-
1
-
-
77952583288
-
-
Salter MB, ed. Minneapolis, MN and London: University of Minnesota Press
-
Adey PPolitics at the Airport. Salter MB, ed. Minneapolis, MN and London: University of Minnesota Press; 2008:145-160.
-
(2008)
Politics at the Airport
, pp. 145-160
-
-
Adey, P.1
-
2
-
-
84910625096
-
-
Airports Council International/Association of European Airlines (ACI/AEA) (2011) Joint briefing aviation security: 10 years on from 9/11. Available at: (accessed 30 April 2014)
-
Airports Council International/Association of European Airlines (ACI/AEA) (2011) Joint briefing aviation security: 10 years on from 9/11. Available at: http://files.aea.be/News/Joint_ACI_AEA.pdf (accessed 30 April 2014).
-
-
-
-
3
-
-
33645889328
-
Biometric borders: Governing mobilities in the War on Terror
-
Amoore L.Biometric borders: Governing mobilities in the War on Terror.Political Geography. 2006;25 (3): 336-351
-
(2006)
Political Geography
, vol.25
, Issue.3
, pp. 336-351
-
-
Amoore, L.1
-
4
-
-
82355191258
-
Data derivatives: On the emergence of a security risk calculus for our times
-
Amoore L.Data derivatives: On the emergence of a security risk calculus for our times.Theory, Culture & Society. 2011;28 (6): 24-43
-
(2011)
Theory, Culture & Society
, vol.28
, Issue.6
, pp. 24-43
-
-
Amoore, L.1
-
6
-
-
27144506216
-
Governance, risk and dataveillance in the War on Terror
-
Amoore L,De Goede M.Governance, risk and dataveillance in the War on Terror.Crime, Law and Social Change. 2005;43 (2): 149-173
-
(2005)
Crime, Law and Social Change
, vol.43
, Issue.2
, pp. 149-173
-
-
Amoore, L.1
De Goede, M.2
-
7
-
-
78649469173
-
Preemption, precaution, preparedness: Anticipatory action and future geographies
-
Anderson B.Preemption, precaution, preparedness: Anticipatory action and future geographies.Progress in Human Geography. 2010;34 (6): 777-798
-
(2010)
Progress in Human Geography
, vol.34
, Issue.6
, pp. 777-798
-
-
Anderson, B.1
-
8
-
-
82355191259
-
Governing events and life: ‘Emergency’ in UK Civil Contingencies
-
Anderson B,Adey P.Governing events and life: ‘Emergency’ in UK Civil Contingencies.Political Geography. 2012;31 (1): 24-33
-
(2012)
Political Geography
, vol.31
, Issue.1
, pp. 24-33
-
-
Anderson, B.1
Adey, P.2
-
9
-
-
84910664261
-
The end of theory: The data deluge makes the scientific method obsolete. Wired
-
AndersonC Available at
-
AndersonC (2008) The end of theory: The data deluge makes the scientific method obsolete. Wired, 16July. Available at: http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory.
-
(2008)
16July
-
-
-
10
-
-
84864707850
-
-
,,. Hildebrandt MGutwirth S, ed. Dordrecht/London: Springer Science/Business Media BV
-
Anrig B,Browne W,Gasson MProfiling the European Citizen: Cross-disciplinary Perspectives. Hildebrandt MGutwirth S, ed. Dordrecht/London: Springer Science/Business Media BV; 2008:65-88.
-
(2008)
Profiling the European Citizen: Cross-disciplinary Perspectives
, pp. 65-88
-
-
Anrig, B.1
Browne, W.2
Gasson, M.3
-
11
-
-
33847333250
-
Governing terrorism through risk: Taking precautions, (un)knowing the future
-
Aradau C,Van Munster R.Governing terrorism through risk: Taking precautions, (un)knowing the future.European Journal of International Relations. 2007;13 (1): 89-115
-
(2007)
European Journal of International Relations
, vol.13
, Issue.1
, pp. 89-115
-
-
Aradau, C.1
Van Munster, R.2
-
13
-
-
18644383132
-
The terrorist threat: World risk society revisited
-
Beck U.The terrorist threat: World risk society revisited.Theory, Culture & Society. 2002;19 (4): 39-55
-
(2002)
Theory, Culture & Society
, vol.19
, Issue.4
, pp. 39-55
-
-
Beck, U.1
-
14
-
-
85049948963
-
A different view on the ‘making’ of European security: The EU Passenger Name Record system as a socio-technical assemblage
-
Bellanova R,Duez D.A different view on the ‘making’ of European security: The EU Passenger Name Record system as a socio-technical assemblage.European Foreign Affairs Review. 2012;17 (2/1): 109-124
-
(2012)
European Foreign Affairs Review
, vol.17
, Issue.2-1
, pp. 109-124
-
-
Bellanova, R.1
Duez, D.2
-
15
-
-
34547446522
-
-
Zureik ESalter MB, ed. Cullompton and Portland, OR: Willan
-
Bennett CJGlobal Surveillance and Policing: Borders, Security, Identity. Zureik ESalter MB, ed. Cullompton and Portland, OR: Willan; 2005:113-138.
-
(2005)
Global Surveillance and Policing: Borders, Security, Identity
, pp. 113-138
-
-
Bennett, C.J.1
-
16
-
-
84861687292
-
Planning for the worst: Risk, uncertainty and the Olympic Games
-
Boyle P,Haggerty KD.Planning for the worst: Risk, uncertainty and the Olympic Games.The British Journal of Sociology. 2012;63 (2): 241-259
-
(2012)
The British Journal of Sociology
, vol.63
, Issue.2
, pp. 241-259
-
-
Boyle, P.1
Haggerty, K.D.2
-
17
-
-
29344464078
-
The epistemology and ontology of human–computer interaction
-
Brey P.The epistemology and ontology of human–computer interaction.Minds and Machines. 2005;15 (3/4): 383-398
-
(2005)
Minds and Machines
, vol.15
, Issue.3-4
, pp. 383-398
-
-
Brey, P.1
-
19
-
-
77958482604
-
An analysis of the impact of passenger profiling for transportation security
-
Cavusoglu H,Byungwan K,Raghunathan S.An analysis of the impact of passenger profiling for transportation security.Operations Research. 2010;58 (5): 1287-1302
-
(2010)
Operations Research
, vol.58
, Issue.5
, pp. 1287-1302
-
-
Cavusoglu, H.1
Byungwan, K.2
Raghunathan, S.3
-
20
-
-
82555193413
-
A new algorithmic identity: Soft biopolitics and the modulation of control
-
Cheney-Lippold J.A new algorithmic identity: Soft biopolitics and the modulation of control.Theory, Culture & Society. 2011;28 (6): 164-181
-
(2011)
Theory, Culture & Society
, vol.28
, Issue.6
, pp. 164-181
-
-
Cheney-Lippold, J.1
-
21
-
-
72249116274
-
Topologies of power: Foucault’s analysis of political government beyond ‘governmentality’
-
Collier S J.Topologies of power: Foucault’s analysis of political government beyond ‘governmentality’.Theory, Culture & Society. 2009;26 (6): 78-108
-
(2009)
Theory, Culture & Society
, vol.26
, Issue.6
, pp. 78-108
-
-
Collier, S.J.1
-
22
-
-
47749125354
-
Money, media and the anti-politics of terrorist finance
-
De Goede M.Money, media and the anti-politics of terrorist finance.European Journal of Cultural Studies. 2008;11 (3): 289-310
-
(2008)
European Journal of Cultural Studies
, vol.11
, Issue.3
, pp. 289-310
-
-
De Goede, M.1
-
24
-
-
76649093905
-
Identity, profiling algorithms and a world of ambient intelligence
-
De Vries K.Identity, profiling algorithms and a world of ambient intelligence.Ethics and Information Technology. 2010;12 (1): 71-85
-
(2010)
Ethics and Information Technology
, vol.12
, Issue.1
, pp. 71-85
-
-
De Vries, K.1
-
25
-
-
0002913383
-
Postscript on the societies of control
-
Deleuze G.Postscript on the societies of control.October. 1992;59:3-7
-
(1992)
October
, vol.59
, pp. 3-7
-
-
Deleuze, G.1
-
26
-
-
84910631200
-
-
DiakopoulosN (2013) Rage against the algorithms. The Atlantic, 3October. Available at: (accessed 30 April 2014)
-
DiakopoulosN (2013) Rage against the algorithms. The Atlantic, 3October. Available at: http://www.theatlantic.com/technology/archive/2013/10/rage-against-the-algorithms/280255 (accessed 30 April 2014).
-
-
-
-
28
-
-
42949118751
-
Biopolitics of security in the 21st century: An introduction
-
Dillon M,Lobo-Guerrero L.Biopolitics of security in the 21st century: An introduction.Review of International Studies. 2008;34 (2): 265-292
-
(2008)
Review of International Studies
, vol.34
, Issue.2
, pp. 265-292
-
-
Dillon, M.1
Lobo-Guerrero, L.2
-
33
-
-
84910615060
-
-
European Commission (2011b) High Level Conference ‘Protecting Civil Aviation Against Terrorism’, Brussels, 27 September 2011, conclusions and recommendations. Available at: (accessed 30 April 2014)
-
European Commission (2011b) High Level Conference ‘Protecting Civil Aviation Against Terrorism’, Brussels, 27 September 2011, conclusions and recommendations. Available at: http://ec.europa.eu/transport/modes/air/events/doc/2011–09–27-avsec-conclusions.pdf (accessed 30 April 2014).
-
-
-
-
42
-
-
76649119461
-
Engaging rational discrimination: Exploring reasons for placing regulatory constraints on decision support systems
-
Gandy OH.Engaging rational discrimination: Exploring reasons for placing regulatory constraints on decision support systems.Ethics and Information Technology. 2010;12 (1): 29-42
-
(2010)
Ethics and Information Technology
, vol.12
, Issue.1
, pp. 29-42
-
-
Gandy, O.H.1
-
43
-
-
85019669708
-
-
,,,. Custer BCalders TSchermer BZarsky T, ed. Heidelberg, New York, Dordrecht and London: Springer
-
Gellert R,De Vries K,De Hert P,Gutwirth SDiscrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases. Custer BCalders TSchermer BZarsky T, ed. Heidelberg, New York, Dordrecht and London: Springer; 2013:61-89.
-
(2013)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases
, pp. 61-89
-
-
Gellert, R.1
De Vries, K.2
De Hert, P.3
Gutwirth, S.4
-
44
-
-
84910639096
-
-
GeyerF (2008) Taking stock: Databases and systems of information exchange in the area of freedom, security and justice. Challenge Research Paper No. 9. Available at: (accessed 24 June 2014)
-
GeyerF (2008) Taking stock: Databases and systems of information exchange in the area of freedom, security and justice. Challenge Research Paper No. 9. Available at: http://www.libertysecurity.org/IMG/pdf_Databases_and_Systems_of_Information_Exchange_in_the_Area_of_Freedom_Security_and_Justice.pdf (accessed 24 June 2014).
-
-
-
-
45
-
-
84894276563
-
-
Gillespie TBoczkowski PFoot K, ed. Cambridge, MA: MIT Press
-
Gillespie TMedia Technologies: Essays on Communication, Materiality, and Society. Gillespie TBoczkowski PFoot K, ed. Cambridge, MA: MIT Press; 2014:167-194.
-
(2014)
Media Technologies: Essays on Communication, Materiality, and Society
, pp. 167-194
-
-
Gillespie, T.1
-
46
-
-
84910639472
-
-
González FusterGGutwirthSEllyneE (2010) Profiling in the European Union: A high-risk practice. INEX Policy Brief 10. Available at: (accessed 30 April 2014)
-
González FusterGGutwirthSEllyneE (2010) Profiling in the European Union: A high-risk practice. INEX Policy Brief 10. Available at: http://www.ceps.eu/ceps/dld/3474/pdf (accessed 30 April 2014).
-
-
-
-
49
-
-
34548656278
-
-
Goold BJLazarus L, ed. Oxford and Portland, OR: Hart Publishing
-
Harcourt BESecurity and Human Rights. Goold BJLazarus L, ed. Oxford and Portland, OR: Hart Publishing; 2007:73-98.
-
(2007)
Security and Human Rights
, pp. 73-98
-
-
Harcourt, B.E.1
-
50
-
-
84910665840
-
-
HarrisSSchneierB (2012) To profile or not to profile? A debate between Sam Harris and Bruce Schneier, 25 May. Available at: (accessed 30 April 2014)
-
HarrisSSchneierB (2012) To profile or not to profile? A debate between Sam Harris and Bruce Schneier, 25 May. Available at: http://www.samharris.org/blog/item/to-profile-or-not-to-profile (accessed 30 April 2014).
-
-
-
-
53
-
-
84910630604
-
-
International Air Transport Association (IATA) (2011) Checkpoint of the future executive summary. Available at: (accessed 30 April 2014)
-
International Air Transport Association (IATA) (2011) Checkpoint of the future executive summary. Available at: https://www.iata.org/whatwedo/security/Documents/cof-executive-summary.pdf (accessed 30 April 2014).
-
-
-
-
54
-
-
84910612548
-
-
International Civil Aviation Organization (ICAO) (2012) Communiqué of the ICAO High Level Conference on Aviation Security, Montréal, 12 to 14 November 2012. Available at: (accessed 30 April 2014)
-
International Civil Aviation Organization (ICAO) (2012) Communiqué of the ICAO High Level Conference on Aviation Security, Montréal, 12 to 14 November 2012. Available at: http://www.icao.int/Meetings/avsecconf/Documents/HLCAS%20-%20Communique%2014%20September%202012.pdf (accessed 30 April 2014).
-
-
-
-
57
-
-
84885303200
-
Blurring the dimensions of privacy? Law enforcement and trusted traveler programs
-
Leese M.Blurring the dimensions of privacy? Law enforcement and trusted traveler programs.Computer Law & Security Review. 2013;29 (5): 480-490
-
(2013)
Computer Law & Security Review
, vol.29
, Issue.5
, pp. 480-490
-
-
Leese, M.1
-
59
-
-
33745804987
-
Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context
-
Lyon D.Airport screening, surveillance, and social sorting: Canadian responses to 9/11 in context.Canadian Journal of Criminology and Criminal Justice. 2006;48 (3): 397-411
-
(2006)
Canadian Journal of Criminology and Criminal Justice
, vol.48
, Issue.3
, pp. 397-411
-
-
Lyon, D.1
-
61
-
-
77955628942
-
Risk-based policies for airport security checkpoint screening
-
McLay LA,Lee AJ,Jacobson SH.Risk-based policies for airport security checkpoint screening.Transportation Science. 2010;44 (3): 333-349
-
(2010)
Transportation Science
, vol.44
, Issue.3
, pp. 333-349
-
-
McLay, L.A.1
Lee, A.J.2
Jacobson, S.H.3
-
62
-
-
84910681179
-
-
ManyikaJChuiMBrownB. (2011) Big data: The next frontier for innovation, competition, and productivity. Available at: (accessed 30 April 2014)
-
ManyikaJChuiMBrownB. (2011) Big data: The next frontier for innovation, competition, and productivity. Available at: http://www.mckinsey.com/~/media/McKinsey/dotcom/Insights%20and%20pubs/MGI/Research/Technology%20and%20Innovation/Big%20Data/MGI_big_data_full_report.ashx (accessed 30 April 2014).
-
-
-
-
63
-
-
57349126835
-
A formula for disaster: The Department of Homeland Security’s virtual ontology
-
Martin L,Simon S.A formula for disaster: The Department of Homeland Security’s virtual ontology.Space and Polity. 2008;12 (3): 281-296
-
(2008)
Space and Polity
, vol.12
, Issue.3
, pp. 281-296
-
-
Martin, L.1
Simon, S.2
-
64
-
-
84955195336
-
The model gap: Cognitive systems in security applications and their ethical implications
-
Matzner T.The model gap: Cognitive systems in security applications and their ethical implications.AI & Society. 2013 2013;:
-
(2013)
AI & Society
-
-
Matzner, T.1
-
65
-
-
77951288021
-
Borders, risks, exclusions
-
Muller B.Borders, risks, exclusions.Studies in Social Justice. 2009;3 (1): 67-78
-
(2009)
Studies in Social Justice
, vol.3
, Issue.1
, pp. 67-78
-
-
Muller, B.1
-
67
-
-
84992806612
-
Theorizing cross-border mobility: Surveillance, security and identity
-
Pallitto R,Heyman J.Theorizing cross-border mobility: Surveillance, security and identity.Surveillance & Society. 2008;5 (3): 315-333
-
(2008)
Surveillance & Society
, vol.5
, Issue.3
, pp. 315-333
-
-
Pallitto, R.1
Heyman, J.2
-
69
-
-
1342268712
-
Passports, mobility, and security: How smart can the border be?
-
Salter MB.Passports, mobility, and security: How smart can the border be?.International Studies Perspectives. 2004;5 (1): 71-91
-
(2004)
International Studies Perspectives
, vol.5
, Issue.1
, pp. 71-91
-
-
Salter, M.B.1
-
70
-
-
41049112658
-
Imagining numbers: Risk, quantification, and aviation security
-
Salter MB.Imagining numbers: Risk, quantification, and aviation security.Security Dialogue. 2008;39 (2–3): 243-266
-
(2008)
Security Dialogue
, vol.39
, Issue.2-3
, pp. 243-266
-
-
Salter, M.B.1
-
73
-
-
84885997487
-
Governmental data mining and its alternatives
-
Zarsky TZ.Governmental data mining and its alternatives.Penn State Law Review. 2011;116 (2): 285-330
-
(2011)
Penn State Law Review
, vol.116
, Issue.2
, pp. 285-330
-
-
Zarsky, T.Z.1
-
74
-
-
33745803880
-
Neither safe nor sound? The perils and possibilities of risk
-
Zedner L.Neither safe nor sound? The perils and possibilities of risk.Canadian Journal of Criminology & Criminal Justice. 2006;48 (3): 423-434
-
(2006)
Canadian Journal of Criminology & Criminal Justice
, vol.48
, Issue.3
, pp. 423-434
-
-
Zedner, L.1
|