{"id":370,"date":"2023-02-23T15:52:03","date_gmt":"2023-02-23T15:52:03","guid":{"rendered":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?p=370"},"modified":"2023-02-23T15:52:03","modified_gmt":"2023-02-23T15:52:03","slug":"dr-kirsten-sadeghi-yekta","status":"publish","type":"post","link":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/","title":{"rendered":"Dr Kirsten Sadeghi-Yekta"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-371\" src=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--300x300.jpg 300w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--1024x1024.jpg 1024w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--150x150.jpg 150w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--768x768.jpg 768w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--1536x1536.jpg 1536w, https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Kirsten used examples of working with indigenous communities over extended periods of time to preserve traditions, come together, celebrate histories and look to the future. We began with a check-in, which created a discussion around ethics of practice and the importance of providing a space for participants to take part in as much as they feel comfortable. Kirsten spoke about the emotional labour of academia, but also on the idea that in community settings the same level of care is extended to the \u201cacademic\u201d as it is the participant.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kirsten used examples of working with indigenous communities over extended periods of time to preserve traditions, come together, celebrate histories and look to the future. We began with a check-in,&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#45;&#109;&#101;&#116;&#104;&#111;&#100;&#115;&#45;&#105;&#110;&#45;&#118;&#117;&#108;&#110;&#101;&#114;&#97;&#98;&#105;&#108;&#105;&#116;&#121;&#47;&#100;&#114;&#45;&#107;&#105;&#114;&#115;&#116;&#101;&#110;&#45;&#115;&#97;&#100;&#101;&#103;&#104;&#105;&#45;&#121;&#101;&#107;&#116;&#97;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":295,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"categories":[9],"tags":[],"coauthors":[11],"class_list":["post-370","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability\" \/>\n<meta property=\"og:description\" content=\"Kirsten used examples of working with indigenous communities over extended periods of time to preserve traditions, come together, celebrate histories and look to the future. We began with a check-in,...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Methods in Vulnerability\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T15:52:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--300x300.jpg\" \/>\n<meta name=\"author\" content=\"Mara Oliva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mara Oliva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/\",\"name\":\"Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\"},\"datePublished\":\"2023-02-23T15:52:03+00:00\",\"dateModified\":\"2023-02-23T15:52:03+00:00\",\"author\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\"},\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dr Kirsten Sadeghi-Yekta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/\",\"name\":\"Research Methods in Vulnerability\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7\",\"name\":\"Mara Oliva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g\",\"caption\":\"Mara Oliva\"},\"url\":\"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/","og_locale":"en_GB","og_type":"article","og_title":"Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability","og_description":"Kirsten used examples of working with indigenous communities over extended periods of time to preserve traditions, come together, celebrate histories and look to the future. We began with a check-in,...Read More >","og_url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/","og_site_name":"Research Methods in Vulnerability","article_published_time":"2023-02-23T15:52:03+00:00","og_image":[{"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-content\/uploads\/sites\/202\/2023\/02\/Kirsten-Sadeghi-Yekta--300x300.jpg"}],"author":"Mara Oliva","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mara Oliva","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/","name":"Dr Kirsten Sadeghi-Yekta - Research Methods in Vulnerability","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website"},"datePublished":"2023-02-23T15:52:03+00:00","dateModified":"2023-02-23T15:52:03+00:00","author":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7"},"breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/dr-kirsten-sadeghi-yekta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/"},{"@type":"ListItem","position":2,"name":"Dr Kirsten Sadeghi-Yekta"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#website","url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/","name":"Research Methods in Vulnerability","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/b98dacc45e39263579b041604eacabf7","name":"Mara Oliva","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/#\/schema\/person\/image\/a3481346685e7532f6e01a84d4131344","url":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7179498cc7a8e144731f62d5b4073c3c09fbfc37adfcbe807baa370c2f4a4f65?s=96&d=mm&r=g","caption":"Mara Oliva"},"url":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/author\/m-olivareading-ac-uk\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/comments?post=370"}],"version-history":[{"count":1,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/370\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/posts\/370\/revisions\/372"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/media?parent=370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/categories?post=370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/tags?post=370"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/research-methods-in-vulnerability\/wp-json\/wp\/v2\/coauthors?post=370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}