Secrecy and Methods in Security Research
暂无分享,去创建一个
Polly Pallister-Wilkins | Esmé Bosma | M. Goede | P. Pallister-Wilkins | Marieke De Goede | M. D. Goede | E. Bosma
[1] Maozhen Li,et al. Preface , 2016, Int. J. Pattern Recognit. Artif. Intell..
[2] Jonna Nyman. Pragmatism, Practice and the Value of Security 1 , 2016 .
[3] F. Robinson. The Ethics of Care: A Feminist Approach to Human Security , 2011 .
[4] Oliver Kearns. State secrecy, public assent, and representational practices of U.S. covert action , 2016 .
[5] Louise Amoore,et al. Securing with algorithms: Knowledge, decision, sovereignty , 2017 .
[6] M. Bourne,et al. Laboratizing the border: The production, translation and anticipation of security technologies , 2015 .
[7] A. Mol. The Body Multiple: Ontology in Medical Practice , 2003 .
[8] W. Walters,et al. Bringing Publics into Critical Security Studies: Notes for a Research Strategy , 2015 .
[9] J. Fisher,et al. Strategies for Obtaining Access to Secretive or Guarded Organizations , 2015, Journal of contemporary ethnography.
[10] R. Bellanova,et al. Doing and mediating critique: An invitation to practice companionship , 2019, Security Dialogue.
[11] F. Ragazzi,et al. Low-tech security: Files, notes, and memos as technologies of anticipation , 2014 .
[12] Susan Maret,et al. The Charm of Secrecy: Secrecy and Society as Secrecy Studies , 2016 .
[13] Wanda Vrasti. The Strange Case of Ethnography and International Relations , 2008 .
[14] M. Littman,et al. What can we do? , 2001, Urologic nursing.
[15] Christian Bueger. Security as practice , 2016 .
[16] Randy K. Lippert,et al. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research , 2015 .
[17] Deirdre Curtin,et al. Overseeing Secrets in the EU: A Democratic Perspective , 2014 .
[18] I. V. Weitershausen. Roland Bleiker (ed), Visual Global Politics , 2021 .
[19] David Campbell,et al. Cultural governance and pictorial resistance: reflections on the imaging of war , 2003, Review of International Studies.
[20] P. Pallister-Wilkins. Médecins Avec Frontières and the making of a humanitarian borderscape , 2018 .
[21] O. Thomas. The Iraq inquiries: publicity, secrecy and liberal war , 2015 .
[22] Srirupa Roy. Politics of Insecurity , 2004 .
[23] Brian Balmer,et al. Secrecy and Science: A Historical Sociology of Biological and Chemical Warfare , 2012 .
[24] A. Calcara. Critical Methods in Political and Cultural Economy , 2018 .
[25] Sophia Dingli. We need to talk about silence: Re-examining silence in International Relations theory , 2015 .
[26] B. Rappert. Revealing and concealing secrets in research: the potential for the absent , 2010 .
[27] J. Riese. What is ‘access’ in the context of qualitative research? , 2018, Qualitative Research.
[28] Madeleine Akrich,et al. A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies , 1992 .
[29] W. Schinkel,et al. Surveillance at sea: The transactional politics of border control in the Aegean , 2017, Security dialogue.
[30] Eva Horn,et al. Logics of Political Secrecy , 2011 .
[31] Katja Lindskov Jacobsen,et al. Experimentation in humanitarian locations: UNHCR and biometric registration of Afghan refugees , 2015 .
[32] Bertrand Taithe,et al. Data hubris? Humanitarian information systems and the mirage of technology , 2016 .
[33] Celia Lury,et al. Inventive methods : the happening of the social , 2012 .
[34] Berthold. Rittberger,et al. Secrecy in Europe , 2018 .
[35] Andrew W Neal,et al. Critical Security Methods : New Frameworks for Analysis , 2015 .
[36] W. Walters,et al. Hannah Arendt and the Art of Secrecy; Or, the Fog of Cobra Mist , 2016 .
[37] Sissela Bok,et al. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[38] M. Taussig. Defacement: Public Secrecy and the Labor of the Negative , 1999 .
[39] E. Cloatre. Pills for the Poorest: An Exploration of TRIPS and Access to Medication in Sub-Saharan Africa , 2013 .
[40] M. Baaz,et al. What Can We/Do We Want to Know? Reflections from Researching SGBV in Military Settings , 2018 .
[41] M. de Goede,et al. Secrecy and security in transatlantic terrorism finance tracking , 2017 .
[42] C. null,et al. Reflections … , 1991 .
[43] Louise Amoore and Marieke de Goede. What counts as violence , 2013 .
[44] M. Michaelsen,et al. Research, Ethics and Risk in the Authoritarian Field , 2017 .
[45] Andrew W Neal,et al. Introducing critical security methods , 2014 .
[46] Russell Olwell,et al. Nuclear Rites: A Weapons Laboratory at the End of the Cold War by Hugh Gusterson (review) , 1997, Technology and Culture.
[47] Mark Mullen,et al. Strategies of Containment , 2011 .
[48] Clare Birchall. Six Answers to the Question "What is Secrecy Studies?" , 2016 .
[49] Annelise Riles. The Network Inside Out , 2000 .
[50] Elisa Pascucci,et al. The humanitarian infrastructure and the question of over-research: reflections on fieldwork in the refugee crises in the Middle East and North Africa , 2017 .
[51] D. Yanow,et al. A Hitchhiker’s Guide to the Public Administration Research Universe: Surviving Conversations on Methodologies and Methods , 2012 .
[52] Susana Durão. Enforcing order: an ethnography of urban policing , 2014 .
[53] Didier Bigo,et al. Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .
[54] F. P.. Secrecy , 1994, RES: Anthropology and Aesthetics.
[55] Simon Holdaway. ‘An Inside Job’: a case study of covert research on the police , 1980 .