Technologies of InSecurity (eBook, PDF)
The Surveillance of Everyday Life
Redaktion: Franko Aas, Katja; Lomell, Heidi Mork; Gundhus, Helene Oppen
46,95 €
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
46,95 €
Als Download kaufen
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
23 °P sammeln
Technologies of InSecurity (eBook, PDF)
The Surveillance of Everyday Life
Redaktion: Franko Aas, Katja; Lomell, Heidi Mork; Gundhus, Helene Oppen
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Technologies of (In)security examines how general social and political concerns about terrorism, crime, migration and globalization are translated into concrete practices of securitisation of everyday life.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 1.99MB
Andere Kunden interessierten sich auch für
- Security Games (eBook, PDF)47,95 €
- Surveillance and Democracy (eBook, PDF)46,95 €
- Tsachi Keren-PazSex Trafficking (eBook, PDF)50,95 €
- Mandy BurtonDomestic Abuse, Victims and the Law (eBook, PDF)42,95 €
- Sarah MurrayCommunity Justice Centres (eBook, PDF)21,95 €
- Technologies of InSecurity (eBook, ePUB)46,95 €
- Michael SalterOrganised Sexual Abuse (eBook, PDF)48,95 €
-
-
-
Technologies of (In)security examines how general social and political concerns about terrorism, crime, migration and globalization are translated into concrete practices of securitisation of everyday life.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 296
- Erscheinungstermin: 21. August 2008
- Englisch
- ISBN-13: 9781134040360
- Artikelnr.: 43073865
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 296
- Erscheinungstermin: 21. August 2008
- Englisch
- ISBN-13: 9781134040360
- Artikelnr.: 43073865
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Katja Franko Aas is Assistant Professor at the Department of Criminology and Sociology of Law, University of Oslo. Helene Oppen Gundhus is Assistant Professor at the Norwegian Police University College. Heidi Mork Lomell is Post-doctoral Research Fellow at the Department of Criminology and Sociology of Law, University of Oslo.
Introduction: Technologies of (in)security
K .F. Aas
H. O. Gundhus
H. M. Lomell Part 1: (In)security and terror 1. Mundane Terror and the Threat of Everyday Objects
Daniel Neyland 2. Identification Practices: state formation
crime control
colonialism and war
David Lyon Part 2: (In)secure spaces 3. Spatial Articulations of Surveillance at the FIFA World Cup 2006 in Germany
Francisco Klauser 4. Checkpoint Security: Gateways
airports
and the architecture of security
Richard Jones Part 3: (In)secure visibilities 5. 24/7/365: Mobility
locability and the satellite tracking of offenders
Mike Nellis 6. Empowered Watchers or Disempowered Workers? The ambiguities of power within technologies of security
Gavin John Douglas Smith 7. Hijacking Surveillance? The new moral landscapes of amateur photographing
Hille Koskela Part 4: (In)secure virtualities 8. The Role of the Internet in the Twenty First Century Prison: Insecure technologies in secure places
Yvonne Jewkes 9. Computer Crime Control as Industry: Virtual insecurity and the market for private policing
Majid Yar Part 5: (In)Secure rights 10. Technologies of Surveillance and the erosion of institutional trust
Benjamin Goold 11. Another Side of the Story: Defence lawyers' views on DNA evidence
Johanne Yttrl Dahl 12. 'Catastrophic Moral Horror': Torture
terror and rights
Vidar Halvorsen Epilogue: The Inescapable Insecurity of security technologies?
Lucia Zedner
K .F. Aas
H. O. Gundhus
H. M. Lomell Part 1: (In)security and terror 1. Mundane Terror and the Threat of Everyday Objects
Daniel Neyland 2. Identification Practices: state formation
crime control
colonialism and war
David Lyon Part 2: (In)secure spaces 3. Spatial Articulations of Surveillance at the FIFA World Cup 2006 in Germany
Francisco Klauser 4. Checkpoint Security: Gateways
airports
and the architecture of security
Richard Jones Part 3: (In)secure visibilities 5. 24/7/365: Mobility
locability and the satellite tracking of offenders
Mike Nellis 6. Empowered Watchers or Disempowered Workers? The ambiguities of power within technologies of security
Gavin John Douglas Smith 7. Hijacking Surveillance? The new moral landscapes of amateur photographing
Hille Koskela Part 4: (In)secure virtualities 8. The Role of the Internet in the Twenty First Century Prison: Insecure technologies in secure places
Yvonne Jewkes 9. Computer Crime Control as Industry: Virtual insecurity and the market for private policing
Majid Yar Part 5: (In)Secure rights 10. Technologies of Surveillance and the erosion of institutional trust
Benjamin Goold 11. Another Side of the Story: Defence lawyers' views on DNA evidence
Johanne Yttrl Dahl 12. 'Catastrophic Moral Horror': Torture
terror and rights
Vidar Halvorsen Epilogue: The Inescapable Insecurity of security technologies?
Lucia Zedner
Introduction: Technologies of (in)security
K .F. Aas
H. O. Gundhus
H. M. Lomell Part 1: (In)security and terror 1. Mundane Terror and the Threat of Everyday Objects
Daniel Neyland 2. Identification Practices: state formation
crime control
colonialism and war
David Lyon Part 2: (In)secure spaces 3. Spatial Articulations of Surveillance at the FIFA World Cup 2006 in Germany
Francisco Klauser 4. Checkpoint Security: Gateways
airports
and the architecture of security
Richard Jones Part 3: (In)secure visibilities 5. 24/7/365: Mobility
locability and the satellite tracking of offenders
Mike Nellis 6. Empowered Watchers or Disempowered Workers? The ambiguities of power within technologies of security
Gavin John Douglas Smith 7. Hijacking Surveillance? The new moral landscapes of amateur photographing
Hille Koskela Part 4: (In)secure virtualities 8. The Role of the Internet in the Twenty First Century Prison: Insecure technologies in secure places
Yvonne Jewkes 9. Computer Crime Control as Industry: Virtual insecurity and the market for private policing
Majid Yar Part 5: (In)Secure rights 10. Technologies of Surveillance and the erosion of institutional trust
Benjamin Goold 11. Another Side of the Story: Defence lawyers' views on DNA evidence
Johanne Yttrl Dahl 12. 'Catastrophic Moral Horror': Torture
terror and rights
Vidar Halvorsen Epilogue: The Inescapable Insecurity of security technologies?
Lucia Zedner
K .F. Aas
H. O. Gundhus
H. M. Lomell Part 1: (In)security and terror 1. Mundane Terror and the Threat of Everyday Objects
Daniel Neyland 2. Identification Practices: state formation
crime control
colonialism and war
David Lyon Part 2: (In)secure spaces 3. Spatial Articulations of Surveillance at the FIFA World Cup 2006 in Germany
Francisco Klauser 4. Checkpoint Security: Gateways
airports
and the architecture of security
Richard Jones Part 3: (In)secure visibilities 5. 24/7/365: Mobility
locability and the satellite tracking of offenders
Mike Nellis 6. Empowered Watchers or Disempowered Workers? The ambiguities of power within technologies of security
Gavin John Douglas Smith 7. Hijacking Surveillance? The new moral landscapes of amateur photographing
Hille Koskela Part 4: (In)secure virtualities 8. The Role of the Internet in the Twenty First Century Prison: Insecure technologies in secure places
Yvonne Jewkes 9. Computer Crime Control as Industry: Virtual insecurity and the market for private policing
Majid Yar Part 5: (In)Secure rights 10. Technologies of Surveillance and the erosion of institutional trust
Benjamin Goold 11. Another Side of the Story: Defence lawyers' views on DNA evidence
Johanne Yttrl Dahl 12. 'Catastrophic Moral Horror': Torture
terror and rights
Vidar Halvorsen Epilogue: The Inescapable Insecurity of security technologies?
Lucia Zedner