LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Roberts, Stephen L; Elbe, Stefan (2016)
Publisher: SAGE Publications
Languages: English
Types: Article
Subjects:
How do algorithms shape the imaginary and practice of security? Does their proliferation point to a shift in the political rationality of security? If so, what is the nature and extent of that shift? This article explores these questions in relation to global health security. Prompted by an epidemic of new infectious disease outbreaks – from HIV, SARS and pandemic flu, through to MERS and Ebola – many governments are making health security an integral part of their national security strategies. Algorithms are central to these developments because they underpin a number of nextgeneration syndromic surveillance systems now routinely used by governments and international organizations to rapidly detect new outbreaks globally. This article traces the origins, design and evolution of three such internet-based surveillance systems: 1) the Program for Monitoring Emerging Diseases, 2) the Global Public Health Intelligence Network, and 3) HealthMap. The article shows how the successive introduction of those three syndromic surveillance systems has propelled algorithmic technologies into the heart of global outbreak detection. This growing recourse to algorithms for the purposes of strengthening global health security, the article argues, signals a significant shift in the underlying problem, nature, and role of knowledge in contemporary security practices.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Chan E, Brewer T, Pollack M, Sonricker A, Keller M, Freifeld C, Blench M, Mawudeku A, and Brownstein J (2010) Global capacity for emerging infectious disease detection. Proceedings of the National Academy of Sciences 107(50):21701-21706.
    • Collier S and Lakoff A (2015) Vital Systems Security: Reflexive Biopolitics and the Government of Emergency. Theory, Culture & Society 32(2):19-51.
    • Cowan P, Garland T, Hugh-Jones ME, Shimshony A, Handysides S, Kaye D, Madoff LC, Pollack MP, and Woodall J (2006) Evaluation of ProMed-mail as an electronic early warning system for emerging animal diseases: 1996-2004. Journal of American Veterinary Association 229(7):1090-1099.
    • Daugman J (2004) How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology 14(1): 21-30.
    • Dutt A, Akhtar R and McVeigh M (2006) Surat plague of 1994 Re-examined. Southeast Asian Journal of Tropical Medicine and Public Health 37(4):755-760.
    • Elbe S (2006) Should HIV/AIDS be securitized? The ethical dilemmas of linking HIV/AIDS and security.
    • International Studies Quarterly 50(1): 119-144.
    • Elbe S (2007) Our epidemiological footprint: The circulation of avian flu, SARS, and HIV/AIDS in the world economy. Review of International Political Economy 15(1):116-130.
    • Elbe S (2009) Virus Alert: Security, Governmentality, and the AIDS Pandemic. New York: Columbia University Press.
    • Elbe S (2010) Haggling over viruses: the downside risks of securitizing infectious disease. Health Policy and Planning 25(6): 476-485.
    • Elbe S (2014) The Pharmaceuticalization of Security: Molecular Biomedicine, Antiviral Stockpiles and Global Health Security. Review of International Studies 40(5):919-938.
    • Elbe S, Roemer-Mahler A and Long C (2014) Securing circulation pharmaceutically: Antiviral stockpiling and pandemic preparedness in the European Union. Security Dialogue 45(5):440-457.
    • Fearnley L (2008) Signals come and go: Syndromic surveillance and styles of Biosecurity. Environment and Planning 40(7):1615-1632.
    • Fidler D P (2004) SARS, governance and the globalization of disease. Basingstoke: Palgrave Macmillan.
    • Foucault M (2007) Security, Territory, Population, Lectures at the Collège De France. Edited by Michel Senellart. New York: Picador.
    • Freifeld C, Mandl K, Reis B, and Brownstein J (2008) HealthMap: Global Infectious Disease Monitoring through Automated Classification and Visualization of Internet Media Reports. Journal of the American Medical Informatics Association 15(2):150-157.
    • Gillespie T (2013) The Relevance of Algorithms. In Gillespie T, Boczkowski P, and Foot K (eds.) Media Technologies: Essays on Communication, Materiality, a nd Society. Cambridge, MA: MIT Press: 167- 194.
    • Ginsberg J, Mohebbi M, Patel R, Brammer L, Smolinski M, and Brilliant L (2009) Detecting influenza epidemics using search engine query data. Nature 457(7232):1012-1014.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article