References
- Amoore, L. 2009. “Algorithmic War: Everyday Geographies of the War on Terror.” Antipode 41 (1): 49–69. doi:10.1111/j.1467-8330.2008.00655.x.
- Amoore, L. 2013. The Politics of Possibility. Risk and Security Beyond Probability. Durham, NC: Duke University Press.
- Anderson, B. 2010. “Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies.” Progress in Human Geography 34 (6): 777–798. doi:10.1177/0309132510362600.
- Aradau, C., and R. Van Munster. 2007. “Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13 (1): 89–115. doi:10.1177/1354066107074290.
- Beck, U. 1992. Risk Society. Towards a New Modernity. London: SAGE Publications.
- Bialasiewicz, L., D. Campbell, S. Elden, S. Graham, A. Jeffrey, and A. Williams. 2007. “Performing Security: The Imaginative Geographies of Current US Strategy.” Political Geography 26 (4): 405–422. doi:10.1016/j.polgeo.2006.12.002.
- Bigo, D. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives 27: 63–92.
- Butler, J. 1993. Bodies That Matter. London: Routledge.
- Campbell, D. 1992. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press.
- Collier, S. 2008. “Enacting Catastrophe: Preparedness, Insurance, Budgetary Rationalization.” Economy and Society 37 (2): 224–250. doi:10.1080/03085140801933280
- Collier, S., and A. Lakoff. 2008. “Distributed Preparedness: The Spatial Logic of Domestic Security in the United States.” Environment and Planning D: Society and Space 26: 7–28.
- Collier, S., and A. Lakoff. 2015. “Vital Systems Security: Reflexive Biopolitics and the Government of Emergency.” Theory, Culture & Society 32 (2): 19–51.
- Commission of the European Communities. 2006a. “Meeting the Challenge: The European Security Research Agenda. A Report from the European Security Research Advisory Board.” Accessed January 14, 2014. http://ec.europa.eu/enterprise/policies/security/files/esrab_report_en.pdf
- Commission of the European Communities. 2006b. “Communication from the Commission on a European Programme for Critical Infrastructure Protection.” COM(2006) 786 final.
- Commission of the European Communities. 2010. “The EU Internal Security Strategy in Action: Five Steps towards a More Secure Europe.” COM(2010) 673 final.
- Commission of the European Communities. 2012a. “Security Industrial Policy. Action Plan for an Innovative and Competitive Security Industry.” COM(2010) 417 final.
- Commission of the European Communities. 2012b. “Commission Staff Working Document on Transport Security.” SWD(2012) 143 final.
- Council of the European Union. 2005. “The European Union Counter-Terrorism Strategy.” 14469/4/05, REV 4.
- Council of the European Union. 2010a. “EU Counter-Terrorism Strategy – Discussion Paper.” 15894/1/10, rev 1.
- Council of the European Union. 2010b. “EU Counter-Terrorism Strategy – Discussion Paper.” 9685/10.
- Cowen, D. 2010. “A Geography of Logistics: Market Authority and the Security of Supply Chains.” Annals of the Association of American Geographers 100 (3): 600–620. doi:10.1080/00045601003794908.
- De Goede, M. 2012. Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis: University of Minnesota Press.
- De Goede, M., S. Simon, and M. Hoijtink. 2014. “Performing Preemption.” Security Dialogue 45 (5): 411–422. doi:10.1177/0967010614543585.
- Ecorys Research and Consulting. 2009. “Study on the Competitiveness of the EU Security Industry: Final Report.” Accessed December 9, 2014. http://ec.europa.eu/enterprise/policies/security/files/study_on_the_competitiveness_of_the_eu_security_industry_en.pdf
- Ecorys Research and Consulting. 2012. “Study on Civil Military Synergies in the Field of Security: Final Report.” Accessed December 9, 2014. http://ec.europa.eu/enterprise/policies/security/files/doc/study_ecorys_cimisos_final_report_en.pdf
- Heath-Kelly, C., L. Jarvis, and C. Baker-Beall. 2014. “Editors’ Introduction: Critical Terrorism Studies: Practice, Limits and Experience.” Critical Studies on Terrorism 7 (1): 1–10. doi:10.1080/17539153.2014.881198.
- Hoijtink, M. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. doi:10.1177/0967010614544312.
- Law, J. 2002. Aircraft Stories. Decentering the Object in Technoscience. Durham, NC: Duke University Press.
- Massumi, B. 2007. “Potential Politics and the Primacy of Preemption.” Theory & Event 10 (2).
- McGoey, L. 2012. “Strategic Unknowns: Towards a Sociology of Ignorance.” Economy and Society 41 (1): 1–16. doi:10.1080/03085147.2011.637330.
- Murray, L. T. 2007. “Practices of Assemblage and Community Forest Management.” Economy and Society 36 (2): 263–293. doi:10.1080/03085140701254308.
- Simon, S. 2012. “Suspicious Encounters: Ordinary Preemption and the Securitization of Photography.” Security Dialogue 43 (2): 157–173. doi:10.1177/0967010612438433.
- Steinkohl, J., and Y. Perreal. 2012. “SECUR-ED: Providing a Set of Tools to Improve Urban Transport Security.” Vol. 10, Eurotransport, pp. 74–76.
- Sunder Rajan, K. 2006. Biocapital: The Constitution of Postgnomic Life. Durham, NC: Duke University Press.