Chapter Introduction Navigating secrecy in security research
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a par...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Taylor & Francis
2019
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_37310 | ||
005 | 20210210 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210210s2019 xx |||||o ||| 0|eng d | ||
020 | |a 9780367027247 | ||
020 | |a 9780429398186 | ||
040 | |a oapen |c oapen | ||
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a HBW |2 bicssc | |
072 | 7 | |a JPS |2 bicssc | |
072 | 7 | |a JPV |2 bicssc | |
072 | 7 | |a JPSH |2 bicssc | |
072 | 7 | |a JW |2 bicssc | |
072 | 7 | |a JFM |2 bicssc | |
072 | 7 | |a JPQB |2 bicssc | |
072 | 7 | |a JHBC |2 bicssc | |
100 | 1 | |a Bosma, Esmé |4 auth | |
700 | 1 | |a De Goede, Marieke |4 auth | |
700 | 1 | |a Pallister-Wilkins, Polly |4 auth | |
245 | 1 | 0 | |a Chapter Introduction |b Navigating secrecy in security research |
260 | |b Taylor & Francis |c 2019 | ||
300 | |a 1 electronic resource (28 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc-nd/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Military history |2 bicssc | |
650 | 7 | |a International relations |2 bicssc | |
650 | 7 | |a Political control & freedoms |2 bicssc | |
650 | 7 | |a Espionage & secret services |2 bicssc | |
650 | 7 | |a Warfare & defence |2 bicssc | |
650 | 7 | |a Ethical issues & debates |2 bicssc | |
650 | 7 | |a Central government policies |2 bicssc | |
650 | 7 | |a Social research & statistics |2 bicssc | |
653 | |a fieldwork | ||
653 | |a guide | ||
653 | |a methods | ||
653 | |a qualitative | ||
653 | |a research | ||
653 | |a secrecy | ||
653 | |a security | ||
773 | 1 | 0 | |t Secrecy and Methods in Security Research |7 nnaa |o OAPEN Library UUID: b6e1f3d7-c29c-42e2-9fd6-9597699444b2 |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/37701/1/9780367027230_oaIntroduction.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/37310 |7 0 |z DOAB: description of the publication |