Beauchamp, P. (2017). BYOD in the workplace: Benefits, risks and insurance implications. Retrieved from

Behrent, M. C. (2013). Foucault and Technology. History and Technology, 29(1), 54-104.

Brackeen, B. (2018). Facial recognition software is not ready for use by law enforcement. Retrieved from

Caballero-Anthony, M. (2015). An Introduction to Non-Traditional Security Studies: A Transnational Approach. London: SAGE.

Cisco. (2018). Wireless and mobility. Bring your own device (BYOD). Retrieved from

Foucault, M. (1988). Technologies of the Self. Lectures at University of Vermont Oct. 1982, in Technologies of the Self, 16-49.

Haq, M. u. (1994). New imperatives of human security. New York, N.Y: United Nations Development Programme.

International Energy Agency. (2019). Retrieved from

Jerard, J. (2016). Daesh and the alchemy of strategy: Southeast Asia threat and responses by the Region and ASEAN. In Rohan Gunaratna et al (Ed.), Panorama: Insights into Asian and European affairs countering Daesh extremism – European and Asian responses. Singapore: KAS Panorama. Retrieved from

Kleyman, B. (2013). What Next-Gen security looks like. Retrieved from

Mushrush, L. (2017). Rise of technology in food safety. Retrieved from

National terrorist financing risk assessment. (2018).

Schuurman, E., & Vriend, J. (2003). Faith and hope in technology. Toronto: Clements Pub..

Schuurman, E., & Morton, H. D. (1980). Technology and the future: a philosophical challenge. Toronto: Wedge Publishing Foundation.

U. S. Department of the Treasury. (2018). National Terrorist Financing Risk Assessment. United States. Department of the Treasury. Retrieved from

Xie, K. (2018). Executive Insights: The Third Generation of Security is Here. Retrieved from