Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds, ranging from what is commonly referred to as ‘hi-tech’ to ‘low-tech’ items such as walls or paper files, have garnered increased attention in critical approaches to (in)security. This article introduces a special issue whose contributions aim to further these approaches by questioning the role and political effects of security devices. It proposes an analytics of devices to examine the configuration and reconfiguration of security practices by attending to the equipment or instrumentation that make these practices possible and temporally stabilize them. The aim here is not to advance devices as a new unit of analysis, but to open new forays ...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Technology plays an increasing role in policing and other aspects of the criminal justice process. T...
Highly securitized sites, such as airports, are increasingly using screening methods designed to pur...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
International audienceWhen it comes to anticipating terrorism, do recent technological advancements ...
Crowdsensing platforms allow sharing data, collected by devices of individuals, to achieve common ob...
This introduction to the special issue of the same title sets out the context for a critical examina...
Advanced imaging technologies are a new class of peo-ple screening systems used at airports and othe...
New counterterrorism systems are spreading throughout the world. Many are based on behavior detectio...
Mobile technologies have brought about major changes in police equipment and police work. If a utopi...
In the aftermath of recent terrorist attacks in Europe, high-risk industries have dramatically incre...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Technology plays an increasing role in policing and other aspects of the criminal justice process. T...
Highly securitized sites, such as airports, are increasingly using screening methods designed to pur...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
The idea of securitization holds that perceived threats and the ensuing need for security measures a...
International audienceWhen it comes to anticipating terrorism, do recent technological advancements ...
Crowdsensing platforms allow sharing data, collected by devices of individuals, to achieve common ob...
This introduction to the special issue of the same title sets out the context for a critical examina...
Advanced imaging technologies are a new class of peo-ple screening systems used at airports and othe...
New counterterrorism systems are spreading throughout the world. Many are based on behavior detectio...
Mobile technologies have brought about major changes in police equipment and police work. If a utopi...
In the aftermath of recent terrorist attacks in Europe, high-risk industries have dramatically incre...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Technology plays an increasing role in policing and other aspects of the criminal justice process. T...
Highly securitized sites, such as airports, are increasingly using screening methods designed to pur...