Security in transition(s): The low-level security politics of electric vehicle range anxiety

被引:2
|
作者
Kester, Johannes [1 ,2 ]
机构
[1] Univ Aarhus, Birk Centerpk 15, DK-7400 Herning, Denmark
[2] Univ Oxford, Oxford, England
关键词
Algorithm; electric vehicles; insecurity; observation; range anxiety; security apparatus; CRITICAL INFRASTRUCTURE; SYSTEMS; IMPACT; PREPAREDNESS; MOBILITY; HEALTH; PREFERENCES; EXPERIENCE; KNOWLEDGE; USER;
D O I
10.1177/0967010619871443
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
By drawing on critical security studies in the context of a sociotechnical transition, this article calls for more attention to the presence and sometimes alternative use of mostly unobserved security practices in the materialization of everyday consumer goods and services. This call is illustrated through a discussion of the phenomenon of range anxiety and the intra-action between drivers of electric vehicles (EVs), designers, and algorithms that observe, estimate and nudge the remaining range of an EV. Inspired by Foucault and Barad, the range-anxiety discussion offers four alternative security insights. First, it supports an argument to include stress as an embodied instance of insecurity. Second, it draws attention to a security apparatus that is based on a constantly expanding assemblage around range estimates. Third, it shows how this apparatus rests on a novel algorithm that has a continuous instead of a binary output and is governed by a distributed sovereignty: where the driver simultaneously is the object of measurement, subject of governance for more efficient driving and the ultimate sovereign who decides on the trip. Lastly, the discussion highlights how range estimates not only mediate the materialization of EVs and their automobility but also (re)perform epistemological or ontological forms of uncertainty.
引用
收藏
页码:547 / 563
页数:17
相关论文
共 50 条
  • [1] Using Pit to improve security in low-level programs
    Leif Pedersen
    Hassan Reza
    The Journal of Supercomputing, 2010, 53 : 394 - 410
  • [2] Using Pit to improve security in low-level programs
    Pedersen, Leif
    Reza, Hassan
    JOURNAL OF SUPERCOMPUTING, 2010, 53 (03): : 394 - 410
  • [3] Security Policy Refinement: High-Level Specification to Low-Level Implementation
    Yang, Xia
    Alves-Foss, Jim
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 502 - 511
  • [4] A Security Surveillance System with a Realized Structural Low-Level Network Monitor
    Raty, Tomi
    Tikkala, Esa
    Sankala, Jouko
    Jurmu, Petri
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (02): : 87 - 96
  • [5] Anxiety, fear, and ontological security in world politics
    Kinnvall, Catarina
    Mitzen, Jennifer
    INTERNATIONAL THEORY, 2020, 12 (02) : 238 - 239
  • [6] Smart Electric Vehicle Charging: Security Analysis
    Mustafa, Mustafa A.
    Zhang, Ning
    Kalogridis, Georgios
    Fan, Zhong
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
  • [7] Electric vehicle models for evaluating the security of supply
    Bremermann, Leonardo E.
    Matos, Manuel
    Pecas Lopes, Joao A.
    Rosa, Mauro
    ELECTRIC POWER SYSTEMS RESEARCH, 2014, 111 : 32 - 39
  • [8] A FRAMEWORK FOR TRANSLATING A HIGH LEVEL SECURITY POLICY INTO LOW LEVEL SECURITY MECHANISMS
    Hassan, Ahmed A.
    Bahgat, Waleed M.
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2010, 61 (01): : 20 - 28
  • [9] Analysis of Drivers' Anxiety and Security during the Braking of a Vehicle
    Tanaka, Hiroaki
    Takemori, Daisuke
    Miyachi, Tomohiro
    Iribe, Yurie
    Oguri, Koji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (02) : 466 - 472
  • [10] A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
    Hassan, Ahmad A.
    Bahgat, Waleed M.
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 504 - +