The chain of security
暂无分享,去创建一个
[1] Tobias Blanke,et al. The (Big) Data-security assemblage: Knowledge and critique , 2015, Big Data Soc..
[2] Frank G. C. Sauer,et al. Killer drones: The ‘silver bullet’ of democratic warfare? , 2012 .
[3] Deborah Cowen,et al. The Deadly Life of Logistics: Mapping Violence in Global Trade, Deborah Cowen. University of Minnesota Press, Minneapolis (2014) , 2014 .
[4] U. Stäheli. Indexing – The politics of invisibility , 2016 .
[5] Anna Leander. The Paradoxical Impunity of Private Military Companies: Authority and the Limits to Legal Accountability , 2010 .
[6] R. Jaffe,et al. The hybrid state: Crime and citizenship in urban Jamaica , 2013 .
[7] B. Latour. Why Has Critique Run out of Steam? From Matters of Fact to Matters of Concern , 2004, Critical Inquiry.
[8] F. Ragazzi,et al. Low-tech security: Files, notes, and memos as technologies of anticipation , 2014 .
[9] Julien Jeandesboz. Justifying Control: EU Border Security and the Shifting Boundaries of Political Arrangement , 2016 .
[10] J.H.A.M. Grijpink. Biometrics and privacy , 2001 .
[11] T. Li. Practices of assemblage and community forest management , 2007 .
[12] L. Stampnitzky,et al. Disciplining Terror: How Experts Invented 'Terrorism' , 2013 .
[13] J. Law,et al. Complexities: Social Studies of Knowledge Practices , 2002 .
[14] Charlotte Heath-Kelly. Algorithmic autoimmunity in the NHS: Radicalisation and the clinic , 2017 .
[15] M. Salter,et al. Border security as practice: An agenda for research , 2014 .
[16] The Making of Law , 1921 .
[17] Frank Gadinger,et al. The Play of International Practice , 2015 .
[18] I. Neumann. Returning Practice to the Linguistic Turn: The Case of Diplomacy , 2002 .
[19] Mark B. Salter,et al. Governmentalities of an Airport: Heterotopia and Confession , 2007 .
[20] Christian Bueger. Making Things Known: Epistemic Practices, the United Nations, and the Translation of Piracy , 2015 .
[21] Marijn Hoijtink. Capitalizing on emergence: The ‘new’ civil security market in Europe , 2014 .
[22] Jef Huysmans,et al. The Politics of Insecurity: Fear, Migration and Asylum in the EU , 2006 .
[23] Maja Zehfuss. Constructivism in International Relations: The Politics of Reality , 2002 .
[24] J. Huysmans. What’s in an act? On security speech acts and little security nothings , 2011 .
[25] James Backhouse,et al. Profiling under conditions of ambiguity—An application in the financial services industry , 2007 .
[26] M. Goede,et al. Sentencing Risk: Temporality and Precaution in Terrorism Trials† , 2013 .
[27] Frank Gadinger. On Justification and Critique: Luc Boltanski’s Pragmatic Sociology and International Relations , 2016 .
[28] T. Porter. Tracing Associations in Global Finance , 2013 .
[29] Govert Valkenburg,et al. Materialities between security and privacy: A constructivist account of airport security scanners , 2015 .
[30] D. Campbell. International Engagements , 2001 .
[31] Bruno Magalhães. The Politics of Credibility: Assembling Decisions on Asylum Applications in Brazil , 2016 .
[32] S. Shapin. A Social History of Truth: Civility and Science in Seventeenth-Century England , 1994 .
[33] I. V. D. Ploeg,et al. Biometrics and Privacy A note on the politics of theorizing technology , 2003 .
[34] Joakim Berndtsson,et al. Private Security and the Public–Private Divide: Contested Lines of Distinction and Modes of Governance in the Stockholm-Arlanda Security Assemblage , 2011 .
[35] A. Mol. The Body Multiple: Ontology in Medical Practice , 2003 .
[36] S MariaNaVaLvErdeandMichaelMOPa. Insecurity and the dream of targeted governance , 2004 .
[37] J. Mcculloch,et al. Pre-Crime and Counter-Terrorism Imagining Future Crime in the ‘War on Terror’ , 2009 .
[38] M. Strathern. Cutting the Network , 1996 .
[39] W. Walters. Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security , 2014 .
[40] Lucia Zedner,et al. Pre-crime and post-criminology? , 2007 .
[41] P. Schouten. Security as controversy: Reassembling security at Amsterdam Airport , 2014 .
[42] Philippe M. Frowd. The field of border control in Mauritania , 2014 .
[43] Rocco Bellanova. Data Protection, with Love , 2014 .
[44] I. Stengers,et al. The Invention Of Modern Science , 2000 .
[45] Nadine Voelkner. Managing pathogenic circulation , 2011 .
[46] Michael J. Shapiro,et al. Challenging boundaries : global flows, territorial identities , 1996 .
[47] Rocco Bellanova,et al. A Different View on the 'Making' of European Security: The EU Passenger Name Record System as a Socio-Technical Assemblage , 2012 .
[48] M. Goede,et al. Governing future radicals in Europe , 2013 .
[49] Deborah Avant,et al. The Market for Force: The Consequences of Privatizing Security , 2005 .
[50] M. Goede. Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .
[51] L. Daston,et al. The Image of Objectivity , 1992 .
[52] Didier Bigo,et al. Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .
[53] G. Sullivan. Transnational Legal Assemblages and Global Security Law: Topologies and Temporalities of the List , 2014 .
[54] Jutta Weldes. Constructing National Interests: The United States and the Cuban Missile Crisis , 1999 .
[55] Yee-Kuang Heng,et al. The other War on Terror revealed: global governmentality and the Financial Action Task Force’s campaign against terrorist financing , 2008, Review of International Studies.
[56] H. Stritzel. Security as translation: threats, discourse, and the politics of localisation , 2011, Review of International Studies.
[57] H. Stritzel. Security, the translation , 2011 .
[58] M. Cooper. Pre-empting Emergence , 2006 .
[59] Mike Ananny,et al. Toward an Ethics of Algorithms , 2016 .
[60] Louise Amoore,et al. Life beyond big data: governing with little analytics , 2015 .
[61] B. Latour. Pandora's Hope: Essays on the Reality of Science Studies , 1999 .
[62] F. Ragazzi. Countering terrorism and radicalisation: Securitising social policy? , 2017 .
[63] Anna Leander. Technological Agency in the Co-Constitution of Legal Expertise and the US Drone Program , 2013, Leiden Journal of International Law.
[64] Oliver Belcher,et al. Ethnographies of closed doors: conceptualising openness and closure in US immigration and military institutions , 2013 .
[65] D. Vigneswaran. The Contours of Disorder: Crime Maps and Territorial Policing in South Africa , 2014 .
[66] S. Gutwirth,et al. Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power , 2022, Direito Público.
[67] A. Mol,et al. Living with Omega-3: New Materialism and Enduring Concerns , 2015 .
[68] Jutta Weber,et al. Keep adding. On kill lists, drone warfare and the politics of databases , 2016 .
[69] Anthony Amicelle,et al. Towards a ‘new’ political anatomy of financial surveillance , 2011 .
[70] Nathaniel O'Grady,et al. Data Interface Security: Assembling Technologies that Govern the Future , 2015 .
[71] Luis Lobo-Guerrero. Insuring Life: Value, Security and Risk , 2016 .
[72] Thomas A. Brooks,et al. Security technologies , 1994, AT&T Technical Journal.
[73] R. Bellanova,et al. Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices , 2013 .
[74] J. Hoffman. Theorizing power in transition studies: the role of creativity and novel practices in structural change , 2013 .
[75] Elida K. U. Jacobsen,et al. The cross-colonization of finance and security through lists: Banking policing in the UK and India , 2016 .
[76] A. Loeber. Designing for Phronèsis: Experiences with transformative learning on sustainable development , 2007 .
[77] Luc Boltanski,et al. The reality of moral expectations: A sociology of situated judgement , 2000 .
[78] S. Opitz,et al. Future Emergencies: Temporal Politics in Law and Economy , 2015 .
[80] Mireille Hildebrandt,et al. The Challenges of Ambient Law and Legal Protection in the Profiling Era , 2010 .
[81] Pierre Lascoumes,et al. Sentinels in the Banking Industry Private Actors and the Fight against Money Laundering in France , 2007 .
[82] M. Bourne,et al. Laboratizing the border: The production, translation and anticipation of security technologies , 2015 .
[83] M. de Goede. The chain of security , 2017, Review of International Studies.
[84] K. Haggerty,et al. Surveillance and Democracy , 2010 .
[85] I. Loader. Policing and the social : questions of symbolic power , 1997 .
[86] Shaun Williams,et al. The 'politics of possibility' , 2015 .
[87] D. Lyon. Surveillance after September 11 , 2001 .
[88] Susanne Krasmann. Law’s knowledge: On the susceptibility and resistance of legal practices to security matters , 2012 .
[89] Mark B. Salter,et al. Research methods in critical security studies : an introduction , 2012 .
[90] Julien Jeandesboz. Smartening border security in the European Union: An associational inquiry , 2016 .
[91] Annemarie Mol,et al. Proving or Improving: On Health Care Research as a Form of Self-Reflection , 2006, Qualitative health research.
[92] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[93] E. Fatas,et al. Combating Violent Extremism , 2016 .
[94] Mark B. Salter,et al. Making Things International 1: Circuits and Motion , 2015 .
[95] Louise Amoore,et al. Security and the incalculable , 2014 .