Chapter Introduction Navigating secrecy in security research

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a par...

Full description

Saved in:
Bibliographic Details
Main Author: Bosma, Esmé (auth)
Other Authors: De Goede, Marieke (auth), Pallister-Wilkins, Polly (auth)
Format: Electronic Book Chapter
Language:English
Published: Taylor & Francis 2019
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_37310
005 20210210
003 oapen
006 m o d
007 cr|mn|---annan
008 20210210s2019 xx |||||o ||| 0|eng d
020 |a 9780367027247 
020 |a 9780429398186 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
072 7 |a HBW  |2 bicssc 
072 7 |a JPS  |2 bicssc 
072 7 |a JPV  |2 bicssc 
072 7 |a JPSH  |2 bicssc 
072 7 |a JW  |2 bicssc 
072 7 |a JFM  |2 bicssc 
072 7 |a JPQB  |2 bicssc 
072 7 |a JHBC  |2 bicssc 
100 1 |a Bosma, Esmé  |4 auth 
700 1 |a De Goede, Marieke  |4 auth 
700 1 |a Pallister-Wilkins, Polly  |4 auth 
245 1 0 |a Chapter Introduction  |b Navigating secrecy in security research 
260 |b Taylor & Francis  |c 2019 
300 |a 1 electronic resource (28 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a Military history  |2 bicssc 
650 7 |a International relations  |2 bicssc 
650 7 |a Political control & freedoms  |2 bicssc 
650 7 |a Espionage & secret services  |2 bicssc 
650 7 |a Warfare & defence  |2 bicssc 
650 7 |a Ethical issues & debates  |2 bicssc 
650 7 |a Central government policies  |2 bicssc 
650 7 |a Social research & statistics  |2 bicssc 
653 |a fieldwork 
653 |a guide 
653 |a methods 
653 |a qualitative 
653 |a research 
653 |a secrecy 
653 |a security 
773 1 0 |t Secrecy and Methods in Security Research  |7 nnaa  |o OAPEN Library UUID: b6e1f3d7-c29c-42e2-9fd6-9597699444b2 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/37701/1/9780367027230_oaIntroduction.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/37310  |7 0  |z DOAB: description of the publication