The Secret in the Information Society
In: Philosophy & technology, Band 29, Heft 3, S. 293-305
ISSN: 2210-5441
25 Ergebnisse
Sortierung:
In: Philosophy & technology, Band 29, Heft 3, S. 293-305
ISSN: 2210-5441
In: Internationale spectator, Band 66, Heft 2, S. 79-84
ISSN: 0020-9317
In: Punishment & society, Band 12, Heft 2, S. 169-186
ISSN: 1741-3095
The expulsion of irregular migrants has become a political priority in many (northern) EU member states. In countries such as Germany and the Netherlands this has resulted in a rather puzzling situation in which the capacity for the administrative detention of irregular migrants is increasing, while the number of effective expulsions seems to be decreasing. In this article two theoretical perspectives are used to analyse these developments: a perspective emanating from the criminological framework of the 'new penology' and one resulting from the 'migration control literature'. These perspectives combined offer explanations for this paradoxical situation — by highlighting the importance of identification and the frustration thereof by irregular migrants and countries of origin — and for the apparent irrationality of the use of, sometimes very lengthy, administrative detention of irregular migrants.
In: Policy & internet
ISSN: 1944-2866
AbstractThe war in Ukraine has underscored the risks and threats to global Internet infrastructure from geopolitically motivated cyber operations. The Domain Name System and core protocols responsible for the routing, forwarding, and security of Internet traffic have been exploited by actors in Russia and Ukraine for denial‐of‐service attacks, surveillance, and censorship. Additionally, states have tried to compel organisations that maintain and govern such infrastructure to cut Russia off from the Internet. These cyber operations and sanctions targeting the 'public core of the internet' have serious transboundary effects, and threaten the stability and functionality of the Internet. Most such attacks appear, at the time of writing, to have been buffeted by the internet's resilience, but there is equally the risk that the Ukraine war becomes a permissive, norm‐constitutive moment for similar operations in the future targeting its core physical, institutional and logical infrastructure. The technical community, a growing number of states and other stakeholders have been arguing for the protection of the 'public core' of the internet for nearly a decade, anchoring the concept in policy, multistakeholder and diplomatic fora and documents. This paper, while noting that states increasingly acknowledge the need to protect the public core of the internet, argues that norms and international law are still ill‐equipped to regulate damaging cyber operations, given unsettled questions regarding the sovereignty of states over global Internet infrastructure, and the precise scope of their existing international obligations towards its protection.
In: Survival: global politics and strategy, Band 60, Heft 6, S. 73-90
ISSN: 0039-6338
World Affairs Online
In: Survival: global politics and strategy, Band 60, Heft 6, S. 73-90
ISSN: 1468-2699
In: European journal of social theory, Band 18, Heft 1, S. 21-38
ISSN: 1461-7137
Social sorting of migrants and travellers based on data stored in information systems is at the centre of border controls and mobility management in Europe. Recent literature finds that the inclusion-exclusion distinction is insufficiently equipped to do justice to the variety of classifications that is being applied. Instead, a proliferation of refined categorizations determines the outcome of visa and permit applications. This article explores the 'administrative ecology' in between the two extremes of inclusion and exclusion. It claims information technologies encourage the emergence of an intermediary category of 'non-publics' situated between the level of groups and the level of individuals. The ontological and normative status of these 'non-publics' will be analysed by using some key notions of Actor-Network Theory.
In: Journal of ethnic and migration studies: JEMS, Band 39, Heft 8, S. 1201-1218
ISSN: 1469-9451
In: Journal of ethnic and migration studies: JEMS, Band 39, Heft 8, S. 1201-1218
ISSN: 1369-183X
In: West European politics, Band 32, Heft 5, S. 867-885
ISSN: 1743-9655
In: West European politics, Band 32, Heft 5, S. 867-885
ISSN: 0140-2382
World Affairs Online
In: American behavioral scientist: ABS, Band 50, Heft 12, S. 1592-1609
ISSN: 1552-3381
In recent years, northern European Union (EU) member states have intensified internal surveillance on irregular migrants. Policy innovation has been geared to controlling, identifying, and even reidentifying irregular migrants who settled within their borders. Policy aims are deterrence, exclusion, and, ultimately, expulsion. Developments in labor market, detention, and expulsion policies and surveillance by the EU immigration database are analyzed in relation to the counterstrategies that irregular migrants devise to escape detection and expulsion by the state. The resulting cat and mouse game between the state and irregular migrants seems to result in a serious threat to irregular migrants' room to maneuver and further increases their dependence on informal, and increasingly criminal, networks and institutions.
In: American behavioral scientist: ABS, Band 50, Heft 12, S. 1592-1609
ISSN: 0002-7642
In: Sociologie, Band 51, Heft 3, S. 215-235
In: S & D, Band 59, Heft 3, S. 56-65
ISSN: 0037-8135