• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта

Бакалаврская программа «Программа двух дипломов НИУ ВШЭ и Университета Кёнхи «Экономика и политика в Азии»»

28
Апрель

International Security

2020/2021
Учебный год
ENG
Обучение ведется на английском языке
4
Кредиты
Статус:
Курс обязательный
Когда читается:
2-й курс, 3, 4 модуль

Преподаватель


Андрющенко Ксения Игоревна

Course Syllabus

Abstract

The aim of this course is to introduce students to the theorisation of security as a pillar of the study of international relations and world politics. The course will analyse the frameworks and meanings of ‘security’ in international relations before, during and after the Cold War. It will critically examine – within the context of globalisation – the different conceptualisations of ‘security’ offered by the main theoretical fields. Finally, it will discuss new issues being raised in contemporary security studies, with a view to sketching out future implications for study and practice. Topics and issues like the environment, gender, peace processes, terrorism and Weapons of Mass Destruction (among others) are highly relevant in today’s globalised world. The course will seek to address their significance for security studies, and explore the ways in which they alter, transform or interact with traditional notions of “security”.
Learning Objectives

Learning Objectives

  • To help students familiarise themselves with the notion of ‘security’ in international relations and world politics.
  • To help them understand the mechanisms of international, national, regional and individual decision-making with regards to security politics.
Expected Learning Outcomes

Expected Learning Outcomes

  • Students need to get familiar with the syllabus and the program.
  • Students are supposed to get familiar with the theory of realism.
  • Students learn how to challenge the traditional approach to international security.
  • Students shall get yourself familiar with postcolonialism and its components.
  • Students study post-structuralism and other critical approaches.
  • Students investigate the balance between international and individual security.
  • Students should get the basic understanding of peace operations.
  • Students research WMD problems and the issue of cyberterrorism.
  • Students shall learn about the latest trend in the area of health security.
  • Students shall learn different approached to the research of terrorism.
  • Students shall study the proliferation of the private military companies.
  • Students should get themselves familiar with the concept of R2P and the controversies that surround it.
Course Contents

Course Contents

  • Introduction and Class organisation
    Collins, Ch.1
  • Realism
    • Is realism a theory of/for the powerful? • How useful is realism in helping us understand globalisation? • How would realism understand/explain terrorism? • How many ‘realisms’ can there exist? • What are the differences between offensive and defensive realists, and offensive and defensive neo-realists?
  • Liberalism
    Do you think the proliferation of institutions mitigates the effects of anarchy? • Are institutions equally useful for super-powers, middle powers and small states? • Is the Democratic Peace Thesis appealing or are there any drawbacks to it? • Is liberalism just a rhetoric masking realist interests? • How might international institutions and organisations promote stability and peace?
  • Social Constructivism
    How do constructivists think about actors? • Are constructivist approaches more convincing about the international system than traditional theories? • Are insecurities real or constructed? • What are some of constructivism’s drawbacks?
  • Poststructuralism
    • Are post-structural approaches useful or are they merely an ‘intellectual exercise’? • Do you agree with Ken Booth that, “if poststructural/postmodern thinking did not exist… we would have had to have invented it”? • What is the difference between theory and practice, according to poststructural approaches?
  • Critical Security Studies - Emancipation
    • How are critical approaches to security advancing our understandings of insecurity? • Is there any point in examining meanings in international security or should we be more concerned about how such meanings are formed/adopted? • Is ‘a world without states’ just a claim or could it ever be reality? • During the Cold War, terrorism resulted in more deaths than nowadays, but it was not considered as threatening as nuclear war. Could something else replace terrorism in the future as the biggest threat?
  • Critical Security Studies - Securitisation
    • What determines who can speak security? • Is securitisation a ‘critical’ approach, or is it ‘not critical enough’? • Is securitisation theory’s main framework a Western model or can it be applied universally? • Are ethics and norms implied in securitisation theory? If not, should they?
  • Postcolonialism
    • Will dominant/powerful states ever see non-powerful states or stateless nations eye-to-eye? • Does postcolonialism offer a completely different version of history to the one we are used to? • How convincing are postcolonial/ist approaches? Does the conviction differ depending where we are from? • How many subalterns can you identify in your everyday encounters?
  • Human Security
    • Should powerful, stable and democratic countries care for the welfare and well-being of individuals in less stable and undemocratic countries? • Do you think the shift in our focus from the survival of states to the survival of individuals is one with merits or one with dangers? • Can ‘freedom from fear’ reconcile with ‘freedom from want’, or will they forever be irreconcilable? • Is ‘human security’ adding anything new to our preoccupations with security, or is it simply just another reiteration of the UN Charter? • Can ‘human security’ coexist with Realism?
  • EXAM
  • International Security II. Introduction and Class Organisation.
    Collins, Ch.1
  • Contemporary Issues: Gender Security
    • Do you think the role of women (as mothers, soldiers’ wives, sex-workers, community leaders, homemakers, etc) is relevant to the study of security? • How does the ‘women and children first’ endanger the lives of men? • By seeking to subordinate women, masculinist/machist systems seek to elevate men’s role(s). But do you think they are counter-productive, i.e., they end up undermining men’s rates of survival? • Can national security undermine personal security?
  • Contemporary Issues: Environmental and Energy Security
    • Does focusing on the environment change the whole meaning of ‘national security’? If so, how? • Is the protection of the environment a matter of international, state or individual action? • Is capitalism and the protection of the environment incompatible? • How do you feel knowing that your life on this planet will deteriorate because of the actions of previous generations? • How do you feel knowing that your life on this planet will deteriorate because of your lack of actions?
  • Contemporary Issues: Terrorism
    • If ‘one man’s terrorist is another man’s freedom-fighter’, who is the terrorist and who is the freedom-fighter? • If terrorism ‘can never win’, why hasn’t terrorism eclipsed? • Is terrorism a problem of misconceptions? • Can we eliminate terrorism if we change our understandings of ‘power’, ‘dominance’, and ‘control’? • If all governments throughout the ages have negotiated with terrorists, why do all governments insist that they ‘don’t negotiate with terrorists’?
  • Contemporary Issues: WMD & Cybersecurity
    • Can you see any changes in the motivations of states to acquire nuclear weapons since the end of the Second World War? • Nuclear capability of states has not stopped them engaging in conventional warfare (for example, India and Pakistan, Israel and its neighbouring countries, etc). What then is the utility of possessing nuclear weapons? • Is cyber-insecurity more threatening than other forms of insecurity, or is it just a nuisance when compared to those? • Is it possible to mitigate cyber-threats without undermining civil liberties, or are the two incompatible?
  • Contemporary Issues: Health Security
    • If more people globally die from falling down the stairs, why are we so afraid of a virus that kills less than 1000 people in a year? • Should ‘health security’ be concerned more with global inequality rather than with health scares? • Could health security be more efficient if it avoided use of terroristic language? • What are the interests behind the securitisation of non-transmittable diseases?
  • Contemporary Issues: Responsibility to Protect
    • Is there a point in having a norm (like R2P) if states are selective about its invocation? • How is political liberalism and the UN Charter different from R2P? • Is R2P here to stay, or is it just another fad? • To date, R2P has only been used against states of the Global South. Considering the problems and crises occurring in the Western world, could we ever see R2P invoked against Western states? • Does R2P strengthen international institutions or does it make them even more inefficient in dealing with humanitarian crises?
  • Contemporary Issues: Peace Operations
    • How do you understand ‘peace’? • Is there merit in saving people’s lives from violence in far-away places? • Can there be ‘peaces’ in the midst of war? • How do different theories of International Security conceptualise ‘peace’?
  • Contemporary Issues: Private Military Companies
    • Considering the history of mercenaries goes back thousands of years, would you say the focus on private military companies is unjustified? • What are the implications of the proliferation of private military and security companies? • If war is the exact opposite of peace, can you conceive of private companies that would benefit from the establishment and self-sustainability of peace?
  • EXAM
Assessment Elements

Assessment Elements

  • non-blocking Exam (3 module)
  • non-blocking Participation (3 module)
  • non-blocking Exam (4 module)
  • non-blocking Presentation (4 module)
  • non-blocking Participation (4 module)
    The course is split between lectures (1st half of each weekly session) and tutorials/seminars (2nd half of each weekly session). Attendance is compulsory for both.
Interim Assessment

Interim Assessment

  • Interim assessment (3 module)
    0.5 * Exam (3 module) + 0.5 * Participation (3 module)
  • Interim assessment (4 module)
    0.4 * Exam (4 module) + 0.2 * Participation (4 module) + 0.4 * Presentation (4 module)
Bibliography

Bibliography

Recommended Core Bibliography

  • Contemporary security studies ed. by Alan Collins. (2010).
  • Peoples, C., & Vaughan-Williams, N. (2015). Critical Security Studies : An Introduction (Vol. 2nd ed). London: Routledge. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=nlebk&AN=837940

Recommended Additional Bibliography

  • Acharya, A., & Buzan, B. (2007). Why is there no non-Western international relations theory? An introduction. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.712B98E3
  • Ashley, R. K. (1984). The poverty of neorealism. International Organization, 02, 225.
  • AUTESSERRE, S. (2017). International Peacebuilding and Local Success: Assumptions and Effectiveness. International Studies Review, 19(1), 114–132. https://doi.org/10.1093/isr/viw054
  • Badescu, C. G., & Weiss, T. G. (2010). Misrepresenting R2P and Advancing Norms: An Alternative Spiral? Misrepresenting R2P and Advancing Norms. International Studies Perspectives, 11(4), 354–374. https://doi.org/10.1111/j.1528-3585.2010.00412.x
  • Barkawi, T. (2016). Decolonising war. European Journal of International Security ; Volume 1, Issue 2, Page 199-214 ; ISSN 2057-5637 2057-5645. https://doi.org/10.1017/eis.2016.7
  • Bellamy, A. J. (n.d.). The Responsibility to Protect: Added value or hot air? Cooperation and Conflict, 48(3), 333–357. https://doi.org/10.1177/0010836713482448
  • Bentley, M. (2015). The Problem With the Chemical Weapons Taboo. Peace Review, 27(2), 228–236. https://doi.org/10.1080/10402659.2015.1037634
  • Bergeron, J. (2013). Transnational Organised Crime and International Security ; A Primer. The RUSI Journal ; Volume 158, Issue 2, Page 6-9 ; ISSN 0307-1847 1744-0378. https://doi.org/10.1080/03071847.2013.787728
  • BILGIN, P. (2016). “Contrapuntal Reading” as a Method, an Ethos, and a Metaphor for Global IR. International Studies Review, 18(1), 134–146. https://doi.org/10.1093/isr/viv018
  • Bilgin, P. (2016). How to remedy Eurocentrism in IR? A complement and a challenge for The Global Transformation. International Theory ; Volume 8, Issue 3, Page 492-501 ; ISSN 1752-9719 1752-9727. https://doi.org/10.1017/s1752971916000178
  • Björkdahl, A. (2002). Norms in International Relations: Some Conceptual and Methodological Reflections. Cambridge Review of International Affairs, 15(1), 9–23. https://doi.org/10.1080/09557570220126216
  • Burke, A., Lee-Koo, K., & McDonald, M. (2015). Ethics and Global Security : A Cosmopolitan Approach. Routledge, Taylor & Francis Group.
  • Callahan, W. A., Callahan, W A 2008, ’ Chinese visions of world order: Post-hegemonic or a new hegemony? ’ International Studies Review, vol 10, & no. 4. (2008). Chinese visions of world order: Post-hegemonic or a new hegemony? Callahan , W A 2008 , ’ Chinese Visions of World Order: Post-Hegemonic or a New Hegemony? ’ International Studies Review , Vol 10 , No. 4 , Pp. 749-761 . DOI:10.1111/j.1468-2486.2008.00830.X. https://doi.org/10.1111/j.1468-2486.2008.00830.x
  • Chesterman, S. (2011). “Leading from Behind”: The Responsibility to Protect, the Obama Doctrine, and Humanitarian Intervention after Libya. Ethics & International Affairs ; Volume 25, Issue 3, Page 279-285 ; ISSN 0892-6794 1747-7093. https://doi.org/10.1017/s0892679411000190
  • Clausewitz, C. von, (DE-588)11852111X, (DE-627)136177263, (DE-576)160588022, aut. (1976). On war Carl von Clausewitz. Ed. and transl. by Michael Howard .
  • Cooperation under the security dilemma /. (1977). Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.55F214A7
  • CRAWFORD, N. C. (2018). The Potential for Fundamental Change in World Politics. International Studies Review, 20(2), 232–238. https://doi.org/10.1093/isr/viy034
  • Cunliffe, P. V. (DE-588)1080269037, (DE-627)844104310, (DE-576)453446590, aut. (2017). The doctrine of the ‘responsibility to protect’ as a practice of political exceptionalism Philip Cunliffe, University of Kent, UK.
  • Curley, M., & Herington, J. (2015). The securitisation of avian influenza: International discourses and domestic politics in Asia. Review of International Studies. https://doi.org/10.1017/S0260210510000537
  • Cusumano, E., & Ruzza, S. (2017). Security privatisation at sea: Piracy and the commercialisation of vessel protection. International Relations ; Volume 32, Issue 1, Page 80-103 ; ISSN 0047-1178 1741-2862. https://doi.org/10.1177/0047117817731804
  • DAVIES, S. E. (2008). Securitizing infectious disease. International Affairs, 84(2), 295–313. https://doi.org/10.1111/j.1468-2346.2008.00704.x
  • DECIANCIO, M. (2016). International Relations from the South: A Regional Research Agenda for Global IR. International Studies Review, 18(1), 106–119. https://doi.org/10.1093/isr/viv020
  • Deibert, R. J., & Rohozinski, R. (2010). Risking Security: Policies and Paradoxes of Cyberspace Security. International Political Sociology, 4(1), 15–32. https://doi.org/10.1111/j.1749-5687.2009.00088.x
  • Doucet, M. G., & de Larrinaga, M. (2008). Sovereign Power and the Biopolitics of Human Security. Conference Papers —— International Studies Association, 1–21.
  • Elbe, S. (2006). Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security. International Studies Quarterly, 50(1), 119–144. https://doi.org/10.1111/j.1468-2478.2006.00395.x
  • Farrell, T. (2002). Constructivist Security Studies: Portrait of a Research Program. International Studies Review, 4(1), 49. https://doi.org/10.1111/1521-9488.t01-1-00252
  • Fierke, K. M. (2002). Links Across the Abyss: Language and Logic in International Relations. International Studies Quarterly, 46(3), 331–354. https://doi.org/10.1111/1468-2478.00236
  • Ganor, B. (2002). Defining Terrorism: Is One Man’s Terrorist another Man’s Freedom Fighter? Police Practice & Research, 3(4), 287–304. https://doi.org/10.1080/1561426022000032060
  • Harman, S., & Wenham, C. (2018). Governing Ebola: between global health and medical humanitarianism. Globalizations, 15(3), 362–376. https://doi.org/10.1080/14747731.2017.1414410
  • Higate, P., & Henry, M. (2004). Engendering Security in Peace Support Operations. Conference Papers —— International Studies Association, 1–19.
  • Hoffman, B. (2002). Rethinking Terrorism and Counterterrorism Since 9/11. Studies in Conflict & Terrorism, 25(5), 303–316. https://doi.org/10.1080/105761002901223
  • HOLSTI, K. (2018). Change in International Politics: The View from High Altitude. International Studies Review, 20(2), 186–194. https://doi.org/10.1093/isr/viy030
  • Ioannis Tellidis, & Harmonie Toros. (2015). Researching Terrorism, Peace and Conflict Studies : Interaction, Synthesis and Opposition. Routledge.
  • Jackson, P. T. (2004). Bridging the Gap: Toward A Realist-Constructivist Dialogue. International Studies Review, 6(2), 337. https://doi.org/10.1111/j.1521-9488.2004.419_1.x
  • Jarvis, L., Nouri, L., & Whiting, A. (2015). Terrorism, Violence and Conflict in the Digital Age: Implications, Opportunities and Challenges. Routledge.
  • Jef Huysmans. (2000). The European Union and the Securitization of Migration. Journal of Common Market Studies, 5, 751. https://doi.org/10.1111/1468-5965.00263
  • Karim, S. (2017). Reevaluating Peacekeeping Effectiveness: Does Gender Neutrality Inhibit Progress? International Interactions, 43(5), 822–847. https://doi.org/10.1080/03050629.2017.1231113
  • Karlsrud, J. (2015). The UN at war: examining the consequences of peace-enforcement mandates for the UN peacekeeping operations in the CAR, the DRC and Mali. Third World Quarterly, 36(1), 40–54. https://doi.org/10.1080/01436597.2015.976016
  • Ken BOOTH. (2013). Seguridad y emancipación | Security and Emancipation. Relaciones Internacionales, 23.
  • Khodary, Y. M. (2016). Women and Peace-Building in Iraq. Peace Review, 28(4), 499–507. https://doi.org/10.1080/10402659.2016.1237151
  • Krampe, F. V. (DE-588)116559935X, (DE-627)1029661286, (DE-576)510448712, aut. (2017). Water for peace? post-conflict water resource management in Kosovo Florian Krampe.
  • Lezaun, J. (2002). Limiting the Social: Constructivism and Social Knowledge in International Relations. International Studies Review, 4(3), 229–234. https://doi.org/10.1111/1521-9488.00272
  • McINNES, C., & LEE, K. (2006). Health, security and foreign policy. Review of International Studies ; Volume 32, Issue 1, Page 5-23 ; ISSN 0260-2105 1469-9044. https://doi.org/10.1017/s0260210506006905
  • McINNES, C., & ROEMER-MAHLER, A. (2017). From security to risk: reframing global health threats. International Affairs, 93(6), 1313–1337. https://doi.org/10.1093/ia/iix187
  • Mearsheimer, J. J. (1994). The false promise of international institutions. International Security, 19(3), 5. https://doi.org/10.2307/2539078
  • OWEN, J. M. (2018). Liberalism and Its Alternatives, Again. International Studies Review, 20(2), 309–316. https://doi.org/10.1093/isr/viy026
  • Page, E. (2000). Theorizing the Link Between Environmental Change and Security. Review of European Community & International Environmental Law, 9(1), 33. https://doi.org/10.1111/1467-9388.00230
  • Paris, R. (2001). Human Security: Paradigm Shift or Hot Air? International Security, 26(2), 87–102. https://doi.org/10.1162/016228801753191141
  • Pattison, J. (2010). Outsourcing the responsibility to protect: humanitarian intervention and private military and security companies. International Theory ; Volume 2, Issue 1, Page 1-31 ; ISSN 1752-9719 1752-9727. https://doi.org/10.1017/s1752971909990224
  • RezaeeDaryakenari, B., & Thies, C. G. (2018). Secrecy and Self-Interest: When Mediators Act Deceitfully. International Interactions, 44(4), 603–630. https://doi.org/10.1080/03050629.2018.1406931
  • Shani, G. (2017). Human Security as ontological security: a post-colonial approach. Postcolonial Studies, 20(3), 275–293. https://doi.org/10.1080/13688790.2017.1378062
  • Singer, P. W. (2002). Corporate Warriors: The Rise of the Privatized Military Industry and Its Ramifications for International Security. International Security, 26(3), 186–220. https://doi.org/10.1162/016228801753399763
  • Sjoberg, L. (2009). Introduction to Security Studies: Feminist Contributions. Security Studies, 18(2), 183–213. https://doi.org/10.1080/09636410902900129
  • Sprinzak, E. (1998). The great superterrorism scare. Foreign Policy, 112, 110. https://doi.org/10.2307/1149039
  • The responsibility to protect Report of the International Commission on Intervention and State Sovereignty. (2001).
  • Trombetta, M. J. (2008). Environmental security and climate change: analysing the discourse. Cambridge Review of International Affairs, 21(4), 585–602. https://doi.org/10.1080/09557570802452920
  • Wendt, A. (1992). Anarchy is what states make of it: the social construction of power politics. International Organization, (02), 391. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsrep&AN=edsrep.a.cup.intorg.v46y1992i02p391.425.02
  • Wilhelmsen, J. V. (DE-588)101554424X, (DE-627)669113638, (DE-576)350787301, aut. (2017). How does war become a legitimate undertaking? re-engaging the post-structuralist foundation of securitization theory Julie Wilhelmsen.
  • Williams, J. (2003). Territorial Borders, International Ethics and Geography: Do Good Fences Still Make Good Neighbours? Geopolitics, 8(2), 25–46. https://doi.org/10.1080/714001033
  • Wojczewski, T. (2018). Global power shifts and world order: the contestation of ‘western’ discursive hegemony. Cambridge Review of International Affairs, 31(1), 33–52. https://doi.org/10.1080/09557571.2018.1476464
  • ZIEGLER, C. E. (2016). Contesting the Responsibility to Protect. International Studies Perspectives, 17(1), 75–97. https://doi.org/10.1111/insp.12085