Affiliation:
1. Eastern Washington University, USA
Abstract
ICT-related initiatives have dominated the border security strategies of the United States and the European Union in recent years. One set of surveillance systems fortifies the borderline. Another set is creating new frontiers away from the traditional boundary. The objectives of this chapter are to provide a detailed mapping and critical assessment of this two-pronged approach. With respect to the assessment, two arguments are made. First, there are good reasons to believe the approach is not enabling the authorities to deter identified border threats. Second, the approach is contributing to a border management regime that is having an increasingly divergent impact on the mobility and life chances of different groups and populations. In conclusion, it is suggested the inefficacy of the approach is due to contradictions and blind spots embedded in policy maker’s approaches to security issues. Remarks are offered as to why US and EU decision makers emphasize the role of ICTs as they seek to reconstitute their respective borders.
Reference100 articles.
1. Discourses of identity and territoriality on the U.S.-Mexico border.;J.Ackleson;Geopolitics,1999
2. Border Security Technologies: Local and Regional Implications
3. Directions in border security research
4. Albahari, M. (2006). Death and the moral state: Making borders and sovereignty at the southern edges of Europe (Working Paper No. 136). University of California, San Diego: The Center for Comparative Immigration Studies.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献