Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Research Methods in Critical Security Studies
      loading

      Book

      Research Methods in Critical Security Studies

      DOI link for Research Methods in Critical Security Studies

      Research Methods in Critical Security Studies book

      An Introduction

      Research Methods in Critical Security Studies

      DOI link for Research Methods in Critical Security Studies

      Research Methods in Critical Security Studies book

      An Introduction
      Edited ByMark B. Salter, Can E. Mutlu
      Edition 1st Edition
      First Published 2012
      eBook Published 24 October 2012
      Pub. Location London
      Imprint Routledge
      DOI https://doi.org/10.4324/9780203107119
      Pages 256
      eBook ISBN 9780203107119
      Subjects Politics & International Relations
      Share
      Share

      Get Citation

      Salter, M.B., & Mutlu, C.E. (Eds.). (2012). Research Methods in Critical Security Studies: An Introduction (1st ed.). Routledge. https://doi.org/10.4324/9780203107119

      ABSTRACT

      This new textbook surveys new and emergent methods for doing research in critical security studies, thereby filling a large gap in the literature of this emerging field.

      New or critical security studies is growing as a field, but still lacks a clear methodology; the diverse range of the main foci of study (culture, practices, language, or bodies) means that there is little coherence or conversation between these four schools or approaches.

      In this ground-breaking collection of fresh and emergent voices, new methods in critical security studies are explored from multiple perspectives, providing practical examples of successful research design and methodologies. Drawing upon their own experiences and projects, thirty-three authors address the following turns over the course of six comprehensive sections:

      • Part I: Research Design
      • Part II: The Ethnographic Turn
      • Part III: The Practice Turn
      • Part IV: The Discursive Turn
      • Part V: The Corporeal Turn
      • Part VI: The Material Turn

      This book will be essential reading for upper-level students and researchers in the field of critical security studies, and of much interest to students of sociology, ethnography and IR.

       

       

      TABLE OF CONTENTS

      chapter |14 pages

      Introduction

      ByMark B. Salter

      part Part I|35 pages

      Research design

      chapter |9 pages

      Introduction

      ByMark B. Salter

      chapter |4 pages

      Wondering as research attitude

      ByLuis Lobo-Guerrero

      chapter |4 pages

      Criticality1

      ByXavier Guillaume

      chapter |4 pages

      Do you have what it takes?

      Accounting for emotional and material capacities 1
      ByAnne-Marie D’Aoust

      chapter |5 pages

      Attuning to mess1

      ByVicki Squire

      chapter |4 pages

      Empiricism without positivism1

      King Lear and critical security studies
      ByAndrew W. Neal

      chapter |4 pages

      Engaging collaborative writing critically

      ByMiguel de Larrinaga, Marc G. Doucet

      part Part II|33 pages

      The ethnographic turn

      chapter |7 pages

      Introduction

      ByMark B. Salter

      chapter |4 pages

      Travelling with ethnography

      ByWanda Vrasti

      chapter |4 pages

      Reflexive inquiry

      ByRahel Kunz

      chapter |5 pages

      Listening to migrant stories

      ByHeather L. Johnson

      chapter |4 pages

      Learning by feeling

      ByJesse Paul Crane-Seeber

      chapter |4 pages

      How participant observation contributes to the study of (in)security practices in conflict zones1

      ByJean-François Ratelle

      chapter |4 pages

      Dissident sexualities and the state

      ByMegan Daigle

      part Part III|28 pages

      The practice turn

      chapter |7 pages

      Introduction

      ByMark B. Salter

      chapter |4 pages

      The practice of writing

      ByHannah R. Hughes

      chapter |4 pages

      Researching anti-deportation

      Socialization as method
      ByPeter Nyers

      chapter |4 pages

      Act different, think dispositif1

      ByPhilippe Bonditti

      chapter |4 pages

      Expertise in the aviation security field

      ByMark B. Salter

      chapter |4 pages

      Testifying while critical

      Notes on being an effective gadfly
      ByBenjamin J. Muller

      part Part IV|25 pages

      The discursive turn

      chapter |7 pages

      Introduction

      ByCan E. Mutlu, Mark B. Salter

      chapter |4 pages

      Archives

      ByLuis Lobo-Guerrero

      chapter |4 pages

      Legislative practices

      ByAndrew W. Neal

      chapter |4 pages

      Medicine and the psy disciplines

      ByAlison Howell

      chapter |5 pages

      Speech act theory

      ByJuha A. Vuori

      part Part V|34 pages

      The corporeal turn

      chapter |9 pages

      Introduction

      ByCan E. Mutlu

      chapter |5 pages

      Affect at the airport

      ByPhilippe M. Frowd, Christopher C. Leite

      chapter |4 pages

      Emotional optics

      ByCan E. Mutlu

      chapter |4 pages

      Affective terrain

      Approaching the field in Aamjiwnaang
      BySarah Marie Wiebe

      chapter |3 pages

      Theorizing the body in IR

      ByRosemary E. Shinko

      chapter |4 pages

      Reading the maternal body as political event1

      ByTina Managhan

      chapter |4 pages

      Corporeal migration

      ByTarja Väyrynen

      part |34 pages

      The material turn

      chapter |7 pages

      Introduction

      ByCan E. Mutlu

      chapter |5 pages

      Infrastructure1

      ByClaudia Aradau

      chapter |5 pages

      The Internet as evocative infrastructure

      ByNisha Shah

      chapter |4 pages

      The study of drones as objects of security

      Targeted killing as military strategy
      ByDavid Grondin

      chapter |4 pages

      Objects of security/objects of research

      Analyzing non-lethal weapons
      BySeantel Anaïs

      chapter |4 pages

      Pictoral texts

      ByJuha A. Vuori

      chapter |4 pages

      Tracing human security assemblages

      ByNadine Voelkner
      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited