References
- Ajana, B. (2010). Recombinant identities: Biometrics and narrative bioethics. Journal of Bioethical Inquiry, 7(2), 237–258. doi: 10.1007/s11673-010-9228-4
- Andrejevic, M. (2004). The webcam subculture and the digital enclosure. In N. Couldry & A. McCarthy (Eds.), MediaSpace: Place, scale and culture in a media age (pp. 193–208). London: Routledge.
- Barry, M. (2004). ‘Chip & pin puts us on fast track to button gloom’ Daily Mirror. Retrieved from http://www.thefreelibrary.com/Maggie+Barry%3A+Chip+%26+Pin+puts+us+on+fast+track+to+button+gloom.-a0121633778
- Belk, R. (1988). Possessions and the extended self. Journal of Consumer Research, 15, 139–168. Retrieved from http://www.jstor.org/stable/2489522 doi: 10.1086/209154
- Belk, R. (2013). Extended self in a digital world. Journal of Consumer Research, 40. doi: 10.1086/671052
- Bennett, C. (2010). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: MIT Press.
- Boltanski, L. (2012). Énigmes et complots: Une enquête à propos d'enquêtes. Paris: Editions Gallimard.
- Boonstra, A., Boddy, D., & Bell, S. (2008). Stakeholder management in IOS projects: Analysis of an attempt to implement an electronic patient file. European Journal of Information Systems, 17(2), 100–111. doi: 10.1057/ejis.2008.2
- Bordwell, D. (1985). Narration in the fiction film. Madison, WI: University of Wisconsin Press.
- Borup, M., Brown, N., Konrad, K., & van Lente, H. (2006). The sociology of expectations in science and technology. Technology Analysis & Strategic Management, 18(3/4), 285–298. doi:10.1080/0953732032000046024 doi: 10.1080/09537320600777002
- Bretnor, R. (Ed.). (1974). Science fiction today and tomorrow. New York: Harper Row.
- Byun, S., & Byun, S. E. (2013). Exploring perceptions toward biometric technology in service encounters: A comparison of current users and potential adopters. Behaviour and Information Technology, 32(3), 217–230. doi: 10.1080/0144929X.2011.553741
- California bans forced RFID tagging of humans (2007, October 17). Government technology. Retrieved from http://www.govtech.com/security/California-Bans-Forced-RFID-Tagging-of.html?topic=117688
- Callahan, D. (2001, June 22). Overmatched by technology. The Washington Post, np.
- Camenisch, J., Fischer-Hübner, S., & Rannenberg, K. (Eds.). (2011). Privacy and identity management for life. New York: Springer Press.
- Campbell, J. (1949). The hero with a thousand faces. New York: Pantheon Books.
- Clodfelter, R. (2010). Biometric technology in retailing: Will consumers accept fingerprint authentication? Journal of Retailing and Consumer Services, 17(3), 181–188. doi: 10.1016/j.jretconser.2010.03.007
- Crapanzano, V. (2003). Imaginative horizons: An essay in literary-philosophical anthropology. Chicago, IL: University of Chicago Press.
- Davis, N. Z. (1983). The return of Martin Guerre. Cambridge: Harvard University Press.
- De Goede, M. (2008). Beyond risk: Premediation and the post-9/11 security imagination. Security Dialogue, 39(2–3), 155–176. doi: 10.1177/0967010608088773
- Dierkes, M., Hoffman, U., & Maez, L. (1992). Leitbild und Technik: Zur Entstehung und Steuerung technisher Innovationen. Berlin: Edition Sigma.
- Fiske, J. (1987). Television culture. London: Methuen.
- Gartner Identifies Six Trends That Will Drive the Evolution of Identity and Access Management and Privacy Management in 2012 (2012, January 31) Gartner. Retrieved from http://www.gartner.com/it/page.jsp?id=1909714
- Grusin, R. A. (2010). Premediation: Affect and mediality after 9/11. Basingtstoke: Palgrave MacMillan. Premediation: In which I attempt to think through the concept of premediation on the fly. Retrieved from http://premediation.blogspot.nl
- Hossain, M. M., & Prybutok, V. R. (2008). Consumer acceptance of RFID technology: An exploratory study. IEEE Transactions on Engineering Management, 55(2), 316–328. doi: 10.1109/TEM.2008.919728
- Humby, C., Hunt, T., & Philips, T. (2008). Scoring points: How Tesco continues to win customer loyalty. London: Kogan Page.
- James, T., Pirim, T., Boswell, K., Reithel, B., & Barkhi, R. (2006). Determining the intention to use biometric devices: An application and extension of the technology acceptance model. Journal of Organizational and End User Computing, 18(3), 1–24. doi: 10.4018/joeuc.2006070101
- Johnson, S. (2006). Everything bad is good for you: How today's popular culture is actually making us smarter. London: Penguin.
- Kammerer, D. (2002). Video surveillance in Hollywood movies. Surveillance & Society, 2(2/3), 464–473. Retrieved from http://www.surveillance-and-society.org/cctv.htm
- Kirby, D. A. (2004). Extrapolating race in GATTACA: Genetic passing, identity, and the science of race. Literature and Medicine, 23(1), 184–200. Retrieved from http://muse.jhu.edu/journals/literature_and_medicine/toc/lm23.1.html doi: 10.1353/lm.2004.0006
- Lefait, S. (2012). Surveillance on screen: Monitoring contemporary films and television programs. Plymouth: Scarecrow Press.
- Lösch, A. (2006). Anticipating the futures of nanotechnology: visionary images of means of communication. Technology Analysis and Strategic Management, 18(3/4), 393–409. doi: 10.1080/09537320600777168
- Lyon, D. (2007). Surveillance studies: An overview. Cambridge: Polity Press.
- Murnaghan, S. (1987). Disguise and recognition in the Odyssey. Princeton: Princeton University Press.
- Neyland, D. (2009). Who's who? The biometric future and the politics of identity. European Journal of Criminology, 6(2), 135–155. doi: 10.1177/1477370808100543
- Notoatmodjo, G., & Thomborson, C. (2009). Passwords and perceptions. In L. Brankovic & W. Susilo (Eds.), Proceedings of the seventh australasian conference on information security (Vol. 98, pp. 71–78). Darlinghurst: Australian Computer Society.
- OECD. (2011). Digital identity management: Enabling innovation and trust in the internet economy. Retrieved from http://www.oecd.org/internet/interneteconomy/49338380.pdf
- O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91, 2019–2020. doi:10.1109/JPROC.2003.819611 doi: 10.1109/JPROC.2003.819605
- Propp, V. (1928/1968). Morphology of the folktale. Texas: University of Texas Press.
- Raven, P. G. (2013, July). Worlds that tell stories, stories that tell worlds: Diegesis and mimesis in science fiction and technoscience. Paper presented at Science in Public 2013, University of Nottingham, Nottingham.
- Sanquist, T., Mahy, H., & Morris, F. (2008). An exploratory risk perception study of attitudes toward homeland security systems. Risk Analysis, 28, 1125–1133. doi:10.1111/j.1539-6924.2008.01069.x
- Scholes, R., & Rabkin, E. S. (1977). Science fiction: History, science, vision. Oxford: Oxford University Press.
- Silverstone, R. (1988). Television myth and culture. In J. Carey (Ed.), Media, myths and narrative: Television and the press (pp. 20–47). London: Sage.
- Smith, A. D. (2008). Evolution and acceptability of medical applications of RFID implants among early users of technology. Health Marketing Quarterly, 24(1–2), 121–155. doi: 10.1080/07359680802125980
- Turney, J. (2013). Imagining technology (Nesta Working Paper No. 13/06), Nottingham.
- Whitley, E., & Hosein, G. (2009). Global challenges for identity politics. Basingstoke: Palgrave MacMillan.
- Williamson, H. R. (1957/2002). Who was the man in the iron mask? and other historical enigmas. London: Penguin Classics.
- van Zoonen, L. (2013). Reflections on a passport. In P. Bennett & J. McDougall (Eds.), Barthes’ mythologies today: Readings of contemporary culture (pp. 80–85). London: Routledge.