{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T01:56:39Z","timestamp":1777082199444,"version":"3.51.4"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:00:00Z","timestamp":1563840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10676-019-09509-y","type":"journal-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T06:02:41Z","timestamp":1563861761000},"page":"319-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["The disciplinary power of predictive algorithms: a Foucauldian perspective"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9683-8606","authenticated-orcid":false,"given":"Paul B.","family":"de Laat","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,23]]},"reference":[{"key":"9509_CR1","unstructured":"algo:aware (2018) Raising awareness on algorithms. Procured by the European Commission\u2019s Directorate-General for Communications Networks, Content and Technology. State-of-the-Art Report\/Algorithmic decision-making. Version 1.0, December 2018. \nwww.algoaware.eu\/state-of-the-art-report\/\n\n. Accessed 20 July 2019."},{"key":"9509_CR2","unstructured":"AlgorithmWatch (2019) Automating society: Taking stock of automated decision-making in the EU. A report by AlgorithmWatch in cooperation with the Bertelsmann Stiftung, supported by the Open Society Foundations. 1st edition, January 2019. \nwww.algorithmwatch.org\/en\/automating-society\n\n. Accessed 20 July 2019."},{"issue":"6","key":"9509_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0263276411417430","volume":"28","author":"L Amoore","year":"2011","unstructured":"Amoore, L. (2011). Data derivatives: On the emergence of a security risk calculus for our times. Theory, Culture & Society,28(6), 24\u201343.","journal-title":"Theory, Culture & Society"},{"key":"9509_CR4","doi-asserted-by":"publisher","DOI":"10.1215\/9780822377269","volume-title":"The politics of possibility: Risk and security beyond probability","author":"L Amoore","year":"2013","unstructured":"Amoore, L. (2013). The politics of possibility: Risk and security beyond probability. Durham, London: Duke University Press."},{"key":"9509_CR6","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., & Selbst, A. D. (2016). Big data\u2019s disparate impact. California Law Review,104, 671\u2013732.","journal-title":"California Law Review"},{"issue":"4","key":"9509_CR5","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s13347-017-0293-z","volume":"31","author":"PB de Laat","year":"2018","unstructured":"de Laat, P. B. (2018). Algorithmic decision-making based on machine learning from big data: Can transparency restore accountability? Philosophy & Technology, 31(4), 525\u2013541.","journal-title":"Philosophy & Technology"},{"issue":"winter","key":"9509_CR7","first-page":"3","volume":"59","author":"G Deleuze","year":"1992","unstructured":"Deleuze, G. (1992). Postscript on the societies of control. October,59(winter), 3\u20137.","journal-title":"October"},{"issue":"Fall","key":"9509_CR8","first-page":"28","volume":"34","author":"S Erwin","year":"2015","unstructured":"Erwin, S. (2015). Living by algorithm: Smart surveillance and the society of control. Humanities and Technology Review,34(Fall), 28\u201369.","journal-title":"Humanities and Technology Review"},{"key":"9509_CR9","unstructured":"Foucault, M. (1977). Discipline and Punish: Birth of the Prison (Alan Sheridan translator). New York: Vintage Books. Translation of Surveiller et punir: Naissance de la prison, Paris: Gallimard, 1975."},{"key":"9509_CR10","unstructured":"Foucault, M. (2003). Abnormal. Lectures at the Coll\u00e8ge de France 1974\u20131975. London: Verso. Translation of Les Anormeaux, Paris: Gallimard, 1999."},{"key":"9509_CR11","unstructured":"Foucault, M. (2007). Security, Territory, Population. Lectures at the Coll\u00e8ge de France 1977\u20131978. London: Palgrave Macmillan. Originally published in French in 2004."},{"key":"9509_CR12","first-page":"23","volume-title":"Theorizing surveillance: The panopticon and beyond","author":"KD Haggerty","year":"2006","unstructured":"Haggerty, K. D. (2006). Tear down the walls: On demolishing the panopticon. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 23\u201345). Cullompton: Willan Publishing."},{"issue":"4","key":"9509_CR13","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00071310020015280","volume":"51","author":"KD Haggerty","year":"2000","unstructured":"Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology,51(4), 605\u2013622.","journal-title":"British Journal of Sociology"},{"key":"9509_CR14","first-page":"13","volume-title":"Surveillance as social sorting: Privacy, risk, & digital discrimination","author":"D Lyon","year":"2003","unstructured":"Lyon, D. (2003). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk, & digital discrimination (pp. 13\u201328). London: Routledge."},{"key":"9509_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.4324\/9781843926818","volume-title":"Theorizing surveillance: The Panopticon and beyond","author":"D Lyon","year":"2006","unstructured":"Lyon, D. (2006). The search for surveillance theories. In D. Lyon (Ed.), Theorizing surveillance: The Panopticon and beyond (pp. 3\u201320). Cullompton: Willan Publishing."},{"issue":"2","key":"9509_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.24908\/ss.v14i2.5831","volume":"14","author":"T Matzner","year":"2016","unstructured":"Matzner, T. (2016). Beyond data as representation: The performativity of big data in surveillance. Surveillance & Society,14(2), 197\u2013210.","journal-title":"Surveillance & Society"},{"key":"9509_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.22439\/fs.v0i0.5340","volume":"23","author":"T Matzner","year":"2017","unstructured":"Matzner, T. (2017). Opening black boxes is not enough: Data-based surveillance in Discipline and Punish and Today. Foucault Studies,23, 27\u201345.","journal-title":"Foucault Studies"},{"key":"9509_CR18","volume-title":"Privacy, due process and the computational turn. Philosophers of law meet philosophers of technology (Chap. 5)","author":"A Rouvroy","year":"2012","unstructured":"Rouvroy, A. (2012). The end(s) of critique: data-behaviourism vs. due-process. In M. Hildebrandt & E. De Vries (Eds.), Privacy, due process and the computational turn. Philosophers of law meet philosophers of technology (Chap. 5). London: Routledge."},{"issue":"3","key":"9509_CR19","first-page":"216","volume":"20","author":"D Susser","year":"2016","unstructured":"Susser, D. (2016). Information privacy and social self-authorship. Techn\u00e9: Research in Philosophy and Technology,20(3), 216\u2013239.","journal-title":"Techn\u00e9: Research in Philosophy and Technology"},{"key":"9509_CR20","first-page":"233","volume-title":"Global governmentality: Governing international spaces","author":"M Valverde","year":"2004","unstructured":"Valverde, M., & Mopas, M. (2004). Insecurity and the dream of targeted governance. In W. Larner & W. Walters (Eds.), Global governmentality: Governing international spaces (pp. 233\u2013250). London: Routledge."},{"issue":"6","key":"9509_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2013.195","volume":"46","author":"MR Wigan","year":"2013","unstructured":"Wigan, M. R., & Clarke, R. (2013). Big data\u2019s big unintended consequences. Computer,46(6), 46\u201353.","journal-title":"Computer"},{"issue":"4","key":"9509_CR22","first-page":"1503","volume":"2013","author":"TZ Zarsky","year":"2013","unstructured":"Zarsky, T. Z. (2013). Transparent Predictions. University of Illinois Law Review,2013(4), 1503\u20131570.","journal-title":"University of Illinois Law Review"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09509-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09509-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09509-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T23:19:38Z","timestamp":1595373578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09509-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,23]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9509"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09509-y","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,23]]},"assertion":[{"value":"23 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}