In lieu of an abstract, here is a brief excerpt of the content:

Bibliography 177 Accent Marketing and Research. “Town Centres Survey 2003–4: Summary Report.” London, 2004. Adey, Peter. “‘Divided We Move’: The Dromologics of Airport Security and Surveillance .”In Surveillance and Security:Technological Politics and Power in Everyday Life,edited by Torin Monahan, 195–208. NewYork: Routledge, 2006. Adler, Patricia A., and Peter Adler.“The Deviance Society.” Deviant Behavior 27 (2006): 129–148. Agamben, Giorgio. Homo Sacer: Sovereign Power and Bare Life. Stanford, CA: Stanford University Press, 1998. ———. State of Exception. Chicago: University of Chicago Press, 2005. Agnew, John.“Religion and Geopolitics.” Geopolitics 11 (2006): 183–191. Agre, Philip E.“Surveillance and Capture:Two Models of Privacy.” The Information Society 10 (1994): 101–127. Akrich, Madeleine.“The De-Scription of Technological Objects.” In ShapingTechnology / Building Society: Studies in Sociotechnical Change, edited by Wiebe E. Bijker and John Law. Cambridge, MA: MIT Press, 1992. ———.“User Representations: Practices, Methods and Sociology.” In ManagingTechnology in Society: The Approach of Constructive Technology Assessment, edited by A. Rip, T. J. Misa, and J. Schot, 167–184. London: Pinter, 1995. Allison, Stuart F. H.,Amie M. Schuck, and Kim Michelle Lersch.“Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, andVictim/Offender Characteristics.” Journal of Criminal Justice 33 (2005): 19–29. Altheide, David L. Creating Fear: News and the Construction of Crisis. NewYork:Aldine de Gruyter, 2002. ———. Terrorism and the Politics of Fear. Lanham, MD:Altamira Press, 2006. Andreas, Peter.“Redrawing the Line: Borders and Security in theTwenty-first Century.” International Security 28, no. 2 (2003): 78–111. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas, 2007. Anthony, Jerry.“Family Self-sufficiency Programs:An Evaluation of Program Benefits and Factors Affecting Participants’ Success.” Urban Affairs Review 41, no. 1 (2005): 65–92. Appadurai, Arjun. Fear of Small Numbers: An Essay on the Geography of Anger. Durham, NC: Duke University Press, 2006. Associated Press.“ID Chips Not Just for Pets Anymore.” CNN.com, February 13, 2006. http://www.cnn.com/2006/TECH/02/13/security.chips.ap/index.html (accessed July 14, 2007). Austrin,Terry, and Jackie West.“Skills and Surveillance in Casino Gaming:Work, Consumption and Regulation.” Work, Employment & Society 19, no. 2 (2005): 305–326. Bajc,Vida.“Introduction: Debating Surveillance in the Age of Security.” American Behavioral Scientist 50, no. 12 (2007): 1567–1591. Ball, Kirstie S.“Exposure: Exploring the Subject of Surveillance Information.” Communication and Society 12, no. 5 (2009): 639–657. Ball, Kirstie, and Frank Webster, eds. The Intensification of Surveillance: Crime,Terrorism and Warfare in the Information Age. Sterling,VA: Pluto Press, 2003. Balsamo, Anne. Technologies of the Gendered Body. Durham, NC: Duke University Press, 1996. Barrett, David B.“A Century of Growth.” ChristianityToday, November 1998, 50–51. Barstow, David. “A.T.M. Cards Fail to Live Up to Promises to Poor.” New York Times, August 16, 1999. http://www.nytimes.com/library/politics/081699ny-welfare -atm.html (accessed July 3, 2009). Bartholomew, Richard.“Religious Mission and Business Reality:Trends in the Contemporary British Christian Book Industry.” Journal of Contemporary Religion 20, no. 1 (2005): 41–54. Bauman, Zygmunt. Community: Seeking Safety in an InsecureWorld. Cambridge, UK: Polity Press, 2001. ———. Globalization:The Human Consequences. New York: Columbia University Press, 1998. Bayard deVolo, Lorraine.“Service and Surveillance: Infrapolitics at Work among Casino Cocktail Waitresses.” Social Politics 10, no. 3 (2003): 347–376. BBC News. “Obama Orders Guantanamo Closure.” BBC News, January 22, 2009. http://news.bbc.co.uk/2/hi/americas/7845585.stm (accessed March 3, 2009). ———.“Oyster Data Is ‘New Police Tool.’” BBC News, March 13, 2006. http://news .bbc.co.uk/1/hi/england/london/4800490.stm (accessed July 3, 2009). Beck, Ulrich.“From Industrial Society to the Risk Society: Questions of Survival, Social Structure and Ecological Enlightenment.” Theory, Culture & Society 9 (1992): 97–123. ———.“TheTerroristThreat:World Risk Society Revisited.” Theory, Culture & Society 19, no. 4 (2002): 39–55. Bennett, Colin, Charles Raab, and Priscilla Regan.“People and Place: Patterns of Individual Identification within Intelligent Transportation Systems.” In Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, edited by David Lyon, 153–175. NewYork: Routledge, 2003. Bennett, Colin J. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge, MA: MIT Press, 2008. Bible: King James Version. http://www.hti.umich.edu/k/kjv/ (accessed December 16, 2006). Bijker,Wiebe E.,Thomas Hughes, and Trevor Pinch, ed. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. Cambridge, MA: MIT Press, 1987. Bijker,Wiebe E., and John Law. Shaping...

Share