2000
DOI: 10.4000/sdt.36626
|View full text |Cite
|
Sign up to set email alerts
|

Régulation de la carrière d’un instrument de santé. Les parcours de l’usage du test du VIH dans l’emploi en France et aux États-Unis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…These lists function as security devices that ‘allow sanctions regimes and regulations on “dirty money” to be made operational on a daily basis’ (Amicelle and Jacobsen 2016 , 90). Building on the work of Crespin and Lascoumes ( 2000 , 134), Amicelle and Jacobsen conceptualise the process of appropriation as ‘ the dynamic process of dialogue and reflection between an object , [the lists], and a “space of activities”’ it is introduced to, in this case ‘finance in general, banks in particular’ (Amicelle and Jacobsen 2016 , 91). Their research of compliance officers in the United Kingdom illustrates that terrorist watch-lists need to function alongside existing ‘filtering engines’ that flag suspicious transactions.…”
Section: Appropriating Securitymentioning
confidence: 99%
“…These lists function as security devices that ‘allow sanctions regimes and regulations on “dirty money” to be made operational on a daily basis’ (Amicelle and Jacobsen 2016 , 90). Building on the work of Crespin and Lascoumes ( 2000 , 134), Amicelle and Jacobsen conceptualise the process of appropriation as ‘ the dynamic process of dialogue and reflection between an object , [the lists], and a “space of activities”’ it is introduced to, in this case ‘finance in general, banks in particular’ (Amicelle and Jacobsen 2016 , 91). Their research of compliance officers in the United Kingdom illustrates that terrorist watch-lists need to function alongside existing ‘filtering engines’ that flag suspicious transactions.…”
Section: Appropriating Securitymentioning
confidence: 99%