Secrecy and Methods in Security Research

Secrecy and Methods in Security Research
Author :
Publisher : Routledge
Total Pages : 321
Release :
ISBN-10 : 9780429675348
ISBN-13 : 0429675348
Rating : 4/5 (48 Downloads)

Synopsis Secrecy and Methods in Security Research by : Marieke De Goede

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

State Secrecy and Security

State Secrecy and Security
Author :
Publisher : Routledge
Total Pages : 180
Release :
ISBN-10 : 9781351977647
ISBN-13 : 1351977644
Rating : 4/5 (47 Downloads)

Synopsis State Secrecy and Security by : William Walters

In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.

Research Methods in Critical Security Studies

Research Methods in Critical Security Studies
Author :
Publisher : Routledge
Total Pages : 338
Release :
ISBN-10 : 9781136260841
ISBN-13 : 1136260846
Rating : 4/5 (41 Downloads)

Synopsis Research Methods in Critical Security Studies by : Mark B. Salter

This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches. In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections: Part I: Research Design Part II: The Ethnographic Turn Part III: The Practice Turn Part IV: The Discursive Turn Part V: The Corporeal Turn Part VI: The Material Turn This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.

Research Methods in Critical Security Studies

Research Methods in Critical Security Studies
Author :
Publisher : Taylor & Francis
Total Pages : 298
Release :
ISBN-10 : 9781000863499
ISBN-13 : 1000863492
Rating : 4/5 (99 Downloads)

Synopsis Research Methods in Critical Security Studies by : Mark B. Salter

This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.

Secrecy and Fieldwork

Secrecy and Fieldwork
Author :
Publisher : SAGE Publications, Incorporated
Total Pages : 80
Release :
ISBN-10 : UOM:39015033143093
ISBN-13 :
Rating : 4/5 (93 Downloads)

Synopsis Secrecy and Fieldwork by : Richard G. Mitchell

What should the researcher tell, or not tell the informant? Is fieldwork inherently an activity that requires covert behaviour by the researcher and subject alike? Are honesty and openness at odds with effectiveness in the field? In examining these questions, the author raises the ethical and practical issues of revelation and concealment in the field and attempts to arrive at a more useful set of norms for fieldwork behaviour.

Improving Access to and Confidentiality of Research Data

Improving Access to and Confidentiality of Research Data
Author :
Publisher : National Academies Press
Total Pages : 74
Release :
ISBN-10 : 9780309171595
ISBN-13 : 0309171598
Rating : 4/5 (95 Downloads)

Synopsis Improving Access to and Confidentiality of Research Data by : National Research Council

Improving Access to and Confidentiality of Research Data summarizes a workshop convened by the Committee on National Statistics (CNSTAT) to promote discussion about methods for advancing the often conflicting goals of exploiting the research potential of microdata and maintaining acceptable levels of confidentiality. This report outlines essential themes of the access versus confidentiality debate that emerged during the workshop. Among these themes are the tradeoffs and tensions between the needs of researchers and other data users on the one hand and confidentiality requirements on the other; the relative advantages and costs of data perturbation techniques (applied to facilitate public release) versus restricted access as tools for improving security; and the need to quantify disclosure risksâ€"both absolute and relativeâ€"created by researchers and research data, as well as by other data users and other types of data.

Computers at Risk

Computers at Risk
Author :
Publisher : National Academies Press
Total Pages : 320
Release :
ISBN-10 : 9780309043885
ISBN-13 : 0309043883
Rating : 4/5 (85 Downloads)

Synopsis Computers at Risk by : National Research Council

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Secrecy and Silence in the Research Process

Secrecy and Silence in the Research Process
Author :
Publisher : Routledge
Total Pages : 327
Release :
ISBN-10 : 9781134055968
ISBN-13 : 113405596X
Rating : 4/5 (68 Downloads)

Synopsis Secrecy and Silence in the Research Process by : Roisin Ryan-Flood

Feminist research is informed by a history of breaking silences, of demanding that women’s voices be heard, recorded and included in wider intellectual genealogies and histories. This has led to an emphasis on voice and speaking out in the research endeavour. Moments of secrecy and silence are less often addressed. This gives rise to a number of questions. What are the silences, secrets, omissions and and political consequences of such moments? What particular dilemmas and constraints do they represent or entail? What are their implications for research praxis? Are such moments always indicative of voicelessness or powerlessness? Or may they also constitute a productive moment in the research encounter? Contributors to this volume were invited to reflect on these questions. The resulting chapters are a fascinating collection of insights into the research process, making an important contribution to theoretical and empirical debates about epistemology, subjectivity and identity in research. Researchers often face difficult dilemmas about who to represent and how, what to omit and what to include. This book explores such questions in an important and timely collection of essays from international scholars.

Assuring the Confidentiality of Social Research Data

Assuring the Confidentiality of Social Research Data
Author :
Publisher : University of Pennsylvania Press
Total Pages : 320
Release :
ISBN-10 : 9781512800814
ISBN-13 : 1512800813
Rating : 4/5 (14 Downloads)

Synopsis Assuring the Confidentiality of Social Research Data by : Robert F. Boruch

This book is a volume in the Penn Press Anniversary Collection. To mark its 125th anniversary in 2015, the University of Pennsylvania Press rereleased more than 1,100 titles from Penn Press's distinguished backlist from 1899-1999 that had fallen out of print. Spanning an entire century, the Anniversary Collection offers peer-reviewed scholarship in a wide range of subject areas.

Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering
Author :
Publisher : Springer
Total Pages : 788
Release :
ISBN-10 : 9783319956695
ISBN-13 : 3319956698
Rating : 4/5 (95 Downloads)

Synopsis Effective Model-Based Systems Engineering by : John M. Borky

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.