2008
DOI: 10.4324/9780203927700
|View full text |Cite
|
Sign up to set email alerts
|

Risk and the War on Terror

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
80
0
2

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 258 publications
(82 citation statements)
references
References 50 publications
0
80
0
2
Order By: Relevance
“…As a result, the institutions, techniques, and technologies that monitor and regulate global fl ows have commanded reinforced academic attention. This is evident from inquiries into a broad range of topics: the discursive and practical regimes that attempt to sketch out the presumable danger from unrestricted movement (e.g., Jackson 2005 ;Balzacq 2011 ;Huysmans 2006 ;; the transformation of borders and border checkpoints in the struggle against (illegal) movement (e.g., Salter 2004 ;Pallitto and Heyman 2008 ;Muller 2009 ;Parizot et al 2014 ); airports and their security regimes as the most symbolic sites of the fi ght against global terror after 9/ 11 (e.g., Adey 2004 ;Leese and Koenigseder 2015 ;Lyon 2006 ;Schouten 2014 ); the practice of information-gathering, databases, and algorithms that inform risk assessments and other forms of anticipation (e.g., Amoore and De Goede 2008 ;Lyon 2003 ;Gandy 2010 ;De Vries 2010 ;Rouvroy 2013 ;Leese 2014 ); or the modes of cooperation and information exchange between security agencies and security professionals (e.g., Bigo et al 2007 ;Balzacq 2008 ;Geyer 2008 ;De Hert and Bellanova 2011 ). This is another list that could be continued, but it suffi ces to illustrate the wide array of inquiries into mobility against the backdrop of the politics of security.…”
Section: Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, the institutions, techniques, and technologies that monitor and regulate global fl ows have commanded reinforced academic attention. This is evident from inquiries into a broad range of topics: the discursive and practical regimes that attempt to sketch out the presumable danger from unrestricted movement (e.g., Jackson 2005 ;Balzacq 2011 ;Huysmans 2006 ;; the transformation of borders and border checkpoints in the struggle against (illegal) movement (e.g., Salter 2004 ;Pallitto and Heyman 2008 ;Muller 2009 ;Parizot et al 2014 ); airports and their security regimes as the most symbolic sites of the fi ght against global terror after 9/ 11 (e.g., Adey 2004 ;Leese and Koenigseder 2015 ;Lyon 2006 ;Schouten 2014 ); the practice of information-gathering, databases, and algorithms that inform risk assessments and other forms of anticipation (e.g., Amoore and De Goede 2008 ;Lyon 2003 ;Gandy 2010 ;De Vries 2010 ;Rouvroy 2013 ;Leese 2014 ); or the modes of cooperation and information exchange between security agencies and security professionals (e.g., Bigo et al 2007 ;Balzacq 2008 ;Geyer 2008 ;De Hert and Bellanova 2011 ). This is another list that could be continued, but it suffi ces to illustrate the wide array of inquiries into mobility against the backdrop of the politics of security.…”
Section: Securitymentioning
confidence: 99%
“…That constituted for him a case of risk-based security (cf. Aradau et al 2008 ;Muller 2008 ;Amoore and De Goede 2008 ;O'Malley 2004 ), which contrasted with the way in which sniffer dogs at the luggage reclaim area of the airport had smelt his luggage, searching for unauthorised goods or substances. He also observed the CCTV cameras that recorded all his movements from the airport to the university, the posters and announcements that alerted travellers to report any unaccompanied luggage or suspicious behaviour, and the police offi cers in high-visibility jackets, but by this time he was too tired to make up his mind as to what exact form of security these represented (e.g., Rasmussen 2004 ; Bigo and Tsoukala 2008 ;Stephens and Vaughan-Williams 2008 ).…”
Section: Connectivity As Problem: Security Mobility Liberals and Cmentioning
confidence: 99%
See 1 more Smart Citation
“…Regulation on AML/CTF mixes the 'repressive approach' of criminal law with the 'preventative approach' of banking law [34]. In terms of prevention, the FATF take on AML further emphasises the uses and merits of the 'risk based approach', as underscored in the first of the 40 FATF Recommendations [6], as well as in subsequent EU Directives [11,12].…”
Section: Delineating the Risk-based Approachmentioning
confidence: 99%
“…I argue that the differential influence of their various claims is best understood by examining what it means to know and care for a place. [risk, evidence, place, epistemology, waste, science and technology] R isk calculation-the rational management of indeterminacyappears across multiple arenas of contemporary life, from biomedicine (Rose 2005) and high finance (Lee and Lipuma 2002;Zaloom 2004) to technoenvironmental disasters (Fortun 2001;Petryna 2002) and the war on terror (Amoore and de Goede 2008). As the concept of "risk" became more scientific and stochastic, beginning in the late 19th century, the ability to distinguish between likely and unlikely threats acquired the status of a valued technique.…”
Section: Introductionmentioning
confidence: 99%