2017
DOI: 10.1017/s0260210517000353
|View full text |Cite
|
Sign up to set email alerts
|

The chain of security

Abstract: Increasingly, private companies – including Twitter, airlines, and banks – find themselves in the frontline of fighting terrorism and other security threats, because they are obliged to mine and expel suspicious transactions. This analytical work of companies forms part of a chain, whereby transactions data are analysed, collected, reported, shared, and eventually deployed as a basis for intervention by police and prosecution. This article develops the notion of theChain of Securityin order to conceptualise th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(61 citation statements)
references
References 85 publications
0
60
0
1
Order By: Relevance
“…On an empirical level, the contributions demonstrate how STS allows scholars to identify and make visible security issues that are often not part of a traditional CSS research agenda (such as jellyfish!). On a methodological level, the collection highlights the value of object-driven research that bring us into contact with the multiple actors, devices and practices that constitute contemporary security policies (Amicelle, Aradau, and Jeandesboz 2015;de Goede 2018;Salter 2015Salter , 2016. In turn, these encounters require security scholars to embark upon a transdisciplinary path, where the exchange between STS and CSS may be just one step of many.…”
Section: Discussionmentioning
confidence: 99%
“…On an empirical level, the contributions demonstrate how STS allows scholars to identify and make visible security issues that are often not part of a traditional CSS research agenda (such as jellyfish!). On a methodological level, the collection highlights the value of object-driven research that bring us into contact with the multiple actors, devices and practices that constitute contemporary security policies (Amicelle, Aradau, and Jeandesboz 2015;de Goede 2018;Salter 2015Salter , 2016. In turn, these encounters require security scholars to embark upon a transdisciplinary path, where the exchange between STS and CSS may be just one step of many.…”
Section: Discussionmentioning
confidence: 99%
“…Operational risk management builds on a number of additional technological instruments that enable and support the comprehensive observation of all business activities. Apart from the managerial technology of systematically exposing business activities to rationalisation in terms of operational risk itself, screening technologies are the backbone of such risk management (De Goede 2018). Manual screening routines enshrined in KYC (‘know your client’) procedures and due diligence requirements subject transactions and client relationships to (operational) risk‐based information gathering and examination by bank personnel, including highly specialized compliance officers.…”
Section: Implementing Sanctions Extraterritorially: the Financial Systemmentioning
confidence: 99%
“…But the binary division has also attracted criticism. Some criticize the migrant/refugee divide for neglecting ‘internally displaced people’ (Cohen, 2007), for helping less to protect people than to sustain bureaucracy (Scalletaris, 2007) and for making migration sound opportunistic or even criminal (De Goede, 2018; Huysmans, 2006). Yet others ask whether this binary divide makes sense: in short, they note ‘there is no clear border between mobility that is forced or voluntary, driven by economic drives or by fear of persecution’ (Scheel & Squire, 2014) and that this is better understood as a continuum (Casas-Cortes et al, 2015).…”
Section: On Not Being Precise About Saudade (And Mobility!)mentioning
confidence: 99%