메뉴 건너뛰기




Volumn 45, Issue 5, 2014, Pages 494-511

The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union

Author keywords

critical theory; European Union; Foucault; profiling; security; terror

Indexed keywords


EID: 84910664535     PISSN: 09670106     EISSN: 14603640     Source Type: Journal    
DOI: 10.1177/0967010614544204     Document Type: Article
Times cited : (163)

References (74)
  • 1
    • 77952583288 scopus 로고    scopus 로고
    • Salter MB, ed. Minneapolis, MN and London: University of Minnesota Press
    • Adey PPolitics at the Airport. Salter MB, ed. Minneapolis, MN and London: University of Minnesota Press; 2008:145-160.
    • (2008) Politics at the Airport , pp. 145-160
    • Adey, P.1
  • 2
    • 84910625096 scopus 로고    scopus 로고
    • Airports Council International/Association of European Airlines (ACI/AEA) (2011) Joint briefing aviation security: 10 years on from 9/11. Available at: (accessed 30 April 2014)
    • Airports Council International/Association of European Airlines (ACI/AEA) (2011) Joint briefing aviation security: 10 years on from 9/11. Available at: http://files.aea.be/News/Joint_ACI_AEA.pdf (accessed 30 April 2014).
  • 3
    • 33645889328 scopus 로고    scopus 로고
    • Biometric borders: Governing mobilities in the War on Terror
    • Amoore L.Biometric borders: Governing mobilities in the War on Terror.Political Geography. 2006;25 (3): 336-351
    • (2006) Political Geography , vol.25 , Issue.3 , pp. 336-351
    • Amoore, L.1
  • 4
    • 82355191258 scopus 로고    scopus 로고
    • Data derivatives: On the emergence of a security risk calculus for our times
    • Amoore L.Data derivatives: On the emergence of a security risk calculus for our times.Theory, Culture & Society. 2011;28 (6): 24-43
    • (2011) Theory, Culture & Society , vol.28 , Issue.6 , pp. 24-43
    • Amoore, L.1
  • 6
    • 27144506216 scopus 로고    scopus 로고
    • Governance, risk and dataveillance in the War on Terror
    • Amoore L,De Goede M.Governance, risk and dataveillance in the War on Terror.Crime, Law and Social Change. 2005;43 (2): 149-173
    • (2005) Crime, Law and Social Change , vol.43 , Issue.2 , pp. 149-173
    • Amoore, L.1    De Goede, M.2
  • 7
    • 78649469173 scopus 로고    scopus 로고
    • Preemption, precaution, preparedness: Anticipatory action and future geographies
    • Anderson B.Preemption, precaution, preparedness: Anticipatory action and future geographies.Progress in Human Geography. 2010;34 (6): 777-798
    • (2010) Progress in Human Geography , vol.34 , Issue.6 , pp. 777-798
    • Anderson, B.1
  • 8
    • 82355191259 scopus 로고    scopus 로고
    • Governing events and life: ‘Emergency’ in UK Civil Contingencies
    • Anderson B,Adey P.Governing events and life: ‘Emergency’ in UK Civil Contingencies.Political Geography. 2012;31 (1): 24-33
    • (2012) Political Geography , vol.31 , Issue.1 , pp. 24-33
    • Anderson, B.1    Adey, P.2
  • 9
    • 84910664261 scopus 로고    scopus 로고
    • The end of theory: The data deluge makes the scientific method obsolete. Wired
    • AndersonC Available at
    • AndersonC (2008) The end of theory: The data deluge makes the scientific method obsolete. Wired, 16July. Available at: http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory.
    • (2008) 16July
  • 11
    • 33847333250 scopus 로고    scopus 로고
    • Governing terrorism through risk: Taking precautions, (un)knowing the future
    • Aradau C,Van Munster R.Governing terrorism through risk: Taking precautions, (un)knowing the future.European Journal of International Relations. 2007;13 (1): 89-115
    • (2007) European Journal of International Relations , vol.13 , Issue.1 , pp. 89-115
    • Aradau, C.1    Van Munster, R.2
  • 13
    • 18644383132 scopus 로고    scopus 로고
    • The terrorist threat: World risk society revisited
    • Beck U.The terrorist threat: World risk society revisited.Theory, Culture & Society. 2002;19 (4): 39-55
    • (2002) Theory, Culture & Society , vol.19 , Issue.4 , pp. 39-55
    • Beck, U.1
  • 14
    • 85049948963 scopus 로고    scopus 로고
    • A different view on the ‘making’ of European security: The EU Passenger Name Record system as a socio-technical assemblage
    • Bellanova R,Duez D.A different view on the ‘making’ of European security: The EU Passenger Name Record system as a socio-technical assemblage.European Foreign Affairs Review. 2012;17 (2/1): 109-124
    • (2012) European Foreign Affairs Review , vol.17 , Issue.2-1 , pp. 109-124
    • Bellanova, R.1    Duez, D.2
  • 16
    • 84861687292 scopus 로고    scopus 로고
    • Planning for the worst: Risk, uncertainty and the Olympic Games
    • Boyle P,Haggerty KD.Planning for the worst: Risk, uncertainty and the Olympic Games.The British Journal of Sociology. 2012;63 (2): 241-259
    • (2012) The British Journal of Sociology , vol.63 , Issue.2 , pp. 241-259
    • Boyle, P.1    Haggerty, K.D.2
  • 17
    • 29344464078 scopus 로고    scopus 로고
    • The epistemology and ontology of human–computer interaction
    • Brey P.The epistemology and ontology of human–computer interaction.Minds and Machines. 2005;15 (3/4): 383-398
    • (2005) Minds and Machines , vol.15 , Issue.3-4 , pp. 383-398
    • Brey, P.1
  • 19
    • 77958482604 scopus 로고    scopus 로고
    • An analysis of the impact of passenger profiling for transportation security
    • Cavusoglu H,Byungwan K,Raghunathan S.An analysis of the impact of passenger profiling for transportation security.Operations Research. 2010;58 (5): 1287-1302
    • (2010) Operations Research , vol.58 , Issue.5 , pp. 1287-1302
    • Cavusoglu, H.1    Byungwan, K.2    Raghunathan, S.3
  • 20
    • 82555193413 scopus 로고    scopus 로고
    • A new algorithmic identity: Soft biopolitics and the modulation of control
    • Cheney-Lippold J.A new algorithmic identity: Soft biopolitics and the modulation of control.Theory, Culture & Society. 2011;28 (6): 164-181
    • (2011) Theory, Culture & Society , vol.28 , Issue.6 , pp. 164-181
    • Cheney-Lippold, J.1
  • 21
    • 72249116274 scopus 로고    scopus 로고
    • Topologies of power: Foucault’s analysis of political government beyond ‘governmentality’
    • Collier S J.Topologies of power: Foucault’s analysis of political government beyond ‘governmentality’.Theory, Culture & Society. 2009;26 (6): 78-108
    • (2009) Theory, Culture & Society , vol.26 , Issue.6 , pp. 78-108
    • Collier, S.J.1
  • 22
    • 47749125354 scopus 로고    scopus 로고
    • Money, media and the anti-politics of terrorist finance
    • De Goede M.Money, media and the anti-politics of terrorist finance.European Journal of Cultural Studies. 2008;11 (3): 289-310
    • (2008) European Journal of Cultural Studies , vol.11 , Issue.3 , pp. 289-310
    • De Goede, M.1
  • 24
    • 76649093905 scopus 로고    scopus 로고
    • Identity, profiling algorithms and a world of ambient intelligence
    • De Vries K.Identity, profiling algorithms and a world of ambient intelligence.Ethics and Information Technology. 2010;12 (1): 71-85
    • (2010) Ethics and Information Technology , vol.12 , Issue.1 , pp. 71-85
    • De Vries, K.1
  • 25
    • 0002913383 scopus 로고
    • Postscript on the societies of control
    • Deleuze G.Postscript on the societies of control.October. 1992;59:3-7
    • (1992) October , vol.59 , pp. 3-7
    • Deleuze, G.1
  • 26
    • 84910631200 scopus 로고    scopus 로고
    • DiakopoulosN (2013) Rage against the algorithms. The Atlantic, 3October. Available at: (accessed 30 April 2014)
    • DiakopoulosN (2013) Rage against the algorithms. The Atlantic, 3October. Available at: http://www.theatlantic.com/technology/archive/2013/10/rage-against-the-algorithms/280255 (accessed 30 April 2014).
  • 28
    • 42949118751 scopus 로고    scopus 로고
    • Biopolitics of security in the 21st century: An introduction
    • Dillon M,Lobo-Guerrero L.Biopolitics of security in the 21st century: An introduction.Review of International Studies. 2008;34 (2): 265-292
    • (2008) Review of International Studies , vol.34 , Issue.2 , pp. 265-292
    • Dillon, M.1    Lobo-Guerrero, L.2
  • 33
    • 84910615060 scopus 로고    scopus 로고
    • European Commission (2011b) High Level Conference ‘Protecting Civil Aviation Against Terrorism’, Brussels, 27 September 2011, conclusions and recommendations. Available at: (accessed 30 April 2014)
    • European Commission (2011b) High Level Conference ‘Protecting Civil Aviation Against Terrorism’, Brussels, 27 September 2011, conclusions and recommendations. Available at: http://ec.europa.eu/transport/modes/air/events/doc/2011–09–27-avsec-conclusions.pdf (accessed 30 April 2014).
  • 42
    • 76649119461 scopus 로고    scopus 로고
    • Engaging rational discrimination: Exploring reasons for placing regulatory constraints on decision support systems
    • Gandy OH.Engaging rational discrimination: Exploring reasons for placing regulatory constraints on decision support systems.Ethics and Information Technology. 2010;12 (1): 29-42
    • (2010) Ethics and Information Technology , vol.12 , Issue.1 , pp. 29-42
    • Gandy, O.H.1
  • 44
    • 84910639096 scopus 로고    scopus 로고
    • GeyerF (2008) Taking stock: Databases and systems of information exchange in the area of freedom, security and justice. Challenge Research Paper No. 9. Available at: (accessed 24 June 2014)
    • GeyerF (2008) Taking stock: Databases and systems of information exchange in the area of freedom, security and justice. Challenge Research Paper No. 9. Available at: http://www.libertysecurity.org/IMG/pdf_Databases_and_Systems_of_Information_Exchange_in_the_Area_of_Freedom_Security_and_Justice.pdf (accessed 24 June 2014).
  • 46
    • 84910639472 scopus 로고    scopus 로고
    • González FusterGGutwirthSEllyneE (2010) Profiling in the European Union: A high-risk practice. INEX Policy Brief 10. Available at: (accessed 30 April 2014)
    • González FusterGGutwirthSEllyneE (2010) Profiling in the European Union: A high-risk practice. INEX Policy Brief 10. Available at: http://www.ceps.eu/ceps/dld/3474/pdf (accessed 30 April 2014).
  • 48
    • 84870687976 scopus 로고    scopus 로고
    • What do numbers do in transnational governance?
    • Hansen HK,Porter T.What do numbers do in transnational governance?.International Political Sociology. 2012;6 (4): 409-426
    • (2012) International Political Sociology , vol.6 , Issue.4 , pp. 409-426
    • Hansen, H.K.1    Porter, T.2
  • 49
    • 34548656278 scopus 로고    scopus 로고
    • Goold BJLazarus L, ed. Oxford and Portland, OR: Hart Publishing
    • Harcourt BESecurity and Human Rights. Goold BJLazarus L, ed. Oxford and Portland, OR: Hart Publishing; 2007:73-98.
    • (2007) Security and Human Rights , pp. 73-98
    • Harcourt, B.E.1
  • 50
    • 84910665840 scopus 로고    scopus 로고
    • HarrisSSchneierB (2012) To profile or not to profile? A debate between Sam Harris and Bruce Schneier, 25 May. Available at: (accessed 30 April 2014)
    • HarrisSSchneierB (2012) To profile or not to profile? A debate between Sam Harris and Bruce Schneier, 25 May. Available at: http://www.samharris.org/blog/item/to-profile-or-not-to-profile (accessed 30 April 2014).
  • 53
    • 84910630604 scopus 로고    scopus 로고
    • International Air Transport Association (IATA) (2011) Checkpoint of the future executive summary. Available at: (accessed 30 April 2014)
    • International Air Transport Association (IATA) (2011) Checkpoint of the future executive summary. Available at: https://www.iata.org/whatwedo/security/Documents/cof-executive-summary.pdf (accessed 30 April 2014).
  • 54
    • 84910612548 scopus 로고    scopus 로고
    • International Civil Aviation Organization (ICAO) (2012) Communiqué of the ICAO High Level Conference on Aviation Security, Montréal, 12 to 14 November 2012. Available at: (accessed 30 April 2014)
    • International Civil Aviation Organization (ICAO) (2012) Communiqué of the ICAO High Level Conference on Aviation Security, Montréal, 12 to 14 November 2012. Available at: http://www.icao.int/Meetings/avsecconf/Documents/HLCAS%20-%20Communique%2014%20September%202012.pdf (accessed 30 April 2014).
  • 57
    • 84885303200 scopus 로고    scopus 로고
    • Blurring the dimensions of privacy? Law enforcement and trusted traveler programs
    • Leese M.Blurring the dimensions of privacy? Law enforcement and trusted traveler programs.Computer Law & Security Review. 2013;29 (5): 480-490
    • (2013) Computer Law & Security Review , vol.29 , Issue.5 , pp. 480-490
    • Leese, M.1
  • 59
    • 33745804987 scopus 로고    scopus 로고
    • Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context
    • Lyon D.Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context.Canadian Journal of Criminology and Criminal Justice. 2006;48 (3): 397-411
    • (2006) Canadian Journal of Criminology and Criminal Justice , vol.48 , Issue.3 , pp. 397-411
    • Lyon, D.1
  • 61
    • 77955628942 scopus 로고    scopus 로고
    • Risk-based policies for airport security checkpoint screening
    • McLay LA,Lee AJ,Jacobson SH.Risk-based policies for airport security checkpoint screening.Transportation Science. 2010;44 (3): 333-349
    • (2010) Transportation Science , vol.44 , Issue.3 , pp. 333-349
    • McLay, L.A.1    Lee, A.J.2    Jacobson, S.H.3
  • 62
    • 84910681179 scopus 로고    scopus 로고
    • ManyikaJChuiMBrownB. (2011) Big data: The next frontier for innovation, competition, and productivity. Available at: (accessed 30 April 2014)
    • ManyikaJChuiMBrownB. (2011) Big data: The next frontier for innovation, competition, and productivity. Available at: http://www.mckinsey.com/~/media/McKinsey/dotcom/Insights%20and%20pubs/MGI/Research/Technology%20and%20Innovation/Big%20Data/MGI_big_data_full_report.ashx (accessed 30 April 2014).
  • 63
    • 57349126835 scopus 로고    scopus 로고
    • A formula for disaster: The Department of Homeland Security’s virtual ontology
    • Martin L,Simon S.A formula for disaster: The Department of Homeland Security’s virtual ontology.Space and Polity. 2008;12 (3): 281-296
    • (2008) Space and Polity , vol.12 , Issue.3 , pp. 281-296
    • Martin, L.1    Simon, S.2
  • 64
    • 84955195336 scopus 로고    scopus 로고
    • The model gap: Cognitive systems in security applications and their ethical implications
    • Matzner T.The model gap: Cognitive systems in security applications and their ethical implications.AI & Society. 2013 2013;:
    • (2013) AI & Society
    • Matzner, T.1
  • 65
    • 77951288021 scopus 로고    scopus 로고
    • Borders, risks, exclusions
    • Muller B.Borders, risks, exclusions.Studies in Social Justice. 2009;3 (1): 67-78
    • (2009) Studies in Social Justice , vol.3 , Issue.1 , pp. 67-78
    • Muller, B.1
  • 67
    • 84992806612 scopus 로고    scopus 로고
    • Theorizing cross-border mobility: Surveillance, security and identity
    • Pallitto R,Heyman J.Theorizing cross-border mobility: Surveillance, security and identity.Surveillance & Society. 2008;5 (3): 315-333
    • (2008) Surveillance & Society , vol.5 , Issue.3 , pp. 315-333
    • Pallitto, R.1    Heyman, J.2
  • 69
    • 1342268712 scopus 로고    scopus 로고
    • Passports, mobility, and security: How smart can the border be?
    • Salter MB.Passports, mobility, and security: How smart can the border be?.International Studies Perspectives. 2004;5 (1): 71-91
    • (2004) International Studies Perspectives , vol.5 , Issue.1 , pp. 71-91
    • Salter, M.B.1
  • 70
    • 41049112658 scopus 로고    scopus 로고
    • Imagining numbers: Risk, quantification, and aviation security
    • Salter MB.Imagining numbers: Risk, quantification, and aviation security.Security Dialogue. 2008;39 (2–3): 243-266
    • (2008) Security Dialogue , vol.39 , Issue.2-3 , pp. 243-266
    • Salter, M.B.1
  • 73
    • 84885997487 scopus 로고    scopus 로고
    • Governmental data mining and its alternatives
    • Zarsky TZ.Governmental data mining and its alternatives.Penn State Law Review. 2011;116 (2): 285-330
    • (2011) Penn State Law Review , vol.116 , Issue.2 , pp. 285-330
    • Zarsky, T.Z.1
  • 74
    • 33745803880 scopus 로고    scopus 로고
    • Neither safe nor sound? The perils and possibilities of risk
    • Zedner L.Neither safe nor sound? The perils and possibilities of risk.Canadian Journal of Criminology & Criminal Justice. 2006;48 (3): 423-434
    • (2006) Canadian Journal of Criminology & Criminal Justice , vol.48 , Issue.3 , pp. 423-434
    • Zedner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.