Research Methods in Critical Security Studies


Book Description

This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches. In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections: Part I: Research Design Part II: The Ethnographic Turn Part III: The Practice Turn Part IV: The Discursive Turn Part V: The Corporeal Turn Part VI: The Material Turn This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.




Critical Security Methods


Book Description

New approach to research methods and methodology in critical security studies Helps fill the gap in methodology literarture in critical security studies Well-established authors Will be of much interest to students of critical security studies, research methods, politics and IR




Secrecy and Methods in Security Research


Book Description

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.




Critical Methods in Terrorism Studies


Book Description

This book shows how to use a range of critical approaches to conduct research on terrorism. Featuring the work of researchers who have already utilized these methods to study terrorism, it includes a diverse range of critical methodological approaches – including discourse analysis, feminist, postcolonial, ethnographic, critical theory, and visual analysis of terrorism. The main objectives of the book are to assist researchers in adopting and applying various critical approaches to the study of terrorism. This goal is achieved by bringing together a number of different scholars working on the topic of terrorism from a range of non-variables-based approaches. Their individual chapters discuss explicitly the research methods used and methodological commitments made by the authors, while also illustrating the application of their particular critical perspective to the topic of terrorism. The authors of each chapter will discuss (1) why they chose their specific critical method; (2) how they justified their methodological stance; (3) how they conduct their research; (4) and, finally, an example of the research. This book will be essential reading for students of terrorism studies and critical terrorism studies, and highly recommended for students of political violence, security studies and IR.




Critical Approaches to Security


Book Description

Focusing on critical approaches to security, this new textbook offers readers both an overview of the key theoretical perspectives and a variety of methodological techniques. With a careful explication of core concepts in each chapter and an introduction that traces the development of critical approaches to security, this textbook will encourage all those who engage with it to develop a curiosity about the study and practices of security politics. Challenging the assumptions of conventional theories and approaches, unsettling that which was previously taken for granted – these are among the ways in which such a curiosity works. Through its attention to the fact that, and the ways in which, security matters in global politics, this work will both pioneer new ways of studying security and acknowledge the noteworthy scholarship without which it could not have been thought. This textbook will be essential reading to advanced undergraduate and postgraduate students of critical security studies, and highly recommended to students of traditional security studies, International Relations and Politics.




Research Methods in Critical Security Studies


Book Description

This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.




The Oxford Handbook of International Security


Book Description

"Future-oriented questions are woven through the study and practice of international security. The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry. The results of their efforts are: the definitive statement of the state of international security and the academic field of security studies, a comprehensive portrait of expert assessments of expected developments in international security at the onset of the twenty-first century's second decade, and a crucial staging ground for future research agendas." --Descripción del editor.




Research Methods for Cyber Security


Book Description

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage




Researching Non-state Actors in International Security


Book Description

This volume provides researchers and students with a discussion of a broad range of methods and their practical application to the study of non-state actors in international security. All researchers face the same challenge, not only must they identify a suitable method for analysing their research question, they must also apply it. This volume prepares students and scholars for the key challenges they confront when using social-science methods in their own research. To bridge the gap between knowing methods and actually employing them, the book not only introduces a broad range of interpretive and explanatory methods, it also discusses their practical application. Contributors reflect on how they have used methods, or combinations of methods, such as narrative analysis, interviews, qualitative comparative analysis (QCA), case studies, experiments or participant observation in their own research on non-state actors in international security. Moreover, experts on the relevant methods discuss these applications as well as the merits and limitations of the various methods in use. Research on non-state actors in international security provides ample challenges and opportunities to probe different methodological approaches. It is thus particularly instructive for students and scholars seeking insights on how to best use particular methods for their research projects in International Relations (IR), security studies and neighbouring disciplines. It also offers an innovative laboratory for developing new research techniques and engaging in unconventional combinations of methods. This book will be of much interest to students of non-state security actors such as private military and security companies, research methods, security studies and International Relations in general. The Open Access version of this book, available at https://www.routledge.com/Researching-Non-state-Actors-in-International-Security-Theory-and-Practice/Kruck-Schneiker/p/book/9780367141561, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.




Research Methods in Defence Studies


Book Description

This textbook provides an overview of qualitive and quantitative methods used in different social sciences to investigate defence issues. Recently, defence issues have become of increasing interest to researchers in the social sciences, but they raise specific methodological questions. This volume intends to fill a gap in the literature on defence studies by addressing a number of topics not dealt with sufficiently before. The contributors offer a range of methodological reflections and tools from various social sciences (political science, sociology, geography, history, economics and public law) for researching defence issues. They also address the increasingly important question of data and digitalization. The book introduces the added value of quantitative and qualitative methods, and calls for a cross-fertilization of methods in order to facilitate better research on defence topics and to fully grasp the complexity of defence in the 21st century. This book will be of much interest to students, researchers and practitioners of defence studies, war studies, military studies, and social science research methods in general.