4,885
Views
9
CrossRef citations to date
0
Altmetric
Editorial

Editors’ introduction: neoliberalism and/as terror

, &
Pages 1-14 | Received 06 Jan 2015, Accepted 06 Jan 2015, Published online: 09 Apr 2015

References

  • Adey, P., and B. Anderson. 2012. “Anticipating Emergencies: Technologies of Preparedness and the Matter of Security.” Security Dialogue 43 (2): 99–117. doi:10.1177/0967010612438432.
  • Amoore, L. 2006. “Biometric Borders: Governing Mobilities in the War on Terror.” Political Geography 25 (3): 336–351. doi:10.1016/j.polgeo.2006.02.001.
  • Amoore, L., and M. De Goede, eds. 2008. Risk and the War on Terror. Abingdon: Routledge.
  • Aradau, C. 2010. “Security that Matters: Critical Infrastructure and Objects of Protection.” Security Dialogue 41 (5): 491–514. doi:10.1177/0967010610382687.
  • Aradau, C., and R. Van Munster. 2007. “Governing Terrorism through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13 (1): 89–115. doi:10.1177/1354066107074290.
  • Baker-Beall, C., C. Heath-Kelly, and L. Jarvis, eds. 2014. Counter-Radicalisation: Critical Perspectives. Abingdon: Routledge.
  • Blakeley, R. 2007. “Bringing the State Back into Terrorism Studies.” European Political Science 6 (3): 228–235. doi:10.1057/palgrave.eps.2210139.
  • Blakeley, R. 2009. State Terrorism and Neoliberalism: The North in the South. Abingdon: Routledge.
  • Boukalas, C. 2015. “Class War-On-Terror: Counterterrorism, Accumulation, Crisis.” Critical Studies on Terrorism 8 (1): 55–71.
  • Burgess, P. 2007. “ Social Values and Material Threat: The European Programme for Critical Infrastructure Protection.” International Journal of Critical Infrastructures 3 (3/4): 471–487. doi:10.1504/IJCIS.2007.014121.
  • Campbell, D. 1992. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press.
  • Coaffee, J. 2009. Terrorism, Risk and the Global City: Towards Urban Resilience. Farnham: Ashgate.
  • Crenshaw, M. 2011. “The Debate over ‘Old’ versus ‘New’ Terrorism.” In Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences, edited by R. Coolsaet, 57–68. Farnham: Ashgate.
  • Croft, S. 2006. Culture, Crisis and America’s War on Terror. Cambridge: Cambridge University Press.
  • Di Leo, J. R., H. Giroux, S. McClennen, and K. J. Saltman. 2012. Neoliberalism, Education, Terrorism: Contemporary Dialogues. Boulder, CO: Paradigm.
  • Duyvesteyn, I. 2004. “How New is the New Terrorism?” Studies in Conflict and Terrorism 27 (5): 439–454. doi:10.1080/10576100490483750.
  • Elshimi, M. 2015. “De-Radicalisation Interventions as Technologies of the Self: A Foucauldian Analysis.” Critical Studies on Terrorism 8 (1): 110–129.
  • Fitzgerald, J. 2015. “Why Me? An Autoethnographic Account of the Bizarre Logic of Counterterrorism.” Critical Studies on Terrorism 8 (1): 163–180.
  • Frank, M. C. 2015. “Conjuring up the Next Attack: The Future-Orientedness of Terror and the Counterterrorist Imagination.” Critical Studies on Terrorism 8 (1): 90–109.
  • Furtado, H. 2015. “Against State Terror: Lessons on Memory, Counter-Terrorism and Resistance from the Global South.” Critical Studies on Terrorism 8 (1): 72–89.
  • George, S. 1999. “A Short History of Neo-Liberalism: Twenty Years of Elite Economics and Emerging Opportunities for Structural Change.” Conference on Economic Sovereignty in a Globalizing World, March 24–26. http://www.tni.org/article/short-history-neoliberalism.
  • Giroux, H. 2004. The Terror of Neoliberalism: Authoritarianism and the Eclipse of Democracy. London: Paradigm.
  • Giroux, H. 2005. “The Terror of Neoliberalism: Rethinking the Significance of Cultural Politics.” College Literature 32 (1): 1–19. doi:10.1353/lit.2005.0006.
  • Hall, S., D. Massey, and M. Rustin. 2013. “After Neoliberalism: Analysing the Present.” In After Neoliberalism? The Kilburn Manifesto. Accessed December 17, 2014. http://www.lwbooks.co.uk/journals/soundings/pdfs/manifestoframingstatement.pdf
  • Harvey, D. 2005. A Brief History of Neoliberalism. Oxford: Oxford University Press.
  • Heath-Kelly, C. 2013a. Politics of Violence: Militancy, International Politics, Killing in the Name. Abingdon: Routledge.
  • Heath-Kelly, C. 2013b. “Counter-Terrorism and the Counterfactual: Producing the ‘Radicalisation’ Discourse and the UK PREVENT Strategy.” The British Journal of Politics & International Relations 15 (3): 394–415. doi:10.1111/j.1467-856X.2011.00489.x.
  • Heng, Y. K., and K. McDonagh. 2009. Risk, Global Governance and Security: The Other War on Terror. Abingdon: Routledge.
  • Hite, K. 2012. Politics and the Art of Commemoration: Memorials to Struggle in Latin America and Spain. Abingdon: Routledge.
  • Hoijtink, M. 2014. “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe.” Security Dialogue 45 (5): 458–475. doi:10.1177/0967010614544312.
  • Hoijtink, M. 2015. “Performativity and the Project: Enacting Urban Transport Security in Europe.” Critical Studies on Terrorism 8 (1): 130–146.
  • Jackson, R. 2005. Writing the War on Terror: Language, Politics and Counter-Terrorism. Manchester: Manchester University Press.
  • Jackson, R. 2015. “The Epistemological Crisis of Counterterrorism.” Critical Studies on Terrorism 8 (1): 33–54.
  • Jackson, R., E. Murphy, and S. Poynting, eds. 2010. Contemporary State Terrorism: Theory and Practice. Abingdon: Routledge.
  • Jarvis, L., and M. Lister. 2014. “State Terrorism Research and Critical Terrorism Studies: An Assessment.” Critical Studies on Terrorism 7 (1): 43–61. doi:10.1080/17539153.2013.877669.
  • Klein, N. 2007. The Shock Doctrine. London: Penguin.
  • Laqueur, W. 1999. The New Terrorism: Fanaticism and the Arms of Mass Destruction. Oxford: Oxford University Press.
  • Legg, S. 2005. “Sites of Counter-Memory: The Refusal to Forget and the Nationalist Struggle in Colonial Delhi.” Historical Geography 33: 180–201.
  • Lobo-Guerrero, L. 2012. Insuring War: Sovereignty, Security and Risk. Abingdon: Routledge.
  • Lundborg, T., and N. Vaughan-Williams. 2011. “Resilience, Critical Infrastructure, and Molecular Security: The Excess of ‘Life’ in Biopolitics.” International Political Sociology 5 (4): 367–383. doi:10.1111/j.1749-5687.2011.00140.x.
  • Mythen, G., and S. Walklate. 2006. “Criminology and Terrorism: Which Thesis? Risk Society or Governmentality?” The British Journal of Criminology 46 (3): 379–398. doi:10.1093/bjc/azi074.
  • Neocleous, M. 2015. “The Universal Adversary Will Attack: Pigs, Pirates, Zombies, Satan and the Class War.” Critical Studies on Terrorism 8 (1): 1–14.
  • Poulantzas, N. 1979. “The Political Crisis and the Crisis of the State.” In Critical Sociology: European Perspectives, 374–381, edited by J. W. Freiberg. New York: Irvington.
  • Qureshi, A. 2015. “PREVENT: Creating ‘Radicals’ to Strengthen Anti-Muslim Narratives.” Critical Studies on Terrorism 8 (1): 181–191.
  • Said, E. 1978. Orientalism. London: Routledge and Kegan Paul.
  • Sparke, M. B. 2006. “A Neoliberal Nexus: Economy, Security and the Biopolitics of Citizenship on the Border.” Political Geography 25 (2): 151–180. doi:10.1016/j.polgeo.2005.10.002.
  • UK Government. 2014. “CNC supports National Counter Terrorism Awareness Campaign.” Accessed December 10. https://www.gov.uk/government/news/cnc-supports-national-counter-terrorism-awareness-campaign
  • Vedby Rasmussen, M. 2004. “‘It Sounds Like a Riddle’: Security Studies, the War on Terror and Risk.” Millennium – Journal of International Studies 33 (2): 381–395. doi:10.1177/03058298040330020601.
  • Young, R. 2015. “Going Fifth Freedom: Fighting the War on Terror in the Splinter Cell: Blacklist Video Game.” Critical Studies on Terrorism 8 (1): 147–162.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.