{"id":364,"date":"2023-02-23T15:48:32","date_gmt":"2023-02-23T15:48:32","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?p=364"},"modified":"2023-02-23T15:48:32","modified_gmt":"2023-02-23T15:48:32","slug":"dr-joe-parslow","status":"publish","type":"post","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/","title":{"rendered":"Dr Joe Parslow"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-365\" src=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-300x300.jpg 300w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-1024x1024.jpg 1024w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-150x150.jpg 150w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-768x768.jpg 768w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-1536x1536.jpg 1536w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In Joe\u2019s session we experienced a semi-autoethnographic presentation set against a rolling slideshow of queer and drag images, which were often accompanied by anecdotes and asides, e.g. \u201cthis is when my role was to pour oat milk over a drag artist\u201d&#8230; Joe talked about ethics, feelings and hunches as research, and communities as people \u201ccoming\u201d together. They explored queer hope, the politics of passing, and some of the nebulous relationships between queerness, grief, hangovers and sobriety.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; In Joe\u2019s session we experienced a semi-autoethnographic presentation set against a rolling slideshow of queer and drag images, which were often accompanied by anecdotes and asides, e.g. \u201cthis is&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#100;&#114;&#45;&#106;&#111;&#101;&#45;&#112;&#97;&#114;&#115;&#108;&#111;&#119;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"categories":[9],"tags":[],"coauthors":[11],"class_list":["post-364","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dr Joe Parslow - Research Methods in Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dr Joe Parslow - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"&nbsp; In Joe\u2019s session we experienced a semi-autoethnographic presentation set against a rolling slideshow of queer and drag images, which were often accompanied by anecdotes and asides, e.g. \u201cthis is...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T15:48:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-300x300.jpg\" \/>\n<meta name=\"author\" content=\"Mara Oliva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mara Oliva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/\",\"name\":\"Dr Joe Parslow - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2023-02-23T15:48:32+00:00\",\"dateModified\":\"2023-02-23T15:48:32+00:00\",\"author\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\"},\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dr Joe Parslow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\",\"name\":\"Mara Oliva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"caption\":\"Mara Oliva\"},\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dr Joe Parslow - Research Methods in Vulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/","og_locale":"en_GB","og_type":"article","og_title":"Dr Joe Parslow - Research Methods in Vulnerability","og_description":"&nbsp; In Joe\u2019s session we experienced a semi-autoethnographic presentation set against a rolling slideshow of queer and drag images, which were often accompanied by anecdotes and asides, e.g. \u201cthis is...Read More >","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/","og_site_name":"Research Methods in Vulnerability","article_published_time":"2023-02-23T15:48:32+00:00","og_image":[{"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Joe-Parslow-300x300.jpg"}],"author":"Mara Oliva","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mara Oliva","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/","name":"Dr Joe Parslow - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2023-02-23T15:48:32+00:00","dateModified":"2023-02-23T15:48:32+00:00","author":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7"},"breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-joe-parslow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Dr Joe Parslow"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7","name":"Mara Oliva","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344","url":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","caption":"Mara Oliva"},"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":1,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/364\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/364\/revisions\/366"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/categories?post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/tags?post=364"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}