Gut Feelings and Algorithms: Searching for Harmful Intentions in Airport Security Processes

  • Sylvia Kühne German
  • Bettina Paul

Abstract

Credibility Assessment, truth verification or lie detection – many terms point to the perpetual endeavour of developing procedures that are supposed to ensure the authenticity of others. This is especially true when the place of action is a vulnerable infrastructural site and the target action is to avert threats. Airports are large architectural filtering systems, in which people and goods are channelled through technological and human screening procedures. But airports also serve as a prominent place for imaginaries of automated control technologies. Although at least in Germany, such technologies are still subject to laboratory work and field trials, they share the notion of searching for harmful intentions with current filtering systems. Embedded in the nexus of STS scholarship, critical security and surveillance studies, the article sheds light on the differences and commonalities of human-centred suspicion practices at the airport and its envisioned automated equivalents in the laboratory. Based on insights of focused ethnographic research at German airports and in-depth interviews with researchers, the article presents three empirical case vignettes, highlighting the rationales of human border control, airport security screeners and researchers. Focusing on the role of tacit knowledge for identifying indicators for harmful intentions, the human-centred rationale of baselining is put into relation to the so-called ground truthing in computational contexts. The field insights suggest that, despite their differences, each mode of thinking and doing relies on conceptualising a so-called phenomenon of harmful intentions as a non-verbal physical display, that manifests itself as an epistemological object as well as a single truth.

References

Aas, Katja Franko, Helene Oppen Gundhus, and Heidi Mork Lomell, eds. 2009. Technologies of InSecurity: The Surveillance of Everyday Life. Abingdon: Routledge-Cavendish.

Adey, Peter. 2004. “Surveillance at the Airport: Surveilling Mobility/Mobilising Surveillance.” Environment and Planning A: Economy and Space 36(8): 1365–80.

https://doi.org/10.1068/a36159.

⸻. 2006. “If Mobility Is Everything Then It Is Nothing: Towards a Relational Politics of (Im)Mobilities.” Mobilities 1(1): 75–94.

https://doi.org/10.1080/17450100500489080.

⸻. 2009. “Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body.” Environment and Planning D: Society and Space 27(2): 274–95.

https://doi.org/10.1068/d0208.

Amoore, Louise. 2009. “Lines of Sight: On the Visualization of Unknown Futures.” Citizenship Studies 13(1): 17–30.

https://doi.org/10.1080/13621020802586628.

⸻. 2013. The Politics of Possibility: Risk and Security Beyond Probability. Durham: Duke University Press.

⸻. 2019. “Doubt and the Algorithm: On the Partial Accounts of Machine Learning.” Theory, Culture & Society 36(6): 147–69.

https://doi.org/10.1177/0263276419851846.

Aradau, Claudia, and Tobias Blanke. 2015. “The (Big) Data-Security Assemblage: Knowledge and Critique.” Big Data & Society 2(2): 1–12.

https://doi.org/10.1177/2053951715609066.

Aradau, Claudia, and Rens Van Munster. 2007. “Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13(1): 89–115.

https://doi.org/10.1177/1354066107074290.

Barocas, Solon, and Andrew D. Selbst. 2016. “Big Data’s Disparat Impact.” California Law Review 104(3): 671–732.

https://doi.org/10.15779/Z38BG31.

Bassetti, Chiara. 2017. “Airport Security Contradictions: Interorganizational Entanglements and Changing Work Practices.” Ethnography 19(3): 288–311.

https://doi.org/10.1177/1466138117696513.

⸻. 2021. “The Tacit Dimension of Expertise: Professional Vision at Work in Airport Security.” Discourse Studies 23(5): 597–615.

https://doi.org/10.1177/14614456211020141.

Bechmann, Anja, and Geoffrey C. Bowker. 2019. “Unsupervised by Any Other Name: Hidden Layers of Knowledge Production in Artificial Intelligence on Social Media.” Big Data & Society 6(1): 1–11.

https://doi.org/10.1177/2053951718819569.

Bergmann, Jörg. 1993. “Alarmiertes Verstehen: Kommunikation in Feuerwehrnotrufen. [Alarmed Making Sense: Communication in Fire Department Emergency Calls].” In ‘Wirklichkeit’ im Deutungsprozeß. Verstehen und Methoden in den Kultur- und Sozialwissenschaften [Reality in the process of interpretation. Sense Making and methods in the cultural and social sciences], edited by Thomas Jung and Stefan Müller-Doohm, 283–328. Frankfurt am Main: Suhrkamp.

Biermann, André, and Stefan Kaufmann. 2021. “Sicherheit als epistemische Praxis in der Luftsicherheitskontrolle” [Security as an Epistemic Practice in Aviation Security Control]. In Vielfältige Sicherheiten: Gesellschaftliche Dimensionen der Sicherheitsforschung [Multiple Securities: Social Dimensions of Security Research], edited by Nicholas Eschenbruch, Stefan Kaufmann, and Peter Zoche, 159–82. Münster: LIT-Verlag.

Bigo, Didier, and Anastassia Tsoukala, eds. 2008. Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11, 11–19. First Edition. London: Routledge.

Bonelli, Laurent, and Francesco Ragazzi. 2014. “Low-Tech Security: Files, Notes, and Memos as Technologies of Anticipation.” Security Dialogue 45(5): 476–93.

https://doi.org/10.1177/0967010614545200.

Bourne, Mike, Heather Johnson, and Debbie Lisle. 2015. “Laboratizing the Border: The Production, Translation and Anticipation of Security Technologies.” Security Dialogue 46(4): 307–25.

https://doi.org/10.1177/0967010615578399.

Collins, Harry. 2007. “Bicycling on the Moon: Collective Tacit Knowledge and Somatic-Limit Tacit Knowledge.” Organization Studies 28(2): 257–62.

https://doi.org/10.1177/0170840606073759.

⸻. 2010. Tacit and Explicit Knowledge. Chicago: The University of Chicago Press.

https://doi.org/10.7208/chicago/9780226113821.001.0001.

Cubasch, Alwin J., Vanessa Engelmann, and Christian Kassung. 2021. “Theorie des Filterns: Zur Programmatik eines Experimentalsystems” [Theory of Filtering: About the Programmatic of an Experimental System]. Preprint. Zenodo: OpenAIRE, April 30, 2021.

https://doi.org/10.5281/zenodo.4731045.

Degenhardt, Teresa, and Mike Bourne. 2020. “When Risks Meet: The Dance of Experience, Professional Expertise and Science in Border Security Technology Development.” Criminology & Criminal Justice 20(2): 207–25.

https://doi.org/10.1177/1748895818811896.

Denault, Vincent, Pierrich Plusquellec, Louise M. Jupe, Michel St-Yves, et al. 2020. “The Analysis of Nonverbal Communication: The Dangers of Pseudoscience in Security and Justice Contexts.” Anuario de Psicología Jurídica 30(1): 1–12.

https://doi.org/10.5093/apj2019a9.

Discern Science. N.d. Website. Accessed February 14, 2024.

https://discernscience.com/.

Egbert, Simon, and Bettina Paul. 2018. “Moderne Verfahren der Lügendetektion als sicherheitspolitische Innovationen: Technikgenese zwischen diskursiven Versprechungen und materialen Rückwirkungen” [Modern Methods of Lie Detection as Security Policy Innovations: Technology Genesis between Discursive Promises and Material Repercussions]. In Diskursive Konstruktion und schöpferische Zerstörung: Begegnungen von Innovationsforschung und Diskursanalyse [Discursive Construction and Creative Destruction: Encounters between Innovation Research and Discourse Analysis], edited by Saša Bosančić, Stefan Böschen, and Cornelius Schubert. Supplement, Journal for Discourse Studies S2: 129–159.

⸻. 2019. “Preemptive ‘Screening for Malintent’: The Future Attribute Screening Technology (FAST) as a Double Future Device.” In “Socio-Technical Futures and the Governance of Innovation Processes – Sociological Perspectives,” edited by Knud Böhle and Kornelia Konrad, special issue, Futures 109: 108–116.

https://doi.org/10.1016/j.futures.2018.04.003.

Elkins, Aaron C., Elyse Golob, Jay Nunamaker, Judee Burgoon, et al. 2014. “Appraising the AVATAR for Automated Border Control: Results of a European Union Field Test of the AVATAR System for Interviewing and Passport Control. Conducted at the Henri Coandă International Airport, Bucharest, Romania, December 2013.” A Report to FRONTEX, prepared by the National Center for Border Security and Immigration, and University of Arizona. October 2014, Accessed July 11, 2023.

https://www.europarl.europa.eu/RegData/questions/reponses_qe/2019/002653/P9_RE(2019)002653(ANN3)_XL.pdf.

Elkins, Aaron C., Jeffrey G. Proudfoot, Nathan Twyman, Judy K. Burgoon, et al. 2018. “Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements.” In Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. Volume 2, edited by Yaxin Bi, Supriya Kapoor, and Rahul Bhatia, 294–307. Cham: Springer.

https://doi.org/10.1007/978-3-319-56991-8_22.

Feijoo-Fernández, María Carmen, and Lucía Halty. 2018. “La intención es lo que cuenta: Una revisión sobre la detección del engaño en intenciones” [It’s the Intention that Counts: A Review on Deception Detection Focused on Intentions]. Papeles del Psicólogo/Psychologist Papers 39(1): 51–59.

https://doi.org/10.23923/pap.psicol2018.2849.

Feijoo-Fernández, María Carmen, Lucía Halty, and Andrés Sotoca-Plaza. 2023. “Like a Cat on Hot Bricks: The Detection of Anomalous Behavior in Airports.” Journal of Police and Criminal Psychology 38: 72–82.

https://doi.org/10.1007/s11896-020-09371-5.

Ferguson, Andrew Guthrie. 2017. The Rise of Big Data Policing. Surveillance, Race, and the Future of Law Enforcement. New York: New York University Press.

https://doi.org/10.18574/nyu/9781479854608.001.0001.

Gillespie, Tarleton. 2014. “The Relevance of Algorithms.” In Media Technologies: Essays on Communication, Materiality, and Society, edited by Tarleton Gillespie, Pablo J. Boczkowski, and Kirsten A. Foot, 167–194. Cambridge, MA: MIT.

https://doi.org/10.7551/mitpress/9780262525374.003.0009.

Gil-Fournier, Abelardo, and Jussi Parikka. 2021. “Ground Truth to Fake Geographies: Machine Vision and Learning in Visual Practices.” AI & Society 36(4): 1253–1262.

https://doi.org/10.1007/s00146-020-01062-3.

Glouftsios, Georgios, and Matthias Leese. 2023. “Epistemic Fusion: Passenger Information Units and the Making of International Security.” Review of International Studies 49(1): 125–142.

https://doi.org/10.1017/S0260210522000365.

Granhag, Pär Anders, and Erik Mac Giolla. 2014. “Preventing Future Crimes: Identifying Markers of True and False Intent.” European Psychologist 19(3): 195–206.

https://doi.org/10.1027/1016-9040/a000202.

Gulick, Walter B. 2023. “Machine and Person: Reconstructing Harry Collins’s Categories.” AI & Society 38: 1847–1858.

https://doi.org/10.1007/s00146-020-01046-3.

Heinemann, Torsten, and Martin G. Weiß. 2016. “Biotechnologische Grenzregime” [Biotechnological Border Regimes]. In An der Grenze: Die biotechnologische Überwachung von Migration [At the Border: The Biotechnological Surveillance of Migration], edited by Torsten Heinemann and Martin G. Weiß, 7–21. Frankfurt: Campus.

Honts, Charles R., and Maria Hartwig. 2014. “Credibility Assessment at Portals.” In Credibility Assessment: Scientific Research and Applications, edited by David C. Raskin, Charles R. Honts, and John C. Kircher, 37–61. San Diego: Academic Press.

https://doi.org/10.1016/B978-0-12-394433-7.00002-6.

Jasanoff, Sheila. 2015. “Future Imperfect: Science, Technology, and the Imaginations of Modernity.” In Dreamscapes of Modernity: Sociotechnical Imaginaries and the Fabrication of Power, edited by Sheila Jasanoff and Kim Sang-Hyun, 1–33. Chicago: University of Chicago Press.

https://doi.org/10.7208/chicago/9780226276663.003.0001.

Jaton, Florian. 2017. “We Get the Algorithms of Our Ground Truths: Designing Referential Databases in Digital Image Processing.” Social Studies of Science 47(6): 811–40.

https://doi.org/10.1177/0306312717730428.

⸻. 2021. The Constitution of Algorithms: Ground-Truthing, Programming, Formulating. Cambridge, London: MIT Press.

https://doi.org/10.7551/mitpress/12517.003.0021.

Jobard, Fabien, and Dominique Linhardt. 2008. “The Check and the Guardianship: A Comparison of Surveillance at an Airport and a Housing-Estate Area in the Paris Outskirts.” In Surveillance and Governance: Crime Control and Beyond, edited by Mathieu Deflem, and Jeffrey T. Ulmer, 75-100. Leeds, UK: Emerald.

https://doi.org/10.1016/S1521-6136(07)00204-7.

Jupe, Louise M., Sharon Leal, Aldert Vrij, and Galit Nahari. 2017. “Applying the Verifiability Approach in an International Airport Setting.” Psychology, Crime & Law 23(8): 812–25.

https://doi.org/10.1080/1068316x.2017.1327584.

Jupe, Louise M., and David A. Keatly. 2020. “Airport Artificial Intelligence Can Detect Deception: Or Am I Lying?” Security Journal 33: 622–635.

https://doi.org/10.1057/s41284-019-00204-7.

Khan, Wasiq, Keeley Crockett, James O’Shea, Abir Hussain, et al. 2021. “Deception in the Eyes of Deceiver: A Computer Vision and Machine Learning Based Automated Deception Detection.” Expert Systems with Applications 169: 1–15.

https://doi.org/10.1016/j.eswa.2020.114341.

Kleinberg, Bennett, Arnoud Arntz, and Bruno Verschuere. 2019. “Detecting Deceptive Intentions: Possibilities for Large-Scale Applications.” In The Palgrave Handbook of Deceptive Communication, edited by Tony Docan-Morgan, 403–27. Cham: Springer International Publishing.

https://doi.org/10.1007/978-3-319-96334-1_21.

Knoblauch, Hubert. 2001. “Fokussierte Ethnographie” [Focused Ethnography]. Sozialer Sinn 2(1): 123–42.

https://doi.org/10.1515/sosi-2001-0105.

Knorr, Karin D. 1979. “Tinkering Toward Success: Prelude to a Theory of Scientific Practice.” Theory and Society 8: 347–76.

https://doi.org/10.1007/BF00167894.

Koller, Corinne I., Olive E. Wetter, and Franziska Hofer. 2015. “What Is Suspicious When Trying to Be Inconspicuous? Criminal Intentions Inferred from Nonverbal Behavioral Cues.” Perception 44(6): 679–708.

https://doi.org/10.1177/0301006615594271.

Krasmann, Susanne. 2003. Die Kriminalität der Gesellschaft: Zur Gouvernementalität der Gegenwart [The Criminality of Dociety: On the Governmentality of the Present]. Konstanz: UVK.

Krüger, Jenny K. 2019. “Polizeiliche Verhaltenserkennung: Die Grundlagen” [Police Behavioural Detection: The Basics]. In Zukunft der Polizei: Trends und Strategien [Future of the Police: Trends and Strategies], edited by Hans-Jürgen Lange, Thomas Model, and Michaela Wendekamm, 189–208. Wiesbaden: Springer.

https://doi.org/10.1007/978-3-658-22591-9_13.

Kurt, Ronald. 2008. “Komposition und Improvisation als Grundbegriffe einer allgemeinen Handlungstheorie” [Composition and Improvisation as Basic Ideas of a General Action Theory]. In Menschliches Handeln als Improvisation: Sozial- und musikwissenschaftliche Perspektiven [Human Action as Improvisation: Social and Musicological Perspectives], edited by Ronald Kurt and Klaus Näumann, 17–46. Bielefeld: Transcript Verlag.

https://doi.org/10.1515/9783839407547-001.

Leese, Matthias, and Silvan Pollozek. 2023. “Not So Fast! Data Temporalities in Law Enforcement and Border Control.” Big Data & Society 10(1): 1–13.

http://doi.org/10.1177/20539517231164120.

Lehr, David, and Paul Ohm. 2017. “Playing with the Data: What Legal Scholars Should Learn about Machine Learning.” UC Davis Law Review 51(2): 653–717. Accessed July 4, 2023.

https://lawreview.law.ucdavis.edu/issues/51/2/Symposium/51-2_Lehr_Ohm.pdf.

Linhardt, Dominique. 2000. “Demokratische Maschinen? Die Vorrichtung zur Terrorismusbekämpfung in einem französischen Großflughafen (Paris-Orly)” [Democratic Machines? The Counter-Terrorism Device at a Major French Airport (Paris-Orly)]. Kriminologisches Journal 32(2): 3–4. 82–107.

Littlefield, Melissa M. 2011. The Lying Brain: Lie Detection in Science and Science Fiction. Ann Arbor, MI: University of Michigan Press.

https://doi.org/10.3998/mpub.3091709.

Lyon, David. 2008. “Filtering Flows, Friends and Foes: Global Surveillance.” In Politics at the Airport, edited by Mark B. Salter, 29–50. Minneapolis, MN: University of Minnesota Press.

https://www.jstor.org/stable/10.5749/j.ctttsqsx.6.

Magnuson, Stew. 2008. “Transportation Lab Seeks Radical Change at Airport Checkpoints.” National Defense Magazine, March 1, 2008. Accessed February 26, 2024.

https://www.nationaldefensemagazine.org/articles/2008/2/29/2008march-transportation-lab-seeks-radical-change-at-airport-checkpoints.

Molotch, Harvey. 2014. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. New Jersey: Princeton University Press.

https://doi.org/10.1515/9781400852338.

Musik, Christoph. 2016. “Ground Truth Studies: A Socio-Technical Framework.” Recent Advances in Multimedia Processing, Organization and Visualization beyond Domains and Disciplines, 10. Forschungsforum der österreichischen Fachhochschulen [Tenth Research Forum of the Austrian Universities of Applied Sciences].

https://doi.org/10.13140/RG.2.1.3577.1284.

Musik, Christoph, and Matthias Zeppelzauer. 2018. “Computer Vision and the Digital Humanities: Adapting Image Processing Algorithms and Ground Truth through Active Learning.” VIEW Journal of European Television History and Culture 7(14): 59–72.

https://doi.org/10.25969/mediarep/14754.

Nunamaker Jr., Jay F., Judee K. Burgoon, and Justin Scott Giboney, eds. 2016. “Special Issue: Information Systems for Deception Detection.” Journal of Management Information System 33(2): 327–331.

https://doi.org/10.1080/07421222.2016.1205928.

O’Grady, Nathaniel. 2021. “Automating Security Infrastructures: Practices, Imaginaries, Politics.” Security Dialogue 52(3): 231–48.

https://doi.org/10.1177/0967010620933513.

O’Shea, James, Keeley Crockett, Wasiq Khan, Philippos Kindynis, et al. 2018. “Intelligent Deception Detection through Machine Based Interviewing.” 2018 International Joint Conference on Neural Networks (IJCNN), 1–8.

https://doi.org/10.1109/IJCNN.2018.8489392.

Parks, Lisa. 2007. “Points of Departure: The Culture of US Airport Screening.” Journal of Visual Culture 6(2): 183–200.

https://doi.org/10.1177/1470412907078559.

Pollozek, Silvan, and Jan-Hendrik Passoth. 2024. “Devices of Suspicion: An Analysis of Frontex Screening Materials at the Registration and Identification Center in Moria.” Journal of Ethnic and Migration Studies 50(9): 2327–2345.

https://doi.org/10.1080/1369183X.2024.2307786.

Potthast, Jörg. 2011. “Sense and Security: A Comparative View on Access Control at Airports.” Science, Technology & Innovation Studies 7(1): 87–106. Accessed December 19, 2024.

https://sti-studies.com/wp-content/uploads/2019/11/7.1-sense.pdf.

⸻. 2016. “Luftraumsoziologie: Flughäfen als Herausforderung für eine Theorie sozialer Praktiken” [Airspace Sociology: Airports as a Challenge for a Theory of Social Practices]. Soziologie 45(2): 127–47. Accessed December 19, 2024.

https://publikationen.soziologie.de/index.php/soziologie/article/view/858/1113.

Razghandi, Khashayar, and Emad Yaghmaei. 2020. “Rethinking Filter: An Interdisciplinary Inquiry into Typology and Concept of Filter, Towards an Active Filter Model.” Sustainability 12(18): 7284.

https://doi.org/10.3390/su12187284.

Salter, Mark B., ed. 2008. Politics at the Airport. Minneapolis, MN: University of Minnesota Press.

https://www.jstor.org/stable/10.5749/j.ctttsqsx.5.

Sánchez-Monedero, Javier, and Lina Dencik. 2020. “The Politics of Deceptive Borders: ‘Biomarkers of Deceit’ and the Case of iBorderCtrl.” Information, Communication & Society 25(3): 413–430.

https://doi.org/10.1080/1369118X.2020.1792530.

Schäufele, Fabia. 2017. Profiling zwischen sozialer Praxis und technischer Prägung: Ein Vergleich von Flughafensicherheit und Credit-Scoring [Profiling between Social Practice and Technical Characterisation: A Comparison of Airport Security and Credit Scoring]. Wiesbaden: Springer.

https://doi.org/10.1007/978-3-658-16969-5.

Schouten, Peer. 2014. “Security as Controversy: Reassembling Security at Amsterdam Airport.” Security Dialogue 45(1): 23–42.

http://www.jstor.org/stable/26292273.

Speth, Jeremy, Nathan Vance, Adam Czajka, Kevin W. Bowyer, et al. 2021. “Deception Detection and Remote Physiological Monitoring: A Dataset and Baseline Experimental Results.” 2021 IEEE International Joint Conference on Biometrics (IJCB), Shenzhen, China, 1–8.

https://doi.org/10.1109/IJCB52358.2021.9484409.

Suchman, Lucy. 2007. Human-Machine Reconfigurations: Plans and situated actions (2nd edition). Cambridge: Cambridge University Press.

https://doi.org/10.1017/CBO9780511808418.

⸻. 2023. “Imaginaries of Omniscience: Automating Intelligence in the US Department of Defense.“ Social Studies of Science 53(5): 761–86.

https://doi.org/10.1177/03063127221104938.

Sutrop, Margit, and Katrin Laas‐Mikko. 2012. “From Identity Verification to Behavior Prediction: Ethical Implications of Second Generation Biometrics.” Review of Policy Research 29(1): 21–36.

https://doi.org/10.1111/j.1541-1338.2011.00536.x.

Tavory, Iddo, and Stefan Timmermans. 2014. Abductive Analysis: Theorizing Qualitative Research. Chicago: University of Chicago Press.

https://doi.org/10.7208/chicago/9780226180458.001.0001.

Trauttmansdorff, Paul. 2022. “Borders, Migration, and Technology in the Age of Security: Intervening with STS.” Tecnoscienza: Italian Journal of Science & Technology Studies 13(2): 133–54.

https://doi.org/10.6092/issn.2038-3460/17584.

Verschuere, Bruno, Chu-Chien Lin, Sara Huismann, Bennett Kleinberg, et al. 2023. “The Use-the-Best Heuristic Facilitates Deception Detection.” Nature Human Behaviour 7: 718–728.

https://doi.org/10.1038/s41562-023-01556-2.

Vrij, Aldert. 2008. Detecting Lies and Deceit: Pitfalls and Opportunities. Second Edition. West Sussex: John Wiley & Sons Ltd.

Vrij, Aldert, Maria Hartwig, and Pär Anders Granhag. 2019. “Reading Lies: Nonverbal Communication and Deception.” Annual Review of Psychology 70: 295–317.

https://doi.org/10.1146/annurev-psych-010418-103135.

Vrij, Aldert, Sharon Leal, Samantha Ann Mann, and Pär Anders Granhag. 2011. “A Comparison between Lying about Intentions and Past Activities: Verbal Cues and Detection Accuracy.” Applied Cognitive Psychology 25(2): 212–18.

https://doi.org/10.1002/acp.1665.

Weydner-Volkmann, Sebastian. 2017. “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm.” In Rethinking Surveillance and Control: Beyond the “Security versus Privacy” Debate, edited by Elisa Orrù, Maria Grazia Porcedda, and Sebastian Weydner-Volkmann, 49–83. Baden-Baden: Nomos.

Published
11 Aug 2024
Section
Original Research Articles