{"ModuleCode":"PS3240","ModuleTitle":"International Security","Department":"Political Science","ModuleDescription":"This module examines key issues pertaining to international security including: the various approaches to studying international security, the nature of interaction among various levels (national, regional, international) of security, and the major security threats caused by the expansion of conventional arms, proliferation of nuclear arsenal and the spread of biological and chemical weapons. The rise of non-traditional security threats in world politics, especially Southeast Asia, and of Asia, particularly China, as a security concern internationally is also analysed.","ModuleCredit":"4","Workload":"2-1-0-2-5","Preclusion":"PS3210B","ExamDate":"2015-05-05T09:00+0800","ExamOpenBook":true,"ExamDuration":"P2H","ExamVenue":"MPSH1-A","Types":["Module","UEM"],"Lecturers":["Chong Ja Ian"],"IVLE":[{"Announcements":null,"Forums":[],"Workbins":[],"Webcasts":[],"Gradebooks":[],"Polls":[],"Multimedia":[],"LessonPlan":[],"ID":"f0bbfaf3-478e-45f6-9721-4733621f6397","CourseLevel":"1","CourseCode":"PS3240","CourseName":"INTERNATIONAL SECURITY","CourseDepartment":"","CourseSemester":"Semester 2","CourseAcadYear":"2014/2015","CourseOpenDate":"/Date(1432224000000+0800)/","CourseOpenDate_js":"2015-05-22T00:00:00","CourseCloseDate":"/Date(1432396740000+0800)/","CourseCloseDate_js":"2015-05-23T23:59:00","CourseMC":"0","isActive":"N","Permission":"S","Creator":{"UserID":null,"Name":"Chong Ja Ian","Email":null,"Title":null,"UserGuid":"fd2c3c89-a2f1-432b-8859-c38954dfe698","AccountType":null},"hasGradebookItems":false,"hasTimetableItems":true,"hasGroupsItems":false,"hasClassGroupsForSignUp":false,"hasGuestRosterItems":false,"hasClassRosterItems":true,"hasWeblinkItems":false,"hasLecturerItems":true,"hasDescriptionItems":true,"hasReadingItems":false,"hasAnnouncementItems":false,"hasProjectGroupItems":false,"hasProjectGroupsForSignUp":false,"hasConsultationItems":false,"hasConsultationSlotsForSignUp":false,"hasLessonPlanItems":false,"Badge":0,"BadgeAnnouncement":0,"WebLinks":[],"Lecturers":[{"ID":"b487c75e-9dca-43e6-9d41-08ec03314ecc","User":{"UserID":null,"Name":"Chong Ja Ian","Email":null,"Title":null,"UserGuid":"fd2c3c89-a2f1-432b-8859-c38954dfe698","AccountType":null},"Role":"Lecturer ","Order":1,"ConsultHrs":null},{"ID":"eec3b6e8-3f45-4cd8-ae20-4fcaae67c3da","User":{"UserID":null,"Name":"WONG CHENG KIM ANNABELLE","Email":null,"Title":null,"UserGuid":"f7d3e9c1-e8e6-4354-9cc6-fe63cb9d1d1b","AccountType":null},"Role":"Teaching Assistant ","Order":2,"ConsultHrs":null}],"Descriptions":[{"ID":"1e5f053b-8835-4692-be49-41f07234cfff","Title":"Learning Outcomes","Description":"
\n\tThe primary focus of this module is on developing students’ analytical skills, particularly as they pertain to assessing conceptual arguments and explanations of empirical phenomena relating to issues in international security and security studies more broadly. A secondary objective of the course is to introduce students to common methodologies used in the study of security issues. Assessments will focus on students’ abilities to apply these skills. Memorisation of facts is not an objective of this course, neither is a knowledge of current events. Current events are only relevant in terms of how they relate to the theories and empirical issues the course covers.
\n","Order":1},{"ID":"2e5f053b-8835-4692-be49-41f07234cfff","Title":"Prerequisites","Description":"There are no pre-requisites for this module. However, students without a background in international relations may find the course more challenging.","Order":2},{"ID":"3e5f053b-8835-4692-be49-41f07234cfff","Title":"Teaching Modes","Description":"The module takes the form of lectures and tutorials. Each students will belong to a tutorial group, and will meet as part of that group for four times a semester.","Order":3},{"ID":"4e5f053b-8835-4692-be49-41f07234cfff","Title":"Schedule","Description":"Lecture:\n\tWhat are the causes of security and insecurity in world politics? What do states, people, and other political actors do to safeguard their survival? How do conflicts begin and how do they end? What are ways to prevent conflict? This course attempts to explore these key questions, which represent key concerns in the area of international relations known as international security or security studies. In doing so, the course aims to introduce students to concepts and themes central to international security/security studies by highlighting 1) main theoretical perspectives and 2) major debates in the field. This means covering more traditional security issues such as inter-state and civil wars, insurgencies, terrorism, and war termination as well as newer topic areas that include humanitarian intervention, and non-traditional security.
\n","Order":5},{"ID":"6e5f053b-8835-4692-be49-41f07234cfff","Title":"Syllabus","Description":"\n\tWeek 1: What is Security Studies?
\n\n\t
\n\n\tRobert J. Art, “To What Ends Military Power?” International Security Vol. 4 No. 3 (Spring 1980), pp. 3-35.
\n\n\t
\n\n\tDavid Baldwin, “Security Studies and the End of the Cold War,” World Politics Vol. 48, No. 1 (October 1995), read pp. 125-141 (skim pp. 117-124).
\n\n\t
\n\n\tLawrence Freedman, “International Security: Changing Targets?” Foreign Policy, No. 110 (Spring 1998), pp. 48-63.
\n\n\t
\n\n\tRobert Jervis, Perception and Misperception in International Politics, (Princeton, NJ: Princeton University Press, 1976), ch. 1
\n\n\t
\n\n\tJack Snyder, “One World: Rival Theories,” Foreign Policy, No. 145 (Nov.-Dec. 2004), pp. 53-62.
\n\n\t
\n\n\tTerry Terriff, Stuart Croft, Lucy James and Patrick M. Morgan, Security Studies Today (London: Polity Press, 1999), chapter 1.
\n\n\t
\n\n\tStephen Walt, “International Relations: One World, Many Theories,” Foreign Policy No. 110 (Spring 1998), pp. 29-46.
\n\n\t
\n\n\t
\n\n\tWeek 2: What causes inter-state war?
\n\n\t
\n\n\tMichael Doyle, "Liberalism and World Politics," American Political Science Review, Vol. 80, No. 4, (December 1986), pp. 1151-1169.
\n\n\t
\n\n\tStephen van Evera, “Hypotheses on Nationalism and War,” International Security, Vol. 18, No. 4 (Spring 1994), pp. 5-39.
\n\n\t
\n\n\tStephen Van Evera, “Offense, Defense, and the Causes of War,” International Security Vol. 22, No. 4 (Spring 1998), pp. 5-43.
\n\n\t
\n\n\tRobin Fox, “Fatal Attraction: War and Human Nature,” The National Interest (winter 1992-93): 11-20.
\n\n\t
\n\n\tErik Gartzke, “War is in the Error Term,” International Organization, Vol. 53 No. 3 (Summer 1999), pp. 567-87.
\n\n\t
\n\n\tRobert Gilpin, “The Theory of Hegemonic War,” Journal of Interdisciplinary History, Vol. 18, No. 4 (Spring 1988), pp. 591-614.
\n\n\t
\n\n\tR. Jervis, “Theories of War in and Era of Great Power Peace,” American Political Science Review, Volume 96, No. 1 (March 2002), pp. 1-14
\n\n\t
\n\n\tRobert Jervis, “War and Misperception,” Journal of Interdisciplinary History, Vol. 18, No. 4 (Spring 1988), pp. 675-700.
\n\n\t
\n\n\tEdward D. Mansfield and Jack Snyder, "Democratization and the Danger of War," International Security Vol. 20, No. 1, (Summer 1995), pp. 5-38.
\n\n\t
\n\n\tDan Reiter, “Exploding the Powder Keg Myth: Preemptive Wars Almost Never Happen,” International Security, Vol. 20, No. 2 (Fall 1995), pp. 5-34.
\n\n\t
\n\n\tThucydides, History of the Peloponnesian War (London: Penguin, 1972), Rex Warner, trans., pp. 35-87, 118-36. (or same sections from other editions, including online ones such as http://classics.mit.edu/Thucydides/pelopwar.html)
\n\n\t
\n\n\t
\n\tWeek 3: What causes civil war?
\n\t
\n\n\tPaul Collier and Anke Hoeffler, “Greed and Grievance in Civil War,” Oxford Economic Papers, Vol. 56, No. 4 (2004), pp. 563-595.
\n\n\t
\n\n\tJames Fearon and David Laitin, “Ethnicity, Insurgency and Civil War,” American Political Science Review Vol. 97, No. 1 (February 2003), pp. 75-90.
\n\n\t
\n\n\tChaim Kaufmann, “Rational Choice and Progress in the Study of Ethnic Conflict: A Review Essay,” Security Studies, Vol. 14, No. 1 (January – March 2005), pp. 178-207.
\n\n\t
\n\n\tJohn Mueller, “The Banality of ‘Ethnic War’,” International Security, Vol. 25, No. 1 (Summer 2000), pp. 42-70.
\n\n\t
\n\n\tJack Snyder and Robert Jervis, "Civil War and the Security Dilemma." In Civil Wars, Insecurity, and Intervention. Edited by Barbara Walter, and Jack Snyder (Columbia University Press, 1999), pp. 15-37. [RBR]
\n\n\t
\n\n\tBarbara Walter, “Explaining the Intractability of Territorial Conflict,” International Studies Review Vol. 5 No. 4 (2003), pp. 137-53.
\n\n\t
\n\n\t
\n\tWeek 4: Why insurgency?
\n\t
\n\n\tAndrew Mack, “Why Big Nations Lose Small Wars: The Politics of Asymmetric Conflict,” World Politics, Vol. 27, No. 2 (January 1975), pp. 175-200. [NUS E-Journals]
\n\n\t
\n\n\tIvan Arreguín-Toft, “How the Weak Win Wars: A Theory of Asymmetric Conflict,” International Security Vol. 26, No. 1 (Summer 2001), pp. 93-128. [NUS E-Journals]
\n\n\t
\n\n\tJason Lyall and Isaiah Wilson, “Rage against the Machines: Explaining Outcomes in Counterinsurgency Wars,” International Organization 63:1 (Winter 2009) 67-106. [NUS E-Journals]
\n\n\t
\n\n\tMichael P. Fischerkeller, "David versus Goliath: Cultural Judgments in Asymmetric Wars." Security Studies, 7, 4 (Summer 1998), 1-43.
\n\t
\n\tRecommended Readings:
\n\t
\n\tT.V. Paul, Asymmetric Conflicts: War Initiation by Weaker Powers. (New York: Cambridge University Press, 1994).
\n\t
\n\n\tGil Merom, How Democracies Lose Small Wars: State, Society, and the Failures of France in Algeria, Israel in Lebanon, and the United States in Vietnam (Cambridge University Press, 2003).
\n\n\t
\n\t
\n\tWeek 5: How do wars end?
\n\n\t
\n\n\tDominic D.P. Johnson and Dominic Tierney, Failing to Win: Perceptions of Victory and Defeat in International Politics (Cambridge, MA: Harvard Univ Press, 2006), ch 1.
\n\n\t
\n\n\t
\n\n\tH.E. Goemans, War and Punishment: The Causes of War Termination the First World War (Princeton, 2000), pp. 3-52. [RBR]
\n\n\t
\n\n\tRobert Pape, “Why Japan Surrendered,” International Security, Vol.18, No.2 (Fall 1993), pp.154–201. [NUS E-Journals]
\n\n\t
\n\n\t(B) Intra-State Wars
\n\n\t
\n\n\tDavid E. Cunningham, “Veto Players and Civil War Duration." American Journal of Political Science, Vol. 50, No. 4 (2006), pp. 875-892.
\n\n\t
\n\n\tAlexander B. Downes, “The Problem with Negotiated Settlements to Ethnic Civil Wars,” Security Studies, Vol. 13, No. 4 (Summer 2004), pp. 230-79.
\n\n\t
\n\n\tMonica Duffy Toft, “Ending Civil Wars: A Case for Rebel Victory?” International Security Vol. 34 No. 4 (Spring 2010), pp. 7-36.
\n\n\t
\n\n\tBarbara Walter, "Designing Transitions from Civil War." In Civil Wars, Insecurity, and Intervention. Edited by Barbara Walter, and Jack Snyder (Columbia University Press, 1999), pp. 38-72. [RBR]
\n\n\t
\n\n\tRecommended Readings:
\n\n\t
\n\tVirginia Page Fortna, Peace Time: Cease-Fire Agreements and the Durability of Peace (Princeton University Press, 2004).
\n\t
\n\n\tMichael Greig, “Moments of Opportunity: Recognizing Conditions of Ripeness for International Mediation between Enduring Rivals. Journal of Conflict Resolution Vol. 45, No. 6 (2001), pp. 691-718.
\n\n\t
\n\n\tFred C. Iklé, Every War Must End (Columbia University Press, 1991).
\n\n\t
\n\n\tCharles Kegley, Gregory Raymond, How Nations Make Peace, (New York: Worth Publishers, 1999), Chapter 2.
\n\n\t
\n\n\tLeon V. Sigal, Fighting to a Finish: The Politics of War Termination in the United States and Japan, 1945 (Cornell, 1988).
\n\n\t
\n\n\tBranislav Slantchev, “How Initiators End Their Wars: The Duration of Warfare and the Terms of Peace," American Journal of Political Science, Vol. 50, No. 2 (2004), pp. 313-330.
\n\n\t
\n\n\tMonica Duffy Toft, “Indivisible Territory, Geographic Concentration, and Ethnic War,” Security Studies, Vol. 12, No. 2 (Winter 2002/2003), pp. 81-118.
\n\n\t
\n\n\t
\n\n\tWeek 6: Does conduct in war matter?
\n\n\t
\n\n\tAlexander Downes, “Desperate Times, Desperate Measures: The Causes of Civilian Victimization in War,” International Security, Vol. 30, No. 4 (2006), pp. 152-195. [NUS E-Journals]
\n\n\tColin H. Kahl, “In the Crossfire or the Crosshairs? Norms, Civilian Casualties, and U.S. Conduct in Iraq,” International Security Vol. 32, No. 1 (Summer 2007), pp. 7-46. [NUS E-Journals]
\n\n\t
\n\n\tBenjamin Valentino, Paul Hutch and Sarah Croco, “Covenants without the Sword: International Law and the Protection of Civilians in Times of War,” World Politics, Vol. 58, No. 3 (April 2006), pp. 339-377.
\n\n\tElisabeth Jean Wood, “Variation of Sexual Violence during War,” Politics and Society, Vol. 34, No. 3 (September 2006), pp. 307-341.
\n\n\tMichael Walzer, Just and Unjust Wars: A Moral Argument with Historical Illustrations (New York: Basic, 1992), pp. 197-206
\n\n\t
\n\n\tRecommended Readings:
\n\n\t
\n\n\tRogers Brubaker and David Laitin, “Ethnic and Nationalist Violence,” Annual Review of Sociology, Vol. 24 (1998), pp. 423-452.
\n\n\t
\n\n\tStathis N. Kalyvas, “The Ontology of ‘Political Violence’: Action and Identity in Civil Wars,” Perspectives on Politics, Vol. 1, no. 3 (2003), pp. 475-94.
\n\n\t
\n\n\tStathis N. Kalyvas, The Logic of Violence in Civil Wars (New York: Cambridge University Press, 2006). Macartan Humphreys and Jeremy Weinsten, “Handling and Manhandling Civilians in Civil War,” American Political Science Review, Vol. 100, No. 3 (August 2006), pp. 429-447.
\n\n\t
\n\n\tStathis Kalyvas, “Wanton and Senseless? The Logic of Massacres in Algeria,” Rationality and Society, Vol. 11, No. 3 (1999), pp. 243-85.
\n\n\t
\n\n\tAndrew Kydd and Barbara Walter, “Sabotaging the Peace: The Politics of Extremist Violence,” International Organization, Vol. 56, No. 2 (2002), pp. 263-296.
\n\n\t
\n\n\tBenjamin Valentino, Final Solutions: Mass Killings and Genocide in the 20th Century (Ithaca: Cornell University Press, 2004).
\n\n\t
\n\n\tReed M. Wood, “Rebel Capacity and Strategic Violence against Civilians,” Journal of Peace Research Vol. 47, No. 5 (2010), pp. 601-614. \\
\n\t
\n\t
\n\n\tWeek 7: What makes for effectiveness in war?
\n\n\t
\n\n\tDavid M. Edelstein, “Occupational Hazards: Why Military Occupations Succeed or Fail,” International Security, Vo. 29, No. 1 (Summer 2004), pp. 49-91.
\n\n\t
\n\n\tAaron L. Friedberg “Why Didn’t the U.S. Become a Garrison State?” International Security vol. 16, no. 2 (Spring 1992), pp. 109-142.
\n\n\t
\n\n\tAlastair Iain Johnston, "Thinking About Strategic Culture," International Security, (Spring 1995), Vol. 19, No. 4, pp. 32-64.
\n\n\t
\n\n\tElizabeth Kier, "Culture and Military Doctrine: France Between the Wars," International Security, (Spring 1995), Vol. 19, No. 4, pp. 65-93.
\n\n\t
\n\n\tDavid A. Lake, “Powerful Pacifists: Democratic States and War,” American Political Science Review, Vol. 86, No. 1 (March 1992), pp. 24-37.
\n\n\t
\n\n\tDan Reiter and Allan C. Stam, III, “Democracy and Battlefield Military Effectiveness,” Journal of Conflict Resolution, Vol. 42, No. 3 (June 1998), read only pp. 259-267.
\n\n\t
\n\n\tStephen P. Rosen, "Military Effectiveness: Why Society Matters," International Security, (Spring 1995), Vol. 19, No. 4, pp. 5-31.
\n\n\t
\n\n\t
\n\tWeek 8: What is the relationship between economics and security?
\n\t
\n\n\tAlbert O. Hirschman, National Power and the Structure of Foreign Trade, pp. 3-39.
\n\n\t
\n\n\tJonathan Kirshner, Currency and Coercion: The Political Economy of International
\n\n\tMonetary Power, ch. 4.
\n\n\t
\n\n\tRobert Pape, "Why Economic Sanctions Do Not Work," International Security, Vol. 22, No. 2, (Fall 1997).
\n\n\t
\n\n\tDavid A. Baldwin and Robert Pape, “Evaluating Economic Sanctions,” International Security Vol. 23, No. 2, (Fall 1998), pp. 189-198.
\n\n\t
\n\n\tPeter Liberman, "The Spoils of Conquest" International Security, (Fall 1993), pp
\n\n\t125-153.
\n\n\t
\n\n\tCarl Kaysen, "Is War Obsolete?: A Review Essay," in Lynn-Jones Reader, pp.
\n\n\t81-104.
\n\n\t
\n\n\tStephen G. Brooks, “The Globalization of Production and the Changing Benefits of
\n\n\tConquest,” Journal of Conflict Resolution, Vol. 43, No. 5 (October 1999), pp.
\n\n\t646-670.
\n\n\t
\n\n\tRecommended Reading:
\n\n\t
\n\n\tNorman Angell, The Great Illusion: A Study of the Relation of Military Power in
\n\n\tNations to their Economic and Social Advantage (New York: G.P. Putnam’s Sons,
\n\n\t1911), 3rd ed., pp. 29-84.
\n\n\t
\n\n\tDavid Baldwin, Economic Statecraft, chs. 3
\n\n\t
\n\n\tVladimir Ilyich Lenin, “The Highest Stage of Capitalism,” in Harrison M. Wright, ed.,
\n\n\tThe “New Imperialism”: Analysis of Late-Nineteenth-Century Expansion (Lexington,
\n\n\tMass.: D.C. Heath & Co., 1976), pp. 44-58.
\n\n\t
\n\n\tWeek 9: What difference do nuclear weapons make?
\n\n\t
\n\n\tSheena Chestnut Greitens “Illicit Activity & Proliferation: North Korean Smuggling Networks,” International Security, vol. 32, no. 1 (Summer 2007), pp. 80-111.
\n\n\t
\n\n\tThomas J. Christensen, “The Meaning of the Nuclear Evolution: China’s Nuclear Modernization and U.S. National Security,” Journal of Strategic Studies, August 2011.
\n\n\t
\n\n\tStephen Peter Rosen, “After Proliferation: What to Do If More States Go Nuclear,” Foreign Affairs (September/October 2006), pp. 9-14.
\n\n\t
\n\n\tScott D. Sagan and Kenneth N. Waltz, The Spread of Nuclear Weapons: A Debate (New York: Norton, 1995), pp. vii-ix, 1-91.
\n\n\t
\n\n\tNina Tannenwald, “The Nuclear Taboo: The United States and the Normative Basis of Nuclear Non-Use,” International Organization, Vol. 53, No. 3 (Summer 1999), pp. 433-468. [NUS E-Journals]
\n\n\t
\n\n\tAndrew C. Wimmer, “The Proliferation Security Initiative: The New Face of Interdiction,” The Washington Quarterly vol. 28, no. 2 (Spring 2005), pp. 129-143.
\n\n\t
\n\t
\n\tWeek 10: What are the ways to conceptualise terrorism?
\n\n\t
\n\n\tGraham Allison, Nuclear Terrorism: The Ultimate Preventable Catastrophe (New York: Holt, 2004), pp. 1-42.
\n\n\t
\n\n\tDaniel Byman, “Remaking Alliances for the War on Terrorism,” Journal of Strategic Studies vol. 29, no. 5 (October 2006), pp. 767-811.
\n\n\t
\n\n\tMartha Crankshaw, “The Strategic Logic of Terrorism,” Mark Juergensmeyer, “Religious Radicalism and Political Violence,” and Richard K. Betts, “The Soft Underbelly of Primacy,” in Richard K. Betts, ed., Conflict After the Cold War, 2d edition, (New York: Pearson Longman, 2005) pp. 491-536.
\n\n\t
\n\n\tRobert A. Pape, “The Strategic Logic of Suicide Terrorism,” American Political Science Review, vol. 97, no. 3 (August 2003), pp. 343-61.
\n\n\t
\n\n\tBarry R. Posen, “The Struggle Against Terrorism: Grand Strategy and Tactics,” International Security Vol. 26, Np. 3, (Winter 2001/2002), pp. 39-55.
\n\n\t
\n\n\tJessica Stern, The Ultimate Terrorists (Cambridge, Mass.: Harvard University Press, 1999), pp. 1-10, 48-106; recommended, pp. 128-160.
\n\n\t
\n\n\t
\n\tWeek 11: Is there a role for humanitarian intervention?
\n\t
\n\n\tLee Feinstein and Anne-Marie Slaughter, “A Duty to Prevent,” Foreign Affairs (January/February 2004).
\n\n\t
\n\n\tTerry Nardin, “The Moral Basis for Humanitarian Intervention,” Ethics & International Affairs, Vol. 16, No.1 (Spring 2002), p. 11-27.
\n\n\t
\n\n\tRoland Paris, “International Peacebuilding and the 'Mission Civilisatrice',” Review of International Studies, Vol. 28, No. 4 (October 2002), p. 637-656.
\n\n\t
\n\n\tCarsten Stahn, “Responsibility to Protect: Political Rhetoric or Emerging Legal Norm,” American Journal of International Law, Vol. 101, No. 1 (January 2007), pp. 99-120.
\n\n\t
\n\n\tMichael Walzer, Just and Unjust Wars (New York: Basic Books, 1977), pp. 51-62, 86-91, 101-108. [RBR]
\n\n\t
\n\n\tRecommended Readings:
\n\n\t
\n\n\tCore R2P Documents:
\n\n\thttp://www.responsibilitytoprotect.org/index.php/publications/core-rtop-documents
\n\n\t
\n\n\tRobert Keohane, “Political Authority after Intervention: Gradations in Sovereignty,” In Humanitarian Intervention: Ethical, Legal, and Political Dilemmas, edited by J. L. Holzgrefe and Robert O. Keohane, (New York: Cambridge University Press, 2003).
\n\n\t
\n\n\t
\n\tWeek 12: What is non-traditional security—and does it make sense?
\n\t
\n\n\tMely Caballero-Anthony, “Combating Infectious Diseases in East Asia: Securitization and Global Public Goods for Health and Human Security” Journal of International Affairs, Vol. 59, No. 2 (Spring-Summer 2006), pp. 105-127.
\n\n\t
\n\n\tLaurie Garrett, “The Next Pandemic?” Foreign Affairs, Vol. 84, No. 4 (July/August 2005), pp. 3-23.
\n\n\t
\n\n\tYuen Foong Khong, “Human Security: A Shotgun Approach to Alleviating Human Misery?” Global Governance, Vol. 7 (2001), pp. 231-236.
\n\n\t
\n\n\tKeith Krause and Michael C. Williams, "Broadening the Agenda of Security Studies: Politics and Methods," Mershon International Studies Review 40 (1996), pp. 229-54.
\n\n\t
\n\n\tRoland Paris, “Human Security: Paradigm Shift or Hot Air,” International Security, Vol. 26, No. 2 (Fall 2001), pp. 87-102.
\n\n\t
\n\tJohn Podesta and Peter Ogden, “The Security Implications of Climate Change,” The Washington Quarterly, Vol. 31, No. 1 (Winter 2007-2008), pp. 115-138. [NUS E-Journals]
\n\t
\n\n\t
\n\tWeek 13: What are the ways to make sense of Security Studies?
\n\t
\n\n\tReview and wrap-up
\n","Order":6},{"ID":"7e5f053b-8835-4692-be49-41f07234cfff","Title":"Practical Work","Description":"\n\tThere will be a final examination during the exam period at the end of the semester. The exam will consist of short-answer questions that test basic concepts relating to international security and an essay question. The questions in the final examination demand that you synthesise issues and topics raised in lectures, tutorials, and in the readings throughout the semester.
\n\n\t
\n\n\tStudents will be responsible for two short, 3-page memos (please see formatting requirements below). One will be due at the end of the last lecture before mid-semester break, and the other at the end of the last lecture of the semester. The memos need to incorporate the theories, concepts, and topics covered in class up to that point. The first memo should cover concepts examined during the first half of the semester. The second memo should cover concepts explored during the second half of the semester. The question for the first memo will be made available on IVLE on week 2 and the question for the second memo will be made available on IVLE on week 7.
\n","Order":7},{"ID":"8e5f053b-8835-4692-be49-41f07234cfff","Title":"Assessment","Description":"\n\tThe final grade will depend on the following:
\n\n\tTutorial participation—20%
\n\n\tTwo (2) Short memos—15% each for a total of 30%
\n\n\tFina Exam—50%
\n","Order":8},{"ID":"9d5bd230-9936-4349-9d5e-3a6eeec33205","Title":"Preclusions","Description":"PS3210B","Order":9},{"ID":"a85517b2-d10d-4959-9a2e-60072fc13dbb","Title":"Workload","Description":"2-1-0-2-5