Publication Cover
Politikon
South African Journal of Political Studies
Volume 47, 2020 - Issue 1: Security Infrastructures
461
Views
7
CrossRef citations to date
0
Altmetric
Articles

Between Public and Private: The Co-production of Infrastructural Security

&

References

  • Abrahamsen, Rita, and Anna Leander. 2016. “Introduction.” In Routledge Handbook of Private Security, edited by Anna Leander and Rita Abrahamsen, 1–8. London: Routledge.
  • Abrahamsen, Rita, and Michael C. Williams. 2009. “Security Beyond the State: Global Security Assemblages in International Politics.” International Political Sociology 3 (1): 1–17. doi: 10.1111/j.1749-5687.2008.00060.x
  • Amicelle, Anthony. 2011. “Towards a ‘New’ Political Anatomy of Financial Surveillance.” Security Dialogue 42 (2): 161–178. doi: 10.1177/0967010611401472
  • Aradau, Claudia. 2010. “Security That Matters: Critical Infrastructure and Objects of Protection.” Security Dialogue 41 (5): 491–514. doi: 10.1177/0967010610382687
  • Avant, Deborah. 2005. “Private Security Companies.” New Political Economy 10 (1): 121–131. doi: 10.1080/13563460500031297
  • Balzacq, Thierry, Sarah Leonard, and Jan Ruzicka. 2016. “‘Securitization’ Revisited: Theory and Cases.” International Relations 30 (4): 494–531. doi: 10.1177/0047117815596590
  • Bauman, Zygmunt, Didier Bigo, Paulo Esteves, Elspeth Guild, Vivienne Jabri, David Lyon, and R. B. J. Walker. 2014. “After Snowden: Rethinking the Impact of Surveillance.” International Political Sociology 8 (2): 121–144. doi: 10.1111/ips.12048
  • Betz, David J., and Tim Stevens. 2013. “Analogical Reasoning and Cyber Security.” Security Dialogue 44 (2): 147–164. doi: 10.1177/0967010613478323
  • Burgess, James Peter. 2007. “Social Values and Material Threat: The European Programme for Critical Infrastructure Protection.” International Journal of Critical Infrastructures 3 (3/4): 471–487. doi: 10.1504/IJCIS.2007.014121
  • Buzan, Barry, and Ole Wæver. 2003. Regions and Powers. The Structure of International Security. Cambridge: Cambridge University Press.
  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.
  • Callon, Michel. 1984. “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay.” The Sociological Review 32 (1): 196–233. doi: 10.1111/j.1467-954X.1984.tb00113.x
  • Collier, Stephen J., and Lakoff Andrew 2010. “Infrastructure and Event. The Political Technology of Preparedness.” In Political matter. Technoscience, democracy, and public life, edited by Bruce Braun and Sarah Whatmore. Minneapolis: University of Minnesota Press.
  • de Goede, Marieke. 2012. Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis: University of Minnesota Press.
  • de Goede, Marieke. 2018. “The Chain of Security.” Review of International Studies 44 (1): 24–42. doi: 10.1017/S0260210517000353
  • Engels, Jens Ivo. 2018. Key Concepts for Critical Infrastructure Research. Wiesbaden: Springer Fachmedien.
  • Folkers, Andreas. 2017. “Existential Provisions. The Technopolitics of Public Infrastructure.” Society and Space 35 (5): 855–874.
  • Folkers, Andreas. 2018. “Was ist kritisch an Kritischer Infrastruktur? Kriegswichtigkeit, Lebenswichtigkeit, Systemwichtigkeit und die Infrastrukturen der Kritik.” In Was heißt Kritikalität? Zu einem Schlüsselbegriff der Debatte um Kritische Infrastrukturen, edited by Jens-Ivo Engels and Alfred Nordmann, 123–154. Bielefeld: Transcript.
  • Graham, Stephen, and Alexander Baker. 2016. “Laboratories of Pacification and Permanent War: Israeli-US Collaboration in the Global Making of Policing.” In The Global Making of Policing: Postcolonial Perspectives, edited by Jana Hönke and Markus-Michael Müller, 40–58. London: Routledge.
  • Grassiani, Erella. 2018. “Between Security and Military Identities. The Case of Israeli Security Experts.” Security Dialogue 49 (1-2): 83–95. doi: 10.1177/0967010617747202
  • Halper, Jeff. 2015. War Against the People: Israel, the Palestinians and Global Pacification. London: Pluto Press.
  • Harbers, Hans. 2005. “Epilogue: Political Materials – Material Politics.” In Inside the Politics of Technology. Agency and Normativity in the Co-Production of Technology and Society, edited by Hans Harbers, 257–272. Amsterdam: University Press.
  • Harvey, Penny, Casper Bruun Jensen, and Atsuro Morita. 2017. Infrastructures and Social Complexity: A Companion. London: Routledge/Taylor & Francis Group.
  • Hayes, Ben. 2014. “The Surveillance-Industrial Complex.” In Routledge Handbook of Surveillance Studies. Routledge International Handbooks, edited by Kirstie Ball, Kevin D Haggerty, and David Lyon, 167–175. Abingdon: Routledge.
  • Hever, Shir. 2018. The Privatization of Israeli Security. London: Pluto Press.
  • Hoijtink, Marijn. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. doi: 10.1177/0967010614544312
  • Itai, Davidi. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.
  • Jasanoff, Sheila. 2004. “Ordering Knowledge, Ordering Society.” In States of Knowledge: The Co-Production of Science and Social Order, edited by Sheila Jasanoff, 13–45. New York: Routledge.
  • Joachim, Jutta M., and Andrea Schneiker. 2018. Private Security and Identity Politics: Ethical Hero Warriors, Professional Managers and New Humanitarians. Routledge Private Security Studies. London: Routledge/Taylor & Francis Group.
  • Knoblauch, Hubert. 2005. “Focused Ethnography.” Forum Qualitative Research 6: 3. http://www.qualitative-research.net/index.php/fqs/article/view/20/43#gcit.
  • Krahmann, Elke. 2008. “Security: Collective Good or Commodity?” European Journal of International Relations 14 (3): 379–404. doi: 10.1177/1354066108092304
  • Krahmann, Elke. 2018. “The Market for Ontological Security.” European Security 27 (3): 356–373. doi: 10.1080/09662839.2018.1497983
  • Lakoff, Andrew, and Stephen Collier. 2010. “Infrastructure and Event. The Political Technology of Preparedness.” In Political Matter: Technoscience, Democracy, and Public Life, edited by Bruce Braun and Sarah J. Whatmore, 243–266. Minneapolis: University of Minnesota Press.
  • Langenohl, A. 2019. “Dynamics of Power in Securitization: Towards a Relational Understanding.” In The Power Dynamics of Securitization: From the Early Modern Period until the Present, edited by Andras Langenohl and Regina Kreide, 19–55. Baden-Baden: Nomos Verl.-Ges.
  • Leander, Anna. 2005. “The Market for Force and Public Security: The Destabilizing Consequences of Private Military Companies.” Journal of Peace Research 42 (5): 605–622. doi: 10.1177/0022343305056237
  • Leander, Anna. 2010. “Commercial Security Practices.” In The Routledge Handbook of New Security Studies. Routledge Handbooks, edited by J. Peter Burgess, 208–216. London: Routledge.
  • Leander, Anna, and Rens van Munster. 2007. “Private Security Contractors in the Debate About Darfur: Reflecting and Reinforcing Neo-Liberal Governmentality.” International Relations 21 (2): 201–216. doi: 10.1177/0047117807077004
  • Lindskov Johansen, Katja, and Linda Monsees. 2019. “Co-Production: The Study of Productive Processes at the Level of Materiality and Discourse.” In Technology and Agency in International Relations, edited by Matthias Leese and Marijn Hoijtink, 24–41. London: Routledge.
  • Lyon, David. 2009. Surveillance, Power, and Everyday Life. Oxford: University Press.
  • Machold, Rhys. 2016. “Learning From Israel? ‘26/11’ and the Anti-Politics of Urban Security Governance.” Security Dialogue 47 (4): 275–291. doi: 10.1177/0967010616645019
  • Neocleous, Mark. 2007. “Security, Commodity, Fetishism.” Critique (Clandeboye, Man) 35 (3): 339–355. doi: 10.1080/03017600701676738
  • Nolte, Amina, and Ezgican Ozdemir. 2018. “Infrastructuring Geographies: Histories and Presents in and of the Middle East and North Africa.” META – Middle East – Topics & Arguments 10: 5–20.
  • Reed, John. 2015. “Unit 8200: Israel’s Cyber Spy Agency.” Financial Times, 10 July. https://www.ft.com/content/69f150da-25b8-11e5-bd83-71cb60e8f08c.
  • Schulze, Matthias. 2017. From Cyber-Utopia to Cyber-War. Normative Change in Cyberspace. Unpublished PhD thesis, Friedrich-Schiller-Universität Jena.
  • Simon, Stephanie, and Marieke de Goede. 2015. “Cybersecurity, Bureaucratic Vitalism and European Emergency.” Theory, Culture & Society 32 (2): 79–106. doi: 10.1177/0263276414560415
  • Steele, Wendy, Karen Hussey, and Stephen Dovers. 2017. “What’s Critical About Critical Infrastructure?.” Urban Policy and Research 35 (1): 74–86. doi: 10.1080/08111146.2017.1282857
  • Stevens, Tim. 2016. Cyber Security and the Politics of Time. Cambridge: Cambridge University Press.
  • Stockmarr, Leila. 2016. “Beyond the Laboratory Thesis: Gaza as Transmission Belt for War and Security Technology.” In The Global Making of Policing: Postcolonial Perspectives, edited by Jana Hönke and Markus-Michael Müller, 59–76. London: Routledge.
  • Tabansky, Lior. 2013. “Critical Infrastructure Protection.” International Journal of Cyber Warfare and Terrorism 3 (3): 80–87. doi: 10.4018/ijcwt.2013070106
  • Timber, Craig, and Jay Greene. 2019. “WhatsApp Accuses Israeli Firm of Helping Governments Hack Phones of Journalists, Human Rights Workers.” The Washington Post, October 29. https://www.washingtonpost.com/technology/2019/10/29/whatsapp-accuses-israeli-firm-helping-governments-hack-phones-journalists-human-rights-workers/.
  • Tomer, Avishai. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.
  • Volinz, Lior. 2018. “Governance Through Pluralization. Jerusalem’s Modular Security Provision.” Security Dialogue 49 (6): 438–456. doi: 10.1177/0967010618789758
  • Wakefield, Stephanie. 2018. “Infrastructures of Liberal Life: From Modernity and Progress to Resilience and Ruins.” Geography Compass 12 (7): 1–14. doi: 10.1111/gec3.12377
  • Weiss, Lior. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.