European Journal of Social Theory 20 (3):373-391 (2017)

Abstract
From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and big data. Unlike disciplinary and biopolitical governmentality, we argue that prediction with big data is underpinned by the production of a different time/space of ‘between-ness’. The digital mode of prediction with big data reconfigures how we are governed today, which we illustrate through an analysis of how predictive policing actualizes between-ness as hotspots and near-real-time decisions.
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
ISBN(s)
DOI 10.1177/1368431016667623
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 62,356
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Cinema 1: The Movement Image.Gilles Deleuze, Hugh Tomlinson & Barbara Habberjam - 1988 - Journal of Aesthetics and Art Criticism 46 (3):436-437.
Of Other Spaces (PDF).Michel Foucault - 1986 - Diacritics: A Review of Contemporary Criticism 16 (1).

View all 11 references / Add more references

Citations of this work BETA

View all 6 citations / Add more citations

Similar books and articles

Big Data and Prediction: Four Case Studies.Robert Northcott - 2020 - Studies in History and Philosophy of Science Part A 81:96-104.
Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).

Analytics

Added to PP index
2020-11-24

Total views
6 ( #1,099,074 of 2,445,415 )

Recent downloads (6 months)
5 ( #149,181 of 2,445,415 )

How can I increase my downloads?

Downloads

My notes