[1]
Balmer, A. 2015. Telling tales: some episodes from the multiple lives of the Polygraph machine. Knowledge technology and law. 104–118.
[2]
Cole, S.A. and Lynch, M. The Social and Legal Construction of Suspects. Annual Review of Law and Social Science. 2, 1, 39–60. DOI:https://doi.org/10.1146/annurev.lawsocsci.2.081805.110001.
[3]
Cole, S.A. and Lynch, M. The Social and Legal Construction of Suspects. Annual Review of Law and Social Science. 2, 1, 39–60. DOI:https://doi.org/10.1146/annurev.lawsocsci.2.081805.110001.
[4]
Collins, H. and Pinch, T. 2014. A clean kill? The role of Patriot in the Gulf War. The Golem at Large. Cambridge University Press. 7–29.
[5]
Edgerton, D. 2008. War. The shock of the old: technology and global history since 1900. Profile. 138–159.
[6]
Edwards, P.N. 1996. We defend every place: building the Cold War world. The closed world: computers and the politics of discourse in Cold War America. MIT Press.
[7]
Grint, K. and Woolgar, S. 1997. What’s social about being shot. The machine at work: technology, work, and organization. Polity Press. 140–168.
[8]
McLeish, C. and Nightingale, P. Biosecurity, bioterrorism and the governance of science: The increasing convergence of science and security policy. Research Policy. 36, 10, 1635–1654. DOI:https://doi.org/10.1016/j.respol.2007.10.003.
[9]
McLeish, C. and Nightingale, P. Biosecurity, bioterrorism and the governance of science: The increasing convergence of science and security policy. Research Policy. 36, 10, 1635–1654. DOI:https://doi.org/10.1016/j.respol.2007.10.003.
[10]
Neyland, D. 2009. Mundane terror and the threat of everyday objects. Technologies of inSecurity: the surveillance of everyday life. Routledge-Cavendish. 21–41.
[11]
Paglen, T. 2010. Goatsucker: toward a spatial theory of state secrecy. Environment and Planning D: Society and Space. 28, 5 (2010), 759–771. DOI:https://doi.org/10.1068/d5308.
[12]
Paglen, T. 2010. Goatsucker: toward a spatial theory of state secrecy. Environment and Planning D: Society and Space. 28, 5 (2010), 759–771. DOI:https://doi.org/10.1068/d5308.
[13]
Rappert, B. 2012. Disabling discourses: international law, legitimacy and the politics of balance. How to look good in a war: justifying and challenging state violence. Pluto.
[14]
Rappert, B. States of ignorance: the unmaking and remaking of death tolls. Economy and Society. 41, 1, 42–63. DOI:https://doi.org/10.1080/03085147.2011.637334.
[15]
Rappert, B. States of ignorance: the unmaking and remaking of death tolls. Economy and Society. 41, 1, 42–63. DOI:https://doi.org/10.1080/03085147.2011.637334.
[16]
Revill, J. and Edwards, B. 2015. What counts as the hostile use of chemicals? Absence in science, security and policy: from research agendas to global strategy. B. Rappert and B. Balmer, eds. Palgrave Macmillan. 157–179.
[17]
Roland, A. 2002. Science, Technology, and War. The Cambridge History of Science. M.J. Nye, ed. Cambridge University Press. 559–578.
[18]
Schmidt, K. The Trouble with ‘Tacit Knowledge’. Computer Supported Cooperative Work (CSCW). 21, 2–3, 163–225. DOI:https://doi.org/10.1007/s10606-012-9160-8.
[19]
Schmidt, K. The Trouble with ‘Tacit Knowledge’. Computer Supported Cooperative Work (CSCW). 21, 2–3, 163–225. DOI:https://doi.org/10.1007/s10606-012-9160-8.
[20]
Stone, J. 2007. Technology and the problem of civilian casualties in war. Technology and security: governing threats in the new millennium. Palgrave Macmillan. 133–151.
[21]
Thorpe, C. 2006. Power and vocation. Oppenheimer: the tragic intellect. University of Chicago Press. 160–199.
[22]
Thorpe, C. Violence and the Scientific Vocation. Theory, Culture & Society. 21, 3, 59–84. DOI:https://doi.org/10.1177/0263276404043620.
[23]
Thorpe, C. Violence and the Scientific Vocation. Theory, Culture & Society. 21, 3, 59–84. DOI:https://doi.org/10.1177/0263276404043620.
[24]
Vogel, K.M. Framing biosecurity: an alternative to the biotech revolution model? Science and Public Policy. 35, 1, 45–54. DOI:https://doi.org/10.3152/030234208X270513.
[25]
Vogel, K.M. Framing biosecurity: an alternative to the biotech revolution model? Science and Public Policy. 35, 1, 45–54. DOI:https://doi.org/10.3152/030234208X270513.
[26]
Wenger, A. and Wollenmann, R. 2007. Bioterrorism: Assessing a Complex Threat. Lynne Rienner Publishers.
[27]
Wenger, A. and Wollenmann, R. 2007. Bioterrorism: Assessing a Complex Threat. Lynne Rienner Publishers.