1,655
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Security Technologies Versus Citizen Roles?

ORCID Icon

References

  • Allan, S., Trapp, E. and Scott, A. D. (2010) Critical Infrastructure Protection for the Smart Grid (Los Angeles, CA: Accenture).
  • Aradau, C. (2010) Security that matters: Critical infrastructure and objects of protection, Security Dialogue, 41(5), pp. 491–514. doi: 10.1177/0967010610382687
  • Barad, K. (2007) Meeting the Universe Halfway: Quantum Physics and the Entanglement of Mater and Meaning (Durham, NC and London: Duke University Press).
  • Bellanova, R. and González Fuster, G. (2013) Politics of disappearance: Scanners and (unobserved) bodies as mediators of security practices, International Political Sociology, 7, pp. 188–209. doi: 10.1111/ips.12017
  • Blackburn, S. (1994) The Oxford Dictionary of Philosophy (Oxford: Oxford University Press).
  • Burgess, J. P. (2007) Social values and material threat: The European programme for critical infrastructure protection, International Journal of Critical Infrastructures, 3(3/4), pp. 471–487. doi: 10.1504/IJCIS.2007.014121
  • Buzan, B. and Waever, O. (2003) Regions and Powers: The Structure of International Security, Vol. 91 (Cambridge: Cambridge University Press).
  • Buzan, B., Waever, O. and De Wilde, J. (1998) Security. A New Framework for Analysis (Boulder, CO: Lynne Rienner Publishers).
  • Cavoukian, A. (2009) Privacy by Design: The 7 Foundational Principles (Toronto, ON: Information and Privacy Commissioner of Ontario).
  • Cavoukian, A. and Dix, A. (2012) Smart Meters in Europe, Privacy by Design at its Best (Toronto, ON: Information and Privacy Commissioner of Ontario).
  • CBS. (2009) Cyber War: Sabotaging the System, 60 minutes, November 6.
  • Citizen Lab and Anderson, C. (2015) The Need for Democratization of Digital Security Solutions to Ensure the Right to Freedom of Expression (Toronto: Munk School of Global Affairs).
  • Eubanks, V. (2006) Technologies of citizenship: Surveillance and political learning in the welfare system, in: T. Monahan (Ed.) Surveillance and Security: Technological Politics and Power in Everyday Life, pp. 89–108 (New York and London: Routledge).
  • EurActiv (2012) European renewable power grid rocked by cyber-attack. December 12. Available at http://www.euractiv.com/energy/european-renewable-power-grid-ro-news-516541 (accessed 14 December 2012).
  • European Commission (2004). Critical Infrastructure Protection in the fight against terrorism, Vol. 702 (Brussels: European Commission).
  • Gorman, S. (2009) Electricity grid in U.S. penetrated by spies, The Wall Street Journal, April 8.
  • Hämmerli, B. and Renda, A. (2010) Protecting Critical Infrastructure in the EU (Brussels: Centre for European Policy Studies).
  • Harris, S. (2009) Brazil to ‘60 minutes’: It wasn’t a hacker. The Atlantic, November 10.
  • Krebs, B. (2010) Cable: No cyber attack in Brazilian ’09 blackout. KrebsOnline, December 3.
  • Latour, B. (1987) Science in Action: How to Follow Scientists and Engineers Through Society (Cambridge, MA: Harvard University Press).
  • Latour, B. (1988) How to write the prince for machines as well as for machinations, in: B. Elliott (Ed.) Technology and Social Change, pp. 20–43 (Edinburgh: Edinburgh University Press).
  • Latour, B. (1993) La clef de Berlin et autres leçons d'un amateur de sciences (Paris: Éditions la Découverte).
  • Latour, B. (2010) On the Modern Cult of the Factish Gods (Durham and London: Duke University Press).
  • Marres, N. (2009) Testing powers of engagement, European Journal of Social Theory, 12(1), pp. 117–133. doi: 10.1177/1368431008099647
  • Martin, L. L. (2010) Bombs, bodies, and biopolitics: Securitizing the subject at the airport security checkpoint, Social & Cultural Geography, 11(1), pp. 17–34. doi: 10.1080/14649360903414585
  • Monahan, T. (2006) Questioning surveillance and security, in: T. Monahan (Ed.) Surveillance and Security: Technological Politics and Power in Everyday Life, pp. 1–23 (New York and London: Routledge).
  • Mulligan, S. (2011) Energy and human ecology: A critical security approach, Environmental Politics, 20(5), pp. 633–649. doi: 10.1080/09644016.2011.608531
  • Pavone, V. and Esposti, S. D. (2012) Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security, Public Understanding of Science, 21(5), pp. 556–572. doi: 10.1177/0963662510376886
  • Rial, A. and Danezis, G. (2011) Privacy-preserving Smart Metering. Paper presented at the Workshop on Privacy in the Electronic Society 2011, Chicago, IL, October.
  • Salter, M. B. (2008a) Imagining numbers: Risk, quantification, and aviation security, Security Dialogue, 39(2–3), pp. 243–266. doi: 10.1177/0967010608088777
  • Salter, M. B. (2008b) Securitization and desecuritization: A dramaturgical analysis of the Canadian air transport security authority, Journal of International Relations and Development, 11(4), pp. 321–349. doi: 10.1057/jird.2008.20
  • Schiphol (2013) Airport security: Security scan. June 21, 2012. Available at http://www.schiphol.nl/web/file?uuid=2a47b6ff-3a71-4054-a603-6e68aae51cfa&owner=fc5889a9-e049-442a-b208-b416f05e180d (accessed 13 March 2013).
  • Schomberg, R. (2011) Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields (Brussels: Directorate General for Research and Innovation).
  • Spetalnick, M. and Holland, S. (2013) Obama defends surveillance effort as ‘trade-off’ for security, Reuters.
  • Stritzel, H. (2007) Towards a theory of securitization: Copenhagen and beyond, European Journal of International Relations, 13(3), pp. 357–383.
  • Valkenburg, G. and Van der Ploeg, I. (2015) Materialities between security and privacy: A constructivist account of airport security scanners, Security Dialogue, 46(4), pp. 326–344. doi: 10.1177/0967010615577855
  • Van der Ploeg, I. (2005) Keys to privacy. Translations of ‘the privacy problem’ in information technologies, in: I. Van der Ploeg (Ed.) The Machine-Readable Body. Essays on Biometrics and the Informatization of the Body, pp. 15–36 (Maastricht: Shaker).
  • Vedder, A., Wees, L. v. d., Koops, B.-J., Hert, P. d., Harten, D. v. and Munnichs, G. (2007) Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw (Den Haag: Rathenau Instituut).
  • Walters, W. (2014) Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security, Security Dialogue, 45(2), pp. 101–118. doi: 10.1177/0967010613519162
  • WikiLeaks. (2011) 09BRASILIA1383, Brazil: Blackout—causes and implications, Cables, August 30.
  • Williams, M. C. (2003) Words, images, enemies: Securitization and international politics, International Studies Quarterly, 47, pp. 511–531.
  • Zureik, E. and Hindle, K. (2004). Governance, security and technology: The case of biometrics. Studies in Political Economy, 73, pp. 113–137. doi: 10.1080/19187033.2004.11675154