Abstract
The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives rise to a paradoxical normativity directly dependent on empirical states. Its ‘securitisation move’ is moreover characterised by an inherent tendence to expand. As a result, the PNR Directive poses challenges for existing check and balance mechanisms and for human autonomy. These challenges could be partially addressed by strengthening ex-post control procedures and independent auditing. Yet in the decision to adopt a risk-based security model, something more fundamental seems to be at stake, namely, the preservation of the idea of human beings as moral agents able to direct and modify their behaviour in accordance with an intelligible, reliable and predictable normative order.
Subject
Public Administration,Sociology and Political Science,Communication,Information Systems
Reference30 articles.
1. Data derivatives: On the emergence of a security risk calculus for our times;Amoore;Theory, Culture & Society,2011
2. Securing with algorithms: Knowledge, decision, sovereignty;Amoore;Security Dialogue,2016
3. Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future;Aradau;European Journal of International Relations,2007
4. When the EU is the “Norm-taker”: The passenger name records agreement and the EU’s internalization of US border security norms;Argomaniz;Journal of European Integration,2009
5. The ‘rule of law’ implications of data-driven decision-making: A techno-regulatory perspective;Bayamlıoğlu;Law, Innovation and Technology,2018
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献