Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Sewell, J. Barker (2006)
Coercion Versus Care: Using Irony to Make Sense of Organizational SurveillanceAcademy of Management Review, 31
Richard Moberly (2018)
Confidentiality and WhistleblowingLSN: Securities Law: U.S. (Topic)
Vasily Kuzin (1928)
What is Philosophy?Ideas and Ideals
D. Lyon (2007)
Surveillance Studies: An Overview
Keith Spiller, Imran Awan, A. Whiting (2018)
‘What does terrorism look like?’: university lecturers’ interpretations of their Prevent duties and tackling extremism in UK universitiesCritical Studies on Terrorism, 11
P. Thomas (2017)
Changing experiences of responsibilisation and contestation within Counter-Terrorism policies: The British Prevent experiencePolicy and Politics, 45
D. Garland (1996)
THE LIMITS OF THE SOVEREIGN STATE Strategies of Crime Control in Contemporary SocietyBritish Journal of Criminology, 36
Christopher Gad, P. Lauritsen (2009)
Situated Surveillance: an ethnographic study of fisheries inspection in Denmarksurveillance and society, 7
Jamie Grace (2018)
Countering extremism and recording dissent: intelligence analysis and the Prevent agenda in UK Higher Education, 2
G. Marx (2002)
What's New About the "New Surveillance"? Classifying for Change and Continuity.surveillance and society, 1
(2001)
The Enchantment of Modern Life
P. Hert (2005)
Balancing security and liberty within the European human rights framework. A critical reading of the Court’s case law in the light of surveillance and criminal law enforcement strategies after 9/11Utrecht law review, 1
A. Canhoto, J. Backhouse (2007)
Profiling under conditions of ambiguity—An application in the financial services industryJournal of Retailing and Consumer Services, 14
M. McGovern, A. Tobin (2010)
Countering Terror or Counter-Productive: Comparing Irish and British Muslim Experiences of Counter-insurgency Law and Policy
Sally Elton-Chalcraft, V. Lander, L. Revell, Diane Warner, Linda Whitworth (2017)
To promote, or not to promote fundamental British values? Teachers’ standards, diversity and teacher educationBritish Educational Research Journal, 43
D. Malleck (2011)
Scott Thompson and Gary Genosko.Punched Drunk: Alcohol, Surveillance and the LCBO, 1927–1975. Black Point, NS: Fernwood, 2010., 25
M. McGovern (2016)
The university, Prevent and cultures of compliancePrometheus, 34
V. Chouinard (1997)
STRUCTURE AND AGENCY: CONTESTED CONCEPTS IN HUMAN GEOGRAPHYCanadian Geographer, 41
J. Huysmans (2011)
What’s in an act? On security speech acts and little security nothingsSecurity Dialogue, 42
P. Bourdieu (1985)
Distinction: A Social Critique of the Judgement of Taste*Food and Culture
K. Dowding (2008)
Agency and structure: Interpreting power relationshipsJournal of Power, 1
B. Schutt (1970)
Sorting things out.The American journal of nursing, 70 8
T. Stanley, Surinder Guru, Anna Gupta (2018)
Working with PREVENT: Social Work Options for Cases of ‘Radicalisation Risk’Practice, 30
Lou Dear (2018)
The University as Border ControlThe International Education Journal: Comparative Perspectives, 17
Michalis Lianos (2002)
Social Control After Foucault / Le Contrôle Social après Foucault.surveillance and society, 1
William Vlcek (2007)
Surveillance to Combat Terrorist Financing in Europe: Whose Liberty, Whose Security?European Security, 16
P. Adey (2012)
Borders, identification and surveillance
K. Haggerty, R. Ericson (2000)
The surveillant assemblage.The British journal of sociology, 51 4
Jane Bennett (2001)
The Enchantment of Modern Life: Attachments, Crossings, and Ethics
C. Peach (1999)
London and New York: contrasts in British and American models of segregation with a comment by Nathan GlazerInternational Journal of Population Geography, 5
M. Dodge, Rob Kitchin (2005)
Codes of Life: Identification Codes and the Machine-Readable WorldEnvironment and Planning D: Society and Space, 23
S. Graham (2005)
Software-sorted geographiesProgress in Human Geography, 29
D. Lyon (2001)
Surveillance society: Monitoring Everyday Life
K. Ball, E. Daniel, S. Dibb, M. Meadows, Keith Spiller, A. Canhoto (2015)
The Private Security State?: Surveillance, Consumer data and the War on Terror
G. Deleuze (2017)
Postscript on the Societies of Control
A. Giddens (2012)
The Third Way
K. Ball (2002)
Elements of surveillance: A new framework and future directionsInformation, Communication & Society, 5
A. White (2012)
The new political economy of private securityTheoretical Criminology, 16
G. Bowker, S. Star (1999)
Sorting Things Out: Classification and Its Consequences
O. Gandy (2010)
Engaging rational discrimination: exploring reasons for placing regulatory constraints on decision support systemsEthics and Information Technology, 12
W. Webster (2009)
CCTV policy in the UK: Reconsidering the evidence basesurveillance and society, 6
H. Mirza, V. Meetoo (2012)
Respecting Difference: Race, Faith and Culture for Teacher Educators
B. Goold, I. Loader, Angélica Thumala (2010)
Consuming security?Theoretical Criminology, 14
John Gilliom (2001)
Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy
Charlotte Heath-Kelly (2013)
Counter-Terrorism and the Counterfactual: Producing the ‘Radicalisation’ Discourse and the UK PREVENT StrategyThe British Journal of Politics and International Relations, 15
D. Lyon (2002)
Everyday Surveillance: Personal data and social classificationsInformation, Communication & Society, 5
S. Garner (2012)
A moral economy of whiteness: Behaviours, belonging and BritishnessEthnicities, 12
Alice Marwick (2012)
The Public Domain: Surveillance in Everyday Lifesurveillance and society, 9
Dean Wilson (2006)
Biometrics, borders and the ideal suspect
Hans Hasselbladh, J. Kallinikos (2000)
The Project of Rationalization: A Critique and Reappraisal of Neo-Institutionalism in Organization StudiesOrganization Studies, 21
B. Latour (1993)
Aramis, or the Love of Technology
M. Levi, D. Wall (2004)
Technologies, Security, and Privacy in the Post-9/11 European Information SocietyJournal of Law and Society, 31
Christer Mattsson, R. Säljö (2018)
Violent Extremism, National Security and Prevention. Institutional Discourses and their Implications for SchoolingBritish Journal of Educational Studies, 66
D. Kagiaros (2015)
Protecting ‘national security’ whistleblowers in the Council of Europe: an evaluation of three approaches on how to balance national security with freedom of expressionThe International Journal of Human Rights, 19
E. Zureik, K. Hindle (2004)
Governance, Security and Technology: the Case of BiometricsStudies in Political Economy, 73
Claudia Aradau, Rens Munster (2007)
Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the FutureEuropean Journal of International Relations, 13
Z. Bauman, D. Lyon (2012)
Liquid Surveillance: A Conversation
Jeremy Waldron (2003)
Security and Liberty: The Image of Balance*Journal of Political Philosophy, 11
R. Ericson, K. Haggerty (1997)
Policing the Risk Society
[This chapter discusses monitoring and the surveillance techniques and theoretical approaches that have been used to examine the process. Our focus is the actualisation of the Prevent Strategy, in itself a form of monitoring and surveillance, where those in authority record the activities of students and make decisions on their interpretations of the ‘risk’ credential of their students. Furthermore, the widespread application of monitoring and surveillance techniques has been posited to cause a number of socially dangerous consequences which stem from its ability to discriminate between different population groups within its multifarious domains of application (see Gandy, Ethics Inf Technol 12(1): 29–42, 2010). Surveillance, per se, can be understood as an organising principle which relies on the observation of a domain, and the data resulting from that observation is then used to enable regulation, governance, or management (Lyon, Surveillance society: monitoring everyday life. Open University Press, Buckingham, 2001: 2). The Prevent Strategy gives rise, reason, and authority to, how, as we argue, institutions such as universities monitor their charges and perform roles of surveillance by monitoring students for evidence of radicalisation or terrorist intent. We do, however, remain attentive to the necessary workings of monitoring; for instance, private sector and governing authorities at all levels of scale rely on surveillant techniques to control the risks associated with their activities. The chapter offers an overview of the theoretical underpinnings of monitoring and the agendas that inform the Prevent Strategy applied in an educational context; as the chapter progresses, we discuss concepts of bureaucracy and technology, risk control, and responsibilisation in furthering our thoughts.]
Published: Nov 30, 2018
Keywords: Surveillance; Monitoring; Consequences; Theoretical approach; Universities
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.