Skip to main content
Top

2023 | OriginalPaper | Chapter

3. Social Media, Digital Methods and Critical Security Studies

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter has two main parts. The first part of this chapter delves into the intersection between methods, methodologies, critical security studies and social media analysis. This is a large undertaking that undoubtedly warrants more attention as time passes, critical security studies advances, social media continues to proliferate and new social and political events unfold. As such, while international relations and critical security studies have made significant strides in recent decades to not only diversify methods and approaches within a highly conservative discipline such as international relations, much more needs to be done to recognise that social media studies, communications technology-based methods “count” (Aradau, Huysmans et al. in Critical security methods: New frameworks for analysis, Routledge, 2015) as valuable research subjects. However, approaching social media analysis is far from simple. The populations sampled are highly unrepresentative and the enduring “digital divides” (Ali in Harvard Human Rights Journal 24:185–220, 2011; Cullen in Online Information Review 25:311–320, 2001; Dijk in Poetics 34:221–235, 2006) present some specific questions for critical security studies and its much troubled “emancipatory” commitments and potential. This chapter also seeks to shed some light on the changeable and vexing question of data access as much important and insightful data that could shed important lights into evolving areas of security on social media are off limits to researchers, or disappear before they can be captured. The second part of this chapter sets out some methodological notes on the operationalisation of some key methods for examining critical security questions with a range of digital methods. Many of these are results of the to and fro “methodological “bricolage” (Aradau, Huysmans et al. in Critical security methods: New frameworks for analysis, Routledge, 2015) familiar to critical security studies where methods require experimentation and re-balancing to better tailor them to specific critical security questions. This examines social network analysis, netnographic approaches and the intersection of social media and the discursive turn in security studies, including the application of thematic analysis to critical security questions. None of this, however, should be interpreted as the final word on digital methods and critical security as the ever-increasing range of platforms, approaches and intersections of security and technology will require scholars to constantly work to develop their own method and methodological approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ahmed, W., & Bath, P. A. (2015). The Ebola epidemic on Twitter: Challenges for health informatics. In Proceedings of. Sheffield. p. Ahmed, W., & Bath, P. A. (2015). The Ebola epidemic on Twitter: Challenges for health informatics. In Proceedings of. Sheffield. p.
go back to reference Ahmed, W., & Lugovic, S. (2018). Social media analytics: Analysis and visualisation of news diffusion using NodeXL. Online Information Review, 43(1), 149–160 [Online]. Ahmed, W., & Lugovic, S. (2018). Social media analytics: Analysis and visualisation of news diffusion using NodeXL. Online Information Review, 43(1), 149–160 [Online].
go back to reference Alavi, S., et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 1182–1196. Alavi, S., et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 1182–1196.
go back to reference Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220. Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220.
go back to reference Aradau, C., et al. (2019). Acts of digital parasitism: Hacking, humanitarian apps and platformisation. New Media & Society, 21(11–12), 2548–2565.CrossRef Aradau, C., et al. (2019). Acts of digital parasitism: Hacking, humanitarian apps and platformisation. New Media & Society, 21(11–12), 2548–2565.CrossRef
go back to reference Aradau, C., Huysmans, J., et al. (2015). Critical security methods: New frameworks for analysis. Routledge. Aradau, C., Huysmans, J., et al. (2015). Critical security methods: New frameworks for analysis. Routledge.
go back to reference Aradau, C., Coward, M., et al. (2015). discourse/materiality. Critical security methods: New framework for analysis (pp. 57–84). Routledge. Aradau, C., Coward, M., et al. (2015). discourse/materiality. Critical security methods: New framework for analysis (pp. 57–84). Routledge.
go back to reference Auger, G. A. (2013). Fostering democracy through social media: Evaluating diametrically opposed nonprofit advocacy organizations’ use of Facebook, Twitter, and YouTube. Public Relations Review, 39(4), 369–376.CrossRef Auger, G. A. (2013). Fostering democracy through social media: Evaluating diametrically opposed nonprofit advocacy organizations’ use of Facebook, Twitter, and YouTube. Public Relations Review, 39(4), 369–376.CrossRef
go back to reference Balaji, T. K., et al. (2021). Machine learning algorithms for social media analysis: A survey. Computer Science Review, 40, 100395. Balaji, T. K., et al. (2021). Machine learning algorithms for social media analysis: A survey. Computer Science Review, 40, 100395.
go back to reference Bali, R., et al. (2017). Learning social media analytics with R. Packt Publishing Ltd. Google-Books-ID: gHc5DwAAQBAJ. Bali, R., et al. (2017). Learning social media analytics with R. Packt Publishing Ltd. Google-Books-ID: gHc5DwAAQBAJ.
go back to reference Bastian, M., et al. (2009). Gephi: An open source software for exploring and manipulating networks. Proceedings of the International AAAI Conference on Web and Social Media, 3(1), 361–362.CrossRef Bastian, M., et al. (2009). Gephi: An open source software for exploring and manipulating networks. Proceedings of the International AAAI Conference on Web and Social Media, 3(1), 361–362.CrossRef
go back to reference Bayer, J. B., et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977.CrossRef Bayer, J. B., et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977.CrossRef
go back to reference Beyer, Y. (2012). Using DiscoverText for large scale twitter harvesting. Microform & Digitization Review, 41(3–4), 121–125. Beyer, Y. (2012). Using DiscoverText for large scale twitter harvesting. Microform & Digitization Review, 41(3–4), 121–125.
go back to reference Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.CrossRef Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.CrossRef
go back to reference Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296.CrossRef Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296.CrossRef
go back to reference Burgess, J. (2008). All your chocolate rain are belong to us? Viral video, YouTube and the dynamics of participatory culture. In Video Vortex Reader: Responses to YouTube (p. 10). Institute of Network Cultures. Burgess, J. (2008). All your chocolate rain are belong to us? Viral video, YouTube and the dynamics of participatory culture. In Video Vortex Reader: Responses to YouTube (p. 10). Institute of Network Cultures.
go back to reference Buzan, B., et al. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner Publishers. Buzan, B., et al. (1997). Security: A new framework for analysis (UK ed.). Lynne Rienner Publishers.
go back to reference Chatterjee, S., & Krystyanczuk, M. (2017). Python social media analytics. Packt Publishing Ltd. Google-Books-ID: 8eZDDwAAQBAJ. Chatterjee, S., & Krystyanczuk, M. (2017). Python social media analytics. Packt Publishing Ltd. Google-Books-ID: 8eZDDwAAQBAJ.
go back to reference Cherif, H., & Miled, B. (2013). Are brand communities influencing brands through co-creation? A cross-national example of the brand AXE: In France and in Tunisia. International Business Research, 6(9), 14. Cherif, H., & Miled, B. (2013). Are brand communities influencing brands through co-creation? A cross-national example of the brand AXE: In France and in Tunisia. International Business Research, 6(9), 14.
go back to reference Costello, L., et al. (2012). Self-revelation in an online health community: Exploring issues around co-presence for vulnerable members. Proceedings of Australian and New Zealand Communication Association (ANZCA) Conference, 13. Costello, L., et al. (2012). Self-revelation in an online health community: Exploring issues around co-presence for vulnerable members. Proceedings of Australian and New Zealand Communication Association (ANZCA) Conference, 13.
go back to reference Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320.CrossRef Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320.CrossRef
go back to reference Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels (p. 20). Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the US military in extreme right-wing telegram channels (p. 20).
go back to reference Davidson, P. (2012). The language of internet memes. In M. Mandiberg (Ed.), The social media reader. NYU Press. Davidson, P. (2012). The language of internet memes. In M. Mandiberg (Ed.), The social media reader. NYU Press.
go back to reference Davies, R. (2009). The use of social network analysis tools in the evaluation of social change communications. Communication for social change consortium. Davies, R. (2009). The use of social network analysis tools in the evaluation of social change communications. Communication for social change consortium.
go back to reference De Nooy, W., et al. (2018). Exploratory social network analysis with Pajek. Cambridge University Press. De Nooy, W., et al. (2018). Exploratory social network analysis with Pajek. Cambridge University Press.
go back to reference del Fresno García, M., et al. (2016). Identifying the new influences in the internet era: Social media and social network analysis. Identificando a los nuevos influyentes en tiempos de Internet: medios sociales y análisis de redes sociales, 153, 23–40. del Fresno García, M., et al. (2016). Identifying the new influences in the internet era: Social media and social network analysis. Identificando a los nuevos influyentes en tiempos de Internet: medios sociales y análisis de redes sociales, 153, 23–40.
go back to reference Downing, J., & Ahmed, W. (2019). #MacronLeaks as a “warning shot” for European democracies: Challenges to election blackouts presented by social media and election meddling during the 2017 French presidential election. French Politics, 17(3), 257–278.CrossRef Downing, J., & Ahmed, W. (2019). #MacronLeaks as a “warning shot” for European democracies: Challenges to election blackouts presented by social media and election meddling during the 2017 French presidential election. French Politics, 17(3), 257–278.CrossRef
go back to reference Downing, J., & Dron, R. (2020b). Tweeting Grenfell: Discourse and networks in critical constructions of British Muslim social boundaries on social media. New Media & Society, 22(3), 449–469.CrossRef Downing, J., & Dron, R. (2020b). Tweeting Grenfell: Discourse and networks in critical constructions of British Muslim social boundaries on social media. New Media & Society, 22(3), 449–469.CrossRef
go back to reference Eco, U. (1976). A theory of semiotics. Indiana University Press. Google-Books-ID: BoXO4ItsuaMC. Eco, U. (1976). A theory of semiotics. Indiana University Press. Google-Books-ID: BoXO4ItsuaMC.
go back to reference Fairclough, N. (2010). Critical discourse analysis: The critical study of language. Taylor and Francis. Fairclough, N. (2010). Critical discourse analysis: The critical study of language. Taylor and Francis.
go back to reference Fereday, J., & Muir-Cochrane, E. (2006). Demonstrating Rigor using thematic analysis: A hybrid approach of inductive and deductive coding and theme development. International Journal of Qualitative Methods, 5(1) . Fereday, J., & Muir-Cochrane, E. (2006). Demonstrating Rigor using thematic analysis: A hybrid approach of inductive and deductive coding and theme development. International Journal of Qualitative Methods, 5(1) .
go back to reference Fry, M. G., & Hochstein, M. (1993). Epistemic communities: Intelligence studies and international relations. Intelligence and National Security, 8(3), 14–28.CrossRef Fry, M. G., & Hochstein, M. (1993). Epistemic communities: Intelligence studies and international relations. Intelligence and National Security, 8(3), 14–28.CrossRef
go back to reference Gall, N., et al. (2015). “It gets better”: Internet memes and the construction of collective identity. New Media and Society, 18(8). Gall, N., et al. (2015). “It gets better”: Internet memes and the construction of collective identity. New Media and Society, 18(8).
go back to reference Gardy, J. L. et al. (2011). Whole-genome sequencing and social-network analysis of a tuberculosis outbreak. New England Journal of Medicine, 364(8), 730–739. Gardy, J. L. et al. (2011). Whole-genome sequencing and social-network analysis of a tuberculosis outbreak. New England Journal of Medicine, 364(8), 730–739.
go back to reference Gee, J. P. (2004). An introduction to discourse analysis: Theory and method. Routledge.CrossRef Gee, J. P. (2004). An introduction to discourse analysis: Theory and method. Routledge.CrossRef
go back to reference Gilchrist, P., & Ravenscroft, N. (2011). Paddling, property and piracy: The politics of canoeing in England and Wales. Sport in Society, 14(2), 175–192.CrossRef Gilchrist, P., & Ravenscroft, N. (2011). Paddling, property and piracy: The politics of canoeing in England and Wales. Sport in Society, 14(2), 175–192.CrossRef
go back to reference Goodman, L. A. (1961). Snowball sampling. The Annals of Mathematical Statistics, 32(1), 148–170.CrossRef Goodman, L. A. (1961). Snowball sampling. The Annals of Mathematical Statistics, 32(1), 148–170.CrossRef
go back to reference Grandjean, M. (2016). A social network analysis of Twitter: Mapping the digital humanities community. Aaron Mauro (Ed.). Cogent Arts & Humanities, 3(1), 1171458. Grandjean, M. (2016). A social network analysis of Twitter: Mapping the digital humanities community. Aaron Mauro (Ed.). Cogent Arts & Humanities, 3(1), 1171458.
go back to reference Hansen, L. (2011). Theorizing the image for security studies: Visual securitization and the Muhammad Cartoon Crisis*. European Journal of International Relations, 17(1), 51–74.CrossRef Hansen, L. (2011). Theorizing the image for security studies: Visual securitization and the Muhammad Cartoon Crisis*. European Journal of International Relations, 17(1), 51–74.CrossRef
go back to reference Harrison, C. (2003). Visual social semiotics: Understanding how still images make meaning. Technical Communication, 50(1), 46–60. Harrison, C. (2003). Visual social semiotics: Understanding how still images make meaning. Technical Communication, 50(1), 46–60.
go back to reference Himelboim, I. et al. (2017). Classifying Twitter topic-networks using social network analysis. Social Media + Society, 3(1), 2056305117691545 [Online]. Himelboim, I. et al. (2017). Classifying Twitter topic-networks using social network analysis. Social Media + Society, 3(1), 2056305117691545 [Online].
go back to reference Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126.CrossRef Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126.CrossRef
go back to reference Jessop, B. (2004). Critical semiotic analysis and the critique of political economy. Critical Discourse Studies., 1(1), 1–16. Jessop, B. (2004). Critical semiotic analysis and the critique of political economy. Critical Discourse Studies., 1(1), 1–16.
go back to reference Johnson, H. L. (2012). Listening to migrant stories. In Research methods in critical security studies: An introduction (pp. 67–71). Routledge. Johnson, H. L. (2012). Listening to migrant stories. In Research methods in critical security studies: An introduction (pp. 67–71). Routledge.
go back to reference Kabakuş, A. T., & Şimşek, M. (2019). An analysis of the characteristics of verified twitter users. Sakarya University Journal of Computer and Information Sciences, 2(3), 180–186.CrossRef Kabakuş, A. T., & Şimşek, M. (2019). An analysis of the characteristics of verified twitter users. Sakarya University Journal of Computer and Information Sciences, 2(3), 180–186.CrossRef
go back to reference King, K. E. (1994). Method and methodology in feminist research: What is the difference? Journal of Advanced Nursing, 20(1), 19–22.CrossRef King, K. E. (1994). Method and methodology in feminist research: What is the difference? Journal of Advanced Nursing, 20(1), 19–22.CrossRef
go back to reference Kirabo, L., et al. (2021, March 8). The Power of the Blue Tick (✓): Ugandans’; experiences and engagement on Twitter at the onset of the COVID-19 pandemic. In 3rd African human-computer interaction conference: Inclusiveness and empowerment. AfriCHI 2021. Association for Computing Machinery. Available from: https://doi.org/10.1145/3448696.3448746 (Accessed 27 May 2022). Kirabo, L., et al. (2021, March 8). The Power of the Blue Tick (✓): Ugandans’; experiences and engagement on Twitter at the onset of the COVID-19 pandemic. In 3rd African human-computer interaction conference: Inclusiveness and empowerment. AfriCHI 2021. Association for Computing Machinery. Available from: https://​doi.​org/​10.​1145/​3448696.​3448746 (Accessed 27 May 2022).
go back to reference Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72.CrossRef Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72.CrossRef
go back to reference Kurikko, H., & Tuominen, P. (2012). Collective value creation and empowerment in an online brand community: A netnographic study on LEGO builders. Technology Innovation Management Review, 12–17. Kurikko, H., & Tuominen, P. (2012). Collective value creation and empowerment in an online brand community: A netnographic study on LEGO builders. Technology Innovation Management Review, 12–17.
go back to reference Langer, R., & Beckman, S. C. (2005). Sensitive research topics: Netnography revisited Richard Elliott & Avi Shankar (eds.). Qualitative Market Research: An International Journal, 8(2), 189–203. Langer, R., & Beckman, S. C. (2005). Sensitive research topics: Netnography revisited Richard Elliott & Avi Shankar (eds.). Qualitative Market Research: An International Journal, 8(2), 189–203.
go back to reference Light, B., et al. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900.CrossRef Light, B., et al. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900.CrossRef
go back to reference López-Fierro, S., et al. (2021). Querying on google sheets. In Big Data (p. 5). López-Fierro, S., et al. (2021). Querying on google sheets. In Big Data (p. 5).
go back to reference McCormick, H. et al. (2017). Using Twitter for demographic and social science research: Tools for data collection and processing. Social Media Research, 46(3), 390–421. McCormick, H. et al. (2017). Using Twitter for demographic and social science research: Tools for data collection and processing. Social Media Research, 46(3), 390–421.
go back to reference McGregor, S. L. T., & Murnane, J. A. (2010). Paradigm, methodology and method: Intellectual integrity in consumer scholarship. International Journal of Consumer Studies, 34(4), 419–427.CrossRef McGregor, S. L. T., & Murnane, J. A. (2010). Paradigm, methodology and method: Intellectual integrity in consumer scholarship. International Journal of Consumer Studies, 34(4), 419–427.CrossRef
go back to reference Moon, J. (1975). The logic of political inquiry: A synthesis of opposed perspectives. Addison-Wesley. Moon, J. (1975). The logic of political inquiry: A synthesis of opposed perspectives. Addison-Wesley.
go back to reference Moyle, L., et al. (2019) #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs. International Journal of Drug Policy, 63101–6110. Moyle, L., et al. (2019) #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs. International Journal of Drug Policy, 63101–6110.
go back to reference Mutlu, C. E., & Salter, M. B. (2013). The discursive turn: Introduction. In Research methods in critical security studies. Routledge. Mutlu, C. E., & Salter, M. B. (2013). The discursive turn: Introduction. In Research methods in critical security studies. Routledge.
go back to reference Naidoo, L. (2012). An ethnography of global landscapes and corridors. BoD – Books on Demand. Google-Books-ID: POOZDwAAQBAJ. Naidoo, L. (2012). An ethnography of global landscapes and corridors. BoD – Books on Demand. Google-Books-ID: POOZDwAAQBAJ.
go back to reference Nussbaum, E. (Ed.). (2017, January 23). How jokes won the election. The New Yorker. Nussbaum, E. (Ed.). (2017, January 23). How jokes won the election. The New Yorker.
go back to reference Poltash, N. A. (2012). Snapchat and sexting: A snapshot of baring your bare essentials. Richmond Journal of Law & Technology, 19(4), 1–24. Poltash, N. A. (2012). Snapchat and sexting: A snapshot of baring your bare essentials. Richmond Journal of Law & Technology, 19(4), 1–24.
go back to reference Rogers, R. (2020). Deplatforming: Following extreme Internet celebrities to Telegram and alternative social media. European Journal of Communication, 35(3), 213–229.CrossRef Rogers, R. (2020). Deplatforming: Following extreme Internet celebrities to Telegram and alternative social media. European Journal of Communication, 35(3), 213–229.CrossRef
go back to reference Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge.CrossRef Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies. Routledge.CrossRef
go back to reference Scott, J. (2017) Social network analysis. Sage. Scott, J. (2017) Social network analysis. Sage.
go back to reference Smith, M. A., et al. (2009, June 25). Analyzing (social media) networks with NodeXL. In Proceedings of the fourth international conference on Communities and technologies. C&T ’09 (pp. 255–264). Association for Computing Machinery. Available from: https://doi.org/10.1145/1556460.1556497 (Accessed 20 August 2022). Smith, M. A., et al. (2009, June 25). Analyzing (social media) networks with NodeXL. In Proceedings of the fourth international conference on Communities and technologies. C&T ’09 (pp. 255–264). Association for Computing Machinery. Available from: https://​doi.​org/​10.​1145/​1556460.​1556497 (Accessed 20 August 2022).
go back to reference Smith, M. A. (2013, May). NodeXL: Simple network analysis for social media. In 2013 International conference on collaboration technologies and systems (CTS) (pp. 89–93). Smith, M. A. (2013, May). NodeXL: Simple network analysis for social media. In 2013 International conference on collaboration technologies and systems (CTS) (pp. 89–93).
go back to reference Tunçalp, D., & L. Lê, P. (2014) (Re)locating boundaries: A systematic review of online ethnography. Dr Mark de Rond and Professor Geneviève Musca Professor Linda Rouleau (Ed.). Journal of Organizational Ethnography, 3(1), 59–79. Tunçalp, D., & L. Lê, P. (2014) (Re)locating boundaries: A systematic review of online ethnography. Dr Mark de Rond and Professor Geneviève Musca Professor Linda Rouleau (Ed.). Journal of Organizational Ethnography, 3(1), 59–79.
go back to reference Utz, S., et al. (2015). Snapchat elicits more jealousy than Facebook: A comparison of Snapchat and Facebook use. Cyberpsychology, Behavior, and Social Networking, 18(3), 141–146.CrossRef Utz, S., et al. (2015). Snapchat elicits more jealousy than Facebook: A comparison of Snapchat and Facebook use. Cyberpsychology, Behavior, and Social Networking, 18(3), 141–146.CrossRef
go back to reference van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235.CrossRef van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235.CrossRef
go back to reference Vaterlaus, J. M., et al. (2016). “Snapchat is more personal”: An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior, 62594–62601. Vaterlaus, J. M., et al. (2016). “Snapchat is more personal”: An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior, 62594–62601.
go back to reference Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58.CrossRef Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58.CrossRef
go back to reference Williams, M. (2003). Words, images, enemies: Securitisation and international politics. International Studies Quarterly, 47511–4531. Williams, M. (2003). Words, images, enemies: Securitisation and international politics. International Studies Quarterly, 47511–4531.
go back to reference Wolfsfeld, G., et al. (2013). Social media and the Arab spring: Politics comes first. The International Journal of Press/Politics, 18(2), 115–137.CrossRef Wolfsfeld, G., et al. (2013). Social media and the Arab spring: Politics comes first. The International Journal of Press/Politics, 18(2), 115–137.CrossRef
go back to reference Yang, C. (2021). Research in the Instagram context: Approaches and methods. The Journal of Social Sciences Research, 7(1), 15–21.CrossRef Yang, C. (2021). Research in the Instagram context: Approaches and methods. The Journal of Social Sciences Research, 7(1), 15–21.CrossRef
Metadata
Title
Social Media, Digital Methods and Critical Security Studies
Author
Joseph Downing
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20734-1_3