REFERENCES
- Amoore, L. & de Goede, M. (2005) ‘Governance, risk and dataveillance in the war on terror’, Crime, Law and Social Change, vol. 43, no. 2, pp. 149–173. 10.1007/s10611-005-1717-8
- Canhoto, A. I. & Backhouse, J. (2007) ‘Profiling under conditions of ambiguity—an application in the financial services industry’, Journal of Retailing and Consumer Services, vol. 14, no. 6, pp. 408–419. 10.1016/j.jretconser.2007.02.006
- EPIC. (2013) Privacy and Consumer Profiling, Electronic Privacy Information Center. Available at: http://epic.org/privacy/profiling/ (accessed 9 June 2013).
- Hall, A. & Mendel, J. (2012) ‘Threatprints, threads and triggers: imaginaries of risk in the ‘war on terror’’, Journal of Cultural Economy, vol. 5, no. 1, pp. 9–27. 10.1080/17530350.2012.640551
- McCarthy, T. (2013) ‘Obama defends secret NSA surveillance programs – as it happened’, The Guardian, 7 Jun 2013, Available at: http://www.guardian.co.uk/world/2013/jun/07/obama-administration-nsa-prism-revelations-live (accessed 9 June 2013).
- Whitley, E. A. & Rukanova, B. (2008) ‘A symmetric analysis of the border control information systems for people and trade’, in European Conference of Information Systems (ECIS), 9–11 June, Galway, Ireland. Available at: http://aisel.aisnet.org/ecis2008/index.2.html
- Yiu, C. (2012) The Big Data Opportunity: Making Government Faster, Smarter and More Personal, Policy Exchange. Available at: http://www.policyexchange.org.uk/publications/category/item/thebig-data-opportunity-making-government-faster-smarter-and-morepersonal.