| 000 | 03342naaaa2200541uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/37310 | ||
| 005 | 20220219185631.0 | ||
| 020 | _a9780367027247 | ||
| 020 | _a9780429398186 | ||
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aHBW _2bicssc |
|
| 072 | 7 |
_aJPS _2bicssc |
|
| 072 | 7 |
_aJPV _2bicssc |
|
| 072 | 7 |
_aJPSH _2bicssc |
|
| 072 | 7 |
_aJW _2bicssc |
|
| 072 | 7 |
_aJFM _2bicssc |
|
| 072 | 7 |
_aJPQB _2bicssc |
|
| 072 | 7 |
_aJHBC _2bicssc |
|
| 100 | 1 |
_aBosma, Esmé _4auth |
|
| 700 | 1 |
_aDe Goede, Marieke _4auth |
|
| 700 | 1 |
_aPallister-Wilkins, Polly _4auth |
|
| 245 | 1 | 0 | _aChapter Introduction : Navigating secrecy in security research |
| 260 |
_bTaylor & Francis _c2019 |
||
| 300 | _a1 electronic resource (28 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. | ||
| 540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aMilitary history _2bicssc |
|
| 650 | 7 |
_aInternational relations _2bicssc |
|
| 650 | 7 |
_aPolitical control & freedoms _2bicssc |
|
| 650 | 7 |
_aEspionage & secret services _2bicssc |
|
| 650 | 7 |
_aWarfare & defence _2bicssc |
|
| 650 | 7 |
_aEthical issues & debates _2bicssc |
|
| 650 | 7 |
_aCentral government policies _2bicssc |
|
| 650 | 7 |
_aSocial research & statistics _2bicssc |
|
| 653 | _afieldwork | ||
| 653 | _aguide | ||
| 653 | _amethods | ||
| 653 | _aqualitative | ||
| 653 | _aresearch | ||
| 653 | _asecrecy | ||
| 653 | _asecurity | ||
| 773 | 1 | 0 |
_0OAPEN Library ID: http://library.oapen.org/handle/20.500.12657/37701 _tSecrecy and Methods in Security Research _7nnaa |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/37701/1/9780367027230_oaIntroduction.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/37310 _70 _zDOAB: description of the publication |
| 999 |
_c36884 _d36884 |
||