Critical Approaches to Security in Central Asia 2020
DOI: 10.4324/9780429024023-12
|View full text |Cite
|
Sign up to set email alerts
|

Navigating the safety implications of doing research and being researched in Kyrgyzstan: cooperation, networks and framing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Going through the bureaucracy of higher education institutions would take longer time and might have safety implications for a local scholar. Getting access to data in Central Asia is highly challenging for researchers, and might attract attention from national security bodies (Bekmurzaev et al, 2018; Gentile, 2013; Koch, 2013). Collecting data directly from each selected institutions’ web-site would more accurately represent the quality of their MPA programmes.…”
Section: Methodsmentioning
confidence: 99%
“…Going through the bureaucracy of higher education institutions would take longer time and might have safety implications for a local scholar. Getting access to data in Central Asia is highly challenging for researchers, and might attract attention from national security bodies (Bekmurzaev et al, 2018; Gentile, 2013; Koch, 2013). Collecting data directly from each selected institutions’ web-site would more accurately represent the quality of their MPA programmes.…”
Section: Methodsmentioning
confidence: 99%
“…The third covert research technique refers to the abovementioned 'flexible' approach of framing and communicating the goals and outputs of one's research depending on the audience. As argued by Bekmurzaev et al (2018), framing one's research in a particular manner is important to secure and maintain access to the people and sites in question. The fact that this often implies disclosure of only selective information on a given research project vis-a-vis research participants requires critical reflection about the possible implications of this information asymmetry.…”
Section: Commonly Acceptable Covert Research Techniquesmentioning
confidence: 99%
“…To face these challenges, researchers often feel pushed to settle for 'groundbreaking', and not rarely 'sensitive' research topics, adopting certain angles and data collection techniques to obtain field data. In the specific case of Central Asian studies, Bekmurzaev et al (2018) observe a tendency to use framings that are 'politically provocative, if not exerting epistemic violence upon research subjects' (see also Reeves, 2005Reeves, , 2014. This might be caused by a scarcity of research funding allocated for research on this region by Western funding bodies and universities.…”
Section: Western and Western-centric Knowledge Production Pushing Into Covertnessmentioning
confidence: 99%
See 1 more Smart Citation
“…In authoritarian regimes, the possibility of repressions also fosters self-censorship within the mass media and in social media (Alexanyan et al, 2012; Bekmurzaev, Lottholz, & Meyer, 2018; Malthaner, 2014; Roberts, 2013; Shklovski & Valtysson, 2012). Accordingly, all forms of content and discourse analysis might include self-censored and actually censored forms of expression.…”
Section: Problems Of Data Interpretationmentioning
confidence: 99%