Publication details

Combining methods: connections and zooms in analysing hybrids. In: Christopher Daase, Julian Junk und Gabi Schlag (Hg.): Dialogues on Security. Identity and Diversity in Security Studies: Routledge, S. 225–241.

Book chapter

Author(s): Junk, Julian; Rauer, Valentin
Year of publication: 2016

Abstract: The main premise of this volume is that security studies is expanding both in terms of the scope of research objects and across disciplinary boundaries. Former dividing lines such as micro versus macro, subject versus object and military versus civil have become increasingly blurred while corresponding methodological boxes have opened. As the contribution by Hegre and Kristiansen in this volume demonstrates, even well-established research fi elds such as confl ict studies stand to benefi t from integrating the insights provided by qualitative and quantitative methods. However, the challenge faced by existing research strategies becomes even more pressing when one considers the impacts of technological and digital advancements in security studies (Rauer 2012 ). One of the most prominent – though, from a social science perspective, yet to be completely understood – developments are drones, or ‘unmanned area vehicles’ (UAVs). These robotic systems are increasingly capable of autonomous action, challenging well-established patterns of assigning agency, responsibility and geographical distance. As such, drones do not represent actors in the sense of human beings but combine characteristics of humans and machines: they constitute ‘hybrids’ or ‘actants’ capable, at least in part, of intentional and autonomous decision-making (Müller and Schörnig 2010 ; Sharkey and Suchman 2013 ; Strawser 2013 ). Scholars have argued that the social sciences have not yet developed research methods suited to these partially overlapping and fragmented phenomena (Latour 2005 ). Research on phenomena such as hybridity demands the combination of methods in a controlled and systematic way, forcing researchers to abandon their own methodological camps and engage in dialogue with other areas of security studies and their research tools.

Keywords: Security Methods

Research area: Research Area 3: The Plurality of Normative Orders: Competition, Overlapping, Interconnection
Research project:

Back to publications list


„Noch einmal: Zum Verhältnis von Moralität und Sittlichkeit" - Vortrag von Jürgen Habermas. Skript und Video zum Abruf verfügbar

Die Meldung zum Vortrag finden Sie hier...

Weitere Informationen (Vortragsskript und Video) zum Vortrag „Noch einmal: Zum Verhältnis von Moralität und Sittlichkeit" von Jürgen Habermas am 19. Juni 2019 an der Goethe-Universität Frankfurt am Main finden Sie hier...

"The History of Postmetaphysical Philosophy and the Future of Democracy" - Konferenz zu Ehren von Jürgen Habermas

Am 20. und 21. Juni fand am Exzellenzcluster "Die Herausbildung normativer Ordnungen" die Konferenz "The History of Postmetaphysical Philosophy and the Future of Democracy" statt.
Die Meldung zur Konferenz finden Sie hier...
Das Programm und weitere Informationen finden Sie hier...

Upcoming Events

16. Juli 2019, 20.15 Uhr

"Talking About a Revolution" : Prof. Dr. Vinzenz Hediger und Prof. Dr. Christoph Burchard: Verzerrt das Kino die KI? Ein Gespräch über Privatheit, IT-Vertrauen und Repräsentation anhand von The Circle. Mehr...

17. Juli 2019, 18.15 Uhr

Ringvorlesung "Demokratie in der Krise? Bruch, Regression und Resilienz": Prof. Philip Manow: Demokratisierung der Demokratie, Entdemokratisierung der Demokratie. Mehr...


Latest Media

Noch einmal: Moralität und Sittlichkeit

Jürgen Habermas
Öffentlicher Vortrag an der Goethe-Universität Frankfurt am Main

Die andere Seite des Kinos: Chantal Akermans De l’autre côté

Martin Seel
Lecture and Film "Die Erfinderin der Formen. Das Kino von Chantal Akerman"

New full-text Publications

Kettemann, Matthias; Kleinwächter, Wolfgang; Senges, Max (2018):

The Time is Right for Europe to Take the Lead in Global Internet Governance. Normative Orders Working Paper 02/2018. More...

Kettemann, Matthias (2019):

Die normative Ordnung der Cyber-Sicherheit: zum Potenzial von Cyber-Sicherheitsnormen. Normative Orders Working Paper 01/2019. More...