
- The YouTube Team. 2017a. “Bringing new Redirect Method features to YouTube.” YouTube Official Blog, July 20. https://blog.youtube/news-and-events/bringing-new-redirect-method-features/.
- The YouTube Team. 2017b. “An update on our commitment to fight violent extremist content online.” YouTube Official Blog, August 1. https://blog.youtube/news-and-events/an-update-on-our-commitment-to-fight/.
- Zuboff, S. 2015. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.” Journal of Information Technology 30 (1): 75–89. https://doi.org/10.1057/jit.2015.5.
- Zuboff, S. 2019. “Surveillance Capitalism and the Challenge of Collective Action.” New Labor Forum 28 (1): 10–29. https://doi.org/10.1177/1095796018819461.