<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v26i1e45723</article-id>
      <article-id pub-id-type="pmid">38227361</article-id>
      <article-id pub-id-type="doi">10.2196/45723</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Social and Ethical Implications of Digital Crisis Technologies: Case Study of Pandemic Simulation Models During the COVID-19 Pandemic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Krämer</surname>
            <given-names>Dennis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Gardner</surname>
            <given-names>Allison</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Mircheva</surname>
            <given-names>Iskra</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Bartl</surname>
            <given-names>Gabriel</given-names>
          </name>
          <degrees>BA, MA, DPhil</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Centre Marc Bloch</institution>
            <addr-line>Friedrichstr 191</addr-line>
            <addr-line>Berlin, 10117</addr-line>
            <country>Germany</country>
            <phone>49 30 209370700</phone>
            <email>gabriel.bartl@cmb.hu-berlin.de</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4941-9262</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Centre Marc Bloch</institution>
        <addr-line>Berlin</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Gabriel Bartl <email>gabriel.bartl@cmb.hu-berlin.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>1</month>
        <year>2024</year>
      </pub-date>
      <volume>26</volume>
      <elocation-id>e45723</elocation-id>
      <history>
        <date date-type="received">
          <day>14</day>
          <month>1</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>27</day>
          <month>2</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>30</day>
          <month>6</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>24</day>
          <month>12</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Gabriel Bartl. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 16.01.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2024/1/e45723" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Responses to public health crises are increasingly technological in nature, as the prominence of COVID-19–related statistics and simulations amply demonstrates. However, the use of technologies is preconditional and has various implications. These implications can not only affect acceptance but also challenge the acceptability of these technologies with regard to the ethical and normative dimension.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study focuses on pandemic simulation models as algorithmic governance tools that played a central role in political decision-making during the COVID-19 pandemic. To assess the social implications of pandemic simulation models, the premises of data collection, sorting, and evaluation must be disclosed and reflected upon. Consequently, the social construction principles of digital health technologies must be revealed and examined for their effects with regard to social, ethical, and ultimately political issues.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>This case study starts with a systematization of different simulation approaches to create a typology of pandemic simulation models. On the basis of this, various properties, functions, and challenges of these simulation models are revealed and discussed in detail from a socioscientific point of view.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The typology of pandemic simulation methods reveals the diversity of model-driven handling of pandemic threats. However, it is reasonable to assume that the use of simulation models could increasingly shift toward agent-based or artificial intelligence models in the future, thus promoting the logic of algorithmic decision-making in response to public health crises. As algorithmic decision-making focuses more on predicting future dynamics than statistical practices of assessing pandemic events, this study discusses this development in detail, resulting in an operationalized overview of the key social and ethical issues related to pandemic crisis technologies.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study identifies 3 major recommendations for the future of pandemic crisis technologies.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>public health technologies</kwd>
        <kwd>simulation models</kwd>
        <kwd>algorithmic governance</kwd>
        <kwd>preparedness</kwd>
        <kwd>crisis, uncertainty, and ignorance</kwd>
        <kwd>social implications of mathematical modeling</kwd>
        <kwd>normativity</kwd>
        <kwd>transparency</kwd>
        <kwd>legitimacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Knowledge Production and the Political Significance of Data in Times of Uncertainty</title>
        <p>The COVID-19 pandemic highlighted 2 opposing trends that have been lost in the public debate. On the one hand, the pandemic showed that “digital prediction tools increasingly complement or replace other practices of coping with an uncertain future” [<xref ref-type="bibr" rid="ref1">1</xref>]. In contrast, the pandemic blatantly illustrated the complicated relationship between scientific knowledge and ignorance in the context of political decisions and social dynamics in dealing with crises. In accordance with the Bauman [<xref ref-type="bibr" rid="ref2">2</xref>] diagnosis of the “end of unambiguousness,” Habermas [<xref ref-type="bibr" rid="ref3">3</xref>] stated that “There has never been so much knowledge about our not-knowing and about the compulsion to act and live under uncertainty.”</p>
        <p>These 2 opposing trends point to the observation that knowledge is ambivalent, increasingly fragile, and ambiguous but simultaneously acts as a central resource [<xref ref-type="bibr" rid="ref4">4</xref>]. This has not least to do with the fact that there is no such thing as a single, definitive science that produces objective findings. In the context of digital health technologies, this seems to be a paradox as the increasing use and implementation contrasts with the possibility of clear evidence production. The growing demand for scientific expertise in times of crisis and the simultaneous lack of clarity in scientific knowledge represent a paradox that cannot be resolved and seems to be becoming increasingly severe [<xref ref-type="bibr" rid="ref5">5</xref>].</p>
      </sec>
      <sec>
        <title>The Ideology of “Technological Fix” in Public Health Crisis Management</title>
        <p>Especially during the COVID-19 pandemic, it has been shown that promises of unambiguity and evidence must be illusory and that both ascriptions must be contrasted with the hypothesis of a “situatedness of knowledge” [<xref ref-type="bibr" rid="ref6">6</xref>]. Thus, knowledge must be reflected in its contexts of production. This means that a simple translation of the relationship between knowledge and ignorance into the political sphere, for example, within preventive health programs, must be the subject of debate while including diverse stakeholders such as health experts, policy makers, and “lay persons” [<xref ref-type="bibr" rid="ref7">7</xref>]. Finally, this also indicates that we must speak of science in the plural and that policy cannot claim to follow a single, definitive science when there are conflicting findings that compete with each other.</p>
      </sec>
      <sec>
        <title>Objective</title>
        <p>This situation has multifaceted consequences and implications for knowledge-based crisis technologies in public health. Although temporal pressure and threat under conditions of uncertainty and insecurity are elementary characteristics of crises [<xref ref-type="bibr" rid="ref8">8</xref>], multiple crises, such as global pandemics, are characterized by the fact that these factors interact even more intensively not least because the level of interactions, which are difficult to anticipate, increases the degree of complexity, uncertainty, and ignorance. Those experiences with limited control capabilities have paved the way for a security strategy of preparedness that has prevailed especially in the field of global public health where gaining importance of the “precautionary principle” can be observed. In the same breath, different modes of resilience gained attraction, especially with regard to the emergence of preparedness practices and strategies that are often technological in nature [<xref ref-type="bibr" rid="ref9">9</xref>]. The rise of a solutionist ideology of “technological fix” [<xref ref-type="bibr" rid="ref10">10</xref>] in public health crisis management is expressed especially in the use of computer models that simulate the spread of the coronavirus. As certain simulation techniques are likely to play an even more significant role in the pandemic technologies of the future, the following sections will take a deeper look into the premises, logics, and differences of simulation models before shedding light on the social, ethical, and political implications of digital crisis technologies in the context of public health.</p>
        <p>Undoubtedly, computer simulations grounded on epidemiological models have played a crucial role in handling the pandemic. This happened, for example, because these models provided orientation knowledge in a crisis situation with considerable temporal pressure. Therefore, it could be argued that one of the central attributions to the use of monitoring technologies during crises such as pandemics is the expected time gains that are essential to preserve the decision makers’ ability to act.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>Methodologically, this case study is based on a systematization of different simulation approaches to create a typology of pandemic simulation models. On the basis of this, various properties, functions, and challenges of these simulation models are revealed, such as their perception as visual representations or certain problems in converting complexity into numerical parameters. Subsequently, to what extent pandemic simulation models can be considered as algorithmic governance tools is explored. Thus, the methodological approach is closely interwoven with a discussion of the ethical, social, and political implications of using simulations.</p>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>No ethics approval was requested, as the methodological approach is based on a description and comparison of pandemic simulation models. Therefore, no personal data were collected, and only relevant literature was referenced to clarify the functioning of the corresponding simulation models.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Concerning their functional logics, simulation models are to be distinguished from other forms of crisis governance, such as, for example, early warning systems that aim to forecast the future by making use of prognostic methods. In contrast, the vast majority of simulation models are scenario-based approaches that are not grounded on probabilistic calculations but contain different ways of dealing with uncertainty and crises by comparing different courses of action and by considering both the effects of the assumed political countermeasures and the respective societal coping modes. Simulations thus provide policy makers with information by contrasting measures with their possible effects within algorithmic procedures.</p>
      <p>The interventions of the policy makers are thus tested according to a <italic>what if</italic> logic so that they can be compared in terms of their effects.</p>
      <p>In this respect, epidemiological computer simulations on the one side can be seen as “technologies of preparedness” [<xref ref-type="bibr" rid="ref11">11</xref>] that stand in contrast to purely prognostic approaches aiming at mitigating future threats by number-based calculations. On the other side, specific future-oriented containment strategies can also be simulated during a public health crisis that has already occurred and is still ongoing, for example, to identify bottlenecks in the infrastructure. What both have in common is a doubling of reality [<xref ref-type="bibr" rid="ref12">12</xref>]. They are designed to ensure consistency, speed, efficiency, and removal of human bias and error. Hälterlein [<xref ref-type="bibr" rid="ref12">12</xref>] pointed out that within computer models, different countermeasures together with their uncertain outcomes are simulated based on algorithmic processes. This led him to argue that the use of epidemiological computer simulations is to be understood as a process of algorithmic decision-making [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
      <p>There are a number of different simulation models that are briefly presented and distinguished from each other in the following sections. However, <xref ref-type="table" rid="table1">Table 1</xref> represents an ideal typical listing of pandemic model simulations, which means that clear distinctions often cannot be made and single modeling techniques may also partially overlap. It is also noticeable that, although models are always accompanied by a certain reduction in complexity, this parameter can vary dramatically with respect to specific simulation techniques. In addition, the claims of the models vary, as some of them have prognostic ambitions to some degree. Finally, it should be mentioned that the relevance of the single models to policy making varied from country to country during the pandemic [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
      <table-wrap position="float" id="table1">
        <label>Table 1</label>
        <caption>
          <p>Typology of COVID-19 pandemic simulation models.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="180"/>
          <col width="410"/>
          <col width="410"/>
          <thead>
            <tr valign="top">
              <td>Modeling techniques</td>
              <td>Specifications</td>
              <td>Features</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>Compartmental models</td>
              <td>Division of the population into different groups, for example, SEIR<sup>a</sup></td>
              <td>Infection dynamics are modeled with respect to the transitions between those groups</td>
            </tr>
            <tr valign="top">
              <td>Statistical models</td>
              <td>Development and testing of theories through causal explanation, prediction, and description (eg, growth models or time series)</td>
              <td>Explanatory power of models corresponds with predictive power</td>
            </tr>
            <tr valign="top">
              <td>Bayesian methods</td>
              <td>Specific statistical approach: available knowledge about statistical parameters is merged with data from observed information</td>
              <td>Bayesian methods can be used even with a small data base</td>
            </tr>
            <tr valign="top">
              <td>Network models</td>
              <td>Analysis of the distributions in the network links to be able to distinguish certain network types from each other</td>
              <td>Search for patterns in the contact structures</td>
            </tr>
            <tr valign="top">
              <td>Agent-based models</td>
              <td>The population to be modeled is divided into subgroups and is grounded on agents with different individual behaviors</td>
              <td>Social context is central in contrast to other modeling techniques</td>
            </tr>
            <tr valign="top">
              <td>AI<sup>b</sup> models</td>
              <td>(Deep) learning algorithms, neural networks, or adaptive agents adjusting their behaviors to changing environmental conditions</td>
              <td>Aiming more on prediction (eg, incidence rates) and forecasting than on description</td>
            </tr>
            <tr valign="top">
              <td>Hybrid models</td>
              <td>Combination of different modeling techniques</td>
              <td>Depending on the modeling techniques that are combined (eg, SEIR with machine learning to predict the evolution of the pandemic [<xref ref-type="bibr" rid="ref13">13</xref>])</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table1fn1">
            <p><sup>a</sup>SEIR: susceptible, exposed, infectious, recovered.</p>
          </fn>
          <fn id="table1fn2">
            <p><sup>b</sup>AI: artificial intelligence.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <p>The most common and also the most popular simulation models during the pandemic were the so-called compartmental models. Here, the susceptible, infectious, recovered (SIR) [<xref ref-type="bibr" rid="ref14">14</xref>] models can be distinguished from the susceptible, exposed, infectious, recovered (SEIR) models, although many more variants exist. For example, the influential Ferguson model [<xref ref-type="bibr" rid="ref15">15</xref>], which was instrumental in determining COVID-19 pandemic policy in the United Kingdom, is a SEIR model that divided society into 4 groups: S (“susceptible”), E (“exposed”; here, “E” refers to those who have been exposed, but who are not yet infectious [<xref ref-type="bibr" rid="ref16">16</xref>]), I (“infectious”), and R (“recovered”). On the basis of these 4 dimensions, the dynamics of the pandemic can be described by modeling the transitions between groups. However, the social context is not modeled to generate a model that is not too complex and that can quickly generate rough approximations. However, there are also improved SEIR models that comodel, for example, quarantine status and intervention measures [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
      <p>In addition to compartmental models, according to Gnanvi et al [<xref ref-type="bibr" rid="ref18">18</xref>], statistical models have been used quite frequently during the COVID-19 pandemic. These are mostly growth models and time series models. Although statistical models often model one state (ie, one compartment at a certain point in time), statistical models, such as regression models, describe the statistical relationships between different independent variables and can provide information about the individual health status. Bayesian methods [<xref ref-type="bibr" rid="ref19">19</xref>] and network models [<xref ref-type="bibr" rid="ref20">20</xref>] and agent-based models [<xref ref-type="bibr" rid="ref21">21</xref>] were also very elaborate but were used less frequently during the COVID-19 pandemic. No role during the pandemic played models based on artificial intelligence (AI) [<xref ref-type="bibr" rid="ref22">22</xref>]. Finally, hybrid models that combine ≥2 of the presented approaches also exist. Looking at the application contexts of the individual models, it is striking that statistical and Bayesian models have been used to estimate epidemiological parameters, whereas compartmental models have normally been used to assess disease dynamics. Furthermore, simulation models that emerged during the COVID-19 pandemic found that the vast majority of models were SEIR models and statistical approaches [<xref ref-type="bibr" rid="ref18">18</xref>]. This might change in the future as machine learning and AI models will become more prominent when computing capacities improve and new methodological approaches emerge. In addition, Eyert [<xref ref-type="bibr" rid="ref23">23</xref>] hypothesized that agent-based modeling will become increasingly important in the context of scientific policy advice.</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Simulation Models as Visual Representations</title>
        <p>What all these models have in common is that visual representations are often constructed from them. Visual representations of data not only give orientation in times of uncertainty but also frame the ways how we experience the pandemic. From the perspective of Latour [<xref ref-type="bibr" rid="ref24">24</xref>], diagrams and statistics function as mediators that serve to make crises visible and tangible. In this sense, it can be argued that a crisis is created by its mappability as, for example, the “flatten the curve” line chart showed by illustrating how to slow down the pandemic to prevent an overstraining of health care services.</p>
        <p>Although on the one hand, this imageability can be seen as an elementary tool of risk and crisis communication, there are also voices that consider visualizations as hidden normative claims, as through them certain world views and power relations can be produced and reproduced: “Visualizations are not neutral windows onto data; rather, they are the result of ‘judgement, discernment and choice’” [<xref ref-type="bibr" rid="ref25">25</xref>]. In this respect, simulation models can only be interpreted as evidence-based tools for dealing with pandemics to a limited extent. In addition, this has to do with the fact that evidence in the case of simulation models cannot be measured empirically but rather follows plausibility-driven principles.</p>
      </sec>
      <sec>
        <title>Evidence-Based Models and Simulations in the Light of Ignorance and Normativity</title>
        <p>As indicated earlier, evidence is often referred to in the context of certain practices of constructing and modeling uncertainty. It is true that quantitative modeling and the resulting number-based outcomes provide important bases for describing existential threats and generating political pressure for action. In contrast, precisely because of their numerical orientation, number-based recommendations run the risk of failing to account for possible bias effects [<xref ref-type="bibr" rid="ref26">26</xref>]. These problems are related to the specific nature of modeling, which is often based on linear assumptions in the process of reducing complexity.</p>
        <p>However, the principles by which complexity is reduced often remain opaque, although the results can be significantly affected by the model assumptions. Thus, when social and political complexity is translated into specific metrics and parameters, certain information inevitably falls by the wayside. Through the distinction between relevant and irrelevant data in relation to data collection and analysis, the notion of power comes into play in the context of data-driven technologies [<xref ref-type="bibr" rid="ref27">27</xref>]. Consequently, the effectiveness and the legitimacy of nonlinear social and political dynamics are underestimated or even ignored. Such basic assumptions, based on modeling and simulation methodology, are also evident with respect to the pandemic, where policy responses were at times guided by calculations of relatively simple models that did not differentiate between specific social characteristics—a point of critique that might pave the way for a greater demand in agent-based modeling in the future.</p>
        <p>In the end, what makes modeling a political phenomenon is less its calculative structure than the normative and analytical premises and biases, practices, and future visions in the social construction of this technology [<xref ref-type="bibr" rid="ref28">28</xref>]. However, in some cases, neither the developers nor the users of technology seem to be aware that the social context contradicts the idea of a purely universal and instrumental character of technology [<xref ref-type="bibr" rid="ref29">29</xref>]. In line with this perspective, social constructivist views, in contrast to theoretical perspectives that can be attributed to technological determinism, emphasize that science and technology are neither neutral nor objective, but the result of social processes that influence and structure the production of scientific knowledge as well as the innovation of technology [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]. In this view, technology can be seen as “normative social hardening” [<xref ref-type="bibr" rid="ref34">34</xref>] because norms and values as an expression of certain cultural patterns become an inherent part of the construction of technology. If the construction process is to be seen as a materialized expression of ways of looking at the world, it is important to understand to what extent the normative orientations, attitudes, and premises that flow into the design of technology can be derived from culture- and context-specific circumstances, for example, how not only values and cultural meanings but also specific interests find expression in data-driven digital health technologies.</p>
      </sec>
      <sec>
        <title>Implications of Digital Health Simulations as Algorithmic Forms of Governance</title>
        <p>To grasp the logic and implications of present and future pandemic technologies, it is helpful to explicate the approach of “algorithmic governance” [<xref ref-type="bibr" rid="ref35">35</xref>] and to make it fruitful for the context of public health. The concept of “algorithmic governance” is examined primarily in its sociopolitical dimension to derive possible social and ethical implications. This is in line with the views of Hälterlein [<xref ref-type="bibr" rid="ref12">12</xref>] that epidemiological computer simulations are to be understood as processes of algorithmic decision-making. In accordance with the 2 poles of technological determinism and social constructivism as presented earlier, different definitions of “algorithm” can be found. On the one hand, algorithms are assumed to be strictly rational affairs that combine the certainties of mathematics with the objectivity of technology [<xref ref-type="bibr" rid="ref36">36</xref>]. In this perspective, the algorithm is understood as a “set of defined steps that, if followed in the correct order, will computationally process input (instructions and/or data) to produce a desired outcome” [<xref ref-type="bibr" rid="ref37">37</xref>]. This definition follows an objectivist perspective that emphasizes the instrumental character of the algorithms. In this context, the formal correctness of the code is the only prerequisite to achieve desired effects. The existence of unintended side effects has been completely ignored.</p>
        <p>In contrast, algorithms are conceptualized as “part of broader rationalities and ways of seeing the world” [<xref ref-type="bibr" rid="ref38">38</xref>]. Roberge and Seyfert [<xref ref-type="bibr" rid="ref39">39</xref>] shared this social constructivist-informed view. For them, algorithms are practical unfoldings and consequently are not simply reducible to code. Rather, they are to be understood as performative practices that involve a variety of rituals, narratives, and other symbolic forms of action [<xref ref-type="bibr" rid="ref40">40</xref>]. Accordingly, algorithms are not to be understood as neutral, objective, or rational but as value laden and biased [<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>From another perspective, it follows that analytical approaches dealing with the design of algorithms must integrate all forms of social and material practices embedded in cultural, historical, and institutional contexts [<xref ref-type="bibr" rid="ref42">42</xref>]. Hence, the assumptions behind algorithmic logic of sorting, filtering, searching, prioritizing, recommending, and deciding can be sufficiently illuminated [<xref ref-type="bibr" rid="ref38">38</xref>]. These insights ultimately open the debate for a critical evaluation of algorithms, more specifically, the social meaning and contextual meanings of a code as “being contingent, ontogenetic, performative in nature” [<xref ref-type="bibr" rid="ref43">43</xref>]. Only this kind of awareness of the contingency, heterogeneity, and diversity of practices “facilitates, rather than limits, critique, making our accounts more adequate to the practices they describe, and centering those practices as a site of dispute and potential regulation” [<xref ref-type="bibr" rid="ref44">44</xref>]. According to Seaver [<xref ref-type="bibr" rid="ref44">44</xref>], the critical analysis and regulation of algorithm-based governance presupposes that values, norms, and their sociocultural contexts can be considered and reflected on.</p>
      </sec>
      <sec>
        <title>The “End of Theory”</title>
        <p>Following the view that agent-based modeling, as a subfield of computational social science, is becoming increasingly important regarding scientific policy advice, as exemplified in an impressive manner during the COVID-19 pandemic, the transition from probabilistic forms of uncertainty management to new forms of algorithmic prediction—which is particularly reflected in the rise of simulation models—is to be debated, especially because in the age of big data science, it is no longer based on testable hypotheses. This development radically points to an “end of theory” that manifests itself in a paradigmatic transformation of scientific work from causality to correlation, as algorithms find patterns that might remain hidden when classical scientific methods are applied: “Correlation supersedes causation, and science can advance even without coherent models, unified theories, or really any mechanistic explanation at all” [<xref ref-type="bibr" rid="ref45">45</xref>]. In this respect, algorithms have lost their innocence in the age of big data.</p>
        <p>This paradigm shift is also characteristic of the transition from the mode of probability to the mode of possibility with regard to future developments and potential threats. Thus, the logic of anticipation is complemented by another dimension that encompasses a variety of possible projected futures [<xref ref-type="bibr" rid="ref46">46</xref>] as can be observed within the scenario-based approaches of pandemic simulation models. Here, objectivity is attributed to algorithms, although their effects often remain opaque [<xref ref-type="bibr" rid="ref47">47</xref>]. The problem is that the establishment of this specific form of algorithmic governance that is based on obscure mathematical correlations promotes new dimensions of intransparency in several respects.</p>
        <p>First, even with open-source codes, an understanding of how an algorithm works is reserved for special experts, especially in the case of correlative-associative procedures and AI applications, which will probably have greater significance in future pandemic management. Second, the black box of algorithmic governance is not a box that you only need to open to see the contents undisguised. Rather, it contains other black boxes [<xref ref-type="bibr" rid="ref48">48</xref>] that have to do with the fact that code is not to be seen as a singular construction but rather as a network of assemblages that create the output. Third, this feature of nontransparency is further exacerbated when different algorithmic technologies are combined, becoming even larger “assemblages.” Following the perspective that those “assemblages are harder to be democratically controlled than more centralized forms of power” [<xref ref-type="bibr" rid="ref34">34</xref>], a profound legitimacy problem arises.</p>
      </sec>
      <sec>
        <title>Algorithmic Governance as an Invisible Knowledge Regime</title>
        <p>In particular, when the data-related selection and reduction process operates in terms of an opaque network structure, this marks a considerable loss of control and legitimacy, as it cannot be traced on which premises and normative assumptions decisions are made. Therefore, if algorithmic governance is understood as an invisible knowledge regime that produces interpretations of normality and deviation on the basis of digital data, which seep deeper into social processes and interactions and take on a life of their own, this speaks for the establishment of a subtle form of power whose legitimacy must remain largely unquestioned, because “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it” [<xref ref-type="bibr" rid="ref49">49</xref>]. In this perspective, algorithms appear not only as neutral sorting machines but also as performative instruments of domination that legitimize power.</p>
        <p>Crucially, the performativity of algorithms [<xref ref-type="bibr" rid="ref39">39</xref>] marks a change in that algorithms have left their original domain of mathematical problem-solving and instead increasingly shape and transform social life worlds. Against this background, it seems even more important to deal with ethical criteria, both in the context of development and the use of digital technologies, especially for public health. However, to comprehensively reflect on the ethical implications, it is necessary to understand the formulation of algorithmic procedures not as isolated expert knowledge but to analyze them in their social dimensions and references.</p>
      </sec>
      <sec>
        <title>Ethical Reflection Beyond Transparency and Acceptance</title>
        <p>According to Amoore [<xref ref-type="bibr" rid="ref50">50</xref>], algorithms and their social relations cannot be described simply by analyzing their code nor can ethics be coded into algorithms. Instead, Amoore [<xref ref-type="bibr" rid="ref50">50</xref>] proposed to address the ethical responsibility of algorithms by identifying the sociotechnical conditions under which they emerge and function. To be able to grasp the ethicopolitical dimension of algorithms, it seems essential to confront the supposed unambiguity as an operational mode of algorithmic intrinsic logic with the multiplicity of social contexts. For Amoore [<xref ref-type="bibr" rid="ref50">50</xref>], the error-proneness of algorithmic predictions results not from formal technical-mathematical inadequacies but from the fundamental contingency and uncertainty of human existence: “The madness of algorithms does not lie in the moral failure of the designer or the statistician but is an expression of the forms of unreason folded into a calculative rationality that reduces the multiplicity of potentials to a single output.” Consequently, it cannot be a matter of making algorithmic procedures transparent to gain legitimacy.</p>
        <p>However, the invisibility and unaccountability of algorithmic power imply that the focus on the acceptance of algorithmic governance technologies does not seem to be sufficient to address questions of legitimacy as this is undermined both by normalization effects and by performativity. Instead, it is necessary to explicitly consider questions of acceptability. Although social acceptance refers to the fact that new technology is accepted or merely tolerated by a community, ethical acceptability refers to a conceptual reflection of the technology that takes into account the moral issues that emerge from the introduction of new technologies. In this way, for example, the contradiction that risky technology is accepted for morally wrong reasons can be critically reflected upon, which would be lost if the focus were solely on acceptance within purely empirically oriented research approaches [<xref ref-type="bibr" rid="ref51">51</xref>]. Consequently, an ethical perspective must take special account of the nonquantifiable aspects of human life not least because this is also where the key to trust in technological applications lies [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
      </sec>
      <sec>
        <title>Political Implications of Algorithmic Public Health Simulations</title>
        <p>In the following section, I relate the critical perspective on algorithmic governance presented to the application context of public health simulations to shed light on the implications of mathematical modeling. This highlights the simulation of pandemic crises and thus the question of how public health management is changing by the treatment of emerging infectious diseases through simulation.</p>
        <p>As illustrated above, although numbers “per se do not claim neutrality, truth, or scientific authority, they contribute to create realities, communities, policies and public concern” [<xref ref-type="bibr" rid="ref53">53</xref>]. This implies, for example, that policy makers can select specific evidence to either support or prevent a lockdown [<xref ref-type="bibr" rid="ref54">54</xref>]. From this point of view, public health simulations have the potential to contribute to the stabilization of power positions of political decision makers. In this respect, “images of epidemics and zoonoses are not mere representations of infectious diseases and their social impact, but rather actants in a broader political economic arena of power and knowledge” [<xref ref-type="bibr" rid="ref55">55</xref>]. Consequently, the use of simulation models enables responsible emergency actors to perform within the regime of public health by referring to their capacities to govern rationally [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
        <p>Among other things, the issue of power hierarchies raises questions about the role and functions of policy advice in times of health crises and directs attention to the discursive significance of certain forms of knowledge in relation to policy decisions. It is thus necessary to clarify whether the evidence—however, this is to be determined—is sufficient as a guide for political decisions or whether there is a danger of an “epistemization of the political” [<xref ref-type="bibr" rid="ref57">57</xref>] if politics simply follows scientific claims to validity. Ultimately, this also raises the question of the principles on which political decisions should be based on value-based trade-offs or on the “best” scientific knowledge. As politics as an extended arm of scientific findings would practically render itself superfluous and because a hierarchization of scientific findings cannot easily be made anyway, there is much to be said for the idea that politics should not be knowledge based but value based. However, despite this insight, there were repeated voices during the pandemic arguing for a stronger scientific foundation for political decisions.</p>
        <p>Against this background, it is important to ask what kind of scientific knowledge appears relevant. The political reactions at the beginning of the pandemic, for example, were largely characterized by a mobilization of medical and epidemiological knowledge that formed the basis for the creation of simulation models.</p>
        <p>However, if one interprets the COVID-19 pandemic not only as a challenge in the sense of public health but also as a social crisis, many arguments can be found for considering social science knowledge in the context of more interdisciplinary expert panels and general crisis response modes. In this regard, crisis responses could benefit from an expansion of the epistemic corridors beyond natural science knowledge production [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
        <p>When “evidence” is not necessarily unambiguous and it seems possible that forecasts deviate greatly from “reality,” performative dynamics [<xref ref-type="bibr" rid="ref59">59</xref>] can become a problem. To capture the sociotechnical dynamics of algorithmically structured public health technologies, we need an ethical perspective that goes beyond the analysis of individual acceptability and explicitly problematizes questions of social acceptability. In doing so, ethical reflection must not only refer to criteria, such as transparency or legitimacy but must, according to Amoore [<xref ref-type="bibr" rid="ref50">50</xref>], rather keep an eye on the interrelations between society and technology to be able to unfold a holistic critical perspective.</p>
        <p>A central question then would be which political options are and were represented in pandemic simulation models. What has not been modeled is at least as interesting. Eyert [<xref ref-type="bibr" rid="ref60">60</xref>], for example, was able to show with regard to Germany that elementary influencing variables, such as leaving schools and daycare centers open instead of closing them down, were not integrated into any of the models. Hence, if certain political courses of action are not represented in the simulations, it highlights the power that arises from a possible selectivity of the modeled parameters. Particularly regarding the problem of accountability in algorithmic governance technologies, this question becomes more urgent when political decisions no longer appear to be attributable, and a substantial democratic deficit is derived from this with a high degree of diffusion of political responsibility.</p>
        <p>Ethical reflection on pandemic simulations must therefore not only address the problem that evidence hardly existed at the beginning of the COVID-19 pandemic and the role of ignorance in scientific advice was too short. Rather, it must be actively reflected and debated whether what McGeoy [<xref ref-type="bibr" rid="ref61">61</xref>] describes as “strategic ignorance” can be observed in relation to political decisions and the corresponding epistemic attempts at legitimation. In this respect, the discrimination potentials of pandemic simulations must be considered seriously if, for example, social inequalities in handling health crises are ignored. This manifests in sociostructural indicators: underprivileged status groups such as poor or health-impaired people, single parents, and cramped living conditions.</p>
        <p>To adequately analyze the “counterproductive effects of technologies” [<xref ref-type="bibr" rid="ref62">62</xref>] in the context of public health crises from a critical ethical perspective, a comprehensive consideration of the social construction principles and implicit premises as well as the unintended or unexpected side effects, for example with regard to the performative and temporal dynamics of implementation in the use context, of mathematical modeling is necessary. This touches not only on issues of transparency and possible discrimination but also on the problem that social complexity cannot simply be translated into binary algorithmic codes without risking significant information loss. Only a holistic ethical reflection, which is situated on several levels and illuminates the criteria of social acceptability besides individual acceptability, can take into account the complexity of implications in the use of pandemic simulation models.</p>
      </sec>
      <sec>
        <title>Operationalized Overview on Key Issues of Pandemic Crisis Technologies</title>
        <p><xref ref-type="boxed-text" rid="box1">Textbox 1</xref> presents an operationalized overview of all key aspects and reflections addressed in this contribution. It also contains 3 major recommendations that might be relevant to present and future public health technologies.</p>
        <boxed-text id="box1" position="float">
          <title>COVID-19 pandemic simulations for public health management: social construction and the implications.</title>
          <p>
            <bold>Social construction of public health technologies</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>What is evidence?</p>
              <list>
                <list-item>
                  <p>Technology is never neutral: charts and curves as quasiobjective representations of a questionable neutrality of scientific knowledge</p>
                </list-item>
                <list-item>
                  <p>Manifest and latent assumptions, values, and norms affect data collection, analysis, and interpretation</p>
                </list-item>
                <list-item>
                  <p>Social complexity cannot be transferred easily into binary code structures</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Paradoxes and ambivalences of knowledge</p>
              <list>
                <list-item>
                  <p>Paradoxes, eg, ignorance within pandemics versus rise of digital health technologies</p>
                </list-item>
                <list-item>
                  <p>Ambivalences of knowledge: new knowledge creates new ignorance</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Algorithmic governance and participation</p>
              <list>
                <list-item>
                  <p>Technology versus participation: find a balance between algorithmic governance and other forms of coping with uncertainties and crises (eg, social participation)</p>
                </list-item>
                <list-item>
                  <p>Technology and participation: participatory design as a mode of innovating public health technologies</p>
                </list-item>
              </list>
            </list-item>
          </list>
          <p>
            <bold>Social, ethical, and political implications of public health technologies</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Social implications</p>
              <list>
                <list-item>
                  <p>Entanglements between knowledge and power, eg, within pandemic images and charts</p>
                </list-item>
                <list-item>
                  <p>Accountability problems and unintended side effects of digital health technologies</p>
                </list-item>
                <list-item>
                  <p>Performativity, eg, with regard to the mappability of a pandemic in the context of political power relations</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Ethical implications</p>
              <list>
                <list-item>
                  <p>Acceptance versus acceptability: distinguish between use attitudes and ethical criteria</p>
                </list-item>
                <list-item>
                  <p>Acceptability affects legitimacy and trust</p>
                </list-item>
                <list-item>
                  <p>Transparency and legitimacy not necessarily directly correlated (argument by Amoore [<xref ref-type="bibr" rid="ref50">50</xref>])</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Political implications</p>
              <list>
                <list-item>
                  <p>Strategic ignorance: What scenario is modeled? But also: What is not modeled?</p>
                </list-item>
                <list-item>
                  <p>Science-policy nexus: “epistemization of the political”</p>
                </list-item>
                <list-item>
                  <p>Danger of control illusions if political decisions are merely data-based</p>
                </list-item>
              </list>
            </list-item>
          </list>
        </boxed-text>
        <p>The following were the three main recommendations:</p>
        <p>1. Consider health crises also as social and political crises.</p>
        <p>2. Merge crisis knowledge within interdisciplinary forms of pluralistic knowledge production: socioscientific knowledge and social participation as precious resources in reacting to health crises.</p>
        <p>3. Be aware of the connectedness of the social construction principles and the various implications of public health technologies (especially regarding algorithmically driven practices and tools).</p>
        <p>One key question was how the use of digital data is changing the way governments address ethical and societal questions in public health crises. Simulations were reconstructed as visual representations and sources for legitimate political power constellations. In addition, the principles of mathematical modeling based on algorithmic command structures were determined as an intransparent mode of dealing with crises and uncertainties, which relate less to individual acceptability than to the level of acceptability. To judge the acceptability of mathematical or algorithmic modeling techniques as an ethical reflection of technologies, we must shed light on the premises, values, and norms in the social construction process of generating such models and simulations, for instance, by communicating and reflecting the assumptions. For this, it is also crucial to reflect on the role of ignorance as a problem of technocratic, data-driven crisis governance technologies.</p>
        <p>In addition, it has been argued that alternative ways of knowledge production in times of health crises should be identified. In the context of the often-diagnosed lack of data, for example, in relation to social inequalities during the pandemic, greater importance of social science knowledge in pandemic crisis responses could be a useful and necessary complement to purely medical and epidemiological strategies for dealing with public health crises. The role of interdisciplinary work in the development and implementation of digital medical applications could also be enriched by participatory methods of technological innovation to maintain trust in technological public health solutions.</p>
        <p>To take the criticism of technological solutionism seriously, social and more experimental forms of dealing with crises could also be debated and tested. Only in this manner can public health management escape the accusation of a technology-based top-down strategy that lacks democratic legitimacy. Considering a global preparedness regime that is able to detect public health threats at an early stage, an expansion of the technological architecture in the form of a “positive biopolitics” [<xref ref-type="bibr" rid="ref63">63</xref>] to establish adequate structures of intervention on a planetary scale at an early stage, which should enable a higher degree of inclusion, care, and prevention, seems worthy of discussion. Against this background, this paper should not be understood as a plea against the use of technologies to address public health crises. Rather, it is a proposal to relate different forms of knowledge to each other in an interdisciplinary approach in such a way that they make the best possible use of the potentials of the heterogeneity inscribed in them and at the same time proactively consider ethical criteria of acceptability.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Overall, it is difficult to determine the direction in which the development and implementation of pandemic crisis technologies will evolve. Therefore, it is also difficult to estimate which concrete application areas can be found for agent-based models or AI-based approaches within future simulation models, for example, and to what extent these will raise completely different implications from those outlined. New and surprising issues and challenges could soon emerge, especially as public health technologies in the aftermath of the COVID-19 pandemic represent a rapidly developing field.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Pandemic simulation models are an important tool to support the necessary political decision-making in crisis situations. However, their informative value not only depends strongly on the quality of the available data but also, at the same time, raises diverse implications on different levels of concern. The modes of reducing complexity within simulation models are essential, as is the question of how data quality can be optimized in the first place with regard to the modeling of social complexity, which tends to increase further. Although AI failed to exhibit its potential during the pandemic, with regard to simulations, there are indications that AI models will sooner or later become more important in the context of public health management. Thus, the ambivalences of simulation models will probably continue to be the subject of ethical reflections and sociopolitical issues in the future.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">SEIR</term>
          <def>
            <p>susceptible, exposed, infectious, recovered</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">SIR</term>
          <def>
            <p>susceptible, infectious, recovered</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was produced as part of the German Federal Ministry of Education and Research–funded project “Multiple Crises. COVID-19 and the Entanglements of Public Health, Security, and Ecology in Europe.”</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heimstädt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Egbert</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Esposito</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A pandemic of prediction: on the circulation of contagion models between public health and public safety</article-title>
          <source>Sociologica</source>
          <year>2021</year>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>24</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.6092/ISSN.1971-8853/11470"/>
          </comment>
          <pub-id pub-id-type="doi">10.6092/issn.1971-8853/11470</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bauman</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <source>Modernity and Ambivalence</source>
          <year>1991</year>
          <publisher-loc>Ithaca, NY</publisher-loc>
          <publisher-name>Cornell University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schwering</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Jürgen Habermas über corona: „So viel Wissen über unser Nichtwissen gab es noch nie“</article-title>
          <source>Frankfurter Rundschau</source>
          <year>2020</year>
          <month>4</month>
          <day>15</day>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://tinyurl.com/6twnd3ab">http://tinyurl.com/6twnd3ab</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beck</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Bonß</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <source>Die Modernisierung der Moderne</source>
          <year>2001</year>
          <publisher-loc>Berlin, Germany</publisher-loc>
          <publisher-name>Suhrkamp Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gluckman</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wilsdon</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>From paradox to principles: where next for scientific advice to governments?</article-title>
          <source>Palgrave Commun</source>
          <year>2016</year>
          <month>10</month>
          <day>18</day>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>16077</fpage>
          <pub-id pub-id-type="doi">10.1057/palcomms.2016.77</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haraway</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Weiss</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nolan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hunsinger</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Trifonas</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A cyborg manifesto: science, technology, and socialist-feminism in the late 20th century</article-title>
          <source>The International Handbook of Virtual Learning Environments</source>
          <year>2006</year>
          <publisher-loc>Dordrecht, The Netherlands</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mezes</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>(Nicht-)Wissen und (Un-)Sicherheit in der Pandemie</article-title>
          <source>Soziopolis</source>
          <year>2020</year>
          <month>5</month>
          <day>20</day>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.soziopolis.de/nicht-wissen-und-un-sicherheit-in-der-pandemie.html">https://www.soziopolis.de/nicht-wissen-und-un-sicherheit-in-der-pandemie.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>‘T Hart</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The crisis approach</article-title>
          <source>Handbook of Disaster Research. Handbooks of Sociology and Social Research</source>
          <year>2007</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rufat</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Reghezza-Zitt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rufat</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Critique of pure resilience</article-title>
          <source>Resilience Imperative: Uncertainty, Risks and Disasters</source>
          <year>2015</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>International Society for Technology in Education</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morozov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <source>To Save Everything, Click Here: The Folly of Technological Solutionism</source>
          <year>2014</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Public Affairs</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Adey</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Anticipating emergencies: technologies of preparedness and the matter of security</article-title>
          <source>Secur Dialogue</source>
          <year>2012</year>
          <month>04</month>
          <day>16</day>
          <volume>43</volume>
          <issue>2</issue>
          <fpage>99</fpage>
          <lpage>117</lpage>
          <pub-id pub-id-type="doi">10.1177/0967010612438432</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hälterlein</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Die Simulation der Pandemie</article-title>
          <source>Soziopolis</source>
          <year>2020</year>
          <month>6</month>
          <day>3</day>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.soziopolis.de/die-simulation-der-pandemie.html">https://www.soziopolis.de/die-simulation-der-pandemie.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ojokoh</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Sarumi</surname>
              <given-names>OA</given-names>
            </name>
            <name name-style="western">
              <surname>Salako</surname>
              <given-names>KV</given-names>
            </name>
            <name name-style="western">
              <surname>Gabriel</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Taiwo</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>OV</given-names>
            </name>
            <name name-style="western">
              <surname>Adegun</surname>
              <given-names>IP</given-names>
            </name>
            <name name-style="western">
              <surname>Babalola</surname>
              <given-names>OT</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kose</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>de Albuquerque</surname>
              <given-names>VH</given-names>
            </name>
            <name name-style="western">
              <surname>Khanna</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Modeling and predicting the spread of COVID-19: a continental analysis</article-title>
          <source>Data Science for COVID-19 Volume 2: Societal and Medical Perspectives</source>
          <year>2022</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Postnikov</surname>
              <given-names>EB</given-names>
            </name>
          </person-group>
          <article-title>Estimation of COVID-19 dynamics "on a back-of-envelope": does the simplest SIR model provide quantitative parameters and predictions?</article-title>
          <source>Chaos Solitons Fractals</source>
          <year>2020</year>
          <month>06</month>
          <volume>135</volume>
          <fpage>109841</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32501369"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chaos.2020.109841</pub-id>
          <pub-id pub-id-type="medline">32501369</pub-id>
          <pub-id pub-id-type="pii">S0960-0779(20)30241-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC7252058</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferguson</surname>
              <given-names>NM</given-names>
            </name>
            <name name-style="western">
              <surname>Laydon</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nedjati-Gilani</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Imai</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ainslie</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Baguelin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bhatia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Boonyasiri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cucunubá</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Cuomo-Dannenburg</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Dighe</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dorigatti</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gaythorpe</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hamlet</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hinsley</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Okell</surname>
              <given-names>LC</given-names>
            </name>
            <name name-style="western">
              <surname>van Elsland</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Verity</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Volz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>PG</given-names>
            </name>
            <name name-style="western">
              <surname>Walters</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Winskill</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Whittaker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Donnelly</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Riley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ghani</surname>
              <given-names>AC</given-names>
            </name>
          </person-group>
          <article-title>Report 9: impact of non-pharmaceutical interventions (NPIs) to reduce COVID-19 mortality and healthcare demand</article-title>
          <source>Imperial College London</source>
          <year>2020</year>
          <month>3</month>
          <day>16</day>
          <access-date>2024-01-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://tinyurl.com/588c3e6f">http://tinyurl.com/588c3e6f</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Adam</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Special report: the simulations driving the world's response to COVID-19</article-title>
          <source>Nature</source>
          <year>2020</year>
          <month>04</month>
          <day>02</day>
          <volume>580</volume>
          <issue>7803</issue>
          <fpage>316</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1038/d41586-020-01003-6</pub-id>
          <pub-id pub-id-type="medline">32242115</pub-id>
          <pub-id pub-id-type="pii">10.1038/d41586-020-01003-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Prediction of the COVID-19 spread in African countries and implications for prevention and control: a case study in South Africa, Egypt, Algeria, Nigeria, Senegal and Kenya</article-title>
          <source>Sci Total Environ</source>
          <year>2020</year>
          <month>08</month>
          <day>10</day>
          <volume>729</volume>
          <fpage>138959</fpage>
          <pub-id pub-id-type="doi">10.1016/j.scitotenv.2020.138959</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gnanvi</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Salako</surname>
              <given-names>KV</given-names>
            </name>
            <name name-style="western">
              <surname>Kotanmi</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Glèlè Kakaï</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>On the reliability of predictions on COVID-19 dynamics: a systematic and critical review of modelling techniques</article-title>
          <source>Infect Dis Model</source>
          <year>2021</year>
          <volume>6</volume>
          <fpage>258</fpage>
          <lpage>72</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2468-0427(20)30112-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.idm.2020.12.008</pub-id>
          <pub-id pub-id-type="medline">33458453</pub-id>
          <pub-id pub-id-type="pii">S2468-0427(20)30112-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC7802527</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaciroti</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Lumeng</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Parekh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Boulton</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>A Bayesian mixture model for predicting the COVID-19 related mortality in the United States</article-title>
          <source>Am J Trop Med Hyg</source>
          <year>2021</year>
          <month>02</month>
          <day>19</day>
          <volume>104</volume>
          <issue>4</issue>
          <fpage>1484</fpage>
          <lpage>92</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33606666"/>
          </comment>
          <pub-id pub-id-type="doi">10.4269/ajtmh.20-1147</pub-id>
          <pub-id pub-id-type="medline">33606666</pub-id>
          <pub-id pub-id-type="pii">tpmd201147</pub-id>
          <pub-id pub-id-type="pmcid">PMC8045639</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Willem</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Verelst</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Bilcke</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hens</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Beutels</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Lessons from a decade of individual-based models for infectious disease transmission: a systematic review (2006-2015)</article-title>
          <source>BMC Infect Dis</source>
          <year>2017</year>
          <month>09</month>
          <day>11</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>612</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcinfectdis.biomedcentral.com/articles/10.1186/s12879-017-2699-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12879-017-2699-8</pub-id>
          <pub-id pub-id-type="medline">28893198</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12879-017-2699-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC5594572</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alsharhan</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Survey of agent-based simulations for modelling COVID-19 pandemic</article-title>
          <source>Adv Sci Technol Eng Syst J</source>
          <year>2021</year>
          <month>03</month>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>439</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.25046/aj060250</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lalmuanawma</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hussain</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chhakchhuak</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Applications of machine learning and artificial intelligence for Covid-19 (SARS-CoV-2) pandemic: a review</article-title>
          <source>Chaos Solitons Fractals</source>
          <year>2020</year>
          <month>10</month>
          <volume>139</volume>
          <fpage>110059</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32834612"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chaos.2020.110059</pub-id>
          <pub-id pub-id-type="medline">32834612</pub-id>
          <pub-id pub-id-type="pii">S0960-0779(20)30456-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC7315944</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eyert</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Epidemie und Modellierung. Das Mathematische ist politisch</article-title>
          <source>WZB Mitteilungen</source>
          <year>2020</year>
          <month>6</month>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bibliothek.wzb.eu/artikel/2020/f-23105.pdf">https://bibliothek.wzb.eu/artikel/2020/f-23105.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Latour</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>Reassembling the Social: An Introduction to Actor-Network-Theory</source>
          <year>2005</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Oxford University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kennedy</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Simple data visualisations have become key to communicating about the COVID-19 pandemic, but we know little about their impact</article-title>
          <source>The London School of Economics and Political Science</source>
          <year>2020</year>
          <month>5</month>
          <day>4</day>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://tinyurl.com/4s85ucrc">http://tinyurl.com/4s85ucrc</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beck</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Oomen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Imagining the corridor of climate mitigation – what is at stake in IPCC’s politics of anticipation?</article-title>
          <source>Environ Sci Policy</source>
          <year>2021</year>
          <month>09</month>
          <volume>123</volume>
          <fpage>169</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.envsci.2021.05.011"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.envsci.2021.05.011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Neyland</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Möllers</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Algorithmic IF  … THEN rules and the conditions and consequences of power</article-title>
          <source>Inf Commun Soc</source>
          <year>2016</year>
          <month>03</month>
          <day>10</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>45</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/1369118X.2016.1156141"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/1369118x.2016.1156141</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jasanoff</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>States of Knowledge: The Co-production of Science and Social Order</source>
          <year>2004</year>
          <publisher-loc>Milton Park, UK</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coeckelbergh</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Artificial intelligence, responsibility attribution, and a relational justification of explainability</article-title>
          <source>Sci Eng Ethics</source>
          <year>2020</year>
          <month>08</month>
          <day>24</day>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>2051</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31650511"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11948-019-00146-8</pub-id>
          <pub-id pub-id-type="medline">31650511</pub-id>
          <pub-id pub-id-type="pii">10.1007/s11948-019-00146-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7417397</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Latour</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Woolgar</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Laboratory Life: The Construction of Scientific Facts</source>
          <year>1986</year>
          <publisher-loc>Princeton, NJ</publisher-loc>
          <publisher-name>Princeton University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Akrich</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bijker</surname>
              <given-names>WE</given-names>
            </name>
            <name name-style="western">
              <surname>Law</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The description of technical objects</article-title>
          <source>Shaping Technology/Building Society: Studies in Sociotechnical Change</source>
          <year>1997</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>The MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Latour</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bijker</surname>
              <given-names>WE</given-names>
            </name>
            <name name-style="western">
              <surname>Law</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Where are the missing masses? The sociology of a few mundane artifacts</article-title>
          <source>Shaping Technology/Building Society: Studies in Sociotechnical Change</source>
          <year>1992</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>MIT Press</publisher-name>
          <fpage>225</fpage>
          <lpage>58</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brey</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>Values in technology and disclosive computer ethics</article-title>
          <source>The Cambridge Handbook of Information and Computer Ethics</source>
          <year>2010</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
          <fpage>41</fpage>
          <lpage>58</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaufmann</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Security through technology? Logic, ambivalence and paradoxes of technologised security</article-title>
          <source>Eur J Secur Res</source>
          <year>2016</year>
          <month>3</month>
          <day>15</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>77</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1007/s41125-016-0005-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Katzenbach</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ulbricht</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Algorithmic governance</article-title>
          <source>Internet Policy Rev</source>
          <year>2019</year>
          <month>11</month>
          <day>9</day>
          <volume>8</volume>
          <issue>4</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.14763/2019.4.1424"/>
          </comment>
          <pub-id pub-id-type="doi">10.14763/2019.4.1424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Seaver</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Knowing algorithms</article-title>
          <source>digitalSTS: A Field Guide for Science &#38; Technology Studies</source>
          <year>2019</year>
          <publisher-loc>Princeton, NJ</publisher-loc>
          <publisher-name>Princeton University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Miyazaki</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Algorhythmics: understanding micro-temporality in computational cultures</article-title>
          <source>Comput Cult</source>
          <year>2012</year>
          <month>9</month>
          <day>28</day>
          <volume>2</volume>
          <issue>2</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://computationalculture.net/algorhythmics-understanding-micro-temporality-in-computational-cultures"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beer</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The social power of algorithms</article-title>
          <source>Inf Commun Soc</source>
          <year>2016</year>
          <month>08</month>
          <day>08</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/1369118X.2016.1216147"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/1369118X.2016.1216147</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roberge</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Seyfert</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Was sind Algorithmuskulturen?</article-title>
          <source>Algorithmuskulturen: Über die Rechnerische Konstruktion der Wirklichkeit</source>
          <year>2017</year>
          <publisher-loc>Bielefeld, Germany</publisher-loc>
          <publisher-name>Transcript Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rauer</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Drohnen: zur materialisierung von algorithmen</article-title>
          <source>Algorithmuskulturen: Über die Rechnerische Konstruktion der Wirklichkeit</source>
          <year>2017</year>
          <publisher-loc>Bielefeld, Germany</publisher-loc>
          <publisher-name>Transcript Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noble</surname>
              <given-names>SU</given-names>
            </name>
          </person-group>
          <source>Algorithms of Oppression: How Search Engines Reinforce Racism</source>
          <year>2018</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>New York University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Napoli</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>The algorithm as institution: toward a theoretical framework for automated media production and consumption</article-title>
          <source>Fordham University Schools of Business Research Paper</source>
          <year>2013</year>
          <access-date>2023-01-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.doi.org/10.2139/ssrn.2260923">http://dx.doi.org/10.2139/ssrn.2260923</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kitchin</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Thinking critically about and researching algorithms</article-title>
          <source>Inf Commun Soc</source>
          <year>2016</year>
          <month>02</month>
          <day>25</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>14</fpage>
          <lpage>29</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/1369118X.2016.1154087"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/1369118x.2016.1154087</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Seaver</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Algorithms as culture: some tactics for the ethnography of algorithmic systems</article-title>
          <source>Big Data Soc</source>
          <year>2017</year>
          <month>11</month>
          <day>09</day>
          <volume>4</volume>
          <issue>2</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1177/2053951717738"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2053951717738104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The end of theory: the data deluge makes the scientific method obsolete</article-title>
          <source>Wired</source>
          <year>2008</year>
          <month>6</month>
          <day>23</day>
          <access-date>2022-10-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.wired.com/2008/06/pb-theory/">https://www.wired.com/2008/06/pb-theory/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Amoore</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>The Politics of Possibility: Risk and Security Beyond Probability</source>
          <year>2013</year>
          <publisher-loc>Durham, NC</publisher-loc>
          <publisher-name>Duke University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levermann</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Wie Algorithmen eine Kultur der Digitalität konstituieren: über die kulturelle Wirkmacht automatisierter Handlungsanweisungen in der Infosphäre. Article in German</article-title>
          <source>J Korporative Kommunikation</source>
          <year>2018</year>
          <volume>2</volume>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ssoar.info/ssoar/handle/document/62401"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Passig</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Fünfzig jahre black box. Article in German</article-title>
          <source>Merkur</source>
          <year>2017</year>
          <volume>823</volume>
          <fpage>16</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.merkur-zeitschrift.de/artikel/fuenfzig-jahre-black-box-a-mr-71-12-16/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weiser</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The computer for the 21st century</article-title>
          <source>IEEE Pervasive Comput</source>
          <year>2002</year>
          <month>1</month>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1109/mprv.2002.993141</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Amoore</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>Cloud Ethics: Algorithms and the Attributes of Ourselves and Others</source>
          <year>2020</year>
          <publisher-loc>Durham, NC</publisher-loc>
          <publisher-name>Duke University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grunwald</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Zur Rolle von Akzeptanz und Akzeptabilität von Technik bei der Bewältigung von Technikkonflikten. Article in German</article-title>
          <source>TATuP</source>
          <year>2005</year>
          <month>11</month>
          <day>01</day>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>54</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.14512/tatup.14.3.54</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ammicht Quinn</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Artificial intelligence and the role of ethics</article-title>
          <source>Stat J IAOS</source>
          <year>2021</year>
          <month>03</month>
          <day>22</day>
          <volume>37</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.3233/sji-210791</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Milan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Techno-solutionism and the standard human in the making of the COVID-19 pandemic</article-title>
          <source>Big Data Soc</source>
          <year>2020</year>
          <month>10</month>
          <day>20</day>
          <volume>7</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.1177/2053951720966781</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The price of certainty: how the politics of pandemic data demand an ethics of care</article-title>
          <source>Big Data Soc</source>
          <year>2020</year>
          <month>07</month>
          <day>22</day>
          <volume>7</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.1177/2053951720942539</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Keck</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lynteris</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <source>The Anthropology of Epidemics</source>
          <year>2019</year>
          <publisher-loc>Milton Park, UK</publisher-loc>
          <publisher-name>Taylor &#38; Francis</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Keck</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lachenal</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Keck</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lynteris</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Simulations of epidemics: techniques of global health and neo-liberal government</article-title>
          <source>The Anthropology of Epidemics</source>
          <year>2019</year>
          <publisher-loc>Milton Park, UK</publisher-loc>
          <publisher-name>Taylor &#38; Francis</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogner</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Die Epistemisierung des Politischen. Wie die Macht des Wissens die Demokratie Gefährdet</source>
          <year>2021</year>
          <publisher-loc>Ditzingen, Germany</publisher-loc>
          <publisher-name>Reclam Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bartl</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hardt</surname>
              <given-names>JN</given-names>
            </name>
          </person-group>
          <article-title>Zum Verhältnis zwischen Wissenschaft und Politik im kontext multipler Krisen: Covid-19 und die Klimakrise als Herausforderungen für die wissenschaftliche Politikberatung</article-title>
          <source>Zeitschrift für Umweltrecht und Umweltpolitik</source>
          <year>2022</year>
          <access-date>2024-01-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://online.ruw.de/suche/pdf/zfu/zfu-02-2022-155-02d517156f740d85542e6340b143ae93.pdf">https://online.ruw.de/suche/pdf/zfu/zfu-02-2022-155-02d517156f740d85542e6340b143ae93.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Esposito</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sold</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmermann</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Systems theory and algorithmic futures: interview with elena esposito</article-title>
          <source>Constr Found</source>
          <year>2021</year>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>356</fpage>
          <lpage>61</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://constructivist.info/16/3/356"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eyert</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Klenk</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Nullmeier</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wewer</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Agent-based modeling und politikberatung</article-title>
          <source>Handbuch Digitalisierung in Staat und Verwaltung</source>
          <year>2020</year>
          <publisher-loc>Wiesbaden, Germany</publisher-loc>
          <publisher-name>Springer VS</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McGoey</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The logic of strategic ignorance</article-title>
          <source>Br J Sociol</source>
          <year>2012</year>
          <month>09</month>
          <volume>63</volume>
          <issue>3</issue>
          <fpage>553</fpage>
          <lpage>76</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/j.1468-4446.2012.01424.x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/j.1468-4446.2012.01424.x</pub-id>
          <pub-id pub-id-type="medline">22950467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Amicelle</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aradau</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jeandesboz</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Questioning security devices: performativity, resistance, politics</article-title>
          <source>Secur Dialogue</source>
          <year>2015</year>
          <month>08</month>
          <day>10</day>
          <volume>46</volume>
          <issue>4</issue>
          <fpage>293</fpage>
          <lpage>306</lpage>
          <pub-id pub-id-type="doi">10.1177/0967010615586964</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bratton</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <source>The Revenge of the Real: Politics for a Post-Pandemic World</source>
          <year>2021</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Verso Books</publisher-name>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
