Secrecy and methods in security research : : a guide to qualitative fieldwork / / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a par...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:London ;, New York, New York : : Routledge,, [2020]
©2020
Year of Publication:2019
2020
Language:English
Physical Description:1 online resource (xvi, 312 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993554877604498
ctrlnum (CKB)4100000009040105
(MiAaPQ)EBC5850116
(oapen)https://directory.doabooks.org/handle/20.500.12854/37310
(EXLCZ)994100000009040105
collection bib_alma
record_format marc
spelling Bosma, Esmé auth
Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.
Taylor & Francis 2019
London ; New York, New York : Routledge, [2020]
©2020
1 online resource (xvi, 312 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on online resource; title from digital title page (viewed on December 2, 2020)
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general.
English
Official secrets Research Methodology.
Confidential communications Research Methodology.
Security systems Research Methodology.
Secrecy.
fieldwork
guide
methods
qualitative
research
secrecy
security
Goede, Marieke de, 1971- editor.
Bosma, Esmé, editor.
Pallister-Wilkins, Polly, editor.
0-367-02723-2
language English
format eBook
author Bosma, Esmé
spellingShingle Bosma, Esmé
Secrecy and methods in security research : a guide to qualitative fieldwork /
author_facet Bosma, Esmé
Goede, Marieke de, 1971-
Bosma, Esmé,
Pallister-Wilkins, Polly,
author_variant e b eb
author2 Goede, Marieke de, 1971-
Bosma, Esmé,
Pallister-Wilkins, Polly,
author2_variant m d g md mdg
e b eb
p p w ppw
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Bosma, Esmé
title Secrecy and methods in security research : a guide to qualitative fieldwork /
title_sub a guide to qualitative fieldwork /
title_full Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.
title_fullStr Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.
title_full_unstemmed Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.
title_auth Secrecy and methods in security research : a guide to qualitative fieldwork /
title_new Secrecy and methods in security research :
title_sort secrecy and methods in security research : a guide to qualitative fieldwork /
publisher Taylor & Francis
Routledge,
publishDate 2019
2020
physical 1 online resource (xvi, 312 pages) : illustrations
isbn 0-429-39818-2
0-429-67534-8
0-429-67535-6
0-367-02723-2
callnumber-first J - Political Science
callnumber-subject JF - Public Administration
callnumber-label JF1525
callnumber-sort JF 41525 S4 S437 42020
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 001 - Knowledge
dewey-full 001.433
dewey-sort 11.433
dewey-raw 001.433
dewey-search 001.433
work_keys_str_mv AT bosmaesme secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork
AT goedemariekede secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork
AT pallisterwilkinspolly secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork
status_str c
ids_txt_mv (CKB)4100000009040105
(MiAaPQ)EBC5850116
(oapen)https://directory.doabooks.org/handle/20.500.12854/37310
(EXLCZ)994100000009040105
carrierType_str_mv cr
is_hierarchy_title Secrecy and methods in security research : a guide to qualitative fieldwork /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1764994443606228992
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01545cam a2200409 i 4500</leader><controlfield tag="001">993554877604498</controlfield><controlfield tag="005">20201202200723.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">190918t20202020enka o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-39818-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-67534-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-67535-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000009040105</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5850116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/37310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000009040105</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.S4</subfield><subfield code="b">.S437 2020</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">001.433</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bosma, Esmé</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Secrecy and methods in security research :</subfield><subfield code="b">a guide to qualitative fieldwork /</subfield><subfield code="c">edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor &amp; Francis</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ;</subfield><subfield code="a">New York, New York :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 312 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on December 2, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Official secrets</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security systems</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Secrecy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fieldwork</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">guide</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">methods</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">qualitative</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">research</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secrecy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goede, Marieke de,</subfield><subfield code="d">1971-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosma, Esmé,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pallister-Wilkins, Polly,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-367-02723-2</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 03:41:07 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-08-31 21:59:51 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338388010004498&amp;Force_direct=true</subfield><subfield code="Z">5338388010004498</subfield><subfield code="8">5338388010004498</subfield></datafield></record></collection>