5,173
Views
8
CrossRef citations to date
0
Altmetric
Articles

The securitization of the EU’s digital tech regulation

Pages 1431-1446 | Received 01 Jul 2022, Accepted 07 Sep 2022, Published online: 30 Jan 2023

References

  • Atkinson, R. (2021). A U.S. grand strategy for the global digital economy. https://itif.org/publications/2021/01/19/us-grand-strategy-global-digital-economy.
  • Balzacq, T., Léonard, S., & Ruzicka, J. (2016). ‘Securitization’ revisited: theory and cases. International Relations, 30(4), 494–531. https://doi.org/10.1177/0047117815596590
  • Bellanova, R., & de Goede, M. (2022). The algorithmic regulation of security: An infrastructural perspective. Regulation & Governance, 16(1), 102–118. https://doi.org/10.1111/rego.12338
  • Benjamin, R. (2019). Race after technology. Polity Press.
  • Bode, I., & Huelss, H. (2022). Autonomous weapons systems and international norms. McGill University Press.
  • Bode, I., & Huelss, H. (2023). Constructing expertise: The front- and back-door regulation of AI’s military applications in the European Union. Journal of European Public Policy, 30(7), 1230–1254. https://doi.org/10.1080/13501763.2023.2174169
  • Bosma, E. (2022). Banks as security actors. Countering terrorist financing at the human-technology interface [University of Amsterdam]. https://dare.uva.nl/search?identifier=e6e51a1c-f4b0-4aff-80a2-3ae47ace21dd.
  • Bryson, J. J., & Malikova, H. (2021). Is there an AI cold War? Global Perspectives, 2(1), https://doi.org/10.1525/gp.2021.24803
  • Buchanan, B. (2020). The hacker and the state. Cyber attacks and the new normal of geopolitics. Harvard University Press.
  • Buzan, B., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
  • Byler, D. (2021). In the camps. China’s high-tech penal colony. Columbia Global Reports.
  • Council, E. (2021). EU-US summit joint statement: “Towards a renewed Transatlantic partnership. https://www.consilium.europa.eu/en/press/press-releases/2021/06/15/eu-us-summit-statement-towards-a-renewed-transatlantic-partnership/.
  • Crawford, B. (1995). Hawks, doves, but no owls: International economic interdependence and construction of the new security dilemma. In R. Lipschutz (Ed.), On security (pp. 149–186). Columbia University Press.
  • Crawford, K. (2021). Atlas of AI. Yale University Press.
  • Dal Bó, E. (2006). Regulatory capture: A review. Oxford Review of Economic Policy, 22(2), 203–225. https://doi.org/10.1093/oxrep/grj013
  • Damro, C. (2012). Market power Europe. Journal of European Public Policy, 19(5), 682–699. https://doi.org/10.1080/13501763.2011.646779
  • Daniels, M., & Krige, J. (2022). Knowledge regulation and national security in postwar America. Chicago University Press.
  • de Goede, M. (2012). The SWIFT affair and the global politics of European security. JCMS: Journal of Common Market Studies, 50(2), 214–230. https://doi.org/10.1111/j.1468-5965.2011.02219.x
  • Deibert, R. (2018). Trajectories for future cybersecurity research. In A. Gheciu, & W. C. Wohlforth (Eds.), The Oxford handbook of international security (pp. 531–546). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198777854.013.35.
  • D’Ignazio, C., & Klein, L. (2020). Data feminism. MIT Press.
  • Dunn Cavelty, M. (2020). Cybersecurity between hypersecuritization and technologial routine. In E. Tikk, & M. Kerttunen (Eds.), Routledge handbook of international cybersecurity (pp. 11–21). Routledge.
  • Dunn Cavelty, M., & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 30(7), 1330–1352. https://doi.org/10.1080/13501763.2023.2173274
  • European Commission. (2018). Artificial Intelligence for Europe [COM(2018) 237 final].
  • European Commission. (2021). Proposal for a regulation of the European Parliament and of the council laying down harmonized rules on artificial Intelligence (Artificial Intelligence Act) and Amending Certain Legislative Acts [COM(2021) 206 final].
  • European Data Protection Supervisor. (2016). Artificial intelligence, robotics, privacy and data protection. https://edps.europa.eu/sites/edp/files/publication/16-10-19_marrakesh_ai_paper_en.pdf.
  • Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic networks shape StateCoercion. International Security, 44(1), 42–79. https://doi.org/10.1162/isec_a_00351
  • Ford, M. (2018). Architects of Intelligence. The truth about AI from the people building it. Packt Publishers.
  • Friis, K., & Lysne, O. (2021). Huawei, 5G and security: Technological limitations and political responses. Development and Change, 52(5), 1174–1195. https://doi.org/10.1111/dech.12680
  • Gouvernement Française. (2020). Launch of the global partnership on artificial intelligence. https://www.gouvernement.fr/en/launch-of-the-global-partnership-on-artificial-intelligence.
  • Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
  • Hoeffler, C. (2023). Beyond the regulatory state? The European Defence Fund and national military capacities. Journal of European Public Policy, 30(7), 1281–1304. https://doi.org/10.1080/13501763.2023.2174581
  • Lazer, D. (2001). Regulatory interdependence and international governance. Journal of European Public Policy, 8(3), 474–492. https://doi.org/10.1080/13501760110056077
  • Lee, K.-F. (2018). Ai superpowers. China, silicon valley, and the new world order. Houghton Mifflin.
  • Lee, K.-F., & Chen, Q. (2021). AI 2041. Currency.
  • Lewallen, J. (2021). Emerging technologies and problem definition uncertainty: The case of cybersecurity. Regulation & Governance, 15(4), 1035–1052. https://doi.org/10.1111/rego.12341
  • Majone, G. (1994). The rise of the regulatory state in Europe. West European Politics, 17(3), 77–101. https://doi.org/10.1080/01402389408425031
  • Majone, G. (1996). Regulating Europe. Routledge.
  • McDonald, M. (2008). Securitization and the construction of security. European Journal of International Relations, 14(4), 563–587. https://doi.org/10.1177/1354066108097553
  • Mitchell, M. (2019). Artificial intelligence. A guide for thinking humans. Pelican Books.
  • Mügge, D. (2022). Regulatory Interdependence in Artificial Intelligence. https://www.ippi.org.il/regulatory-interdependence-in-artificial-intelligence/.
  • National Security Commission on Artificial Intelligence. (2021). Final Report.
  • Obendiek, A., & Seidl, T. (2023). The (False) promise of solutionism: Ideational business power and the construction of epistemic authority in digital security governance. Journal of European Public Policy, 30(7), 1305–1329. https://doi.org/10.1080/13501763.2023.2172060
  • Proudfoot, D., & Copeland, J. (2012). Artificial intelligence. In E. Margolis, R. Samuels, & S. Stich (Eds.), The Oxford handbook of philosophy of cognitive science (pp. 147–182). Oxford University Press.
  • Scharre, P. (2019). Army of none: Autonomous weapons and the future of War. W.W. Norton.
  • Schilde, K. (2023). Weaponising Europe? Rule-makers and rule-takers in in the EU security state. Journal of European Public Policy, 30(7), 1255–1280. https://doi.org/10.1080/13501763.2023.2174582
  • Simmons, B. (2001). The international politics of harmonization: The case of capital market regulation. International Organization, 55(3), 589–620. https://doi.org/10.1162/00208180152507560
  • Singer, D. (2007). Regulating capital. Setting standards for the international financial system. Cornell University Press.
  • Sivan-Sevilla, I. (2023). Supranational security states for national security problems: Governing by rules and capacities in technology-driven European security spaces. Journal of European Public Policy, 30(7), 1353–1378. https://doi.org/10.1080/13501763.2023.2172063
  • Smith, B., & Browne, C. A. (2019). Tools and weapons. The promise and peril of the digital Age. Penguin.
  • Starosielski, N. (2015). The undersea network. Duke University Press.
  • Stigler, G. (1971). The theory of economic regulation. Bell Journal of Economics, 2(1), 113–121.
  • Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations, 13(3), 357–383. https://doi.org/10.1177/1354066107080128
  • Taeihagh, A., Ramesh, M., & Howlett, M. (2021). Assessing the regulatory challenges of emerging disruptive technologies. Regulation & Governance, 15(4), 1009–1019. https://doi.org/10.1111/rego.12392
  • Tiebout, C. (1956). A pure theory of local expenditures. Journal of Political Economy, 64(5), 416–424. https://doi.org/10.1086/257839
  • Ulbricht, L. (2018). When big data meet securitization. Algorithmic regulation with passenger name records. European Journal for Security Research, 3(2), 139–161. https://doi.org/10.1007/s41125-018-0030-3
  • Veale, M., & Zuiderveen Borgesius, F. (2021). Demystifying the Draft EU Artificial Intelligence Act — Analysing the good, the bad, and the unclear elements of the proposed approach. Computer Law Review International, 22(4), 97–112. https://doi.org/10.9785/cri-2021-220402
  • Vogel, D. (1995). Trading up. Consumer and environmental regulation in a global economy. Harvard University Press.
  • Wetenschappelijke Raad voor het Regeringsbeleid. (2021). Opgave AI. De nieuwe systeemtechnologie. WRR.
  • Wæver, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46–86). Columbia University Press.