Author(s):

  • Amoore, Louise
  • Piotukh, Volha

Abstract:

The twenty-first-century rise of big data marks a significant break with statistical notions of what is of interest or concern. The vast expansion of digital data has been closely intertwined with the development of advanced analytical algorithms with which to make sense of the data. The advent of techniques of knowledge discovery affords some capacity for the analytics to derive the object or subject of interest from clusters and patterns in large volumes of data, otherwise imperceptible to human reading. Thus, the scale of the big in big data is of less significance to contemporary forms of knowing and governing than what we will call the little analytics. Following Henri Bergson’s analysis of forms of perception which ‘cut out’ a series of figures detached from the whole, we propose that analytical algorithms are instruments of perception without which the extensity of big data would not be comprehensible. The technologies of analytics focus human attention and decision on particular persons and things of interest, whilst annulling or discarding much of the material context from which they are extracted. Following the algorithmic processes of ingestion, partitioning and memory, we illuminate how the use of analytics engines has transformed the nature of analysis and knowledge and, thus, the nature of the governing of economic, social and political life.

Documentation:

https://doi.org/10.1080/03085147.2015.1043793

References:
  1. Accenture. (2013). Accenture analytics in action. Retrieved from http://www.accenture.com/sitecollectiondocuments/pdf/accenture-analytics-in-action-survey.pdf [Google Scholar]
  2. Agrawal, R., Asonov, D., Baliga, P., Liang, L., Porst, B. & Srikat, R. (2005). A reusable platform for building sovereign information sharing applications. SIGMOD Proceedings. Retrieved March 25, 2015, from http://www.rsrikant.com/papers/divo04.pdf [Google Scholar]
  3. Agrawal, R., Imielinski, T. & Swami, A. (1993). Mining association rules between sets of items in large databases. SIGMOD Proceedings (pp. 207–217). [Google Scholar]
  4. Agrawal, R. & Winslett, M. (2005). An interview with Rakesh Agrawal. SIGMOD. Retrieved March 24, 2015, from http://www.sigmod.org/publications/interview/pdf/D15.rakesh-final-final.pdf [Google Scholar]
  5. Amoore, L. (2011). Data derivatives: On the emergence of a risk security calculus for our times. Theory, Culture & Society28(6), 24–43. [Crossref][Web of Science ®][Google Scholar]
  6. Amoore, L. (2013). The politics of possibility: Risk and security beyond probability.Durham, NC: Duke University Press. [Crossref][Google Scholar]
  7. Anjaria, M. & Gudetti, R. M. R. (2014). A novel sentiment analysis of social networks using supervised learning. Social Network Analysis and Mining4(3), 181–193. [Crossref][Google Scholar]
  8. Ansell Pearson, K. & Mullarkey, J.(Eds.). (2002). Henri Bergson: Key writings. London: Bloomsbury.  [Google Scholar]
  9. Bello, G., et al. (2013). Extracting collective trends from Twitter using social-based data mining. In C. Badica, N. T. Nquyen & M. Berezovan (Eds.), ICCCI 2013. LNAI 8083 (pp. 622–630). [Google Scholar]
  10. Benjamin, W. (1999). Illuminations. London: Random House. [Google Scholar]
  11. Bergson, H. (1912). Matter and memory. Mineola, NY: Dover Philosophical Classics. [Google Scholar]
  12. Bergson, H. (1965). The creative mind. (M. Andison, Trans.). Totowa, NJ: Littlefield,Adams & Co. [Google Scholar]
  13. Berry, D. M. (2011). The philosophy of software: Code and mediation in the digital age. Basingstoke: Palgrave Macmillan. [Crossref][Google Scholar]
  14. Berry, D. M. (2014). Critical theory and the digital. New York, NY: Bloomsbury.  [Google Scholar]
  15. Boyd, D. & Crawford, K. (2012). Critical questions for big data. Information, Communication & Society15(5), 662–679. [Taylor & Francis Online][Web of Science ®][Google Scholar]
  16. Chiao-Fe, S. (2005). IBM smart surveillance system: an open framework for event based surveillance. IEEE Proceedings on advanced video and signal surveillance (pp. 318–373). [Google Scholar]
  17. Connolly, W. (2011). A world of becoming. Durham, NC: Duke University Press.  [Google Scholar]
  18. Crary, J. (1999). Suspensions of perception: Attention, spectacle, and modern culture. Cambridge, MA: MIT Press.  [Crossref][Google Scholar]
  19. Daston, L. (1995). Classical probability in the enlightenment. Princeton, NJ: Princeton University Press. [Google Scholar]
  20. Daston, L. & Galison, P. (2007). Objectivity. New York, NY: Zone Books. [Google Scholar]
  21. Dean, J. & Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. Proceedings of the OSDI. Retrieved March 25, 2015, from http://static.googleusercontent.com/media/research.google.com/en//archive/mapreduce-osdi04.pdf [Google Scholar]
  22. Deleuze, G. (1991). Bergsonism. New York, NY: Zone Books. [Google Scholar]
  23. Deleuze, G. & Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia. Minneapolis, MN: University of Minnesota Press. [Google Scholar]
  24. Dunham, M. H. (2002). Data mining: Introductory and advanced topics. Upper Saddle River, NJ: Prentice Hall. [Google Scholar]
  25. Emerson, T., Ghosh, R. & Smith, E. (2012). Practical Text Mining and Statistical Analysis for Non-Structured Text Data Applications. London: Elsevier. [Google Scholar]
  26. ESRC (Economic and Social Research Council). (2014). ESRC big data network: Phase 2: Business and local government data research centres. Retrieved April 27, 2014, from http://www.esrc.ac.uk/research/major-investments/Big-Data/BDN-Phase2.aspx [Google Scholar]
  27. Featurespace. (2013). Our technology. Retrieved November 10, 2013, from http://www.featurespace.co.uk/technology/our-technology/ [Google Scholar]
  28. Foucault, M. (2007). Security, territory, population: Lectures at the Collége de France, 197778. Basingstoke: Palgrave Macmillan. [Crossref][Google Scholar]
  29. Galloway, A. R. (2012). The interface effect. Cambridge: Polity. [Google Scholar]
  30. GAO (Government Accountability Office). (2007). Data mining: early attention to privacy in developing a key DHS program could reduce risks, GAO-07-293. Washington, DC: Government Accountability Office. [Google Scholar]
  31. GAO (Government Accountability Office). (2013). Decision: IBM v US Federal, B-407073. Washington, DC: Government Accountability Office. [Google Scholar]
  32. de Goede, M. (2012). Speculative security: The politics of pursuing terrorist monies. Minneapolis, MN: University of Minnesota Press. [Crossref][Google Scholar]
  33. Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA and the surveillance state. London: Penguin. [Google Scholar]
  34. Gruhl, D., Chavet, D. & Gibson, D. (2004). How to build a WebFountain. Utility Computing, 43(1), 64–70. [Google Scholar]
  35. Gupta, R., Gupta, H. & Mohania, M. (2012). Cloud computing and big data analytics.Computer Science7678, 42–61. [Google Scholar]
  36. Hacking, I. (1982). Biopower and the avalanche of printed numbers. Humanities in Society, 5(3–4), 279–295. [Google Scholar]
  37. Hacking, I. (1986). Making up people. In T. Heller (Ed.), Reconstructing individualism(pp. 222–236). Stanford, CA: Stanford University Press. [Google Scholar]
  38. Hacking, I. (1990). The taming of chance. Cambridge: Cambridge University Press. [Crossref][Google Scholar]
  39. Harding, L. (2014). The Snowden files. London: Faber and Faber.  [Google Scholar]
  40. Hayles, N. K. (2005). My mother was a computer: Digital subjects and literary texts.Chicago, IL: Chicago University Press. [Crossref][Google Scholar]
  41. Hayles, N. K. (2012). How we think: Digital media and contemporary technogenesis. Chicago, IL: Chicago University Press.  [Crossref][Google Scholar]
  42. Hildebrandt, M. (2013). Slaves to big data. Or are we? Keynote at the 9th Annual Conference on Internet, Law & Politics (IDP, 2013, Barcelona). Retrieved January 14, 2014, from http://works.bepress.com/mireille_hildebrandt/52/ [Google Scholar]
  43. IBM. (2012). IBM content analytics: Rapid insight for crime investigation. Retrieved November 19, 2013, from http://public.dhe.ibm.com/common/ssi/ecm/en/zzs03073usen/ZZS03073USEN.PDF [Google Scholar]
  44. Inmon, W. H. & Nasaevich, A. (2007). Tapping into unstructured data: Integrating unstructured data and textual analytics into business intelligence. Upper Saddle River, NJ: Prentice Hall. [Google Scholar]
  45. Intelligence and Security Committee. (2014). Transcript of evidence given by Theresa May MP, Home Secretary. Retrieved October 25, 2014, from http://isc.independent.gov.uk/public-evidence [Google Scholar]
  46. Intelligence and Security Committee. (2015). Privacy and security: A modern and transparent legal framework. London: HMSO. [Google Scholar]
  47. Kitchin, R. (2014). The data revolution: Big data, open data, data infrastructures and their consequences. London: Sage.  [Google Scholar]
  48. Klemettinen, M., Mannila, H., Ronkainen, P. & Toivonen, H. (1994). Finding interesting rules from large data sets of discovered association rules. Proceedings of the 3rd International Conference on Information and Knowledge Management, 684–699.  [Google Scholar]
  49. Kroes, N. (2013). Speech: The big data revolution (European Commission – Speech/13/261). Retrieved April 27, 2014, from http://europa.eu/rapid/press-release_SPEECH-13-261_en.htm [Google Scholar]
  50. Latour, B. (1988). The pasteurization of France. Cambridge, MA: Harvard University Press. [Google Scholar]
  51. LIBE (2013). Draft report on the US NSA surveillance programme. European Parliament Committee on Civil Liberties, Justice and Home Affairs: 2188. [Google Scholar]
  52. MacKenzie, D. (2011). How to make money in microseconds. London Review of Books, 33(10), 16–18. [Google Scholar]
  53. MapR for Apache Hadoop (2011). White Paper. Retrieved January 26, 2014, from https://www.mapr.com/sites/default/files/mapr_dist_white_paper.pdf [Google Scholar]
  54. Marron, D. (2007). ‘Lending by numbers’: Credit scoring and the constitution of risk within American consumer credit. Economy and Society, 36(1), 103–133. [Taylor & Francis Online][Web of Science ®][Google Scholar]
  55. Mayer-Schönberger, V. (2009). Delete: The virtue of forgetting in the digital age. Princeton, NJ: Princeton University Press.  [Google Scholar]
  56. Mayer-Schönberger, V. & Cukier, K. (2013). Big data: A revolution that will change how we live, work and think. New York, NY: Houghton Mifflin Harcourt. [Google Scholar]
  57. McKenna, A. (2010). The genome analysis toolkit: A MapReduce framework for analysing DNA sequencing data. Genome Research20(9), 1297–1303.  [Crossref][PubMed][Web of Science ®][Google Scholar]
  58. Miller, P. & Rose, N. (1990). Governing economic life. Economy and Society, 19(1), 1–31. [Taylor & Francis Online][Web of Science ®][Google Scholar]
  59. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press. [Google Scholar]
  60. OECD (Organisation for Economic Cooperation and Development). (2013). The OECD privacy framework. Retrieved April 27, 2014, from http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf [Google Scholar]
  61. Ohlhorst, F. (2013). Big data analytics. London: Blackwell Wiley. [Google Scholar]
  62. Parisi, L. (2013). Contagious architecture: Computation, aesthetics and space.Cambridge, MA: MIT Press. [Crossref][Google Scholar]
  63. Raeder, T. & Chawla, N. V. (2011). Market basket analysis with networks. Social Networks Analysis and Mining, 1 (2), 97–113. [Crossref][Google Scholar]
  64. Rose, N. (2006). The politics of life itself: Biomedicine, power, and subjectivity in the twenty-first century. Princeton, NJ: Princeton University Press. [Google Scholar]
  65. Ruppert, E., Law, J. & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46. [Crossref][Web of Science ®][Google Scholar]
  66. SAS Analytics (2013). Field-work observations of SAS knowledge discovery processes, London. [Google Scholar]
  67. Tachmazidis, I., Antoniou, G. & Kotoulas, S. (2012). Scalable nonmonotonic reasoning over RDF data using MapReduce. Proceedings of the Joint Workshop on Scalable Semantic Web Systems (pp. 75–90) 11th November, Boston, USA. [Google Scholar]
  68. The New York Times. (2013, September 28). NSA gathers data on social connections of US citizens. [Google Scholar]
  69. Zhang, S. & Wu, X. (2001). Large scale data mining based on data partitioning.Applied Artificial Intelligence, 15(2), 129–139. [Taylor & Francis Online][Web of Science ®][Google Scholar]
  70. Zhao, L., Yingjie, R., Wang, J., Meng, L. & Zou, C. (2013). Research on the opinion mining system for massive social media data. In G. Zhou et al. (Eds.), NLPCC 2013, CCIS 400 (pp. 424–431) November 15th–19th, Chongqing, China. [Google Scholar]