Logo

Navigation
  • Home
  • Blog
  • News
  • Reviews
  • About
  • Profiles
  • Documents
  • Contact

MappingSecurity.net aims at establishing an innovative interdisciplinary web-based platform for researchers engaged in the critical analysis of the practices and discourses of the actors involved in security issues (official representatives, private entrepreneurs, operators, engineers, experts, consultants, etc.). In particular, it aims at informing the nature, the features and rationale of these actors – and how they interact in a field of security, understood as a space of competition over the means to define the sources of our insecurity and to produce techniques to manage them.

MappingSecurity.net works as a collaborative platform that provides a virtual workspace for researchers to exchange and share information and reflection on security. This platform thus seeks well-informed contributions (theoretically and empirically) to discuss and debate how to map such a security field. Contributions can be submitted, for instance, on sociological approaches to the actors, to the framing of their discourses and practices; the extension of the market of security; the logic and effects of technologies and devices dedicated to security, control and protection;  the politics of security and their impacts on social cohesion, trust and political decision.

Sponsors

MappingSecurity.net is an extension of the research project HOSSET – Hot Spots of Security High Tech (2013-2014) funded by NESTA. MappingSecurity.net is supported by the Discipline Area of Politics at the University of Manchester and the research cluster Political Horizons.

Contributions

Please get in touch with us if you would like to contribute to our website!

Written blog posts: Blog posts are typically 700-1,500 words. MappingSecurity’s main focus is on the security debates and we welcome original content on the many concepts within this wide scope of issues. We don’t want to limit contributions to our own interests, so please get in touch with your new ideas.

Reviews: Reviews of academic articles are between 300 and 500 words. A review of a journal special issue is between 1,000 and 1,500 words. Reviews of books can be between 300 and 2,000 words.

If you contribute to our website MappingSecurity.net, you agree to our copyright restrictions, and terms and conditions. We ask that what you contribute be original content and thoroughly fact-checked. If it is written content, we strongly encourage you to include hyperlinks in the text as references to any sources. You are welcome to cross-post on other sites as long as you credit us as the original site of publication. Your contribution will be reviewed by the MappingSecurity.net editorial team and may be subject to edits before publication on our site. Please note that we cannot guarantee publication of all the great ideas we receive. Blog posts and reviews are published under a Creative Commons license. You are free to share (copy and redistribute the material in any medium or format) and to adapt (to remix, transform and build upon the material) as long as you credit MappingSecurity.net and license your new creations under identical terms. Once it is published, you will be welcome to share the content on your personal social media pages.

  • Popular
  • Recent
  • Comments
  • Electronic Frontier Foundation (EFF) – “Learning about security is not suspicious”

    July 5, 2014 - 2 Comments
  • Review: Bauman, Z. Bigo, D. et al. 2014. ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology

    June 9, 2014 - 2 Comments
  • Doing and Mediating Critique – Security Dialogue -Call for Abstract

    September 29, 2016 - 0 Comment
  • The Möbius strip of national and world security

    June 21, 2016 - 0 Comment
  • Electronic Frontier Foundation (EFF) – “Learning about security is not suspicious”

    Thank you for your comments. Yes you can share and please, do so!
    August 19, 2014 - Emmanuel-Pierre Guittet
  • Electronic Frontier Foundation (EFF) – “Learning about security is not suspicious”

    Jack Jordon This post is so good to read. Excellent!! Thank you very...
    August 18, 2014 - Jack Jordon

Links

  • Border Criminologies
  • Canada Research Chair in Security, Identity and Technology
  • Centre d’étude sur les Conflits
  • Centre International de Criminologie Comparée
  • Electronic Frontier Foundation (EFF)
  • Militainment and the National Security State
  • Nesta
  • Political Horizons
  • Privacy International
  • Security Politics
  • Security Praxis
  • SOURCE – Societal Security Network
  • Statewatch
  • The Politics of Systems
  • The STS & Surveillance Repository
  • Transparent Lives

Archives

  • September 2016
  • June 2016
  • January 2016
  • December 2015
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014

Details

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org

Tags

Afghanistan Blog Border control Canada CIA Conference Critical Security Studies Cyber DGSE Digital Rights Emergency Europe European Parliament Europol France GCHQ Insecurity INTCEN Inteligence Internet IRSEM Liberty Memoirs Methodology MJMCE News NSA Preemption Privacy Publication Risk Secrecy Security Snowden State Strategy Surveillance Technology Technophilia Technophobia Workshop Zombies
© 2014. All Rights Reserved.