| 000 | 03755namaa2200685uu 4500 | ||
|---|---|---|---|
| 001 | oapen37700 | ||
| 003 | oapen | ||
| 005 | 20251217011851.0 | ||
| 006 | a||||fo|||||||||0| | ||
| 007 | cr|mn|---annan | ||
| 008 | 240424s2019a||||fo|||||||||0|eng d | ||
| 014 |
_a1105738903 _bOCoLC |
||
| 020 | _a9780367027247 | ||
| 035 | _a(OCoLC)1105738903 | ||
| 040 |
_aoapen _coapen |
||
| 041 | 0 | _aeng | |
| 042 | _adc | ||
| 072 | 7 |
_aJ _2thema |
|
| 072 | 7 |
_aJP _2thema |
|
| 072 | 7 |
_aJPQ _2thema |
|
| 072 | 7 |
_aJPQB _2thema |
|
| 100 | 1 |
_aBosma, Esmé _4aut |
|
| 245 | 1 | 0 |
_aSecrecy and Methods in Security Research _bA Guide to Qualitative Fieldwork |
| 260 |
_bTaylor & Francis _bRoutledge [Imprint] _c2019 |
||
| 300 | _a1 online resource (312 p.) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 506 | 0 |
_aFree-to-read _fUnrestricted online access _2star |
|
| 520 | _aThis book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. | ||
| 540 |
_aOpen licence _0https://oapen.org/article/rights |
||
| 546 | _aeng | ||
| 650 | 0 |
_aConfidential communications _xResearch _xMethodology. |
|
| 650 | 0 |
_aOfficial secrets _xResearch _xMethodology. |
|
| 650 | 0 | _aSecrecy. | |
| 650 | 0 | _aSecret (Philosophy) | |
| 650 | 0 |
_aSecurity systems _xResearch _xMethodology. |
|
| 650 | 6 |
_aSecret professionnel _xRecherche _xMéthodologie. |
|
| 650 | 6 | _aSecret. | |
| 650 | 6 |
_aSecrets d'État _xRecherche _xMéthodologie. |
|
| 650 | 6 |
_aSystèmes de sécurité _xRecherche _xMéthodologie. |
|
| 650 | 7 |
_aCentral / national / federal government policies _2thema |
|
| 650 | 7 |
_aCentral / national / federal government _2thema |
|
| 650 | 7 |
_aPOLITICAL SCIENCE _xPolitical Freedom & Security _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aPOLITICAL SCIENCE _xPolitical Freedom & Security _xInternational Security. _2bisacsh |
|
| 650 | 7 |
_aPolitics and government _2thema |
|
| 650 | 7 |
_aSecrecy _2fast |
|
| 650 | 7 |
_aSecret (Philosophy) _2fast |
|
| 650 | 7 |
_aSOCIAL SCIENCE _xMethodology. _2bisacsh |
|
| 650 | 7 |
_aSociety and Social Sciences _2thema |
|
| 653 | _afieldwork | ||
| 653 | _aguide | ||
| 653 | _asecurity | ||
| 653 | _asecurity research | ||
| 700 | 1 |
_aBosma, Esmé _4edt |
|
| 700 | 1 |
_aDe Goede, Marieke _4edt |
|
| 700 | 1 |
_aPallister-Wilkins, Polly _4edt |
|
| 793 | 0 | _aOAPEN Library. | |
| 856 | 4 | 0 |
_uhttps://library.oapen.org/handle/20.500.12657/37700 _zFree-to-read: OAPEN Library/DOAB: description of the publication _70 |
| 999 |
_c37165 _d37165 |
||