CI Studies Bibliography – Mission Critical

By tags: Affordance theory | Animals | Architecture | Art and aesthetics | Borders and migration | Business & industry | City and urban studies | Cloud | Cyberinfrastructure for research | Data infrastructures | Development | Digital humanities | Disability & accessibility | Disaster | EconomicsEnergy | Environment | Ethnographical approaches | Feminist | Fiction | Higher educationInformation & IT | Institutional | Internet (& ICT) | Labor & work | Landscape | Large technical systems | Library, museum, and archive | LogisticsMaterials | Media infrastructures | MilitaryMinimal computing | Mining, oil, & extractionMission critical | Object & thing studiesOrganizationalPhotography | Platform studies | Poetry | PolicyPostcolonial & colonial | Race and ethnicity | Repair & care | Scientific research infrastructure | Security | Small technical systemsSocial justice | STS (science technology studies) | TelecommunicationsTransportationWaste, garbage, sewage | Water
ToC rev. 29 May 2022

Hurley, Jessica. Infrastructures of Apocalypse: American Literature and the Nuclear Complex. Minneapolis: University of Minnesota Press, 2020. https://www.upress.umn.edu/book-division/books/infrastructures-of-apocalypse. Cite
Aradau, Claudia. “Security That Matters: Critical Infrastructure and Objects of Protection.” Security Dialogue 41, no. 5 (2010): 491–514. https://doi.org/10.1177/0967010610382687. Cite
Coward, Martin. “Network-Centric Violence, Critical Infrastructure and the Urbanization of Security.” Security Dialogue 40, no. 4–5 (2009): 399–418. https://doi.org/10.1177/0967010609342879. Cite
Cavelty, Myriam Dunn. “Like a Phoenix from the Ashes:  The Reinvention of Critical Infrastructure Protection as Distributed Security.” In Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security, 40–62. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Collier, Stephen J., and Andrew Lakoff. “The Vulnerability of Vital Systems: How ‘Critical Infrastructure’ Became a Security Problem.” In Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security, 17–39. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Cavelty, Myriam Dunn, and Kristian Søby Kristensen. “Introduction: Securing ‘the Homeland’: Critical Infrastructure, Risk and (in)Security.” In Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security, 1–12. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Cavelty, Myriam Dunn, and Kristian Søby Kristensen, eds. Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Collier, Stephen J, and Andrew Lakoff. “Distributed Preparedness: The Spatial Logic of Domestic Security in the United States.” Environment and Planning D: Society and Space 26, no. 1 (2008): 7–28. https://doi.org/10.1068/d446t. Cite
Der Derian, James, and Jesse Finkelstein. “Critical Infrastructures and Network Pathologies: The Semiotics and Biopolitics of Heteropolarity.” In Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security, 84–105. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Kristensen, Kristian Søby. “‘The Absolute Protection of Our Citizens’: Critical Infrastructure Protection and the Practice of Security.” In Securing “the Homeland”: Critical Infrastructure, Risk and (in)Security, 63–83. CSS Studies in Security and International Relations. London ; New York: Routledge, 2008. https://www.researchgate.net/profile/Myriam_Dunn_Cavelty/publication/277714738_Securing_the_Homeland_Critical_Infrastructure_Risk_and_InSecurity/links/55cc5b6108aeb975674c883d/Securing-the-Homeland-Critical-Infrastructure-Risk-and-InSecurity.pdf. Cite
Neuman, Michael. “Infiltrating Infrastructures: On the Nature of Networked Infrastructure.” Journal of Urban Technology 13, no. 1 (2006): 3–31. https://doi.org/10.1080/10630730600752728. Cite
Rochlin, Gene I. Trapped in the Net: The Unanticipated Consequences of Computerization. Princeton: Princeton University Press, 1998. https://press.princeton.edu/titles/6040.html. Cite

css.php