000 | 03634namaa2200625uu 4500 | ||
---|---|---|---|
001 | oapen37701 | ||
003 | oapen | ||
005 | 20231220125940.0 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 200512s2019 xx |||||o ||| 0|eng d | ||
040 |
_aoapen _coapen |
||
041 | 0 | _aeng | |
042 | _adc | ||
072 | 7 |
_aHBW _2bicssc |
|
072 | 7 |
_aJFM _2bicssc |
|
072 | 7 |
_aJHBC _2bicssc |
|
072 | 7 |
_aJPQB _2bicssc |
|
072 | 7 |
_aJPS _2bicssc |
|
072 | 7 |
_aJPSH _2bicssc |
|
072 | 7 |
_aJPV _2bicssc |
|
072 | 7 |
_aJW _2bicssc |
|
100 | 1 |
_aBosma, Esm _4auth _91646705 |
|
245 | 1 | 0 |
_aChapter Introduction _bNavigating secrecy in security research |
260 |
_bTaylor & Francis _c2019 |
||
300 | _a1 electronic resource (28 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
506 | 0 |
_aOpen Access _fUnrestricted online access _2star |
|
520 | _aThis book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/ _2cc _uhttps://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
546 | _aEnglish | ||
650 | 7 |
_aCentral government policies _2bicssc |
|
650 | 7 |
_aEspionage & secret services _2bicssc _9942944 |
|
650 | 7 |
_aEthical issues & debates _2bicssc _9912662 |
|
650 | 7 |
_aInternational relations _2bicssc |
|
650 | 7 |
_aMilitary history _2bicssc _946946 |
|
650 | 7 |
_aPolitical control & freedoms _2bicssc _9928559 |
|
650 | 7 |
_aSocial research & statistics _2bicssc _9865085 |
|
650 | 7 |
_aWarfare & defence _2bicssc _9942943 |
|
653 | _afieldwork | ||
653 | _aguide | ||
653 | _amethods | ||
653 | _aqualitative | ||
653 | _aresearch | ||
653 | _asecrecy | ||
653 | _asecurity | ||
700 | 1 |
_aDe Goede, Marieke _4auth _9433283 |
|
700 | 1 |
_aPallister-Wilkins, Polly _4auth _91590594 |
|
773 | 1 |
_tSecrecy and Methods in Security Research _7nnaa _oOAPEN Library UUID: e2dd3aac-15e6-4c27-8fc0-93e20025c51a |
|
793 | 0 | _aOAPEN Library. | |
856 | 4 | 0 |
_uhttp://library.oapen.org/handle/20.500.12657/37701 _70 _zOpen Access: OAPEN Library: description of the publication |
856 | 4 | 0 |
_uhttps://library.oapen.org/bitstream/id/3136a4d6-396c-43a3-a4cf-ad7aecd1b4c3/9780367027230_oaIntroduction.pdf _70 _zOpen Access: OAPEN Library, download the publication |
999 |
_c3062450 _d3062450 |