{"id":235,"date":"2021-05-09T15:29:32","date_gmt":"2021-05-09T14:29:32","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?page_id=235"},"modified":"2021-06-21T19:35:25","modified_gmt":"2021-06-21T18:35:25","slug":"our-projects","status":"publish","type":"page","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/","title":{"rendered":"Our Projects"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Research methods in vulnerability is a project funded by the British Academy and CIFAR, seeking to find alternative, anti-racist, feminist, indigenous and decolonising approaches to how we research understandings and experiences of in\/security through the interdisciplinary knowledge sharing of methodologies in this field.[\/vc_column_text][vc_btn title=&#8221;Read more about our aims&#8221; link=&#8221;url:https%3A%2F%2Fresearch.reading.ac.uk%2Fresearch-methods-in-vulnerability%2Fabout-us%2F|title:Our%20Publications&#8221;][vc_btn title=&#8221;Find out about our research&#8221; color=&#8221;sky&#8221; link=&#8221;url:https%3A%2F%2Fresearch.reading.ac.uk%2Fresearch-methods-in-vulnerability%2Four-research%2F|title:Our%20Research&#8221;][vc_column_text]This project sits alongside the Vulnerability Studies Network, another British Academy and CIFAR funded project bringing together early career women scholars, researchers, and practitioners from different fields of study and studying different national contexts to stage collaborative discussions about the ways in which the concept of vulnerability as it relates to in\/security is mobilised in different fields of expertise.<\/p>\n<p>The study of vulnerability and in\/security is an emergent, flexible, and multidisciplinary field. It draws on and is used in a wide range of subject areas including geography, economics, environmental studies, law, criminology, politics, public health, psychology, social justice, and sociology. It is predominantly used as a term to denote weakness of susceptibility to harm and is often used in conjunction with work in development, environmental and disaster studies with the aim of reducing risk and improving resilience. However, vulnerability is often overlooked in public policies and international relations.<\/p>\n<p>The Vulnerability Studies Network seeks to answer the following questions:<\/p>\n<ol>\n<li>How is vulnerability mobilised as a concept in different disciplinary contexts?<\/li>\n<li>What are the processes (political, legal, civic, social) by which vulnerability and insecurity are \u2018assessed\u2019, \u2018measured\u2019 and \u2018distributed\u2019?<\/li>\n<li>How might individual and collective vulnerability and insecurity open up spaces for resistance, empowerment, and solidarity?<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;More projects from our members&#8221; font_container=&#8221;tag:h2|font_size:30|text_align:left|color:%23210968&#8243;][vc_column_text]Click on the links below to find out more about our members&#8217; individual vulnerability research projects:<\/p>\n<p><a href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/environmental-security-with-dr-mara-oliva\/\">Environmental Security with Dr Mara Oliva<\/a><\/p>\n<p><a href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/refugee-law-he-cameron\/\">Refugee Law with Hilary Evans Cameron<\/a><\/p>\n<p><a href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/visualizing-gender-based-violence-in-graphic-awareness-campaigns-in-nepal\/\">Visualizing Gender-Based Violence in Graphic Awareness Campaigns in Nepal with Charlotta Salmi<\/a>[\/vc_column_text][\/vc_column][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Research methods in vulnerability is a project funded by the British Academy and CIFAR, seeking to find alternative, anti-racist, feminist, indigenous and decolonising approaches to how we research understandings and&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#111;&#117;&#114;&#45;&#112;&#114;&#111;&#106;&#101;&#99;&#116;&#115;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"coauthors":[11],"class_list":["post-235","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Our Projects - Research Methods in Vulnerability<\/title>\n<meta name=\"description\" content=\"Find out more about our project &#039;Research Methods in Vulnerability&#039; as well as other projects related to vulnerability research our members are involved in.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our Projects - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"Find out more about our project &#039;Research Methods in Vulnerability&#039; as well as other projects related to vulnerability research our members are involved in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-21T18:35:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Mara Oliva\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\",\"name\":\"Our Projects - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2021-05-09T14:29:32+00:00\",\"dateModified\":\"2021-06-21T18:35:25+00:00\",\"description\":\"Find out more about our project 'Research Methods in Vulnerability' as well as other projects related to vulnerability research our members are involved in.\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our Projects - Research Methods in Vulnerability","description":"Find out more about our project 'Research Methods in Vulnerability' as well as other projects related to vulnerability research our members are involved in.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/","og_locale":"en_GB","og_type":"article","og_title":"Our Projects - Research Methods in Vulnerability","og_description":"Find out more about our project 'Research Methods in Vulnerability' as well as other projects related to vulnerability research our members are involved in.","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/","og_site_name":"Research Methods in Vulnerability","article_modified_time":"2021-06-21T18:35:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes","Written by":"Mara Oliva"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/","name":"Our Projects - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2021-05-09T14:29:32+00:00","dateModified":"2021-06-21T18:35:25+00:00","description":"Find out more about our project 'Research Methods in Vulnerability' as well as other projects related to vulnerability research our members are involved in.","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/our-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Our Projects"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=235"}],"version-history":[{"count":10,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/235\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/pages\/235\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}