<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://researchingsecurity.org/2023/10/06/researching-security-network-no-longer-active/</loc><lastmod>2023-10-06T11:08:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/09/08/from-the-desk-to-the-pram-phd-and-parenthood/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/09/susan-with-baby.jpg</image:loc><image:title>Susan Hoppert-Flaemig with her baby</image:title><image:caption>Susan Hoppert-Flaemig</image:caption></image:image><lastmod>2023-10-06T10:56:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2017/10/31/colombias-progress-and-challenges-in-the-disarmament-and-reintegration-of-the-farc/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/10/whatsapp_image_2017-08-24_at_18-13-22.jpeg</image:loc><image:title>whatsapp_image_2017-08-24_at_18.13.22</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/10/36967502665_70ae3ae367_z.jpg</image:loc><image:title>36967502665_70ae3ae367_z</image:title></image:image><lastmod>2017-10-31T19:45:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/fellows/kari-mariska-pries/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/kari-mariska-rd1.jpg</image:loc><image:title>Kari Mariska - RD1</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/kari-mariska-pries.jpg</image:loc><image:title>Kari Mariska Pries</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/kari-pries2.jpg</image:loc><image:caption>Kari Mariska Pries</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/kari-pries1.jpg</image:loc><image:title>Kari Mariska Pries</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/kari-pries.jpg</image:loc><image:title>Kari Mariska Pries</image:title></image:image><lastmod>2017-10-19T19:25:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/verena-brahler/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/headshot_verena3.jpg</image:loc><image:caption>Verena Brähler</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/headshot_verena.jpg</image:loc></image:image><lastmod>2017-10-19T19:11:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/johannes-langer/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/10/johannes-langer.jpg</image:loc><image:title>Johannes Langer</image:title></image:image><lastmod>2017-10-08T16:28:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/06/15/gis-techniques/</loc><lastmod>2017-06-15T09:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/research-methodology/gis-techniques/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/05/hotspot-map-2.jpg</image:loc><image:title>hotspot map 2</image:title></image:image><lastmod>2017-06-15T08:59:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/susan-flaemig/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/10/susan-flaemig.jpg</image:loc><image:caption>Susan Hopper-Flaemig</image:caption></image:image><lastmod>2017-05-11T18:21:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-family/from-the-desk-to-the-pram-phd-and-parenthood/</loc><lastmod>2017-05-11T18:18:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/nicholas-pope/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/12/10339579_10103148210687448_5363437247697134362_n.jpg</image:loc><image:title>Nicholas Pope</image:title></image:image><lastmod>2017-04-28T15:26:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/participate/</loc><lastmod>2017-04-28T15:22:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/online-courses/</loc><lastmod>2017-04-28T15:12:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-methodology/</loc><lastmod>2017-04-28T15:12:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-funding/</loc><lastmod>2017-04-28T15:12:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/first-steps/</loc><lastmod>2017-04-28T15:12:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-concepts/</loc><lastmod>2017-04-28T15:11:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-ethics/</loc><lastmod>2017-04-28T15:11:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/</loc><lastmod>2017-05-25T14:01:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/interviews-with-fellows/researching-security-fellows-share-their-very-personal-views-on-the-phd-trajectory/</loc><lastmod>2017-04-28T15:09:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/</loc><lastmod>2017-04-28T15:07:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-thesis-defence/</loc><lastmod>2017-04-28T15:07:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-career-advise/</loc><lastmod>2017-04-28T15:07:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-family/</loc><lastmod>2017-04-28T15:06:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-motivation/</loc><lastmod>2017-04-28T15:05:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/lessons-learned/colombia-talking-peace-while-waging-war/</loc><lastmod>2017-04-28T15:01:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/lessons-learned/</loc><lastmod>2017-04-28T15:00:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/</loc><lastmod>2017-04-28T14:49:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/interviews-with-fellows/</loc><lastmod>2017-04-28T14:45:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/about-2/</loc><lastmod>2017-04-28T14:39:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/</loc><lastmod>2017-04-28T14:35:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/02/26/substitutive-security-governance/</loc><lastmod>2017-02-26T20:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/research-concepts/substitutive-security-governance/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/fig2.png</image:loc><image:title>fig2</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/fig1.png</image:loc><image:title>fig1</image:title></image:image><lastmod>2017-02-26T19:51:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/dr-moritz-schuberth/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/moritz-schuberth.jpg</image:loc><image:title>moritz-schuberth</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/fabien.jpg</image:loc><image:title>fabien</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/citc3a9-soleil.jpg</image:loc><image:title>cite-soleil</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/02/citc3a9-soleil-2.jpg</image:loc><image:title>cite-soleil-2</image:title></image:image><lastmod>2017-02-26T19:28:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/natalia-cervantes/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/03/nat-photo-researching-security-profile.jpg</image:loc><image:caption>Natalia Cervantes</image:caption></image:image><lastmod>2017-02-12T18:28:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/01/29/the-dark-age-of-writing-up-a-doctoral-thesis-and-how-to-survive-it/</loc><lastmod>2017-01-29T17:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/phd-and-motivation/the-dark-age-of-writing-up-a-doctoral-thesis-and-how-to-survive-it/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/adult-1868015_960_720.jpg</image:loc><image:title>adult-1868015_960_720</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/open-book-1428428_960_720.jpg</image:loc><image:title>open-book-1428428_960_720</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/glasses-983947_960_720.jpg</image:loc><image:title>glasses-983947_960_720</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/classroom-1699745_960_7201.jpg</image:loc><image:title>classroom-1699745_960_720</image:title></image:image><lastmod>2017-01-29T17:38:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/01/28/call-for-papers-pilas-annual-conference-2017-university-of-leeds-26-27-june-2017/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/pilas-banner-mail.png</image:loc><image:title>pilas-banner-mail</image:title></image:image><lastmod>2017-01-28T12:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2017/01/25/call-for-papers-peacebuilding-conference-2017-university-of-manchester-11-12-september-2017/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/iapcs-lgo.jpg</image:loc><image:title>iapcs-lgo</image:title></image:image><lastmod>2017-01-22T11:44:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2017/01/22/life-after-the-phd-doing-a-post-doc/</loc><lastmod>2017-01-22T11:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/research-funding/life-after-phd-doing-a-post-doc/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/classroom-1699745_960_720.jpg</image:loc><image:title>classroom-1699745_960_720</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2017/01/beijing-1877354_960_720.jpg</image:loc><image:title>beijing-1877354_960_720</image:title></image:image><lastmod>2017-01-22T11:29:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/caroline-delgado/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/08/photo-caroline-delgado.jpg</image:loc><image:caption>Caroline Delgado</image:caption></image:image><lastmod>2017-01-22T10:59:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/jorrit-kamminga/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/photo_jorrit_kamminga1.jpg</image:loc><image:title>Photo_Jorrit_Kamminga</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/08/photo_jorrit_kamminga.jpg</image:loc><image:caption>Jorrit Kamminga</image:caption></image:image><lastmod>2017-01-05T13:19:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/01/06/impact-on-personal-life-researching-security-fellows-share-their-very-personal-views-on-the-phd-trajectory-part-23/</loc><lastmod>2017-01-05T13:11:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/fellows/jenna-murray-de-l%cf%8cpez/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/10/us.jpg</image:loc><image:title>us</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/10/dscn7575.jpg</image:loc><image:title>dscn7575</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/10/2015profile.jpg</image:loc><image:title>2015profile</image:title></image:image><lastmod>2017-01-05T13:01:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2017/01/05/researching-security-fellows-share-their-very-personal-views-on-the-phd-trajectory-part-13/</loc><lastmod>2017-01-05T12:39:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2017/01/07/life-after-the-phd-researching-security-fellows-share-their-very-personal-views-on-the-phd-trajectory-part-33/</loc><lastmod>2017-01-05T12:22:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/phd-career-advise/how-to-find-a-job-after-doing-a-phd-in-the-field-of-security/</loc><lastmod>2016-11-06T17:09:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-concepts/violent-pluralism-and-disorganised-crime/</loc><lastmod>2016-11-06T17:07:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/interviews-with-fellows/interview-with-researching-security/</loc><lastmod>2016-11-06T16:57:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/juan-carlos-ruiz/</loc><lastmod>2016-11-06T16:54:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/elizabeth-kerr/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/elizabeth-kerr.jpg</image:loc><image:caption>Elizabeth Kerr</image:caption></image:image><lastmod>2016-11-06T16:52:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/maria-alejandra-otamendi/</loc><lastmod>2016-11-06T16:51:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/fellows/alexandra-abello-colak/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/04/alexandra-abello-colak.jpg</image:loc><image:caption>AlexandraAbello Colak</image:caption></image:image><lastmod>2017-03-20T02:22:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/784-2/</loc><lastmod>2016-11-06T16:44:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-motivation/why-do-we-research-security-between-inquisitive-fascination-and-unhealthy-obsession/</loc><lastmod>2016-11-06T16:38:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-motivation/appreciating-the-positive-moments-of-researching-insecurity-and-violence/</loc><lastmod>2016-11-06T16:38:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/working-in-kabul-bomb-attack-on-hazara-protesters/</loc><lastmod>2016-11-06T16:34:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/jorrit-kamminga-in-afghanistan/</loc><lastmod>2016-11-06T16:34:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/2-5.jpg</image:loc><image:title>2 (5)</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/1-8.jpg</image:loc><image:title>1 (8)</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/1-6.jpg</image:loc><image:title>1 (6)</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/1-2.jpg</image:loc><image:title>1 (2)</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010460.jpg</image:loc><image:title>P1010460</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010451.jpg</image:loc><image:title>P1010451</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010443.jpg</image:loc><image:title>P1010443</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010440.jpg</image:loc><image:title>P1010440</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010439.jpg</image:loc><image:title>P1010439</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p1010436.jpg</image:loc><image:title>P1010436</image:title></image:image><lastmod>2016-11-06T16:30:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/phd-and-family/fieldwork-in-violence-and-security-the-impact-of-researcher-pregnancy/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/07/537502_10100369642516041_1723035989_n.jpg</image:loc><image:title>537502_10100369642516041_1723035989_n</image:title><image:caption>Kari Mariska Pries in El Salvador</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/07/337301_10151269599903017_1750233226_o.jpg</image:loc><image:title>337301_10151269599903017_1750233226_o</image:title><image:caption>Kari Mariska Pries (third from the left) in El Salvador</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/07/480808_10100369606024171_591202793_n.jpg</image:loc><image:title>480808_10100369606024171_591202793_n</image:title><image:caption>Kari Mariska Pries during her field research in El Salvador</image:caption></image:image><lastmod>2016-11-06T16:25:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2016/08/01/working-in-kabul-bomb-attack-on-hazara-protesters/</loc><lastmod>2016-08-01T18:28:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/our-publications/</loc><lastmod>2016-07-30T10:09:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2016/07/25/appreciating-the-positive-moments-of-researching-insecurity-and-violence/</loc><lastmod>2016-07-25T19:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2015/06/07/how-to-find-a-job-after-doing-a-phd-in-the-field-of-security/</loc><lastmod>2016-01-04T07:11:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2015/06/05/funding-leach-rai-post-doctoral-fellowship-brunel-university-department-of-social-sciences-media-and-communications-division-of-anthropology/</loc><lastmod>2015-06-05T07:11:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2015/02/08/first-steps-in-your-research-phd-peer-review-classes/</loc><lastmod>2015-02-08T16:53:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/first-steps/first-steps-phd-peer-review-classes/</loc><lastmod>2015-02-08T16:49:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2015/02/10/fellowship-drugs-security-and-democracy-fellowship/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2015/02/dsd_fellowship_banner.png</image:loc></image:image><lastmod>2015-02-07T15:36:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2015/02/07/job-course-instructor-ecuador-seminar-trent-in-ecuador-program/</loc><lastmod>2015-02-07T15:17:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2015/02/07/job-academic-coordinator-trent-in-ecuador/</loc><lastmod>2015-02-07T14:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/10/18/post-doctoral-fellowship-center-for-the-study-of-violence-university-of-sao-paulo/</loc><lastmod>2014-10-18T12:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/10/06/funding-special-programme-security-society-and-the-state-gerda-henkel-foundation/</loc><lastmod>2014-10-05T16:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/10/04/colombia-talking-peace-while-waging-war/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/10/choco-colombia1.jpg</image:loc><image:title>Choco, Colombia</image:title><image:caption>Marginalised villages in the Chocó department, a region greatly affected by the armed conflict.</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/10/choco-colombia.jpg</image:loc><image:title>Choco, Colombia</image:title><image:caption>Marginalised villages in the Chocó department, a region greatly affected by the armed conflict.</image:caption></image:image><lastmod>2014-10-04T10:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/09/24/event-security-jam-brainstorming-global-security-online-event-14-16-october-2014/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/09/logo-security-jam_deffinallll-square.jpg</image:loc></image:image><lastmod>2014-09-24T08:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/09/23/fellowship-2015-2016-inter-american-foundation-fellowship-competition-announcement/</loc><lastmod>2014-09-23T14:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/phd-thesis-defence/defending-your-phd-thesis-in-the-united-kingdom/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/09/viva_anthony-pereira-leigh-payne-verena-brc3a4hler-par-engstrom.jpg</image:loc><image:caption>From left to right: Professor Anthony Pereira (King's College London), Leigh Payne (University of Oxford), Verena Brähler and Par Engstrom (University College London)</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/09/img_20140320_160250.jpg</image:loc><image:caption>Verena Brähler at UCL in London</image:caption></image:image><lastmod>2014-09-13T09:40:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2014/09/13/defending-your-thesis-in-the-united-kingdom/</loc><lastmod>2014-09-14T23:15:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/phd-thesis-defence/defending-your-phd-thesis-in-spain/</loc><lastmod>2014-09-13T09:35:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/</loc><lastmod>2014-09-11T11:15:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/</loc><lastmod>2014-09-11T11:13:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/rural-urban-migration-in-chiapas-mexico-antenatal-violence-and-the-disappearing-of-the-midwife/</loc><lastmod>2014-09-11T11:09:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/the-crisis-of-forced-internal-displacement-and-the-struggle-over-the-right-to-citizenship-in-medellin/</loc><lastmod>2015-02-22T23:06:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/from-physical-to-symbolic-urban-periphery-the-heterogeneity-of-the-inner-slum/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/04/fig2.jpg</image:loc><image:title>fig2</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/04/fig1.png</image:loc><image:title>fig1</image:title></image:image><lastmod>2014-09-11T11:08:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/what-can-anthropologists-offer-to-security-studies/</loc><lastmod>2014-09-11T11:08:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/a-salvadoran-turnaround-the-fmlns-response-to-citizen-security-needs/</loc><lastmod>2014-09-11T11:07:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/presentations/inecesarea-the-violence-of-childbirth-in-mexico/</loc><lastmod>2014-09-11T11:06:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2014/09/10/call-for-papers-power-and-change-in-the-americas-in-the-modern-era-30-april-1-may-2015-university-college-london/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/09/americas_network_logo.png</image:loc><image:caption>Researching Security</image:caption></image:image><lastmod>2014-09-10T09:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/09/02/defending-your-phd-thesis-in-spain/</loc><lastmod>2014-09-02T18:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/08/19/funding-open-call-for-research-projects-by-the-eu-lac-foundation/</loc><lastmod>2014-08-16T11:07:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/08/17/fellowship-harvard-academy-scholars-program/</loc><lastmod>2014-08-16T11:02:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/08/14/new-researching-security-fellows-natalia-cervantes-and-caroline-delgado/</loc><lastmod>2014-08-14T17:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/08/06/conference-v-latin-american-and-i-central-american-conference-on-drug-policy-3-4-september-2014-san-jose-costa-rica/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/08/1.png</image:loc><image:title>V Latin American Conference on Drug Policy</image:title></image:image><lastmod>2014-08-13T10:29:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/07/05/fieldwork-in-violence-and-security-the-impact-of-researcher-pregnancy/</loc><lastmod>2014-07-09T17:25:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/06/30/researching-security-fellows-at-the-linksch-conference-in-brussels/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/06/13.jpg</image:loc><image:title>13</image:title><image:caption>Our Researching Security Fellows on a little sightseeing trip to the historic centre of Brussels</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/06/12.jpg</image:loc><image:title>12</image:title><image:caption>Daniel Wisehart (University of Freiburg) and Verena Brähler</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/06/11.jpg</image:loc><image:title>11</image:title><image:caption>Jorrit Kamminga explaining his research in Colombia</image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/06/10.jpg</image:loc><image:title>10</image:title><image:caption>Kari Mariska Pries (University of Glasgow), Jorrit Kamminga (Universidad de Valencia) and Verena Brähler (University College London) at the LINKSCH Conference</image:caption></image:image><lastmod>2014-06-30T16:32:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/06/29/detention-of-alexander-sodiqov-in-tajikistan/</loc><lastmod>2014-06-29T07:53:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/lessons-learned/2014-presidential-elections-in-el-salvador/</loc><lastmod>2014-06-24T06:28:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2014/06/24/new-visions-for-violence-reduction-strategies-in-mexico/</loc><lastmod>2014-06-24T06:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/lessons-learned/new-visions-for-violence-reduction-strategies-in-mexico/</loc><lastmod>2014-06-24T06:25:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/partners-links/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/10/logo-app1.png</image:loc><image:title>logo APP</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/10/logo-app.png</image:loc><image:title>logo APP</image:title></image:image><lastmod>2014-06-22T11:58:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/</loc><lastmod>2014-06-22T11:57:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/11th-international-conference-on-urban-health-manchester-4-7-march-2014-2/</loc><lastmod>2014-06-22T11:50:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2014/03/19/conference-report-11th-international-conference-on-urban-health-manchester-4-7-march-2014/</loc><lastmod>2014-03-19T14:46:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/11th-international-conference-on-urban-health-manchester-4-7-march-2014/</loc><lastmod>2014-03-19T14:45:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/isa-pss-joint-conference-on-security-challenges-in-an-evolving-world-27-june-2013/</loc><lastmod>2014-03-19T13:49:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/gendered-violence-international-conference-bristol-23-25-nov-2011/</loc><lastmod>2014-03-19T13:49:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/conferences/conference-reports/beyond-neoliberalism-politics-and-punishment-in-contemporary-societies-university-of-a-coruna-argentina-3-4-october-2013/</loc><lastmod>2014-03-19T13:46:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2013/08/08/conference-report-isa-pss-joint-conference-on-security-challenges-in-an-evolving-world/</loc><lastmod>2014-03-19T13:40:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/03/11/elections-a-dangerous-form-of-security-discussion-in-el-salvador/</loc><lastmod>2014-03-12T14:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/03/09/job-postdoctoral-fellow-interdependent-inequalities-in-latin-america-structures-and-negotiations-german-institute-of-global-and-area-studies-hamburg-germany/</loc><lastmod>2014-03-09T18:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/03/09/job-senior-researcher-rule-of-law-program-the-hague-institute-for-global-justice/</loc><lastmod>2014-03-09T18:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/02/21/conference-regional-studies-association-global-conference-2014-from-vulnerable-places-to-resilient-territories-the-path-to-sustainable-development-27-30-april-2014-fortaleza-brazil/</loc><lastmod>2014-02-21T15:57:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/02/21/call-for-papers-conference-is-a-more-inclusive-and-sustainable-development-possible-in-brazil-3-may-14-june-2014-online-conference/</loc><lastmod>2014-02-21T15:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/01/31/call-for-papers-shaping-peace-local-infrastructures-and-state-formation-11-12-september-2014-university-of-manchester/</loc><lastmod>2014-01-31T16:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/01/31/job-university-lecturer-in-peace-and-development-research-school-of-global-studies-goteborg-sweden/</loc><lastmod>2014-01-31T16:28:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/01/31/fellowship-global-governance-futures-global-public-policy-institute-robert-bosch-foundation/</loc><lastmod>2014-01-31T16:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2014/01/29/conference-where-is-latin-america-heading-pilas-annual-conference-2014-12-13-june-2014-university-of-sheffield-uk/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2014/01/pilasconference2014web.jpg</image:loc></image:image><lastmod>2014-01-29T20:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/18/conference-conflicts-in-the-city-congress-reflections-on-urban-unrest-2-4-april-2014-university-of-valencia-spain/</loc><lastmod>2013-12-18T20:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/18/call-for-papers-policy-analyst-willy-brandt-school-of-public-policy-university-of-erfurt-germany/</loc><lastmod>2013-12-18T19:54:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/16/how-academia-resembles-a-drug-gang/</loc><lastmod>2013-12-16T16:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/04/call-for-papers-children-youth-and-security-intersections-of-research-practice-6-8-march-2014-dalhousie-university-halifax-nova-scotia-canada/</loc><lastmod>2013-12-04T12:35:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/04/interview-with-jorrit-kamminga-about-his-trip-to-afghanistan-as-a-nato-transatlantic-opinion-leader/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/12/p1060363.jpg</image:loc><image:title>P1060363</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/12/p1060359.jpg</image:loc><image:title>P1060359</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/12/p1060351.jpg</image:loc><image:title>P1060351</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/12/humvee_engineering_trainee.jpg</image:loc><image:title>Humvee_engineering_trainee</image:title></image:image><lastmod>2013-12-04T11:19:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/12/04/pictures-from-the-field-alternative-livelihoods-in-rural-colombia/</loc><lastmod>2013-12-04T10:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/alternative-livelihoods-in-rural-colombia/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/two_alternative_livelihoods_sierra_nevada_de_santa_marta.jpg</image:loc><image:title>Two alternative livelihoods Sierra Nevada de Santa Marta</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/transportation_of_the_stilt_villages.jpg</image:loc><image:title>Transportation of the stilt villages</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/the_conflict_in_and_around_la_macarena_meta_nicely_portrayed.jpg</image:loc><image:title>The conflict in and around la Macarena Meta nicely portrayed</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/stilt_houses_in_the_cic3a9naga_grande_de_santa_marta.jpg</image:loc><image:title>Stilt houses in the Ciénaga Grande de Santa Marta</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/horse_and_carriage_to_offload_our_1947_dc3_plane_in_la_macarena_meta.jpg</image:loc><image:title>Horse and carriage to offload our 1947 DC3 plane in the Macarena</image:title><image:caption> </image:caption></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/good_slogan_for_a_security_blog.jpg</image:loc><image:title>Good slogan for a security blog</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/eco-tourism_as_alternative_livelihood.jpg</image:loc><image:title>Eco-tourism as alternative livelihood</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/alternative_livelihood_recipients_and_family_sierra_nevada_de_santa_marta.jpg</image:loc><image:title>Alternative livelihood recipients and familiy</image:title></image:image><lastmod>2015-11-06T04:05:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2013/11/26/researching-security-debate-violent-pluralism-and-disorganised-crime/</loc><lastmod>2013-11-26T11:22:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/25/call-for-papers-law-justice-and-the-security-gap-security-in-transition-international-conference-21-june-2014-lse-london/</loc><lastmod>2013-11-25T14:01:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/15/funding-drugs-security-and-democracy-fellowship/</loc><lastmod>2013-11-15T17:39:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/research-ethics/in-situ-interviews/</loc><lastmod>2013-11-15T17:20:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-ethics/gaining-access/</loc><lastmod>2013-11-15T17:20:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/research/research-ethics/the-ethics-of-gaining-access/</loc><lastmod>2013-11-15T17:19:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2012/02/18/award-excellence-in-security-and-defense-education/</loc><lastmod>2013-11-14T14:08:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/24/postdoctoral-research-opportunity-in-sao-paulo-brazil/</loc><lastmod>2013-11-14T14:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/11/24/conference-report-gendered-violence-bristol-23-25-nov-2011/</loc><lastmod>2013-11-14T14:06:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/14/funding-and-fellowship-opportunities-in-the-field-of-security-studies/</loc><lastmod>2013-11-14T13:18:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/13/seminar-anthropology-and-security-studies-9-april-2014-royal-anthropological-institute-london/</loc><lastmod>2013-11-13T14:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/13/call-for-participation-comparative-approaches-to-security-sector-reform-with-a-special-focus-on-the-penal-system-march-2014-sao-paulo/</loc><lastmod>2013-11-13T13:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/21/book-anthropology-and-security-studies-edited-by-fina-anton-hurtado-and-giovanni-ercolani/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/10/anthropology-and-security-studies.jpg</image:loc><image:title>anthropology-and-security-studies</image:title></image:image><lastmod>2013-11-11T18:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/01/conference-report-beyond-neoliberalism-politics-and-punishment-in-contemporary-societies-university-of-a-coruna-3-4-october-2013/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/ale-foto-conference1.png</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/ale-foto-conference.png</image:loc><image:title>Ale foto conference</image:title></image:image><lastmod>2013-11-01T14:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/01/call-for-papers-converging-practices-in-security-and-development-using-fieldwork-to-bridge-the-theoryreality-gap-in-security-studies-2014-cpsa-annual-conference-canada/</loc><lastmod>2013-11-01T14:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/11/01/publication-nuevo-pensamiento-sobre-seguridad-en-america-latina-clacso/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/11/clacso.png</image:loc><image:title>clacso</image:title></image:image><lastmod>2013-11-01T13:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/27/call-for-papers-delito-y-sociedad-revista-de-ciencias-sociales-argentina/</loc><lastmod>2013-10-27T09:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/27/post-doc-call-for-post-doctoral-projects-at-the-institute-for-democracy-quito-ecuador/</loc><lastmod>2013-10-27T09:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/13/seminar-what-happens-when-governments-negotiate-with-criminal-networks-case-studies-from-the-americas-30-october-2013-woodrow-wilson-international-center-for-scholars-washington-dc/</loc><lastmod>2013-10-13T15:31:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/13/news-2014-visiting-fellowships-university-of-nottingham-uk/</loc><lastmod>2013-10-13T15:20:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/13/workshop-beyond-international-security-social-security-and-social-welfare-in-the-middle-east-and-north-africa-what-are-the-research-and-policy-choices-3-december-2013-university-of-bath-uk/</loc><lastmod>2013-10-13T15:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/10/13/news-scholarships-for-foreigners-in-argentina-and-for-argentinians-to-go-abroad/</loc><lastmod>2013-10-13T15:04:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/29/conference-segundo-encuentro-regional-de-la-red-latinoamericana-de-seguridad-y-delincuencia-organizada-relasedor-10-oct-2013-panama/</loc><lastmod>2013-09-29T11:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/25/seminar-cifras-analisis-construyendo-conocimiento-para-la-prevencion-del-delito-2-oct-2013-santiago-de-chile-cead/</loc><lastmod>2013-09-25T17:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/25/conference-beyond-neoliberalism-politics-and-punishment-in-contemporary-societies-3-4-oct-2013-law-school-university-of-a-coruna-spain/</loc><lastmod>2013-09-25T16:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/24/what-does-security-mean-in-kenya/</loc><lastmod>2013-09-24T18:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/24/call-for-applications-international-training-in-conflict-transformation-centre-for-conflict-resolution-kenya/</loc><lastmod>2013-09-24T18:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/09/24/workshop-delito-y-sociedad-universidad-nacional-del-litoral-santa-fe-argentina/</loc><lastmod>2013-09-24T17:49:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/07/25/new-pictures-from-susan-flaemigs-field-research-in-el-salvador/</loc><lastmod>2013-07-25T11:55:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/security-politics-in-el-salvador/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/workshop-on-police-gender-policy.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/salvadoran-police.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/salvadoran-police-ii.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/private-security-agent.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/private-security-agent-at-a-coach-station.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/mijango-conversatorio-sobre-tregua.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/mesa-de-seguridad.jpg</image:loc></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/07/casa-libre-de-violencia.jpg</image:loc></image:image><lastmod>2013-07-25T11:48:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2013/07/10/call-for-papers-beyond-neoliberalism-politics-and-punishment-in-contemporary-societies-3-4-october-2013-a-coruna-spain/</loc><lastmod>2013-07-10T17:32:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/07/10/call-for-papers-23rd-world-congress-of-political-science-19-24-july-2014-montreal-canada/</loc><lastmod>2013-07-10T17:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/06/30/interview-with-researchingsecurity/</loc><lastmod>2013-06-30T20:32:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/06/28/researchingsecurity-at-the-isa-pss-conference-in-budapest/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/06/2.jpg</image:loc><image:title>2</image:title><image:caption>Susan Flaemig, Juan Carlos Ruiz, Edmund Pries and Verena Brähler (from left to right)</image:caption></image:image><lastmod>2013-06-28T17:15:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/05/02/publication-peace-step-by-step-paz-paso-a-paso-una-mirada-a-los-conflictos-colombianos-desde-los-estudios-de-paz/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/05/paz-paso-a-paso.jpg</image:loc><image:title>Paz, paso a paso</image:title></image:image><lastmod>2013-05-02T17:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/04/29/publication-silence-in-the-citys-security-agenda-silencios-en-la-agenda-de-seguridad-de-la-ciudad/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/04/al.jpg</image:loc></image:image><lastmod>2013-04-29T17:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/04/28/news-conference-papers-now-online/</loc><lastmod>2013-04-28T11:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/04/22/news-thinking-about-peace-research-in-21st-century-latin-america/</loc><lastmod>2013-04-22T16:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/03/27/publication-one-year-gang-truce-in-el-salvador/</loc><lastmod>2013-03-27T15:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/01/31/conference-slas-annual-conference-2012-university-of-sheffield-18-20-april-2012/</loc><lastmod>2013-03-04T19:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/03/04/conference-7th-annual-conference-of-the-international-society-for-the-study-of-drug-policy-15-17-may-2013-universidad-de-los-andes-bogota-colombia/</loc><lastmod>2013-03-04T19:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/03/04/call-for-papers-x-jornadas-de-sociologia-de-la-uba-1-6-july-2013-uba-buenos-aires/</loc><lastmod>2013-03-04T18:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/10/17/workshop-understanding-violence-in-latin-america-university-of-manchester-6-october-2011/</loc><lastmod>2013-03-04T18:49:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/12/14/call-for-papers-second-isa-forum-of-sociology-social-justice-and-democratization-buenos-aires-1-4-august-2012/</loc><lastmod>2013-03-04T18:48:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/10/17/call-for-papers-protecting-human-rights-duties-and-responsibilities-of-states-and-non-state-actors-university-of-glasgow-18-19-june-2012/</loc><lastmod>2013-03-04T18:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/02/03/new-contribution-in-research-ethics-3/</loc><lastmod>2013-03-04T18:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/11/23/rios-slum-faces-challenges-after-pacification-cnn-interview-with-verena-brahler-15-november-2011/</loc><lastmod>2017-01-26T01:20:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/02/05/call-for-papers-special-issue-of-peace-conflict-development-an-interdisciplinary-journal/</loc><lastmod>2013-03-04T18:45:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/04/19/new-blog-author-alexandra-abello-colak-university-of-bradford/</loc><lastmod>2013-03-04T18:44:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/05/08/call-for-papers-international-journal-stability-of-security-development/</loc><lastmod>2013-03-04T18:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/05/12/call-for-applications-systemic-peacebuilding-conflict-transformation-post-war-recovery-and-reconciliation-pctc-25-29-june-2012-cluj-napoca-romania/</loc><lastmod>2013-03-04T18:44:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/05/13/seminar-citizen-security-in-venezuela-woodrow-wilson-international-center-for-scholars-washington-dc/</loc><lastmod>2013-03-04T18:43:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/06/01/conference-security-democracy-and-cities-the-future-of-prevention-12-14-dec-2012-aubervilliers-france/</loc><lastmod>2013-03-04T18:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/06/05/symposium-el-estado-en-accion-las-fuerzas-de-seguridad-y-el-sistema-de-justicia-saberes-y-practicas-en-perspectiva-comparada-november-2012-santiago-university-of-chile/</loc><lastmod>2013-03-04T18:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/03/04/symposium-el-estado-en-accion-las-fuerzas-de-seguridad-y-el-sistema-de-justicia-saberes/</loc><lastmod>2013-03-04T18:41:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/07/07/call-for-papers-militarizacion-de-la-seguridad-ciudadana-december-2012-flacso-ecuador/</loc><lastmod>2013-03-04T18:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/07/24/conference-second-isa-forum-of-sociology-social-justice-and-democratization-1-4-august-2012-buenos-aires/</loc><lastmod>2013-03-04T18:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/08/03/seminar-seminario-internacional-de-criminologia-latinoamericana-10-agosto-2011-unsam-buenos-aires/</loc><lastmod>2013-03-04T18:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/08/16/seminar-juventude-violencia-e-controle-socioespacial-no-brasil-e-na-franca-20-21-agosto-2012-ufrj-rio-de-janeiro/</loc><lastmod>2013-03-04T18:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/08/17/call-for-papers-the-politics-of-portrayal-a-seminar-on-the-forms-and-functions-of-representations-of-violence-19-october-2012-utrecht-the-netherlands/</loc><lastmod>2013-03-04T18:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/09/01/call-for-papers-revista-latinoamericana-de-metodologia-de-la-investigacion-social-argentina/</loc><lastmod>2013-03-04T18:38:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/09/01/seminar-civilizacion-castigo-y-populismo-penal-14-15-september-2012-santa-fe-argentina/</loc><lastmod>2013-03-04T18:37:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/10/02/seminar-the-politics-of-portrayal-a-seminar-on-the-forms-and-functions-of-representations-of-violence-19-oct-2012-utrecht-university/</loc><lastmod>2013-03-04T18:37:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/12/25/call-for-papers-urvio-revista-lationamericana-de-seguridad-ciudadana-ecuador/</loc><lastmod>2013-03-04T18:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/01/16/seminarcall-for-papers-reunion-de-antropologia-del-mercosur-10-13-july-2013-cordoba-argentina/</loc><lastmod>2013-03-04T18:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/02/05/obituary-elizabeth-kerr/</loc><lastmod>2013-03-04T18:35:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/01/18/researchingsecurity-is-going-to-budapest/</loc><lastmod>2013-03-04T18:35:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/02/01/new-partnership-with-latin-american-bureau-lab/</loc><lastmod>2013-03-04T18:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/02/01/new-photographs-from-field-research-in-rio-de-janeiro/</loc><lastmod>2013-03-04T18:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2013/02/25/call-for-papers-pilas-conference-2013-19-21-june-2013-university-of-liverpool-uk/</loc><lastmod>2013-03-04T18:32:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/favelas-in-rio-de-janeiro/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/4.jpg</image:loc><image:title>Evictions</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/3.jpg</image:loc><image:title>Church on top of Morro da Providencia</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/12.jpg</image:loc><image:title>View over the central train station from Morro da Providencia</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/11.jpg</image:loc><image:title>Santa Marta</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/1.jpg</image:loc><image:title>Brazil's adorable future</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/2.jpg</image:loc><image:title>Beauty in multiple forms</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/sunday-afternoon-in-complexo-da-penha_verena-brahler.jpg</image:loc><image:title>Sunday afternoon in Complexo da Penha, Rio de Janeiro</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2013/02/pacification-of-complexo-do-alemao_verena-brahler.jpg</image:loc><image:title>The 'pacification' of Complexo do Alemão in Rio de Janeiro</image:title></image:image><lastmod>2013-02-01T17:23:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/police-strike-rio-de-janeiro/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104601.jpg</image:loc><image:title>"My father is not a vandal, he is a hero!"</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104511.jpg</image:loc><image:title>Police gathering on Copacabana beach</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104431.jpg</image:loc><image:title>Some police on strike prefer not to be identified</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104401.jpg</image:loc><image:title>"Dignity for Public Security"</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104391.jpg</image:loc><image:title>Professional militant</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104361.jpg</image:loc><image:title>Analogy between state governor Cabral and Hitler</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104261.jpg</image:loc><image:title>Families united in the police strike</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/p10104121.jpg</image:loc><image:title>Wife speaking up after her husband, a strike leader, was arrested</image:title></image:image><lastmod>2013-02-01T17:10:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/experiences/field-research/galleries/bope-rio-de-janeiro/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/6.jpg</image:loc><image:title>The headquarters of BOPE</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/5.jpg</image:loc><image:title>Shooting hole of the Caveirao</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/4.jpg</image:loc><image:title>Caveirão</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/3.jpg</image:loc><image:title>BOPE policeman</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/2.jpg</image:loc><image:title>Emblem of BOPE</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2012/08/1.jpg</image:loc><image:title>BOPE's 11 basic commandments</image:title></image:image><lastmod>2013-02-01T17:03:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2012/04/07/call-for-papers-conexoes-parciais-anthropology/</loc><lastmod>2012-04-07T07:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/02/28/new-contributions-conference-papers/</loc><lastmod>2012-02-29T11:22:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2012/01/31/new-contribution-in-research-ethics-2/</loc><lastmod>2012-01-31T15:35:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/11/06/new-contributions-in-research-methodologies/</loc><lastmod>2011-11-20T18:09:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/11/06/new-contribution-in-research-ethics/</loc><lastmod>2011-11-06T19:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/2011/11/06/new-contributors/</loc><lastmod>2011-11-06T19:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org/research/research-methodology/logistic-regression/</loc><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/5.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/4.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/3.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/2.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/ale12.jpg</image:loc><image:title>ale1</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/ale11.jpg</image:loc><image:title>Codifications of categorical variables</image:title></image:image><image:image><image:loc>https://researchingsecurity.org/wp-content/uploads/2011/11/ale1.jpg</image:loc><image:title>Codifications of categorical variables</image:title></image:image><lastmod>2011-11-06T19:12:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://researchingsecurity.org/2011/08/18/mission-possible-researching-organised-crime-security-policing/</loc><lastmod>2011-10-17T14:02:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://researchingsecurity.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-10-06T11:08:16+00:00</lastmod></url></urlset>
