References

Abbott, Owen, Peter Jones, and Martin Ralphs. 2015. “Large-Scale Linkage for Total Populations in Official Statistics.” In Methodological Developments in Data Linkage, 170–200. Chichester: John Wiley & Sons, Ltd. https://doi.org/10.1002/9781119072454.ch8.

About, Ilsen, James Brown, and Gayle Lonergan, eds. 2013a. Identification and Registration Practices in Transnational Perspective. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

———. 2013b. “Introduction.” In Identification and Registration Practices in Transnational Perspective, 1–13. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

Accenture. 2010. “Unique Identification Authority of India (UIDAI) Selects Accenture to Implement a Multimodal Biometric Solution for ‘Aadhaar’ Program.” Press Release. Accenture Newsroom. https://web.archive.org/web/20220812203854/https://newsroom.accenture.com/article_display.cfm?article_id=5040.

———. 2012. “European Commission Selects Consortium of Accenture, Morpho and HP to Maintain EU Visa Information and Biometric Matching Systems.” Press Release. https://web.archive.org/web/20201206154800/https://newsroom.accenture.com/subjects/client-winsnew-contracts/european-commission-chooses-consortium-of-accenture-morpho-and-hp-to-maintain-eu-visa-information-and-biometric-matching-systems.htm.

———. 2015. “United Nations High Commissioner for Refugees and Accenture Deliver Global Biometric Identity Management System to Aid Displaced Persons.” Press Release. https://web.archive.org/web/20221203234022/https://newsroom.accenture.com/news/united-nations-high-commissioner-for-refugees-and-accenture-deliver-global-biometric-identity-management-system-to-aid-displaced-persons.htm.

Adler, Emanuel. 1997. “Seizing the Middle Ground: Constructivism in World Politics.” European Journal of International Relations 3 (3): 319–63. https://doi.org/10.1177/1354066197003003003.

Ajana, Btihaj. 2013. “Asylum, Identity Management and Biometric Control.” Journal of Refugee Studies 26 (4): 576–95. https://doi.org/10.1093/jrs/fet030.

Akrich, Madeleine. 1992. “The de-Scription of Technical Objects.” In Shaping Technology/Building Society: Studies in Sociotechnical Change, edited by Wiebe E. Bijker and John Law, 205–24. Inside Technology. Cambridge, Mass.: The MIT Press.

Akrich, Madeleine, and Bruno Latour. 1992. “A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies.” In Shaping Technology/Building Society: Studies in Sociotechnical Change, edited by W. E. Bijker and John Law, 259–64. Cambridge, Mass.: The MIT Press.

Amelung, Nina. 2021. “‘Crimmigration Control’ Across Borders: The Convergence of Migration and Crime Control Through Transnational Biometric Databases.” Historical Social Research 46 (3): 151–77. https://doi.org/10.12759/HSR.46.2021.3.151-177.

Amicelle, Anthony, Claudia Aradau, and Julien Jeandesboz. 2015. “Questioning Security Devices: Performativity, Resistance, Politics.” Security Dialogue 46 (4): 293–306. https://doi.org/10.1177/0967010615586964.

Amoore, Louise. 2006. “Biometric Borders: Governing Mobilities in the War on Terror.” Political Geography 25 (3): 336–51. https://doi.org/10.1016/j.polgeo.2006.02.001.

———. 2013. The Politics of Possibility: Risk and Security Beyond Probability. Duke University Press.

Amoore, Louise, and Marieke de Goede. 2005. “Governance, Risk and Dataveillance in the War on Terror.” Crime, Law and Social Change 43 (2-3): 149–73. https://doi.org/10.1007/s10611-005-1717-8.

Aradau, Claudia. 2012. “Infrastructure.” In Research Methods in Critical Security Studies: An Introduction, edited by Mark B. Salter and Can E. Mutlu, 181–85. London & New York: Routledge.

———. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7 (4): 388–413. https://doi.org/10.1057/palgrave.jird.1800030.

Aradau, Claudia, and Tobias Blanke. 2021. “Algorithmic Surveillance and the Political Life of Error.” Journal for the History of Knowledge 2 (1): 1–13. https://doi.org/10.5334/jhk.42.

———. 2022. Algorithmic Reason: The New Government of Self and Other. Oxford, UK: Oxford University Press. https://doi.org/10.1093/oso/9780192859624.001.0001.

Aradau, Claudia, and Jef Huysmans. 2014. “Critical Methods in International Relations: The Politics of Techniques, Devices and Acts.” European Journal of International Relations 20 (3): 596–619. https://doi.org/10.1177/1354066112474479.

Baird, Theodore. 2017. “Knowledge of Practice: A Multi-Sited Event Ethnography of Border Security Fairs in Europe and North America.” Security Dialogue 48 (3): 187–205. https://doi.org/10.1177/0967010617691656.

Balzacq, Thierry. 2009. “Constructivism and Securitization Studies.” In The Routledge Handbook of Security Studies, edited by Myriam Dunn Cavelty and Victor Mauer, 56–72. London: Routledge. https://doi.org/10.4324/9780203866764.

———. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 171–201. https://doi.org/10.1177/1354066105052960.

Balzacq, Thierry, Tugba Basaran, Didier Bigo, Emmanuel-Pierre Guittet, and Christian Olson. 2010. “Security Practices.” In Oxford Research Encyclopedia of International Studies. Oxford: Wiley Blackwell.

Basis Technology. 2012. “Understanding Dari and Pashto Names: A Challenge to Intelligence Gathering in Afghanistan.” Rosette Text Analytics: NLP Blog. https://web.archive.org/web/20230605072915/https://www.rosette.com/blog/understanding-dari-and-pashto-names-a-challenge-to-intelligence-gathering-in-afghanistan/.

———. 2021. “Strengthening U.S. Borders with Intelligent Name Matching.” Rosette Text Analytics: Case Studies. https://web.archive.org/web/20211105135209/https://www.rosette.com/case-studies/us-customs-border-protection/.

Bates, Jo. 2017. “The Politics of Data Friction.” Journal of Documentation 74 (2): 412–29. https://doi.org/10.1108/JD-05-2017-0080.

Batini, Carlo, and Monica Scannapieco. 2016. “Object Identification.” In Data and Information Quality: Dimensions, Principles and Techniques, edited by Carlo Batini and Monica Scannapieco, 177–215. Data-Centric Systems and Applications. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-24106-7_8.

Bellahsene, Zohra, Angela Bonifati, and Erhard Rahm, eds. 2011. Schema Matching and Mapping. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-16518-4.

Bellanova, Rocco, and Denis Duez. 2012. “A Different View on the ‘Making’ of European Security: The EU Passenger Name Record System as a Socio-Technical Assemblage.” European Foreign Affairs Review 17 (SI). https://doi.org/10.54648/eerr2012017.

Bellanova, Rocco, and Georgios Glouftsios. 2022. “Controlling the Schengen Information System (SIS II): The Infrastructural Politics of Fragility and Maintenance.” Geopolitics 27 (1): 160–84. https://doi.org/10.1080/14650045.2020.1830765.

Bellanova, Rocco, and Marieke de Goede. 2022. “The Algorithmic Regulation of Security: An Infrastructural Perspective.” Regulation & Governance 16 (1): 102–18. https://doi.org/10.1111/rego.12338.

Benjamin, Robert, and Rolf Wigand. 1995. “Electronic Markets and Virtual Value Chains on the Information Superhighway.” MIT Sloan Management Review, January. https://sloanreview.mit.edu/article/electronic-markets-and-virtual-value-chains-on-the-information-superhighway/.

Benjamin, Ruha. 2019. Race After Technology: Abolitionist Tools for the New Jim Code. Cambridge, UK: Polity.

Benson, Michaela, and Karen O’Reilly. 2009. “Migration and the Search for a Better Way of Life: A Critical Exploration of Lifestyle Migration.” The Sociological Review 57 (4): 608–25. https://doi.org/10.1111/j.1467-954X.2009.01864.x.

Beraldo, Davide, and Stefania Milan. 2019. “From Data Politics to the Contentious Politics of Data.” Big Data & Society 6 (2): 1–11. https://doi.org/10.1177/2053951719885967.

Bergsma, Bouke. 2013. “Systeem IND duurder en trager ingevoerd.” Algemeen Nederlands Persbureau ANP, November. https://web.archive.org/web/20201013120039/https://www.nu.nl/binnenland/3628805/systeem-ind-duurder-en-trager-ingevoerd.html.

Bertrand, Sarah. 2018. “Can the Subaltern Securitize? Postcolonial Perspectives on Securitization Theory and Its Critics.” European Journal of International Security 3 (3): 281–99. https://doi.org/10.1017/eis.2018.3.

Betlem, Rutger. 2011. “Utrechtse datatechnologie moet terroristen buiten de VS houden.” Het Financieele Dagblad, December.

Bigo, Didier. 2014. “The (in)Securitization Practices of the Three Universes of EU Border Control: Military/Navy – Border Guards/Police – Database Analysts.” Security Dialogue 45 (3): 209–25. https://doi.org/10.1177/0967010614530459.

Bigo, Didier, Sergio Carrera, Ben Hayes, Nicholas Hernanz, and Julien Jeandesboz. 2012. Justice and Home Affairs Databases and a Smart Borders System at EU External Borders: An Evaluation of Current and Forthcoming Proposals. Brussels: Centre for European Policy Studies. https://www.ceps.eu/ceps-publications/justice-and-home-affairs-databases-and-smart-borders-system-eu-external-borders/.

Bijker, Wiebe E. 1993. “Do Not Despair: There Is Life After Constructivism.” Science, Technology, & Human Values 18 (1): 113–38. https://doi.org/10.1177/016224399301800107.

Bijker, Wiebe E., Thomas Parke Hughes, and Trevor Pinch, eds. 2012. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. Anniversary ed. Cambridge, Mass: MIT Press.

Bijker, Wiebe E., and John Law, eds. 1992. Shaping Technology/Building Society: Studies in Sociotechnical Change. Inside Technology. Cambridge, Mass: MIT Press.

Biometric Technology Today. 2002. “2001 Market Review: Uncertain Times.” Biometric Technology Today 10 (1): 9–11. https://doi.org/10.1016/S0969-4765(02)00118-2.

Bloomfield, Brian P., and Theo Vurdubakis. 1997. “Visions of Organization and Organizations of Vision: The Representational Practices of Information Systems Development.” Accounting, Organizations and Society 22 (7): 639–68. https://doi.org/10.1016/S0361-3682(96)00024-4.

Borgman, Christine L. 2015. Big Data, Little Data, No Data: Scholarship in the Networked World. Cambridge, Mass.; London, Eng.: The MIT Press.

Bovens, Mark, and Stavros Zouridis. 2002. “From Street-Level to System-Level Bureaucracies: How Information and Communication Technology Is Transforming Administrative Discretion and Constitutional Control.” Public Administration Review 62 (2): 174–84. https://doi.org/10.1111/0033-3352.00168.

Bowker, Geoffrey C. 1994. Science on the Run: Information Management and Industrial Geophysics at Schlumberger, 1920-1940. Inside Technology. Cambridge, Mass.: The MIT Press.

Bowker, Geoffrey C., Karen Baker, Florence Millerand, and David Ribes. 2009. “Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment.” In International Handbook of Internet Research, edited by Jeremy Hunsinger, Lisbeth Klastrup, and Matthew Allen, 97–117. Dordrecht: Springer Netherlands. https://doi.org/10.1007/978-1-4020-9789-8_5.

Bowker, Geoffrey C., and Susan Leigh Star. 1999. Sorting Things Out: Classification and Its Consequences. Inside Technology. Cambridge, Mass.: The MIT press.

Breckenridge, Keith, and Simon Szreter, eds. 2012. Registration and Recognition: Documenting the Person in World History. Oxford: Oxford University Press for the British Academy.

Broeders, Dennis. 2011. “A European ‘Border’ Surveillance System Under Construction.” In Migration and the New Technological Borders of Europe, edited by Huub Dijstelbloem and Albert Meijer, 40–67. Migration, Minorities and Citizenship. London: Palgrave Macmillan. https://doi.org/10.1057/9780230299382_3.

Broeders, Dennis, and Huub Dijstelbloem. 2016. “The Datafication of Mobility and Migration Management: The Mediating State and Its Consequences.” In Digitizing Identities: Doing Identity in a Networked World, edited by Irma van der Ploeg and Jason Pridmore, 242–60. London: Routledge.

Buffat, Aurélien. 2015. “Street-Level Bureaucracy and E-Government.” Public Management Review 17 (1): 149–61. https://doi.org/10.1080/14719037.2013.771699.

Bundesamt für Migration und Flüchtlinge. 2020. “Standard XAusländer.” Informationen zu den Themen: Digitalisierung. https://web.archive.org/web/20200621191446/https://www.bamf.de/DE/Themen/Digitalisierung/Xauslaender/xauslaender-node.html.

Burgess, J. Peter, ed. 2010. The Routledge Handbook of New Security Studies. Routledge Handbooks. London; New York: Routledge.

Burns, Ryan, and Grace Wark. 2020. “Where’s the Database in Digital Ethnography? Exploring Database Ethnography for Open Data Research.” Qualitative Research 20 (5): 598–616. https://doi.org/10.1177/1468794119885040.

Busch, Peter André, and Helle Zinner Henriksen. 2018. “Digital Discretion: A Systematic Literature Review of ICT and Street-Level Discretion.” Information Polity 23 (1): 3–28. https://doi.org/10.3233/IP-170050.

Bush, George W. 2008. “NSPD-59 / HSPD-24 on Biometrics for Identification and Screening to Enhance National Security.” http://web.archive.org/web/20221006170237/https://irp.fas.org/offdocs/nspd/nspd-59.html.

Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder, Colorado: Lynne Rienner Pub.

Cakici, Baki, Evelyn Ruppert, and Stephan Scheel. 2020. “Peopling Europe Through Data Practices: Introduction to the Special Issue.” Science, Technology, & Human Values 45 (2): 199–211. https://doi.org/10.1177/0162243919897822.

Calder, Simon. 2022. “EU Brings in Vaccine Expiration Date of 270 Days for Travellers.” The Independent. https://web.archive.org/web/20220307103943/https://www.independent.co.uk/travel/news-and-advice/eu-vaccine-expiration-date-travel-270-b2004777.html.

Callon, Michel. 1984. “Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St. Brieuc Bay.” The Sociological Review 32 (1_suppl): 196–233. https://doi.org/10.1111/j.1467-954X.1984.tb0011.

Caplan, Jane, and John Torpey, eds. 2001. Documenting Individual Identity: The Development of State Practices in the Modern World. Princeton, N.J.; Oxford: Princeton University Press.

Caswell, Michelle. 2012. “Using Classification to Convict the Khmer Rouge.” Journal of Documentation 68 (2): 162–84. https://doi.org/10.1108/00220411211209177.

Christen, Peter. 2012. Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications. Berlin; New York: Springer. https://doi.org/10.1007/978-3-642-31164-2.

Clarke, Adele E. 2005. Situational Analysis: Grounded Theory After the Postmodern Turn. Thousand Oaks, Calif.: Sage Publications.

Clarke, Roger. 1994. “Human Identification in Information Systems: Management Challenges and Public Policy Issues.” Information Technology & People 7 (4): 6–37. https://doi.org/10.1108/09593849410076799.

Cole, Simon A. 2001. Suspect Identities: A History of Fingerprinting and Criminal Identification. Cambridge, Mass.; London, Eng.: Harvard University Press.

———. 2005. “Review of Imprint of the Raj: How Fingerprinting Was Born in Colonial India.” Technology and Culture 46 (1): 252–53. https://doi.org/10.1353/tech.2005.0010.

Collins, Stephanie Baker. 2016. “The Space in the Rules: Bureaucratic Discretion in the Administration of Ontario Works.” Social Policy and Society 15 (2): 221–35. https://doi.org/10.1017/S1474746415000251.

Cornford, James, Susan Baines, and Rob Wilson. 2013. “Representing the Family: How Does the State ‘Think Family’?” Policy & Politics 41 (1): 1–18. https://doi.org/10.1332/030557312X645838.

Côté-Boucher, Karine, Federica Infantino, and Mark B. Salter. 2014. “Border Security as Practice: An Agenda for Research.” Security Dialogue 45 (3): 195–208. https://doi.org/10.1177/0967010614533243.

Cowan, Ruth Schwartz. 1985. “How the Refrigerator Got Its Hum.” In The Social Shaping of Technology, 202–18. Philadelphia: Open University Press.

Cresswell, Tim. 2010. “Towards a Politics of Mobility.” Environment and Planning D: Society and Space 28 (1): 17–31. https://doi.org/10.1068/d11407.

Dalton, Craig, and Jim Thatcher. 2014. “What Does a Critical Data Studies Look Like, and Why Do We Care? Seven Points for a Critical Approach to ‘Big Data’.” Society and Space, May. http://web.archive.org/web/20230827144723/https://www.societyandspace.org/articles/what-does-a-critical-data-studies-look-like-and-why-do-we-care.

David, Paul A., and Julie Ann Bunn. 1988. “The Economics of Gateway Technologies and Network Evolution: Lessons from Electricity Supply History.” Information Economics and Policy 3 (2): 165–202. https://doi.org/10.1016/0167-6245(88)90024-8.

Davidshofer, Stephan, Julien Jeandesboz, and Francesco Ragazzi. 2017. “Technology and Security Practices: Situating the Technological Imperative.” In International Political Sociology: Transversal Lines, edited by Tugba Basaran, Didier Bigo, Emmanuel-Pierre Guittet, and R. B. J. Walker. Routledge Studies in International Political Sociology. London & New York: Routledge.

De Genova, Nicholas, ed. 2017. The Borders of "Europe”: Autonomy of Migration, Tactics of Bordering. Durham, NC: Duke University Press.

de Goede, Marieke, Esmé Bosma, and Polly Pallister-Wilkins, eds. 2020. Secrecy and Methods in Security Research: A Guide to Qualitative Fieldwork. London & New York: Routledge.

D’Ignazio, Catherine, and Lauren F. Klein. 2020. Data Feminism. Strong Ideas Series. Cambridge, Mass.; London, Eng.: The MIT Press.

Dijstelbloem, Huub. 2021. Borders as Infrastructure: The Technopolitics of Border Control. Infrastructures. Cambridge, Mass.; London, Eng.: The MIT Press. https://doi.org/10.7551/mitpress/11926.001.0001.

Donko, Kamal, Martin Doevenspeck, and Uli Beisel. 2022. “Migration Control, the Local Economy and Violence in the Burkina Faso and Niger Borderland.” Journal of Borderlands Studies 37 (2): 235–51. https://doi.org/10.1080/08865655.2021.1997629.

Dourish, Paul. 2014. “No SQL: The Shifting Materialities of Database Technology.” Computational Culture, no. 4. http://web.archive.org/web/20230529102119/http://computationalculture.net/no-sql-the-shifting-materialities-of-database-technology/.

———. 2017. The Stuff of Bits: An Essay on the Materialities of Information. Cambridge, Mass.: The MIT Press.

Dunn, Halbert L. 1946. “Record Linkage.” American Journal of Public Health and the Nations Health 36 (12): 1412–6. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1624512/.

ECA, European Court of Auditors. 2014. Lessons from the European Commission’s Development of the Second Generation Schengen Information System (SIS II). Vol. Special report No 03/2014. Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2865/8113.

———. 2020. EU Information Systems Supporting Border Control: A Strong Tool, but More Focus Needed on Timely and Complete Data. Special Report No 20, 2019. Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2865/83092.

Edwards, Paul N. 2010. A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. Cambridge, Mass.; London, Eng: The MIT Press.

Edwards, Paul N., Geoffrey C. Bowker, Steven J. Jackson, and Robin Williams. 2009. “Introduction: An Agenda for Infrastructure Studies.” Journal of the Association for Information Systems 10 (5): 364–74. https://doi.org/10.17705/1jais.00200.

Edwards, Paul N., Steven J. Jackson, Geoffrey C. Bowker, and Cory Philip Knobel. 2007. “Understanding Infrastructure: Dynamics, Tensions, and Design.” Working Paper Final report of the workshop, "History and Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures". http://deepblue.lib.umich.edu/handle/2027.42/49353.

Egyedi, Tineke. 2001. “Infrastructure Flexibility Created by Standardized Gateways: The Cases of XML and the ISO Container.” Knowledge, Technology & Policy 14 (3): 41–54. https://doi.org/10.1007/s12130-001-1015-4.

Emerson, Robert M., Rachel I. Fretz, and Linda L. Shaw. 2011. Writing Ethnographic Fieldnotes. Second. University of Chicago Press.

Eubanks, Virginia. 2018. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York, NY: St. Martin’s Press.

eu-LISA. 2013. “Report on the Technical Functioning of VIS, Including the Security Thereof, Pursuant to Article 50(3) of the VIS Regulation.”

———. 2016. VIS Report Pursuant to Article 50(3) of Regulation (EC) No 767/2008: VIS Report Pursuant to Article 17(3) of Council Decision 2008/633/JHA. July 2016. Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2857/022699.

———. 2020. Report on the Technical Function of the Visa Information System (VIS). Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2857/66661.

European Commission. 2016a. “Commission Decision of 17 June 2016 Setting up the High Level Expert Group on Information Systems and Interoperability.” https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32016D0715(01).

———. 2016b. “Communication from the Commission to the European Parliament and the Council: Stronger and Smarter Information Systems for Borders and Security.” COM/2016/0205 final. https://publications.europa.eu/en/publication-detail/-/publication/702fa423-fca2-11e5-b713-01aa75ed71a1/language-en/format-PDF.

———. 2017. “Frequently Asked Questions - Interoperability of EU Information Systems for Security, Border and Migration Management.” MEMO/17/5241. Strasbourg. https://ec.europa.eu/commission/presscorner/detail/en/MEMO_17_5241.

———. 2020b. “Coronavirus: EU Interoperability Gateway.” Press Release. https://web.archive.org/web/20220831164020/https://ec.europa.eu/commission/presscorner/detail/en/ip_20_1904.

———. 2021a. “EU Digital COVID Certificate: EU Gateway Goes Live.” Press Release. https://web.archive.org/web/20221028104309/https://ec.europa.eu/commission/presscorner/detail/en/ip_21_2721.

———. 2021b. “Questions and Answers – EU Digital COVID Certificate.” Press Release. http://web.archive.org/web/20221016124101/https://ec.europa.eu/commission/presscorner/detail/en/QANDA_21_2781.

———. 2023. “COMMISSION IMPLEMENTING DECISION (EU) 2023/220 of 1 February 2023 Laying down and Developing the Universal Message Format (UMF) Standard Pursuant to Regulation (EU) 2019/817 of the European Parliament and of the Council.” https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32023D0220.

European External Action Service. 2021. “Non-EU Countries Welcome to Join the EU Digital COVID Certificate System.” http://web.archive.org/web/20220816070933/https://www.eeas.europa.eu/eeas/non-eu-countries-welcome-join-eu-digital-covid-certificate-system_en.

European Union. 2018. “Regulation (EU) 2018/1726 of the European Parliament and of the Council of 14 November 2018 on the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (Eu-LISA), and Amending Regulation (EC) No 1987/2006 and Council Decision 2007/533/JHA and Repealing Regulation (EU) No 1077/2011.” https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32018R1726.

———. 2019a. “Regulation (EU) 2019/817 of the European Parliament and of the Council of 20 May 2019 on Establishing a Framework for Interoperability Between EU Information Systems in the Field of Borders and Visa and Amending Regulations (EC) No 767/2008, (EU) 2016/399, (EU) 2017/2226, (EU) 2018/1240, (EU) 2018/1726 and (EU) 2018/1861 of the European Parliament and of the Council and Council Decisions 2004/512/EC and 2008/633/JHA.” http://data.europa.eu/eli/reg/2019/817/oj/eng.

———. 2019b. “Regulation (EU) 2019/818 of the European Parliament and of the Council of 20 May 2019 on Establishing a Framework for Interoperability Between EU Information Systems in the Field of Police and Judicial Cooperation, Asylum and Migration and Amending Regulations (EU) 2018/1726, (EU) 2018/1862 and (EU) 2019/816.” http://data.europa.eu/eli/reg/2019/818/oj/eng.

European Union Agency for Fundamental Rights. 2018. Under Watchful Eyes: Biometrics, EU IT Systems and Fundamental Rights. Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2811/136698.

Europol. 2014. Universal Message Format: Faster, Cheaper, Better. Luxembourg: Publications Office of the European Union. https://data.europa.eu/doi/10.2813/15318.

Euzenat, Jérôme, and Pavel Shvaiko. 2007. Ontology Matching. Berlin; New York: Springer. https://doi.org/10.1007/978-3-540-49612-0.

Fellegi, Ivan P., and Alan B. Sunter. 1969. “A Theory for Record Linkage.” Journal of the American Statistical Association 64 (328): 1183–1210. https://doi.org/10.1080/01621459.1969.10501049.

Ferguson, Andrew Guthrie. 2017. The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. NYU Press. https://doi.org/10.2307/j.ctt1pwtb27.

Flyverbom, Mikkel, and John Murray. 2018. “Datastructuring—Organizing and Curating Digital Traces into Action.” Big Data & Society 5 (2): 1–12. https://doi.org/10.1177/2053951718799114.

Follis, Karolina S. 2017. “Vision and Transterritory: The Borders of Europe.” Science, Technology, & Human Values 42 (6): 1003–30. https://doi.org/10.1177/0162243917715106.

Fors-Owczynik, Karolina La, and Irma van der Ploeg. 2015. “Migrants at/as Risk: Identity Verification and Risk-Assessment Technologies in the Netherlands.” In Digitizing Identities, edited by Irma van der Ploeg and Jason Pridmore, 261–81. Routledge Studies in Science, Technology and Society 30. New York; London: Routledge.

Franz, Max, Christian T. Lopes, Gerardo Huck, Yue Dong, Onur Sumer, and Gary D. Bader. 2016. “Cytoscape.Js: A Graph Theory Library for Visualisation and Analysis.” Bioinformatics 32 (2): 309–11. https://doi.org/10.1093/bioinformatics/btv557.

Friese, Susanne. 2014. Qualitative Data Analysis with ATLAS.Ti. Second. London: SAGE Publications Ltd.

Gandy, Oscar H., Jr. 1989. “The Surveillance Society: Information Technology and Bureaucratic Social Control.” Journal of Communication 39 (3): 61–76. https://doi.org/10.1111/j.1460-2466.1989.tb01040.x.

Garfinkel, Harold. 1964. “Studies of the Routine Grounds of Everyday Activities.” Social Problems 11 (3): 225–50. https://doi.org/10.2307/798722.

Gargiulo, Enrico. 2017. “Monitoring or Selecting? Security in Italy Between Surveillance, Identification and Categorisation.” In Rethinking Surveillance and Control: Beyond the "Security Versus Privacy" Debate, edited by Elisa Orrù, Maria Grazia Porcedda, and Sebastian Weydner-Volkmann, 195–215. Baden-Baden: Nomos.

Gasson, Susan. 2006. “A Genealogical Study of Boundary-Spanning IS Design.” European Journal of Information Systems 15 (1): 26–41. https://doi.org/10.1057/palgrave.ejis.3000594.

Gazan, Rich. 2005. “Imposing Structures: Narrative Analysis and the Design of Information Systems.” Library & Information Science Research 27 (3): 346–62. https://doi.org/10.1016/j.lisr.2005.04.004.

Geiger, Stuart R., and David Ribes. 2011. “Trace Ethnography: Following Coordination Through Documentary Practices.” In Proceedings of the 2011 44th Hawaii International Conference on System Sciences. https://doi.org/10.1109/HICSS.2011.455.

Gitelman, Lisa, ed. 2013. “Raw Data” Is an Oxymoron. Infrastructures. Cambridge, Mass.: The MIT press.

Glouftsios, Georgios. 2021. “Governing Border Security Infrastructures: Maintaining Large-Scale Information Systems.” Security Dialogue 52 (5): 452–70. https://doi.org/10.1177/0967010620957230.

———. 2018. “Governing Circulation Through Technology Within EU Border Security Practice-Networks.” Mobilities 13 (2): 185–99. https://doi.org/10.1080/17450101.2017.1403774.

———. 2019. “Designing Digital Borders: The Visa Information System (VIS).” In Technology and Agency in International Relations, edited by Marijn Hoijtink and Matthias Leese, 164–87. London; New York: Routledge.

Glouftsios, Georgios, and Matthias Leese. 2023. “Epistemic Fusion: Passenger Information Units and the Making of International Security.” Review of International Studies 49 (1): 125–42. https://doi.org/10.1017/S0260210522000365.

Goede, Marieke de, and Gavin Sullivan. 2016. “The Politics of Security Lists.” Environment and Planning D: Society and Space 34 (1): 67–88. https://doi.org/10.1177/0263775815599309.

Grijpink, Jan. 1997. “Chain-Computerisation for Interorganisational Public Policy Implementation.” Information Infrastructure and Policy 6 (2): 81–93. https://content.iospress.com/articles/information-infrastructure-and-policy/iip082.

Grommé, Francisca, and Evelyn Ruppert. 2021. “Imagining Citizens as More Than Data Subjects: A Methodography of a Collaborative Design Workshop on Co-Producing Official Statistics.” Science & Technology Studies 34 (3): 103–24. https://doi.org/10.23987/sts.89444.

Gusterson, Hugh. 1996. Nuclear Rites. A Weapons Laboratory at the End of the Cold War. Berkeley; Los Angeles, California: University of California Press.

———. 1997. “Studying up Revisited.” PoLAR: Political and Legal Anthropology Review 20: 114–19. https://heinonline.org/HOL/Page?handle=hein.journals/polar20&id=122&div=&collection=.

Hand, Martin, Elizabeth Shove, and Dale Southerton. 2005. “Explaining Showering: A Discussion of the Material, Conventional, and Temporal Dimensions of Practice.” Sociological Research Online 10 (2): 1–13. https://doi.org/10.5153/sro.1100.

Hanseth, Ole. 2001. “Gateways — Just as Important as Standards: How the Internet Won the ‘Religious War’ over Standards in Scandinavia.” Knowledge, Technology & Policy 14 (3): 71–89. https://doi.org/10.1007/s12130-001-1017-2.

Hanseth, Ole, Edoardo Jacucci, Miria Grisot, and Margunn Aanestad. 2006. “Reflexive Standardization: Side Effects and Complexity in Standard Making.” MIS Quarterly 30: 563–81. https://doi.org/10.2307/25148773.

Hanseth, Ole, and Eric Monteiro. 1997. “Inscribing Behaviour in Information Infrastructure Standards.” Accounting, Management and Information Technologies 7 (4): 183–211. https://doi.org/10.1016/S0959-8022(97)00008-8.

Hanseth, Ole, Eric Monteiro, and Morten Hatling. 1996. “Developing Information Infrastructure: The Tension Between Standardization and Flexibility.” Science, Technology, & Human Values 21 (4): 407–26. https://doi.org/10.1177/016224399602100402.

Harron, Katie, Chris Dibben, James Boyd, Anders Hjern, Mahmoud Azimaee, Mauricio L Barreto, and Harvey Goldstein. 2017. “Challenges in Administrative Data Linkage for Research.” Big Data & Society 4 (2): 1–12. https://doi.org/10.1177/2053951717745678.

Higgs, Edward. 2013. “Consuming Identity and Consuming the State in Britain Since C.1750.” In Identification and Registration Practices in Transnational Perspective, edited by Ilsen About, James Brown, and Gayle Lonergan, 164–82. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

Hine, Christine. 2006. “Databases as Scientific Instruments and Their Role in the Ordering of Scientific Work.” Social Studies of Science 36 (2): 269–98. https://doi.org/10.1177/0306312706054047.

Hobbing, Peter. 2010. “Tracing Terrorists: The European Union–Canada Agreement on Passenger Name Record (PNR) Matters.” In Mapping Transatlantic Security Relations, edited by Mark B. Salter. London: Routledge.

Hoijtink, Marijn, and Matthias Leese, eds. 2019. Technology and Agency in International Relations. London; New York: Routledge.

Hu, Yifan, and Martin Nöllenburg. 2019. “Graph Visualization.” In Encyclopedia of Big Data Technologies, edited by Sherif Sakr and Albert Y. Zomaya, 904–12. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-77525-8_324.

Hughes, Thomas Parke. 1983a. “Chapter 4: Reverse Salients and Critical Problems.” In Networks of Power: Electrification in Western Society, 1880-1930, 79–105. Baltimore: The Johns Hopkins University Press.

———. 1983b. Networks of Power: Electrification in Western Society, 1880-1930. Baltimore: The Johns Hopkins University Press.

Hui, Allison, Theodore Schatzki, and Elizabeth Shove. 2016. The Nexus of Practices: Connections, Constellations, Practitioners. London & New York: Routledge. https://doi.org/10.4324/9781315560816.

Hull, Matthew S. 2012. “Documents and Bureaucracy.” Annual Review of Anthropology 41 (1): 251–67. https://doi.org/10.1146/annurev.anthro.012809.104953.

Huysmans, Jef. 2000. “The European Union and the Securitization of Migration.” JCMS: Journal of Common Market Studies 38 (5): 751–77. https://doi.org/10.1111/1468-5965.00263.

———. 1998. “Security! What Do You Mean?: From Concept to Thick Signifier.” European Journal of International Relations 4 (2): 226–55. https://doi.org/10.1177/1354066198004002004.

Hyysalo, Sampsa, Torben Elgaard Jensen, and Nelly Oudshoorn, eds. 2016. The New Production of Users: Changing Innovation Collectives and Involvement Strategies. Routledge Studies in Innovation, Organization and Technology 42. New York: Routledge.

Hyysalo, Sampsa, Neil Pollock, and Robin A. Williams. 2019. “Method Matters in the Social Study of Technology: Investigating the Biographies of Artifacts and Practices.” Science & Technology Studies 32 (3): 2–25. https://doi.org/10.23987/sts.65532.

ICTU. 2015. “Informatievoorziening Vreemdelingenketen.” ICTU Publicaties. https://web.archive.org/web/20190525093722/https://www.ictu.nl/publicaties/informatievoorziening-vreemdelingenketen.

Iliadis, Andrew. 2018. “Algorithms, Ontology, and Social Progress.” Global Media and Communication 14 (2): 219–30. https://doi.org/10.1177/1742766518776688.

Iliadis, Andrew, and Federica Russo. 2016. “Critical Data Studies: An Introduction.” Big Data & Society 3 (2): 1–7. https://doi.org/10.1177/2053951716674238.

Isin, Engin F. 2013. “Claiming European Citizenship.” In Enacting European Citizenship, edited by Engin F. Isin and Michael Saward, 19–46. Cambridge: Cambridge University Press.

ISO/IEC. 1994. “7498-1:1994 Open Systems Interconnection — Basic Reference Model: The Basic Model.” https://www.iso.org/standard/20269.html.

———. 2008. “Identification Cards — Machine Readable Travel Documents — Part 1: Machine Readable Passport.”

Jackson, Michèle H., Marshall Scott Poole, and Tim Kuhn. 2002. “The Social Construction of Technology in Studies of the Workplace.” In Handbook of New Media: Social Shaping and Consequences of ICTs, edited by Leah A. Lievevrouw and Sonia Livingstone, 236–53. London: SAGE Publications Ltd. https://doi.org/10.4135/978184860824510.4135/9781848608245.n18.

Jeandesboz, Julien. 2020. “Final Report on Entry.” AdMiGov Deliverable D.1.4. Brussels: Université libre de Bruxelles. http://web.archive.org/web/20221202051249/https://admigov.eu/upload/Deliverable_D14_Jeandesboz_Final_Report_on_Entry.pdf.

———. 2016. “Smartening Border Security in the European Union: An Associational Inquiry.” Security Dialogue 47 (4): 292–309. https://doi.org/10.1177/0967010616650226.

Jones, Chris, Ana Valdivia, and Jane Kilpatrick. 2022. “Funds for Fortress Europe: Spending by Frontex and EU-LISA.” Statewatch. http://web.archive.org/web/20220812111011/https://www.statewatch.org/analyses/2022/funds-for-fortress-europe-spending-by-frontex-and-eu-lisa/.

Jutte, Douglas P., Leslie L. Roos, and Marni D. Brownell. 2011. “Administrative Record Linkage as a Tool for Public Health Research.” Annual Review of Public Health 32 (1): 91–108. https://doi.org/10.1146/annurev-publhealth-031210-100700.

Kangas, Anssi. 2019. “UMF3+ Technological Solution for Better Access to MS Data Held at Europol.” EU2019.Fi. European Parliament, Brussels, Belgium. http://web.archive.org/web/20230920101049/https://www.europarl.europa.eu/committees/it/fifth-meeting-of-the-joint-parliamentary/product-details/20190911EOT03961.

Karasti, Helena, Karen S. Baker, and Florence Millerand. 2010. “Infrastructure Time: Long-Term Matters in Collaborative Development.” Computer Supported Cooperative Work (CSCW) 19 (3): 377–415. https://doi.org/10.1007/s10606-010-9113-z.

Karasti, Helena, and Jeanette Blomberg. 2018. “Studying Infrastructuring Ethnographically.” Computer Supported Cooperative Work (CSCW) 27 (2): 233–65. https://doi.org/10.1007/s10606-017-9296-7.

Karasti, Helena, Florence Millerand, Christine M. Hine, and Geoffrey C. Bowker. 2016. “Knowledge Infrastructures: Part I.” Science & Technology Studies 29 (1): 2–12. https://doi.org/10.23987/sts.55406.

Kementsietsidis, Anastasios. 2009. “Schema Matching.” In Encyclopedia of Database Systems, edited by Ling Liu and M. Tamer Özsu, 2494–7. Boston, MA: Springer. https://doi.org/10.1007/978-0-387-39940-9_962.

Keulen, Maurice van. 2018. “Probabilistic Data Integration.” In Encyclopedia of Big Data Technologies, edited by Sherif Sakr and Albert Zomaya, 1–9. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-63962-8_18-1.

———. 2012. “Managing Uncertainty: The Road Towards Better Data Interoperability.” IT - Information Technology 54 (3): 138–46. https://doi.org/10.1524/itit.2012.0674.

Kim, Arin. 2022. “South Korea Joins EU’s Digital COVID-19 Certificate System.” The Korea Herald. http://web.archive.org/web/20220817052820/http://www.koreaherald.com/view.php?ud=20220701000611.

Kitchin, Rob. 2014. The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences. London: SAGE Publications Ltd. https://doi.org/10.4135/9781473909472.

Kitchin, Rob, and Martin Dodge. 2011. Code/Space: Software and Everyday Life. Computer software Studies. Cambridge, Mass.: The MIT Press. https://doi.org/10.7551/mitpress/9780262042482.001.0001.

Kitchin, Rob, and Tracey P. Lauriault. 2018. “Towards Critical Data Studies: Charting and Unpacking Data Assemblages and Their Work.” In Thinking Big Data in Geography: New Regimes, New Research, edited by Jim Thatcher, Josef Eckert, and Andrew Shears, 3–20. Lincoln; London: University of Nebraska Press. https://doi.org/10.2307/j.ctt21h4z6m.

Klein, Hans K., and Daniel Lee Kleinman. 2002. “The Social Construction of Technology: Structural Considerations.” Science, Technology, & Human Values 27 (1): 28–52. https://doi.org/10.1177/016224390202700102.

Kloppenburg, Sanneke, and Irma van der Ploeg. 2020. “Securing Identities: Biometric Technologies and the Enactment of Human Bodily Differences.” Science as Culture 29 (1): 57–76. https://doi.org/10.1080/09505431.2018.1519534.

KPMG IT Advisory. 2011. “Audit INDiGO: ‘Willen, Kunnen En Doen’.” Audit. The Hague, The Netherlands.

Kuster, Brigitta, and Vassilis S. Tsianos. 2016. “How to Liquefy a Body on the Move: Eurodac and the Making of the European Digital Border.” In EU Borders and Shifting Internal Security: Technology, Externalization and Accountability, edited by Raphael Bossong and Helena Carrapico, 45–63. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-17560-7_3.

Lampland, Martha, and Susan Leigh Star, eds. 2009. Standards and Their Stories: How Quantifying, Classifying, and Formalizing Practices Shape Everyday Life. Ithaca: Cornell University Press.

Landsbergen, David. 2004. “Screen Level Bureaucracy: Databases as Public Records.” Government Information Quarterly 21 (1): 24–50. https://doi.org/10.1016/j.giq.2003.12.009.

Larkin, Brian. 2013. “The Politics and Poetics of Infrastructure.” Annual Review of Anthropology 42 (1): 327–43. https://doi.org/10.1146/annurev-anthro-092412-155522.

Latour, Bruno. 1986. “Visualisation and Cognition: Drawing Things Together.” Edited by H. Kuklick. Knowledge and Society Studies in the Sociology of Culture Past and Present 6: 1–40. http://web.archive.org/web/20230325193816/http://www.bruno-latour.fr/node/293.

———. 1992. “Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts.” In Shaping Technology/Building Society: Studies in Sociotechnical Change, edited by Wiebe E. Bijker and John Law, 225–58. Cambridge, Mass.: The MIT Press.

———. 2002. “Gabriel Tarde and the End of the Social.” In The Social in Question: New Bearings in History and the Social Sciences, edited by Patrick Joyce, 117–32. London: Routledge.

———. 2005. Reassembling the Social: An Introduction to Actor-Network-Theory. Clarendon Lectures in Management Studies. Oxford & New York: Oxford University Press.

———. 1999. “On Recalling ANT.” The Sociological Review 47 (1_suppl): 15–25. https://doi.org/10.1111/j.1467-954X.1999.tb03480.x.

Latour, Bruno, and Steve Woolgar. 1986. Laboratory Life: The Construction of Scientific Facts. Second. Princeton, N.J.: Princeton University Press.

Lauriault, Tracey P. 2017. “Ontologizing the City.” In Data and the City, edited by Rob Kitchin, Tracey P. Lauriault, and Gavin McArdle, 171–86. London: Routledge. https://doi.org/10.4324/9781315407388.

Law, John. 2006. “Traduction / Trahison: Notes on ANT.” Convergencia Revista de Ciencias Sociales, no. 42 (December): 32–57. https://convergencia.uaemex.mx/article/view/1394.

Law, John, and John Urry. 2004. “Enacting the Social.” Economy and Society 33 (3): 390–410. https://doi.org/10.1080/0308514042000225716.

Lee, Martin Laurence, Robert Clymer, and Kate Peters. 2016. “A Naturalistic Patient Matching Algorithm: Derivation and Validation.” Health Informatics Journal 22 (4): 1030–44. https://doi.org/10.1177/1460458215607080.

Leese, Matthias. 2022. “Fixing State Vision: Interoperability, Biometrics, and Identity Management in the EU.” Geopolitics 27 (1): 113–33. https://doi.org/10.1080/14650045.2020.1830764.

———. 2018. “Standardizing Security: The Business Case Politics of Borders.” Mobilities 13 (2): 261–75. https://doi.org/10.1080/17450101.2017.1403777.

Lemberg-Pedersen, Martin, Johanne Rübner Hansen, and Oliver Joel Halpern. 2020. “The Political Economy of Entry Governance.” Advancing Alternative Migration (ADMIGOV) Deliverable 1.3. Copenhagen: Aalborg University. http://web.archive.org/web/20230705132811/https://admigov.eu/upload/Deliverable_D13_Lemberg-Pedersen_The_Political_Economy_of_Entry_Governance.pdf.

Leszczynski, Agnieszka, and Matthew Zook. 2020. “Viral Data.” Big Data & Society 7 (2). https://doi.org/10.1177/2053951720971009.

Lipsky, Michael. 2010. Street-Level Bureaucracy: Dilemmas of the Individual in Public Services. 30th anniversary expanded. New York: Russell Sage Foundation.

Loukissas, Yanni Alexander. 2019. All Data Are Local: Thinking Critically in a Data-Driven Society. Cambridge, Mass.: The MIT Press.

Lyon, David. 2009. Identifying Citizens: ID Cards as Surveillance. Cambridge, UK; Malden, MA: Polity.

———. 2003. Surveillance After September 11. Malden, Mass.: Polity.

MacKenzie, Donald A., and Judy Wajcman. 1985. The Social Shaping of Technology: How the Refrigerator Got Its Hum. Milton Keynes: Open University Press.

MacKenzie, Donald, and Judy Wajcman, eds. 1999. The Social Shaping of Technology. Philadelphia: Open University Press.

Marcus, George E. 1995. “Ethnography in/of the World System: The Emergence of Multi-Sited Ethnography.” Annual Review of Anthropology 24 (1): 95–117. https://doi.org/10.1146/annurev.an.24.100195.000523.

Marres, Noortje. 2017. Digital Sociology the Reinvention of Social Research. Malden, MA: Polity.

———. 2007. “The Issues Deserve More Credit: Pragmatist Contributions to the Study of Public Involvement in Controversy.” Social Studies of Science 37 (5): 759–80. https://doi.org/10.1177/0306312706077367.

Marres, Noortje, and Carolin Gerlitz. 2016. “Interface Methods: Renegotiating Relations Between Digital Social Research, STS and Sociology.” The Sociological Review 64 (1): 21–46. https://doi.org/10.1111/1467-954X.12314.

McCoy, Allison B., Adam Wright, Michael G. Kahn, Jason S. Shapiro, Elmer Victor Bernstam, and Dean F. Sittig. 2013. “Matching Identifiers in Electronic Health Records: Implications for Duplicate Records and Patient Safety.” BMJ Quality & Safety 22 (3): 219–24. https://doi.org/10.1136/bmjqs-2012-001419.

McDonald, Matt. 2008. “Securitization and the Construction of Security.” European Journal of International Relations 14 (4): 563–87. https://doi.org/10.1177/1354066108097553.

M’charek, Amade, Katharina Schramm, and David Skinner. 2014. “Topologies of Race: Doing Territory, Population and Identity in Europe.” Science, Technology, & Human Values 39 (4): 468–87. https://doi.org/10.1177/0162243913509493.

Meershoek, Agnes, Anja Krumeich, and Rein Vos. 2011. “The Construction of Ethnic Differences in Work Incapacity Risks: Analysing Ordering Practices of Physicians in the Netherlands.” Social Science & Medicine 72 (1): 15–22. https://doi.org/10.1016/j.socscimed.2010.10.022.

Mezzadra, Sandro, and Brett Neilson. 2013. Border as Method, or, the Multiplication of Labor. Durham: Duke University Press.

Miller, Keith J., Elizabeth Schroeder Richerson, Sarah McLeod, James Finley, and Aaron Schein. n.d. “International Multicultural Name Matching Competition: Design, Execution, Results, and Lessons Learned.” In Proceedings of the Eight International Conference on Language Resources and Evaluation (LREC’12), 3111–7. Istanbul, Turkey: European Language Resources Association (ELRA). http://www.lrec-conf.org/proceedings/lrec2012/index.html.

Ministerie van Justitie en Veiligheid. 2023. “Thema’s En Architectuurprincipes - MIRA-Online.” http://web.archive.org/web/20230802095011/https://www.miraonline.nl/index.php/Thema%27s.

———. 2022. “Protocol identificatie en labeling: gestandaardiseerde werkwijze voor de unieke identificatie en registratie in de migratieketen.” Richtlijn Versie 12.1. Ministerie van Algemene Zaken. http://web.archive.org/web/20230906100658/https://open.overheid.nl/documenten/ronl-041514e0-ffef-448f-acfe-626fd7c8160e/pdf.

Monahan, Torin, and Neal A. Palmer. 2009. “The Emerging Politics of DHS Fusion Centers.” Security Dialogue 40 (6): 617–36. https://doi.org/10.1177/0967010609350314.

Monteiro, Eric, Neil Pollock, Ole Hanseth, and Robin Williams. 2013. “From Artefacts to Infrastructures.” Computer Supported Cooperative Work (CSCW) 22 (4): 575–607. https://doi.org/10.1007/s10606-012-9167-1.

Nader, Laura. 1972. “Up the Anthropologist: Perspectives Gained from Studying up.” In Reinventing Anthropology, edited by Dell Hymes, 284–311. New York: Pantheon Books. https://eric.ed.gov/?id=ED065375.

———. 1980. “The Vertical Slice: Hierarchies and Children.” In Hierarchy & Society: Anthropological Perspectives on Bureaucracy, edited by Gerald Mark Britan and Ronald Cohen, 31–44. Philadelphia: Institute for the Study of Human Issues. https://archive.org/details/hierarchysociety00brit_0/mode/2up.

Newcombe, H. B., and J. M. Kennedy. 1962. “Record Linkage: Making Maximum Use of the Discriminating Power of Identifying Information.” Communications of the ACM 5 (11): 563–66. https://doi.org/10.1145/368996.369026.

Newcombe, H. B., J. M. Kennedy, S. J. Axford, and A. P. James. 1959. “Automatic Linkage of Vital Records.” Science 130 (3381): 954–59. https://doi.org/10.1126/science.130.3381.954.

Newman, Mark. 2018. Networks. Oxford & New York: Oxford University Press. https://doi.org/10.1093/oso/9780198805090.001.0001.

Nicolini, Davide. 2016. “Is Small the Only Beautiful? Making Sense of ‘Large Phenomena’ from a Practice-Based Perspective.” In The Nexus of Practices Connections: Constellations, Practitioners, edited by Allison Hui, Theodore Schatzki, and Elizabeth Shove, 98–113. London & New York: Routledge. https://doi.org/10.4324/9781315560816.

Olivieri, Lorenzo. 2023. Temporalities of Migration. Time, Data Infrastructures and Intervention. Padova: Padova University Press.

Olwig, Karen Fog, Kristina Grünenberg, Perle Møhl, and Anja Simonsen. 2019. The Biometric Border World: Technologies, Bodies and Identities on the Move. London: Routledge. https://doi.org/10.4324/9780367808464.

Oosterbaan, Teun. 2012. “Architectuur Als Agenda: Een Theoretische En Empirische Analyse van de Rol van Frames Bij Architectuurontwikkeling Voor Keteninformatisering.” PhD thesis, Erasmus University Rotterdam. http://hdl.handle.net/1765/31677.

Oudshoorn, Nelly. 2012. “How Places Matter: Telecare Technologies and the Changing Spatial Dimensions of Healthcare.” Social Studies of Science 42 (1): 121–42. https://doi.org/10.1177/0306312711431817.

Pallitro, Robert, and Josiah Heyman. 2008. “Theorizing Cross-Border Mobility: Surveillance, Security and Identity.” Surveillance & Society 5 (3). https://doi.org/10.24908/ss.v5i3.3426.

Parkin, Joanna. 2011. The Difficult Road to the Schengen Information System II: The Legacy of ’Laboratories’ and the Cost for Fundamental Rights and the Rule of Law. Brussels, Belgium: Centre for European Policy Studies (CEPS). https://www.ceps.eu/system/files/book/2011/06/INEX_PB_No_13_Parkin%20on%20SIS.pdf.

PC. n.d. “Processing Citizenship: Digital Registration of Migrants as Co-Production of Citizens, Territory and Europe.” ERC-2016-STG - ERC Starting Grant. ALMA MATER STUDIORUM - UNIVERSITA DI BOLOGNA, Italy: H2020-EU.1.1. - EXCELLENT SCIENCE - European Research Council (ERC). Accessed April 11, 2023. https://doi.org/10.3030/714463.

Pelizza, Annalisa. 2016a. “Developing the Vectorial Glance: Infrastructural Inversion for the New Agenda on Governmental Information Systems.” Science, Technology and Human Values 41 (2): 298–321. https://doi.org/10.1177/0162243915597478.

———. 2016b. “Disciplining Change, Displacing Frictions: Two Structural Dimensions of Digital Circulation Across Land Registry Database Integration.” Tecnoscienza. Italian Journal of Science & Technology Studies 7 (2): 35–60.

———. 2019. “Processing Alterity, Enacting Europe: Migrant Registration and Identification as Co-Construction of Individuals and Polities.” Science, Technology, & Human Values 45 (2): 262–88. https://doi.org/10.1177/0162243919827927.

———. 2021. “Identification as Translation: The Art of Choosing the Right Spokespersons at the Securitized Border.” Social Studies of Science 51 (4): 487–511. https://doi.org/10.1177/0306312720983932.

———. 2010. “From Community to Text and Back: On Semiotics and ANT as Text-Based Methods for Fleeting Objects of Study.” Tecnoscienza : Italian Journal of Science & Technology Studies 1 (2): 57–89. https://research.utwente.nl/en/publications/from-community-to-text-and-back-on-semiotics-and-ant-as-text-base.

Pelizza, Annalisa, and Claudia Aradau. 2024. “Scripts of Security: Between Contingency and Obduracy.” Science, Technology, & Human Values 0 (0). https://doi.org/10.1177/01622439241258822.

Pelizza, Annalisa, and Rob Hoppe. 2018. “Birth of a Failure: Consequences of Framing ICT Projects for the Centralization of Inter-Departmental Relations.” Administration & Society 50 (1): 101–30. https://doi.org/10.1177/0095399715598343.

Pelizza, Annalisa, and Chiara Loschi. 2023. “Telling ‘More Complex Stories’ of European Integration: How a Sociotechnical Perspective Can Help Explain Administrative Continuity in the Common European Asylum System.” Journal of European Public Policy, April, 1–22. https://doi.org/10.1080/13501763.2023.2197945.

Pelizza, Annalisa, and Wouter Van Rossem. 2021. “Sensing European Alterity: An Analogy Between Sensors and Hotspots in Transnational Security Networks.” In Sensing in/Security: Sensors as Transnational Security Infrastructures, edited by Nina Klimburg-Witjes, Nikolaus Pöchhacker, and Geoffrey C. Bowker, 262–86. Manchester, UK: Mattering Press. https://doi.org/10.28938/9781912729111.

———. 2023. “Scripts of Alterity: Mapping Assumptions and Limitations of the Border Security Apparatus Through Classification Schemas.” Science, Technology, & Human Values 0 (0): 1–33. https://doi.org/10.1177/01622439231195955.

Peoples, Columba, and Nick Vaughan-Williams. 2021. Critical Security Studies: An Introduction. Third. Abingdon, Oxon; New York, NY: Routledge, Taylor & Francis Group.

Pinch, Trevor. 2008. “Technology and Institutions: Living in a Material World.” Theory and Society 37 (5): 461–83. https://doi.org/10.1007/s11186-008-9069-x.

Pinch, Trevor, and Wiebe E. Bijker. 1984. “The Social Construction of Facts and Artefacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” Social Studies of Science 14 (3): 399–441. https://doi.org/10.1177/030631284014003004.

Pollock, Neil, and Robin Williams. 2009. Software and Organisations: The Biography of the Enterprise-Wide System or How SAP Conquered the World. Routledge Studies in Technology, Work and Organisations 5. London; New York: Routledge.

———. 2010. “E-Infrastructures: How Do We Know and Understand Them? Strategic Ethnography and the Biography of Artefacts.” Computer Supported Cooperative Work (CSCW) 19 (6): 521–56. https://doi.org/10.1007/s10606-010-9129-4.

Pollock, Neil, Robin Williams, and Luciana D’Adderio. 2016. “Generification as a Strategy How Software Producers Configure Products, Manage User Communities and Segment Markets.” In The New Production of Users: Changing Innovation Collectives and Involvement Strategies, edited by Sampsa Hyysalo, Torben Elgaard Jensen, and Nelly Oudshoorn, 160–89. Routledge Studies in Innovation, Organization and Technology 42. New York: Routledge.

Pollozek, Silvan, and Jan Hendrik Passoth. 2019. “Infrastructuring European Migration and Border Control: The Logistics of Registration and Identification at Moria Hotspot.” Environment and Planning D: Society and Space 37 (4): 606–24. https://doi.org/10.1177/0263775819835819.

PRNewswire. 2011. “WCC Wins Top Tier Vendor Position at MITRE Multi-Cultural Name Matching Challenge.” PR Newswire, October. https://web.archive.org/web/20111017050549/http://www.prnewswire.com/news-releases/wcc-wins-top-tier-vendor-position-at-mitre-multi-cultural-name-matching-challenge-131213309.html.

Quintel, Teresa Alegra. 2018. “Connecting Personal Data of Third Country Nationals: Interoperability of EU Databases in the Light of the CJEU’s Case Law on Data Retention.” SSRN. http://hdl.handle.net/10993/35318.

Reckwitz, Andreas. 2002. “Toward a Theory of Social Practices.” European Journal of Social Theory 5 (2): 243–63. https://doi.org/10.1177/13684310222225432.

Ribes, David. 2019. “Materiality Methodology, and Some Tricks of the Trade in the Study of Data and Specimens.” In DigitalSTS: A Field Guide for Science & Technology Studies, edited by Janet Vertesi and David Ribes, 43–60. Princeton, N.J.; Oxford: Princeton University Press. https://doi.org/10.1515/9780691190600.

Ribes, David, and Thomas A. Finholt. 2009. “The Long Now of Infrastructure: Articulating Tensions in Development.” Journal of the Association for Information Systems 10 (5): 375–98. https://doi.org/10.17705/1jais.00199.

Riles, Annelise, ed. 2006. Documents: Artifacts of Modern Knowledge. Ann Arbor: The University of Michigan Press.

Rinkinen, Jenny, Elizabeth Shove, and Mattijs Smits. 2019. “Cold Chains in Hanoi and Bangkok: Changing Systems of Provision and Practice.” Journal of Consumer Culture 19 (3): 379–97. https://doi.org/10.1177/1469540517717783.

Rippen, René. 2006. “Sterke positie in HR en identity matching.” Database Magazine 8 (December): 36–38. http://web.archive.org/web/20230906103716/https://biplatform.nl/magazines/Aveq/111773.pdf.

Rogers, Richard. 2013. Digital Methods. Cambridge, MA: The MIT Press. https://doi.org/10.7551/mitpress/8718.001.0001.

Rogers, Richard, Natalia Sánchez-Querubín, and Aleksandra Kil. 2015. Issue Mapping for an Ageing Europe. Amsterdam: Amsterdam University Press. https://doi.org/10.5117/9789089647160.

Rumsfeld, Donald H. 2002. “Press Conference by Former US Secretary of Defence.” NATO HQ, Brussels. http://web.archive.org/web/20220922103427/https://www.nato.int/docu/speech/2002/s020606g.htm.

Ruppert, Evelyn. 2014. “Category.” In Inventive Methods: The Happening of the Social, edited by Celia Lury and Nina Wakeford, 48–60. Oxon, UK: Routledge.

———. 2013. “Not Just Another Database: The Transactions That Enact Young Offenders.” Computational Culture, no. 3 (November): 1–13. http://computationalculture.net/not-just-another-database-the-transactions-that-enact-young-offenders/.

Ruppert, Evelyn, Engin Isin, and Didier Bigo. 2017. “Data Politics.” Big Data & Society 4 (2): 1–7. https://doi.org/10.1177/2053951717717749.

Ruppert, Evelyn, and Stephan Scheel, eds. 2021. Data Practices: Making up a European People. London: Goldsmiths Press.

Salter, Mark B. 2013. “To Make Move and Let Stop: Mobility and the Assemblage of Circulation.” Mobilities 8 (1): 7–19. https://doi.org/10.1080/17450101.2012.747779.

Sauleau, Erik A., Jean-Philippe Paumier, and Antoine Buemi. 2005. “Medical Record Linkage in Health Information Systems by Approximate String Matching and Clustering.” BMC Medical Informatics and Decision Making 5 (1): 32. https://doi.org/10.1186/1472-6947-5-32.

Schatzki, Theodore. 2005. “Introduction: Practice Theory.” In The Practice Turn in Contemporary Theory, edited by Theodore Schatzki, Karin Knorr Cetina, and Eike von Savigny, 10–23. London; New York: Routledge.

———. 2010. “Materiality and Social Life.” Nature and Culture 5 (2): 123–49. https://doi.org/10.3167/nc.2010.050202.

Scheel, Stephan. 2019. Autonomy of Migration? Appropriating Mobility Within Biometric Border Regimes. Abingdon, Oxon; New York, NY: Routledge.

Scheel, Stephan, Evelyn Ruppert, and Funda Ustek-Spilda. 2019. “Enacting Migration Through Data Practices.” Environment and Planning D: Society and Space 37 (4): 579–88. https://doi.org/10.1177/0263775819865791.

Scheers, Marie-Louise. 2021. “Biographic Matching & UMF Standards for EU Interoperability.” WCC Group. https://web.archive.org/web/20230211102336/https://www.wcc-group.com/company/post/2021/02/22/high-quality-biographic-matching-umf-standards-for-eu-interoperability/.

Schmitt, Eric, and Michael S. Schmidt. 2013. “2 U.S. Agencies Added Boston Bomb Suspect to Watch Lists.” The New York Times, April. https://web.archive.org/web/20210513103658/https://www.nytimes.com/2013/04/25/us/tamerlan-tsarnaev-bomb-suspect-was-on-watch-lists.html.

Scott, James C. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven; London: Yale University Press.

Sengoopta, Chandak. 2004. Imprint of the Raj: How Fingerprinting Was Born in Colonial India. London: Pan.

Shankar, Kalpana, David Hakken, and Carsten Østerlund. 2017. “Rethinking Documents.” In The Handbook of Science and Technology Studies, edited by Ulrike Felt, Rayvon Fouché, Clark A. Miller, and Laurel Smith-Doerr, Fourth, 59–85. Cambridge, Mass.; London, Eng.: The MIT Press.

Shore, Cris, Susan Wright, and Davide Però, eds. 2011. Policy Worlds: Anthropology and the Analysis of Contemporary Power. EASA Series. New York: Berghahn Books.

Shove, Elizabeth. 2016. “Matters of Practice.” In The Nexus of Practices: Connections, Constellations, Practitioners, edited by Allison Hui, Theodore Schatzki, and Elizabeth Shove, 155–68. London & New York: Routledge. https://doi.org/10.4324/9781315560816.

Shove, Elizabeth, Mika Pantzar, and Matt Watson. 2012. The Dynamics of Social Practice: Everyday Life and How It Changes. Thousand Oaks, CA: SAGE Publications Ltd.

Shove, Elizabeth, Matt Watson, and Nicola Spurling. 2015. “Conceptualizing Connections: Energy Demand, Infrastructures and Social Practices.” Edited by Tracey Skillington. European Journal of Social Theory 18 (3): 274–87. https://doi.org/10.1177/1368431015579964.

Silvast, Antti, and Mikko J. Virtanen. 2023. “On Theory-Methods Packages in Science and Technology Studies.” Science, Technology, & Human Values 48 (1): 167–89. https://doi.org/10.1177/01622439211040241.

Skinner, David. 2018. “Race, Racism and Identification in the Era of Technosecurity.” Science as Culture 29 (1): 77–99. https://doi.org/10.1080/09505431.2018.1523887.

Snellen, Ignace. 2002. “Electronic Governance: Implications for Citizens, Politicians and Public Servants.” International Review of Administrative Sciences 68 (2): 183–98. https://doi.org/10.1177/0020852302682002.

Soysüren, Ibrahim, and Mihaela Nedelcu. 2022. “European Instruments for the Deportation of Foreigners and Their Uses by France and Switzerland: The Application of the Dublin III Regulation and Eurodac.” Journal of Ethnic and Migration Studies 48 (8): 1927–43. https://doi.org/10.1080/1369183X.2020.1796278.

Sparke, Matthew B. 2006. “A Neoliberal Nexus: Economy, Security and the Biopolitics of Citizenship on the Border.” Political Geography 25 (2): 151–80. https://doi.org/10.1016/j.polgeo.2005.10.002.

Squire, Vicki, ed. 2010. The Contested Politics of Mobility: Borderzones and Irregularity. London: Routledge. https://doi.org/10.4324/9780203839829.

Star, Susan Leigh. 1999. “The Ethnography of Infrastructure.” American Behavioral Scientist 43 (3): 377–91. https://doi.org/10.1177/00027649921955326.

Star, Susan Leigh, and Karen Ruhleder. 1996. “Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces.” Information Systems Research 7 (1): 111–34. https://doi.org/10.1287/isre.7.1.111.

Steinbock, Daniel J. n.d. “Data Matching, Data Mining, and Due Process.” Georgia Law Review 40: 1. https://heinonline.org/HOL/Page?handle=hein.journals/geolr40&id=21&div=&collection=.

Strange, Michael, Vicki Squire, and Anna Lundberg. 2017. “Irregular Migration Struggles and Active Subjects of Trans-Border Politics: New Research Strategies for Interrogating the Agency of the Marginalised.” Politics 37 (3): 243–53. https://doi.org/10.1177/0263395717715856.

Stumpf, Juliet. 2006. “The Crimmigration Crisis: Immigrants, Crime, and Sovereign Power.” American University Law Review 56 (2): 367–419.

Suchman, Lucy. 2007. Human-Machine Reconfigurations: Plans and Situated Actions. Second Edition. Learning in Doing: Social, Cognitive and Computational Perspectives. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511808418.

———. 1993. “Do Categories Have Politics?” Computer Supported Cooperative Work (CSCW) 2 (3): 177–90. https://doi.org/10.1007/BF00749015.

———. 2020. “Algorithmic Warfare and the Reinvention of Accuracy.” Critical Studies on Security 8 (2): 175–87. https://doi.org/10.1080/21624887.2020.1760587.

Suchman, Lucy, Karolina Follis, and Jutta Weber. 2017. “Tracking and Targeting: Sociotechnologies of (in)Security.” Science, Technology, & Human Values 42 (6): 983–1002. https://doi.org/10.1177/0162243917731524.

Sweeney, Shelley. 2008. “The Ambiguous Origins of the Archival Principle of "Provenance".” Libraries & the Cultural Record 43 (2): 193–213. https://www.jstor.org/stable/25549475.

SWIFT. 2018. “Simplify the Complex World of Sanctions Screening: What Do Screening Activities Cover?” http://web.archive.org/web/20220226233517/https://www.swift.com/news-events/news/helping-simplify-complex-world-sanctions-screening.

———. 2021. “Name Screening: Fulfil Your Customer Due Diligence, Maintain Accurate Customer Risk Profiles and Mitigate Business and Reputational Risks.” Factsheet. http://web.archive.org/web/20230415104752/https://www.swift.com/swift-resource/250436/download.

Talburt, John R. 2013. “Special Issue on Entity Resolution Overview: The Criticality of Entity Resolution in Data and Information Quality.” Journal of Data and Information Quality 4 (2): 6:1–6:2. https://doi.org/10.1145/2435221.2435222.

Taureck, Rita. 2006. “Securitization Theory and Securitization Studies.” Journal of International Relations and Development 9 (1): 53–61. https://doi.org/10.1057/palgrave.jird.1800072.

Thales Group. 2021. “DHS’s Automated Biometric Identification System IDENT – the Heart of Biometric Visitor Identification in the USA.” Thales Group. http://web.archive.org/web/20230509140409/https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/ident-automated-biometric-identification-system.

Thomer, Andrea K, and Karen M Wickett. 2020. “Relational Data Paradigms: What Do We Learn by Taking the Materiality of Databases Seriously?” Big Data & Society 7 (1): 1–16. https://doi.org/10.1177/2053951720934838.

Timmermans, Stefan, and Steven Epstein. 2010. “A World of Standards but Not a Standard World: Toward a Sociology of Standards and Standardization.” Annual Review of Sociology 36: 69–89. https://doi.org/10.1146/annurev.soc.012809.102629.

Torpey, John C. 2018. The Invention of the Passport: Surveillance, Citizenship and the State. Second. Cambridge Studies in Law and Society. New York, NY; Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/9781108664271.

Trauttmansdorff, Paul. 2022. “The Fabrication of a Necessary Policy Fiction: The Interoperability ‘Solution’ for Biometric Borders.” Critical Policy Studies, November. https://doi.org/10.1080/19460171.2022.2147851.

Trauttmansdorff, Paul, and Ulrike Felt. 2023. “Between Infrastructural Experimentation and Collective Imagination: The Digital Transformation of the EU Border Regime.” Science, Technology, & Human Values 48 (3): 635–62. https://doi.org/10.1177/01622439211057523.

Tsianos, Vassilis, and Serhat Karakayali. 2010. “Transnational Migration and the Emergence of the European Border Regime: An Ethnographic Analysis.” European Journal of Social Theory 13 (3): 373–87. https://doi.org/10.1177/1368431010371761.

Valdivia, Ana, Claudia Aradau, Tobias Blanke, and Sarah Perret. 2022. “Neither Opaque nor Transparent: A Transdisciplinary Methodology to Investigate Datafication at the EU Borders.” Big Data & Society 9 (2): 1–17. https://doi.org/10.1177/20539517221124586.

van der Ploeg, Irma. 1999. “The Illegal Body: ‘Eurodac’ and the Politics of Biometric Identification.” Ethics and Information Technology 1 (4): 295–302. https://doi.org/10.1023/A:1010064613240.

Van Rossem, Wouter. 2021. “Ontology-Explorer.” Zenodo. https://doi.org/10.5281/zenodo.4899316.

Van Rossem, Wouter, and Annalisa Pelizza. 2022. “The Ontology Explorer: A Method to Make Visible Data Infrastructures for Population Management.” Big Data & Society 9 (1): 1–18. https://doi.org/10.1177/20539517221104087.

Venturini, Tommaso, Mathieu Jacomy, and Pablo Jensen. 2021. “What Do We See When We Look at Networks: Visual Network Analysis, Relational Ambiguity, and Force-Directed Layouts.” Big Data & Society 8 (1): 1–16. https://doi.org/10.1177/20539517211018488.

Wæver, Ole, Barry Buzan, and David Carlton, eds. 1993. Identity, Migration and the New Security Agenda in Europe. New York: St. Martin’s Press.

Walt, Stephen M. 2017. “Realism and Security.” Oxford Research Encyclopedia of International Studies, December. https://doi.org/10.1093/acrefore/9780190846626.013.286.

Walters, William. 2014. “Drone Strikes, Dingpolitik and Beyond: Furthering the Debate on Materiality and Security.” Security Dialogue 45 (2): 101–18. https://doi.org/10.1177/0967010613519162.

WCC. 2002. “Annual Report 2002.” Amstelveen, The Netherlands: Went Computing Consultancy Group B.V. https://web.archive.org/web/20050121083505if_/http://www.wcc.nl/doc/WCCGROUP_2002.pdf.

———. 2003. “Annual Report 2003.” Amstelveen, The Netherlands: Went Computing Consultancy Group B.V. https://web.archive.org/web/20050121093827if_/http://www.wcc.nl/doc/WCCGROUP_2003.pdf.

———. 2009a. “HSPD-24 White Paper Now Available from WCC Smart Search & Match.” Security Info Watch. http://web.archive.org/web/20220806035706/https://www.securityinfowatch.com/home/news/10492664/hspd24-white-paper-now-available-from-wcc-smart-search-match.

———. 2009b. “Meeting the Challenges of HSDP-24: A Layered Approach to Accurate Real Time Identification.” White Paper. WCC Smart Search & Match.

Weltevrede, E. J. T. 2016. “Repurposing Digital Methods: The Research Affordances of Platforms and Engines.” PhD thesis, Universiteit van Amsterdam. https://hdl.handle.net/11245/1.505660.

Wendt, Alexander. n.d. “Anarchy Is What States Make of It: The Social Construction of Power Politics.” International Organization 46 (2): 391–425. Accessed April 1, 2023. https://doi.org/10.1017/S0020818300027764.

Wigand, Rolf T. 2020. “Whatever Happened to Disintermediation?” Electronic Markets 30 (1): 39–47. https://doi.org/10.1007/s12525-019-00389-0.

Williams, Robin, and Neil Pollock. 2012. “Moving Beyond the Single Site Implementation Study: How (and Why) We Should Study the Biography of Packaged Enterprise Solutions.” Information Systems Research 23 (1): 1–22. https://doi.org/10.1287/isre.1110.0352.

Winkler, William E. 2014. “Matching and Record Linkage.” WIREs Computational Statistics 6 (5): 313–25. https://doi.org/10.1002/wics.1317.

Winter, Tom. 2014. “Russia Warned U.S. About Tsarnaev, but Spelling Issue Let Him Escape.” NBC News, March. https://web.archive.org/web/20210330213852if_/https://www.nbcnews.com/storyline/boston-bombing-anniversary/russia-warned-u-s-about-tsarnaev-spelling-issue-let-him-n60836.

Woolgar, Steve. 1990. “Configuring the User: The Case of Usability Trials.” The Sociological Review 38 (S1): 58–99. https://doi.org/10.1111/j.1467-954X.1990.tb03349.x.

Zampagni, Francesca. 2016. “Unpacking the Schengen Visa Regime: A Study on Bureaucrats and Discretion in an Italian Consulate.” Journal of Borderlands Studies 31 (2): 251–66. https://doi.org/10.1080/08865655.2016.1174605.

Zech, John, Gregg Husk, Thomas Moore, and Jason S. Shapiro. 2016. “Measuring the Degree of Unmatched Patient Records in a Health Information Exchange Using Exact Matching.” Applied Clinical Informatics 7 (2): 330–40. https://doi.org/10.4338/ACI-2015-11-RA-0158.

Zijderveld, Marianne, Willem Ridderhof, and Marco Brattinga. 2013. “Basis start architectuur architectuur van de vreemdelingenketen: kennis delen, informatie gebruiken, samen doen.” Den Haag: Ministerie van Binnenlandse Zaken. http://web.archive.org/web/20220901074647/https://www.digitaleoverheid.nl/wp-content/uploads/sites/8/2017/01/architectuur-van-de-vreemdelingenketen.pdf.

Zuboff, Shoshana. 2015. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.” Journal of Information Technology 30 (1): 75–89. https://doi.org/10.1057/jit.2015.5.

Zureik, Elia, and Karen Hindle. 2004. “Governance, Security and Technology: The Case of Biometrics.” Studies in Political Economy 73 (1): 113–37. https://doi.org/10.1080/19187033.2004.11675154.

Zureik, Elia, and Mark B. Salter, eds. 2005. Global Surveillance and Policing: Borders, Security, Identity. Devon: Willan Publishing.