Secrecy and methods in security research : : a guide to qualitative fieldwork / / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a par...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | London ;, New York, New York : : Routledge,, [2020] ©2020 |
Year of Publication: | 2019 2020 |
Language: | English |
Physical Description: | 1 online resource (xvi, 312 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993554877604498 |
---|---|
ctrlnum |
(CKB)4100000009040105 (MiAaPQ)EBC5850116 (oapen)https://directory.doabooks.org/handle/20.500.12854/37310 (EXLCZ)994100000009040105 |
collection |
bib_alma |
record_format |
marc |
spelling |
Bosma, Esmé auth Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins. Taylor & Francis 2019 London ; New York, New York : Routledge, [2020] ©2020 1 online resource (xvi, 312 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on online resource; title from digital title page (viewed on December 2, 2020) This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. English Official secrets Research Methodology. Confidential communications Research Methodology. Security systems Research Methodology. Secrecy. fieldwork guide methods qualitative research secrecy security Goede, Marieke de, 1971- editor. Bosma, Esmé, editor. Pallister-Wilkins, Polly, editor. 0-367-02723-2 |
language |
English |
format |
eBook |
author |
Bosma, Esmé |
spellingShingle |
Bosma, Esmé Secrecy and methods in security research : a guide to qualitative fieldwork / |
author_facet |
Bosma, Esmé Goede, Marieke de, 1971- Bosma, Esmé, Pallister-Wilkins, Polly, |
author_variant |
e b eb |
author2 |
Goede, Marieke de, 1971- Bosma, Esmé, Pallister-Wilkins, Polly, |
author2_variant |
m d g md mdg e b eb p p w ppw |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_sort |
Bosma, Esmé |
title |
Secrecy and methods in security research : a guide to qualitative fieldwork / |
title_sub |
a guide to qualitative fieldwork / |
title_full |
Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins. |
title_fullStr |
Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins. |
title_full_unstemmed |
Secrecy and methods in security research : a guide to qualitative fieldwork / edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins. |
title_auth |
Secrecy and methods in security research : a guide to qualitative fieldwork / |
title_new |
Secrecy and methods in security research : |
title_sort |
secrecy and methods in security research : a guide to qualitative fieldwork / |
publisher |
Taylor & Francis Routledge, |
publishDate |
2019 2020 |
physical |
1 online resource (xvi, 312 pages) : illustrations |
isbn |
0-429-39818-2 0-429-67534-8 0-429-67535-6 0-367-02723-2 |
callnumber-first |
J - Political Science |
callnumber-subject |
JF - Public Administration |
callnumber-label |
JF1525 |
callnumber-sort |
JF 41525 S4 S437 42020 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
001 - Knowledge |
dewey-full |
001.433 |
dewey-sort |
11.433 |
dewey-raw |
001.433 |
dewey-search |
001.433 |
work_keys_str_mv |
AT bosmaesme secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork AT goedemariekede secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork AT pallisterwilkinspolly secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork |
status_str |
c |
ids_txt_mv |
(CKB)4100000009040105 (MiAaPQ)EBC5850116 (oapen)https://directory.doabooks.org/handle/20.500.12854/37310 (EXLCZ)994100000009040105 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Secrecy and methods in security research : a guide to qualitative fieldwork / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1764994443606228992 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01545cam a2200409 i 4500</leader><controlfield tag="001">993554877604498</controlfield><controlfield tag="005">20201202200723.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">190918t20202020enka o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-39818-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-67534-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-67535-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000009040105</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5850116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/37310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000009040105</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.S4</subfield><subfield code="b">.S437 2020</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">001.433</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bosma, Esmé</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Secrecy and methods in security research :</subfield><subfield code="b">a guide to qualitative fieldwork /</subfield><subfield code="c">edited by Marieke de Goede, Esmé Bosma, Polly Pallister-Wilkins.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor & Francis</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ;</subfield><subfield code="a">New York, New York :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 312 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on December 2, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Official secrets</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security systems</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Secrecy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fieldwork</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">guide</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">methods</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">qualitative</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">research</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secrecy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goede, Marieke de,</subfield><subfield code="d">1971-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosma, Esmé,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pallister-Wilkins, Polly,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-367-02723-2</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 03:41:07 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-08-31 21:59:51 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338388010004498&Force_direct=true</subfield><subfield code="Z">5338388010004498</subfield><subfield code="8">5338388010004498</subfield></datafield></record></collection> |