Skip to main content

Introduction

  • Chapter
  • First Online:
Engineering Digitised Borders
  • 143 Accesses

Abstract

In this chapter, I introduce the empirical puzzle that lies at the core of this book—that is, the design and operational management of the Visa Information System (VIS), which is a large-scale IT system used for border security, migration management, and law enforcement purposes in the European Union (EU). I unpack the core arguments developed throughout the book, discuss my research journey, and present the outline of the chapters that follow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Akrich, M. (1992). The De-scription of technical objects. In J. Law & W. E. Bijker (Eds.), Shaping Technology/Building Society: Studies in sociotechnical change (pp. 205–224). The MIT Press.

    Google Scholar 

  • Amicelle, A., Aradau, C., & Jeandesboz, J. (2015). Questioning security devices: Performativity, resistance, politics. Security Dialogue, 46(4), 293–306.

    Article  Google Scholar 

  • Amoore, L. (2009). Algorithmic war: Everyday geographies of the war on terror. Antipode, 41(1), 49–69.

    Article  Google Scholar 

  • Amoore, L. (2011). Data Derivatives. Theory, Culture & Society, 28(6), 24–43.

    Article  Google Scholar 

  • Barad, K. (2007). Meeting the universe Halfway. Quantum physics and the entanglement of matter and meaning. Duke University Press.

    Book  Google Scholar 

  • Bellanova, R., & Duez, D. (2012). A different view on the ‘making’ of European security: The EU passenger name record system as a socio-technical assemblage. European Foreign Affairs Review, 17(2), 109–124.

    Google Scholar 

  • Bennett, J. (2010). Vibrant matter. A political ecology of things. Duke University Press.

    Book  Google Scholar 

  • Bigo, D. (2013). The transnational field of computerised exchange of information in police matters and its European guilds. In Transnational power elites: The new professionals of governance, Law and security. Routledge.

    Google Scholar 

  • Bigo, D. (2014). The (in)securitization practices of the three universes of EU border control: Military/navy—Border guards/police—Database analysts. Security Dialogue, 45(3), 209–225.

    Article  Google Scholar 

  • Bonditti, P. (2004). From territorial space to networks: A Foucaldian approach to the implementation of biometry. Alternatives, 29(4), 465–482.

    Article  Google Scholar 

  • Bourne, M., Johnson, H., & Lisle, D. (2015). Laboratizing the border: The production, translation and anticipation of security technologies. Security Dialogue, 46(4), 307–325.

    Article  Google Scholar 

  • Broeders, D. (2007). The new digital Borders of Europe: EU databases and the surveillance of irregular migrants. International Sociology, 22(1), 71–92.

    Article  Google Scholar 

  • Broeders, D., & Dijstelbloem, H. (2016). The datafication of mobility and migration management: The mediating state and its consequences. In I. Van der Ploeg & J. Pridmore (Eds.), Digitizing identities: Doing identity in a networked world (pp. 242–260). Routledge.

    Google Scholar 

  • Broeders, D., & Hampshire, J. (2013). Dreaming of seamless Borders: ICTs and the pre-Emptive governance of mobility in Europe. Journal of Ethnic and Migration Studies, 39(8), 1201–1218.

    Article  Google Scholar 

  • Côté-Boucher, K., Infantino, F., & Salter, M. B. (2014). Border security as practice: An agenda for research. Security Dialogue, 45(3), 195–208.

    Article  Google Scholar 

  • Den Boer, M., & van Buuren, J. (2012). Security clouds: Towards an ethical governance of surveillance in Europe. Journal of Cultural Economy, 5(1), 85–103.

    Article  Google Scholar 

  • Dijstelbloem, H., & Broeders, D. (2015). Border surveillance, mobility management and the shaping of non-publics in Europe. European Journal of Social Theory, 18(1), 21–38.

    Article  Google Scholar 

  • Fisher, D. X. O. (2018). Situating border control: Unpacking Spain’s SIVE border surveillance assemblage. Political Geography, 65, 67–76.

    Article  Google Scholar 

  • Gäckle, N. (2020). Taming future mobilities: Biopolitics and data behaviourism in the European travel information and authorisation system (ETIAS). Mobilities, 15(2), 257–272.

    Article  Google Scholar 

  • Graham, S., & Thrift, N. (2007). Out of order. Theory, Culture & Society, 24(3), 1–25.

    Article  Google Scholar 

  • Grünenberg, K. (2020). In the laboratory. In K. Olwig, K. Grünenberg, P. Møhl, & A. Simonsen (Eds.), The biometric border world. Technologies, bodies and identities on the move. Routledge.

    Google Scholar 

  • Hall, A. (2017). Decisions at the data border: Discretion, discernment and security. Security Dialogue, 48(6), 488–504.

    Article  Google Scholar 

  • Hoijtink, M., & Leese, M. (2019). Technology and Agency in International Relations. Routledge.

    Book  Google Scholar 

  • Jeandesboz, J. (2016). Smartening border security in the European Union: An associational inquiry. Security Dialogue, 47(4), 292–309.

    Article  Google Scholar 

  • Latour, B. (1987). Science in Action. How to Follow Scientists and Engineers through Society. Cambridge, Massachusetts: Harvard Univerity Press.

    Google Scholar 

  • Latour, B. (2005). Reassembling the social. An introduction to actor-network theory. Oxford University Press.

    Google Scholar 

  • Latour, B., & Woolgar, S. (1986). Laboratory life. The construction of scientific facts. Princeton University Press.

    Google Scholar 

  • Law, J. (1987). On the social explanation of technical change: The case of the Portuguese maritime expansion. Technology and Culture, 28(2), 227–252.

    Article  Google Scholar 

  • Law, J. (2008). Actor network theory and material semiotics. In B. S. Turner (Ed.), The new Blackwell companion to social theory (pp. 141–158). Wiley-Blackwell.

    Google Scholar 

  • Leese, M. (2014). The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union. Security Dialogue, 45(5), 494–511.

    Article  Google Scholar 

  • Leese, M. (2016). Exploring the security/facilitation Nexus: Foucault at the “smart” border. Global Society, 30(3), 412–429.

    Article  Google Scholar 

  • Leese, M. (2018). Standardizing security: The business case politics of Borders. Mobilities, 13(2), 261–275.

    Article  Google Scholar 

  • Leese, M. (2020). Fixing state vision: Interoperability, biometrics, and identity management in the EU. Geopolitics. https://doi.org/10.1080/14650045.2020.1830764

  • Mol, A. (2002). The body multiple. Ontology in medical practice. Duke University Press.

    Book  Google Scholar 

  • Mol, A. (2010). Actor-network theory: Sensitive terms and enduring tensions. Kölner Zeitschrift für Soziologie und Sozialpsychologie, 50(1), 253–269.

    Google Scholar 

  • Pötzsch, H. (2015). The emergence of iBorder: Bordering bodies, networks, and machines. Environment and Planning D: Society and Space, 33(1), 101–118.

    Article  Google Scholar 

  • Rumford, C. (2006). Theorizing Borders. European Journal of Social Theory, 9(2), 155–169.

    Article  Google Scholar 

  • Scheel, S. (2013). Autonomy of migration despite its securitisation? Facing the terms and conditions of biometric Rebordering. Millennium: Journal of International Studies, 41(3), 575–600.

    Article  Google Scholar 

  • Scheel, S., Ruppert, E., & Ustek-Spilda, F. (2019). Enacting migration through data practices. Environment and Planning D: Society and Space, 37(4), 579–588.

    Article  Google Scholar 

  • Schouten, P. (2014). Security as controversy: Reassembling security at Amsterdam airport. Security Dialogue, 45(1), 23–42.

    Article  Google Scholar 

  • Sontowski, S. (2018). Speed, timing and duration: Contested temporalities, techno-political controversies and the emergence of the EU’s smart border. Journal of Ethnic and Migration Studies, 44(16), 2730–2746.

    Article  Google Scholar 

  • Star, S. L. (1999). The ethnography of infrastructure. American Behavioral Scientist, 43(3), 377–391.

    Article  Google Scholar 

  • Tazzioli, M., & Walters, W. (2016). The sight of migration: Governmentality, visibility and Europe’s contested borders. Global Society, 30(3), 445–464.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Georgios Glouftsios .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Glouftsios, G. (2021). Introduction. In: Engineering Digitised Borders. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-16-3402-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3402-4_1

  • Published:

  • Publisher Name: Palgrave Macmillan, Singapore

  • Print ISBN: 978-981-16-3401-7

  • Online ISBN: 978-981-16-3402-4

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics