Chan, Janet
,
David Brereton
,
Margot Legosz
and
Sally Doran
(2001) E-Policing: The Impact of Information Technology on
Police Practices.
Brisbane: Queensland Criminal Justice Commission
.
2.
Doyle, Aaron
(2003) Arresting Images: Crime and Policing in Front of the
Television Camera.
Toronto: University of Toronto Press
.
3.
Ericson, Richard V.
and
Kevin D. Haggerty
(1997) Policing the Risk Society.
Toronto: University of Toronto Press
&
Oxford: Oxford University Press
.
4.
Ericson, Richard V.
and
Clifford Shearing
(1986) ‘The Scientification of Police
Work’, in
G. B ö ohme
and
Nico Stehr
(eds) The Knowledge Society, pp.
129–159.
Dordrecht & Boston, MA: Reidel
.
5.
Haggerty, Kevin D.
(2003) ‘From Risk to Precaution: The
Rationalities of Personal Crime Prevention’, in
Richard V. Ericson
and
Aaron Doyle
(eds) Risk and Morality, pp.
193–214.
Toronto: University of Toronto Press
.
6.
Haggerty, Kevin D.
(2004)
‘Displaced Expertise: Three Constraints on the Policy Relevance
of Criminological Thought’
, Theoretical Criminology8(2):
211–231
.
7.
Haggerty, Kevin D.
and
Richard V. Ericson
(2000)
‘The Surveillant Assemblage’
, British Journal of Sociology51(4):
605–622
.
8.
Haggerty, Kevin D.
and
Richard V. Ericson
(2001) ‘The Military Technostructures of
Policing’, in
Peter Kraska
(ed.) Militarizing the American Criminal Justice System: The Changing
Roles of the Armed Forces and the Police, pp.
43–64.
Boston, MA: Northeastern University Press
.
9.
Innes, Martin
(2001)
‘Control Creep’
, Sociological Research Online6(3).
10.
Jacobson, Michael
(2004)
‘Reply to Kevin D. Haggerty’
, Theoretical Criminology8(2):
233–238
.
11.
Kessler, Ronald
(2003) The Bureau.
New York: St Martin’s
.
12.
Latour, Bruno
(1991) ‘Technology Is Society Made
Durable’, in
John Law
(ed.) A Sociology of Monsters, pp.
103–131.
London: Routledge
.
13.
Lyon, David
(2003) Surveillance after September 11.
London: Polity
.
14.
Manning, Peter K.
(1992) ‘Information Technologies and the
Police’, in
Michael Tonry
and
Norval Morris
(eds) Modern Policing, pp.
349–398.
Chicago, IL: University of Chicago Press
.
15.
Marx, Gary T.
(1995) ‘The Engineering of Social Control: The
Search for the Silver Bullet’, in
J. Hagan
and
R. Peterson
(eds) Crime and Inequality, pp.
225–246.
Stanford, CA: Stanford University Press
.
16.
Nunn, Samuel
(2003)
‘Seeking Tools for the War on Terror’
, Policing: An International Journal of Police Strategies and Management26(3):
454–472
.
17.
O’Malley, Pat
(1992)
‘Risk, Power and Crime Prevention’
, Economy and Society21(3):
252–275
.
18.
Perrow, Charles
(1984) Normal Accidents: Living with High-Risk
Technologies.
New York: Basic Books
.
19.
Privacy International
(2004) ‘Mistaken Identity: Exploring the
Relationship between National Identity Cards and the Prevention of
Terrorism’, p. 10-10. Interim report.
Available at http://www.privacyinternational.org/issues/idcard/uk/id-terrorism.pdf
20.
Sparrow, M.
,
M. Moore
and
D. Kennedy
(1990) Beyond 911: A New Era for Policing.
New York: Basic Books
.
21.
Whitaker, Reg
(1999) The End of Privacy: How Total Surveillance Is Becoming
a Reality.
New York: The New Press
.
22.
Winner, Langdon
(1986) ‘Do Artifacts Have
Politics?’, in The Whale and the Reactor: A Search for
Limits in the Age of High Technology, pp.
19–39.
Chicago, IL: University of Chicago Press
.
23.
Winner, Langdon
(1997)
‘Technology Today: Utopia or Dystopia’
, Social Research64(3):
989–1017
.