448
Views
5
CrossRef citations to date
0
Altmetric
Articles

Performativity and the project: enacting urban transport security in Europe

Pages 130-146 | Received 17 Oct 2014, Accepted 15 Dec 2014, Published online: 09 Apr 2015

References

  • Amoore, L. 2009. “Algorithmic War: Everyday Geographies of the War on Terror.” Antipode 41 (1): 49–69. doi:10.1111/j.1467-8330.2008.00655.x.
  • Amoore, L. 2013. The Politics of Possibility. Risk and Security Beyond Probability. Durham, NC: Duke University Press.
  • Anderson, B. 2010. “Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies.” Progress in Human Geography 34 (6): 777–798. doi:10.1177/0309132510362600.
  • Aradau, C., and R. Van Munster. 2007. “Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13 (1): 89–115. doi:10.1177/1354066107074290.
  • Beck, U. 1992. Risk Society. Towards a New Modernity. London: SAGE Publications.
  • Bialasiewicz, L., D. Campbell, S. Elden, S. Graham, A. Jeffrey, and A. Williams. 2007. “Performing Security: The Imaginative Geographies of Current US Strategy.” Political Geography 26 (4): 405–422. doi:10.1016/j.polgeo.2006.12.002.
  • Bigo, D. 2002. “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives 27: 63–92.
  • Butler, J. 1993. Bodies That Matter. London: Routledge.
  • Campbell, D. 1992. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press.
  • Collier, S. 2008. “Enacting Catastrophe: Preparedness, Insurance, Budgetary Rationalization.” Economy and Society 37 (2): 224–250. doi:10.1080/03085140801933280
  • Collier, S., and A. Lakoff. 2008. “Distributed Preparedness: The Spatial Logic of Domestic Security in the United States.” Environment and Planning D: Society and Space 26: 7–28.
  • Collier, S., and A. Lakoff. 2015. “Vital Systems Security: Reflexive Biopolitics and the Government of Emergency.” Theory, Culture & Society 32 (2): 19–51.
  • Commission of the European Communities. 2006a. “Meeting the Challenge: The European Security Research Agenda. A Report from the European Security Research Advisory Board.” Accessed January 14, 2014. http://ec.europa.eu/enterprise/policies/security/files/esrab_report_en.pdf
  • Commission of the European Communities. 2006b. “Communication from the Commission on a European Programme for Critical Infrastructure Protection.” COM(2006) 786 final.
  • Commission of the European Communities. 2010. “The EU Internal Security Strategy in Action: Five Steps towards a More Secure Europe.” COM(2010) 673 final.
  • Commission of the European Communities. 2012a. “Security Industrial Policy. Action Plan for an Innovative and Competitive Security Industry.” COM(2010) 417 final.
  • Commission of the European Communities. 2012b. “Commission Staff Working Document on Transport Security.” SWD(2012) 143 final.
  • Council of the European Union. 2005. “The European Union Counter-Terrorism Strategy.” 14469/4/05, REV 4.
  • Council of the European Union. 2010a. “EU Counter-Terrorism Strategy – Discussion Paper.” 15894/1/10, rev 1.
  • Council of the European Union. 2010b. “EU Counter-Terrorism Strategy – Discussion Paper.” 9685/10.
  • Cowen, D. 2010. “A Geography of Logistics: Market Authority and the Security of Supply Chains.” Annals of the Association of American Geographers 100 (3): 600–620. doi:10.1080/00045601003794908.
  • De Goede, M. 2012. Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis: University of Minnesota Press.
  • De Goede, M., S. Simon, and M. Hoijtink. 2014. “Performing Preemption.” Security Dialogue 45 (5): 411–422. doi:10.1177/0967010614543585.
  • Ecorys Research and Consulting. 2009. “Study on the Competitiveness of the EU Security Industry: Final Report.” Accessed December 9, 2014. http://ec.europa.eu/enterprise/policies/security/files/study_on_the_competitiveness_of_the_eu_security_industry_en.pdf
  • Ecorys Research and Consulting. 2012. “Study on Civil Military Synergies in the Field of Security: Final Report.” Accessed December 9, 2014. http://ec.europa.eu/enterprise/policies/security/files/doc/study_ecorys_cimisos_final_report_en.pdf
  • Heath-Kelly, C., L. Jarvis, and C. Baker-Beall. 2014. “Editors’ Introduction: Critical Terrorism Studies: Practice, Limits and Experience.” Critical Studies on Terrorism 7 (1): 1–10. doi:10.1080/17539153.2014.881198.
  • Hoijtink, M. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. doi:10.1177/0967010614544312.
  • Law, J. 2002. Aircraft Stories. Decentering the Object in Technoscience. Durham, NC: Duke University Press.
  • Massumi, B. 2007. “Potential Politics and the Primacy of Preemption.” Theory & Event 10 (2).
  • McGoey, L. 2012. “Strategic Unknowns: Towards a Sociology of Ignorance.” Economy and Society 41 (1): 1–16. doi:10.1080/03085147.2011.637330.
  • Murray, L. T. 2007. “Practices of Assemblage and Community Forest Management.” Economy and Society 36 (2): 263–293. doi:10.1080/03085140701254308.
  • Simon, S. 2012. “Suspicious Encounters: Ordinary Preemption and the Securitization of Photography.” Security Dialogue 43 (2): 157–173. doi:10.1177/0967010612438433.
  • Steinkohl, J., and Y. Perreal. 2012. “SECUR-ED: Providing a Set of Tools to Improve Urban Transport Security.” Vol. 10, Eurotransport, pp. 74–76.
  • Sunder Rajan, K. 2006. Biocapital: The Constitution of Postgnomic Life. Durham, NC: Duke University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.