Composting and computing: On digital security compositions

13Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Making sense of digital security practice requires grasping how data are put to use to compose the governing of individuals. Data need to be understood in their becoming, and in their becoming something across diverse practices. To do this, we suggest embracing two conceptual tropes that jointly articulate the being together of, and in, data compositions: composting and computing. With composting, we approach data as lively entities, and we explore the decaying and recycling processes inside Big Data security. With computing, we approach data as embodied and embodying elements, and we unpack the surveillance of 'asylum speakers'. Together, composting and computing challenge recurrent images of data. Our conceptual composition takes sound as a necessary sensory counterpoint to popular data visions, notably in light of Ryoji Ikeda's artworks.

Cite

CITATION STYLE

APA

Bellanova, R., & Fuster, G. G. (2019). Composting and computing: On digital security compositions. European Journal of International Security, 4(3), 345–365. https://doi.org/10.1017/eis.2019.18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free