2,189
Views
9
CrossRef citations to date
0
Altmetric
Articles

The logic of the surface: on the epistemology of algorithms in times of big data

Pages 2096-2109 | Received 13 May 2019, Accepted 29 Jan 2020, Published online: 11 Feb 2020

References

  • Amoore, L. (2019). Doubt and the algorithm: On the partial accounts of machine learning. Theory, Culture & Society, 36(6), 147–169.
  • Amoore, L., & Piotukh, V. (2016). Algorithmic life: Calculative devices in the age of big data. London: Routledge.
  • Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. Wired. Retrieved from https://www.wired.com/2008/06/pb-theory/
  • Andrejevic, M. (2017). To preempt a thief. International Journal of Communication, 11, 879–896.
  • Aradau, C. (2015). The signature of security. Big data, anticipation, surveillance. Radical Philosophy, 191, 21–28.
  • Bowker, G. C. (2014). The theory/data thing. International Journal of Communication, 8(2043), 1795–1799.
  • Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society, 15(5), 662–679.
  • Burrell, J. (2016). How the machine ‘thinks’: Understanding opacity in machine learning algorithms. Big Data & Society, 3, 1–12.
  • Castel, R. (1991). From dangerousness to risk. In G. Burchell, C. Gordon, & P. Miller (Eds.), The Foucault effect: studies in governmentality (pp. 281–298). Chicago: Chicago University Press.
  • Chamayou, G. (2015). A theory of the drone ( J. Lloyd, Trans.). New York: The New Press.
  • Chandler, D. (2015). A world without causation: Big data and the coming of age of posthumanism. Millennium: Journal of International Studies, 43(3), 833–851.
  • Cheney-Lippold, J. (2017). We are data: Algorithms and the making of our digital selves. New York: New York University Press.
  • Clough, P. T., Gregory, K., Haber, B., & Scannell, J. R. (2015). The datalogical turn. In P. Vannini (Ed.), Non-representational methodologies. Re-envisioning research (pp. 146–164). New York: Routledge.
  • Craddock, R., Watson, D., & Saunders, W. (2016). Generic pattern of life and behavior analysis. IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 6, 152–158.
  • Davies, W. (2018). Nervous states: How feeling took over the world. London: Jonathan Cape.
  • Derrida, J. (2001). I have a taste for the secret. In J. Derrida & M. Ferraris (Eds.), A taste for the secret (pp. 1–92). Cambridge: Polity.
  • de Vries, P., & Schinkel, W. (2019). Algorithmic anxiety: Masks and camouflage in artistic imaginaries of facial recognition algorithms. Big Data & Society, 6, 1–12.
  • Egbert, S., & Krasmann, S. (2019). Predictive policing: Not yet, but soon preemptive? Policing & Society, 29, 1–15.
  • Eggers, D. (2014). The circle. New York: Vintage Books.
  • Esposito, E. (2017). The production of contingency by algorithms. Zeitschrift für Soziologie, 46(4), 249–265.
  • Esposito, E. (2018, March 15). Future and uncertainty in the digital society. Paper presented at the Alexander von Humboldt Institut für Internet und Gesellschaft, Berlin.
  • Fazi, B. M. (2019). Digital aethetics: The discrete and the continuous. Theory Culture and Society, 36(1), 3–26.
  • Flyverbom, M., Christensen, L. T., & Hansen, H. K. (2015). The transparency–power nexus: Observational and regularizing control. Management Communication Quarterly, 29(3), 385–410.
  • Foucault, M. (1977). What is enlightenment? In P. Rabinow (Ed.), Ethics, subjectivity and truth. The essential works of Michel Foucault, 1954–1984 (pp. 303–319, vol. I). New York: The New Press.
  • Foucault, M. (1978). Discipline and punish: The birth of the prison ( A. Sheridan, Trans.). New York: Vintage Books.
  • Fuller, M., & Goffey, A. (2012). Evil media. A philosophical manual of media power for the network age. Cambridge: MIT.
  • Geuss, R. (2003). Public goods, private goods, with a new preface by the author. Princeton: Princeton University Press.
  • Gillespie, T. (2014). Algorithm [draft] [#digitalkeywords]. Retrieved from http://culturedigitally.org/2014/06/algorithm-draft-digitalkeyword
  • Gitelman, L. (2013). “Raw data” is an oxymoron. Cambridge: MIT.
  • Grothoff, C., & Porup, J. M. (2016, February 16). The NSA’s SKYNET program may be killing thousands of innocent people. Ars technica. Retrieved from https://arstechnica.com/information-technology/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/
  • Hacking, I. (1982). Language, truth and reason. In M. Hollis & S. Lukes (Eds.), Rationality and relativism (pp. 48–66). Oxford: Blackwell.
  • Hays, C. L. (2004, November 14). What Wal-Mart knows about customers’ habits. The New York Times. Retrieved from http://www.nytimes.com/2004/11/14/business/yourmoney/what-walmart-knows-about-customers-habits.html
  • Introna, T. (2017). Surface visions. Theory, Culture & Society, 34(7–8), 99–108.
  • Johns, F. (2017). Data territories: Changing architectures of association in international law. In M. Kuijer & W. Werner (Eds.), Netherlands yearbook of international law 2016 (vol. 47, pp. 107–129). Heidelberg: Springer.
  • Josselson, R. (2004). The hermeneutics of faith and the hermeneutics of suspicion. Narrative Inquiry, 14(1), 1–28.
  • Kaufmann, M. (2019). Who connects the dots? Agents and agency in predictive policing. In M. Hoijtink & M. Leese (Eds.), Technology and agency in international relations (pp. 141–163). London: Routledge.
  • Kaufmann, M., Egbert, S., & Leese, M. (2019). Predictive policing and the politics of patterns. The British Journal of Criminology, 59(3), 674–692.
  • Kitchin, R. (2014). Big data, new epistemologies and paradigm shits. Big Data & Society, 1, 1–12.
  • Krasmann, S. (2019). Secrecy and the force of truth: Countering post-truth regimes. Cultural Studies, 33(4), 690–710.
  • Lash, S. (2007). Power after hegemony: Cultural studies in mutation? Theory, Culture & Society, 24(3), 55–78.
  • Lury, C., & Day, S. (2019). Algorithmic personalization as a mode of individuation. Theory, Culture & Society, 36(2), 17–37.
  • Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. London: John Murray.
  • Morozov, E. (2014, July 20). The rise of data and the death of politics. The Guardian. Retrieved from https://www.theguardian.com/technology/2014/jul/20/rise-of-data-death-of-politics-evgeny-morozov-algorithmic-regulation
  • Nietzsche, F. (1873/1999). On truth and lying in an extra-moral sense. In R. Geuss & R. Speirs (Eds.), The birth of tragedy and other writings (pp. 131–153). Cambridge: Cambridge University Press.
  • Orwell, G. (1949/1954). Nineteen eighty-four. New York: Penguin.
  • Parisi, L. (2019). Critical computation: Digital automata and general artificial thinking. Theory, Culture & Society, 36(2), 89–121.
  • Parsa, A. (2017). Knowing and seeing the combatant. War, counterinsurgency and targeting in international law. Lund: Media-Tryck.
  • Pasquale, F. (2015). The black box society. The secret algorithms that control money and information. Cambridge: Harvard University Press.
  • Pasquinelli, M. (2017). Arcana Mathematica Imperii: The evolution of western computational norms. In M. Hlavajova & S. Sheikh (Eds.), Former West: Art and the contemporary after 1989 (pp. 281–294). Cambridge, MA: MIT.
  • Popitz, H. (1968). Über die Präventivwirkung des Nicht-wissens. Dunkelziffer, Norm und Strafe. Tübingen: Mohr.
  • Poster, M. (1995). The second media age. Cambridge: Polity.
  • Pugliese, J. (2013). State violence and the execution of law. Biopolitical caesurae of torture, black sites, drones. New York: Routledge.
  • Rancière, J. (2006). The politics of aesthetics. The distribution of the sensible ( G. Rockhill, Trans.). London: Continuum.
  • Reigeluth, T. (2014). Why data is not enough: Digital traces as control of self and self-control. Surveillance & Society, 12(2), 243–254.
  • Rieder, B. (2017). Beyond surveillance: How do markets and algorithms “think”? Le foucaldien, 3(1), 1–20.
  • Rouvroy, A. (2012). The end(s) of critique: Data-behaviourism vs. due-process. In M. Hildebrandt & K. de Vries (Eds.), Privacy, due process and the computational turn. Philosophers of law meet philosophers of technology (pp. 143–167). New York: Routledge.
  • Saunders, J., Hunt, P., & Hollywood, J. S. (2016). Predictions put into practice: A quasi-experimental evaluation of Chicago’s predictive policing pilot. Journal of Experimental Criminology, 12(3), 347–371.
  • Sciortino, L. (2017). On Ian hacking’s notion of style of reasoning. Erkenntnis, 82(2), 243–264.
  • Shusterman, R. (2002). Surface and depth: Dialectics of criticism and culture. Ithaca: Cornell University Press.
  • Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11(4), 441–498.
  • Smith, G. J. D. (2018). Data doxa: The affective consequences of data practices. Big Data & Society, 5(1), 1–15.
  • Sætnan, A. R., Schneider, I., & Green, N. (Eds.). (2018). The politics and policies of big data: Big data, big brother? New York: Routledge.
  • Striphas, T. (2015). Algorithmic culture. European Journal of Cultural Studies, 18(4-5), 395–412.
  • Törnberg, P., & Törnberg, A. (2018). The limits of computation: A philosophical critique of contemporary big data research. Big Data & Society, 5, 1–12.
  • Turkle, S. (2011). Alone together. Why we expect more from technology and less from each other. New York: Basic Books.
  • Vignola, P. (2016). Nietzsche in the Amazon. For a Nomadology Beyond Algorithmic Governmentality. Ethics & Politics, 18(3), 269–285.
  • Watts, D. J. (2013). Computational social science. Exciting progress and future directions. The Bridge, 43(4), 5–10.
  • Weber, M. (1978). Economy and society. An outline of interpretive sociology ( G. Roth & C. Wittich, Eds.). Berkeley: University of California Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.