Secrecy and Methods in Security Research (eBook, ePUB)
A Guide to Qualitative Fieldwork
Redaktion: De Goede, Marieke; Pallister-Wilkins, Polly; Bosma, Esmé
0,99 €
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
0,99 €
Als Download kaufen
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
0,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
Secrecy and Methods in Security Research (eBook, ePUB)
A Guide to Qualitative Fieldwork
Redaktion: De Goede, Marieke; Pallister-Wilkins, Polly; Bosma, Esmé
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.2MB
Andere Kunden interessierten sich auch für
- Secrecy and Methods in Security Research (eBook, PDF)0,99 €
- Research Methods in Critical Security Studies (eBook, ePUB)35,95 €
- Linda MonseesCrypto-Politics (eBook, ePUB)35,95 €
- Pak Nung WongTechno-Geopolitics (eBook, ePUB)39,95 €
- Noran Shafik FouadTheorising Cyber (In)Security (eBook, ePUB)41,95 €
- Mareile KaufmannResilience, Emergencies and the Internet (eBook, ePUB)42,95 €
- Research Methods in Defence Studies (eBook, ePUB)39,95 €
-
-
-
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 330
- Erscheinungstermin: 13. August 2019
- Englisch
- ISBN-13: 9780429675348
- Artikelnr.: 57471805
- Verlag: Taylor & Francis
- Seitenzahl: 330
- Erscheinungstermin: 13. August 2019
- Englisch
- ISBN-13: 9780429675348
- Artikelnr.: 57471805
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Marieke de Goede is Professor of Political Science at the University of Amsterdam. She is author of Speculative Security: the Politics of Pursuing Terrorist Monies and Associate Editor of Security Dialogue. She currently holds a Consolidator Grant of the European Research Council (ERC) called FOLLOW: Following the Money from Transaction to Trial. Esmé Bosma is a Doctoral Candidate at the Department of Political Science of the University of Amsterdam and a member of project FOLLOW, funded by the European Research Council. For her research project she has conducted field research inside and around banks in Europe to analyse counter terrorism financing practices by financial institutions. She has taught qualitative research methods to political science students and holds a master's degree in Political Science from the University of Amsterdam. Polly Pallister-Wilkins is an Assistant Professor in the Department of Political Science, at the University of Amsterdam. Her work has been published in Security Dialogue, Political Geography and International Political Sociology amongst others. She is a principal investigator in the European Union Horizon 2020 project 'ADMIGOV: Advancing Alternative Migration Governance' looking at issues of humanitarian protection in wider systems of migration governance.
Introduction: navigating secrecy in security research
Interlude: rigorous research in critical security studies
PART 1: Secrecy complexities; Section I: Secrecy
silence and obfuscation
1. The problem of access: site visits
selective disclosure
and freedom of information in qualitative security research
2. The state is the secret: for a relational approach to the study of border and mobility control in Europe
3. Postsecrecy and place: secrecy research amidst the ruins of an atomic weapons research facility
Section II: Access
confidentiality and trust
4. Navigating difficult terrain
5. Accessing lifeworlds: getting people to say the unsayable. 6. Research dilemmas in dangerous places
PART 2: Mapping secrecy
Section III: Reflexive methodologies
7. Writing secrecy
8. Gender
ethics and critique in researching security and secrecy
9. (In)visible security politics: reflections on photography and everyday security landscapes
Section IV: Ethnographies of technologies
10. The black box and its dis/contents: complications in algorithmic devices research
11. Multi-sited ethnography of digital security technologies
12. Researching the emergent technologies of state control: the court-martial of Chelsea Manning
PART 3: Research secrets
Section V: Critique and advocacy
13. Searching for the smoking gun? Methodology and modes of critique in the arms trade
14. Critical engagement when studying those you oppose
15. Secrecy vignettes
Section VI: Research ethics in practice
16. Research ethics at work: account-abilities in fieldworkon security
17. Material guides in ethically challenging fields: following deportation files
Index
Interlude: rigorous research in critical security studies
PART 1: Secrecy complexities; Section I: Secrecy
silence and obfuscation
1. The problem of access: site visits
selective disclosure
and freedom of information in qualitative security research
2. The state is the secret: for a relational approach to the study of border and mobility control in Europe
3. Postsecrecy and place: secrecy research amidst the ruins of an atomic weapons research facility
Section II: Access
confidentiality and trust
4. Navigating difficult terrain
5. Accessing lifeworlds: getting people to say the unsayable. 6. Research dilemmas in dangerous places
PART 2: Mapping secrecy
Section III: Reflexive methodologies
7. Writing secrecy
8. Gender
ethics and critique in researching security and secrecy
9. (In)visible security politics: reflections on photography and everyday security landscapes
Section IV: Ethnographies of technologies
10. The black box and its dis/contents: complications in algorithmic devices research
11. Multi-sited ethnography of digital security technologies
12. Researching the emergent technologies of state control: the court-martial of Chelsea Manning
PART 3: Research secrets
Section V: Critique and advocacy
13. Searching for the smoking gun? Methodology and modes of critique in the arms trade
14. Critical engagement when studying those you oppose
15. Secrecy vignettes
Section VI: Research ethics in practice
16. Research ethics at work: account-abilities in fieldworkon security
17. Material guides in ethically challenging fields: following deportation files
Index
Introduction: navigating secrecy in security research
Interlude: rigorous research in critical security studies
PART 1: Secrecy complexities; Section I: Secrecy
silence and obfuscation
1. The problem of access: site visits
selective disclosure
and freedom of information in qualitative security research
2. The state is the secret: for a relational approach to the study of border and mobility control in Europe
3. Postsecrecy and place: secrecy research amidst the ruins of an atomic weapons research facility
Section II: Access
confidentiality and trust
4. Navigating difficult terrain
5. Accessing lifeworlds: getting people to say the unsayable. 6. Research dilemmas in dangerous places
PART 2: Mapping secrecy
Section III: Reflexive methodologies
7. Writing secrecy
8. Gender
ethics and critique in researching security and secrecy
9. (In)visible security politics: reflections on photography and everyday security landscapes
Section IV: Ethnographies of technologies
10. The black box and its dis/contents: complications in algorithmic devices research
11. Multi-sited ethnography of digital security technologies
12. Researching the emergent technologies of state control: the court-martial of Chelsea Manning
PART 3: Research secrets
Section V: Critique and advocacy
13. Searching for the smoking gun? Methodology and modes of critique in the arms trade
14. Critical engagement when studying those you oppose
15. Secrecy vignettes
Section VI: Research ethics in practice
16. Research ethics at work: account-abilities in fieldworkon security
17. Material guides in ethically challenging fields: following deportation files
Index
Interlude: rigorous research in critical security studies
PART 1: Secrecy complexities; Section I: Secrecy
silence and obfuscation
1. The problem of access: site visits
selective disclosure
and freedom of information in qualitative security research
2. The state is the secret: for a relational approach to the study of border and mobility control in Europe
3. Postsecrecy and place: secrecy research amidst the ruins of an atomic weapons research facility
Section II: Access
confidentiality and trust
4. Navigating difficult terrain
5. Accessing lifeworlds: getting people to say the unsayable. 6. Research dilemmas in dangerous places
PART 2: Mapping secrecy
Section III: Reflexive methodologies
7. Writing secrecy
8. Gender
ethics and critique in researching security and secrecy
9. (In)visible security politics: reflections on photography and everyday security landscapes
Section IV: Ethnographies of technologies
10. The black box and its dis/contents: complications in algorithmic devices research
11. Multi-sited ethnography of digital security technologies
12. Researching the emergent technologies of state control: the court-martial of Chelsea Manning
PART 3: Research secrets
Section V: Critique and advocacy
13. Searching for the smoking gun? Methodology and modes of critique in the arms trade
14. Critical engagement when studying those you oppose
15. Secrecy vignettes
Section VI: Research ethics in practice
16. Research ethics at work: account-abilities in fieldworkon security
17. Material guides in ethically challenging fields: following deportation files
Index