Special issues on Surveillance and Social Control

Special issues on
Surveillance and Social Control
a resource list
Alberto Cammozzo1
Version 9, Jan 27, 2015
Acknowledgements:
A base for this list was found in G. T. Marx and G. W. Muschert, “Personal Information, Borders,
and the New Surveillance Studies,” Annual Review of Law and Social Science, vol. 3, no. 1, pp.
375–395, 2007.
Many thanks to David Barnard-Wills, Roger Clarke, Chiara Fonio, Gemma Galdon Clavell, Torin
Monahan, Bryce C. Newell, William Webster and Aleš Završnik for their contribution. Corrections
and additions are warmly welcome.
Thanks to the authors of Zotero.org, the free software bibliography management software.
Notes:
– Surveillance & Society journal is not included because each issue can be considered devoted to
these topics.
– Entries are in chronological order
Table of Contents
Special Issues........................................................................................................................................2
Crime, Law and Social Change – vol. 18, no. 1-2, 1992 – "Issues and theories on covert
policing."..........................................................................................................................................2
Social Research – vol. 68, no. 1, SPRING 2001 – “Privacy”..........................................................3
The Sociological Quarterly – vol. 43, no.3, 2002 – "Essays and commentaries on technology,
surveillance, and gender."................................................................................................................4
Denver University Law Review – vol. 79, no. 4, 2002 – “Privacy”................................................4
Journal of Contingencies and Crisis Management – vol. 11, no. 1, 2003.......................................4
Journal of Social Issues – vol. 59, no. 2, July 2003.........................................................................5
Knowledge, Technology & Policy – vol. 17, no. 1, Spring 2004....................................................5
Social Text – vol. 23, no. 2 83, Summer 2005 – “Surveillance”.....................................................6
American Behavioral Scientist – vol. 50, no. 12, 2007...................................................................6
Contemporary Sociology – vol. 36, no. 2, 2007 – “A Symposium on Surveillance Studies”.........6
Knowledge, Technology & Policy – vol 20, no. 2, July 2007 – “Technology and Privacy II”.......7
Proceedings of the IEEE – vol. 96, no. 10, 2008.............................................................................7
Urban Studies – vol. 48, no. 15, 2011 – “Security and Surveillance at Sport Mega Events”.........8
Information Polity – vol. 16, no. 4, 2011 – “Revisiting the surveillance camera revolution: Issues
of governance and public policy”....................................................................................................9
1
Independent research professional <http://cammozzo.com/en> <alberto -at- cammozzo.com>
1/16
The Sociological Quarterly – vol. 52, no. 4, Fall 2011 – Special section on “Surveillance as
Cultural Practice”.............................................................................................................................9
Theoretical Criminology – vol. 15, no. 3, 2011 – “Theorizing Surveillance in Crime Control”. .10
Journal of Location Based Services – vol. 5, no. 3–4 , 2011 – “The social and behavioural
implications of location-based services”.......................................................................................10
Space and Culture – vol. 15 no. 2, May 2012 – “Spaces of Terror and Risk”...............................11
Information Polity – vol. 17, no. 1, 2012 – “Revisiting the Surveillance Camera Revolution:
Issues of Governance and Public Policy”......................................................................................11
Criminology and Criminal Justice – vol 12 n.3, July 2012 – “Themed Section: Surveillance,
technology and the everyday”........................................................................................................11
Novatica – Special English Edition 2012/2013 Annual Selection – "Privacy and New
Technologies".................................................................................................................................12
European Journal of Law and Technology – vol. 4, no. 2, 2013 – “Surveillance”........................12
Geoforum – Vol 49, October 2013 – “Political Geographies of Surveillance”.............................13
Computer – vol. 46, n. 6, June 2013 – “Big Data: New Opportunities and New Challenges”.....13
Journal of Contemporary European Research – vol. 9 no. 1, Jul 2013.........................................14
I/S: A Journal of Law and Policy for the Information Society – Vol. 9 N. 3 2014 – “NSA
Surveillance: Issues of Security, Privacy, and Civil Liberty”........................................................14
International Journal of E-Planning Research (IJEPR) Vol 2 (2013) Issue 4................................15
Teknokultura, Vol 11, No 2 (2014) – “Vigilancia global y formas de resistencia”........................16
Special Issues
Crime, Law and Social Change – vol. 18, no. 1-2, 1992 – "Issues and
theories on covert policing."
http://web.mit.edu/gtmarx/www/crlawsoc.html
J. Wachtel, “From morals to practice: Dilemmas of control in undercover policing,” Crime Law Soc
Change, vol. 18, no. 1–2, pp. 137–158, Sep. 1992.
G. T. Marx, “Some reflections on Undercover: recent developments and enduring issues,” Crime
Law Soc Change, vol. 18, no. 1–2, pp. 193–217, Sep. 1992.
D. Lyon, “The new surveillance: Electronic technologies and the maximum security society,” Crime
Law Soc Change, vol. 18, no. 1–2, pp. 159–175, Sep. 1992.
R. A. Leo, “From coercion to deception: the changing nature of police interrogation in America,”
Crime Law Soc Change, vol. 18, no. 1–2, pp. 35–59, Sep. 1992.
G. Geis and C. Goff, “Lifting the cover from undercover operations: J. Edgar Hoover and some of
the other criminologists,” Crime Law Soc Change, vol. 18, no. 1–2, pp. 91–104, Sep. 1992.
M. Deflem, “The invisibilities of social control,” Crime Law Soc Change, vol. 18, no. 1–2, pp. 177–
192, Sep. 1992.
J.-P. Brodeur, “Undercover policing in Canada: Wanting what is wrong,” Crime Law Soc Change,
vol. 18, no. 1–2, pp. 105–136, Sep. 1992.
A. A. Block, “IRS intelligence operations under the Alexander regime: A commentary on
undercover operations,” Crime Law Soc Change, vol. 18, no. 1–2, pp. 61–89, Sep. 1992.
2/16
Social Research – vol. 68, no. 1, SPRING 2001 – “Privacy”
http://www.jstor.org/stable/i40043713
R. B. YEAZELL, “Sexuality, Shame, and Privacy in the English Novel,” Social Research, vol. 68,
no. 1, pp. 119–144, Apr. 2001.
F. WISEMAN, “Privacy and Documentary Filmmaking,” Social Research, vol. 68, no. 1, pp. 41–47,
Apr. 2001.
F. SCHAUER, “Introduction: The Legal Construction of Privacy,” Social Research, vol. 68, no. 1,
pp. 51–53, Apr. 2001.
F. SCHAUER, “Free Speech and the Social Construction of Privacy,” Social Research, vol. 68, no.
1, pp. 221–232, Apr. 2001.
M. Scarf, “Secrets for Sale,” Social Research, vol. 68, no. 1, pp. 333–338, Apr. 2001.
J. RYKWERT, “Privacy in Antiquity,” Social Research, vol. 68, no. 1, pp. 29–40, Apr. 2001.
J. ROSEN, “Out of Context: The Purposes of Privacy,” Social Research, vol. 68, no. 1, pp. 209–
220, Apr. 2001.
N. K. MILLER, “Women’s Secrets and the Novel: Remembering Mary McCarthy’s ‘The Group’,”
Social Research, vol. 68, no. 1, pp. 173–199, Apr. 2001.
L. MENAND, “Introduction: Privacy and the Self,” Social Research, vol. 68, no. 1, p. 117, Apr.
2001.
D. A. J. RICHARDS, “Is My Body My Property?,” Social Research, vol. 68, no. 1, pp. 83–101,
Apr. 2001.
N. K. MILLER, “Women’s Secrets and the Novel: Remembering Mary McCarthy’s ‘The Group’,”
Social Research, vol. 68, no. 1, pp. 173–199, Apr. 2001.
C. NESSON, “Threats to Privacy,” Social Research, vol. 68, no. 1, pp. 105–113, Apr. 2001.
K. PREWITT, “Introduction,” Social Research, vol. 68, no. 1, pp. 299–300, Apr. 2001.
T. M. McGovern, “Is Privacy Now Possible?,” Social Research, vol. 68, no. 1, pp. 327–333, Apr.
2001.
A. MARGALIT, “Privacy in the Decent Society,” Social Research, vol. 68, no. 1, pp. 255–268, Apr.
2001.
A. Mack, “Editor’s Introduction,” Social Research, vol. 68, no. 1, pp. V–VII, Apr. 2001.
F. LUBONJA, “Privacy in a Totalitarian Regime,” Social Research, vol. 68, no. 1, pp. 237–254,
Apr. 2001.
G. KATEB, “On Being Watched and Known,” Social Research, vol. 68, no. 1, pp. 269–295, Apr.
2001.
G. KATEB, “Introduction: Invasions of Privacy,” Social Research, vol. 68, no. 1, pp. 203–207, Apr.
2001.
J. HOLLANDER, “The Language of Privacy,” Social Research, vol. 68, no. 1, pp. 5–28, Apr. 2001.
D. J. GARROW, “Privacy and the American Constitution,” Social Research, vol. 68, no. 1, pp. 55–
82, Apr. 2001.
J. L. Cohen, “The Necessity of Privacy,” Social Research, vol. 68, no. 1, pp. 318–327, Apr. 2001.
J. L. COHEN, “Introduction,” Social Research, vol. 68, no. 1, pp. 235–236, Apr. 2001.
3/16
D. BROMWICH, “Introduction: Private and Public,” Social Research, vol. 68, no. 1, p. 3, Apr.
2001.
D. BROMWICH, “How Publicity Makes People Real,” Social Research, vol. 68, no. 1, pp. 145–
171, Apr. 2001.
J. Berman and P. Bruening, “Is Privacy Still Possible in the Twenty-first Century?,” Social
Research, vol. 68, no. 1, pp. 306–318, Apr. 2001.
A. L. Allen, “Is Privacy Now Possible? A Brief History of an Obsession,” Social Research, vol. 68,
no. 1, pp. 301–306, Apr. 2001.
The Sociological Quarterly – vol. 43, no.3, 2002 – "Essays and
commentaries on technology, surveillance, and gender."
http://onlinelibrary.wiley.com/doi/10.1111/tsq.2002.43.issue-3/issuetoc
J. Willis and S. Silbey, “Self, Surveillance, and Society,”The Sociological Quarterly, vol. 43, no. 3,
pp. 439–445, 2002.
W. G. Staples and J. Nagel, “Gary’s Gone…,” The Sociological Quarterly, vol. 43, no. 3, pp. 447–
452, 2002.
C. Nippert-Eng, “OUT OF SIGHT, OUT OF MIND: Thoughts on Gary Marx’s Essay on ‘Thomas I.
Voire’,” The Sociological Quarterly, vol. 43, no. 3, pp. 435–438, 2002.
G. T. Marx, “TECHNOLOGY AND GENDER: Thomas I. Voire and the Case of the Peeping Tom,”
The Sociological Quarterly, vol. 43, no. 3, pp. 409–433, 2002.
G. T. Marx, “Reflective Eyes and Moods Apart,” The Sociological Quarterly, vol. 43, no. 3, pp.
461–478, 2002.
G. T. Marx, “A Brief Note From the Author,” The Sociological Quarterly, vol. 43, no. 3, pp. 407–
408, 2002.
P. K. Manning, “Doubles and Tom Voire,” The Sociological Quarterly, vol. 43, no. 3, pp. 453–459,
2002.
Denver University Law Review – vol. 79, no. 4, 2002 – “Privacy”
http://www.law.du.edu/index.php/denver-university-law-review/past-issues
[issue index not available]
Journal of Contingencies and Crisis Management – vol. 11, no. 1, 2003
http://onlinelibrary.wiley.com/doi/10.1111/jccm.2003.11.issue-1/issuetoc
D. Van Harten and R. Van Est, “Privacy in an Information Society,” Journal of Contingencies and
Crisis Management, vol. 11, no. 1, pp. 1–1, 2003.
B. Steinhardt, “Does Privacy Have a Future after 9/11?,” Journal of Contingencies and Crisis
Management, vol. 11, no. 1, pp. 32–36, 2003.
P. Regan, “Privacy and Commercial Use of Personal Data: Policy Developments in the United
States,” Journal of Contingencies and Crisis Management, vol. 11, no. 1, pp. 12–18, 2003.
W. Peissl, “Surveillance and Security: A Dodgy Relationship1,” Journal of Contingencies and Crisis
Management, vol. 11, no. 1, pp. 19–24, 2003.
4/16
G. Marx, “Some Information Age Techno-Fallacies,” Journal of Contingencies and Crisis
Management, vol. 11, no. 1, pp. 25–31, 2003.
C. Bennett and M. French, “The State of Privacy in the Canadian State: Fallout from 9/11,” Journal
of Contingencies and Crisis Management, vol. 11, no. 1, pp. 2–11, 2003.
Journal of Social Issues – vol. 59, no. 2, July 2003
http://onlinelibrary.wiley.com/doi/10.1111/josi.2003.59.issue-2/issuetoc
A. F. Westin, “Social and Political Dimensions of Privacy,” Journal of Social Issues, vol. 59, no. 2,
pp. 431–453, 2003.
E. F. Stone-Romero, D. L. Stone, and D. Hyatt, “Personnel Selection Procedures and Invasion of
Privacy,” Journal of Social Issues, vol. 59, no. 2, pp. 343–368, 2003.
P. M. Regan, “Safe Harbors or Free Frontiers? Privacy and Transborder Data Flows,” Journal of
Social Issues, vol. 59, no. 2, pp. 263–282, 2003.
G. T. Marx, “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance,” Journal of
Social Issues, vol. 59, no. 2, pp. 369–390, 2003.
S. T. Margulis, “Privacy as a Social Issue and Behavioral Concept,” Journal of Social Issues, vol.
59, no. 2, pp. 243–261, 2003.
S. T. Margulis, “On the Status and Contribution of Westin’s and Altman’s Theories of Privacy,”
Journal of Social Issues, vol. 59, no. 2, pp. 411–429, 2003.
O. H. Gandy, “Public Opinion Surveys and the Formation of Privacy Policy,” Journal of Social
Issues, vol. 59, no. 2, pp. 283–299, 2003.
B. M. DePaulo, C. Wetzel, R. Weylin Sternglanz, and M. J. W. Wilson, “Verbal and Nonverbal
Dynamics of Privacy, Secrecy, and Deceit,” Journal of Social Issues, vol. 59, no. 2, pp. 391–410,
2003.
M. J. Culnan and R. J. Bies, “Consumer Privacy: Balancing Economic and Justice Considerations,”
Journal of Social Issues, vol. 59, no. 2, pp. 323–342, 2003.
S. A. Alpert, “Protecting Medical Privacy: Challenges in the Age of Genetic Information,” Journal
of Social Issues, vol. 59, no. 2, pp. 301–322, 2003.
Knowledge, Technology & Policy – vol. 17, no. 1, Spring 2004
http://link.springer.com/journal/12130/17/1
“Techscope,” Know Techn Pol, vol. 17, no. 1, pp. 8–17, Mar. 2004.
L. Wade, “Facing the threat: Invading the body for national security,” Know Techn Pol, vol. 17, no.
1, pp. 74–80, Mar. 2004.
G. T. Marx, “What’s new about the ‘new surveillance’?: Classifying for change and continuity,”
Know Techn Pol, vol. 17, no. 1, pp. 18–37, Mar. 2004.
S. Hinduja, “Theory and policy in online privacy,” Know Techn Pol, vol. 17, no. 1, pp. 38–58, Mar.
2004.
D. P. Hillyard and S. M. Knight, “Privacy, technology, and social change,” Know Techn Pol, vol.
17, no. 1, pp. 81–101, Mar. 2004.
5/16
Social Text – vol. 23, no. 2 83, Summer 2005 – “Surveillance”
http://socialtext.dukejournals.org/content/23/2_83.toc
R. Maxwell, “Surveillance: Work, Myth, and Policy,” Social Text, vol. 23, no. 2 83, pp. 1–19, Jun.
2005.
M. J. Shapiro, “Every Move You Make: Bodies, Surveillance, and Media,” Social Text, vol. 23, no.
2 83, pp. 21–34, Jun. 2005.
K. A. Gates, “Biometrics and Post-9/11 Technostalgia,” Social Text, vol. 23, no. 2 83, pp. 35–53,
Jun. 2005.
S. Ghosh, “Surveillance in Decolonized Social Space: THE CASE OF SEX WORKERS IN
BENGAL,” Social Text, vol. 23, no. 2 83, pp. 55–69, Jun. 2005.
J. Gilliom, “Resisting Surveillance,” Social Text, vol. 23, no. 2 83, pp. 71–83, Jun. 2005.
C. Topal, “Global Citizens and Local Powers: SURVEILLANCE IN TURKEY,” Social Text, vol.
23, no. 2 83, pp. 85–93, Jun. 2005.
D. J. Phillips, “From Privacy to Visibility: CONTEXT, IDENTITY, AND POWER IN
UBIQUITOUS COMPUTING ENVIRONMENTS,” Social Text, vol. 23, no. 2 83, pp. 95–108, Jun.
2005.
L. Pang, “Copying Kill Bill,” Social Text, vol. 23, no. 2 83, pp. 133–153, Jun. 2005.
M. M. Gullette, “Suppressing Grief: THE POLITICS OF ‘MCCARTHY’-ERA TESTIMONIES,”
Social Text, vol. 23, no. 2 83, pp. 109–131, Jun. 2005.
American Behavioral Scientist – vol. 50, no. 12, 2007
http://abs.sagepub.com/content/50/12.toc
C. Nieuwenhuys and A. Pécoud, “Human Trafficking, Information Campaigns, and Strategies of
Migration Control,” American Behavioral Scientist, vol. 50, no. 12, pp. 1674–1695, Aug. 2007.
W. de Lint, S. Virta, and J. E. Deukmedjian, “The Simulation of Crime Control A Shift in
Policing?,” American Behavioral Scientist, vol. 50, no. 12, pp. 1631–1647, Aug. 2007.
B. Chalfin, “Customs Regimes and the Materiality of Global Mobility Governing the Port of
Rotterdam,” American Behavioral Scientist, vol. 50, no. 12, pp. 1610–1630, Aug. 2007.
D. Broeders and G. Engbersen, “The Fight Against Illegal Migration Identification Policies and
Immigrants’ Counterstrategies,” American Behavioral Scientist, vol. 50, no. 12, pp. 1592–1609,
Aug. 2007.
V. Bajc, “Surveillance in Public Rituals Security Meta-ritual and the 2005 U.S. Presidential
Inauguration,” American Behavioral Scientist, vol. 50, no. 12, pp. 1648–1673, Aug. 2007.
V. Bajc, “Introduction: Debating Surveillance in the Age of Security,” American Behavioral
Scientist, vol. 50, no. 12, pp. 1567–1591, Aug. 2007.
Contemporary Sociology – vol. 36, no. 2, 2007 – “A Symposium on
Surveillance Studies”
http://www.jstor.org/stable/i20443698
E. Zureik, “Surveillance Studies: From Metaphors to Regulation to Subjectivity,” Contemporary
Sociology, vol. 36, no. 2, pp. 112–115, Mar. 2007.
6/16
J. Torpey, “Through Thick and Thin: Surveillance after 9/11,” Contemporary Sociology, vol. 36, no.
2, pp. 116–119, Mar. 2007.
G. T. Marx and G. Simmel, “Desperately Seeking Surveillance Studies: Players in Search of a
Field,” Contemporary Sociology, vol. 36, no. 2, pp. 125–130, Mar. 2007.
D. Lyon, “Sociological Perspectives and Surveillance Studies: ‘Slow Journalism’ and the Critique
of Social Sorting,” Contemporary Sociology, vol. 36, no. 2, pp. 107–111, Mar. 2007.
V. Jenness, D. A. Smith, and J. Stepan-Norris, “Editors’ Note: Taking a Look at Surveillance
Studies,” Contemporary Sociology, vol. 36, no. 2, pp. vii–viii, Mar. 2007.
D. Cunningham, “Surveillance and Social Movements: Lenses on the Repression-Mobilization
Nexus,” Contemporary Sociology, vol. 36, no. 2, pp. 120–125, Mar. 2007.
Knowledge, Technology & Policy – vol 20, no. 2, July 2007 –
“Technology and Privacy II”
http://link.springer.com/journal/12130/20/2/page/1
D. M. Wood, “Robert O’Harrow, Jr., No Place to Hide,” Know Techn Pol, vol. 20, no. 2, pp. 125–
126, Jul. 2007.
G. T. Marx, “Privacy and Social Stratification,” Know Techn Pol, vol. 20, no. 2, pp. 91–95, Jul.
2007.
I. Koskinen and D. Hillyard, “Editor’s Introduction,” Know Techn Pol, vol. 20, no. 2, pp. 79–82,
Jul. 2007.
C. W. Crews Jr, “Cybersecurity and Authentication: The Marketplace Role in Rethinking
Anonymity – Before Regulators Intervene,” Know Techn Pol, vol. 20, no. 2, pp. 97–105, Jul. 2007.
D. Hillyard and M. Gauen, “Issues Around the Protection or Revelation of Personal Information,”
Know Techn Pol, vol. 20, no. 2, pp. 121–124, Jul. 2007.
I. Hargraves, “Controversies of Information Discovery,” Know Techn Pol, vol. 20, no. 2, pp. 83–90,
Jul. 2007.
A. Etzioni, “Are New Technologies the Enemy of Privacy?,” Know Techn Pol, vol. 20, no. 2, pp.
115–119, Jul. 2007.
S. Erickson, “Renée Marlin-Bennett, Knowledge Power: Intellectual Property, Information, and
Privacy,” Know Techn Pol, vol. 20, no. 2, pp. 127–128, Jul. 2007.
G. S. Erickson and E. P. Kelly, “International Aspects of Radio Frequency Identification Tags:
Different Approaches to Bridging the Technology/Privacy Divide,” Know Techn Pol, vol. 20, no. 2,
pp. 107–114, Jul. 2007.
Proceedings of the IEEE – vol. 96, no. 10, 2008
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4663199
C. Wu and H. Aghajan, “Real-Time Human Pose Estimation: A Case Study in Algorithm Design for
Smart Camera Networks,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1715–1732, 2008.
W. H. Widen, “Smart Cameras and the Right to Privacy,” Proceedings of the IEEE, vol. 96, no. 10,
pp. 1688–1697, 2008.
D. N. Serpanos and A. Papalambrou, “Security and Privacy in Distributed Smart Cameras,”
7/16
Proceedings of the IEEE, vol. 96, no. 10, pp. 1678–1687, 2008.
A. C. Sankaranarayanan, A. Veeraraghavan, and R. Chellappa, “Object Detection, Tracking and
Recognition for Multiple Smart Cameras,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1606–
1624, 2008.
S. Saha, S. Puthenpurayil, J. Schlessman, S. S. Bhattacharyya, and W. Wolf, “The Signal Passing
Interface and Its Application to Embedded Implementation of Smart Camera Applications,”
Proceedings of the IEEE, vol. 96, no. 10, pp. 1576–1587, 2008.
B. Rinner and W. Wolf, “An Introduction to Distributed Smart Cameras,” Proceedings of the IEEE,
vol. 96, no. 10, pp. 1565–1575, 2008.
F. Qureshi and D. Terzopoulos, “Smart Camera Networks in Virtual Reality,” Proceedings of the
IEEE, vol. 96, no. 10, pp. 1640–1656, 2008.
D. Lymberopoulos, T. Teixeira, and A. Savvides, “Macroscopic Human Behavior Interpretation
Using Distributed Imager and Other Sensors,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1657–
1677, 2008.
S. Fleck and W. Strasser, “Smart Camera Based Monitoring System and Its Application to Assisted
Living,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1698–1714, 2008.
D. Devarajan, Z. Cheng, and R. J. Radke, “Calibrating Distributed Camera Networks,” Proceedings
of the IEEE, vol. 96, no. 10, pp. 1625–1639, 2008.
I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “Wireless Multimedia Sensor Networks:
Applications and Testbeds,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1588–1605, 2008.
Urban Studies – vol. 48, no. 15, 2011 – “Security and Surveillance at
Sport Mega Events”
http://usj.sagepub.com/content/48/15.toc
D. M. Wood and K. Abe, “The Aesthetics of Control Mega Events and Transformations in Japanese
Urban Order,” Urban Stud, vol. 48, no. 15, pp. 3241–3257, Nov. 2011.
T. Taylor and K. Toohey, “Ensuring Safety at Australian Sport Event Precincts Creating Securitised,
Sanitised and Stifling Spaces?,” Urban Stud, vol. 48, no. 15, pp. 3259–3275, Nov. 2011.
K. S. Schimmel, “From ‘Violence-complacent’ to ‘Terrorist-ready’ Post-9/11 Framing of the US
Super Bowl,” Urban Stud, vol. 48, no. 15, pp. 3277–3291, Nov. 2011.
M. Samatas, “Surveillance in Athens 2004 and Beijing 2008 A Comparison of the Olympic
Surveillance Modalities and Legacies in Two Different Olympic Host Regimes,” Urban Stud, vol.
48, no. 15, pp. 3347–3366, Nov. 2011.
F. Klauser, “The Exemplification of ‘Fan Zones’ Mediating Mechanisms in the Reproduction of
Best Practices for Security and Branding at Euro 2008,” Urban Stud, vol. 48, no. 15, pp. 3203–
3219, Nov. 2011.
R. Giulianotti and F. Klauser, “Introduction Security and Surveillance at Sport Mega Events,”
Urban Stud, vol. 48, no. 15, pp. 3157–3168, Nov. 2011.
R. Giulianotti, “Sport Mega Events, Urban Football Carnivals and Securitised Commodification
The Case of the English Premier League,” Urban Stud, vol. 48, no. 15, pp. 3293–3310, Nov. 2011.
V. Eick, “Lack of Legacy? Shadows of Surveillance after the 2006 FIFA World Cup in Germany,”
Urban Stud, vol. 48, no. 15, pp. 3329–3345, Nov. 2011.
8/16
S. Cornelissen, “Mega Event Securitisation in a Third World Setting Glocal Processes and
Ramifications during the 2010 FIFA World Cup,” Urban Stud, vol. 48, no. 15, pp. 3221–3240, Nov.
2011.
J. Coaffee, P. Fussey, and C. Moore, “Laminated Security for London 2012 Enhancing Security
Infrastructures to Defend Mega Sporting Events,” Urban Stud, vol. 48, no. 15, pp. 3311–3327, Nov.
2011.
P. Boyle and K. D. Haggerty, “Civil Cities and Urban Governance Regulating Disorder for the
Vancouver Winter Olympics,” Urban Stud, vol. 48, no. 15, pp. 3185–3201, Nov. 2011.
G. Armstrong, D. Hobbs, and I. Lindsay, “Calling the Shots The Pre-2012 London Olympic
Contest,” Urban Stud, vol. 48, no. 15, pp. 3169–3184, Nov. 2011.
Information Polity – vol. 16, no. 4, 2011 – “Revisiting the surveillance
camera revolution: Issues of governance and public policy”
http://iospress.metapress.com/content/h03500355222
C. Fonio, “The silent growth of video surveillance in Italy,” Information Polity, vol. 16, no. 4, pp.
379–388, Jan. 2011.
E. Heilmann, “Video surveillance and security policy in France: From regulation to widespread
acceptance,” Information Polity, vol. 16, no. 4, pp. 369–377, Jan. 2011.
F. Björklund, “Pure flour in your bag: Governmental rationalities of camera surveillance in
Sweden,” Information Polity, vol. 16, no. 4, pp. 355–368, Jan. 2011.
C. Musik, “The thinking eye is only half the story: High-level semantic video surveillance,”
Information Polity, vol. 16, no. 4, pp. 339–353, Jan. 2011.
G. G. Clavell, “Local surveillance in a global world: Zooming in on the proliferation of CCTV in
Catalonia,” Information Polity, vol. 16, no. 4, pp. 319–338, Jan. 2011.
E. Taylor, “Awareness, understanding and experiences of CCTV amongst teachers and pupils in
three UK schools,” Information Polity, vol. 16, no. 4, pp. 303–318, Jan. 2011.
“Revisiting the surveillance camera revolution: Issues of governance and public policy. Introduction
to part one of the Special Issue,” Information Polity, vol. 16, no. 4, pp. 297–301, Jan. 2011.
The Sociological Quarterly – vol. 52, no. 4, Fall 2011 – Special section
on “Surveillance as Cultural Practice”
http://onlinelibrary.wiley.com/doi/10.1111/tsq.2011.52.issue-4/issuetoc
N. Zurawski, “LOCAL PRACTICE AND GLOBAL DATA: Loyalty Cards, Social Practices, and
Consumer Surveillance,” The Sociological Quarterly, vol. 52, no. 4, pp. 509–527, 2011.
T. Monahan, “Surveillance as Cultural Practice,” The Sociological Quarterly, vol. 52, no. 4, pp.
495–508, 2011.
A. Ellerbrok, “PLAYFUL BIOMETRICS: Controversial Technology through the Lens of Play,” The
Sociological Quarterly, vol. 52, no. 4, pp. 528–547, 2011.
D. Barnard-Wills, “Uk News Media Discourses of Surveillance,” The Sociological Quarterly, vol.
52, no. 4, pp. 548–567, 2011.
9/16
Theoretical Criminology – vol. 15, no. 3, 2011 – “Theorizing Surveillance
in Crime Control”
http://tcr.sagepub.com/content/15/3.toc
M. Welch, “Counterveillance: How Foucault and the Groupe d’Information sur les Prisons reversed
the optics,” Theoretical Criminology, vol. 15, no. 3, pp. 301–313, Aug. 2011.
T. Wall and T. Monahan, “Surveillance and violence from afar: The politics of drones and liminal
security-scapes,” Theoretical Criminology, vol. 15, no. 3, pp. 239–254, Aug. 2011.
D. Moore, “The benevolent watch: Therapeutic surveillance in drug treatment court,” Theoretical
Criminology, vol. 15, no. 3, pp. 255–268, Aug. 2011.
H. Koskela, “Hijackers and humble servants: Individuals as camwitnesses in contemporary
controlwork,” Theoretical Criminology, vol. 15, no. 3, pp. 269–282, Aug. 2011.
K. D. Haggerty, D. Wilson, and G. J. D. Smith, “Theorizing surveillance in crime control,”
Theoretical Criminology, vol. 15, no. 3, pp. 231–237, Aug. 2011.
A. Doyle, “Revisiting the synopticon: Reconsidering Mathiesen’s ‘The Viewer Society’ in the age
of Web 2.0,” Theoretical Criminology, vol. 15, no. 3, pp. 283–299, Aug. 2011.
I. Alhadar and M. McCahill, “The use of surveillance cameras in a Riyadh shopping mall:
Protecting profits or protecting morality?,” Theoretical Criminology, vol. 15, no. 3, pp. 315–330,
Aug. 2011.
K. F. Aas, “‘Crimmigrant’ bodies and bona fide travelers: Surveillance, citizenship and global
governance,” Theoretical Criminology, vol. 15, no. 3, pp. 331–346, Aug. 2011.
Journal of Location Based Services – vol. 5, no. 3–4 , 2011 – “The
social and behavioural implications of location-based services”
http://www.tandfonline.com/toc/tlbs20/5/3-4
J. M. Thurman, “US courts confront GPS surveillance: is Maynard a harbinger of change or an
anomaly?,” Journal of Location Based Services, vol. 5, no. 3–4, pp. 201–222, 2011.
K. Michael and M. G. Michael, “The social and behavioural implications of location-based
services,” Journal of Location Based Services, vol. 5, no. 3–4, pp. 121–137, 2011.
H. Ketabdar, J. Qureshi, and P. Hui, “Motion and audio analysis in mobile devices for remote
monitoring of physical activities and user authentication,” Journal of Location Based Services, vol.
5, no. 3–4, pp. 182–200, 2011.
L. Evans, “Location-based services: transformation of the experience of space,” Journal of Location
Based Services, vol. 5, no. 3–4, pp. 242–260, 2011.
C. Cuijpers and M. Pekárek, “The regulation of location-based services: challenges to the European
Union data protection regime,” Journal of Location Based Services, vol. 5, no. 3–4, pp. 223–241,
2011.
R. Clarke and M. Wigan, “You are where you’ve been: the privacy implications of location and
tracking technologies,” Journal of Location Based Services, vol. 5, no. 3–4, pp. 138–155, 2011.
R. Abbas, “The social implications of location-based services: an observational study of users,”
Journal of Location Based Services, vol. 5, no. 3–4, pp. 156–181, 2011.
10/16
Space and Culture – vol. 15 no. 2, May 2012 – “Spaces of Terror and
Risk”
http://sac.sagepub.com/content/15/2.toc
T. Stoppani, “The Architecture of the Disaster,” Space and Culture, vol. 15, no. 2, pp. 135–150,
May 2012.
J. Hutnyk, “Sexy Sammy and Red Rosie? From Burning Books to the War on Terror,” Space and
Culture, vol. 15, no. 2, pp. 164–176, May 2012.
K. D. Haggerty and C. Tokar, “Signifying Security On the Institutional Appeals of Nightclub ID
Scanning Systems,” Space and Culture, vol. 15, no. 2, pp. 124–134, May 2012.
E. Despard, “Cultivating Security Plants in the Urban Landscape,” Space and Culture, vol. 15, no.
2, pp. 151–163, May 2012.
D. Barnard-Wills, C. Moore, and J. McKim, “Introduction Spaces of Terror and Risk,” Space and
Culture, vol. 15, no. 2, pp. 92–97, May 2012.
D. Barnard-Wills and D. Ashenden, “Securing Virtual Space Cyber War, Cyber Terror, and Risk,”
Space and Culture, vol. 15, no. 2, pp. 110–123, May 2012.
C. Aradau and R. van Munster, “The Time/Space of Preparedness Anticipating the ‘Next Terrorist
Attack,’” Space and Culture, vol. 15, no. 2, pp. 98–109, May 2012.
Information Polity – vol. 17, no. 1, 2012 – “Revisiting the Surveillance
Camera Revolution: Issues of Governance and Public Policy”
http://iospress.metapress.com/content/r161232517m7
“Revisiting the surveillance camera revolution: Issues of governance and public policy. Introduction
to part two of the Special Issue,” Information Polity, vol. 17, no. 1, pp. 1–5, Jan. 2012.
“Global Challenges for Identity Policies, by Edgar A. Whitley and Gus Hosein,” Information Polity,
vol. 17, no. 1, pp. 69–71, Jan. 2012.
G. Galdon Clavell, L. Z. Lojo, and A. Romero, “CCTV in Spain: An empirical account of the
deployment of video-surveillance in a Southern-European country,” Information Polity, vol. 17, no.
1, pp. 57–68, Jan. 2012.
N. Zurawski, “From crime prevention to urban development,” Information Polity, vol. 17, no. 1, pp.
45–55, Jan. 2012.
O. Svenonius, “The Stockholm Security Project: Plural policing, security and surveillance,”
Information Polity, vol. 17, no. 1, pp. 35–43, Jan. 2012.
P. Fussey, “Eastern promise? East London transformations and the state of surveillance,”
Information Polity, vol. 17, no. 1, pp. 21–34, Jan. 2012.
P. Wagenaar and K. Boersma, “Zooming in on ‘heterotopia’: CCTV-operator practices at Schiphol
Airport,” Information Polity, vol. 17, no. 1, pp. 7–20, Jan. 2012.
Criminology and Criminal Justice – vol 12 n.3, July 2012 – “Themed
Section: Surveillance, technology and the everyday”
http://crj.sagepub.com/content/12/3.toc
D. Barnard-Wills and H. Wells, “Surveillance, technology and the everyday,” Criminology and
11/16
Criminal Justice, vol. 12, no. 3, pp. 227–237, Jul. 2012.
B. Loftus and B. Goold, “Covert surveillance and the invisibilities of policing,” Criminology and
Criminal Justice, vol. 12, no. 3, pp. 275–288, Jul. 2012.
A. Haines and H. Wells, “Persecution or protection? Understanding the differential public response
to two road-based surveillance systems,” Criminology and Criminal Justice, vol. 12, no. 3, pp. 257–
273, Jul. 2012.
D. Barnard-Wills, “E-safety education: Young people, surveillance and responsibility,” Criminology
and Criminal Justice, vol. 12, no. 3, pp. 239–255, Jul. 2012.
Novatica – Special English Edition 2012/2013 Annual Selection –
"Privacy and New Technologies"
http://www.ati.es/novatica/2013/ASA/nvS2013sum.html
G.G. Clavell and G. Hosein, “Presentation. Privacy, Technology and Policy: Social Networks, Data
Mining and Surveillance”, International Federation for Information Processing, p.4, 2013.
A. Martin, “Privacy and Surveillance Primer”, International Federation for Information Processing,
p.11
G. G. Fuster and R. Bellanova, “European Data Protection and the Haunting Presence of Privacy”,
International Federation for Information Processing, p.17
M. Vermeulen, “Secrecy Trumps Location: A Short Paper on Establishing the Gravity of Privacy
Interferences Posed by Detection Technologies”, International Federation for Information
Processing, p.23
D. Palmer and I. Warren, “Surveillance Technology and Territorial Controls: Governance and the
‘Lite Touch’ of Privacy”, International Federation for Information Processing, p 26
C. Blasi Casagran and E. Blasi Casagran, “Google: Navigating Security, Rights to Information and
Privacy”, International Federation for Information Processing, p. 32
F. G. Bruno, L. da Costa Nascimento, R. José Firmino, M. M. Kanashiro and R. Evangelista,
“Human Traces on the Internet: Privacy and Online Tracking in Popular Websites in Brazil“,
International Federation for Information Processing, p. 37
M. Ragnedda, “Social Networks and the Protection of Personal Information. When Privacy is Not
Perceived As a Right”, International Federation for Information Processing, p.44
J. Figueras Tugas, “Privacy and Body Scanners at EU Airports”, International Federation for
Information Processing, p.49
European Journal of Law and Technology – vol. 4, no. 2, 2013 –
“Surveillance”
http://ejlt.org//issue/view/18
T. Wisman, “Purpose creep by design: Transforming the face of surveillance through the Internet of
Things,” European Journal of Law and Technology, vol. 4, no. 2, Oct. 2013.
S. Rodotà, “Some Remarks on Surveillance today,” European Journal of Law and Technology, vol.
4, no. 2, Oct. 2013.
R. Pospisil and M. Skrob, “Actual Trends in Improvement of risk area security using combined
methods for biometrical identification of subjects,” European Journal of Law and Technology, vol.
12/16
4, no. 2, Oct. 2013.
F. Novario, “Cyberspace, Surveillance and Law: a legal informatics perspective,” European Journal
of Law and Technology, vol. 4, no. 2, Oct. 2013.
D. Mezzana and M. Krlic, “The current context of surveillance: An overview of some emerging
phenomena and policies,” European Journal of Law and Technology, vol. 4, no. 2, Aug. 2013.
H. Koch, T. Matzner, and J. Krumm, “Privacy Enhancing of Smart CCTV and its Ethical and Legal
Problems,” European Journal of Law and Technology, vol. 4, no. 2, Aug. 2013.
V. S. Kenk, J. Križaj, V. Štruc, and S. Dobrišek, “Smart Surveillance Technologies in Border
Control,” European Journal of Law and Technology, vol. 4, no. 2, Oct. 2013.
A. Galetta, “The changing nature of the presumption of innocence in today’s surveillance societies:
rewrite human rights or regulate the use of surveillance technologies?,” European Journal of Law
and Technology, vol. 4, no. 2, Oct. 2013.
A. Fantechi, C. D. Nugent, A. Pinzuti, E. Vicario, and T. Magherini, “An On-line system for
automated recognition of human activities,” European Journal of Law and Technology, vol. 4, no. 2,
Aug. 2013.
J. A. Cannataci, “Defying the logic, forgetting the facts: the new European proposal for data
protection in the police sector,” European Journal of Law and Technology, vol. 4, no. 2, Nov. 2013.
C. Bodei, P. Degano, L. Galletta, G. Mezzetti, and G. Ferrari, “Security in Pervasive Applications: A
Survey,” European Journal of Law and Technology, vol. 4, no. 2, Oct. 2013.
J. A. Cannataci, S. Faro, and M. A. Biasiotti, “Editorial for Special Issue on Surveillance,”
European Journal of Law and Technology, vol. 4, no. 2, Oct. 2013.
Geoforum – Vol 49, October 2013 – “Political Geographies of
Surveillance”
http://www.sciencedirect.com/science/journal/00167185/49/supp/C
D. Murakami Wood, “What is global surveillance? Towards a relational political economy of the
global surveillant assemblage,” Geoforum, vol. 49, pp. 317–326, Oct. 2013.
T. Monahan and J. T. Mokos, “Crowdsourcing urban surveillance: The development of homeland
security markets for environmental sensor networks,” Geoforum, vol. 49, pp. 279–288, Oct. 2013.
F. R. Klauser, “Political geographies of surveillance,” Geoforum, vol. 49, pp. 275–278, Oct. 2013.
F. Klauser, “Spatialities of security and surveillance: Managing spaces, separations and circulations
at sport mega events,” Geoforum, vol. 49, pp. 289–298, Oct. 2013.
A. Albrechtslund and P. Lauritsen, “Spaces of everyday surveillance: Unfolding an analytical
concept of participation,” Geoforum, vol. 49, pp. 310–316, Oct. 2013.
P. Adey, L. Brayer, D. Masson, P. Murphy, P. Simpson, and N. Tixier, “‘Pour votre tranquillité’:
Ambiance, atmosphere, and surveillance,” Geoforum, vol. 49, pp. 299–309, Oct. 2013.
Computer – vol. 46, n. 6, June 2013 – “Big Data: New Opportunities and
New Challenges”
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6527234
M. R. Wigan and R. Clarke, “Big Data’s Big Unintended Consequences,” Computer, vol. 46, no. 6,
13/16
pp. 46–53, 2013.
P. P. Tallon, “Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost,” Computer,
vol. 46, no. 6, pp. 32–38, 2013.
J. Pitt, A. Bourazeri, A. Nowak, M. Roszczynska-Kurasinska, A. Rychwalska, I. R. Santiago, M. L.
Sanchez, M. Florea, and M. Sanduleac, “Transforming Big Data into Collective Awareness,”
Computer, vol. 46, no. 6, pp. 40–45, 2013.
C. McGregor, “Big Data in Neonatal Intensive Care,” Computer, vol. 46, no. 6, pp. 54–59, 2013.
J. Hemerly, “Public Policy Considerations for Data-Driven Innovation,” Computer, vol. 46, no. 6,
pp. 25–31, 2013.
P. Anthonysamy, P. Greenwood, and A. Rashid, “Social Networking Privacy: Understanding the
Disconnect from Policy to Controls,” Computer, vol. 46, no. 6, pp. 60–67, 2013.
Journal of Contemporary European Research – vol. 9 no. 1, Jul 2013
http://www.jcer.net/index.php/jcer/issue/view/28
K. Löfgren, M. Strange, C. Backman “Introduction: Privacy and Surveillance Policy in a
Comparative Perspective”, Journal of Contemporary European Research, vol. 9, no. 1, pp. p116–
119, Jul. 2013.
A. Zavrsnik, “Blurring the Line between Law Enforcement and Intelligence: Sharpening the Gaze
of Surveillance?,” Journal of Contemporary European Research, vol. 9, no. 1, pp. p181–202, Jul.
2013.
D. Wright, R. Finn, and R. Rodrigues, “A Comparative Analysis of Privacy Impact Assessment in
Six Countries,” Journal of Contemporary European Research, vol. 9, no. 1, pp. p160–180, Jul.
2013.
K. Parti and L. Marin, “Ensuring Freedoms and Protecting Rights in the Governance of the Internet:
A Comparative Analysis on Blocking Measures and Internet Providers’ Removal of Illegal Internet
Content,” Journal of Contemporary European Research, vol. 9, no. 1, pp. p138–159, Jul. 2013.
J. Bright and J. R. Agustina, “Mediating Surveillance: The Developing Landscape of European
Online Copyright Enforcement,” Journal of Contemporary European Research, vol. 9, no. 1, pp.
p120–137, Jul. 2013.
I/S: A Journal of Law and Policy for the Information Society – Vol. 9 N. 3
2014 – “NSA Surveillance: Issues of Security, Privacy, and Civil
Liberty”
http://moritzlaw.osu.edu/students/groups/is/online-nsa-symposium/
P. M. Shane, “Foreword: The NSA and the Legal Regime for Foreign Intelligence Surveillance”
,I/S: A Journal of Law and Policy for the Information Society, Volume 9, Issue 3, 2014
J. Yoo, “Foreword: The NSA and the Legal Regime for Foreign Intelligence Surveillance”, I/S: A
Journal of Law and Policy for the Information Society, Volume 9, Issue 3, 2014
K. Strandburg, “Membership Lists, Metadata, and Freedom of Association’s Specificity
Requirement”, I/S: A Journal of Law and Policy for the Information Society, Volume 9, Issue 3,
2014
L. Donohue, “PRISM and the Interception of Communications Under Section 702 of the Foreign
14/16
Intelligence Surveillance Act”, I/S: A Journal of Law and Policy for the Information Society,
Volume 9, Issue 3, 2014
M. D. Young, “National Insecurity: The Impacts of Illegal Disclosures of Classified Information”,
I/S: A Journal of Law and Policy for the Information Society, Volume 9, Issue 3, 2014
J. Mueller and M. G. Stewart, “Secret without Reason and Costly without Accomplishment:
Questioning the NSA’s Metadata Program”, I/S: A Journal of Law and Policy for the Information
Society, Volume 9, Issue 3, 2014
S. Kadidal, “NSA Surveillance: The Implications for Civil Liberties”, I/S: A Journal of Law and
Policy for the Information Society, Volume 9, Issue 3, 2014
B. C. Newell, “The Massive Metadata Machine: Liberty, Power, and Secret Mass Surveillance in
the U.S. and Europe”, I/S: A Journal of Law and Policy for the Information Society, Volume 9, Issue
3, 2014
N. A. Sales, “Domesticating Programmatic Surveillance: Some Thoughts on the NSA Controversy”,
I/S: A Journal of Law and Policy for the Information Society, Volume 9, Issue 3, 2014
S. I. Vladeck, “Standing and Secret Surveillance”, I/S: A Journal of Law and Policy for the
Information Society, Volume 9, Issue 3, 2014
R. E. Hundt, “Making No Secrets About It”, I/S: A Journal of Law and Policy for the Information
Society, Volume 9, Issue 3, 2014
A. Etzioni, A Cyber Age Privacy Doctrine: A Liberal Communitarian Approach, I/S: A Journal of
Law and Policy for the Information Society, Volume 9, Issue 3, 2014
International Journal of E-Planning Research (IJEPR) Vol 2 (2013) Issue
4
http://www.igi-global.com/journal-contents/international-journal-planning-research-ijepr/44994
Lucas Melgaço, “Security and Surveillance in Times of Globalization: An Appraisal of Milton
Santos' Theory”,International Journal of E-Planning Research (IJEPR) Vol 2 (2013) Issue 4, pp. 112
Francesca Menichelli, “Rearranging Urban Space”,International Journal of E-Planning Research
(IJEPR) Vol 2 (2013) Issue 4, pp. 13-26
Nelson Arteaga Botello “Surveillance Regulation in Mexico City - Cameras and Urban Segregation:
New Challenges for Urban E-Planning”,International Journal of E-Planning Research (IJEPR) Vol 2
(2013) Issue 4, pp. 27-41
Rafael Barreto de Castro, Rosa Maria Leite Ribeiro Pedro “Security Dispositifs and Urban EPlanning: Government Performances Articulated to Surveillance Cameras in Rio de
Janeiro”,International Journal of E-Planning Research (IJEPR) Vol 2 (2013) Issue 4, pp. 42-58
Claudia Zamorano, Guénola Capron “Privatization of Security and the Production of Space in
Mexico City: Challenges for Urban Planning”,International Journal of E-Planning Research
(IJEPR) Vol 2 (2013) Issue 4, pp. 59-74
15/16
Lucas Melgaço, Nelson Arteaga Botello “A Short Comment on Surveillance and Security in the EPlanned City”,International Journal of E-Planning Research (IJEPR) Vol 2 (2013) Issue 4, pp.75-78
Teknokultura, Vol 11, No 2 (2014) – “Vigilancia global y formas de
resistencia”
Javier de Rivera y Ángel Gordo López “Número monográfico coordinado por Vigilancia global y
formas de resistencia”, Teknokultura, Vol 11, No 2 (2014), 237-242
Alejandro Segura Vázquez, “El pastor, el doctor y el Big Data”, Teknokultura, Vol 11, No 2 (2014),
243-257
Paola Ricaurte Quijano, Jacobo Nájera Valdez, Jesús Robles Maloof, “Sociedades de control:
tecnovigilancia de Estado y resistencia civil en México”, Teknokultura, Vol 11, No 2 (2014), 259282
Sophia Carmen Vackimes “Ensamblajes de vigilancia viajera”, Teknokultura, Vol 11, No 2 (2014),
283-300
Santiago Ruiz Chasco, “Videovigilancia en el centro de Madrid. ¿hacia el panóptico electrónico?”,
Teknokultura, Vol 11, No 2 (2014), 301-327
Gemma Galdon Clavell “¿La vigilancia vestida de seda? Hacia una comprensión de la contravigilancia como discurso y práctica crítica”,Teknokultura, Vol 11, No 2 (2014), 329-348
Paloma González Díaz “Reacciones en el Media Art ante la vigilancia y el control de datos en la
Red: nuevos paradigmas (2001-2010).”,Teknokultura, Vol 11, No 2 (2014), 349-382
Rafael Dernbach “Hackeando la máquina visual: la deconstrucción de las imágenes de control en
las obras de Farocki y Paglen”, Teknokultura, Vol 11, No 2 (2014), 383-403
Costán Sequeiros Bruna, Héctor Puente Bienvenido, “Poder y vigilancia en los videojuegos”
, Teknokultura, Vol 11, No 2 (2014), 405-423
Ashlin James Lee “Una cuestión de Momentum Reflexiones críticas sobre las opciones individuales
de resistencia a la vigilancia”, Teknokultura, Vol 11, No 2 (2014), 425-440
Jorge Dueñas Villamiel “Del camuflaje en el arte contemporáneo a la privacidad en el Net-Art” ,
Teknokultura, Vol 11, No 2 (2014), 441-452
Julia Varela Fernández, Fernando Álvarez-Uría, Hélène Castel, “Entrevista a Hèlène Castel, autora
de Retour d´exil d´une femme recherchée (2009)”, Teknokultura, Vol 11, No 2 (2014), 453-473
Estela Mateo Regueiro, “Cypherpunks”, Teknokultura, Vol 11, No 2 (2014), 475-480
Valeria Yarad Jeada, “Los discursos del presente, un análisis de los imaginarios sociales
contemporáneos.”, Teknokultura, Vol 11, No 2 (2014), 480-485
16/16