Secrecy and methods in security research: a guide to qualitative fieldwork
"This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London ; New York
Routledge
2020
|
Schlagworte: | |
Online-Zugang: | FUBA1 Volltext |
Zusammenfassung: | "This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general"-- |
Beschreibung: | Description based on online resource; title from digital title page (viewed on September 05, 2019) |
Beschreibung: | 1 Online-Ressource (xvi, 312 Seiten) |
ISBN: | 9780429398186 0429398182 9780429675348 0429675348 9780429675355 0429675356 9780429675331 042967533X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047007729 | ||
003 | DE-604 | ||
005 | 20210806 | ||
007 | cr|uuu---uuuuu | ||
008 | 201118s2020 |||| o||u| ||||||eng d | ||
020 | |a 9780429398186 |9 978-0-429-39818-6 | ||
020 | |a 0429398182 |9 0-429-39818-2 | ||
020 | |a 9780429675348 |9 978-0-429-67534-8 | ||
020 | |a 0429675348 |9 0-429-67534-8 | ||
020 | |a 9780429675355 |9 978-0-429-67535-5 | ||
020 | |a 0429675356 |9 0-429-67535-6 | ||
020 | |a 9780429675331 |9 978-0-429-67533-1 | ||
020 | |a 042967533X |9 0-429-67533-X | ||
024 | 7 | |a 10.4324/9780429398186 |2 doi | |
035 | |a (ZDB-7-TFC)9780429398186 | ||
035 | |a (OCoLC)1263266674 | ||
035 | |a (DE-599)BVBBV047007729 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 | ||
082 | 0 | |a 001.4/33 |2 23 | |
245 | 1 | 0 | |a Secrecy and methods in security research |b a guide to qualitative fieldwork |c edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins |
264 | 1 | |a London ; New York |b Routledge |c 2020 | |
300 | |a 1 Online-Ressource (xvi, 312 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from digital title page (viewed on September 05, 2019) | ||
520 | |a "This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general"-- | ||
650 | 4 | |a Official secrets / Research / Methodology | |
650 | 4 | |a Confidential communications / Research / Methodology | |
650 | 4 | |a Security systems / Research / Methodology | |
650 | 4 | |a Secrecy | |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Staat |0 (DE-588)4056618-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Forschungsmethode |0 (DE-588)4155046-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimhaltung |0 (DE-588)4140232-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 2 | |a Geheimhaltung |0 (DE-588)4140232-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Staat |0 (DE-588)4056618-3 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | 2 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 1 | 3 | |a Forschungsmethode |0 (DE-588)4155046-8 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Goede, Marieke de |d 1971- |0 (DE-588)135909651 |4 edt | |
700 | 1 | |a Bosma, Esmé |0 (DE-588)1195176848 |4 edt | |
700 | 1 | |a Pallister-Wilkins, Polly |0 (DE-588)119681693X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-367-02723-0 |w (DE-604)BV046152236 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-367-02724-7 |w (DE-604)BV046152236 |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9780429398186 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032415266 | ||
966 | e | |u https://www.taylorfrancis.com/books/9780429398186 |l FUBA1 |p ZDB-7-TFC |q ZDB-7-TFC 2020 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181961105735680 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Goede, Marieke de 1971- Bosma, Esmé Pallister-Wilkins, Polly |
author2_role | edt edt edt |
author2_variant | m d g md mdg e b eb p p w ppw |
author_GND | (DE-588)135909651 (DE-588)1195176848 (DE-588)119681693X |
author_facet | Goede, Marieke de 1971- Bosma, Esmé Pallister-Wilkins, Polly |
building | Verbundindex |
bvnumber | BV047007729 |
collection | ZDB-7-TFC |
ctrlnum | (ZDB-7-TFC)9780429398186 (OCoLC)1263266674 (DE-599)BVBBV047007729 |
dewey-full | 001.4/33 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 001 - Knowledge |
dewey-raw | 001.4/33 |
dewey-search | 001.4/33 |
dewey-sort | 11.4 233 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Allgemeines |
discipline_str_mv | Allgemeines |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04351nmm a2200709zc 4500</leader><controlfield tag="001">BV047007729</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210806 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201118s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429398186</subfield><subfield code="9">978-0-429-39818-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429398182</subfield><subfield code="9">0-429-39818-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429675348</subfield><subfield code="9">978-0-429-67534-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429675348</subfield><subfield code="9">0-429-67534-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429675355</subfield><subfield code="9">978-0-429-67535-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429675356</subfield><subfield code="9">0-429-67535-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429675331</subfield><subfield code="9">978-0-429-67533-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">042967533X</subfield><subfield code="9">0-429-67533-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4324/9780429398186</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-TFC)9780429398186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1263266674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047007729</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">001.4/33</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secrecy and methods in security research</subfield><subfield code="b">a guide to qualitative fieldwork</subfield><subfield code="c">edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 312 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on September 05, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Official secrets / Research / Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications / Research / Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems / Research / Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secrecy</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Staat</subfield><subfield code="0">(DE-588)4056618-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Geheimhaltung</subfield><subfield code="0">(DE-588)4140232-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Staat</subfield><subfield code="0">(DE-588)4056618-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goede, Marieke de</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)135909651</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bosma, Esmé</subfield><subfield code="0">(DE-588)1195176848</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pallister-Wilkins, Polly</subfield><subfield code="0">(DE-588)119681693X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-02723-0</subfield><subfield code="w">(DE-604)BV046152236</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-367-02724-7</subfield><subfield code="w">(DE-604)BV046152236</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9780429398186</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032415266</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.taylorfrancis.com/books/9780429398186</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">ZDB-7-TFC 2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047007729 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:58:04Z |
indexdate | 2024-07-10T08:59:58Z |
institution | BVB |
isbn | 9780429398186 0429398182 9780429675348 0429675348 9780429675355 0429675356 9780429675331 042967533X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032415266 |
oclc_num | 1263266674 |
open_access_boolean | |
owner | DE-188 |
owner_facet | DE-188 |
physical | 1 Online-Ressource (xvi, 312 Seiten) |
psigel | ZDB-7-TFC ZDB-7-TFC ZDB-7-TFC 2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Routledge |
record_format | marc |
spelling | Secrecy and methods in security research a guide to qualitative fieldwork edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins London ; New York Routledge 2020 1 Online-Ressource (xvi, 312 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from digital title page (viewed on September 05, 2019) "This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces, and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general"-- Official secrets / Research / Methodology Confidential communications / Research / Methodology Security systems / Research / Methodology Secrecy Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Staat (DE-588)4056618-3 gnd rswk-swf Forschungsmethode (DE-588)4155046-8 gnd rswk-swf Geheimhaltung (DE-588)4140232-7 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 s Sicherheit (DE-588)4054790-5 s Geheimhaltung (DE-588)4140232-7 s DE-604 Staat (DE-588)4056618-3 s Sicherheitsmaßnahme (DE-588)4181167-7 s Forschungsmethode (DE-588)4155046-8 s Goede, Marieke de 1971- (DE-588)135909651 edt Bosma, Esmé (DE-588)1195176848 edt Pallister-Wilkins, Polly (DE-588)119681693X edt Erscheint auch als Druck-Ausgabe, Hardcover 978-0-367-02723-0 (DE-604)BV046152236 Erscheint auch als Druck-Ausgabe, Paperback 978-0-367-02724-7 (DE-604)BV046152236 https://www.taylorfrancis.com/books/9780429398186 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Secrecy and methods in security research a guide to qualitative fieldwork Official secrets / Research / Methodology Confidential communications / Research / Methodology Security systems / Research / Methodology Secrecy Sicherheitsmaßnahme (DE-588)4181167-7 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheit (DE-588)4054790-5 gnd Staat (DE-588)4056618-3 gnd Forschungsmethode (DE-588)4155046-8 gnd Geheimhaltung (DE-588)4140232-7 gnd |
subject_GND | (DE-588)4181167-7 (DE-588)4116489-1 (DE-588)4054790-5 (DE-588)4056618-3 (DE-588)4155046-8 (DE-588)4140232-7 |
title | Secrecy and methods in security research a guide to qualitative fieldwork |
title_auth | Secrecy and methods in security research a guide to qualitative fieldwork |
title_exact_search | Secrecy and methods in security research a guide to qualitative fieldwork |
title_exact_search_txtP | Secrecy and methods in security research a guide to qualitative fieldwork |
title_full | Secrecy and methods in security research a guide to qualitative fieldwork edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins |
title_fullStr | Secrecy and methods in security research a guide to qualitative fieldwork edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins |
title_full_unstemmed | Secrecy and methods in security research a guide to qualitative fieldwork edited by Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins |
title_short | Secrecy and methods in security research |
title_sort | secrecy and methods in security research a guide to qualitative fieldwork |
title_sub | a guide to qualitative fieldwork |
topic | Official secrets / Research / Methodology Confidential communications / Research / Methodology Security systems / Research / Methodology Secrecy Sicherheitsmaßnahme (DE-588)4181167-7 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheit (DE-588)4054790-5 gnd Staat (DE-588)4056618-3 gnd Forschungsmethode (DE-588)4155046-8 gnd Geheimhaltung (DE-588)4140232-7 gnd |
topic_facet | Official secrets / Research / Methodology Confidential communications / Research / Methodology Security systems / Research / Methodology Secrecy Sicherheitsmaßnahme Sicherheitspolitik Sicherheit Staat Forschungsmethode Geheimhaltung |
url | https://www.taylorfrancis.com/books/9780429398186 |
work_keys_str_mv | AT goedemariekede secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork AT bosmaesme secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork AT pallisterwilkinspolly secrecyandmethodsinsecurityresearchaguidetoqualitativefieldwork |