ID: CBA383926883

Security technologies

Show 23 citations related to Security technologies
Show 23 citations related to Security technologies as a subject or category


Permalink
data.isiscb.org/p/isis/authority/CBA383926883
Publications timeline | Click to expand
Updated timeline is loading. Please wait. The server may be processing several jobs...
Related places

Related Citations

Article Silvan Pollozek; Jan-Hendrik Passoth (2023)
Provisional by design: Frontex data infrastructures and the Europeanization of migration and border control. Science as Culture (pp. 411-434). (/p/isis/citation/CBB906319443/) unapi

Article Bruno Oliveira Martins (2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management. Science as Culture (pp. 435-459). (/p/isis/citation/CBB687707247/) unapi

Book Ashley Sweetman (2022)
Cyber and the City: Securing London’s Banks in the Computer Age. (/p/isis/citation/CBB340774234/) unapi

Book Brian Hochman (2022)
The Listeners: A History of Wiretapping in the United States. (/p/isis/citation/CBB775086796/) unapi

Article Evan Selinger; Darrin Durant (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service. Science as Culture (pp. 92-106). (/p/isis/citation/CBB181826170/) unapi

Book Andrew J. Stewart (2021)
A Vulnerable System: The History of Information Security in the Computer Age. (/p/isis/citation/CBB486585682/) unapi

Book Duane C. Wilson (2021)
Cybersecurity. (/p/isis/citation/CBB201310866/) unapi

Article Karin Bijsterveld (2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989. Isis: International Review Devoted to the History of Science and Its Cultural Influences (pp. 215-241). (/p/isis/citation/CBB388750124/) unapi

Article Katrin M. Kämpf (2020)
Pedophilia Screening in Technosecurity Culture The Construction of Dangerous Sub-populations in the Name of Security. Science as Culture (pp. 127-152). (/p/isis/citation/CBB009060974/) unapi

Article Michelle Spektor (2020)
Imagining the Biometric Future: Debates Over National Biometric Identification in Israel. Science as Culture (pp. 100-126). (/p/isis/citation/CBB868369028/) unapi

Article Darren Ellis (2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia. Science as Culture (pp. 11-29). (/p/isis/citation/CBB734944273/) unapi

Article David Skinner (2020)
Race, Racism and Identification in the Era of Technosecurity. Science as Culture (pp. 77-99). (/p/isis/citation/CBB130537802/) unapi

Article Patrick Petit (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization. Science as Culture (pp. 30-56). (/p/isis/citation/CBB181724884/) unapi

Article Rebecca J. Hester (2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology. Science as Culture (pp. 153-176). (/p/isis/citation/CBB548068287/) unapi

Article Jutta Weber; Katrin M. Kämpf (2020)
Technosecurity Cultures: Introduction. Science as Culture (pp. 1-10). (/p/isis/citation/CBB780946835/) unapi

Article R. Subramanian (2020)
Historical Consciousness of Cyber Security in India. IEEE Annals of the History of Computing (pp. 71-93). (/p/isis/citation/CBB132311682/) unapi

Article Magne Brekke Rabben; Øyvind Thomassen (2019)
Humane treatment versus means of control: coercive measures in Norwegian high-security psychiatry, 1895–1978. History of Psychiatry (pp. 424-442). (/p/isis/citation/CBB458667420/) unapi

Book Ruha Benjamin (2019)
Captivating Technology: Race, Carceral Technoscience, and Liberatory Imagination in Everyday Life. (/p/isis/citation/CBB021638267/) unapi

Book Mark Maguire; Ursula Rao; Nils Zurawski (2018)
Bodies as Evidence: Security, Knowledge, and Power. (/p/isis/citation/CBB090684871/) unapi

Article Gillian Allmond (2017)
Liberty and the individual: the colony asylum in Scotland and England. History of Psychiatry (pp. 29-43). (/p/isis/citation/CBB034575395/) unapi

Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment