1. Acker A. (2020). Private platforms metadata and the enclosure of data access: Urgent issues for knowledge infrastructure research. KI Insights. https://escholarship.org/content/qt48c7b5p2/qt48c7b5p2.pdf
2. Agostinho, D., & Thylstrup, N. B. (in press). Vexed intimacies: Attuning to remains in encounters with datasets. In M. L. Angerer, I. Richardson, H. Schmedes, & Z. Sofoulis (Eds.), Technologies of containment: Holding, filtering, leaking. Meson press.
3. Amoore, L. (2020). Cloud ethics: Algorithms and the attributes of ourselves and others. Duke University Press.
4. Securing with algorithms: Knowledge, decision, sovereignty;Amoore L.;Security Dialogue,2017
5. Angerer, M. L., Richardson, I., Schmedes, H., & Sofoulis, Z. (2024). Technologies of containment: Holding, filtering, leaking. Meson press.