<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02982cam a2200313 i 4500</leader>
  <controlfield tag="001">ocn854610965</controlfield>
  <controlfield tag="003">OCoLC</controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">210122s2015    enk      b    001 0 eng  </controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2014009463</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780415712958 (paperback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0415712955 (paperback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780415712941 (hardback)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0415712947 (hardback)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)854610965</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2=" ">
    <subfield code="a">JZ5588</subfield>
    <subfield code="b">.C747 2015</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
    <subfield code="a">Critical security methods :</subfield>
    <subfield code="b">new frameworks for analysis /</subfield>
    <subfield code="c">edited by Claudia Aradau ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Abingdon, Oxon ;</subfield>
    <subfield code="a">New York, NY :</subfield>
    <subfield code="b">Routledge,</subfield>
    <subfield code="c">2015.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xiv, 214 p.</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
    <subfield code="a">The new international relations</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
    <subfield code="a">Introducing critical security methods / Claudia Aradau, Jef Huysmans, Andre Neal and Nadine Voelkner -- Mapping / Victoria Loughlan, Christian Olsson and Peer Schouten -- Discourse/materiality / Claudia Aradau, Martin Coward, Eva Herschinger, Owen D. Thomas and Nadine Voelkner -- Visuality / Rune Saugmann Andersen, Juha A. Vuori and Can E. Mutlu -- Proximity / Christian Bueger and Manuel Mireanu -- Distance / Lara Montesinos Coleman and Hannah Hughes -- Genealogy / Philippe Bonditti, Andrew Neal, Sven Opitz and Chris Zebrowski -- Collaboration / Xavier Guillaume, with an intervention by Phillipe Bonditti, Andrew Neal, Sven Opitz, Chris Zebrowski.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Critical Security Methods offers a new approach to research methods in critical security studies. It argues that methods are not simply tools to bridge the gap between security theory and security practice. Rather, to practice methods critically means engaging in a more free and experimental interplay between theory, methods and practice. This recognises that the security practices we research are often methods in their own right, as forms of surveillance, data mining, visualisation, and so on, and that our own research methods are themselves practices that intervene and interfere in those sites of security and insecurity. Against the familiar methdological language of rigour, detachment and procedural consistency, Critical Security Methods reclaims the idea of method as experiment. The chapters offer a series of methodological experimentations that assemble concepts, theory and empirical cases into new frameworks for critical security research. They show how critical engagement and methodological innovation can be practiced as interventions into diverse instances of insecurity and securitisation, including airports, drug trafficking, peasant struggles, biometrics and police kettling. The book will be a valuable resource for students and researchers in critical security studies, politics and international relations"-- Provided by publisher.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
    <subfield code="a">Security, International.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
    <subfield code="a">International relations.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Aradau, Claudia,</subfield>
    <subfield code="d">1976-</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
    <subfield code="a">New international relations</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">lcc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">PNLIB</subfield>
    <subfield code="b">PNLIB</subfield>
    <subfield code="c">GEN</subfield>
    <subfield code="d">2021-06-17</subfield>
    <subfield code="o">JZ5588 .C747 2015</subfield>
    <subfield code="p">PNLIB21060098</subfield>
    <subfield code="r">2021-06-17</subfield>
    <subfield code="w">2021-06-17</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">284</subfield>
    <subfield code="d">284</subfield>
  </datafield>
</record>
