245
Views
2
CrossRef citations to date
0
Altmetric
Article

Driving social change from below: exploring the role of counter-security technologies in constructing mobile noncitizens

ORCID Icon
Pages 680-695 | Received 03 Sep 2019, Accepted 28 Feb 2020, Published online: 18 Jun 2020

References

  • Aas, K. F. 2005. “‘Getting Ahead of the Game’: Border Technologies and the Changing Space of Governance.” In Global Surveillance and Policing: Borders, Security, Identity, edited by E. Zuriek and M. Salter, 194–214. Cullompton, Devon: Willan Publishing.
  • Aas, K. F. 2011. “‘Crimmigrant’ Bodies and Bona Fide Travelers: Surveillance, Citizenship and Global Governance.” Theoretical Criminology 15 (3): 331–346. doi:10.1177/1362480610396643.
  • Andersson, R. 2016. “Hardwiring the Frontier? The Politics of Security Technology in Europe’s ‘Fight against Illegal Migration’.” Security Dialogue 47 (1): 22–39. doi:10.1177/0967010615606044.
  • Aradau, C. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7 (4): 388–413. doi:10.1057/palgrave.jird.1800030.
  • Barker, V. 2015. “Border Protests: The Role of Civil Society in Transforming Border Control.” In Rethinking Border Control for a Globalizing World, edited by L. Weber, 133–152. London and New York: Routledge.
  • Bhabha, J. 2018. Can We Solve the Migration Crisis? Cambridge and Medford: Polity.
  • Bigo, D. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives: Global, Local, Political 27 (1): 63–92. doi:10.1177/03043754020270S105.
  • Bleiker, R., D. Campbell, E. Hutchison, and X. Nicholson. 2013. “The Visual Dehumanisation of Refugees.” Australian Journal of Political Science 48 (4): 398–416. doi:10.1080/10361146.2013.840769.
  • Bloom, T. 2018. Noncitizenism: Recognising Noncitizen Capabilities in a World of Citizens. London and New York: Routledge.
  • Borkert, M., K. E. Fisher, and E. Yafi. 2018. “The Best, the Worst, and the Hardest to Find: How People, Mobiles, and Social Media Connect Migrants In(to) Europe.” Social Media + Society 4 (1). doi:10.1177/2056305118764428.
  • Bourne, M., H. Johnson, and D. Lisle. 2015. “Laboratizing the Border: The Production, Translation and Anticipation of Security Technologies.” Security Dialogue 46 (4): 307–325. doi:10.1177/0967010615578399.
  • Broeders, D. 2007. “The New Digital Borders of Europe: EU Databases and the Surveillance of Irregular Migrants.” International Sociology 22 (1): 71–92. doi:10.1177/0268580907070126.
  • Broeders, D., and J. Hampshire. 2013. “Dreaming of Seamless Borders: ICTs and the Pre-Emptive Governance of Mobility in Europe.” Journal of Ethnic and Migration Studies 39 (8): 1201–1218. doi:10.1080/1369183X.2013.787512.
  • Bulos, N., and L. King. 2016. “Image Captures Plight of Syria Kids; Video of a Boy Pulled from the Rubble of His Home Brings Grief and Outrage Worldwide.” Los Angeles Times, A3. Los Angeles: Los Angeles Times.
  • Burns, A. 2015. “Discussion and Action: Political and Personal Responses to the Aylan Kurdi Images.” In The Iconic Image on Social Media: A Rapid Research Response to the Death of Aylan Kurdi, edited by F. Vis and O. Goriunova, 38–39, Sheffield: Visual Social Media Lab.
  • Carty, V. 2015. Social Movements and New Technology. New York: Routledge.
  • Castells, M. 2012. Networks of Outrage and Hope: Social Movements in the Internet Age. Cambridge: Polity Press.
  • Castells, M. 2014. Communication Power. Oxford: Oxford University Press.
  • Chang, J.-H., Y.-Q. Zhu, S.-H. Wang, and L. Yi-Jung. 2018. “Would You Change Your Mind? An Empirical Study of Social Impact Theory on Facebook.” Telematics and Informatics 35 (1): 282–292. doi:10.1016/j.tele.2017.11.009.
  • Choi, N., and S. Majumdar. 2015. “Social Innovation: Towards a Conceptualisation.” In Technology and Innovation for Social Change, edited by S. Majumdar, S. Guha, and N. Marakkath, 7–34. New Delhi, Heidelberg, New York, Dordrecht, London: Springer.
  • Cohen, E., S. Cohen, and X. Li. 2017. “Subversive Mobilities.” Applied Mobilities 2 (2): 115–133. doi:10.1080/23800127.2017.1305217.
  • D’Orazio, F. 2015. “Journey of an Image: From a Beach in Bodrum toGillespie, Osseiran, and Cheesman 2018 Twenty Million Screens across the World.” In The Iconic Image on Social Media: A Rapid Research Response to the Death of Aylan Kurdi, edited by F. Vis and O. Goriunova, 11–18, Sheffield: Vusual Social Media Lab.
  • Dean, J. 2009. Democracy and Other Neoliberal Fantasies: Communicative Capitalism and Left Politics. Durham and London: Duke University Press.
  • Dekker, R., G. Engbersen, J. Klaver, and H. Vonk. 2018. “Smart Refugees: How Syrian Asylum Migrants Use Social Media Information in Migration Decision-Making.” Social Media + Society 4 (1). doi:10.1177/2056305118764439.
  • Devichand, M. 2016. “Did Aylan Kurdi’s Death Change Anything?” BBC News. BBC News.
  • Dijstelbloem, H., and A. Meijer. 2011. Migration and the New Technological Borders of Europe. Basingstoke: Palgrave.
  • Diminescu, D. 2008. “The Connected Migrant: An Epistemological Manifesto.” Social Science Information 47 (4): 565–579. doi:10.1177/0539018408096447.
  • Echavarría Alvarez, J. 2014. “(Re)Imagining Migration.” Peace Review 26 (2): 178–184. doi:10.1080/10402659.2014.906882.
  • El-Enany, N. 2016. “Aylan Kurdi: The Human Refugee.” Law Critique 27 (1): 13–15. doi:10.1007/s10978-015-9175-7.
  • Gillespie, M., S. Osseiran, and M. Cheesman. 2018. “Syrian Refugees and the Digital Passage to Europe: Smartphone Infrastructures and Affordances.” Social Media + Society 4 (1). doi:10.1177/2056305118764440.
  • Glover, R. 2011. “The Theorist and the Practitioner: Linking the Securitization of Migration to Activist Counter-narratives.” Geopolitics, History, and International Relations 3 (1): 77–102.
  • Goriunova, O. 2015. “Introduction.” In The Iconic Image on Social Media: A Rapid Research Response to the Death of Aylan Kurdi, edited by F. Vis and O. Goriunova, 5–9, Sheffield: Visual Social Media Lab.
  • Gutiérrez, M. 2018. Data Activism and Social Change. Cham: Palgrave Macmillan.
  • Huysmans, J. 1998. “The Question of the Limit: Desecuritisation and the Aesthetics of Horror in Political Realism.” Millennium 27 (3): 569–589. doi:10.1177/03058298980270031301.
  • Huysmans, J. 2006. The Politics of Insecurity: Fear, Migration and Asylum in the EU. London and New York: Routledge.
  • Ibrahim, Y., and A. Howarth. 2015. “Sounds of the Jungle: Rehumanizing the Migrant.” Journalism, Media and Cultural Studies Journal 7.
  • Isin, E., and E. Ruppert. 2015. Being Digital Citizens. London and New York: Rowman and Littlefield International.
  • Kutscher, N., and L. -M. Kreß. 2018. “The Ambivalent Potentials of Social Media Use by Unaccompanied Minor Refugees.” Social Media + Society 4 (1). doi:10.1177/2056305118764438.
  • Landolt, P., and L. Goldring. 2015. “Assembling Noncitizenship through the Work of Conditionality.” Citizenship Studies 19 (8): 853–869. doi:10.1080/13621025.2015.1110280.
  • Latonero, M., and P. Kift. 2018. “On Digital Passages and Borders: Refugees and the New Infrastructure for Movement and Control.” Social Media and Society (January-march) 4 (1): 1–11.
  • Leurs, K., and S. Ponzanesi. 2018. “Connected Migrants: Encapsulation and Cosmopolitanization.” Popular Communication 16 (1): 4–20. doi:10.1080/15405702.2017.1418359.
  • McAuliffe, M. 2018. “The Link between Migration and Technology Is Not What You Think, World Economic Forum.” World Economnic Forum, August 15. https://www.weforum.org/agenda/2018/12/social-media-is-casting-a-dark-shadow-over-migration/
  • Milan, S. 2013. Social Movements and Their Technologies: Wiring Social Change. Basingstoke and New York: Palgrave Macmillan.
  • Milan, S., and M. Gutiérrez. 2015. “Citizens’ Media Meets Big Data: The Emergence of Data Activism.” Mediaciones, no. 14: 120–133. doi:10.26620/uniminuto.mediaciones.11.14.2015.120-133.
  • Milivojevic, S. 2013. “Borders, Technology and Mobility: Cyber-fortress Europe and Its Emerging Southeast Frontier.” Australian Journal of Human Rights 19 (3): 99–120. doi:10.1080/1323-238X.2013.11882136.
  • Milivojevic, S. 2019a. Border Policing and Security Technologies. London and New York: Routledge.
  • Milivojevic, S. 2019b. “‘Stealing the Fire’, 2.0 Style?: Technology, the Pursuit for Mobility, Social Memory and De-securitization of Migration.” Theoretical Criminology 23 (2): 211–227. doi:10.1177/1362480618806921.
  • Newell, B. C., R. Gomez, and V. E. Guajardo. 2016. “Information Seeking, Technology Use, and Vulnerability among Migrants at the United States–Mexico Border.” The Information Society 32 (3): 176–191. doi:10.1080/01972243.2016.1153013.
  • Nichols, T. 2017. The Death of Expertise: The Campaign against Established Knowledge and Why It Matters. Oxford: Oxford University Press.
  • Patel, F., G. Rampersad, and P. Sooknanan. 2012. “Diffusing the Innovation Divide in International Development: Redressing the Injustices of Modernity.” In Information Technology, Development, and Social Change, edited by F. Patel, P. Sooknanan, G. Rampersad, and A. Mundkur, 3–15. New York and Abingdon: Routledge.
  • Patel, F., P. Sooknanan, G. Rampersad, and A. Mundkur. 2012. Information Technology, Development, and Social Change. New York and Abingdon: Routledge.
  • Popescu, G. 2012. Bordering and Ordering the Twenty-first Century. Lanham and Plymouth: Rowman & Littlefield Publishers.
  • Roe, P. 2012. “Illegal Immigration Is a Serious Threat to America’s National Security.” Accessed 2 September 2019. https://roe.house.gov/news/documentsingle.aspx?DocumentID=292589
  • Schumann, S. 2015. How the Internet Shapes Collective Action. Basingstoke and New York: Palgrave Macmillan.
  • Segrave, M., S. Milivojevic, and S. Pickering. 2018. Sex Trafficking and Modern Slavery: The Absence of Evidence. London and New York: Routledge.
  • Seltzer, N., A. Johnson, and K. Amira. 2013. “Revisiting Dynamic Social Impact Theory: Extensions and Applications for Political Science.” International Journal of Politics, Culture, and Society 26 (4): 349–367. doi:10.1007/s10767-013-9163-6.
  • Squire, V. 2016. “Governing Migration through Death in Europe and the US: Identification, Burial and the Crisis of Modern Humanism.” European Journal of International Relations 23 (3): 513–532. doi:10.1177/1354066116668662.
  • Stierl, M. 2016. “A Sea of Struggle – Activist Border Interventions in the Mediterranean Sea.” Citizenship Studies 20 (5): 561–578. doi:10.1080/13621025.2016.1182683.
  • Stumpf, J. 2006. “The the Crimmigration Crisis: Immigrants, Crime, and Sovereign Power.” Am. UL Rev. 56: 367.
  • Tonkiss, K., and T. Bloom. 2015. “Theorising Noncitizenship: Concepts, Debates and Challenges.” Citizenship Studies 19 (8): 837–852. doi:10.1080/13621025.2015.1110278.
  • Vaughan-Williams, N. 2015. ““We are Not Animals!” Humanitarian Border Security and Zoopolitical Spaces in EUrope.” Political Geography 45: 1–10. doi:10.1016/j.polgeo.2014.09.009.
  • Wæver, O. 1995. “Securitization and Desecuritization.” In On Security, edited by R. D. Lipschutz, 46–86. New York Chichester: Columbia University Press.
  • Wilson, D. 2014. “Border Militarization, Technology and Crime Control.” In The Routledge Handbook on Crime and International Migration, edited by S. Pickering and J. Ham, 141–154. London and New York: Routledge.
  • Wolfensohn, G. 2016. Gender Assessment of the Refugee and Migration Crisis in Serbia and FYR Macedonia. Istanbul: UN Women.
  • Wonders, B., F. Solop, and N. Wonders. 2012. “Information Sampling and Linking: Reality Hunger and the Digital Knowledge Commons.” Contemporary Social Sciences: Journal of the Academy of Social Sciences 7 (3): 247–262. doi:10.1080/21582041.2012.683447.
  • Zijlstra, J., and Liempt, I. V. 2017. “Smart(phone) Travelling: Understanding the Use and Impact of Mobile Technology on Irregular Migration Journeys.” International Journal of Migration and Border Studies 3 (2–3): 174–191. doi:10.1504/IJMBS.2017.083245.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.