Tracking and Targeting
暂无分享,去创建一个
[1] Michael Lynch,et al. Discipline and the Material Form of Images: An Analysis of Scientific Visibility , 1985 .
[2] C. Wright. Representing and Intervening , 1985 .
[3] Carol Cohn,et al. Sex and Death in the Rational World of Defense Intellectuals , 1987, Signs: Journal of Women in Culture and Society.
[4] Mary Elizabeth Lynch,et al. The externalized retina: Selection and mathematization in the visual documentation of objects in the life sciences , 1988 .
[5] Donna Harawy. Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective , 2022, Philosophical Literary Journal Logos.
[6] S. Woolgar,et al. Representation in Scientific Practice , 1990 .
[7] David H. DeVorkin,et al. Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance , 1990 .
[8] Scott D. Sagan,et al. Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance, Donald MacKenzie, 1990. The MIT Press, Cambridge, MA. 500 pages. ISBN: 0-262-13258-3. $29.95 , 1990 .
[9] B. Asher. The Professional Vision , 1994 .
[10] N. Thrift. Environment and Planning D: Society and Space , 1995 .
[11] Simulating the Unthinkable , 2000 .
[12] J. R. Griffin,et al. The Closed World: Computers and the Politics of Discourse in Cold War America , 2000 .
[14] Chalmers A. Johnson. American Militarism and Blowback: The Costs of Letting the Pentagon Dominate Foreign Policy , 2002 .
[15] Technology and Security: Governing Threats in the New Millennium , 2007 .
[16] Brian Rappert. Technology and Security , 2007 .
[17] H. Gusterson. Anthropology and Militarism , 2007 .
[18] John Stone,et al. Science, Technology and the Military: Priorities, Preoccupations and Possibilities , 2008 .
[19] Claudia Aradau,et al. Security, Technologies of Risk, and the Political: Guest Editors' Introduction , 2008 .
[20] NeoConOpticon: The EU Security-Industrial Complex , 2009 .
[21] J. Butler. Frames of War: When Is Life Grievable? , 2009 .
[22] Sean Lawson. Surfing on the edge of chaos: Nonlinear science and the emergence of a doctrine of preventive war in the US , 2011 .
[23] D. Gregory. The everywhere war , 2011 .
[24] D. Gregory. From a View to a Kill , 2011 .
[25] R. Andersson. Illegality, Inc.: Clandestine Migration and the Business of Bordering Europe , 2012 .
[26] Grégoire Chamayou. Manhunts: A Philosophical History , 2012 .
[27] Rachel Plotnick. Predicting push-button warfare: US print media and conflict from a distance, 1945–2010 , 2012 .
[28] Hedvig Ördén,et al. Cities under siege: the new military urbanism , 2013 .
[29] N. N. Sørensen,et al. The Migration Industry and the Commercialization of International Migration , 2013 .
[30] Anthropology and Militarism , 2013 .
[31] Banu Bargu. Human shields , 2013, Contemporary Political Theory.
[32] Louise Amoore,et al. The Politics of Possibility: Risk and Security Beyond Probability , 2013 .
[33] Janet Vertesi,et al. Representation in Scientific Practice Revisited , 2014 .
[34] D. Bigo. The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts , 2014 .
[35] Joseph Masco. The Theater of Operations: National Security Affect from the Cold War to the War on Terror , 2014 .
[36] D. Skinner,et al. Topologies of Race , 2014 .
[37] Natasha Myers,et al. Rendering Life Molecular: Models, Modelers, and Excitable Matter , 2015 .
[38] J. Lloyd,et al. A Theory of the Drone , 2015 .
[39] Armin Krishnan,et al. Mass Surveillance, Drones, and Unconventional Warfare , 2015 .
[40] Masco, Joseph, The Theatre of Operations: National Security Affect from the Cold War to the War on Terror , 2015 .
[41] F. Al-Shamali,et al. Author Biographies. , 2015, Journal of social work in disability & rehabilitation.
[42] We Kill Because We Can: From Soldiering to Assassination in the Drone Age , 2016 .
[43] M. Selgelid. The Value of Security , 2016 .
[44] Jutta Weber,et al. Keep adding. On kill lists, drone warfare and the politics of databases , 2016 .
[45] Corey Johnson,et al. Border militarisation and the re-articulation of sovereignty , 2016 .
[46] Lucy Suchman,et al. Configuring the Other: Sensing War through Immersive Simulation , 2016 .
[47] Jon R. Lindsay,et al. Target Practice , 2017 .
[48] Targets in the Cloud , 2017 .
[49] Neve Gordon,et al. Distinction and the ethics of violence: On the legal construction of liminal subjects and spaces , 2017 .
[50] E. Carmel. Re-interpreting knowledge, expertise and EU governance: The cases of social policy and security research policy , 2017 .
[51] Sabina Leonelli,et al. Data Shadows , 2017 .
[52] C. Wilke. Seeing and Unmaking Civilians in Afghanistan , 2017 .
[53] Dirty Dancing: Drones and Death in the Borderlands , 2017 .
[54] Data Friction: , 2019, Mapping Landscapes in Transformation.