Secrecy and Methods in Security Research

Secrecy and Methods in Security Research PDF

Author: Marieke De Goede

Publisher: Routledge

Published: 2019-08-13

Total Pages: 321

ISBN-13: 0429675348

DOWNLOAD EBOOK →

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

State Secrecy and Security

State Secrecy and Security PDF

Author: William Walters

Publisher: Routledge

Published: 2021-05-03

Total Pages: 180

ISBN-13: 1351977644

DOWNLOAD EBOOK →

In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.

Research Methods in Critical Security Studies

Research Methods in Critical Security Studies PDF

Author: Mark B. Salter

Publisher: Taylor & Francis

Published: 2023-05-12

Total Pages: 298

ISBN-13: 1000863492

DOWNLOAD EBOOK →

This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.

Research Handbook on Irregular Migration

Research Handbook on Irregular Migration PDF

Author: Ilse van Liempt

Publisher: Edward Elgar Publishing

Published: 2023-03-02

Total Pages: 417

ISBN-13: 1800377509

DOWNLOAD EBOOK →

Moving away from state categorizations on irregular migration, this Research Handbook critically examines processes and dynamics that generate and reproduce irregularity, and discusses who may count as an irregular migrant.

Secrecy, National Security and the Vindication of Constitutional Law

Secrecy, National Security and the Vindication of Constitutional Law PDF

Author: D. Cole

Publisher: Edward Elgar Publishing

Published: 2013

Total Pages: 369

ISBN-13: 1781953864

DOWNLOAD EBOOK →

ÔThis is an important collection of scholarly essays that will illuminate positive legal developments and normative constitutionalist concerns in the expanding arena of secret government decisions. This book is indispensable reading for those concerned with constitutionalism, the rule of law and democracy as they bear on the tensions between secrecy and disclosure in government responses to terrorism.Õ Ð Vicki C. Jackson, Harvard University Law School, US ÔThis book contains the broadest and deepest analysis of the legal and policy issues that relate to secrecy and national security on one hand, and the imperatives of a functioning democracy on the other. The broadest because it brings to bear materials from many countries, the deepest because it brilliantly explores a core problem of constitutional government.Õ Ð Norman Dorsen, New York University, US and President, American Civil Liberties Union, 1976Ð1991 Virtually every nation has had to confront tensions between the rule-of-law demands for transparency and accountability and the need for confidentiality with respect to terrorism and national security. This book provides a global and comparative overview of the implications of governmental secrecy in a variety of contexts. Expert contributors from around the world discuss the dilemmas posed by the necessity for Ð and evils of Ð secrecy, and assess constitutional mechanisms for checking the abuse of secrecy by national and international institutions in the field of counter-terrorism. In recent years, nations have relied on secret evidence to detain suspected terrorists and freeze their assets, have barred lawsuits alleging human rights violations by invoking Ôstate secretsÕ, and have implemented secret surveillance and targeted killing programs. The book begins by addressing the issue of secrecy at the institutional level, examining the role of courts and legislatures in regulating the use of secrecy claims by the executive branch of government. From there, the focus shifts to the three most vital areas of anti-terrorism law: preventive detention, criminal trials and administrative measures (notably, targeted economic sanctions). The contributors explore how assertions of secrecy and national security in each of these areas affect the functioning of the legal system and the application of procedural justice and fairness. Students, professors and researchers interested in constitutional law, international law, comparative law and issues of terrorism and security will find this an invaluable addition to the literature. Judges, lawyers and policymakers will also find much of use in this critical volume.

Transparency and Secrecy in European Democracies

Transparency and Secrecy in European Democracies PDF

Author: Dorota Mokrosinska

Publisher: Routledge

Published: 2020-11-11

Total Pages: 213

ISBN-13: 0429649436

DOWNLOAD EBOOK →

This edited volume offers a critical discussion of the trade-offs between transparency and secrecy in the actual political practice of democratic states in Europe. As such, it answers to a growing need to systematically analyse the problem of secrecy in governance in this political and geographical context. Focusing on topical cases and controversies in particular areas, the contributors reflect on the justification and limits of the use of secrecy in democratic governance, register the social, cultural, and historical factors that inform this process and explore the criteria used by European legislators and policy-makers, both at the national and supranational level, when balancing interests on the sides of transparency and secrecy, respectively. This book will be of key interest to scholars and students of security studies, political science, European politics/studies, law, history, political philosophy, public administration, intelligence studies, media and communication studies, and information technology sciences.

Computers at Risk

Computers at Risk PDF

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK →

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

The SAGE Encyclopedia of Communication Research Methods

The SAGE Encyclopedia of Communication Research Methods PDF

Author: Mike Allen

Publisher: SAGE Publications

Published: 2017-04-11

Total Pages: 2013

ISBN-13: 1483381420

DOWNLOAD EBOOK →

Communication research is evolving and changing in a world of online journals, open-access, and new ways of obtaining data and conducting experiments via the Internet. Although there are generic encyclopedias describing basic social science research methodologies in general, until now there has been no comprehensive A-to-Z reference work exploring methods specific to communication and media studies. Our entries, authored by key figures in the field, focus on special considerations when applied specifically to communication research, accompanied by engaging examples from the literature of communication, journalism, and media studies. Entries cover every step of the research process, from the creative development of research topics and questions to literature reviews, selection of best methods (whether quantitative, qualitative, or mixed) for analyzing research results and publishing research findings, whether in traditional media or via new media outlets. In addition to expected entries covering the basics of theories and methods traditionally used in communication research, other entries discuss important trends influencing the future of that research, including contemporary practical issues students will face in communication professions, the influences of globalization on research, use of new recording technologies in fieldwork, and the challenges and opportunities related to studying online multi-media environments. Email, texting, cellphone video, and blogging are shown not only as topics of research but also as means of collecting and analyzing data. Still other entries delve into considerations of accountability, copyright, confidentiality, data ownership and security, privacy, and other aspects of conducting an ethical research program. Features: 652 signed entries are contained in an authoritative work spanning four volumes available in choice of electronic or print formats. Although organized A-to-Z, front matter includes a Reader’s Guide grouping entries thematically to help students interested in a specific aspect of communication research to more easily locate directly related entries. Back matter includes a Chronology of the development of the field of communication research; a Resource Guide to classic books, journals, and associations; a Glossary introducing the terminology of the field; and a detailed Index. Entries conclude with References/Further Readings and Cross-References to related entries to guide students further in their research journeys. The Index, Reader’s Guide themes, and Cross-References combine to provide robust search-and-browse in the e-version.

Research Methods for Cyber Security

Research Methods for Cyber Security PDF

Author: Thomas W. Edgar

Publisher: Syngress

Published: 2017-04-19

Total Pages: 428

ISBN-13: 0128129301

DOWNLOAD EBOOK →

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage

Innovations in Federal Statistics

Innovations in Federal Statistics PDF

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2017-04-21

Total Pages: 151

ISBN-13: 030945428X

DOWNLOAD EBOOK →

Federal government statistics provide critical information to the country and serve a key role in a democracy. For decades, sample surveys with instruments carefully designed for particular data needs have been one of the primary methods for collecting data for federal statistics. However, the costs of conducting such surveys have been increasing while response rates have been declining, and many surveys are not able to fulfill growing demands for more timely information and for more detailed information at state and local levels. Innovations in Federal Statistics examines the opportunities and risks of using government administrative and private sector data sources to foster a paradigm shift in federal statistical programs that would combine diverse data sources in a secure manner to enhance federal statistics. This first publication of a two-part series discusses the challenges faced by the federal statistical system and the foundational elements needed for a new paradigm.