000 03634namaa2200625uu 4500
001 oapen37701
003 oapen
005 20231220125940.0
006 m o d
007 cr|mn|---annan
008 200512s2019 xx |||||o ||| 0|eng d
040 _aoapen
_coapen
041 0 _aeng
042 _adc
072 7 _aHBW
_2bicssc
072 7 _aJFM
_2bicssc
072 7 _aJHBC
_2bicssc
072 7 _aJPQB
_2bicssc
072 7 _aJPS
_2bicssc
072 7 _aJPSH
_2bicssc
072 7 _aJPV
_2bicssc
072 7 _aJW
_2bicssc
100 1 _aBosma, Esm
_4auth
_91646705
245 1 0 _aChapter Introduction
_bNavigating secrecy in security research
260 _bTaylor & Francis
_c2019
300 _a1 electronic resource (28 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
506 0 _aOpen Access
_fUnrestricted online access
_2star
520 _aThis book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general.
540 _aCreative Commons
_fhttps://creativecommons.org/licenses/by-nc-nd/4.0/
_2cc
_uhttps://creativecommons.org/licenses/by-nc-nd/4.0/
546 _aEnglish
650 7 _aCentral government policies
_2bicssc
650 7 _aEspionage & secret services
_2bicssc
_9942944
650 7 _aEthical issues & debates
_2bicssc
_9912662
650 7 _aInternational relations
_2bicssc
650 7 _aMilitary history
_2bicssc
_946946
650 7 _aPolitical control & freedoms
_2bicssc
_9928559
650 7 _aSocial research & statistics
_2bicssc
_9865085
650 7 _aWarfare & defence
_2bicssc
_9942943
653 _afieldwork
653 _aguide
653 _amethods
653 _aqualitative
653 _aresearch
653 _asecrecy
653 _asecurity
700 1 _aDe Goede, Marieke
_4auth
_9433283
700 1 _aPallister-Wilkins, Polly
_4auth
_91590594
773 1 _tSecrecy and Methods in Security Research
_7nnaa
_oOAPEN Library UUID: e2dd3aac-15e6-4c27-8fc0-93e20025c51a
793 0 _aOAPEN Library.
856 4 0 _uhttp://library.oapen.org/handle/20.500.12657/37701
_70
_zOpen Access: OAPEN Library: description of the publication
856 4 0 _uhttps://library.oapen.org/bitstream/id/3136a4d6-396c-43a3-a4cf-ad7aecd1b4c3/9780367027230_oaIntroduction.pdf
_70
_zOpen Access: OAPEN Library, download the publication
999 _c3062450
_d3062450