Remembering and anticipating researcher vulnerability: an autoethnographic tale

نویسندگان

چکیده

Whilst there is nascent literature surrounding researcher vulnerability, little known about how memories and anticipations can elicit vulnerabilities, vulnerable academic writing still be met with some scepticism. In this paper, I therefore provide an autoethnographic narrative of my encounters vulnerability during research into tattoos, time, death. My tale revolves around three themes: Remembering (Un)anticipating Fluctuating vulnerabilities. doing so, reveal not only vulnerabilities fluctuate through time space, but also past future stir present-day Ultimately, move beyond the ‘vulnerability as failure’ framing by helping to encourage culture that celebrates being open more vulnerably.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remembering the past, anticipating a future.

OBJECTIVE To provide an overview of the phenomena of recovered memories and false memories of past traumas and to provide illustrations with clinical vignettes as well as historical observations. CONCLUSIONS The questions concerning the recovery of memories of trauma do not readily reduce to simple dichotomies. Whatever the terminology applied, be it repression, dissociation or forgetting, hu...

متن کامل

Anticipating the Mnemonic Shift: Organizational Remembering and Forgetting in 2001

Following a review of prior work, the paper presents a model of organizational memory. Relying on structuration theory for its development, the model overcomes some of the problematic dualisms of conventional approaches (i.e., subjecUobject, social/technical, abstract/concrete). According to the model, co-memory (for collective memory) consists of rules and resources that recursively mediate bo...

متن کامل

Anticipating Cyber Vulnerability Exploits Using Machine Learning

| @RecordedFuture Every day about 20 new cyber vulnerabilities are released and reported, and these are related to various software implementation weaknesses. Hackers exploit these vulnerabilities to launch an attack, trigger a system failure, access sensitive information, or gain remote system access. Some vulnerabilities have a severe impact, while hackers show little or no interest in exploi...

متن کامل

Researcher–researched relationship in qualitative research: Shifts in positions and researcher vulnerability

BACKGROUND The researcher role is highly debated in qualitative research. This article concerns the researcher-researched relationship. METHODS A group of health science researchers anchored in various qualitative research traditions gathered in reflective group discussions over a period of two years. RESULTS Efforts to establish an anti-authoritarian relationship between researcher and res...

متن کامل

REMEMBERING KIICHI USUI: A Tale of Two Paintings

The first painting hangs in my family’s living room. If you look at the painting from the bottom up, you see, at first, nothing at all: fully a third of the total surface seems empty; then there is some green; not much at first, but then more and more as you gaze up into a wonderfully simple and distinct landscape: ordinary nature it is. But this is ordinary nature as seen by (1) an arduously s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Marketing Management

سال: 2023

ISSN: ['0267-257X', '1472-1376']

DOI: https://doi.org/10.1080/0267257x.2022.2158905