Research methods in critical security studies an introduction
This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attentio...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge, Taylor & Francis Group
2023
|
Ausgabe: | Second edition |
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048985901 | ||
003 | DE-604 | ||
005 | 20240308 | ||
007 | t | ||
008 | 230602s2023 |||| 00||| eng d | ||
020 | |a 9780367621131 |c pbk |9 978-0-367-62113-1 | ||
020 | |a 9780367621193 |c hbk |9 978-0-367-62119-3 | ||
024 | 3 | |a 9780367621131 | |
035 | |a (OCoLC)1379755193 | ||
035 | |a (DE-599)BVBBV048985901 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-824 |a DE-384 | ||
084 | |a MR 2000 |0 (DE-625)123487: |2 rvk | ||
084 | |a MS 6440 |0 (DE-625)123755: |2 rvk | ||
084 | |a MK 1100 |0 (DE-625)123013: |2 rvk | ||
245 | 1 | 0 | |a Research methods in critical security studies |b an introduction |c edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd |
250 | |a Second edition | ||
264 | 1 | |a London ; New York |b Routledge, Taylor & Francis Group |c 2023 | |
300 | |a xvi, 314 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Aus dem Vorwort: "For this revised second edition, we have significantly updated some of the main sections, as well as expanded and diversified the contributors and themes" | ||
500 | |a 1. Introduction PART I: RESEARCH DESIGN 2. Research Design 3. Wondering as Research Attitude 4. Do You Have What It Takes? Accounting for Emotional and Material Capacities 5. Attuning to 'Mess': Not Presuming to Know Sanctuary 6. Engaging Collaborative Writing Critically 7. Accessing the ‘Field' of Terrorism Studies PART II: ETHNOGRAPHY 8. Ethnography 9. Travelling with Ethnography 10. Reflexive Inquiry 11. Listening to Migrant Stories: Considerations on Voice 12. Learning by Feeling: Emotional Intelligence and Fieldwork 13. Doing Sensitive Research: Fieldwork Ethics and Methodologies 14. 'China is the Safest Country in the World!’: Translation, Travel, and the Problem of Fit’ 15. Methods that Mirror Migration: Ethics and Entanglement En Route 16. Researching Security Decisions at the Border (or Serendipity and Secret Places) 17. ‘Dangerous' Fieldwork PART III: PRACTICES 18. Practices 19. The Practice of Writing 20. | ||
500 | |a - Researching Anti-Deportation: Socialization as Method 21. Expertise in the Aviation Security Field 22. Mapping Urban Security Practices 23. Following Turkish Border Practices PART IV: DISCOURSE 24. Discourse 25. Archives 26. Legislative Practices 27. Problems, Tools, and Creativity: A Pragmatist Approach to Emotion and Security 28. Keeping Secrets: Freedom of Information Requests and Critical Security Studies 29. Understanding Discourses of Arctic In/Security PART V: CORPOREAL 30. The Corporeal 31. Theorizing the Body in IR 32. Reading the Maternal Body as Political Event 33. Sonic Encounters in Critical Security Studies: Reflections from Ethnographic Fieldwork in Morocco 34. Thinking Like a Microbe PART VI: MATERIALITY 35. Materiality 36. Infrastructure 37. The F-35 38. Complicating Risk, Home and the Field: Security Research in Spaces of Control 39. Unlearning Research Methods: Stories of Attunement and Failure 40. Security Technologies and Criticality 41. | ||
500 | |a - Materiality and the Production of Objects PART VII: CONCLUSION 42. Emerging Trends | ||
520 | |a This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences | ||
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Internationale Politik | |
650 | 4 | |a International relations |x Social aspects |x Research |x Methodology | |
650 | 4 | |a Security, International |x Social aspects |x Research |x Methodology | |
650 | 0 | 7 | |a Forschungsmethode |0 (DE-588)4155046-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationale Politik |0 (DE-588)4072885-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 1 | |a Internationale Politik |0 (DE-588)4072885-7 |D s |
689 | 0 | 2 | |a Forschungsmethode |0 (DE-588)4155046-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Salter, Mark B. |d 1971- |0 (DE-588)1028359543 |4 edt | |
700 | 1 | |a Mutlu, Can E. |0 (DE-588)1050598229 |4 edt | |
700 | 1 | |a Frowd, Philippe M. |d ca. 20./21. Jh. |0 (DE-588)1165792494 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-003-10801-6 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034249329 |
Datensatz im Suchindex
_version_ | 1804185238282174464 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Salter, Mark B. 1971- Mutlu, Can E. Frowd, Philippe M. ca. 20./21. Jh |
author2_role | edt edt edt |
author2_variant | m b s mb mbs c e m ce cem p m f pm pmf |
author_GND | (DE-588)1028359543 (DE-588)1050598229 (DE-588)1165792494 |
author_facet | Salter, Mark B. 1971- Mutlu, Can E. Frowd, Philippe M. ca. 20./21. Jh |
building | Verbundindex |
bvnumber | BV048985901 |
classification_rvk | MR 2000 MS 6440 MK 1100 |
ctrlnum | (OCoLC)1379755193 (DE-599)BVBBV048985901 |
discipline | Soziologie Politologie |
discipline_str_mv | Soziologie Politologie |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05739nam a2200553 c 4500</leader><controlfield tag="001">BV048985901</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240308 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230602s2023 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367621131</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-367-62113-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367621193</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-367-62119-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780367621131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1379755193</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048985901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MR 2000</subfield><subfield code="0">(DE-625)123487:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 6440</subfield><subfield code="0">(DE-625)123755:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MK 1100</subfield><subfield code="0">(DE-625)123013:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research methods in critical security studies</subfield><subfield code="b">an introduction</subfield><subfield code="c">edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge, Taylor & Francis Group</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 314 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Aus dem Vorwort: "For this revised second edition, we have significantly updated some of the main sections, as well as expanded and diversified the contributors and themes"</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction PART I: RESEARCH DESIGN 2. Research Design 3. Wondering as Research Attitude 4. Do You Have What It Takes? Accounting for Emotional and Material Capacities 5. Attuning to 'Mess': Not Presuming to Know Sanctuary 6. Engaging Collaborative Writing Critically 7. Accessing the ‘Field' of Terrorism Studies PART II: ETHNOGRAPHY 8. Ethnography 9. Travelling with Ethnography 10. Reflexive Inquiry 11. Listening to Migrant Stories: Considerations on Voice 12. Learning by Feeling: Emotional Intelligence and Fieldwork 13. Doing Sensitive Research: Fieldwork Ethics and Methodologies 14. 'China is the Safest Country in the World!’: Translation, Travel, and the Problem of Fit’ 15. Methods that Mirror Migration: Ethics and Entanglement En Route 16. Researching Security Decisions at the Border (or Serendipity and Secret Places) 17. ‘Dangerous' Fieldwork PART III: PRACTICES 18. Practices 19. The Practice of Writing 20. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Researching Anti-Deportation: Socialization as Method 21. Expertise in the Aviation Security Field 22. Mapping Urban Security Practices 23. Following Turkish Border Practices PART IV: DISCOURSE 24. Discourse 25. Archives 26. Legislative Practices 27. Problems, Tools, and Creativity: A Pragmatist Approach to Emotion and Security 28. Keeping Secrets: Freedom of Information Requests and Critical Security Studies 29. Understanding Discourses of Arctic In/Security PART V: CORPOREAL 30. The Corporeal 31. Theorizing the Body in IR 32. Reading the Maternal Body as Political Event 33. Sonic Encounters in Critical Security Studies: Reflections from Ethnographic Fieldwork in Morocco 34. Thinking Like a Microbe PART VI: MATERIALITY 35. Materiality 36. Infrastructure 37. The F-35 38. Complicating Risk, Home and the Field: Security Research in Spaces of Control 39. Unlearning Research Methods: Stories of Attunement and Failure 40. Security Technologies and Criticality 41. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Materiality and the Production of Objects PART VII: CONCLUSION 42. Emerging Trends</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internationale Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International relations</subfield><subfield code="x">Social aspects</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield><subfield code="x">Social aspects</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Salter, Mark B.</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)1028359543</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mutlu, Can E.</subfield><subfield code="0">(DE-588)1050598229</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frowd, Philippe M.</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="0">(DE-588)1165792494</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-003-10801-6</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034249329</subfield></datafield></record></collection> |
id | DE-604.BV048985901 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:06:03Z |
indexdate | 2024-07-10T09:52:03Z |
institution | BVB |
isbn | 9780367621131 9780367621193 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034249329 |
oclc_num | 1379755193 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-824 DE-384 |
owner_facet | DE-19 DE-BY-UBM DE-824 DE-384 |
physical | xvi, 314 Seiten |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Routledge, Taylor & Francis Group |
record_format | marc |
spelling | Research methods in critical security studies an introduction edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd Second edition London ; New York Routledge, Taylor & Francis Group 2023 xvi, 314 Seiten txt rdacontent n rdamedia nc rdacarrier Aus dem Vorwort: "For this revised second edition, we have significantly updated some of the main sections, as well as expanded and diversified the contributors and themes" 1. Introduction PART I: RESEARCH DESIGN 2. Research Design 3. Wondering as Research Attitude 4. Do You Have What It Takes? Accounting for Emotional and Material Capacities 5. Attuning to 'Mess': Not Presuming to Know Sanctuary 6. Engaging Collaborative Writing Critically 7. Accessing the ‘Field' of Terrorism Studies PART II: ETHNOGRAPHY 8. Ethnography 9. Travelling with Ethnography 10. Reflexive Inquiry 11. Listening to Migrant Stories: Considerations on Voice 12. Learning by Feeling: Emotional Intelligence and Fieldwork 13. Doing Sensitive Research: Fieldwork Ethics and Methodologies 14. 'China is the Safest Country in the World!’: Translation, Travel, and the Problem of Fit’ 15. Methods that Mirror Migration: Ethics and Entanglement En Route 16. Researching Security Decisions at the Border (or Serendipity and Secret Places) 17. ‘Dangerous' Fieldwork PART III: PRACTICES 18. Practices 19. The Practice of Writing 20. - Researching Anti-Deportation: Socialization as Method 21. Expertise in the Aviation Security Field 22. Mapping Urban Security Practices 23. Following Turkish Border Practices PART IV: DISCOURSE 24. Discourse 25. Archives 26. Legislative Practices 27. Problems, Tools, and Creativity: A Pragmatist Approach to Emotion and Security 28. Keeping Secrets: Freedom of Information Requests and Critical Security Studies 29. Understanding Discourses of Arctic In/Security PART V: CORPOREAL 30. The Corporeal 31. Theorizing the Body in IR 32. Reading the Maternal Body as Political Event 33. Sonic Encounters in Critical Security Studies: Reflections from Ethnographic Fieldwork in Morocco 34. Thinking Like a Microbe PART VI: MATERIALITY 35. Materiality 36. Infrastructure 37. The F-35 38. Complicating Risk, Home and the Field: Security Research in Spaces of Control 39. Unlearning Research Methods: Stories of Attunement and Failure 40. Security Technologies and Criticality 41. - Materiality and the Production of Objects PART VII: CONCLUSION 42. Emerging Trends This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences Gesellschaft Internationale Politik International relations Social aspects Research Methodology Security, International Social aspects Research Methodology Forschungsmethode (DE-588)4155046-8 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Internationale Politik (DE-588)4072885-7 gnd rswk-swf Sicherheit (DE-588)4054790-5 s Internationale Politik (DE-588)4072885-7 s Forschungsmethode (DE-588)4155046-8 s DE-604 Salter, Mark B. 1971- (DE-588)1028359543 edt Mutlu, Can E. (DE-588)1050598229 edt Frowd, Philippe M. ca. 20./21. Jh. (DE-588)1165792494 edt Erscheint auch als Online-Ausgabe 978-1-003-10801-6 |
spellingShingle | Research methods in critical security studies an introduction Gesellschaft Internationale Politik International relations Social aspects Research Methodology Security, International Social aspects Research Methodology Forschungsmethode (DE-588)4155046-8 gnd Sicherheit (DE-588)4054790-5 gnd Internationale Politik (DE-588)4072885-7 gnd |
subject_GND | (DE-588)4155046-8 (DE-588)4054790-5 (DE-588)4072885-7 |
title | Research methods in critical security studies an introduction |
title_auth | Research methods in critical security studies an introduction |
title_exact_search | Research methods in critical security studies an introduction |
title_exact_search_txtP | Research methods in critical security studies an introduction |
title_full | Research methods in critical security studies an introduction edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd |
title_fullStr | Research methods in critical security studies an introduction edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd |
title_full_unstemmed | Research methods in critical security studies an introduction edited by Mark B. Salter, Can E. Mutlu and Philippe M. Frowd |
title_short | Research methods in critical security studies |
title_sort | research methods in critical security studies an introduction |
title_sub | an introduction |
topic | Gesellschaft Internationale Politik International relations Social aspects Research Methodology Security, International Social aspects Research Methodology Forschungsmethode (DE-588)4155046-8 gnd Sicherheit (DE-588)4054790-5 gnd Internationale Politik (DE-588)4072885-7 gnd |
topic_facet | Gesellschaft Internationale Politik International relations Social aspects Research Methodology Security, International Social aspects Research Methodology Forschungsmethode Sicherheit |
work_keys_str_mv | AT saltermarkb researchmethodsincriticalsecuritystudiesanintroduction AT mutlucane researchmethodsincriticalsecuritystudiesanintroduction AT frowdphilippem researchmethodsincriticalsecuritystudiesanintroduction |