65
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Solidarity through service: the role of the guild of IT service managers in the field of European (in)security

ORCID Icon

References

  • Adler-Nissen, R. 2016. “Towards a Practice Turn in EU Studies: The Everyday of European Integration.” JCMS: Journal of Common Market Studies 54 (1): 87–103. https://doi.org/10.1111/jcms.12329.
  • Amicelle, A., C. Aradau, and J. Jeandesboz. 2015. “Questioning Security Devices: Performativity, Resistance, Politics.” Security Dialogue 46 (4): 293–306. https://doi.org/10.1177/0967010615586964.
  • Amoore, L., and M. de Goede. 2005. “Governance, Risk and Dataveillance in the War on Terror.” Crime, Law & Social Change 43 (2–3): 149–173. https://doi.org/10.1007/s10611-005-1717-8.
  • Amoore, L., and R. Raley. 2017. “Securing with Algorithms: Knowledge, Decision, Sovereignty.” Security Dialogue 48 (1): 3–10. https://doi.org/10.1177/0967010616680753.
  • Ansorge, J. T. 2016. Identify and Sort: How Digital Power Changed World Politics. Oxford: Oxford University Press.
  • Aradau, C. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7 (4): 388–413. https://doi.org/10.1057/palgrave.jird.1800030.
  • Aradau, C., and T. Blanke. 2015. “The (Big) Data-Security Assemblage: Knowledge and Critique.” Big Data & Society 2 (2): 1–15. https://doi.org/10.1177/2053951715609066.
  • Aradau, C., and E. Mc Cluskey. 2022. “Making Digital Surveillance Unacceptable: Security, Democracy and the Political Sociology of Disputes.” International Political Sociology 16 (1): 1–19. https://doi.org/10.1093/ips/olab024.
  • Austin, J. L., and P. Beaulieu-Brossard. 2017. “(De)securitisation Dilemmas: Theorising the Simultaneous Enactment of Securitisation and Desecuritisation.” Review of International Studies 44 (2): 301–323. https://doi.org/10.1017/S0260210517000511.
  • Axelos. 2011. ITIL Glossary and Abbreviations English. Accessed July 18, 2022. https://www.axelos.com/corporate/media/files/glossaries/itil_2011_glossary_gb-v1-0.pdf.
  • Bellanova, R., and M. de Goede. 2021. “Co-Producing Security: Platform Content Moderation and European Security Integration.” Journal of Common Market Studies 60 (5): 1316–1334. https://doi.org/10.1111/jcms.13306.
  • Bellanova, R., and G. Glouftsios. 2022. “Controlling the Schengen Information System (SIS II): The Infrastructural Politics of Fragility and Maintenance.” Geopolitics 27 (1): 160–184. https://doi.org/10.1080/14650045.2020.1830765.
  • Bellanova, R., K. Lindskov Jacobsen, and L. Monsees. 2020. “Taking the Trouble: Science, Technology and Security Studies.” Critical Studies on Security 8 (2): 87–100. https://doi.org/10.1080/21624887.2020.1839852.
  • Bernasconi, R. 2014. “Supplement.” In Jacques Derrida Key Concepts, edited by C. Colebrook, 19–22. London: Routledge.
  • Bigo, D. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives: Global, Local, Political 27 (February): 63–92. https://doi.org/10.1177/03043754020270S105.
  • Bigo, D. 2006. “Globalized-In-Security: The Field and the Ban-Opticon.” In Translation, Biopolitics and Colonial Difference, edited by N. Sakai and J. Solomon, A. McKnight. edited by. 109–156. Hong Kong: University of Hong Kong Press.
  • Bigo, D. 2013. “International Political Sociology.” In Security Studies: An Introduction, edited by P. D. Williams, 117–128. 2nd ed. London and New York: Routledge.
  • Bigo, D. 2014a. “The (In)securitization Practices of the Three Universes of EU Border Control: Military/Navy – Border Guards/Police – Database Analysts.” Security Dialogue 45 (3): 209–225. https://doi.org/10.1177/0967010614530459.
  • Bigo, D. 2014b. “Afterword. Security: Encounters, Misunderstandings and Possible Collaborations.” In Anthropology of Security: Perspectives from the Frontline of Policing, Counter-Terrorism and Border Control, edited by M. Maguire, C. Frois, and N. Zurawski, 189–205. London: Pluto Press.
  • Bigo, D. 2016. “Sociology of Transnational Guilds.” International Political Sociology 10 (4): 398–416. https://doi.org/10.1093/ips/olw022.
  • Bigo, D. 2020. “The Socio-Genesis of a Guild of ‘Digital technologies’ Justifying Transnational Interoperable Databases in the Name of Security and Border Purposes: A Reframing of the Field of Security Professionals?” International Journal Migration and Border Studies 6 (1/2): 74–92. https://doi.org/10.1504/IJMBS.2020.108689.
  • Bigo D., L. Bonelli, D. Chi, and C. Olsson. 2007. “Mapping the Field of the EU Internal Security Agencies.” WP2 Challenge.https://didierbigo.com/wp-content/uploads/2016/03/Mapping.pdf.
  • Bigo, D., and M. C. Emma. 2018. “What is a PARIS Approach to (In)securitization? Political Anthropological Research for International Sociology.” In The Oxford Handbook of International Security, edited by A. Gheciu and W. C. Wohlforth, 116–130. Oxford: Oxford University Press.
  • Bigo, D., L. Ewert, and E. Mendos Kuskonmaz. 2020. “The Interoperability Controversy or How to Fail Successfully: Lessons from Europe.” International Journal of Migration and Border Studies 6 (1/2): 93–114. https://doi.org/10.1504/IJMBS.2020.108687.
  • Bogner, A., and M. Wolfgang. 2009. “The Theory-Generating Expert Interview: Epistemological Interest, Forms of Knowledge, Interaction.” In Interviewing Experts, edited by A. Bogner, B. Littig, and W. Menz, 43–80. London: Palgrave Macmillan.
  • Bourbeau, P., and J. A. Vuori. 2015. “Security, Resilience and Desecuritization: Multidirectional Moves and Dynamics.” Critical Studies on Security 3 (3): 253–268. https://doi.org/10.1080/21624887.2015.1111095.
  • Bourne, M., H. Johnson, and D. Lisle. 2015. “Laboratizing the Border: The Production, Translation and Anticipation of Security Technologies.” Security Dialogue 46 (4): 307–325. https://doi.org/10.1177/0967010615578399.
  • Bowen, G. A. 2009. “Document Analysis as a Qualitative Research Method.” Qualitative Research Journal 9 (2): 27–40. https://doi.org/10.3316/QRJ0902027.
  • Bueger, C. 2016. “Practice.” In Routledge Handbook of International Political Sociology, edited by X. Guillaume and P. Bilgin, 328–337. Oxon and New York: Routledge.
  • Bueger, C., and M. Manuel. 2014. “Proximity.” In Critical Security Methods: New Frameworks for Analysis, edited by C. Aradau, J. Huysmans, A. Neal, and N. Voelckner, 118–141. London: Routledge.
  • Buzan, B., W. Ole, and J. de Wilde. 1998. Security: A New Framework for Analysis. Colorado and London: Lynne Rienner Publishers.
  • Carrera, S., and N. Hernanz. 2015. “Re-Framing Mobility and Identity Controls: The Next Generation of the EU Migration Management Toolkit.” Journal of Borderlands Studies 30 (1): 69–84. https://doi.org/10.1080/08865655.2015.1012737.
  • Cavelty, M.D., and M. Leese. 2018. “Politicising Security at the Boundaries: Privacy in Surveillance and Cybersecurity.” European Review of International Studies 5 (3): 49–69. https://doi.org/10.3224/eris.v5i3.03.
  • Cronholm, S., H. Göbel, and M. Åkesson. 2020. “ITIL Compliance with Service-Dominant Logic.” E-Service Journal 11 (2): 74–97. https://doi.org/10.2979/eservicej.11.2.03.
  • De Goede, M. 2020. “Engagement All the Way Down.” Critical Studies on Security 8 (2): 101–115. https://doi.org/10.1080/21624887.2020.1792158.
  • eu-LISA. 2014. eu-LISA Annual Activity Report 2013. Accessed July 18, 2022. https://www.eulisa.europa.eu/Publications/Corporate/ELAA13001ENC.pdf.
  • eu-LISA. 2016. eu-LISA Single Programming Document 2017-2019. Accessed November 24, 2022. https://www.eulisa.europa.eu/Publications/Corporate/eu-LISA%20Single%20Programming%20Document%202017-2019.pdf.
  • eu-LISA. 2021. eu-LISA Consolidated Annual Activity Report 2020. Accessed July 17, 2022. https://www.eulisa.europa.eu/Publications/Corporate/eu-LISA%20Annual%20Activity%20Report%202020.pdf.
  • eu-LISA. 2022. eu-LISA Consolidated Annual Activity Report 2021. Accessed July 19, 2022. https://www.eulisa.europa.eu/Publications/Corporate/eu-LISA%20Annual%20Activity%20Rep9ort%202021.pdf.
  • European Commission. 2016. Independent External Evaluation of the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice – eu-LISA. Brussels: Unit B3 Information Systems for Borders & Security.
  • Gallacher, L., and H. Morris. 2012. ITIL Foundation Exam Study Guide. West Sussex: John Wiley & Sons, Ltd.
  • Glouftsios, G. 2021a. Engineering Digitised Borders. Designing and Managing the Visa Information System. Singapore: Palgrave Macmillan.
  • Glouftsios, G. 2021b. “Governing Border Security Infrastructures: Maintaining Large-Scale Information Systems.” Security Dialogue 52 (5): 452–270. https://doi.org/10.1177/0967010620957230.
  • Glouftsios, G., and S. Scheel. 2021. “An Inquiry into the Digitisation of Border and Migration Management: Performativity, Contestation and Heterogeneous Engineering.” Third World Quarterly 42 (1): 123–140. https://doi.org/10.1080/01436597.2020.1807929.
  • Guittet, E.-P., and J. Julien. 2010. “Security Technologies.” In The Routledge Handbook of New Security Studies, edited by P. J. Burgess, 229–239. London and New York: Routledge.
  • Huysmans, J. 1998. “The Question of the Limit: Desecuritisation and the Aesthetics of Horror in Political Realism.” Millennium: Journal of International Studies 27 (3): 569–589. https://doi.org/10.1177/03058298980270031301.
  • Huysmans, J. 2006. The Politics of Insecurity. Fear, Migration and Asylum in the EU. London and New York: Routledge.
  • Jeandesboz, J. 2016. “Smartening Border Security in the European Union: An Associational Inquiry.” Security Dialogue 47 (4): 292–309. https://doi.org/10.1177/0967010616650226.
  • Karine, C.-B., F. Infantino, and M. B. Salter. 2014. “Border Security as Practice: An Agenda for Research.” Security Dialogue 45 (3): 195–208. https://doi.org/10.1177/0967010614533243.
  • Leander, A. 2005. “The Market for Force and Public Security: The Destabilizing Consequences of Private Military Companies.” Journal of Peace Research 42 (5): 605–622. https://doi.org/10.1177/0022343305056237.
  • Leese, M. 2015. “‘We Were Taken by surprise’: Body Scanners, Technology Adjustment, and the Eradication of Failure.” Critical Studies of Security 3 (3): 269–282. https://doi.org/10.1080/21624887.2015.1124743.
  • Lemberg-Pedersen, M. 2013. “Private Security Companies and the European Borderscapes.” In The Migration Industry and the Commercialization of International Migration, edited by T. Gammeltoft-Hansen and N. N. Sorensen, 152–172. London: Routledge.
  • Mauricio, M., and L. M. Kolbe. 2011. “Impact of IT Service Management Frameworks on the IT Organization. An Empirical Study on Benefits, Challenges and Processes.” Business & Information Systems Engineering 3 (1): 5–18. https://doi.org/10.1007/s12599-010-0141-5.
  • Montesinos Coleman L., Rosenow D. 2016. “Security (Studies) and the Limits of Critique: Why We Should Think Through Struggle.” Critical Studies on Security 4 (2): 202–220. https://doi.org/10.1080/21624887.2016.1174807.
  • Murphy Maguire, E. 2023. “Security-As-Service in the Management of European Border Data Infrastructures.” Journal of Common Market Studies. https://doi.org/10.1111/jcms.13543.
  • Neal, A. 2009. “Securitization and Risk at the EU Border: The Origins of FRONETX.” Journal of Common Market Studies 47 (2): 333–356. https://doi.org/10.1111/j.1468-5965.2009.00807.x.
  • Pouliot, V. 2014. “Practice Tracing.” In Process Tracing. From Metaphor to Analytical Tool, edited by B. Andrew and J. T. Checkel, 237–259. Cambridge: Cambridge University Press.
  • Rita, A., and M. C. Williams. 2009. “Security Beyond the State: Global Security Assemblages in International Politics.” International Political Sociology 3 (1): 1–17. https://doi.org/10.1111/j.1749-5687.2008.00060.x.
  • Scheel, S. 2022. “Reconfiguring Desecuritization: Contesting Expert Knowledge in the Securitization of Migration.” Geopolitics 27 (4): 1042–1068. https://doi.org/10.1080/14650045.2020.1774749.
  • Schwell, A. 2020. “Navigating Difficult Terrain.” In Secrecy and Methods in Security Research. A Guide to Qualitative Fieldwork, edited by M. Goede, E. Bosma, and P. Pallister-Wilkins, 80–96. Oxon: Routledge.
  • Stoian, V. 2020. “A Rawlsian Account of de-Securitisation: Securitising and de-Securitising Corruption in Romania.” Critical Studies on Security 8 (1): 15–27. https://doi.org/10.1080/21624887.2019.1685294.
  • Trauttmansdorff, P., and U. Felt. 2023. “Between Infrastructural Experimentation and Collective Imagination: The Digital Transformation of the EU Border Regime.” Science, Technology, & Human Values 48 (3): 635–662. https://doi.org/10.1177/01622439211057523.
  • Tsianos, V. S., and B. Kuster. 2016. “Eurodac in Times of Bigness: The Power of Big Data within the Emerging European IT Agency.” Journal of Borderlands Studies 31 (2): 235–249. https://doi.org/10.1080/08865655.2016.1174606.
  • Villumsen Berling, T. 2011. “Science and Securitization: Objectivation, the Authority of the Speaker and Mobilization of Scientific Facts.” Security Dialogue 42 (4–5): 385–379. https://doi.org/10.1177/0967010611418714.
  • Wæver, O. 1995. “Securitization and Desecuritization.” In On Security, edited by R. Lipschultz, 46–86. New York: Columbia University Press.
  • Winniford, M., S. Conger, and L. Erickson-Harris. 2009. “Confusion in the Ranks: IT Service Management Practice and Terminology.” Information Systems Management 26 (2): 153–163. https://doi.org/10.1080/10580530902797532.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.