{"id":367,"date":"2023-02-23T15:50:15","date_gmt":"2023-02-23T15:50:15","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?p=367"},"modified":"2023-02-23T15:50:15","modified_gmt":"2023-02-23T15:50:15","slug":"dr-zoe-zontou","status":"publish","type":"post","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/","title":{"rendered":"Dr Zoe Zontou"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-368\" src=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-300x300.jpg 300w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-1024x1024.jpg 1024w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-150x150.jpg 150w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-768x768.jpg 768w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-1536x1536.jpg 1536w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Zoe invited us to consider <\/span><span style=\"font-weight: 400\">the complex relationship between working <\/span><span style=\"font-weight: 400\">artistically with personal narratives of addiction recovery through practice. <\/span><span style=\"font-weight: 400\">With Zoe we <\/span><span style=\"font-weight: 400\">had the opportunity to be playful with objects, connecting things scavenged from around the house with colleague\u2019s objects from around the world in stories and play. Zoe talked to us about the power of objects as ways to begin to explore personal storytelling with communities with experience of addiction.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Zoe invited us to consider the complex relationship between working artistically with personal narratives of addiction recovery through practice. With Zoe we had the opportunity to be playful with&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#100;&#114;&#45;&#122;&#111;&#101;&#45;&#122;&#111;&#110;&#116;&#111;&#117;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"categories":[9],"tags":[],"coauthors":[11],"class_list":["post-367","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dr Zoe Zontou - Research Methods in Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dr Zoe Zontou - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Zoe invited us to consider the complex relationship between working artistically with personal narratives of addiction recovery through practice. With Zoe we had the opportunity to be playful with...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T15:50:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-300x300.jpg\" \/>\n<meta name=\"author\" content=\"Mara Oliva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mara Oliva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/\",\"name\":\"Dr Zoe Zontou - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2023-02-23T15:50:15+00:00\",\"dateModified\":\"2023-02-23T15:50:15+00:00\",\"author\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\"},\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dr Zoe Zontou\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\",\"name\":\"Mara Oliva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"caption\":\"Mara Oliva\"},\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dr Zoe Zontou - Research Methods in Vulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/","og_locale":"en_GB","og_type":"article","og_title":"Dr Zoe Zontou - Research Methods in Vulnerability","og_description":"&nbsp; Zoe invited us to consider the complex relationship between working artistically with personal narratives of addiction recovery through practice. With Zoe we had the opportunity to be playful with...Read More >","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/","og_site_name":"Research Methods in Vulnerability","article_published_time":"2023-02-23T15:50:15+00:00","og_image":[{"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Zoe-Zontou-300x300.jpg"}],"author":"Mara Oliva","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mara Oliva","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/","name":"Dr Zoe Zontou - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2023-02-23T15:50:15+00:00","dateModified":"2023-02-23T15:50:15+00:00","author":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7"},"breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-zoe-zontou\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Dr Zoe Zontou"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7","name":"Mara Oliva","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344","url":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","caption":"Mara Oliva"},"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":1,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/367\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/367\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/categories?post=367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/tags?post=367"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}