{"id":23,"date":"2018-05-25T09:16:14","date_gmt":"2018-05-25T08:16:14","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?page_id=23"},"modified":"2021-06-21T19:37:29","modified_gmt":"2021-06-21T18:37:29","slug":"our-research","status":"publish","type":"page","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/","title":{"rendered":"Our Research"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<p style=\"margin-bottom: 18.0pt;background: white\"><span style=\"font-family: 'Open Sans',sans-serif;color: #434241;letter-spacing: .05pt\">By shaping the kind of knowledge we produce, research methodologies often lead to the reinforcement of existing imbalances in power relations and extractivist forms of research that benefit academics based in the Global North at the expense of research participants and collaborators in the Global South. Such research has rightly come increasingly under critical scrutiny.<\/span><\/p>\n<p style=\"margin-bottom: 0cm;background: white;text-align: start\"><span style=\"font-family: 'Open Sans',sans-serif;color: #434241;letter-spacing: .05pt\">Such debates are particularly urgent in research on in\/security and vulnerability, given how\u00a0<\/span>security as a system of governance \u2013 through policing, border controls, international\u00a0interventions, etc. \u2013 often reproduces, rather than challenges, social inequalities based on race,\u00a0gender, class, disability, sexuality and other axes of inequality.<\/p>\n<p style=\"margin-bottom: 0cm;background: white;text-align: start\"><span style=\"font-family: 'Open Sans',sans-serif;color: #434241;letter-spacing: .05pt\">This project thus intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_custom_heading text=&#8221;How will we do this?&#8221; font_container=&#8221;tag:h2|font_size:30|text_align:left|color:%23210968&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Through a series of virtual workshops with the group members and other co-researchers, we will create collaborative debate about research design and methodologies in the study of in\/security and vulnerability.<\/p>\n<p>As an interdisciplinary network with expertise in socially-engaged performance studies, feminist governance, history, innovative literary methods, law, international relations, environmental and Latin American studies to this debate, we will combine our experiences and \u2018live\u2019 practices of research methods to allow for knowledge exchange. We aim to establish how we can:<\/p>\n<ul>\n<li>Create collaborative research design practice<\/li>\n<li>Rethink data and evidence to co-produce knowledge<\/li>\n<li>Decolonise research methodologies and languages<\/li>\n<li>Acknowledge research tensions and ethics<\/li>\n<li>Address the obstacles to implementing indigenous methods<\/li>\n<li>Better support early-researchers and co-researchers<\/li>\n<\/ul>\n<p>This research methods project sits alongside the Vulnerability Studies Network \u2013 find out more about this here<\/p>\n<p>You can also find out more about our members\u2019 individual research into in\/security and vulnerability studies <a href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\">here<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_custom_heading text=&#8221;Our impact&#8221; font_container=&#8221;tag:h2|font_size:30|text_align:left|color:%23210968&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]This project extends conversations about research methodologies in the fields of in\/security and vulnerabilities beyond academic circles and towards those who are normally characterised as \u2018research participants\u2019 &#8211; here recast as co-researchers.<\/p>\n<p>Thus, the project will, first, positively impact relationships between researchers and co-researchers, providing an opportunity to explore sustainable ways of working together that embed equitable practice into our research. Second, by sharing and teaching our diverse research methodologies to each other and our coresearchers, the workshops will problematise and complicate our understandings of felt and lived experiences of in\/security, with potential immediate practical applications beyond academia, into areas such as refugee law.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_btn title=&#8221;See our publications&#8221; color=&#8221;turquoise&#8221; link=&#8221;url:https%3A%2F%2Fresearch.reading.ac.uk%2Fresearch-methods-in-vulnerability%2Fsection-2%2Four-publications%2F|title:Our%20Publications&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_btn title=&#8221;Discover more of our projects&#8221; color=&#8221;peacoc&#8221; link=&#8221;url:https%3A%2F%2Fresearch.reading.ac.uk%2Fresearch-methods-in-vulnerability%2Four-projects%2F|title:Our%20Projects&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] By shaping the kind of knowledge we produce, research methodologies often lead to the reinforcement of existing imbalances in power relations and extractivist forms of research that benefit academics&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#111;&#117;&#114;&#45;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"coauthors":[11],"class_list":["post-23","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Our Research - Research Methods in Vulnerability<\/title>\n<meta name=\"description\" content=\"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our Research - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-21T18:37:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Mara Oliva\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/\",\"name\":\"Our Research - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2018-05-25T08:16:14+00:00\",\"dateModified\":\"2021-06-21T18:37:29+00:00\",\"description\":\"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our Research - Research Methods in Vulnerability","description":"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/","og_locale":"en_GB","og_type":"article","og_title":"Our Research - Research Methods in Vulnerability","og_description":"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/","og_site_name":"Research Methods in Vulnerability","article_modified_time":"2021-06-21T18:37:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes","Written by":"Mara Oliva"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/","name":"Our Research - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2018-05-25T08:16:14+00:00","dateModified":"2021-06-21T18:37:29+00:00","description":"This project in vulnerability research methods intends to provide a space for exploring alternative, anti-racist, feminist, indigenous and decolonising approaches to research methodologies in this field, and to establish more collaborative and equitable research relationships.","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Our Research"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":10,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/23\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=23"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}