Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-swr86 Total loading time: 0 Render date: 2024-07-16T11:56:48.894Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  03 July 2018

Philippe M. Frowd
Affiliation:
University of Ottawa
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Security at the Borders
Transnational Practices and Technologies in West Africa
, pp. 193 - 210
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abrahamsen, R. and Williams, M. C. 2011. Security beyond the State: Private Security in International Politics. Cambridge: Cambridge University Press.Google Scholar
Abrahamsen, R. and Williams, M. C. 2016. Tracing Global Assemblages: Bringing Bourdieu to the Field. In: Curtis, S. and Acuto, M. eds. Reassembling International Theory: Assemblage Thinking and International Relations. New York: Palgrave Macmillan, 2531.Google Scholar
Adey, P. 2002. Secured and Sorted Mobilities: Examples from the Airport. Surveillance and Society 1(4): 500519.CrossRefGoogle Scholar
Adler, E. and Pouliot, V. 2011. International Practices: Introduction and Framework. In: Adler, E. and Pouliot, V. eds. International Practices. Cambridge: Cambridge University Press, 335.CrossRefGoogle Scholar
Africa-EU Ministers. 2006. Joint Africa-EU Declaration on Migration and Development. Available at: www.iom.int/jahia/webdav/shared/shared/mainsite/microsites/rcps/igad/african_md_declaration_2006.pdf (Accessed 20 March 2014).Google Scholar
African Union. 2014. Déclaration de Nouakchott du 1er sommet des pays participant au processus de Nouakchott sur le renforcement de la coopération sécuritaire et l'opérationnalisation de l'Architecture Africaine de Paix et de Sécurité dans la région Sahélo-Saharienne. Available at: www.peaceau.org/fr/article/declaration-de-nouakchott-du-1er-sommet-des-pays-participant-au-processus-de-nouakchott-sur-le-renforcement-de-la-cooperation-securitaire-et-l-operationnalisation-de-l-architecture-africaine-de-paix-et-de-securite-dans-la-region-sahelo-saharienne (Accessed 13 November 2016).Google Scholar
Agamben, G. 1998. Homo Sacer: Sovereign Power and Bare Life. Stanford, CA: Stanford University Press.Google Scholar
Agnew, J. 1994. The Territorial Trap: The Geographical Assumptions of International Relations Theory. Review of International Political Economy 1(1): 5380.CrossRefGoogle Scholar
Ajana, B. 2012. Biometric citizenship. Citizenship Studies 16(7): 851870.CrossRefGoogle Scholar
Ajana, B. 2013. Governing through Biometrics: The Biopolitics of Identity. Basingstoke: Palgrave.CrossRefGoogle Scholar
AllAfrica. 2013. Sénégal: Un appui en véhicules de la Snedai aux postes frontaliers. 28 March. Available at: http://fr.allafrica.com/stories/201303281533.html (Accessed 28 January 2015).Google Scholar
AMDH. 2012. L'enrôlement. 30 December. Available at: www.facebook.com/notes/amdh-mauritanie/lenr%C3%B4lement/10151254846213283 (Accessed 20 March 2015).Google Scholar
Amoore, L. 2006. Biometric Borders: Governing Mobilities in the War on Terror. Political Geography 25: 336351.CrossRefGoogle Scholar
Amoore, L. and De Goede, M. 2008. Risk and the War on Terror. London: Routledge.CrossRefGoogle Scholar
Andersson, R. 2014a. Hunter and Prey: Patrolling Clandestine Migration in the Euro-African Borderlands. Anthropological Quarterly 87(1): 119149.CrossRefGoogle Scholar
Andersson, R. 2014b. Illegality, Inc: Clandestine Migration and the Business of Bordering Europe. Oakland: University of California Press.Google Scholar
Andrijasevic, R. and Walters, W. 2010. The International Organization for Migration and the International Government of Borders. Environment and Planning D 28(6): 977999.CrossRefGoogle Scholar
Antil, A. and Touati, S. 2011. Mali et Mauritanie: Pays Sahéliens Fragiles et États Résilients. Politique Étrangère 1: 5969.CrossRefGoogle Scholar
Apap, J. and Carrera, S. 2004. Maintaining Security within Borders: Toward a Permanent State of Emergency in the EU? Alternatives 29(4): 399416.CrossRefGoogle Scholar
Aradau, C. 2010. Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 41(5): 491514.CrossRefGoogle Scholar
Aradau, C. and Van Munster, R. 2007. Governing Terrorism through Risk: Taking Precautions, (Un)knowing the Future. European Journal of International Relations 13(1): 89115.CrossRefGoogle Scholar
Arteaga, F. 2007. Las operaciones de última generación: el Centro de Coordinación Regional de Canarias. ARI No 54/2007. Madrid: Real Instituto Elcano.Google Scholar
Asiwaju, A. and Adeniyi, P. O. 1989. Borderlands in Africa: A Multidisciplinary and Comparative Focus on Nigeria and West Africa. Lagos: University of Lagos Press.Google Scholar
Autesserre, S. 2014. Peaceland: Conflict Resolution and the Everyday Politics of International Intervention. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bachmann, J. and Hönke, J. 2009. ‘Peace and Security’ as Counterterrorism? The Political Effects of Liberal Interventions in Kenya. African Affairs 109(434): 97114.CrossRefGoogle Scholar
Bain, W. 2011. Protectorates New and Old: A Conceptual Critique. In: Mayall, J. and de Oliveira, R. Soares eds. The New Protectorates: International Tutelage and the Making of Liberal States. New York: Columbia University Press, 3148.Google Scholar
Balibar, É. 1998. The Borders of Europe. In: Cheah, P. and Robbins, B. eds. Cosmopolitics: Thinking and Feeling beyond the Nation. Minneapolis: University of Minnesota Press, 216233.Google Scholar
Balibar, É. 2002. Politics and the Other Scene. London: Verso.Google Scholar
Balzacq, T. 2005. The Three Faces of Securitization: Agency, Audience and Context. European Journal of International Relations 11(2): 171201.CrossRefGoogle Scholar
Balzacq, T. 2008. The Policy Tools of Securitization: Information Exchange, EU Foreign and Interior Policies. Journal of Common Market Studies 46(1): 75100.CrossRefGoogle Scholar
Bayart, J.-F. 1989. L’état en Afrique: la politique du ventre. Paris: Fayard.Google Scholar
Bayart, J.-F. 2000. Africa in the World: A History of Extraversion. African Affairs 99(395): 217267.CrossRefGoogle Scholar
Belcher, O. and Martin, L. L. 2013. Ethnographies of Closed Doors: Conceptualising Openness and Closure in US Immigration and Military Institutions: Ethnographies of Closed Doors. Area 45(4): 403410.CrossRefGoogle Scholar
Bennett, J. 2010. Vibrant Matter: A Political Ecology of Things. Durham, NC: Duke University Press.Google Scholar
Bialasiewicz, L. 2012. Off-shoring and Out-sourcing the Borders of EUrope: Libya and EU Border Work in the Mediterranean. Geopolitics 17(4): 843866.CrossRefGoogle Scholar
Bigo, D. 1996. Polices en réseaux. Paris: Presses de Sciences Po.Google Scholar
Bigo, D. 2001. Internal and External Security(ies): The Möbius Ribbon. In: Jacobsen, M., Albert, D., and Lapid, Y., eds. Identities, Borders, Orders. Minneapolis: University of Minnesota Press, 91116.Google Scholar
Bigo, D. 2009. Security: A Field Left Fallow. In: Dillon, M. and Neal, A. W., eds. Foucault on Politics, Security and War. Basingstoke: Palgrave Macmillan, 93114.Google Scholar
Bigo, D. 2012. Security. In: Adler-Nissen, R., ed. Bourdieu in International Relations. London: Routledge, 114130.Google Scholar
Bigo, D., Guild, E. and Walker, R. B. J. 2010. The Changing Landscape of European Liberty and Security. In: Bigo, D., Carrera, S., Guild, E., and Walker, R. B. J., eds. Europe's 21st Century Challenge: Delivering Liberty. Farnham: Ashgate, 130.Google Scholar
Bigo, D. and Tsoukala, A. 2008. Terror, Insecurity, and Liberty: Illiberal Practices of Liberal Regimes after 9/11. London: Routledge.CrossRefGoogle Scholar
Bigo, D. and Walker, R. B. J. 2007. International, Political, Sociology. International Political Sociology 1(1): 15.CrossRefGoogle Scholar
Bloomberg News. 2011. Mauritania Court Deports 7 after Anti-Census Protest, Group Says. 11 October. Available at: www.bloomberg.com/news/articles/2011-10-11/mauritania-court-deports-7-after-anti-census-protest-group-says (Accessed 28 January 2015).Google Scholar
Bonditti, P. 2004. From Territorial Space to Networks: A Foucauldian Approach to the Implementation of Biometry. Alternatives 29: 465482.CrossRefGoogle Scholar
Bonelli, L. and Ragazzi, F. 2014. Low-Tech Security: Files, Notes, and Memos as Technologies of Anticipation. Security Dialogue 45(5): 476493.CrossRefGoogle Scholar
Booth, K. 2007. Theory of World Security. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Boswell, C. 2003. The ‘External Dimension’ of EU Immigration and Asylum Policy. International Affairs 79(3): 619638.CrossRefGoogle Scholar
Bourbeau, P. 2011. The Securitization of Migration: A Study of Movement and Order. Abingdon: Routledge.CrossRefGoogle Scholar
Bourdieu, P. 1977. Outline of a Theory of Practice. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bourdieu, P. 1994. Rethinking the State: Genesis and Structure of the Bureaucratic Field. Trans. Wacquant, L. and Farage, S.. Sociological Theory 12(1): 118.CrossRefGoogle Scholar
Bourdieu, P. and Wacquant, L. 1992. An Invitation to Reflexive Sociology. Cambridge: Polity.Google Scholar
Brachet, J., Choplin, A. and Pliez, O. 2011. Le Sahara entre espace de circulation et frontière migratoire de l'Europe. Hérodote 142: 163182.CrossRefGoogle Scholar
Breckenridge, K. 2014. Biometric State: The Global Politics of Identification and Surveillance in South Africa: 1850 to the Present. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Broeders, D. 2007. The New Digital Borders of Europe: EU Databases and the Surveillance of Irregular Migrants. International Sociology 22(1): 7192.CrossRefGoogle Scholar
Broeders, D. 2011. A European ‘Border’ surveillance system under construction. In: Dijstelbloem, H. & Meijer, A. eds. Migration and the New Technological Borders of Europe. Houndsmills: Palgrave, 4067.CrossRefGoogle Scholar
Buur, L., Jensen, S. and Stepputat, F., eds. 2007. The Security-Development Nexus: Expressions of Sovereignty and Securitization in Southern Africa. Uppsala: Nordiska Afrikainstitutet.Google Scholar
Buzan, B., Waever, O. and De Wilde, J. 1998. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner.Google Scholar
CAERT. 2016. About Us. African Centre for the Study & Research on Terrorism. Available at: http://caert.org.dz/About%20us.pdf (Accessed 13 November 2016).Google Scholar
Callon, M. 1986. Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. In: Law, J., ed. Power, Action and Belief: A New Sociology of Knowledge. London: Routledge and Kegan Paul, 196223.Google Scholar
Campbell, D. 1998. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press.Google Scholar
Canada Newswire. 2011. Ten Years after 9/11, ICAO Meeting Considers New Options for Countering Terrorism and Trans-border Crime. 12 September. Available at: www.newswire.ca/en/story/839431/-for-terrorists-travel-documents-are-as-important-as-weapons (Accessed 20 March 2015).Google Scholar
Carling, J. and Hernández-Carretero, M. 2011. Protecting Europe and Protecting Migrants? Strategies for Managing Unauthorised Migration from Africa. The British Journal of Politics and International Relations 13(1): 4258.CrossRefGoogle Scholar
Carrera, S. 2007. The EU Border Management Strategy: FRONTEX and the Challenges of Irregular Immigration in the Canary Islands. Working Document No. 261/March 2007. Brussels: Centre for European Policy Studies.Google Scholar
CASE Collective. 2006. Critical Approaches to Security in Europe: A Networked Manifesto. Security Dialogue 37(4): 443487.CrossRefGoogle Scholar
Cassarino, J.-P. 2005. Migration and Border Management in the Euro-Mediterranean Area: Heading towards New Forms of Interconnectedness. CADMUS: European University Institute Mediterranean Yearbook 2005, 226231.Google Scholar
Cerny, P. G. 2015. From Warriors to Police? The Civilianisation of Security in a Globalising World. International Politics 52(4): 389407.CrossRefGoogle Scholar
Chalfin, B. 2010. Neoliberal Frontiers: An Ethnography of Sovereignty in West Africa. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Choplin, A. 2008. L'immigré, le migrant, l'allochtone: circulations migratoires et figures de l’étranger en Mauritanie. Politique africaine 109: 7390.CrossRefGoogle Scholar
Choplin, A. and Lombard, J. 2010. ‘Suivre la route’: Mobilités et échanges entre Mali, Mauritanie et Sénégal. EchoGéo 14. Available at: http://echogeo.revues.org/12127?lang=fr (Accessed 20 March 2015).CrossRefGoogle Scholar
Cole, S. A. 2002. Suspect Identities: A History of Fingerprinting and Criminal Identification. Cambridge, MA: Harvard University Press.Google Scholar
Collyer, M. 2008. Euro-African Relations in the Field of Migration, 2008. CADMUS: European University Institute Mediterranean Yearbook 2009, 281285.Google Scholar
Coole, D. and Frost, S. 2010. New Materialisms: Ontology, Agency, and Politics. Durham, NC: Duke University Press.Google Scholar
Coplan, D. 2010. Introduction: From Empiricism to Theory in African Border Studies. Journal of Borderlands Studies 25(2): 15.CrossRefGoogle Scholar
Cox, R. 1983. Gramsci, Hegemony and International Relations: An Essay in Method. Millennium 12(2): 162175.CrossRefGoogle Scholar
Curzon, (Lord) G. 1908. Frontiers (Romanes Lecture 1907). Clarendon, Oxford University.Google Scholar
Datacard Group. 2012. Guinea Bissau Opts for Secure National ID Card to Combat Fraud. Available at: www.datacard.com/id/knowledge_center/knowledge_center_detail.jhtml?id=repositories/downloads/xml/GOV_CS_GuineaBissau.xml (Accessed 20 March 2015).Google Scholar
Dean, M. 1996. Putting the Technological into Government. History of the Human Sciences 9(3): 4768.CrossRefGoogle Scholar
Deflem, M. 2000. Bureaucratization and Social Control: Historical Foundations of International Police Cooperation. Law and Society Review 34(3): 739778.CrossRefGoogle Scholar
De Haas, H. 2008. The Myth of Invasion: The Inconvenient Realities of African Migration to Europe. Third World Quarterly 29(7): 13051322.CrossRefGoogle Scholar
Dezalay, Y. and Garth, B. G. 2002. The Internationalization of Palace Wars: Lawyers, Economists, and the Contest to Transform Latin American States. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Doty, R. L. 2009. The Law into Their Own Hands: Immigration and the Politics of Exceptionalism. Tucson: University of Arizona Press.Google Scholar
Doucet, M. G. 2016. Global Assemblages of Security Governance and Contemporary International Intervention. Journal of Intervention and Statebuilding 10(1): 116132.CrossRefGoogle Scholar
Dwyer, M. 2017. Soldiers in Revolt: Army Mutinies in Africa. London: Hurst.Google Scholar
Epstein, C. 2007. Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric Borders. International Political Sociology 1(2): 149164.CrossRefGoogle Scholar
EuropeAid. 2013. Thematic Global Evaluation of the European Union's Support to Integrated Border Management and Fight against Organised Crime. Brussels: DEVCO Evaluation Unit.Google Scholar
European Commission. 2016a. Commission Announces New Migration Partnership Framework: Reinforced Cooperation with Third Countries to Better Manage Migration. European Commission Press Release Database. Available at: http://europa.eu/rapid/press-release_IP-16–2072_en.htm (Accessed 14 November 2016).Google Scholar
European Commission. 2016b. COM/2016/700, First Progress Report on the Partnership Framework with Third Countries under the European Agenda on Migration. Available at: https://eeas.europa.eu/sites/eeas/files/com_2016_700_f1_communication_from_commission_to_inst_en_v8_p1_english.pdf (Accessed 14 November 2016).Google Scholar
European Delegation Nouakchott. 2011. Projet West Sahel: Inauguration des premières activités. Available at: http://eeas.europa.eu/delegations/mauritania/documents/press_corner/discours_west_sahel_amende_fr.pdf (Accessed 20 March 2015).Google Scholar
European External Action Service. 2012. Strategy for Security and Development in the Sahel. Brussels: European Union. Available at: www.eeas.europa.eu/africa/docs/sahel_strategy_en.pdf (Accessed 20 March 2015).Google Scholar
European Parliament. 2006. Regulation (EC) No 562/2006 of the European Parliament and of the Council of 15 March 2006 Establishing a Community Code on the Rules Governing the Movement of Persons across Borders (Schengen Borders Code). Brussels: European Union.Google Scholar
European Union. 2006. Schengen Borders Code. Available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32006R0562&from=EN (Accessed 27 February 2018).Google Scholar
Fédération Internationale des Droits de L'Homme. 2011. Mauritanie: Critiquer la gouvernance, un exercise risqué. Available at: www.fidh.org/IMG/pdf/rapport_mauritanie_vf.pdf (Accessed 28 January 2015).Google Scholar
Ferrer-Gallardo, X. 2008. The Spanish-Moroccan Border Complex: Processes of Geopolitical, Functional and Symbolic Rebordering. Political Geography 27(4): 301321.CrossRefGoogle Scholar
Fitz-Gerald, A. M. 2004. Addressing the Security-Development Nexus: Implications for Joined-up Government. Policy Matters 5(5): 124.Google Scholar
Foster, N. 2010. Mauritania: The Struggle for Democracy. Boulder, CO: Lynne Rienner.CrossRefGoogle Scholar
Foucault, M. 1990. The History of Sexuality, Vol. 1: An Introduction. New York: Vintage.Google Scholar
France24. 2011. Le recensement, jugé ‘raciste’, déchire les Mauritaniens. Available at: http://observers.france24.com/fr/content/20110928-recensement-juge-raciste-dechire-mauritaniens-negro-africains-discrimination-nationalite (Accessed 20 March 2015).Google Scholar
Frontex. 2011. Programme of Work 2011. Available at: http://frontex.europa.eu/assets/About_Frontex/Governance_documents/Work_programme/2011/fx_pow_2011.pdf (Accessed 20 March 2015).Google Scholar
Frontex. 2013. Programme of Work 2013. Available at: http://frontex.europa.eu/assets/About_Frontex/Governance_documents/Work_programme/2013/PoW_2013.pdf (Accessed 20 March 2015).Google Scholar
Frontex. 2015. AFIC report. Available at: http://frontex.europa.eu/assets/Publications/Risk_Analysis/AFIC/AFIC_report_2015.pdf (Accessed 20 March 2015).Google Scholar
Frontex. 2016. Risk Analysis for 2016. Available at: http://frontex.europa.eu/assets/Publications/Risk_Analysis/Annula_Risk_Analysis_2016.pdf (Accessed 14 November 2016).Google Scholar
Gaibazzi, P., Bellagamba, A. and Dünnwald, S. 2017. EurAfrican Borders and Migration Management: Political Cultures, Contested Spaces, and Ordinary Lives. New York: Palgrave Macmillan.CrossRefGoogle Scholar
Geiger, M. 2010. Mobility, Development, Protection, EU-Integration! The IOM's National Migration Strategy for Albania. In: Geiger, M. and Pécoud, A., eds. The Politics of International Migration Management. Basingstoke: Palgrave, 141159.CrossRefGoogle Scholar
Gelb, A. and Clark, J. 2013. Identification for Development: The Biometrics Revolution. Working Paper 315. Washington, DC: Center for Global Development.Google Scholar
Gerspacher, N. and Dupont, B. 2007. The Nodal Structure of International Police Cooperation: An Exploration of Transnational Security Networks. Global Governance 13(3): 347364.CrossRefGoogle Scholar
Godenau, D. and López-Sala, A. 2016. Multi-layered Migration Deterrence and Technology in Spanish Maritime Border Management. Journal of Borderlands Studies 31(2): 119.CrossRefGoogle Scholar
Guardia Civil. 2013. Spanish NCC: National Coordination Centre – ‘Perspective from an European Union Country’. Available at: www.processusderabat.net/web/uploads/cms/2013Nov_EN_Spain-Vicente-Guardia-Civil.pdf (Accessed 20 March 2015).Google Scholar
Guardia Civil. 2014. Nuevo proyecto de colaboración de la Guardia Civil con Mauritania para reducir la inmigración irregular. Available at: www.guardiacivil.es/es/prensa/noticias/4806.html (Accessed 4 June 2014).Google Scholar
Guittet, E.-P. and Jeandesboz, J. 2010. Security Technologies. In: Burgess, J. P., ed. The Routledge Handbook of New Security Studies. London: Routledge, 229239.Google Scholar
Haggerty, K. D. and Ericson, R. 2000. The Surveillant Assemblage. British Journal of Sociology 51(4): 605622.CrossRefGoogle ScholarPubMed
Hall, B. S. 2011. A History of Race in Muslim West Africa: 1600–1960. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hameiri, S. 2010. Regulating Statehood: State Building and the Transformation of the Global Order. Basingstoke: Palgrave.CrossRefGoogle Scholar
Hameiri, S. and Jones, L. 2013. The Politics and Governance of Non-traditional Security. International Studies Quarterly 57(3): 462473.CrossRefGoogle Scholar
Hameiri, S. and Jones, L. 2015. Governing Borderless Threats: Non-traditional Security and the Politics of State Transformation. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hansen, L. 2000. The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millennium 29(2): 285306.CrossRefGoogle Scholar
Hansen, L. 2006. Security as Practice: Discourse Analysis and the Bosnian War. Abingdon: Routledge.Google Scholar
Harrison, G. 2001. Post-conditionality Politics and Administrative Reform: Reflections on the Cases of Uganda and Tanzania. Development and Change 32(4): 657679.CrossRefGoogle Scholar
Help Net Security. 2011. Interpol Chief Calls for Global Electronic Identity Card System. 6 April. Available at: www.net-security.org/secworld.php?id=10860 (Accessed 20 March 2015).Google Scholar
Herbst, J. 1989. The Creation and Maintenance of National Boundaries in Africa. International Organization 43(4): 673692.CrossRefGoogle Scholar
Herbst, J. 2000. States and Power in Africa: Comparatives Lessons in Authority and Control. Princeton, NJ: Princeton University Press.Google Scholar
Hernández i Sagrera, R. 2013. Exporting EU Integrated Border Management beyond EU Borders: Modernization and Institutional Transformation in Exchange for More Mobility? Cambridge Review of International Affairs 27(1): 167183.CrossRefGoogle Scholar
Hollstegge, J. and Doevenspeck, M. 2017. ‘Sovereignty Entrepreneurs’ and the Production of State Power in Two Central African Borderlands. Geopolitics 22(4): 815836.CrossRefGoogle Scholar
Hosein, I. 2004. The Sources of Laws: Policy Dynamics in a Digital and Terrorized World. The Information Society 20(3): 187199.CrossRefGoogle Scholar
Hüsken, T. and Klute, G. 2010. Emerging Forms of Power in Two African Borderlands a Theoretical and Empirical Research Outline. Journal of Borderlands Studies 25(2): 107121.CrossRefGoogle Scholar
Huysmans, J. 2007. The Politics of Insecurity: Fear, Migration and Asylum in the EU. Abingdon: Routledge.Google Scholar
ICAO. 2006. MRTD Report. Vol. 1, Issue 1. Montreal: International Civil Aviation Organization.Google Scholar
ICAO. 2007. MRTD Report. Vol. 2, Issue 1. Montreal: International Civil Aviation Organization.Google Scholar
ICAO. 2010. Benefits to Governments. Available at: www.icao.int/Security/mrtd/Pages/BenefitstoGovernments.aspx (Accessed 28 January 2015).Google Scholar
ICAO. 2011. ICAO Regional Aviation Security Conference in Dakar, Senegal, 17–18 October 2011. Available at: www.icao.int/Security/Pages/RegionalAviationSecurityConferenceDakar.aspx (Accessed 25 April 2016).Google Scholar
ICAO. 2013. Resolutions Adopted by the Assembly: 38th Session, Montréal 24 September–8 October 2013. Available at: www.icao.int/Meetings/a38/Documents/Resolutions/a38_res_prov_en.pdf (Accessed 28 January 2015).Google Scholar
ICAO. 2014. MRTD Report. Vol. 2, Issue 2. Montreal: International Civil Aviation Organization.Google Scholar
ICAO. 2015a. MRTD Report. Vol. 10, Issue 3. Montreal: International Civil Aviation Organization.Google Scholar
ICAO. 2015b. ICAO Public Key Directory (PKD). Available from: www.icao.int/security/mrtd/pages/ICAOPKD.aspx (Accessed 2 March 2015).Google Scholar
Interpol. 2016. Border Management: Stolen and Lost Travel Documents Database. Available at: www.interpol.int/INTERPOL-expertise/Border-management/SLTD-Database(Accessed 14 November 2016).Google Scholar
IOM. 2010. Summary of Activities: African Capacity Building Center. Available at: http://acbc.iom.int/documents/pdfs/ACBC_annual_report_2010_FINAL.pdf (Accessed 20 March 2015).Google Scholar
IOM. 2011. PIRS, the International Organization for Migration's Personal Identification and Registration System. Available at: www.iom.int/jahia/webdav/shared/shared/mainsite/activities/ibm/09-IOM-IBM-FACT-SHEET-Personal-Identification-and-Registration-System-PIRS.pdf (Accessed 20 March 2015).Google Scholar
IOM. 2012. Workshop on the Threats and Risks of Integrated Border Management. Available at: www.iom.int/cms/en/sites/iom/home/news-and-views/events/events-listing/workshop-on-the-threats-and-risk.html (Accessed 20 March 2015).Google Scholar
IOM. 2013. IOM Tanzania Facilitates Identity Management Workshop. 26 February. Available at: www.iom.int/cms/en/sites/iom/home/news-and-views/press-briefing-notes/pbn-2013/pbn-listing/iom-tanzania-facilitates-identit.html (Accessed 20 March 2015).Google Scholar
Islamic Republic of Mauritania. 2011. Document de stratégie nationale pour une meilleure gestion de la migration en République Islamique de Mauritanie [National Strategy Document for Better Management of Migration in the Islamic Republic of Mauritania]. Nouakchott: Government of Mauritania.Google Scholar
Jackson, R. H. 1993. Quasi-States: Sovereignty, International Relations and the Third World. Cambridge: Cambridge University Press.Google Scholar
Jackson, R. H. and Rosberg, C. G. 1982. Why Africa's Weak States Persist: The Empirical and Juridical in Statehood. World Politics 35(1): 124.CrossRefGoogle Scholar
Jacobsen, E. K. U. 2012. Unique Identification: Inclusion and Surveillance in the Indian Biometric Assemblage. Security Dialogue 43(5): 457474.CrossRefGoogle Scholar
Jeandesboz, Julien. 2016. Smartening Border Security in the European Union: An Associational Inquiry. Security Dialogue, 0967010616650226.Google Scholar
Jeune Afrique. 2015. Sénégal: La Filière Touristique Salue la Suppression du Visa d'entrée Annoncée Par Macky Sall. 7 April. Available at: www.jeuneafrique.com/228428/economie/senegal-la-filiere-touristique-salue-la-suppression-du-visa-dentree-annoncee-par-macky-sall/ (Accessed 14 November 2016).Google Scholar
Johnson, H. L. 2013. The Other Side of the Fence: Reconceptualizing the ‘Camp’ and Migration Zones at the Borders of Spain. International Political Sociology 7(1): 7591.CrossRefGoogle Scholar
Jourde, C. 2007. Constructing Representations of the ‘Global War on Terror’ in the Islamic Republic of Mauritania. Journal of Contemporary African Studies 25(1): 77100.CrossRefGoogle Scholar
Kaldor, M. and Selchow, S. 2015. From Military to ‘Security Interventions’: An Alternative Approach to Contemporary Interventions. Stability: International Journal of Security & Development 4(1).CrossRefGoogle Scholar
Kendall, G. 2004. Global Networks, International Networks, Actor Networks. In: Larner, W. and Walters, W., eds. Global Governmentality: Governing International Spaces. London: Routledge, 5975.Google Scholar
Khadiagala, G. M. 2010. Boundaries in Eastern Africa. Journal of Eastern African Studies 4(2): 266278.CrossRefGoogle Scholar
Klüfers, P. 2014. Security Repertoires: Towards a Sociopragmatist Framing of Securitization Processes. Critical Studies on Security 2(3): 278292.CrossRefGoogle Scholar
Koch, N. 2013. Introduction – Field Methods in ‘Closed Contexts’: Undertaking Research in Authoritarian States and Places. Area 45(4): 390395.CrossRefGoogle Scholar
Kopytoff, I. 1987. The African Frontier: The Reproduction of Traditional African Societies. Indianapolis: Indiana University Press.Google Scholar
Kornprobst, M. 2002. The Management of Border Disputes in African Regional Sub-systems: Comparing West Africa and the Horn of Africa. Journal of Modern African Studies 40(3): 369393.CrossRefGoogle Scholar
Krause, K. and Williams, M. C. 1997. Preface: Toward Critical Security Studies. In: Krause, K. and Williams, M. C., eds. Critical Security Studies: Concepts and Cases. Minneapolis: University of Minnesota Press, viixxi.Google Scholar
Krogstad, E. G. 2012. Security, Development, and Force: Revisiting Police Reform in Sierra Leone. African Affairs 111(443): 261280.CrossRefGoogle Scholar
Kunz, R., Lavenex, S. and Panizzon, M., eds. 2011. Multilayered Migration Governance. Abingdon: Routledge.CrossRefGoogle Scholar
Latour, B. 1992. Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts. In: Bijker, W. and Law, J., eds. Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge, MA: MIT Press, 225259.Google Scholar
Latour, B. 1999. Pandora's Hope: Essays on the Reality of Science Studies. Cambridge, MA: Harvard University Press.Google Scholar
Latour, B. 2004. Why Has Critique Run Out of Steam? Critical Inquiry 30: 225248.CrossRefGoogle Scholar
Latour, B. 2005. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press.CrossRefGoogle Scholar
Law, J. 1986. On the Methods of Long Distance Control: Vessels, Navigation, and the Portuguese Route to India. In: Law, J., ed. Power, Action and Belief: A New Sociology of Knowledge? Sociological Review Monograph 32. Henley, UK: Routledge, 234263.Google Scholar
Law, J. 1992. Notes on the Theory of the Actor Network: Ordering, Strategy and Heterogeneity. Systems Practice 5: 379393.CrossRefGoogle Scholar
Law, J. 1999. Traduction/Trahison: Notes on ANT. Centre for Science Studies, Lancaster University. Available at: www.lancaster.ac.uk/sociology/research/publications/papers/law-traduction-trahison.pdf (Accessed 20 March 2015).Google Scholar
Law, J. 2003. Materialities, Spatialities, Globalities. Centre for Science Studies, Lancaster University. Available at: www.lancaster.ac.uk/sociology/research/publications/papers/law-hetherington-materialities-spatialities-globalities.pdf (Accessed 20 March 2015).Google Scholar
Law, J. 2004. After Method: Mess in Social Science Research. Abingdon: Routledge.CrossRefGoogle Scholar
Law, J. 2007. Actor Network Theory and Material Semiotics (version of 25 April 2007). John Law's STS Web Page. Available at: www.heterogeneities.net/publications/Law2007ANTandMaterialSemiotics.pdf (Accessed 20 March 2015).Google Scholar
Leese, M. 2016. Governing Airport Security between the Market and the Public Good. Criminology and Criminal Justice 16(2): 158175.CrossRefGoogle Scholar
Leonard, D. K. 2010. ‘Pockets’ of effective agencies in weak governance states: Where are they likely and why does it matter? Public Administration and Development 30(2): 91101.CrossRefGoogle Scholar
Léonard, S. 2010. EU Border Security and Migration into the European Union: Frontex and Securitisation through Practices. European Security 19(2): 231254.CrossRefGoogle Scholar
Lutterbeck, D. 2004. Between Police and Military: The New Security Agenda and the Rise of Gendarmeries. Cooperation and Conflict 39(1): 4568.CrossRefGoogle Scholar
Lyon, D. 2009. Identifying Citizens: ID Cards as Surveillance. Oxford: Polity.Google Scholar
Magharebia. 2011. Census Riots Hit Southern Mauritania. 3 October. Available at: http://magharebia.com/en_GB/articles/awi/features/2011/10/03/feature-02 (Accessed 28 January 2015).Google Scholar
Magnet, S. A. 2011. When Biometrics Fail: Gender, Race, and the Technology of Identity. Durham, NC: Duke University Press.Google Scholar
Maldonado-Torres, N. 2007. On the Coloniality of Being: Contributions to the Development of a Concept. Cultural Studies 21(2): 240270.CrossRefGoogle Scholar
Mann, M. 1984. The autonomous power of the state: its origins, mechanisms and results. European Journal of Sociology 25(2): 185213.CrossRefGoogle Scholar
Marcus, G. E. 1995. Ethnography in/of the World System: The Emergence of Multi-sited Ethnography. Annual Review of Anthropology 24: 95117.CrossRefGoogle Scholar
Martin, A. K., Van Brakel, R. E. and Bernhard, D. J. 2010. Understanding Resistance to Digital Surveillance: Towards a Multi-disciplinary, Multi-actor Framework. Surveillance and Society 6(3): 214232.Google Scholar
Mbembe, J.-A. and Rendall, S. 2000. At the Edge of the World: Boundaries, Territoriality, and Sovereignty in Africa. Public Culture 12(1): 259284.CrossRefGoogle Scholar
Ministère de l'Intérieur. 2010. Contribution au Processus de Révision du CSLP et l’Élaboration de son Plan d'Actions 2011–2015. Nouakchott: Islamic Republic of Mauritania.Google Scholar
Ministère de l'Intérieur. 2011. Arrêté nº937/MIDEC portant création, organisation et fonctionnement des instances départementales d'enrôlement. Nouakchott: Islamic Republic of Mauritania.Google Scholar
Ministère des Affaires Étrangères et de la Coopération. 2012. La Mauritanie face au défi terroriste: De la Stratégie Nationale de Lutte contre le Terrorisme et la Criminalité Transnationale. Nouakchott: Islamic Republic of Mauritania.Google Scholar
Morpho, . 2010. Mauritania: A Single Integrated System. Available at: www.morpho.com/references/identite-125/mauritania-a-single-integrated-system (Accessed 20 March 2015).Google Scholar
Muller, B. J. 2010. Security, Risk and the Biometric State: Governing Borders and Bodies. Abingdon: Routledge.CrossRefGoogle Scholar
Mutlu, C. E. 2013. The Material Turn: Introduction. In: Salter, M. B. and Mutlu, C. E., eds. Research Methods in Critical Security Studies: An Introduction. Abingdon: Routledge, 173179.Google Scholar
Neal, A. 2009. Securitization and Risk at the EU Border: The Origins of Frontex. Journal of Common Market Studies 47(2): 333356.CrossRefGoogle Scholar
Nugent, P. and Asiwaju, A. 1996. African Boundaries: Barriers, Conduits and Opportunities. London: Pinter.Google Scholar
Nyers, P. 2012. The Politics of Dirt. Radical Philosophy 174 (July/August).Google Scholar
Paasi, A. 1998. Boundaries as Social Processes: Territoriality in the World of Flows. Geopolitics 3(1): 6988.CrossRefGoogle Scholar
Pallister-Wilkins, P. 2015. The Humanitarian Politics of European Border Policing: Frontex and Border Police in Evros. International Political Sociology 9(1): 5369.CrossRefGoogle Scholar
Paris, R. 2004. At War's End: Building Peace after Civil Conflict. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Parker, N., Vaughan-Williams, N., et al. 2009. Lines in the Sand? Towards an Agenda for Critical Border Studies. Geopolitics 14(3): 582587.CrossRefGoogle Scholar
Phillips, J. 2006. Agencement/Assemblage. Theory, Culture, and Society 23(2–3): 108109.CrossRefGoogle Scholar
Porter, T. 2012. Making Serious Measures: Numerical Indices, Peer Review, and Transnational Actor-networks. Journal of International Relations and Development 15(4): 532557.CrossRefGoogle Scholar
Poutignat, P. and Streiff-Fénart, J. 2010. Migration Policy Development in Mauritania: Process, Issues and Actors. In: Geiger, M. and Pécoud, A., eds. The Politics of International Migration Management. Basingstoke: Palgrave, 202219.CrossRefGoogle Scholar
Prescott, J. R. V. 1965. The Geography of Frontiers and Boundaries. Chicago: Aldine.Google Scholar
Prince, R. 2012. Policy Transfer, Consultants and the Geographies of Governance. Progress in Human Geography 36(2): 188203.CrossRefGoogle Scholar
Prokkola, E. 2013. Technologies of Border Management: Performances and Calculation of Finnish/Schengen Border Security. Geopolitics 18(1): 7794.CrossRefGoogle Scholar
Pugliese, J. 2010. Biometrics: Bodies, Technologies, Biopolitics. Oxford: Routledge.Google Scholar
Raeymaekers, T. 2012. Reshaping the State in Its Margins: The State, the Market and the Subaltern on a Central African Frontier. Critique of Anthropology 32(3): 334350.CrossRefGoogle Scholar
Reeves, M. 2014. Border Work: Spatial Lives of the State in Central Asia. Ithaca, NY: Cornell University Press.Google Scholar
Reid-Henry, S. M. 2012. An Incorporating Geopolitics: Frontex and the Geopolitical Rationalities of the European Border. Geopolitics 18(1): 198224.CrossRefGoogle Scholar
RFI. 2017a. Paris et Dakar signent de nouvelles conventions de cooperation. 19 October. Available at: www.rfi.fr/afrique/20171019-paris-dakar-signent-nouvelles-conventions-cooperation?ref=tw_i (Accessed 8 November 2017).Google Scholar
RFI. 2017b. Sénégal: inquiétude après plusieurs arrestations au poste frontière de Rosso. 23 October. Available at: www.rfi.fr/afrique/20171023-senegal-terrorisme-rumeurs-presse-jihadiste-turquie-mauritanie-mali-algerie-etat-is?ref=tw (Accessed 8 November 2017).Google Scholar
Richey, M. 2013. The North African Revolutions: A Chance to Rethink European Externalization of the Handling of Non-EU Migrant Inflows. Foreign Policy Analysis 9(4): 409431.CrossRefGoogle Scholar
Robin, N. 2009. La CEDEAO, un espace de libre circulation, poste frontière avancé de l'espace Schengen. In: Trémolières, M., ed. Les enjeux régionaux des migrations ouest-africaines: perspectives africaines et européennes. Paris: OECD, 149165.CrossRefGoogle Scholar
Roll, M. 2014. The State That Works: A ‘Pockets of Effectiveness’ Perspective on Nigeria and Beyond. In: Bierschenk, T. and de Sardan, J.-P. Olivier, eds. States at Work: Dynamics of African Bureaucracies. Leiden: Brill, 365398.Google Scholar
Rumford, C. 2006. Theorizing Borders. European Journal of Social Theory 9(2): 155169.CrossRefGoogle Scholar
Rumford, C. 2008. Introduction: Citizens and Borderwork in Europe. Space and Polity 12(1): 112.CrossRefGoogle Scholar
Salter, M. B. 2004. Passports, Mobility, and Security: How Smart Can the Border Be? International Studies Perspectives 5(1): 7191.CrossRefGoogle Scholar
Salter, M. B. 2006. The Global Visa Regime and the Political Technologies of the International Self: Borders, Bodies, Biopolitics. Alternatives 31: 167189.CrossRefGoogle Scholar
Salter, M. B. 2007. Governmentalities of an Airport: Heterotopia and Confession. International Political Sociology 1(1): 4966.CrossRefGoogle Scholar
Salter, M. B. 2008a. Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Security Authority. Journal of International Relations and Development 11(4): 321349.CrossRefGoogle Scholar
Salter, M. B. ed. 2008b. Politics at the Airport. Minneapolis: University of Minnesota Press.Google Scholar
Salter, M. B. 2013. To Make Move and Let Stop: Mobility and the Assemblage of Circulation. Mobilities 8(1): 719.CrossRefGoogle Scholar
Sandor, A. 2016. Tightly Packed: Disciplinary Power, the UNODC, and the Container Control Programme in Dakar. African Studies Review 59(2): 133160.CrossRefGoogle Scholar
Sassen, S. 2006. Territory, Authority, Rights: From Medieval to Global Assemblages. Princeton, NJ: Princeton University Press.Google Scholar
Scheel, S. 2013. Autonomy of Migration Despite Its Securitisation? Facing the Terms and Conditions of Biometric Rebordering. Millennium 41(3): 575600.CrossRefGoogle Scholar
Scheele, J. 2012. Smugglers and Saints of the Sahara: Regional Connectivity in the Twentieth Century. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Schomerus, M. and De Vries, L. 2014. Improvising Border Security: ‘A Situation of Security Pluralism’ along South Sudan's Borders with the Democratic Republic of the Congo. Security Dialogue 45(3): 279294.CrossRefGoogle Scholar
Scott, J. S. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press.Google Scholar
Seabilla. 2013. Main Menu. Available at: www.seabilla.eu/cms/ (Accessed 20 March 2015).Google Scholar
Securiport. 2014. The Fund for Philanthropy (TFFP) and Securiport LLC Formalize Strategic Partnership and Launch $75 Million (US) ‘Campaign to Help Contain Ebola’. 19 November. Available at: www.securiport.com/fund-philanthropy-tffp-securiport-llc-formalize-strategic-partnership-launch-75-million-us-campaign-help-contain-ebola/ (Accessed 28 January 2015).Google Scholar
Security Dialogue. 2010. The Security-Development Nexus Revisited [special issue]. 41(1).Google Scholar
Seymour, L. J. M. 2013. Sovereignty, Territory and Authority: Boundary Maintenance in Contemporary Africa. Critical African Studies 5(1): 1731.CrossRefGoogle Scholar
Shamir, R. 2005. Without Borders? Notes on Globalization as a Mobility Regime. Sociological Theory 23(2): 197217.CrossRefGoogle Scholar
Shore, C. and Wright, S. 1997. Anthropology of Policy: Perspectives on Governance and Power. New York: Routledge.Google Scholar
Smirl, L. 2013. Spaces of Aid: How Cars, Compounds and Hotels Shape Humanitarianism. London: Zed.Google Scholar
Squire, V. 2011. The Contested Politics of Mobility: Borderzones and Irregularity. Abingdon: Routledge.Google Scholar
Swiss Federal Office for Migration. 2012. Integrated Border Management Strategy Switzerland. 14 October. Available at: www.bfm.admin.ch/content/bfm/en/home/themen/einreise/ibm.html (Accessed 20 March 2015).Google Scholar
Thomas, O. D. 2014. Foucaultian Dispositifs as Methodology: The Case of Anonymous Exclusions by Unique Identification in India. International Political Sociology 8(2): 164181.CrossRefGoogle Scholar
Tiedge, D. 2012. MRTD Assistance to States: Building on the Success of Aviation Security Technical Cooperation. Remarks at ICAO 8th Symposium and Exhibition on MRTDs, Biometrics, and Security Standards, Montreal, 10–12 October. Available at: www.icao.int/Meetings/mrtd-symposium-2012/Documents/10_pm_Tiedge.pdf (Accessed 20 March 2015).Google Scholar
Tilly, C. 1985. War-Making and State-Making as Organized Crime. In: Evans, P., Rueschmeyer, D., and Skocpol, T., eds. Bringing the State Back In. Cambridge: Cambridge University Press, 169187.CrossRefGoogle Scholar
Torpey, J. 2000. The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge: Cambridge University Press.Google Scholar
Trauner, F. and Deimel, S. 2013. The Impact of EU Migration Policies on African Countries: The Case of Mali. International Migration 51(4): 2032.CrossRefGoogle Scholar
UNHCR. 2012. UNHCR Distributes Biometric ID Cards to Refugees in Senegal. 22 October. Available at: www.unhcr.org/508536389.html (Accessed 20 March 2015).Google Scholar
United Nations. 2013. United National Integrated Strategy for the Sahel. Available at: https://oses.unmissions.org/sites/default/files/united_nations_integrated_strategy_for_the_sahel_s-2013–354.pdf (Accessed 14 November 2016).Google Scholar
UNODC. 2010. The Globalization of Crime: A Transnational Organized Crime Threat Assessment. Vienna: United Nations Office on Drugs and Crime. Available at: www.unodc.org/documents/data-and-analysis/tocta/TOCTA_Report_2010_low_res.pdf (Accessed 4 June 2014).Google Scholar
UNODC. 2013. Transnational Organized Crime in West Africa: A Threat Assessment. Vienna: United Nations Office on Drugs and Crime. Available at: www.unodc.org/documents/data-and-analysis/tocta/West_Africa_TOCTA_2013_EN.pdf (Accessed 20 March 2015).Google Scholar
US Embassy Dakar. 2011. L'Ambassade offre au Sénégal un système automatisé d'identification d'empreintes. Panorama, July–August.Google Scholar
Uvin, P. 2002. The Development/Peacebuilding Nexus: A Typology and History of Changing Paradigms. Journal of Peacebuilding and Development 1(1): 524.CrossRefGoogle Scholar
Van der Ploeg, I. 1999. The illegal body: ‘Eurodac’ and the politics of biometric identification. Ethics and Information Technology 1(4): 295302.CrossRefGoogle Scholar
Van Houtum, H. 2010. Human Blacklisting: The Global Apartheid of the EU's External Border Regime. Environment and Planning D 28(6): 957976.CrossRefGoogle Scholar
Vaughan-Williams, N. 2009. Border Politics. Edinburgh: Edinburgh University Press.CrossRefGoogle Scholar
Villumsen, T. 2012. Knowledges. In: Adler-Nissen, R., ed. Bourdieu in International Relations. London: Routledge, 5977.Google Scholar
Vives, L. 2017. Unwanted Sea Migrants across the EU Border: The Canary Islands. Political Geography 61: 181192.CrossRefGoogle Scholar
Voelkner, N. 2011. Managing Pathogenic Circulation: Human Security and the Migrant Health Assemblage in Thailand. Security Dialogue 42(3): 239259.CrossRefGoogle Scholar
Waever, O. 1988. Security, the Speech Act. Unpublished manuscript.Google Scholar
Waever, O. 1995. Securitization and Desecuritization. In: Lipschutz, R. D., ed. On Security. New York: Columbia University Press, 4686.Google Scholar
Walker, R. B. J. 1993. Inside/Outside: International Relations as Political Theory. Cambridge: Cambridge University Press.Google Scholar
Walters, W. 2002. Mapping Schengenland: Denaturalizing the Border. Environment and Planning D 20(2): 561580.CrossRefGoogle Scholar
Walters, W. 2008. Putting the Migration-Security Nexus in Its Place. In: Amoore, L. and De Goede, M.. eds. Risk and the War on Terror. New York: Routledge, 158177.Google Scholar
Watkins, S. C., Swindler, A. and Biruk, C. 2009. Hearsay Ethnography: A Method for Learning about Responses to Health Interventions. In: Pescosolido, B. A. et al., eds. Handbook of the Sociology of Health, Illness, and Healing: A Blueprint for the 21st Century. New York: Springer, 431445.Google Scholar
Wedeen, L. 2009. Political Ethnography: What Immersion Contributes to the Study of Power. Chicago: University of Chicago Press.Google Scholar
Willems, R. 2007. ‘Barcelona or the Hereafter’: Senegalese struggling with perilous journeys and perilous livelihoods. In Kolor: Journal on Moving Communities 7(1): 2347.Google Scholar
Williams, M. C. 2003. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 47(4): 511531.CrossRefGoogle Scholar
World Bank. 2014. Digital Identity Toolkit: A Guide for Stakeholders in Africa. Washington, DC: World Bank Group.Google Scholar
Zaiotti, R. 2011. Cultures of Border Control: Schengen and the Evolution of European Frontiers. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Zampagni, F. 2016. Unpacking the Schengen Visa Regime: A Study on Bureaucrats and Discretion in an Italian Consulate. Journal of Borderlands Studies 31(2): 251266.Google Scholar
Zartman, I. W. ed. 1995. Collapsed States: The Disintegration and Restoration of Legitimate Authority. Boulder, CO: Lynne Rienner.CrossRefGoogle Scholar
Zetes. 2013. Zetes Produces Senegalese Biometric Visa and Delivers 66 Fixed Enrolment Stations. Available at: www.zetes.com/en/press-and-events/press-releases/2013/130523-peopleid-senegal (Accessed 28 January 2015).Google Scholar
Zielonka, J. 2001. How New Enlarged Borders Will Reshape the European Union. Journal of Common Market Studies 39(3): 507536.CrossRefGoogle Scholar
Zoellick, R. B. 2008. Fragile States: Securing Development. Survival 50(6): 6784.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Philippe M. Frowd, University of Ottawa
  • Book: Security at the Borders
  • Online publication: 03 July 2018
  • Chapter DOI: https://doi.org/10.1017/9781108556095.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Philippe M. Frowd, University of Ottawa
  • Book: Security at the Borders
  • Online publication: 03 July 2018
  • Chapter DOI: https://doi.org/10.1017/9781108556095.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Philippe M. Frowd, University of Ottawa
  • Book: Security at the Borders
  • Online publication: 03 July 2018
  • Chapter DOI: https://doi.org/10.1017/9781108556095.008
Available formats
×