Author: Marieke De Goede
Publisher: Routledge
ISBN: 0429675348
Category : Political Science
Languages : en
Pages : 321
Book Description
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Secrecy and Methods in Security Research
Author: Marieke De Goede
Publisher: Routledge
ISBN: 0429675348
Category : Political Science
Languages : en
Pages : 321
Book Description
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Publisher: Routledge
ISBN: 0429675348
Category : Political Science
Languages : en
Pages : 321
Book Description
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
State Secrecy and Security
Author: William Walters
Publisher: Routledge
ISBN: 1351977644
Category : Political Science
Languages : en
Pages : 180
Book Description
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.
Publisher: Routledge
ISBN: 1351977644
Category : Political Science
Languages : en
Pages : 180
Book Description
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.
Research Methods in Critical Security Studies
Author: Mark B. Salter
Publisher: Taylor & Francis
ISBN: 1000863492
Category : Political Science
Languages : en
Pages : 298
Book Description
This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.
Publisher: Taylor & Francis
ISBN: 1000863492
Category : Political Science
Languages : en
Pages : 298
Book Description
This textbook surveys new and emergent methods for doing research in critical security studies, filling a gap in the literature. The second edition has been revised and updated. This textbook is a practical guide to research design in this increasingly established field. Arguing for serious attention to questions of research design and method, the book develops accessible scholarly overviews of key methods used across critical security studies, such as ethnography, discourse analysis, materiality, and corporeal methods. It draws on prominent examples of each method’s objects of analysis, relevant data, and forms of data collection. The book’s defining feature is the collection of diverse accounts of research design from scholars working within each method, each of which is a clear and honest recounting of a specific project’s design and development. This second edition is extensively revised and expanded. Its 33 contributors reflect the sheer diversity of critical security studies today, representing various career stages, scholarly interests, and identities. This book is systematic in its approach to research design but keeps a reflexive and pluralist approach to the question of methods and how they can be used. The second edition has a new forward-looking conclusion examining future research trends and challenges for the field. This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students in International Relations and across the social sciences.
Research Methods for Cyber Security
Author: Thomas W. Edgar
Publisher: Syngress
ISBN: 0128129301
Category : Computers
Languages : en
Pages : 430
Book Description
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Publisher: Syngress
ISBN: 0128129301
Category : Computers
Languages : en
Pages : 430
Book Description
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. - Presents research methods from a cyber security science perspective - Catalyzes the rigorous research necessary to propel the cyber security field forward - Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Computers at Risk
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Secrecy and Silence in the Research Process
Author: Roisin Ryan-Flood
Publisher: Routledge
ISBN: 113405596X
Category : Social Science
Languages : en
Pages : 327
Book Description
Feminist research is informed by a history of breaking silences, of demanding that women’s voices be heard, recorded and included in wider intellectual genealogies and histories. This has led to an emphasis on voice and speaking out in the research endeavour. Moments of secrecy and silence are less often addressed. This gives rise to a number of questions. What are the silences, secrets, omissions and and political consequences of such moments? What particular dilemmas and constraints do they represent or entail? What are their implications for research praxis? Are such moments always indicative of voicelessness or powerlessness? Or may they also constitute a productive moment in the research encounter? Contributors to this volume were invited to reflect on these questions. The resulting chapters are a fascinating collection of insights into the research process, making an important contribution to theoretical and empirical debates about epistemology, subjectivity and identity in research. Researchers often face difficult dilemmas about who to represent and how, what to omit and what to include. This book explores such questions in an important and timely collection of essays from international scholars.
Publisher: Routledge
ISBN: 113405596X
Category : Social Science
Languages : en
Pages : 327
Book Description
Feminist research is informed by a history of breaking silences, of demanding that women’s voices be heard, recorded and included in wider intellectual genealogies and histories. This has led to an emphasis on voice and speaking out in the research endeavour. Moments of secrecy and silence are less often addressed. This gives rise to a number of questions. What are the silences, secrets, omissions and and political consequences of such moments? What particular dilemmas and constraints do they represent or entail? What are their implications for research praxis? Are such moments always indicative of voicelessness or powerlessness? Or may they also constitute a productive moment in the research encounter? Contributors to this volume were invited to reflect on these questions. The resulting chapters are a fascinating collection of insights into the research process, making an important contribution to theoretical and empirical debates about epistemology, subjectivity and identity in research. Researchers often face difficult dilemmas about who to represent and how, what to omit and what to include. This book explores such questions in an important and timely collection of essays from international scholars.
Effective Model-Based Systems Engineering
Author: John M. Borky
Publisher: Springer
ISBN: 3319956698
Category : Technology & Engineering
Languages : en
Pages : 788
Book Description
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Publisher: Springer
ISBN: 3319956698
Category : Technology & Engineering
Languages : en
Pages : 788
Book Description
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Secrecy, National Security and the Vindication of Constitutional Law
Author: D. Cole
Publisher: Edward Elgar Publishing
ISBN: 1781953864
Category : Law
Languages : en
Pages : 369
Book Description
ÔThis is an important collection of scholarly essays that will illuminate positive legal developments and normative constitutionalist concerns in the expanding arena of secret government decisions. This book is indispensable reading for those concerned with constitutionalism, the rule of law and democracy as they bear on the tensions between secrecy and disclosure in government responses to terrorism.Õ Ð Vicki C. Jackson, Harvard University Law School, US ÔThis book contains the broadest and deepest analysis of the legal and policy issues that relate to secrecy and national security on one hand, and the imperatives of a functioning democracy on the other. The broadest because it brings to bear materials from many countries, the deepest because it brilliantly explores a core problem of constitutional government.Õ Ð Norman Dorsen, New York University, US and President, American Civil Liberties Union, 1976Ð1991 Virtually every nation has had to confront tensions between the rule-of-law demands for transparency and accountability and the need for confidentiality with respect to terrorism and national security. This book provides a global and comparative overview of the implications of governmental secrecy in a variety of contexts. Expert contributors from around the world discuss the dilemmas posed by the necessity for Ð and evils of Ð secrecy, and assess constitutional mechanisms for checking the abuse of secrecy by national and international institutions in the field of counter-terrorism. In recent years, nations have relied on secret evidence to detain suspected terrorists and freeze their assets, have barred lawsuits alleging human rights violations by invoking Ôstate secretsÕ, and have implemented secret surveillance and targeted killing programs. The book begins by addressing the issue of secrecy at the institutional level, examining the role of courts and legislatures in regulating the use of secrecy claims by the executive branch of government. From there, the focus shifts to the three most vital areas of anti-terrorism law: preventive detention, criminal trials and administrative measures (notably, targeted economic sanctions). The contributors explore how assertions of secrecy and national security in each of these areas affect the functioning of the legal system and the application of procedural justice and fairness. Students, professors and researchers interested in constitutional law, international law, comparative law and issues of terrorism and security will find this an invaluable addition to the literature. Judges, lawyers and policymakers will also find much of use in this critical volume.
Publisher: Edward Elgar Publishing
ISBN: 1781953864
Category : Law
Languages : en
Pages : 369
Book Description
ÔThis is an important collection of scholarly essays that will illuminate positive legal developments and normative constitutionalist concerns in the expanding arena of secret government decisions. This book is indispensable reading for those concerned with constitutionalism, the rule of law and democracy as they bear on the tensions between secrecy and disclosure in government responses to terrorism.Õ Ð Vicki C. Jackson, Harvard University Law School, US ÔThis book contains the broadest and deepest analysis of the legal and policy issues that relate to secrecy and national security on one hand, and the imperatives of a functioning democracy on the other. The broadest because it brings to bear materials from many countries, the deepest because it brilliantly explores a core problem of constitutional government.Õ Ð Norman Dorsen, New York University, US and President, American Civil Liberties Union, 1976Ð1991 Virtually every nation has had to confront tensions between the rule-of-law demands for transparency and accountability and the need for confidentiality with respect to terrorism and national security. This book provides a global and comparative overview of the implications of governmental secrecy in a variety of contexts. Expert contributors from around the world discuss the dilemmas posed by the necessity for Ð and evils of Ð secrecy, and assess constitutional mechanisms for checking the abuse of secrecy by national and international institutions in the field of counter-terrorism. In recent years, nations have relied on secret evidence to detain suspected terrorists and freeze their assets, have barred lawsuits alleging human rights violations by invoking Ôstate secretsÕ, and have implemented secret surveillance and targeted killing programs. The book begins by addressing the issue of secrecy at the institutional level, examining the role of courts and legislatures in regulating the use of secrecy claims by the executive branch of government. From there, the focus shifts to the three most vital areas of anti-terrorism law: preventive detention, criminal trials and administrative measures (notably, targeted economic sanctions). The contributors explore how assertions of secrecy and national security in each of these areas affect the functioning of the legal system and the application of procedural justice and fairness. Students, professors and researchers interested in constitutional law, international law, comparative law and issues of terrorism and security will find this an invaluable addition to the literature. Judges, lawyers and policymakers will also find much of use in this critical volume.
Research Methods in Critical Security Studies
Author: Mark B. Salter
Publisher: Routledge
ISBN: 1136260846
Category : Political Science
Languages : en
Pages : 338
Book Description
This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches. In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections: Part I: Research Design Part II: The Ethnographic Turn Part III: The Practice Turn Part IV: The Discursive Turn Part V: The Corporeal Turn Part VI: The Material Turn This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.
Publisher: Routledge
ISBN: 1136260846
Category : Political Science
Languages : en
Pages : 338
Book Description
This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field. New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches. In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections: Part I: Research Design Part II: The Ethnographic Turn Part III: The Practice Turn Part IV: The Discursive Turn Part V: The Corporeal Turn Part VI: The Material Turn This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.
The Basics of Information Security
Author: Jason Andress
Publisher: Syngress
ISBN: 0128008121
Category : Computers
Languages : en
Pages : 240
Book Description
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. - Learn about information security without wading through a huge textbook - Covers both theoretical and practical aspects of information security - Provides a broad view of the information security field in a concise manner - All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
Publisher: Syngress
ISBN: 0128008121
Category : Computers
Languages : en
Pages : 240
Book Description
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. - Learn about information security without wading through a huge textbook - Covers both theoretical and practical aspects of information security - Provides a broad view of the information security field in a concise manner - All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues