2,096
Views
17
CrossRef citations to date
0
Altmetric
Articles

What’s Critical about Critical Infrastructure?

, &
Pages 74-86 | Received 03 Sep 2015, Accepted 12 Jan 2017, Published online: 20 Feb 2017

References

  • Australian Government, 2010. Critical infrastructure resilience strategy. Canberra: Attorney-General's Department.
  • Bateson, G., 1978. Steps to an ecology of mind. New York: Ballantine.
  • Bijker, W., 1995. Of bicycles, bakelites and bulbs: towards a theory of sociotechnical change. Cambridge: MIT Press.
  • Brenner, N., Marcuse, P., and Mayer, M., eds., 2012. Cities for people, not for profit. Critical urban theory and the right to the city. New York: Routledge.
  • Bronitt, S.H. and Stephens, D., 2007. ‘Flying under the radar’. The use of lethal force against Hijacked aircraft: recent Australian developments. Oxford University commonwealth law journal, 7 (2), 265–277.
  • Brown, R.R., 2005. Impediments to integrated urban stormwater management: the need for institutional reform. Environmental management., 36 (3), 455–468.10.1007/s00267-004-0217-4
  • Bucciarelli, L., 1994. Designing engineers. Cambridge: MIT Press.
  • Buzan, B., Waever, O., and de Wilde, J., 1998. Security: a new framework for analysis. London: Renner.
  • Clemente, D., 2013. Cyber security and global interdependence: what is critical? London: The Royal Institute on International Affairs programme report, Chatham House.
  • Cornish, P., et al., 2011. Cyber security and the UK’s critical national infrastructure. London: Chatham House, 2.
  • Costanza, R., et al., 2014. Changes in the global value of ecosystem services. Global environmental change., 26, 152–158.
  • Cumings, S., 2000. The American ascendency: imposing a new world order. The nation, 5, 13–16.
  • De Bruijne, M. and Van Eaten, M., 2007. Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. Journal of contingencies and crisis management, 15 (1), 18–29.10.1111/jccm.2007.15.issue-1
  • Deloitte Access Economics, 2013. Economic contribution of the Great Barrier Reef. Townsville: Great Barrier Reef Marine Park Authority.
  • Dourish, P. and Bell, G., 2007. The infrastructure of experience and the experience of infrastructure: meaning and structure in everyday encounters with space. Environment and planning B, 34, 414–430.10.1068/b32035t
  • Dovers, S. and Handmer, J., 2014. Disaster policy and climate change: how much more of the same? In: A. Ismail-Zadeh, J. Urrutia-Fucugaughi, A. Kijko, K. Takeuchi, and I. Zaliapin, eds. Extreme natural hazards, disaster risks and societal implications. Cambridge: Cambridge University Press, 348–358.10.1017/CBO9781139523905
  • Forum of Food sovereignty, 2007. Available from: https://nyeleni.org/spip.php?rubrique12 [Accessed 3 February 2017].
  • Fraser, N., 1985. Whats critical about critical theory? The case of Habermas and gender. New German critique, 35, 97–131.10.2307/488202
  • Gandy, M., 2005. Cyborg urbanization: complexity and monstrosity in the contemporary city. International journal of urban and regional research, 29 (1), 26–49.10.1111/ijur.2005.29.issue-1
  • Graham, S. and Marvin, S., 2001. Splintering urbanism: networked infrastructures, technological mobilities and the urban condition. London: Routledge.10.4324/9780203452202
  • Handmer, J. and Dovers, S., 2013. Handbook of disaster policies and institutions: improving emergency management and climate adaptation. 2nd ed. London: Routledge.
  • Harvey, D., 2008. The right to the city. New left review [online], 53, September–October. Available from: https://newleftreview.org/II/53/david-harvey-the-right-to-the-city [Accessed 3 February 2017].
  • Heer, J. and Khooshabeh, P., 2004. Seeing the invisible. In: Workshop on invisble and transparent interfaces, advanced visual interfaces. Gallipoli.
  • Hussey, K. and Dovers, S., 2015. Managing critical infrastructure in a changing climate: risk, roles, responsibilities and politics. Proceedings of the Research Forum, Bushfire & Natural Hazards, and AFAC Conference, Wellington NZ, 2 September 2014.
  • Huysman, J., 2002. Defining social constructivism in security studies: the normative dilemma of writing security. Alternatives: global local, political, 27 (1), 41–62.
  • Kitchin, R., 2014. The data revolution: big data, open data, data infrastructures & their consequences. London: Sage.
  • Lewis, P., 1985. Internet of Things, congressional black caucus foundation 15th Annual legislative weekend, Washington DC, September.
  • Little, P., 1995. Changing utilities. Utilities weekly, 16 October, p. 9.
  • Mitchell, W., 2003. Me++: the cyborg self and the networked city. Cambridge, MA: The MIT Press.
  • Moteff, J. and Paformak, P., 2004. Critical infrastructure and key assets: definition and identification. Washington DC: CRS Report for Congress, CR Service, The Library of Congess, 17.
  • Pinch, S., 1985. Cities and services: the geography of collective consumption, London: Routledge
  • Schiffer, S., 1997. Sao Paulo: the challenge of globalization in an exclusionary urban structure, (Mimegraph).
  • Star, S., 1999. The ethnography of infrastructure. American behavioral scientist, 43 (3), 377–391.10.1177/00027649921955326
  • Steele, W., et al., 2015. The cyborg city: re-thinking urban resilience through mobile communications. Refereed paper presented at State of Australian Cities conference. Gold Coast: Griffith University.
  • Swyngedouw, E., 1996. The city as a hybrid: on nature, society and cyborg urbanization. Capitalism, nature, socialism, 7, 65–80.10.1080/10455759609358679
  • Waever, O., 1995. Securitization and desecuritization. In: R. Lipschutz, ed. On security. New York: Columbia University Press, 46–86.
  • Williams, M., 2003. Words, images, enemies: securitization and international politics. International studies quarterly, 47, 511–531.10.1046/j.0020-8833.2003.00277.x
  • Zerbe, N., 2012. Food security vs. food sovereignty [online]. Available from: https://globalfoodpolitics.wordpress.com/2012/11/30/food-security-vs-food-sovereignty/ [Accessed 3 February 2017].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.