References
- Abrahamsen, Rita, and Anna Leander. 2016. “Introduction.” In Routledge Handbook of Private Security, edited by Anna Leander and Rita Abrahamsen, 1–8. London: Routledge.
- Abrahamsen, Rita, and Michael C. Williams. 2009. “Security Beyond the State: Global Security Assemblages in International Politics.” International Political Sociology 3 (1): 1–17. doi: 10.1111/j.1749-5687.2008.00060.x
- Amicelle, Anthony. 2011. “Towards a ‘New’ Political Anatomy of Financial Surveillance.” Security Dialogue 42 (2): 161–178. doi: 10.1177/0967010611401472
- Aradau, Claudia. 2010. “Security That Matters: Critical Infrastructure and Objects of Protection.” Security Dialogue 41 (5): 491–514. doi: 10.1177/0967010610382687
- Avant, Deborah. 2005. “Private Security Companies.” New Political Economy 10 (1): 121–131. doi: 10.1080/13563460500031297
- Balzacq, Thierry, Sarah Leonard, and Jan Ruzicka. 2016. “‘Securitization’ Revisited: Theory and Cases.” International Relations 30 (4): 494–531. doi: 10.1177/0047117815596590
- Bauman, Zygmunt, Didier Bigo, Paulo Esteves, Elspeth Guild, Vivienne Jabri, David Lyon, and R. B. J. Walker. 2014. “After Snowden: Rethinking the Impact of Surveillance.” International Political Sociology 8 (2): 121–144. doi: 10.1111/ips.12048
- Betz, David J., and Tim Stevens. 2013. “Analogical Reasoning and Cyber Security.” Security Dialogue 44 (2): 147–164. doi: 10.1177/0967010613478323
- Burgess, James Peter. 2007. “Social Values and Material Threat: The European Programme for Critical Infrastructure Protection.” International Journal of Critical Infrastructures 3 (3/4): 471–487. doi: 10.1504/IJCIS.2007.014121
- Buzan, Barry, and Ole Wæver. 2003. Regions and Powers. The Structure of International Security. Cambridge: Cambridge University Press.
- Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.
- Callon, Michel. 1984. “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay.” The Sociological Review 32 (1): 196–233. doi: 10.1111/j.1467-954X.1984.tb00113.x
- Collier, Stephen J., and Lakoff Andrew 2010. “Infrastructure and Event. The Political Technology of Preparedness.” In Political matter. Technoscience, democracy, and public life, edited by Bruce Braun and Sarah Whatmore. Minneapolis: University of Minnesota Press.
- de Goede, Marieke. 2012. Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis: University of Minnesota Press.
- de Goede, Marieke. 2018. “The Chain of Security.” Review of International Studies 44 (1): 24–42. doi: 10.1017/S0260210517000353
- Engels, Jens Ivo. 2018. Key Concepts for Critical Infrastructure Research. Wiesbaden: Springer Fachmedien.
- Folkers, Andreas. 2017. “Existential Provisions. The Technopolitics of Public Infrastructure.” Society and Space 35 (5): 855–874.
- Folkers, Andreas. 2018. “Was ist kritisch an Kritischer Infrastruktur? Kriegswichtigkeit, Lebenswichtigkeit, Systemwichtigkeit und die Infrastrukturen der Kritik.” In Was heißt Kritikalität? Zu einem Schlüsselbegriff der Debatte um Kritische Infrastrukturen, edited by Jens-Ivo Engels and Alfred Nordmann, 123–154. Bielefeld: Transcript.
- Graham, Stephen, and Alexander Baker. 2016. “Laboratories of Pacification and Permanent War: Israeli-US Collaboration in the Global Making of Policing.” In The Global Making of Policing: Postcolonial Perspectives, edited by Jana Hönke and Markus-Michael Müller, 40–58. London: Routledge.
- Grassiani, Erella. 2018. “Between Security and Military Identities. The Case of Israeli Security Experts.” Security Dialogue 49 (1-2): 83–95. doi: 10.1177/0967010617747202
- Halper, Jeff. 2015. War Against the People: Israel, the Palestinians and Global Pacification. London: Pluto Press.
- Harbers, Hans. 2005. “Epilogue: Political Materials – Material Politics.” In Inside the Politics of Technology. Agency and Normativity in the Co-Production of Technology and Society, edited by Hans Harbers, 257–272. Amsterdam: University Press.
- Harvey, Penny, Casper Bruun Jensen, and Atsuro Morita. 2017. Infrastructures and Social Complexity: A Companion. London: Routledge/Taylor & Francis Group.
- Hayes, Ben. 2014. “The Surveillance-Industrial Complex.” In Routledge Handbook of Surveillance Studies. Routledge International Handbooks, edited by Kirstie Ball, Kevin D Haggerty, and David Lyon, 167–175. Abingdon: Routledge.
- Hever, Shir. 2018. The Privatization of Israeli Security. London: Pluto Press.
- Hoijtink, Marijn. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. doi: 10.1177/0967010614544312
- Itai, Davidi. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.
- Jasanoff, Sheila. 2004. “Ordering Knowledge, Ordering Society.” In States of Knowledge: The Co-Production of Science and Social Order, edited by Sheila Jasanoff, 13–45. New York: Routledge.
- Joachim, Jutta M., and Andrea Schneiker. 2018. Private Security and Identity Politics: Ethical Hero Warriors, Professional Managers and New Humanitarians. Routledge Private Security Studies. London: Routledge/Taylor & Francis Group.
- Knoblauch, Hubert. 2005. “Focused Ethnography.” Forum Qualitative Research 6: 3. http://www.qualitative-research.net/index.php/fqs/article/view/20/43#gcit.
- Krahmann, Elke. 2008. “Security: Collective Good or Commodity?” European Journal of International Relations 14 (3): 379–404. doi: 10.1177/1354066108092304
- Krahmann, Elke. 2018. “The Market for Ontological Security.” European Security 27 (3): 356–373. doi: 10.1080/09662839.2018.1497983
- Lakoff, Andrew, and Stephen Collier. 2010. “Infrastructure and Event. The Political Technology of Preparedness.” In Political Matter: Technoscience, Democracy, and Public Life, edited by Bruce Braun and Sarah J. Whatmore, 243–266. Minneapolis: University of Minnesota Press.
- Langenohl, A. 2019. “Dynamics of Power in Securitization: Towards a Relational Understanding.” In The Power Dynamics of Securitization: From the Early Modern Period until the Present, edited by Andras Langenohl and Regina Kreide, 19–55. Baden-Baden: Nomos Verl.-Ges.
- Leander, Anna. 2005. “The Market for Force and Public Security: The Destabilizing Consequences of Private Military Companies.” Journal of Peace Research 42 (5): 605–622. doi: 10.1177/0022343305056237
- Leander, Anna. 2010. “Commercial Security Practices.” In The Routledge Handbook of New Security Studies. Routledge Handbooks, edited by J. Peter Burgess, 208–216. London: Routledge.
- Leander, Anna, and Rens van Munster. 2007. “Private Security Contractors in the Debate About Darfur: Reflecting and Reinforcing Neo-Liberal Governmentality.” International Relations 21 (2): 201–216. doi: 10.1177/0047117807077004
- Lindskov Johansen, Katja, and Linda Monsees. 2019. “Co-Production: The Study of Productive Processes at the Level of Materiality and Discourse.” In Technology and Agency in International Relations, edited by Matthias Leese and Marijn Hoijtink, 24–41. London: Routledge.
- Lyon, David. 2009. Surveillance, Power, and Everyday Life. Oxford: University Press.
- Machold, Rhys. 2016. “Learning From Israel? ‘26/11’ and the Anti-Politics of Urban Security Governance.” Security Dialogue 47 (4): 275–291. doi: 10.1177/0967010616645019
- Neocleous, Mark. 2007. “Security, Commodity, Fetishism.” Critique (Clandeboye, Man) 35 (3): 339–355. doi: 10.1080/03017600701676738
- Nolte, Amina, and Ezgican Ozdemir. 2018. “Infrastructuring Geographies: Histories and Presents in and of the Middle East and North Africa.” META – Middle East – Topics & Arguments 10: 5–20.
- Reed, John. 2015. “Unit 8200: Israel’s Cyber Spy Agency.” Financial Times, 10 July. https://www.ft.com/content/69f150da-25b8-11e5-bd83-71cb60e8f08c.
- Schulze, Matthias. 2017. From Cyber-Utopia to Cyber-War. Normative Change in Cyberspace. Unpublished PhD thesis, Friedrich-Schiller-Universität Jena.
- Simon, Stephanie, and Marieke de Goede. 2015. “Cybersecurity, Bureaucratic Vitalism and European Emergency.” Theory, Culture & Society 32 (2): 79–106. doi: 10.1177/0263276414560415
- Steele, Wendy, Karen Hussey, and Stephen Dovers. 2017. “What’s Critical About Critical Infrastructure?.” Urban Policy and Research 35 (1): 74–86. doi: 10.1080/08111146.2017.1282857
- Stevens, Tim. 2016. Cyber Security and the Politics of Time. Cambridge: Cambridge University Press.
- Stockmarr, Leila. 2016. “Beyond the Laboratory Thesis: Gaza as Transmission Belt for War and Security Technology.” In The Global Making of Policing: Postcolonial Perspectives, edited by Jana Hönke and Markus-Michael Müller, 59–76. London: Routledge.
- Tabansky, Lior. 2013. “Critical Infrastructure Protection.” International Journal of Cyber Warfare and Terrorism 3 (3): 80–87. doi: 10.4018/ijcwt.2013070106
- Timber, Craig, and Jay Greene. 2019. “WhatsApp Accuses Israeli Firm of Helping Governments Hack Phones of Journalists, Human Rights Workers.” The Washington Post, October 29. https://www.washingtonpost.com/technology/2019/10/29/whatsapp-accuses-israeli-firm-helping-governments-hack-phones-journalists-human-rights-workers/.
- Tomer, Avishai. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.
- Volinz, Lior. 2018. “Governance Through Pluralization. Jerusalem’s Modular Security Provision.” Security Dialogue 49 (6): 438–456. doi: 10.1177/0967010618789758
- Wakefield, Stephanie. 2018. “Infrastructures of Liberal Life: From Modernity and Progress to Resilience and Ruins.” Geography Compass 12 (7): 1–14. doi: 10.1111/gec3.12377
- Weiss, Lior. name changed. Personal Interview. Safe and Smart City Conference Jerusalem, 19 November 2018.