Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social Control, Law, Crime, and Deviance

Administrative Law In The Automated State, Cary Coglianese Jan 2021

Administrative Law In The Automated State, Cary Coglianese

All Faculty Scholarship

In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated state were …


Weaponization Of Data For Governmentality, Juliana Son May 2018

Weaponization Of Data For Governmentality, Juliana Son

Dissertations, Theses, and Capstone Projects

Who is a citizen? Who is a threat to public safety? Who is worthy of protection? What it means to be a valued body in the United States has been written into code, where the state and corporations have embraced an algorithmic approach to national security. Algorithms, previously praised for their neutrality, have been taking a neoliberal turn.

This thesis will examine how data is used by the state as a governance practice, specifically looking at how such practices have left certain communities more precarious and vulnerable than others. My aim is to show how the weaponization of data is …


Technology And Big Data Meet The Risk Of Terrorism In An Era Of Predictive Policing And Blanket Surveillance, Alexandra C. Patti May 2015

Technology And Big Data Meet The Risk Of Terrorism In An Era Of Predictive Policing And Blanket Surveillance, Alexandra C. Patti

University of New Orleans Theses and Dissertations

Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly secretive nature of surveillance programs. However, documents leaked by Edward Snowden in June of 2013 provided unprecedented proof of top-secret American data mining initiatives that covertly monitor electronic communications, collect, and store previously unfathomable quantities of data. These documents presented an ideal opportunity for testing theory against data to better understand contemporary surveillance. This qualitative content analysis compared themes of technology, privacy, national security, and legality in the NSA documents to those found in sets of publicly available government reports, laws, and guidelines, finding inconsistencies …