References

Beauchamp, P. (2017). BYOD in the workplace: Benefits, risks and insurance implications. Retrieved from https://www.huffingtonpost.com/parker-beauchamp/byod-in-the-workplace-ben_b_10973342.html

Behrent, M. C. (2013). Foucault and Technology. History and Technology, 29(1), 54-104. https://doi.org/10.1080/07341512.2013.780351

Brackeen, B. (2018). Facial recognition software is not ready for use by law enforcement. Retrieved from https://techcrunch.com/2018/06/25/facial-recognition-software-is-not-ready-for-use-by-law-enforcement/

Caballero-Anthony, M. (2015). An Introduction to Non-Traditional Security Studies: A Transnational Approach. London: SAGE.

Cisco. (2018). Wireless and mobility. Bring your own device (BYOD). Retrieved from https://www.cisco.com/c/en/us/solutions/byod-smart-solution/overview.html

Foucault, M. (1988). Technologies of the Self. Lectures at University of Vermont Oct. 1982, in Technologies of the Self, 16-49.

Haq, M. u. (1994). New imperatives of human security. New York, N.Y: United Nations Development Programme.

International Energy Agency. (2019). Retrieved from https://www.iea.org/

Jerard, J. (2016). Daesh and the alchemy of strategy: Southeast Asia threat and responses by the Region and ASEAN. In Rohan Gunaratna et al (Ed.), Panorama: Insights into Asian and European affairs countering Daesh extremism – European and Asian responses. Singapore: KAS Panorama. Retrieved from https://www.kas.de/documents/252038/253252/7_dokument_dok_pdf_46739_2.pdf/65367300-b620-23c7-4a7e-0c4c97f42188?version=1.0&t=1539650125153

Kleyman, B. (2013). What Next-Gen security looks like. Retrieved from https://www.darkreading.com/mobile-security/what-next-gen-security-looks-like/v/d-id/1112909

Mushrush, L. (2017). Rise of technology in food safety. Retrieved from https://www.foodsafetynews.com/2017/11/the-rise-of-technology-in-food-safety/

National terrorist financing risk assessment. (2018).

Schuurman, E., & Vriend, J. (2003). Faith and hope in technology. Toronto: Clements Pub..

Schuurman, E., & Morton, H. D. (1980). Technology and the future: a philosophical challenge. Toronto: Wedge Publishing Foundation.

U. S. Department of the Treasury. (2018). National Terrorist Financing Risk Assessment. United States. Department of the Treasury. Retrieved from https://www.hsdl.org/?view&did=820001

Xie, K. (2018). Executive Insights: The Third Generation of Security is Here. Retrieved from https://www.fortinet.com/blog/business-and-technology/executive-insights--the-third-generation-of-security-is-here.html