Skip to main content Accessibility help
×
Home
Hostname: page-component-7ccbd9845f-jxkh9 Total loading time: 0.178 Render date: 2023-02-01T23:46:58.418Z Has data issue: true Feature Flags: { "useRatesEcommerce": false } hasContentIssue true

Introduction

Published online by Cambridge University Press:  30 August 2016

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
ASR FORUM ON SURVEILLANCE IN AFRICA: POLITICS, HISTORIES, TECHNIQUES
Copyright
Copyright © African Studies Association 2016 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bayart, Jean-François. 2009. The State in Africa. 2nd edition. Malden, Mass: Polity Press.Google Scholar
Bozzini, David M. 2011. “Low-Tech Surveillance and the Despotic State in Eritrea.” Surveillance & Society 9 (1/2): 93113.Google Scholar
Breckenridge, Keith. 2014. Biometric State: The Global Politics of Identification and Surveillance in South Africa, 1850 to the Present. New York: Cambridge University Press.CrossRefGoogle Scholar
Breckenridge, Keith, and Szreter, Simon, eds. 2012. Registration and Recognition: Documenting the Person in World History. Oxford: Oxford University Press.CrossRefGoogle Scholar
Donovan, Kevin. 2015. “The Biometric Imaginary: Bureaucratic Technopolitics in Post-Apartheid Welfare.” Journal of Southern African Studies 41 (4): 815–33.CrossRefGoogle Scholar
Donovan, Kevin P., and Martin, Aaron K.. 2014. “The Rise of African SIM Registration: The Emerging Dynamics of Regulatory Change.” First Monday 19 (23). http://firstmonday.org/.CrossRefGoogle Scholar
Duncan, Jane. 2014. The Rise of the Securocrats: The Case of South Africa. Auckland Park, South Africa: Jacana Media.Google Scholar
Frowd, Philippe M. 2014. “The Field of Border Security in Mauritania.” Security Dialogue 45 (3): 226–41.CrossRefGoogle Scholar
Haggerty, Kevin D., and Ericson, Richard V.. 2000. “The Surveillant Assemblage.” The British Journal of Sociology 51 (4): 605–22.Google Scholar
Human Rights Watch. 2014. “They Know Everything We Do”: Telecom and Internet Surveillance in Ethiopia. New York: HRW.
Hosein, Gus, and Nyst, Carly. 2013. Aiding Surveillance: An Exploration of How Development and Humanitarian Aid Initiatives Are Enabling Surveillance in Developing Countries. London: Privacy International.Google Scholar
Minnaar, Anthony. 2007. “The Implementation and Impact of Crime Prevention / Crime Control Open Street Closed-Circuit Television Surveillance in South African Central Business Districts.” Surveillance & Society 4 (3).Google Scholar
Piombo, Jessica, ed. 2015. The US Military in Africa: Enhancing Security and Development? Boulder, Colo.: First Forum Press.Google Scholar
6
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Introduction
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

Introduction
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

Introduction
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *