메뉴 건너뛰기




Volumn 13, Issue 2, 2009, Pages 155-176

Identity theft vulnerability: Neoliberal governance through crime construction

Author keywords

governance; identity theft; neoliberalism; security; social control; technology

Indexed keywords


EID: 65249145681     PISSN: 13624806     EISSN: None     Source Type: Journal    
DOI: 10.1177/1362480609102877     Document Type: Article
Times cited : (36)

References (82)
  • 1
    • 11344287619 scopus 로고    scopus 로고
    • Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics
    • Allison, Stuart F.H., Amie M. Schuck and Kim Michelle Lersch (2005) ‘Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics’, Journal of Criminal Justice, 33(1): 19-29.
    • (2005) Journal of Criminal Justice , vol.33 , Issue.1 , pp. 19-29
    • Allison, S.F.H.1    Schuck, A.M.2
  • 4
    • 0036005214 scopus 로고    scopus 로고
    • Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
    • Blanchette, Jean-François and Deborah G. Johnson (2002) ‘Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness’, The Information Society, 18(1): 33-45.
    • (2002) The Information Society , vol.18 , Issue.1 , pp. 33-45
    • Blanchette, J.-F.1    Johnson, D.G.2
  • 7
    • 9544233199 scopus 로고    scopus 로고
    • The Essence of Neoliberalism
    • December. Available at
    • Bourdieu, Pierre (1998) ‘The Essence of Neoliberalism’, Le Monde Diplomatique, December. Available at http://mondediplo.com/1998/12/08bourdieu
    • (1998) Le Monde Diplomatique
    • Bourdieu, P.1
  • 8
    • 33645661492 scopus 로고    scopus 로고
    • The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks
    • Brown, Sheila (2006) ‘The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks’, Theoretical Criminology, 10(2): 223-44.
    • (2006) Theoretical Criminology , vol.10 , Issue.2 , pp. 223-244
    • Brown, S.1
  • 9
    • 33750520123 scopus 로고    scopus 로고
    • American Nightmare: Neoliberalism, Neoconservatism, and De-Democratization
    • Brown, Wendy (2006) ‘American Nightmare: Neoliberalism, Neoconservatism, and De-Democratization’, Political Theory, 34(6): 690-714.
    • (2006) Political Theory , vol.34 , Issue.6 , pp. 690-714
    • Brown, W.1
  • 13
    • 28744457579 scopus 로고    scopus 로고
    • Media and Crime Policy: A Reconsideration of David Garland's The Culture of Control
    • Cavender, Gray (2004) ‘Media and Crime Policy: A Reconsideration of David Garland's The Culture of Control’, Punishment & Society, 6(3): 335-48.
    • (2004) Punishment & Society , vol.6 , Issue.3 , pp. 335-348
    • Cavender, G.1
  • 15
    • 0034372074 scopus 로고    scopus 로고
    • Millennial Capitalism: First Thoughts on a Second Coming
    • Comaroff, Jean and John L. Comaroff (2000) ‘Millennial Capitalism: First Thoughts on a Second Coming’, Public Culture, 12(2): 291-343.
    • (2000) Public Culture , vol.12 , Issue.2 , pp. 291-343
    • Comaroff, J.1    Comaroff, J.L.2
  • 18
    • 33746070640 scopus 로고    scopus 로고
    • Who Is Killing New Orleans?
    • 10 April. Available at
    • Davis, Mike (2006) ‘Who Is Killing New Orleans?’, The Nation, 10 April. Available at http://www.thenation.com/doc/20060410/davis
    • (2006) The Nation
    • Davis, M.1
  • 21
    • 0012234917 scopus 로고    scopus 로고
    • Foucault Contra Foucault: Rereading the “Governmentality” Papers
    • Dupont, Danica and Frank Pearce (2001) ‘Foucault Contra Foucault: Rereading the “Governmentality” Papers’, Theoretical Criminology, 5(2): 123-58.
    • (2001) Theoretical Criminology , vol.5 , Issue.2 , pp. 123-158
    • Dupont, D.1    Pearce, F.2
  • 22
    • 65249176636 scopus 로고    scopus 로고
    • Electronic Frontier Foundation 31 January. Available at (accessed 5 June 2006).
    • Electronic Frontier Foundation (2006) EFF Sues AT&T to Stop Illegal Surveillance [website]. Electronic Frontier Foundation, 31 January. Available at http://www.eff.org/news/archives/2006_01.php#004369 (accessed 5 June 2006).
    • (2006) EFF Sues AT&T to Stop Illegal Surveillance [website]
  • 25
    • 65249114008 scopus 로고    scopus 로고
    • (b) Federal Trade Commission Available at (accessed 5 June 2006)
    • Federal Trade Commission (2006b) FTC Releases Top 10 Consumer Fraud Complaint Categories [website]. Federal Trade Commission. Available at http://www.ftc.gov/opa/2006/01/topten.htm (accessed 5 June 2006).
    • (2006) FTC Releases Top 10 Consumer Fraud Complaint Categories [website]
  • 26
    • 84993833419 scopus 로고    scopus 로고
    • Federal Trade Commission. Available at (accessed 19 October 2008).
    • Federal Trade Commission (2008) About Identity Theft [website]. Federal Trade Commission. Available at http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html (accessed 19 October 2008).
    • (2008) About Identity Theft [website]
  • 28
    • 84898101761 scopus 로고    scopus 로고
    • Notes from the Trash Heaps of America
    • School of Justice and Social Inquiry lecture at Arizona State University 23 March.
    • Ferrell, Jeff (2006) ‘Notes from the Trash Heaps of America’, School of Justice and Social Inquiry lecture at Arizona State University, 23 March.
    • (2006)
    • Ferrell, J.1
  • 29
    • 57949108864 scopus 로고    scopus 로고
    • Coming Soon to a Physician Near You: Medical Neoliberalism and Pharmaceutical Clinical Trials
    • Fisher, Jill A. (2007) ‘Coming Soon to a Physician Near You: Medical Neoliberalism and Pharmaceutical Clinical Trials’, Harvard Health Policy Review, 8(1): 61-70.
    • (2007) Harvard Health Policy Review , vol.8 , Issue.1 , pp. 61-70
    • Fisher, J.A.1
  • 36
    • 2442417840 scopus 로고    scopus 로고
    • Displaced Expertise: Three Constraints on the Policy-Relevance of Criminological Thought
    • (a)
    • Haggerty, Kevin D. (2004a) ‘Displaced Expertise: Three Constraints on the Policy-Relevance of Criminological Thought’, Theoretical Criminology, 8(2): 211-31.
    • (2004) Theoretical Criminology , vol.8 , Issue.2 , pp. 211-231
    • Haggerty, K.D.1
  • 37
    • 8644274889 scopus 로고    scopus 로고
    • Technology and Crime Policy: Reply to Michael Jacobson
    • (b)
    • Haggerty, Kevin D. (2004b) ‘Technology and Crime Policy: Reply to Michael Jacobson’, Theoretical Criminology, 8(4): 491-7.
    • (2004) Theoretical Criminology , vol.8 , Issue.4 , pp. 491-497
    • Haggerty, K.D.1
  • 38
    • 44949091355 scopus 로고    scopus 로고
    • Cambridge: Harvard University Press
    • Hardt, Michael and Antonio Negri (2000) Empire. Cambridge: Harvard University Press.
    • (2000) Empire
    • Hardt, M.1    Negri, A.2
  • 41
    • 0002590183 scopus 로고
    • Postmodernism, or the Cultural Logic of Late Capitalism
    • Jameson, Fredric (1984) ‘Postmodernism, or the Cultural Logic of Late Capitalism’, New Left Review, 146: 53-92.
    • (1984) New Left Review , vol.146 , pp. 53-92
    • Jameson, F.1
  • 43
    • 85145519606 scopus 로고    scopus 로고
    • The State Goes Home: Local Hypervigilance of Children and the Global Retreat from Social Reproduction
    • in T. Monahan (ed.) New York: Routledge
    • Katz, Cindi (2006) ‘The State Goes Home: Local Hypervigilance of Children and the Global Retreat from Social Reproduction’, in T. Monahan (ed.) Surveillance and Security: Technological Politics and Power in Everyday Life, pp. 27-36. New York: Routledge.
    • (2006) Surveillance and Security: Technological Politics and Power in Everyday Life , pp. 27-36
    • Katz, C.1
  • 44
    • 84993741492 scopus 로고    scopus 로고
    • CNET News.com 26 January. Available at
    • Kawamoto, Dawn (2006) ‘ChoicePoint to Pay $15 Million Over Data Leak’, CNET News.com, 26 January. Available at http://news.com.com/ChoicePoint+to+pay+15+million+over+data+leak/2100-7350_3-6031629.html
    • (2006) ChoicePoint to Pay $15 Million Over Data Leak
    • Kawamoto, D.1
  • 46
    • 77957056012 scopus 로고    scopus 로고
    • 40 Million Credit Card Numbers Hacked: Data Breached at Processing Center
    • 18 June Available at
    • Krim, Jonathan and Michael Barbaro (2005) ‘40 Million Credit Card Numbers Hacked: Data Breached at Processing Center’, Washington Post, 18 June, p. A01. Available at http://www.washingtonpost.com/wp-dyn/content/article/2005/06/17/AR2005061701031.html
    • (2005) Washington Post , pp. A01
    • Krim, J.1    Barbaro, M.2
  • 47
    • 33750846673 scopus 로고    scopus 로고
    • The New American School: Preparation for Post-Industrial Discipline
    • Kupchik, Aaron and Torin Monahan (2006) ‘The New American School: Preparation for Post-Industrial Discipline’, British Journal of Sociology of Education, 27(5): 617-31.
    • (2006) British Journal of Sociology of Education , vol.27 , Issue.5 , pp. 617-631
    • Kupchik, A.1    Monahan, T.2
  • 49
    • 0001831248 scopus 로고
    • Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts
    • in W.E. Bijker and John Law (ed.) Cambridge: MIT Press
    • Latour, Bruno (1992) ‘Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts’, in W.E. Bijker and John Law (ed.) Shaping Technology/Building Society: Studies in Sociotechnical Change, pp. 225-58. Cambridge: MIT Press.
    • (1992) Shaping Technology/Building Society: Studies in Sociotechnical Change , pp. 225-258
    • Latour, B.1
  • 51
    • 79953858900 scopus 로고    scopus 로고
    • Technology and Easy Credit Give Identity Thieves an Edge
    • 30 May.
    • Leland, John and Tom Zeller Jr (2006) ‘Technology and Easy Credit Give Identity Thieves an Edge’, New York Times, 30 May. http://www.nytimes.com/2006/05/30/us/30identity.html
    • (2006) New York Times
    • Leland, J.1    Zeller, T.2
  • 53
    • 2642578546 scopus 로고    scopus 로고
    • Technologies, Security, and Privacy in the Post-9/11 European Information Society
    • Levi, Michael and David S. Wall (2004) ‘Technologies, Security, and Privacy in the Post-9/11 European Information Society’, Journal of Law and Society, 31(2): 194-220.
    • (2004) Journal of Law and Society , vol.31 , Issue.2 , pp. 194-220
    • Levi, M.1    Wall, D.S.2
  • 54
    • 13844279761 scopus 로고    scopus 로고
    • Flexible Survivors
    • Martin, Emily (2000) ‘Flexible Survivors’, Cultural Values, 4(4): 512-17.
    • (2000) Cultural Values , vol.4 , Issue.4 , pp. 512-517
    • Martin, E.1
  • 57
    • 33749608076 scopus 로고    scopus 로고
    • Electronic Fortification in Phoenix: Surveillance Technologies and Social Regulation in Residential Communities
    • (a)
    • Monahan, Torin (2006a) ‘Electronic Fortification in Phoenix: Surveillance Technologies and Social Regulation in Residential Communities’, Urban Affairs Review, 42(2): 169-92.
    • (2006) Urban Affairs Review , vol.42 , Issue.2 , pp. 169-192
    • Monahan, T.1
  • 58
    • 85044896560 scopus 로고    scopus 로고
    • Securing the Homeland: Torture, Preparedness, and the Right to Let Die
    • (b)
    • Monahan, Torin (2006b) ‘Securing the Homeland: Torture, Preparedness, and the Right to Let Die’, Social Justice, 33(1): 95-105.
    • (2006) Social Justice , vol.33 , Issue.1 , pp. 95-105
    • Monahan, T.1
  • 60
    • 84993738450 scopus 로고    scopus 로고
    • Available at (accessed 19 October 2008).
    • Murakami Wood, David (2008) I’m Back But Things are Much the Same [Blog]. Available at http://blogs.ncl.ac.uk/blogs/index.php/d.f.j.wood/2008/10/13/i_m_back_but_things_are_much_the_same (accessed 19 October 2008).
    • (2008) I’m Back But Things are Much the Same [Blog]
    • Murakami Wood, D.1
  • 63
    • 65249173826 scopus 로고    scopus 로고
    • Phoenix Police Department 2006 Available at (accessed 5 June 2006)
    • Phoenix Police Department (2006) Identity Theft: Learn to Protect Yourself [Website]. Phoenix Police Department 2006. Available at http://www.ci.phoenix.az.us/POLICE/idthef1.html (accessed 5 June 2006).
    • (2006) Identity Theft: Learn to Protect Yourself [Website]
  • 65
    • 65249132121 scopus 로고    scopus 로고
    • CNN.com 22 May. Available at
    • Reuters (2006) ‘Data on 26.5 Million Veterans Stolen from Home’, CNN.com, 22 May. Available at http://www.cnn.com/2006/US/05/22/vets.data.reut/index.html
    • (2006) Data on 26.5 Million Veterans Stolen from Home
  • 68
    • 84898310069 scopus 로고    scopus 로고
    • Hundreds Are Arrested in U.S. Sweep of Meat Plant
    • 13 May.
    • Saulny, Susan (2008) ‘Hundreds Are Arrested in U.S. Sweep of Meat Plant’, New York Times, 13 May. http://www.nytimes.com/2008/05/13/us/13immig.html
    • (2008) New York Times
    • Saulny, S.1
  • 72
    • 18744394387 scopus 로고    scopus 로고
    • Private Security and Crime Control
    • Singh, Anne-Marie (2005) ‘Private Security and Crime Control’, Theoretical Criminology, 9(2): 153-74.
    • (2005) Theoretical Criminology , vol.9 , Issue.2 , pp. 153-174
    • Singh, A.-M.1
  • 73
    • 84993754039 scopus 로고    scopus 로고
    • Available at Stopijacking.com (accessed 30 June 2006).
    • Stopijacking.com (2006) Stopijacking.com [Website]. Available at Stopijacking.com (accessed 30 June 2006).
    • (2006) Stopijacking.com [Website]
  • 76
    • 84898300951 scopus 로고    scopus 로고
    • Of ID Theft, Paris Hilton, and Methamphetamines
    • 27 May. Available at
    • Vamosi, Robert (2005) ‘Of ID Theft, Paris Hilton, and Methamphetamines’, CNET Reviews, 27 May. Available at http://reviews.cnet.com/4520-3513_7-6231353-1.html
    • (2005) CNET Reviews
    • Vamosi, R.1
  • 77
    • 84993660654 scopus 로고    scopus 로고
    • Deadly Symbiosis: When Ghetto and Prison Meet and Mesh
    • Wacquant, Loïc (2001) ‘Deadly Symbiosis: When Ghetto and Prison Meet and Mesh’, Punishment & Society, 3(1): 95-134.
    • (2001) Punishment & Society , vol.3 , Issue.1 , pp. 95-134
    • Wacquant, L.1
  • 80
    • 53549107174 scopus 로고    scopus 로고
    • Identity Theft and the Care of the Virtual Self
    • Whitson, Jennifer R. and Kevin D. Haggerty (2008) ‘Identity Theft and the Care of the Virtual Self’, Economy and Society, 37(4): 572-94.
    • (2008) Economy and Society , vol.37 , Issue.4 , pp. 572-594
    • Whitson, J.R.1    Haggerty, K.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.