Hostname: page-component-586b7cd67f-vdxz6 Total loading time: 0 Render date: 2024-11-23T08:13:12.706Z Has data issue: false hasContentIssue false

Introduction

Published online by Cambridge University Press:  30 August 2016

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
ASR FORUM ON SURVEILLANCE IN AFRICA: POLITICS, HISTORIES, TECHNIQUES
Copyright
Copyright © African Studies Association 2016 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bayart, Jean-François. 2009. The State in Africa. 2nd edition. Malden, Mass: Polity Press.Google Scholar
Bozzini, David M. 2011. “Low-Tech Surveillance and the Despotic State in Eritrea.” Surveillance & Society 9 (1/2): 93113.Google Scholar
Breckenridge, Keith. 2014. Biometric State: The Global Politics of Identification and Surveillance in South Africa, 1850 to the Present. New York: Cambridge University Press.Google Scholar
Breckenridge, Keith, and Szreter, Simon, eds. 2012. Registration and Recognition: Documenting the Person in World History. Oxford: Oxford University Press.Google Scholar
Donovan, Kevin. 2015. “The Biometric Imaginary: Bureaucratic Technopolitics in Post-Apartheid Welfare.” Journal of Southern African Studies 41 (4): 815–33.Google Scholar
Donovan, Kevin P., and Martin, Aaron K.. 2014. “The Rise of African SIM Registration: The Emerging Dynamics of Regulatory Change.” First Monday 19 (23). http://firstmonday.org/.Google Scholar
Duncan, Jane. 2014. The Rise of the Securocrats: The Case of South Africa. Auckland Park, South Africa: Jacana Media.Google Scholar
Frowd, Philippe M. 2014. “The Field of Border Security in Mauritania.” Security Dialogue 45 (3): 226–41.CrossRefGoogle Scholar
Haggerty, Kevin D., and Ericson, Richard V.. 2000. “The Surveillant Assemblage.” The British Journal of Sociology 51 (4): 605–22.Google Scholar
Human Rights Watch. 2014. “They Know Everything We Do”: Telecom and Internet Surveillance in Ethiopia. New York: HRW.Google Scholar
Hosein, Gus, and Nyst, Carly. 2013. Aiding Surveillance: An Exploration of How Development and Humanitarian Aid Initiatives Are Enabling Surveillance in Developing Countries. London: Privacy International.Google Scholar
Minnaar, Anthony. 2007. “The Implementation and Impact of Crime Prevention / Crime Control Open Street Closed-Circuit Television Surveillance in South African Central Business Districts.” Surveillance & Society 4 (3).Google Scholar
Piombo, Jessica, ed. 2015. The US Military in Africa: Enhancing Security and Development? Boulder, Colo.: First Forum Press.Google Scholar