Skip Nav Destination
Close Modal
Search Results for
Security/surveillance
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Subjects
Book Series
Date
Availability
1-20 of 30 Search Results for
Security/surveillance
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... Sexuality and empire Torture Biopolitics Empire Security/surveillance Intimacy ...
Published: 04 September 2015
EISBN: 978-0-8223-7529-6
... airport security lateral surveillance advertising consumerism Transportation Security Administration ...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
DOI: 10.1215/9780822373612-009
EISBN: 978-0-8223-7361-2
... to which designated populations have been, and continue to be, exposed. Sexuality and empire Torture Biopolitics Empire Security/surveillance Intimacy ...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... Security/surveillance Intimacy This chapter takes up Derek Walcott’s challenging definition of colonialism as the rot that remains when the men are gone to reckon with what endures in tangible and intangible forms. The focus is less on recognized ruins than on processes of ongoing ruination. It asks...
Published: 04 September 2015
DOI: 10.1215/9780822375296-002
EISBN: 978-0-8223-7529-6
... and confiscation of consumer items, the development of “airport-friendly” products, and the use of the airport security checkpoint as a trope of discipline and deprivation in advertising. airport security lateral surveillance advertising consumerism Transportation Security Administration ...
Published: 15 May 2015
DOI: 10.1215/9780822375463-012
EISBN: 978-0-8223-7546-3
... of the methodological as well as conceptual limits of surveillance studies, we briefly compare surveillance studies to policing studies, security studies, and intelligence studies. After raising these questions about the direction of surveillance studies and the “research methods gap” therein, we turn to a discussion...
... of surveillance studies, we briefly compare surveillance studies to policing studies, security studies, and intelligence studies. After raising these questions about the direction of surveillance studies and the “research methods gap” therein, we turn to a discussion of the feminist work of Dorothy Smith and her...
Published: 04 September 2015
DOI: 10.1215/9780822375296-001
EISBN: 978-0-8223-7529-6
..., consent and coercion are knotted together in complex ways that are difficult to disentangle. The different types of transparency at work across security cultures of terrorism prevention are defined, including voluntary, forcible, and involuntary. Recent work in surveillance studies is critiqued...
Published: 02 August 2024
DOI: 10.1215/9781478059752-006
EISBN: 978-1-4780-5975-2
... part of a single process whose object was the deterritorialization of local security practices in a manner that was conducive to central state control. While Siskamling involved subjecting gangs, security guards, and “criminals” to surveillance, Petrus sought to symbolically appropriate for the state...
Published: 02 August 2024
EISBN: 978-1-4780-5975-2
... prongs were part of a single process whose object was the deterritorialization of local security practices in a manner that was conducive to central state control. While Siskamling involved subjecting gangs, security guards, and “criminals” to surveillance, Petrus sought to symbolically appropriate...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
DOI: 10.1215/9780822373612-006
EISBN: 978-0-8223-7361-2
... displaces a crucial imperial genealogy and history of the present that forms the basis of contemporary imperial counterinsurgency, surveillance, security, and “preparedness” strategies. Here the concept work is around the sentiments and sensibilities that notions of security produce, on the subjects...
Published: 15 May 2015
DOI: 10.1215/9780822375463-008
EISBN: 978-0-8223-7546-3
... U.S. media outlets created a supportive domestic context of reception for surveillance technologies adopted in the post-9/11 era by portraying the United States’ enemies in the war on terror as the “opaque” bodies of reference from which “transparent” passenger-suspects are encouraged...
...Biometric Technologies as Surveillance Assemblages U.S. media outlets created a supportive domestic context of reception for surveillance technologies adopted in the post-9/11 era by portraying the United States’ enemies in the war on terror as the “opaque” bodies of reference from which...
Published: 07 September 2015
DOI: 10.1215/9780822375302-005
EISBN: 978-0-8223-7530-2
... Chapter 4 examines the discretionary power wielded by Transportation Security Administration (TSA) agents and airline workers through cases mainly of black women who were subjected to invasive pat downs, hair searches, and other security measures at U.S. airports. By questioning how black women...
Published: 04 September 2015
DOI: 10.1215/9780822375296-004
EISBN: 978-0-8223-7529-6
... Screening by full-body and biometric scanners provides US citizens and others traveling within the United States and select other nations the opportunity to distinguish themselves from would-be terrorists. Surveillance technologies render passengers’ three-dimensional bodies as flat visual...
Published: 02 August 2024
DOI: 10.1215/9781478059752-007
EISBN: 978-1-4780-5975-2
... of “brothers” who shared an institutional history and collaborated in an illicit economy. Fraternities shaped how surveillance, law enforcement, and efforts to maintain territorial security were carried out at the front line of police work, bridging the gap between central state power and informal territorial...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... imperial genealogy and history of the present that forms the basis of contemporary imperial counterinsurgency, surveillance, security, and “preparedness” strategies. Here the concept work is around the sentiments and sensibilities that notions of security produce, on the subjects they endeavor to create...
Published: 04 September 2015
EISBN: 978-0-8223-7529-6
... trusted traveler prescreening surveillance technology performance biometrics transparency ...
Published: 07 September 2015
EISBN: 978-0-8223-7530-2
... black women Pamela Z South Park TSA (Transportation Security Administration) ...
... transparency terrorism prevention Umar Farouk Abdulmutallab Transportation Security Administration full-body scanners ...
1