References
- Bellanova, R., & De Goede, M. (2022). The algorithmic regulation of security: An infrastructural perspective. Regulation & Governance, 16(1), 102–118. https://doi.org/10.1111/rego.12338
- Bowker, G. C., & Star, S. L. (1999). Sorting things out: Classification and its consequences. MIT Press.
- DeNardis, L., & Musiani, F. (2016). Governance by infrastructure. In F. Musiani, D. L. Cogburn, L. DeNardis, & N. S. Levinson (Eds.), The turn to infrastructure in internet governance: Information technology and global governance (pp. 2–21). New York: Palgrave Macmillan. https://doi.org/10.1057/9781137483591_1
- EC. (2019). Regulation (EU) 2019/817 of the European Parliament and of the Council of 20 May 2019 on establishing a framework for interoperability between EU information systems in the field of borders and visa. Regulation 2019/817. European Parliament & Council of the European Union.
- EC. (2022). Proposal COM/2022/209 for a Regulation for the European Parliament and of the Council laying down rules to prevent and combat child sexual abuse. Proposal COM/2022/209. European Parliament & Council of the European Union.
- EDPB-EDPS. (2022). Joint Opinion 4/2022 on the Proposal for a Regulation of the European Parliament and of the Council laying down rules to prevent and combat child sexual abuse. Joint Opinion 4/2022. European Data Protection Supervisor & European Data Protection Board.
- Ermoshina, K., & Musiani, F. (2022, April 19). Encryption and technologies of power in a (cyber-) war torn world. Mattering Press Blog. https://www.matteringpress.org/blog/encryption-and-technologies-of-power-in-a-cyber-war-torn-world
- Galloway, A. R. (2004). Protocol: How control exists after decentralization. The MIT Press.
- Monsees, L. (2019). Crypto-politics: Encryption and democratic practices in the digital era. Routledge.