3,323
Views
4
CrossRef citations to date
0
Altmetric
Articles

Confusion, control and comfort: premediating identity management in film and television

, &
Pages 986-1000 | Received 17 Apr 2013, Accepted 25 Nov 2013, Published online: 20 Dec 2013

References

  • Ajana, B. (2010). Recombinant identities: Biometrics and narrative bioethics. Journal of Bioethical Inquiry, 7(2), 237–258. doi: 10.1007/s11673-010-9228-4
  • Andrejevic, M. (2004). The webcam subculture and the digital enclosure. In N. Couldry & A. McCarthy (Eds.), MediaSpace: Place, scale and culture in a media age (pp. 193–208). London: Routledge.
  • Barry, M. (2004). ‘Chip & pin puts us on fast track to button gloom’ Daily Mirror. Retrieved from http://www.thefreelibrary.com/Maggie+Barry%3A+Chip+%26+Pin+puts+us+on+fast+track+to+button+gloom.-a0121633778
  • Belk, R. (1988). Possessions and the extended self. Journal of Consumer Research, 15, 139–168. Retrieved from http://www.jstor.org/stable/2489522 doi: 10.1086/209154
  • Belk, R. (2013). Extended self in a digital world. Journal of Consumer Research, 40. doi: 10.1086/671052
  • Bennett, C. (2010). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: MIT Press.
  • Boltanski, L. (2012). Énigmes et complots: Une enquête à propos d'enquêtes. Paris: Editions Gallimard.
  • Boonstra, A., Boddy, D., & Bell, S. (2008). Stakeholder management in IOS projects: Analysis of an attempt to implement an electronic patient file. European Journal of Information Systems, 17(2), 100–111. doi: 10.1057/ejis.2008.2
  • Bordwell, D. (1985). Narration in the fiction film. Madison, WI: University of Wisconsin Press.
  • Borup, M., Brown, N., Konrad, K., & van Lente, H. (2006). The sociology of expectations in science and technology. Technology Analysis & Strategic Management, 18(3/4), 285–298. doi:10.1080/0953732032000046024 doi: 10.1080/09537320600777002
  • Bretnor, R. (Ed.). (1974). Science fiction today and tomorrow. New York: Harper Row.
  • Byun, S., & Byun, S. E. (2013). Exploring perceptions toward biometric technology in service encounters: A comparison of current users and potential adopters. Behaviour and Information Technology, 32(3), 217–230. doi: 10.1080/0144929X.2011.553741
  • California bans forced RFID tagging of humans (2007, October 17). Government technology. Retrieved from http://www.govtech.com/security/California-Bans-Forced-RFID-Tagging-of.html?topic=117688
  • Callahan, D. (2001, June 22). Overmatched by technology. The Washington Post, np.
  • Camenisch, J., Fischer-Hübner, S., & Rannenberg, K. (Eds.). (2011). Privacy and identity management for life. New York: Springer Press.
  • Campbell, J. (1949). The hero with a thousand faces. New York: Pantheon Books.
  • Clodfelter, R. (2010). Biometric technology in retailing: Will consumers accept fingerprint authentication? Journal of Retailing and Consumer Services, 17(3), 181–188. doi: 10.1016/j.jretconser.2010.03.007
  • Crapanzano, V. (2003). Imaginative horizons: An essay in literary-philosophical anthropology. Chicago, IL: University of Chicago Press.
  • Davis, N. Z. (1983). The return of Martin Guerre. Cambridge: Harvard University Press.
  • De Goede, M. (2008). Beyond risk: Premediation and the post-9/11 security imagination. Security Dialogue, 39(2–3), 155–176. doi: 10.1177/0967010608088773
  • Dierkes, M., Hoffman, U., & Maez, L. (1992). Leitbild und Technik: Zur Entstehung und Steuerung technisher Innovationen. Berlin: Edition Sigma.
  • Fiske, J. (1987). Television culture. London: Methuen.
  • Gartner Identifies Six Trends That Will Drive the Evolution of Identity and Access Management and Privacy Management in 2012 (2012, January 31) Gartner. Retrieved from http://www.gartner.com/it/page.jsp?id=1909714
  • Grusin, R. A. (2010). Premediation: Affect and mediality after 9/11. Basingtstoke: Palgrave MacMillan. Premediation: In which I attempt to think through the concept of premediation on the fly. Retrieved from http://premediation.blogspot.nl
  • Hossain, M. M., & Prybutok, V. R. (2008). Consumer acceptance of RFID technology: An exploratory study. IEEE Transactions on Engineering Management, 55(2), 316–328. doi: 10.1109/TEM.2008.919728
  • Humby, C., Hunt, T., & Philips, T. (2008). Scoring points: How Tesco continues to win customer loyalty. London: Kogan Page.
  • James, T., Pirim, T., Boswell, K., Reithel, B., & Barkhi, R. (2006). Determining the intention to use biometric devices: An application and extension of the technology acceptance model. Journal of Organizational and End User Computing, 18(3), 1–24. doi: 10.4018/joeuc.2006070101
  • Johnson, S. (2006). Everything bad is good for you: How today's popular culture is actually making us smarter. London: Penguin.
  • Kammerer, D. (2002). Video surveillance in Hollywood movies. Surveillance & Society, 2(2/3), 464–473. Retrieved from http://www.surveillance-and-society.org/cctv.htm
  • Kirby, D. A. (2004). Extrapolating race in GATTACA: Genetic passing, identity, and the science of race. Literature and Medicine, 23(1), 184–200. Retrieved from http://muse.jhu.edu/journals/literature_and_medicine/toc/lm23.1.html doi: 10.1353/lm.2004.0006
  • Lefait, S. (2012). Surveillance on screen: Monitoring contemporary films and television programs. Plymouth: Scarecrow Press.
  • Lösch, A. (2006). Anticipating the futures of nanotechnology: visionary images of means of communication. Technology Analysis and Strategic Management, 18(3/4), 393–409. doi: 10.1080/09537320600777168
  • Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
  • Murnaghan, S. (1987). Disguise and recognition in the Odyssey. Princeton: Princeton University Press.
  • Neyland, D. (2009). Who's who? The biometric future and the politics of identity. European Journal of Criminology, 6(2), 135–155. doi: 10.1177/1477370808100543
  • Notoatmodjo, G., & Thomborson, C. (2009). Passwords and perceptions. In L. Brankovic & W. Susilo (Eds.), Proceedings of the seventh australasian conference on information security (Vol. 98, pp. 71–78). Darlinghurst: Australian Computer Society.
  • OECD. (2011). Digital identity management: Enabling innovation and trust in the internet economy. Retrieved from http://www.oecd.org/internet/interneteconomy/49338380.pdf
  • O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91, 2019–2020. doi:10.1109/JPROC.2003.819611 doi: 10.1109/JPROC.2003.819605
  • Propp, V. (1928/1968). Morphology of the folktale. Texas: University of Texas Press.
  • Raven, P. G. (2013, July). Worlds that tell stories, stories that tell worlds: Diegesis and mimesis in science fiction and technoscience. Paper presented at Science in Public 2013, University of Nottingham, Nottingham.
  • Sanquist, T., Mahy, H., & Morris, F. (2008). An exploratory risk perception study of attitudes toward homeland security systems. Risk Analysis, 28, 1125–1133. doi:10.1111/j.1539-6924.2008.01069.x
  • Scholes, R., & Rabkin, E. S. (1977). Science fiction: History, science, vision. Oxford: Oxford University Press.
  • Silverstone, R. (1988). Television myth and culture. In J. Carey (Ed.), Media, myths and narrative: Television and the press (pp. 20–47). London: Sage.
  • Smith, A. D. (2008). Evolution and acceptability of medical applications of RFID implants among early users of technology. Health Marketing Quarterly, 24(1–2), 121–155. doi: 10.1080/07359680802125980
  • Turney, J. (2013). Imagining technology (Nesta Working Paper No. 13/06), Nottingham.
  • Whitley, E., & Hosein, G. (2009). Global challenges for identity politics. Basingstoke: Palgrave MacMillan.
  • Williamson, H. R. (1957/2002). Who was the man in the iron mask? and other historical enigmas. London: Penguin Classics.
  • van Zoonen, L. (2013). Reflections on a passport. In P. Bennett & J. McDougall (Eds.), Barthes’ mythologies today: Readings of contemporary culture (pp. 80–85). London: Routledge.