{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA88121295.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA88121295#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA88121295.json"},"dc:title":[{"@value":"Technologies of inSecurity : the surveillance of everyday life"}],"dcterms:alternative":["Technologies of insecurity","Technologies of in security"],"dc:creator":"edited by Katja Franko Aas, Helene Oppen Gundhus and Heidi Mork Lomell","dc:publisher":[{"@value":"Routledge-Cavendish"}],"dcterms:extent":"xi, 279 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2009","cinii:ncid":"BA88121295","cinii:ownerCount":"8","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA1608230X#entity","@type":"foaf:Person","foaf:name":[{"@value":"Aas, Katja Franko"}]},{"@id":"https://ci.nii.ac.jp/author/DA16417827#entity","@type":"foaf:Person","foaf:name":[{"@value":"Gundhus, Helene Oppen"}]},{"@id":"https://ci.nii.ac.jp/author/DA16417838#entity","@type":"foaf:Person","foaf:name":[{"@value":"Lomell, Heidi Mork"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002655","@type":"foaf:Organization","foaf:name":"京都大学 法学部 図書室","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA002848","@type":"foaf:Organization","foaf:name":"大阪大学 附属図書館 総合図書館","rdfs:seeAlso":{"@id":"https://opac.library.osaka-u.ac.jp/opac/opac_openurl/?ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA003024","@type":"foaf:Organization","foaf:name":"神戸大学 附属図書館 人間科学図書館","rdfs:seeAlso":{"@id":"https://op.lib.kobe-u.ac.jp/opac/opac_openurl/?rfe_dat=ncid/BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA003454","@type":"foaf:Organization","foaf:name":"九州大学 中央図書館","rdfs:seeAlso":{"@id":"https://catalog.lib.kyushu-u.ac.jp/opac_openurl/?ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA005267","@type":"foaf:Organization","foaf:name":"国際基督教大学 図書館","rdfs:seeAlso":{"@id":"https://opac.icu.ac.jp/opac/opac_openurl?ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA006678","@type":"foaf:Organization","foaf:name":"明治大学 図書館","rdfs:seeAlso":{"@id":"https://opac2018.lib.meiji.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA006758","@type":"foaf:Organization","foaf:name":"立教大学 図書館","rdfs:seeAlso":{"@id":"https://opac.rikkyo.ac.jp/opac/opac_openurl/?ncid=BA88121295"}},{"@id":"https://ci.nii.ac.jp/library/FA01517X","@type":"foaf:Organization","foaf:name":"目白大学 新宿図書館","rdfs:seeAlso":{"@id":"https://toshokan.mejiro.ac.jp/opac/opac_search/?lang=0&amode=2&appname=Netscape&version=5&cmode=0&smode=0&kywd=BA88121295"}}],"bibo:lccn":["2008009468"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2008009468"}],"prism:publicationDate":["2009"],"cinii:note":["\"A GlassHouse book\"","Includes bibliographical references and index"],"dc:subject":["LCC:HV6419","DC22:621.389/28"],"cinii:contentOfWorks":["Mundane terror and the threat of everyday objects / Daniel Neyland","Identification practices : state formation, crime control, colonialism and war / David Lyon","Spatial articulations of surveillance at the FIFA World Cup 2006TM in Germany / Francisco R. Klauser","Checkpoint security : gateways, airports, and the architecture of security / Richard Jones","24/7/365 : mobility, locatability and the satellite tracking of offenders / Mike Nellis","Empowered watchers or disempowered workers? : the ambiguities of power within technologies of security / Gavin John Douglas Smith","Hijacking surveillance? : the new moral landscapes of amateur photographing / Hille Koskela","The role of the internet in the twenty-first-century prison : insecure technologies in secure spaces / Yvonne Jewkes","Computer crime control as industry : virtual insecurity and the market for private policing / Majid Yar","Technologies of surveillance and the erosion of institutional trust / Benjamin Goold","Another side of the story : defence lawyers' views on DNA evidence / Johanne Yttri Dahl","'Catastrophic moral horror' : torture, terror and rights / Vidar Halvorsen","Epilogue : the inescapable insecurity of security technologies? / Lucia Zedner"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Internal+security","dc:title":"Internal security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Security+systems","dc:title":"Security systems"},{"@id":"https://ci.nii.ac.jp/books/search?q=Security+%28Psychology%29","dc:title":"Security (Psychology)"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780415464550"},{"@id":"urn:isbn:9780415599795","dc:title":": pbk"}]}]}