{"id":360,"date":"2023-02-23T15:47:05","date_gmt":"2023-02-23T15:47:05","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?p=360"},"modified":"2023-02-23T15:47:05","modified_gmt":"2023-02-23T15:47:05","slug":"dr-alex-halligey","status":"publish","type":"post","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/","title":{"rendered":"Dr Alex Halligey"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-361\" src=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-300x300.jpg 300w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-1024x1024.jpg 1024w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-150x150.jpg 150w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-768x768.jpg 768w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-1536x1536.jpg 1536w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400\">Alex invited the research group to experience a series of playful experimental explorations. Guided by Alex, the group had the opportunity to envisage our favourite places, feel these in our bodies and then write them down. Alex challenged us to map our place using the five senses, first on their own and then in combination with a series of writing prompts. We talked about the possibilities of harnessing the senses in our work with participants, and creating sensory itineraries rather than maps (drawing on the work of Tim Ingold).\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Alex invited the research group to experience a series of playful experimental explorations. Guided by Alex, the group had the opportunity to envisage our favourite places, feel these in&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#100;&#114;&#45;&#97;&#108;&#101;&#120;&#45;&#104;&#97;&#108;&#108;&#105;&#103;&#101;&#121;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"categories":[9],"tags":[],"coauthors":[11],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dr Alex Halligey - Research Methods in Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dr Alex Halligey - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Alex invited the research group to experience a series of playful experimental explorations. Guided by Alex, the group had the opportunity to envisage our favourite places, feel these in...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T15:47:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-300x300.jpg\" \/>\n<meta name=\"author\" content=\"Mara Oliva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mara Oliva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/\",\"name\":\"Dr Alex Halligey - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2023-02-23T15:47:05+00:00\",\"dateModified\":\"2023-02-23T15:47:05+00:00\",\"author\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\"},\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dr Alex Halligey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\",\"name\":\"Mara Oliva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"caption\":\"Mara Oliva\"},\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dr Alex Halligey - Research Methods in Vulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/","og_locale":"en_GB","og_type":"article","og_title":"Dr Alex Halligey - Research Methods in Vulnerability","og_description":"&nbsp; Alex invited the research group to experience a series of playful experimental explorations. Guided by Alex, the group had the opportunity to envisage our favourite places, feel these in...Read More >","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/","og_site_name":"Research Methods in Vulnerability","article_published_time":"2023-02-23T15:47:05+00:00","og_image":[{"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Alex-Halligey-300x300.jpg"}],"author":"Mara Oliva","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mara Oliva","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/","name":"Dr Alex Halligey - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2023-02-23T15:47:05+00:00","dateModified":"2023-02-23T15:47:05+00:00","author":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7"},"breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-alex-halligey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Dr Alex Halligey"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7","name":"Mara Oliva","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344","url":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","caption":"Mara Oliva"},"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":2,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/360\/revisions\/363"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/tags?post=360"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}