Secrecy and Methods in Security Research
Title | Secrecy and Methods in Security Research PDF eBook |
Author | Marieke De Goede |
Publisher | Routledge |
Pages | 321 |
Release | 2019-08-13 |
Genre | Political Science |
ISBN | 0429675348 |
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
State Secrecy and Security
Title | State Secrecy and Security PDF eBook |
Author | William Walters |
Publisher | Routledge |
Pages | 180 |
Release | 2021-05-03 |
Genre | Political Science |
ISBN | 1351977644 |
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.
Research Methods in Critical Security Studies
Title | Research Methods in Critical Security Studies PDF eBook |
Author | Mark B. Salter |
Publisher | Taylor & Francis |
Pages | 298 |
Release | 2023-05-12 |
Genre | Political Science |
ISBN | 1000863492 |
This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.
Secrecy and Silence in the Research Process
Title | Secrecy and Silence in the Research Process PDF eBook |
Author | Roisin Ryan-Flood |
Publisher | Routledge |
Pages | 327 |
Release | 2013-05-13 |
Genre | Social Science |
ISBN | 113405596X |
Feminist research is informed by a history of breaking silences, of demanding that women’s voices be heard, recorded and included in wider intellectual genealogies and histories. This has led to an emphasis on voice and speaking out in the research endeavour. Moments of secrecy and silence are less often addressed. This gives rise to a number of questions. What are the silences, secrets, omissions and and political consequences of such moments? What particular dilemmas and constraints do they represent or entail? What are their implications for research praxis? Are such moments always indicative of voicelessness or powerlessness? Or may they also constitute a productive moment in the research encounter? Contributors to this volume were invited to reflect on these questions. The resulting chapters are a fascinating collection of insights into the research process, making an important contribution to theoretical and empirical debates about epistemology, subjectivity and identity in research. Researchers often face difficult dilemmas about who to represent and how, what to omit and what to include. This book explores such questions in an important and timely collection of essays from international scholars.
Computers at Risk
Title | Computers at Risk PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 320 |
Release | 1990-02-01 |
Genre | Computers |
ISBN | 0309043883 |
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Effective Model-Based Systems Engineering
Title | Effective Model-Based Systems Engineering PDF eBook |
Author | John M. Borky |
Publisher | Springer |
Pages | 788 |
Release | 2018-09-08 |
Genre | Technology & Engineering |
ISBN | 3319956698 |
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Research Methods in Critical Security Studies
Title | Research Methods in Critical Security Studies PDF eBook |
Author | Mark B. Salter |
Publisher | Routledge |
Pages | 338 |
Release | 2013-04-03 |
Genre | Political Science |
ISBN | 1136260846 |
This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches. In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections: Part I: Research Design Part II: The Ethnographic Turn Part III: The Practice Turn Part IV: The Discursive Turn Part V: The Corporeal Turn Part VI: The Material Turn This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.