Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-rvbq7 Total loading time: 0 Render date: 2024-07-15T11:34:18.967Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  28 November 2017

Matthew Longo
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
The Politics of Borders
Sovereignty, Security, and the Citizen after 9/11
, pp. 229 - 240
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

“2012–2016 Border Patrol National Strategy” US Border Patrol Press Release, 2012.Google Scholar
“244 Million International Migrants Living Abroad Worldwide, New Un Statistics Reveal.” United Nations Sustainable Development, 2016. www.un.org/sustainabledevelopment/blog/2016/01/244-million-international-migrants-living-abroad-worldwide-new-un-statistics-reveal/.Google Scholar
Abizadeh, Arash. “Democratic Theory and Border Coercion: No Right to Unilaterally Control Your Own Borders.” Political Theory 36 (1):3765, at 2008.Google Scholar
Agamben, Giorgio. Homo Sacer: Sovereign Power and Bare Life. Translated by D. Heller-Roazen. Edited by Hamacher, W. and Wellbery, D. E.. Stanford, California: Stanford University Press, 1995.Google Scholar
Agamben, Giorgio. State of Exception. Translated by K. Attell. Chicago: University of Chicago Press, 2005.Google Scholar
Amoore, Louise. “Governing by Identity.” In Playing the Identity Card: Surveillance, Security and Identification in Global Perspective. London: Routledge, 2004.Google Scholar
Amoore, Louise, and Goede, Marieke de. “Governance, Risk and Dataveillance in the War on Terror.” Crime, Law & Social Change 43 (2):14973, 2005.CrossRefGoogle Scholar
Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. New York: Verso, 2006.Google Scholar
Anderson, Malcolm. Frontiers: Territory and State Formation in the Modern World. Cambridge: Polity Press, 1996.Google Scholar
Andreas, Peter. “The Mexicanization of the US-Canada Border: Assymetrical Interdependence in a Changing Security Context.” International Journal 60 (2):449462, 2008.Google Scholar
Ansell, Christopher K.Territoriality, Authority and Democracy.” In Restructuring Territoriality: Europe and the United States Compared, edited by Ansell, C. K. and Palma, G. D.. Cambridge, UK: Cambridge University Press, 2004.CrossRefGoogle Scholar
Anzaldúa, Gloria. Borderlands: The New Mestiza. San Francisco: Aunt Lute Books, 2007.Google Scholar
Arendt, Hannah. The Origins of Totalitarianism. New York: Harcourt, 1976.Google Scholar
Arendt, Hannah. The Human Condition. Chicago: University of Chicago Press, 1998.Google Scholar
Aristotle, . The Politics and the Constitution of Athens. edited by Everson, S.. Cambridge: Cambridge University Press, 1996.Google Scholar
Asad, Talal. On Suicide Bombing. New York: Columbia University Press, 2007.Google Scholar
Baczynska, Gabriela. “EU Executive to Present Steps to Tighten External Border Controls.” Reuters, April 6, 2016, http://uk.reuters.com/article/uk-europe-migrants-eu-borders-idUKKCN0X30BOGoogle Scholar
Barkakati, Nabajyoti. “Border Security: Better Usage of Electronic Passport Security Features Could Improve Fraud Detection.” United States Government Accountability Office, Report to Congressional Requestors, GAO-10-96, 2010.Google Scholar
Baubock, Rainer. “Global Justice, Freedom of Movement and Democratic Citizenship.” Archives of European Sociology 1:131, 2009.Google Scholar
Bauman, Zygmunt. Globalization: The Human Consequences. New York: Columbia University Press, 1998.Google Scholar
Beitz, Charles R. The Idea of Human Rights. Oxford: Oxford University Press, 2009.CrossRefGoogle Scholar
Bekdil, Burak Ege.Turkey to Shop for Border Security Equipment.” Defense News, September 5, 2015.Google Scholar
Benhabib, Seyla. The Claims of Culture: Equality and Diversity in the Global Era. Princeton: Princeton University Press, 2002.CrossRefGoogle Scholar
Benhabib, Seyla. Dignity in Adversity: Human Rights in Troubled Times. Cambridge, UK: Polity Press, 2011.Google Scholar
Berlin, Isaiah. “Two Concepts of Liberty.” In The Proper Study of Mankind: An Anthology of Essays, edited by Hardy, Henry and Hausheer, Roger. New York: Farrar, Straus and Giroux, 2000.Google Scholar
“Big Data.” American Civil Liberties News Release, February 27, 2014, https://www.aclu.org/issues/privacy-technology/surveillance-technologies/big-data.Google Scholar
“Big Data: Seizing Opportunities and Preserving Values.” White House Executive Office of the President, News Release, May 1, 2014, https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf.Google Scholar
Bigo, Didier. “Globalization of In-Security: The Field of the Professionals of Unease Management and the Ban-opticon.” Traces: A Multilingual Journal of Cultural Theory 4:109–57, 2004.Google Scholar
Bigo, Didier. “Frontier Controls in the European Union: Who is in Control?” In Controlling Frontiers: Free Movement Into and Within Europe, edited by Bigo, D. and Guild, E.. Chippenham, Wiltshire: Ashgate Publishing Company, 2005.Google Scholar
Boswell, Christina. “Migration Control in Europe after 9/11: Explaining the Absence of Securitization.” Journal of Common Market Studies 45 (3):589610, 2007.CrossRefGoogle Scholar
Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Translated by R. Nice. Cambridge, MA: Harvard University Press, 1984.Google Scholar
Bourdieu, Pierre. Outline of a Theory of Practice. Translated by R. Nice. Edited by Gellner, E., Goody, J., Gudeman, S., Herzfeld, M. and Parry, J., Cambridge Studies in Social and Cultural Anthropology. Cambridge, UK: Cambridge University Press, 2003.Google Scholar
Bronskill, Jim. “Canada, U.S. To Share Border Security Data.” The Canadian Press, March 10, 2016.Google Scholar
Brown, Pamela, and Mallonee, Mary Kay. “First on Cnn: Top U.S. Intel Official: Europe Not Taking Advantage of Terror Tracking Tools.” CNN.com, April 7, 2016.Google Scholar
Brown, Wendy. Walled States, Waning Sovereignty. Cambrige, MA: Zone Books, 2010.Google Scholar
Browne, Simone. “Digital Epidermalization: Race, Identity and Biometrics.” Critical Sociology 36 (1):13150, 2010.Google Scholar
Brunkhorst, Hauke. “Globalizing Democracy without a State: Weak Public, Strong Public, Global Constitutionalism.” Millenium: Journal of International Studies 31 (3):67590, 2002.CrossRefGoogle Scholar
Buchanan, Allen. “The Making and Unmaking of Boundaries: What Liberalism Has to Say.” In States, Nations, and Borders: The Ethics of Making Boundaries, edited by Buchanan, A. and Moore, M.. Cambridge: Cambridge University Press, 2003.Google Scholar
Buchanan, Allen, and Moore, Margaret. “Introduction: The Making and Unmaking of Boundaries.” In States, Nations, and Borders: The Ethics of Making Boundaries, edited by Buchanan, A. and Moore, M.. Cambridge: Cambridge University Press, 2003.Google Scholar
Burbank, Jane, and Cooper, Frederick. Empires in World History: Power and the Politics of Difference. Princeton: Princeton University Press, 2010.Google Scholar
Butler, Judith. Frames of War: When Is Life Grievable? London: Verso Books, 2010.Google Scholar
Callahan, Mary Ellen, and Wark, Wesley. “Privacy and Information Sharing: The Search for an Intelligent Border.” In One Issue Two Voices: Woodrow Wilson International Center for Scholars, 2010.Google Scholar
Carens, Joseph H.Aliens and Citizens: The Case for Open Borders.” Review of Politics 49 (2):25173, 1987.Google Scholar
Carens, Joseph H. Immigrants and the Right to Stay. Cambridge, MA: The MIT Press, 2010.Google Scholar
Castells, Manuel. The Rise of the Network Society. Malden, MA: Blackwell, 2000.Google Scholar
Cavallero, Eric. “Global Federative Democracy.” Metaphilosophy 40 (1):4364, 2009.Google Scholar
Ceyhan, Ayse. “Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics.” Surveillance & Society 5 (2):10223, 2008.Google Scholar
Chadwick, Vincent. “Policymakers: Share Intel but Don’t Betray Liberty.” Politico.eu, April 7, 2016.Google Scholar
“Civil Rights and Big Data: Background Material.” Leadership Conference on Civil and Human Rights & The Leadership Conference Education Fund, News Release, 2014, www.civilrights.org/press/2014/civil-rights-and-big-data.html.Google Scholar
Cochrane, ClearVu: The Invisible Wall. Cochrane USA, Product Guide, 2012.Google Scholar
Cochrane, ClearVu Cochrane USA: Perimeter Security Barrier Specialist. Cochrane USA, Product Guide, 2012.Google Scholar
Cohen, Jean L.Sovereign Equality vs. Imperial Right: The Battle over the “New World Order.” Constellations 13 (4):485505, 2006.Google Scholar
Cohen, Jean L. Globalization and Sovereignty: Rethinking Legality, Legitimacy, and Constitutionalism. Cambridge: Cambridge University Press, 2012.Google Scholar
Connolly, William. Identity/Difference: Democratic Negotiations of Political Paradox. Minneapolis: University of Minnesota Press, 2012.Google Scholar
Costa, Antonio Mario. The Globalization of Crime: A Transnational Organized Crime Threat Assessment. United Nations Office on Drugs and Crime (UNODC), 2010.Google Scholar
De Vries, Lloyd. “Airport Security Fails Test.” CBS News, February 11, 2009.Google Scholar
Declaration by President Obama and Prime Minister Harper of Canada – Beyond the Border. 2011. The White House, Office of the Press Secretary.Google Scholar
Derrida, Jacques. “Hostipitality.” Angelaki 5 (3):318, 2000.CrossRefGoogle Scholar
Derrida, Jacques. On Cosmopolitanism and Forgiveness. Translated by M. Dooley and M. Hughes. Edited by Critchley, S. and Kearney, R., Thinking in Action. New York: Routledge, 2001.Google Scholar
Di Palma, Giuseppe. “Postscript: What Inefficient History and Malleable Practices Say about Nation-States and Supranational Democracy When Territoriality is No Longer Exclusive.” In Restructuring Territoriality: Europe and the United States Compared, edited by Ansell, C. K. and Palma, G. D.. Cambridge, UK: Cambridge University Press, 2004.Google Scholar
Donahoe, Eileen. “So Software Has Eaten the World: What Does It Mean for Human Rights, Security & Governance?Human Rights Watch, March 22, 2016.Google Scholar
Donahoe, Eileen. “Digital Disruption of Human Rights.” Human Rights Watch, March 25, 2016.Google Scholar
Doyle, Michael. Empires. Ithaca: Cornell University Press, 1986.Google Scholar
DRS Technologies Advertisement. Homeland Security Today, March, 5, 2012.Google Scholar
Eubanks, Virginia. “Editorial: Europe’s Urgent Security Challenge.” The New York Times, April 11, 2016.Google Scholar
Elden, Stuart. The Birth of Territory. Chicago: University of Chicago Press, 2013.Google Scholar
Eubanks, Virginia. “Want to Predict the Future of Surveillance? Ask Poor Communities.” The American Prospect, January 15, 2014.Google Scholar
Eubanks, Virginia. “European Union Border Security,” Government Gazette, March 2013.Google Scholar
Fabre, Cecile. Justice in a Changing World. Cambridge, UK: Polity Press, 2007.Google Scholar
“Fact Sheet: Big Data and Privacy Working Group Review.” White House Office of the Press Secretary. News Release, May 1, 2014, https://www.whitehouse.gov/the-press-office/2014/05/01/fact-sheet-big-data-and-privacy-working-group-review.Google Scholar
Febvre, Lucien. A Geographical Introduction to History. Westport, CT: Greenwood Press, 1974.Google Scholar
Finnegan, Philip. “Analyst’s Notebook: FLIR + ICx = New Opportunities.” Homeland Security Today June 8, 2012.Google Scholar
Finnegan, Philip, and Barnes, Peter. “Homeland Security Today’s Top 25 of 2011.” Homeland Security Today, April 24–29, 2012.Google Scholar
Foucault, Michel. Power/Knowledge: Selected Interviews & Other Writings 1972–1977. Translated by C. Gordon, L. Marshall, J. Mepham and K. Soper. Edited by Gordon, C.. New York: Pantheon Books, 1980.Google Scholar
Foucault, Michel. “The Subject and Power.” In Power, edited by Faubion, James D., 326–48. New York: The New Press, 2000.Google Scholar
Foucault, Michel. Security, Territory, Population: Lectures at the College de France, 1977–1978. Translated by G. Burchell. Edited by Senellart, M.. New York: Picador, 2007.Google Scholar
Foster, Peter. “European Cross-Border Security Years Away, Experts Warn.” The Telegraph, March 23, 2016.Google Scholar
Fraser, Nancy. Scales of Justice: Reimagining Political Space in a Globalizing World. New York: Columbia University Press, 2009.Google Scholar
Fraser, Nancy, and Honneth, Axel. Redistribution or Recognition? A Political-Philosophical Exchange. New York: Verso, 2003.Google Scholar
Freeden, Michael. Rights. Minneapolis: University of Minnesota Press, 1991.Google Scholar
Freud, Sigmund. Civilization and Its Discontents. Translated by J. Strachey. Edited by Gay, P.. New York: Norton & Co, 1961.Google Scholar
Fuller, Gillian. “Welcome to Windows 2.1: Motion Aesthetics at the Airport.” In Politics at the Airport, edited by Salter, M. B.. Minneapolis: University of Minneapolis Press, 2008.Google Scholar
Ganapathy, Nirmala. “US, India Move Towards Sharing Logistics.” Strait Times, April 13, 2016.Google Scholar
Gergen, Kenneth J. The Saturated Self: Dilemmas of Identity in Contemporary Life, New York: Basic Books, 2000.Google Scholar
Gidda, Mirren. “As Routes to Europe Close, Refugees Are Starting to Consider One of the Oldest and Deadliest Crossings.” Newsweek, April 12, 2016.Google Scholar
Giddens, Anthony. The Nation-State and Violence: Volume Two of A Contemporary Critique of Historical Materialism. Berkeley, CA: University of California Press, 1987.Google Scholar
Goddard, Terry. “How to Fix a Broken Border: A Three Part Series.” In Perspectives: Immigration Policy Center, 2012.Google Scholar
Goodin, Robert E.Enfranchising All Affected Interests, and Its Alternatives.” Philosophy & Public Affairs 25 (1), 2007.Google Scholar
Goodwin, Jacob. “Editorial: Security and Money.” Government Security News, February, 2012.Google Scholar
Goodwin, Jacob. “With SBInet behind it, CBP develops a new procurement strategy.” Government Security News, February 26, 2012.Google Scholar
Grauman, Brigid. “Cyber-Security: The Vexed Question of Global Rules.” Security & Defence Agenda. Available at: www.mcafee.com/us/resources/reports/rp-sda-cyber-security.pdf, 2012.Google Scholar
Grene, David. “Introduction” to Herodotus: The History, Chicago: University of Chicago Press, 1987, at 14.Google Scholar
Habermas, Jurgen.Three Normative Models of Democracy.” In Democracy and Difference: Contesting the Boundaries of the Political, edited by Benhabib, Seyla, 2130. Princeton: Princeton University Press, 1996.Google Scholar
Habermas, Jurgen. The Inclusion of the Other: Studies in Political Theory. Edited by Cronin, C. and Greif, P. D.. Cambridge: MIT Press, 1998.Google Scholar
Hardin, Peter. “Eyes in the Skies.” Richmond Times-Dispatch, October 30, 2003.Google Scholar
Hawley, Kip.Why Airport Security Is Broken – And How To Fix It.” The Wall Street Journal, April 15, 2012.Google Scholar
Heidegger, Martin. “Building Dwelling Thinking.” In Basic Writings: From Being and Time (1927) to The Task of Thinking (1964), edited by Krell, D. F.. London: Routledge, 1993.Google Scholar
Held, David. Democracy and the Global Order. Palo Alto: Stanford University Press, 1995.Google Scholar
Held, David. Models of Democracy. Cambridge, UK: Polity, 2006.Google Scholar
Honig, Bonnie. Democracy and the Foreigner. Princeton: Princeton University Press, 2001.Google Scholar
Hovsepian, Marcel. “Frontlines: Border Security Strategy Remains Myopic.” Homeland Security Today, January 2, 2011.Google Scholar
Hurrell, Andrew. “International Law and the Making and Unmaking of Boundaries.” In States, Nations, and Borders: The Ethics of Making Boundaries, edited by Buchanan, A. and Moore, M.. Cambridge: Cambridge University Press, 2003.Google Scholar
Hurrell, Andrew. On Global Order: Power, Values, and the Constitution of International Society. Oxford: Oxford University Press, 2007.Google Scholar
Huysmans, Jef. “The European Union and the Securitization of Migration.” Journal of Common Market Studies 38 (5):75177, 2000.Google Scholar
Ignatius, David. “Brussels Shows Europe’s Shockingly Dysfunctional Approach to Security.” The Washington Post, March 22, 2016.Google Scholar
Iris Recognition at a Distance and on the Move. SRI International Sarnoff, Iris on the Move Product Guide, 2012.Google Scholar
Jain, Anil K. “Biometric Recognition.” Lecture at Michigan State University. Available at: http://biometrics.cse.msu.edu. (Last Accessed: September 11, 2011), 2011.Google Scholar
Johnson, Jeh. “Statement by Secretary Jeh C. Johnson on Southwest Border Security.” news release, March 9, 2016, https://www.dhs.gov/news/2016/03/09/statement-secretary-jeh-c-johnson-southwest-border-security.Google Scholar
Keene, Edward. International Political Thought: A Historical Introduction Cambridge, UK: Polity Press, 2005.Google Scholar
Khalidi, Rashid. Palestinian Identity: The Construction of Modern National Consciousness. New York: Columbia University Press, 1997.Google Scholar
Kimery, Anthony. “A Day in the Life of Nogales.” Homeland Security Today, September 1, 2010.Google Scholar
Kimery, Anthony. “Northern Border Intel-Sharing Deficient, Fed Audit, Officials Say”. Homeland Security Today, March 8, 2011.Google Scholar
Kimery, Anthony. “House Passes SMART Port Security Act.” Homeland Security Today, June 28, 2012.Google Scholar
Kimery, Anthony. “First In-Depth Inside Look at Border Patrol’s New National Strategy, Issues and Implementation.” Homeland Security Today, May 7, 2012.Google Scholar
Kostiuk, Christine. “Bill C-60: Keeping Canadians Safe (Protecting Borders) Act.” Parliamentary Information and Research Service Legislative Summary LS-670E, 2010.Google Scholar
Krasner, Stephen D. Sovereignty: Organized Hypocrisy. Princeton: Princeton University Press, 1999.Google Scholar
Krasner, Stephen D.. “Problematic Sovereignty.” In Problematic Sovereignty: Contested Rules and Political Possibilities, edited by Krasner, S. D.. New York: Columbia University Press, 2001.CrossRefGoogle Scholar
Kuper, Andrew. Democracy Beyond Borders: Justice and Representation in Global Institutions. Oxford: Oxford University Press, 2004.Google Scholar
Kymlicka, Will. Multicultural Citizenship: A Liberal Theory of Minority Rights. Oxford, UK: Oxford University Press, 1995.Google Scholar
Kymlicka, Will.. “Territorial Boundaries: A Liberal-Egalitarian Perspective.” In Boundaries and Justice. Diverse Ethical Perspectives, edited by Miller, D. and Hashmi, S. H.. Princeton: Princeton University Press, 2001.Google Scholar
Kymlicka, Will.. National Responsibility and Global Justice. Oxford: Oxford University Press, 2007.Google Scholar
Kymlicka, Will. Contemporary Political Philosophy: An Introduction. Oxford: Oxford University Press, 2002.Google Scholar
Laborde, Cecile. Critical Republicanism. Oxford: Oxford University Press, 2008.Google Scholar
Lacey, Marc. “Arizona Officials, Fed Up With U.S. Efforts, Seek Donations to Build Border Fence.” The New York Times, July 20, 2011, A16.Google Scholar
Lattimore, Owen. Inner Asian Frontiers of China. Boston: Beacon Press, 1951.Google Scholar
Leggiere, Philip. “Beyond the One-Way Alert.” Homeland Security Today, March, 10–11, 2012.Google Scholar
Leonard, Sarah. “The Creation of FRONTEX and the Politics of Institutionalisation in the EU External Borders Policy.” Journal of Contemporary European Research 5 (3):37188, 2009.Google Scholar
Ling, Justin. “Canada Is Going to Start Handing over Even More Data About Travelers to the US.” Vice News, March 14, 2016.Google Scholar
Locke, John. Two Treatises of Government. Cambridge: Cambridge University Press, 2014.Google Scholar
Luttwak, Edward. The Grand Strategy of the Roman Empire: From the First Century A.D. To the Third. London: Weidenfeld & Nicholson, 1976.Google Scholar
Lyon, David. “Surveillance, Security and Social Sorting: Emerging Research Priorities.” International Criminal Justice Review 17 (3):16170, 2007.Google Scholar
Lyon, David. Identifying Citizens: ID Cards as Surveillance. Cambridge, UK: Polity Press, 2009.Google Scholar
Machiavelli, Niccolo. The Prince. edited by Mansfield, H. C.. Chicago: University of Chicago Press, 1996.Google Scholar
Machiavelli, Niccolo. Discourses on Livy. Translated by Ninian Hill. Mineola, NY: Dover Publications, [1531], 2007.Google Scholar
Maier, Charles S. Among Empires: American Ascendancy and its Predecessors. Cambridge, MA: Harvard University Press, 2006.Google Scholar
Manent, Pierre. A World Beyond Politics a Defense of the Nation-State. Princeton: Princeton University Press, 2006.Google Scholar
Marx, Karl. The Marx-Engels Reader. edited by Tucker, Robert C.. New York: W. W. Norton & Company, 1978.Google Scholar
Marx, Karl. Capital, Volume 1. Translated by Ben Fowkes. London: Penguin Classics, 1990.Google Scholar
McCarter, Mickey. “287(G) Vital To Immigration Reform: Ex-chief of ICE calls for More Flexibility to Enforce Law.” Homeland Security Today, November 12, 2009.Google Scholar
McCarter, Mickey. “CBP Chief Lists 7 Principles For Agency’s Success: Bersin Says Facilitating Trade as Important as Preventing Terror.” Homeland Security Today, October 15, 2010.Google Scholar
McCarter, Mickey. “DHS Programs Under Review Get No Funding: Cargo Screening? SBInet? General Aviation? Under Review.” Homeland Security Today, February 25, 2010.Google Scholar
McCarter, Mickey. “Napolitano Outlines DHS Priorities for 2010: At Top: Aviation, Borders, Information Sharing, Immigration Reform.” Homeland Security Today, January 27, 2010.Google Scholar
McCarter, Mickey. “Reconsider US-VISIT Exit Tests: GAO Finds US-VISIT Exit Trials Unsatisfactory.” Homeland Security Today August 11, 2010.Google Scholar
McCarter, Mickey. “Disagreements Over Virtual Fence Decision.” Homeland Security Today, 2011.Google Scholar
McCarter, Mickey. “TSA Launches Air Cargo Security Initiatives.” Homeland Security Today, 2011.Google Scholar
McCarter, Mickey. “Aviation, Port Security Bills Enjoy Bipartisan Support from House Lawmakers.” Homeland Security Today, July 2, 2012.Google Scholar
McCarter, Mickey. “Governor of Puerto Rico Calls for US Caribbean Border Initiative To Combat Drug Cartels.” Homeland Security Today, June 22, 2012.Google Scholar
McCarter, Mickey. “Bersin Steps Down as CBP Chief, Returns to DHS International Affairs.” Homeland Security Today January 3, 2012.Google Scholar
Mill, John Stuart. On Liberty. Edited by Bromwich, David and Kateb., George New Haven, CT: Yale University Press, 2003.Google Scholar
Miller, David. Citizenship and National Identity. Cambridge: Polity Press, 2000.Google Scholar
Miller, David. “Political Philosophy for Earthlings.” In Political Theory: Methods and Approaches, edited by Leopold, David and Stears, Marc, 2948. Oxford: Oxford University Press, 2008.Google Scholar
Miller, David. “Debatable Lands.” International Theory 6, no. 1 (March): 104–21, 2014.Google Scholar
Mortera-Martinez, Camino “Big Data, Big Brother? How to Secure Europeans’ Safety and Privacy.” news release, December, 2015, https://www.cer.org.uk/sites/default/files/pb_CMM_bigbrother_4dec15.pdf.Google Scholar
Mosk, Matthew, Hill, Angela, and Fleming, Timothy. Gaping Holes in Airline Security: Loaded Gun Slips Past TSA Screeners. ABC News, December 16, 2010.Google Scholar
Muir, Richard. Modern Political Geography. New York: Palgrave Macmillan, 1975.Google Scholar
Muller, Benjamin J.Travelers, Borders, Dangers: Locating the Political at the Biometric Border.” In Politics at the Airport, edited by Salter, M. B.. Minneapolis: University of Minneapolis Press, 2008.Google Scholar
Muller, Benjamin J.National Strategy for Aviation Security.” National Security Presidential Directive (NSPD) 47, 2007.Google Scholar
Muller, Benjamin J.The National Strategy for Global Supply Chain Security.” The Office of the White House, 2012.Google Scholar
Neal, Andrew W.Securitization and Risk at the EU Border: The Origins of FRONTEX.” Journal of Common Market Studies 47 (2):33356, 2009.Google Scholar
Nicolaïdis, Kalypso. “Europe’s Ends.” In The Meanings of Europe: Changes and Exchanges of a Contested Concept edited by Wiesner, Claudia and Schmidt-Gleim, Mieke, 236–57. London: Routledge, 2014.Google Scholar
Nietzsche, Friedrich. On the Genealogy of Morals and Ecce Homo. Edited by Walter Kaufman New York: Vintage Books, 1989.Google Scholar
Nietzsche, Friedrich. Untimely Meditations. Edited by Breazeale., Daniel Cambridge: Cambridge University Press, 1999.Google Scholar
Nikala, Oscar. “Tunisia to Install Surveillance Gear on New Libyan Border Wall.” DefenseNews, February 19, 2016.Google Scholar
Nikala, Oscar. “Northern Border Strategy.” Department of Homeland Security (DHS) Press Release, 2012.Google Scholar
Nikala, Oscar. “Note on Big Data, Crime and Security: Civil Liberties, Data Protection and Privacy Concerns.” Statewatch, April 3, 2014.Google Scholar
Nowrasteh, Alex, and Eddington, Patrick G.. “How Effective Is Border Security?Cato Institute Online, March 4, 2016.Google Scholar
Ohmae, Kenichi. The End of the Nation State: The Rise of Regional Economies. New York: Free Press Paperbacks, 1995.Google Scholar
O’Neill, Onora. “The Dark Side of Human Rights.” International Affairs 81, no. 2 (2005): 427–39.Google Scholar
Owen, David. “Editor’s Note.” In On Global Citizenship: James Tully in Dialogue. London, UK: Bloomsbury Academic, 2014.Google Scholar
Patrick, J. Michael. “The Economic Cost of Border Security: The Case of the Texas-Mexico Border and the US Visit Program.” In Borderlands: Comparing Border Security in North America and Europe, edited by Brunet-Jailly, E.. Ottawa: University of Ottawa Press, 2007.Google Scholar
Payan, Tony, and Vasquez, Amanda. “The Cost of Homeland Security.” In Borderlands: Comparing Border Security in North America and Europe, edited by Brunet-Jailly, E.. Ottawa: University of Ottawa Press, 2007.Google Scholar
Piccone, Paul. “General Introduction.” In The Essential Frankfurt School Reader, edited by Arato, A. and Gebhardt, E.. New York: Continuum Publishing, 2000.Google Scholar
Plato, . Complete Works. Indianapolis: Hackett Publishing Company, 1997.Google Scholar
Pogge, Thomas. “Cosmopolitanism and Sovereignty.” Ethics 103:4875, 1992.Google Scholar
Pogge, Thomas. World Poverty and Human Rights. Second ed. Malden, MA: Polity Press, 2008.Google Scholar
Poggi, Gianfranco. The State: Its Nature, Development and Prospects. Stanford: Stanford University Press, 1990.Google Scholar
Pratt, Mary Louise. Imperial Eyes: Travel Writing and Transculturation. New York: Routledge, 2008.Google Scholar
Purcell, Richard. “Privacy Policy and Technology Recommendations for a Federated Information-Sharing System.” Department of Homeland Security Data Privacy and Integrity Advisory Committee, 2012.Google Scholar
Raghuvashani, Vivek. “Indian Defense Minister to Visit China, Discuss Boundary.” DefenseNews, March 16, 2016.Google Scholar
Rawls, John. The Law of Peoples. Cambridge, MA: Harvard University Press, 1999.Google Scholar
Richardson, J. S.Imperium Romanum: Empire and the Language of Power.” The Journal of Roman Studies 81 (1991): 19.Google Scholar
“Risk Analysis for 2016.” Frontex Press Release, March 26, 2016, frontex.europa.eu/assets/Publications/Risk_Analysis/Annula_Risk_Analysis_2016.pdf.Google Scholar
Rockwell, Mark. “DHS Looks for ‘Sweet Spot’ to Balance Security and Economic Recovery.” Government Security News, February, 2012.Google Scholar
Rosenblum, Marc R.Border Security: Immigration Enforcement Between Ports of Entry.” In Congressional Research Service Report for Congress 7–5700, 2012.Google Scholar
Rousseau, Jean-Jacques. The Basic Political Writings. Edited by Cress, D. A.. Indianapolis: Hackett, 1987.Google Scholar
Ruggie, John Gerard. “Territoriality and Beyond: Problematizing Modernity in International Relations.” International Organization 47 (1):139–74, 1993.Google Scholar
Rushdie, Salman. Step Across This Line: Collected Non-Fiction 1992–2002. London: Vintage, 2003.Google Scholar
Sahlins, Peter. Boundaries: The Making of France and Spain in the Pyrenees. Berkeley: University of California Press, 1989.Google Scholar
Sandel, Michael. Liberalism and the Limits of Justice. Oxford: Oxford University Press, 1982.Google Scholar
Sassen, Saskia. Territory, Authority, Rights: From Medieval To Global Assemblages. Princeton: Princeton University Press, 2006.Google Scholar
Sassen, Saskia. “Borders, Walls, and Crumbling Sovereignty.” Political Theory 40 (1):11622, 2012.Google Scholar
Schmitt, Carl. The Concept of the Political Translated by G. Schwab. Chicago: University of Chicago Press, 1996.Google Scholar
Schmitt, Carl. Political Theology: Four Chapters on the Concept of Sovereignty. Translated by G. Schwab. Chicago: University of Chicago Press, 2005.Google Scholar
Schmitt, Carl. The Nomos of the Earth in the International Law of the Jus Publicum Europaeum. Translated by G. L. Ulmen. New York: Telos Press Publishing, 2006.Google Scholar
Scott, James C. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press, 1998.Google Scholar
Scott, James C. The Art of Not Being Governed. New Haven: Yale University Press, 2009.Google Scholar
Scott, Sandra Faye. “Privacy Impact Assessment for the Global Enrollment System.” US Department of Homeland Security, 2006.Google Scholar
Shachar, Ayelet. The Birthright Lottery: Citizenship and Global Inequality. Cambridge, MA: Harvard University Press, 2009.Google Scholar
Silverberg, David. “10 Years After 9/11.” Homeland Security Today, September 8, 2011.Google Scholar
Soufan, Ali. “Opinion: Terrorists Cross Borders with Ease. It’s Vital That Intelligence Does Too.” The Guardian, March 24, 2016.Google Scholar
Sparke, Matthew. “A Neoliberal Nexus: Economy, Security and the Biopolitics of Citizenship on the Border.” Political Geography 25 (2):15180, 2006.Google Scholar
Spruyt, Hendrik. The Sovereign State and Its Competitors: An Analysis of Systems Change. Princeton: Princeton University Press, 1994.Google Scholar
Taylor, Charles. “The Politics of Recognition.” In Multiculturalism: Examining the Politics of Recognition, edited by Gutmann, Amy. Princeton: Princeton University Press, 1994.Google Scholar
Terrorist Screening Center: Frequently Asked Questions. 2012. Federal Bureau of Investigations, Terrorist Screening Center.Google Scholar
Torpey, John. The Invention of the Passport: Surveillance, Citizenship, and the State. Cambridge, UK: Cambridge University Press, 2000.Google Scholar
Triandafyllidou, Anna. “Governing Migrant Smuggling: A Criminality Approach Is Not Sufficient.” openDemocracy.net, April 6, 2016.Google Scholar
Tully, James. On Global Citizenship: James Tully in Dialogue. London, UK: Bloomsbury Academic, 2014.Google Scholar
US Department of Homeland Security Ensures Secure and Efficient Borders with Western Hemisphere Travel Initiative (WHTI): Case Study. 2009. Unisys.Google Scholar
Ugur, Mehmet. “Freedom of Movement vs. Exclusion: A Reinterpretation of the ‘Insider’-‘Outsider’ Divide in the European Union.International Migration Review 29 (4):96499, 1995.Google Scholar
van Houtum, Henk, and Strüver, Anke. “Borders, Strangers, Doors and Bridges.” Space and Polity 6 (2):1416, 2002.Google Scholar
Walker, Neil. “Beyond Boundary Disputes and Basic Grids: Mapping the Global Disorder of Normative Orders.” International Journal of Constitutional Law 6:37896, 2008.Google Scholar
Walkom, ThomasTrudeau Quietly Agrees to Share Info on Canadians with U.S.” The Star, March 13, 2016.Google Scholar
Walzer, Michael. “The Moral Standing of States.” Philosophy and Public Affairs 9:20929, 1980.Google Scholar
Walzer, Michael. Spheres of Justice: A Defense of Pluralism and Equality. New York: Basic Books, 1983.Google Scholar
Wells, H. G. The Future in America: A Search After Realities. Lexington, KY: Forgotten Books, 2014.Google Scholar
Wendt, Alexander. “Anarchy Is What States Make of It: The Social Construction of Power Politics.” International Organization 46, no. 2 (Spring 1992): 391425.Google Scholar
Whelan, Frederick G.Democratic Theory and the Boundary Problem.” In Liberal Democracy, edited by Pennock, J. R. and Chapman, J. W.. New York: New York University Press, 1983.Google Scholar
Williams, Bernard. In the Beginning Was the Deed. Princeton: Princeton University Press, 2005.Google Scholar
Wolin, Sheldon. “Fugitive Democracy.” In Democracy and Difference: Contesting the Boundaries of the Political, edited by Benhabib, Seyla, 3145. Princeton: Princeton University Press, 1996.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Matthew Longo, Universiteit Leiden
  • Book: The Politics of Borders
  • Online publication: 28 November 2017
  • Chapter DOI: https://doi.org/10.1017/9781316761663.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Matthew Longo, Universiteit Leiden
  • Book: The Politics of Borders
  • Online publication: 28 November 2017
  • Chapter DOI: https://doi.org/10.1017/9781316761663.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Matthew Longo, Universiteit Leiden
  • Book: The Politics of Borders
  • Online publication: 28 November 2017
  • Chapter DOI: https://doi.org/10.1017/9781316761663.011
Available formats
×