• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта

Бакалаврская программа «Программа двух дипломов НИУ ВШЭ и Университета Кёнхи «Экономика и политика в Азии»»

28
Апрель

International Security

2021/2022
Учебный год
ENG
Обучение ведется на английском языке
4
Кредиты
Статус:
Курс обязательный
Когда читается:
2-й курс, 3, 4 модуль

Преподаватель

Course Syllabus

Abstract

The aim of this course is to introduce students to the theorisation of security as a pillar of the study of international relations and world politics. The course will analyse the frameworks and meanings of ‘security’ in international relations before, during and after the Cold War. It will critically examine – within the context of globalisation – the different conceptualisations of ‘security’ offered by the main theoretical fields. Finally, it will discuss new issues being raised in contemporary security studies, with a view to sketching out future implications for study and practice. Topics and issues like the environment, gender, peace processes, terrorism and Weapons of Mass Destruction (among others) are highly relevant in today’s globalised world. The course will seek to address their significance for security studies, and explore the ways in which they alter, transform or interact with traditional notions of “security”.
Learning Objectives

Learning Objectives

  • To help students familiarise themselves with the notion of ‘security’ in international relations and world politics.
  • To help them understand the mechanisms of international, national, regional and individual decision-making with regards to security politics.
Expected Learning Outcomes

Expected Learning Outcomes

  • Students are supposed to get familiar with the theory of realism.
  • Students investigate the balance between international and individual security.
  • Students learn how to challenge the traditional approach to international security.
  • Students need to get familiar with the syllabus and the program.
  • Students research WMD problems and the issue of cyberterrorism.
  • Students shall get yourself familiar with postcolonialism and its components.
  • Students shall learn about the latest trend in the area of health security.
  • Students shall learn different approached to the research of terrorism.
  • Students shall study the proliferation of the private military companies.
  • Students should get the basic understanding of peace operations.
  • Students should get themselves familiar with the concept of R2P and the controversies that surround it.
  • Students study post-structuralism and other critical approaches.
Course Contents

Course Contents

  • Introduction and Class organisation
  • Realism
  • Liberalism
  • Social Constructivism
  • Poststructuralism
  • Critical Security Studies - Emancipation
  • Critical Security Studies - Securitisation
  • Postcolonialism
  • Human Security
  • EXAM
  • International Security II. Introduction and Class Organisation.
  • Contemporary Issues: Gender Security
  • Contemporary Issues: Environmental and Energy Security
  • Contemporary Issues: Terrorism
  • Contemporary Issues: WMD & Cybersecurity
  • Contemporary Issues: Health Security
  • Contemporary Issues: Responsibility to Protect
  • Contemporary Issues: Peace Operations
  • Contemporary Issues: Private Military Companies
Assessment Elements

Assessment Elements

  • non-blocking Exam (3 module)
  • non-blocking Participation (3 module)
  • non-blocking Exam (4 module)
  • non-blocking Presentation (4 module)
  • non-blocking Participation (4 module)
    The course is split between lectures (1st half of each weekly session) and tutorials/seminars (2nd half of each weekly session). Attendance is compulsory for both.
Interim Assessment

Interim Assessment

  • 2021/2022 3rd module
    0.5 * Participation (3 module) + 0.5 * Exam (3 module)
  • 2021/2022 4th module
    0.4 * Exam (4 module) + 0.4 * Presentation (4 module) + 0.2 * Participation (4 module)
Bibliography

Bibliography

Recommended Core Bibliography

  • Contemporary security studies ed. by Alan Collins. (2010).
  • Peoples, C., & Vaughan-Williams, N. (2015). Critical Security Studies : An Introduction (Vol. 2nd ed). London: Routledge. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=nlebk&AN=837940

Recommended Additional Bibliography

  • Acharya, A., & Buzan, B. (2007). Why is there no non-Western international relations theory? An introduction. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.712B98E3
  • Ashley, R. K. (1984). The poverty of neorealism. International Organization, 02, 225.
  • AUTESSERRE, S. (2017). International Peacebuilding and Local Success: Assumptions and Effectiveness. International Studies Review, 19(1), 114–132. https://doi.org/10.1093/isr/viw054
  • Badescu, C. G., & Weiss, T. G. (2010). Misrepresenting R2P and Advancing Norms: An Alternative Spiral? Misrepresenting R2P and Advancing Norms. International Studies Perspectives, 11(4), 354–374. https://doi.org/10.1111/j.1528-3585.2010.00412.x
  • Barkawi, T. (2016). Decolonising war. European Journal of International Security ; Volume 1, Issue 2, Page 199-214 ; ISSN 2057-5637 2057-5645. https://doi.org/10.1017/eis.2016.7
  • Bellamy, A. J. (n.d.). The Responsibility to Protect: Added value or hot air? Cooperation and Conflict, 48(3), 333–357. https://doi.org/10.1177/0010836713482448
  • Bentley, M. (2015). The Problem With the Chemical Weapons Taboo. Peace Review, 27(2), 228–236. https://doi.org/10.1080/10402659.2015.1037634
  • Bergeron, J. (2013). Transnational Organised Crime and International Security ; A Primer. The RUSI Journal ; Volume 158, Issue 2, Page 6-9 ; ISSN 0307-1847 1744-0378. https://doi.org/10.1080/03071847.2013.787728
  • BILGIN, P. (2016). “Contrapuntal Reading” as a Method, an Ethos, and a Metaphor for Global IR. International Studies Review, 18(1), 134–146. https://doi.org/10.1093/isr/viv018
  • Bilgin, P. (2016). How to remedy Eurocentrism in IR? A complement and a challenge for The Global Transformation. International Theory ; Volume 8, Issue 3, Page 492-501 ; ISSN 1752-9719 1752-9727. https://doi.org/10.1017/s1752971916000178
  • Björkdahl, A. (2002). Norms in International Relations: Some Conceptual and Methodological Reflections. Cambridge Review of International Affairs, 15(1), 9–23. https://doi.org/10.1080/09557570220126216
  • Burke, A., Lee-Koo, K., & McDonald, M. (2015). Ethics and Global Security : A Cosmopolitan Approach. Routledge, Taylor & Francis Group.
  • Callahan, W. A., Callahan, W A 2008, ’ Chinese visions of world order: Post-hegemonic or a new hegemony? ’ International Studies Review, vol 10, & no. 4. (2008). Chinese visions of world order: Post-hegemonic or a new hegemony? Callahan , W A 2008 , ’ Chinese Visions of World Order: Post-Hegemonic or a New Hegemony? ’ International Studies Review , Vol 10 , No. 4 , Pp. 749-761 . DOI:10.1111/j.1468-2486.2008.00830.X. https://doi.org/10.1111/j.1468-2486.2008.00830.x
  • Chesterman, S. (2011). “Leading from Behind”: The Responsibility to Protect, the Obama Doctrine, and Humanitarian Intervention after Libya. Ethics & International Affairs ; Volume 25, Issue 3, Page 279-285 ; ISSN 0892-6794 1747-7093. https://doi.org/10.1017/s0892679411000190
  • Clausewitz, C. von, (DE-588)11852111X, (DE-627)136177263, (DE-576)160588022, aut. (1976). On war Carl von Clausewitz. Ed. and transl. by Michael Howard .
  • Cooperation under the security dilemma /. (1977). Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.55F214A7
  • CRAWFORD, N. C. (2018). The Potential for Fundamental Change in World Politics. International Studies Review, 20(2), 232–238. https://doi.org/10.1093/isr/viy034
  • Cunliffe, P. V. (DE-588)1080269037, (DE-627)844104310, (DE-576)453446590, aut. (2017). The doctrine of the ‘responsibility to protect’ as a practice of political exceptionalism Philip Cunliffe, University of Kent, UK.
  • Curley, M., & Herington, J. (2015). The securitisation of avian influenza: International discourses and domestic politics in Asia. Review of International Studies. https://doi.org/10.1017/S0260210510000537
  • Cusumano, E., & Ruzza, S. (2017). Security privatisation at sea: Piracy and the commercialisation of vessel protection. International Relations ; Volume 32, Issue 1, Page 80-103 ; ISSN 0047-1178 1741-2862. https://doi.org/10.1177/0047117817731804
  • DAVIES, S. E. (2008). Securitizing infectious disease. International Affairs, 84(2), 295–313. https://doi.org/10.1111/j.1468-2346.2008.00704.x
  • DECIANCIO, M. (2016). International Relations from the South: A Regional Research Agenda for Global IR. International Studies Review, 18(1), 106–119. https://doi.org/10.1093/isr/viv020
  • Deibert, R. J., & Rohozinski, R. (2010). Risking Security: Policies and Paradoxes of Cyberspace Security. International Political Sociology, 4(1), 15–32. https://doi.org/10.1111/j.1749-5687.2009.00088.x
  • Doucet, M. G., & de Larrinaga, M. (2008). Sovereign Power and the Biopolitics of Human Security. Conference Papers —— International Studies Association, 1–21.
  • Elbe, S. (2006). Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security. International Studies Quarterly, 50(1), 119–144. https://doi.org/10.1111/j.1468-2478.2006.00395.x
  • Farrell, T. (2002). Constructivist Security Studies: Portrait of a Research Program. International Studies Review, 4(1), 49. https://doi.org/10.1111/1521-9488.t01-1-00252
  • Fierke, K. M. (2002). Links Across the Abyss: Language and Logic in International Relations. International Studies Quarterly, 46(3), 331–354. https://doi.org/10.1111/1468-2478.00236
  • Ganor, B. (2002). Defining Terrorism: Is One Man’s Terrorist another Man’s Freedom Fighter? Police Practice & Research, 3(4), 287–304. https://doi.org/10.1080/1561426022000032060
  • Harman, S., & Wenham, C. (2018). Governing Ebola: between global health and medical humanitarianism. Globalizations, 15(3), 362–376. https://doi.org/10.1080/14747731.2017.1414410
  • Higate, P., & Henry, M. (2004). Engendering Security in Peace Support Operations. Conference Papers —— International Studies Association, 1–19.
  • Hoffman, B. (2002). Rethinking Terrorism and Counterterrorism Since 9/11. Studies in Conflict & Terrorism, 25(5), 303–316. https://doi.org/10.1080/105761002901223
  • HOLSTI, K. (2018). Change in International Politics: The View from High Altitude. International Studies Review, 20(2), 186–194. https://doi.org/10.1093/isr/viy030
  • Ioannis Tellidis, & Harmonie Toros. (2015). Researching Terrorism, Peace and Conflict Studies : Interaction, Synthesis and Opposition. Routledge.
  • Jackson, P. T. (2004). Bridging the Gap: Toward A Realist-Constructivist Dialogue. International Studies Review, 6(2), 337. https://doi.org/10.1111/j.1521-9488.2004.419_1.x
  • Jarvis, L., Nouri, L., & Whiting, A. (2015). Terrorism, Violence and Conflict in the Digital Age: Implications, Opportunities and Challenges. Routledge.
  • Jef Huysmans. (2000). The European Union and the Securitization of Migration. Journal of Common Market Studies, 5, 751. https://doi.org/10.1111/1468-5965.00263
  • Karim, S. (2017). Reevaluating Peacekeeping Effectiveness: Does Gender Neutrality Inhibit Progress? International Interactions, 43(5), 822–847. https://doi.org/10.1080/03050629.2017.1231113
  • Karlsrud, J. (2015). The UN at war: examining the consequences of peace-enforcement mandates for the UN peacekeeping operations in the CAR, the DRC and Mali. Third World Quarterly, 36(1), 40–54. https://doi.org/10.1080/01436597.2015.976016
  • Ken BOOTH. (2013). Seguridad y emancipación | Security and Emancipation. Relaciones Internacionales, 23.
  • Khodary, Y. M. (2016). Women and Peace-Building in Iraq. Peace Review, 28(4), 499–507. https://doi.org/10.1080/10402659.2016.1237151
  • Krampe, F. V. (DE-588)116559935X, (DE-627)1029661286, (DE-576)510448712, aut. (2017). Water for peace? post-conflict water resource management in Kosovo Florian Krampe.
  • Lezaun, J. (2002). Limiting the Social: Constructivism and Social Knowledge in International Relations. International Studies Review, 4(3), 229–234. https://doi.org/10.1111/1521-9488.00272
  • McINNES, C., & LEE, K. (2006). Health, security and foreign policy. Review of International Studies ; Volume 32, Issue 1, Page 5-23 ; ISSN 0260-2105 1469-9044. https://doi.org/10.1017/s0260210506006905
  • McINNES, C., & ROEMER-MAHLER, A. (2017). From security to risk: reframing global health threats. International Affairs, 93(6), 1313–1337. https://doi.org/10.1093/ia/iix187
  • Mearsheimer, J. J. (1994). The false promise of international institutions. International Security, 19(3), 5. https://doi.org/10.2307/2539078
  • OWEN, J. M. (2018). Liberalism and Its Alternatives, Again. International Studies Review, 20(2), 309–316. https://doi.org/10.1093/isr/viy026
  • Page, E. (2000). Theorizing the Link Between Environmental Change and Security. Review of European Community & International Environmental Law, 9(1), 33. https://doi.org/10.1111/1467-9388.00230
  • Paris, R. (2001). Human Security: Paradigm Shift or Hot Air? International Security, 26(2), 87–102. https://doi.org/10.1162/016228801753191141
  • Pattison, J. (2010). Outsourcing the responsibility to protect: humanitarian intervention and private military and security companies. International Theory ; Volume 2, Issue 1, Page 1-31 ; ISSN 1752-9719 1752-9727. https://doi.org/10.1017/s1752971909990224
  • RezaeeDaryakenari, B., & Thies, C. G. (2018). Secrecy and Self-Interest: When Mediators Act Deceitfully. International Interactions, 44(4), 603–630. https://doi.org/10.1080/03050629.2018.1406931
  • Shani, G. (2017). Human Security as ontological security: a post-colonial approach. Postcolonial Studies, 20(3), 275–293. https://doi.org/10.1080/13688790.2017.1378062
  • Singer, P. W. (2002). Corporate Warriors: The Rise of the Privatized Military Industry and Its Ramifications for International Security. International Security, 26(3), 186–220. https://doi.org/10.1162/016228801753399763
  • Sjoberg, L. (2009). Introduction to Security Studies: Feminist Contributions. Security Studies, 18(2), 183–213. https://doi.org/10.1080/09636410902900129
  • Sprinzak, E. (1998). The great superterrorism scare. Foreign Policy, 112, 110. https://doi.org/10.2307/1149039
  • The responsibility to protect Report of the International Commission on Intervention and State Sovereignty. (2001).
  • Trombetta, M. J. (2008). Environmental security and climate change: analysing the discourse. Cambridge Review of International Affairs, 21(4), 585–602. https://doi.org/10.1080/09557570802452920
  • Wendt, A. (1992). Anarchy is what states make of it: the social construction of power politics. International Organization, (02), 391. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsrep&AN=edsrep.a.cup.intorg.v46y1992i02p391.425.02
  • Wilhelmsen, J. V. (DE-588)101554424X, (DE-627)669113638, (DE-576)350787301, aut. (2017). How does war become a legitimate undertaking? re-engaging the post-structuralist foundation of securitization theory Julie Wilhelmsen.
  • Williams, J. (2003). Territorial Borders, International Ethics and Geography: Do Good Fences Still Make Good Neighbours? Geopolitics, 8(2), 25–46. https://doi.org/10.1080/714001033
  • Wojczewski, T. (2018). Global power shifts and world order: the contestation of ‘western’ discursive hegemony. Cambridge Review of International Affairs, 31(1), 33–52. https://doi.org/10.1080/09557571.2018.1476464
  • ZIEGLER, C. E. (2016). Contesting the Responsibility to Protect. International Studies Perspectives, 17(1), 75–97. https://doi.org/10.1111/insp.12085