References
- Atkinson, R. (2021). A U.S. grand strategy for the global digital economy. https://itif.org/publications/2021/01/19/us-grand-strategy-global-digital-economy.
- Balzacq, T., Léonard, S., & Ruzicka, J. (2016). ‘Securitization’ revisited: theory and cases. International Relations, 30(4), 494–531. https://doi.org/10.1177/0047117815596590
- Bellanova, R., & de Goede, M. (2022). The algorithmic regulation of security: An infrastructural perspective. Regulation & Governance, 16(1), 102–118. https://doi.org/10.1111/rego.12338
- Benjamin, R. (2019). Race after technology. Polity Press.
- Bode, I., & Huelss, H. (2022). Autonomous weapons systems and international norms. McGill University Press.
- Bode, I., & Huelss, H. (2023). Constructing expertise: The front- and back-door regulation of AI’s military applications in the European Union. Journal of European Public Policy, 30(7), 1230–1254. https://doi.org/10.1080/13501763.2023.2174169
- Bosma, E. (2022). Banks as security actors. Countering terrorist financing at the human-technology interface [University of Amsterdam]. https://dare.uva.nl/search?identifier=e6e51a1c-f4b0-4aff-80a2-3ae47ace21dd.
- Bryson, J. J., & Malikova, H. (2021). Is there an AI cold War? Global Perspectives, 2(1), https://doi.org/10.1525/gp.2021.24803
- Buchanan, B. (2020). The hacker and the state. Cyber attacks and the new normal of geopolitics. Harvard University Press.
- Buzan, B., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
- Byler, D. (2021). In the camps. China’s high-tech penal colony. Columbia Global Reports.
- Council, E. (2021). EU-US summit joint statement: “Towards a renewed Transatlantic partnership. https://www.consilium.europa.eu/en/press/press-releases/2021/06/15/eu-us-summit-statement-towards-a-renewed-transatlantic-partnership/.
- Crawford, B. (1995). Hawks, doves, but no owls: International economic interdependence and construction of the new security dilemma. In R. Lipschutz (Ed.), On security (pp. 149–186). Columbia University Press.
- Crawford, K. (2021). Atlas of AI. Yale University Press.
- Dal Bó, E. (2006). Regulatory capture: A review. Oxford Review of Economic Policy, 22(2), 203–225. https://doi.org/10.1093/oxrep/grj013
- Damro, C. (2012). Market power Europe. Journal of European Public Policy, 19(5), 682–699. https://doi.org/10.1080/13501763.2011.646779
- Daniels, M., & Krige, J. (2022). Knowledge regulation and national security in postwar America. Chicago University Press.
- de Goede, M. (2012). The SWIFT affair and the global politics of European security. JCMS: Journal of Common Market Studies, 50(2), 214–230. https://doi.org/10.1111/j.1468-5965.2011.02219.x
- Deibert, R. (2018). Trajectories for future cybersecurity research. In A. Gheciu, & W. C. Wohlforth (Eds.), The Oxford handbook of international security (pp. 531–546). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198777854.013.35.
- D’Ignazio, C., & Klein, L. (2020). Data feminism. MIT Press.
- Dunn Cavelty, M. (2020). Cybersecurity between hypersecuritization and technologial routine. In E. Tikk, & M. Kerttunen (Eds.), Routledge handbook of international cybersecurity (pp. 11–21). Routledge.
- Dunn Cavelty, M., & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 30(7), 1330–1352. https://doi.org/10.1080/13501763.2023.2173274
- European Commission. (2018). Artificial Intelligence for Europe [COM(2018) 237 final].
- European Commission. (2021). Proposal for a regulation of the European Parliament and of the council laying down harmonized rules on artificial Intelligence (Artificial Intelligence Act) and Amending Certain Legislative Acts [COM(2021) 206 final].
- European Data Protection Supervisor. (2016). Artificial intelligence, robotics, privacy and data protection. https://edps.europa.eu/sites/edp/files/publication/16-10-19_marrakesh_ai_paper_en.pdf.
- Farrell, H., & Newman, A. L. (2019). Weaponized interdependence: How global economic networks shape StateCoercion. International Security, 44(1), 42–79. https://doi.org/10.1162/isec_a_00351
- Ford, M. (2018). Architects of Intelligence. The truth about AI from the people building it. Packt Publishers.
- Friis, K., & Lysne, O. (2021). Huawei, 5G and security: Technological limitations and political responses. Development and Change, 52(5), 1174–1195. https://doi.org/10.1111/dech.12680
- Gouvernement Française. (2020). Launch of the global partnership on artificial intelligence. https://www.gouvernement.fr/en/launch-of-the-global-partnership-on-artificial-intelligence.
- Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
- Hoeffler, C. (2023). Beyond the regulatory state? The European Defence Fund and national military capacities. Journal of European Public Policy, 30(7), 1281–1304. https://doi.org/10.1080/13501763.2023.2174581
- Lazer, D. (2001). Regulatory interdependence and international governance. Journal of European Public Policy, 8(3), 474–492. https://doi.org/10.1080/13501760110056077
- Lee, K.-F. (2018). Ai superpowers. China, silicon valley, and the new world order. Houghton Mifflin.
- Lee, K.-F., & Chen, Q. (2021). AI 2041. Currency.
- Lewallen, J. (2021). Emerging technologies and problem definition uncertainty: The case of cybersecurity. Regulation & Governance, 15(4), 1035–1052. https://doi.org/10.1111/rego.12341
- Majone, G. (1994). The rise of the regulatory state in Europe. West European Politics, 17(3), 77–101. https://doi.org/10.1080/01402389408425031
- Majone, G. (1996). Regulating Europe. Routledge.
- McDonald, M. (2008). Securitization and the construction of security. European Journal of International Relations, 14(4), 563–587. https://doi.org/10.1177/1354066108097553
- Mitchell, M. (2019). Artificial intelligence. A guide for thinking humans. Pelican Books.
- Mügge, D. (2022). Regulatory Interdependence in Artificial Intelligence. https://www.ippi.org.il/regulatory-interdependence-in-artificial-intelligence/.
- National Security Commission on Artificial Intelligence. (2021). Final Report.
- Obendiek, A., & Seidl, T. (2023). The (False) promise of solutionism: Ideational business power and the construction of epistemic authority in digital security governance. Journal of European Public Policy, 30(7), 1305–1329. https://doi.org/10.1080/13501763.2023.2172060
- Proudfoot, D., & Copeland, J. (2012). Artificial intelligence. In E. Margolis, R. Samuels, & S. Stich (Eds.), The Oxford handbook of philosophy of cognitive science (pp. 147–182). Oxford University Press.
- Scharre, P. (2019). Army of none: Autonomous weapons and the future of War. W.W. Norton.
- Schilde, K. (2023). Weaponising Europe? Rule-makers and rule-takers in in the EU security state. Journal of European Public Policy, 30(7), 1255–1280. https://doi.org/10.1080/13501763.2023.2174582
- Simmons, B. (2001). The international politics of harmonization: The case of capital market regulation. International Organization, 55(3), 589–620. https://doi.org/10.1162/00208180152507560
- Singer, D. (2007). Regulating capital. Setting standards for the international financial system. Cornell University Press.
- Sivan-Sevilla, I. (2023). Supranational security states for national security problems: Governing by rules and capacities in technology-driven European security spaces. Journal of European Public Policy, 30(7), 1353–1378. https://doi.org/10.1080/13501763.2023.2172063
- Smith, B., & Browne, C. A. (2019). Tools and weapons. The promise and peril of the digital Age. Penguin.
- Starosielski, N. (2015). The undersea network. Duke University Press.
- Stigler, G. (1971). The theory of economic regulation. Bell Journal of Economics, 2(1), 113–121.
- Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations, 13(3), 357–383. https://doi.org/10.1177/1354066107080128
- Taeihagh, A., Ramesh, M., & Howlett, M. (2021). Assessing the regulatory challenges of emerging disruptive technologies. Regulation & Governance, 15(4), 1009–1019. https://doi.org/10.1111/rego.12392
- Tiebout, C. (1956). A pure theory of local expenditures. Journal of Political Economy, 64(5), 416–424. https://doi.org/10.1086/257839
- Ulbricht, L. (2018). When big data meet securitization. Algorithmic regulation with passenger name records. European Journal for Security Research, 3(2), 139–161. https://doi.org/10.1007/s41125-018-0030-3
- Veale, M., & Zuiderveen Borgesius, F. (2021). Demystifying the Draft EU Artificial Intelligence Act — Analysing the good, the bad, and the unclear elements of the proposed approach. Computer Law Review International, 22(4), 97–112. https://doi.org/10.9785/cri-2021-220402
- Vogel, D. (1995). Trading up. Consumer and environmental regulation in a global economy. Harvard University Press.
- Wetenschappelijke Raad voor het Regeringsbeleid. (2021). Opgave AI. De nieuwe systeemtechnologie. WRR.
- Wæver, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46–86). Columbia University Press.