Jump to ContentJump to Main Navigation
Theory of the Border$
Users without a subscription are not able to see the full content.

Thomas Nail

Print publication date: 2016

Print ISBN-13: 9780190618643

Published to Oxford Scholarship Online: September 2016

DOI: 10.1093/acprof:oso/9780190618643.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 05 June 2020

The Checkpoint II

The Checkpoint II

Chapter:
(p.138) Chapter 6 The Checkpoint II
Source:
Theory of the Border
Author(s):

Thomas Nail

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190618643.003.0007

This chapter describes the other two major kinds of checkpoints: the security checkpoint and the information checkpoint. The security checkpoint is the defensive limit border that emerged in the modern period. While the police checkpoint offensively marches out into the streets to mark a division in the population between citizens and criminals, the security checkpoint protects, defends, and enforces the institutions that are defined and ordered by this border march. The third major type of modern border is the information checkpoint. In contrast to offensive police borders and defensive security borders, information borders have a unique boundary or binding function: they compel or bind social flows together as assemblages of data points. A data point is an isolated bit of social flow—a location, a name, a color, a date—that is used to divide and arrange the passage of social flows.

Keywords:   security, police, private property, information, data, checkpoint, passport

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .