Skip to main content

Reading List

Security Studies, 2019/20, Semester 2
Dr Jack Holland
Tutor information is taken from the Module Catalogue

School of Politics and International Studies

Module Handbook

Semester One 2018

Security Studies

PIED 2558

Taught By: Professor Graeme Davies, Office: 14.06 Phone: 0113 343 9012



The aim of this module is to provide an introduction to debates on security in international relations. The first objective is to outline what we mean by security and to discuss the limitations of its different conceptions. The second objective is to analyse the different theoretical schools that examine security, starting with realism and then move onto the newer theoretical approaches such as the Copenhagen school. The third objective is to examine contemporary security threats, what they mean for the analysis of international politics and how the earlier theoretical models can be applied to understand these issues. The module is in two parts. The first part examines and debates a range of competing theories and conceptualisations of security. This part explores the different meanings of the term ‘security’ and whose security we can talk about. The second objective is to examines contemporary security threats with implications for international politics. These will include inter and intra-state conflict, terrorism, organised crime, health and the environment.

On completion of this module, students should be able to:

1. Demonstrate an ability to critically evaluate the principal debates about conceptualising security

2. Explain the strengths and weaknesses of competing approaches to security

3. Assess the utility of theory in understanding security

4. Evaluate the security challenges facing policymakers

5. Critically evaluate the reasons for labelling an issue a security threat

6. Discuss the dangers of labelling an issue a security threat

7. Analyze current and potential responses to current security threats

8. Critically re-evaluate the direction of security studies


Part One: Theories and Concepts

1. Traditional Approaches to Security: Realism, Strategy and Security Studies

2. New Security Challenges

3. Critical Security Studies

4. Terrorism and Counter-Terrorism 

5. WMD

Part Two: Threats and Responses

6. Reading Week

7. Gender and Security

8. Environmental Change

9. Health

10. Cyber Security 

11. Conclusion: The Future of Security Studies


You will complete one 2500 word essay which counts towards 50% of the assessment.

There is also a formative feedback on the first 500 words of the essay you intend to answer.

See the POLIS Assessment Guide for the handing in dates for this module.



The weekly lectures introduce you to the topics identified on the syllabus. Students are required to read core and additional readings listed in the reading list in preparation for seminar discussion and essays.

Attendance at lectures and seminars is compulsory.

Week One beginning 1/10/18

Lecture: Traditional Approaches to Security: Realism, Strategy and Security Studies

Seminar: Introduction

Discussion Topics:

1. How important is the military sector of security? Does it remain relevant?

2. What are the most important security concerns for states?

3. What is the Security Dilemma? How can it be overcome?

4. What is the nature of power in international politics?

5. Which state has more power- the USA or China?

Required Reading:

Alan Collins (2015), Contemporary security studies (Oxford: OUP)- Chapters 1,2,3

Further Reading:

Barry Buzan and Lene Hansen (2009), The evolution of international security studies, (Cambridge University Press), particularly the Introduction and Chapters 1 and 2

Miller, Steven E. (2010), ‘The Hegemonic Illusion? Traditional Strategic Studies in Context’, Security Dialogue, 41: 6

Stephen M. Walt, ‘The Renaissance of Security Studies’, International studies quarterly., 35:2, 1991

Richard Betts, ‘Should Strategic Studies Survive? ’, World politics., 50:1, 1997

John Mearsheimer, Richard Little, Christopher Hill, Chris Brown and Ken Booth (2005), ‘Roundtable: the Battle Rages On’, International relations., 19 (3), pp. 337-360.

John Baylis, James Wirtz, Eliot Cohen, Colin S. Gray (eds) (2006), Strategy in the contemporary world : an introduction to strategic studies, (Oxford: Oxford University Press), Introduction and Chapters 13 and 14

Daniel Drezner (2011) Theories of international politics and zombies (Princeton University Press)

Baldwin, D. (1997), “The Concept of Security”, Review of international studies. 23(1): 5-26

Buzan, Barry, People, States and Fear , Second Edition, (Hemel Hempstead: Harvester Wheatsheaf, 1991)

Gilpin, R (1981), War and change in world politics (New York: Cambridge University Press)

Mearsheimer, J, J. (2001), The tragedy of great power politics (New York: W.W. Norton)

Paul T.V., Wirtz, J., and Fortmann, M. (eds.) (2004), Balance of power : theory and practice in the 21st century (Stanford: Stanford University Press)

Vasquez J, and C Elman (eds.) (2003), Realism and the balancing of power : a new debate. (Upper Saddle River, NJ)

Morgenthau, H (1985), Politics Among Nations: The Struggle for Power and Peace (6th edition) (New York: McGraw-Hill)

Schweller, R.L. (1998), Deadly imbalances : tripolarity and Hitler's strategy of world conquest (New York: Columbia University Press)

Walt S.M. (1987), The origins of alliances (Ithaca, NY: Cornell University Press)

Waltz K.N. (1979) Theory of International Politics (Reading, MA: Addison Wesley)

Bull, H (1977), The Anarchical Society: A Study of Order in World Politics (New York, Columbia University Press)

Organski, A.F.K. and J Kugler (1980), The war ledger (Chicago, University of Chicago Press)

Keohane R.O (1984), After Hegemony (Princeton, Princeton University Press)

Doyle M (1997), Ways of war and peace : realism, liberalism, and socialism, (New York, W.W. Norton)

Top of page

Week Two beginning 8/10/18

Lecture: New Security Challenges 

Seminar: How broad should the study of security be?

Seminar topics:

  • What does the widening (and deepening) of security studies involve?

  • Should security be broadened beyond military threats to the state?

  • Required Reading:

Recommended Reading

Sheehan, M., International security : an analytical survey (Lynne Rienner, 2005). Ch 4. OCR REQUESTED BY LIBRARY (fad 16/10/2018) 



Top of page

Week Three beginning 15/10/18


Lecture: Critical Security Studies

Seminar: What’s so critical about Critical Security Studies?

Discussion Topics:

1. What does the (widening and) deepening of security studies involve?

2. Is security socially constructed? (Constructivism)

3. What is securitization? (Copenhagen School)

4. Is security emancipation? (Welsh School)

Required Reading:

Alan Collins (2015), Contemporary security studies (Oxford: OUP)-chapter 7,8

Further Reading:

Newman, Edward, 'New Forms of Security and the Challenge for Human Security’ in Mark Beeson and Nick Bisley eds., Issues in 21st century world politics, 2nd Edition, Palgrave, 2013 .

Agamben, Giorgio, 1995. Homo Sacer : sovereign power and bare life. Stanford: Stanford University Press.

Agamben, Giorgio, 2005. State of Exception. Chicago: University of Chicago Press.

Campbell, David, 1998. Writing security : United States foreign policy and the politics of identity. Minneapolis: University of Minnesota Press.

Dillon, Michael, 2007. ‘Governing Terror: The State of Emergency of Bio-Political Emergence’. International Political Sociology 1(1)

Dillon, Michael & Neal, Andrew [eds.] 2008. Foucault on politics, security and war. London: Palgrave.

Dillon, Michael & Reid, Julian, 2009. The liberal way of war : killing to make life live. London: Routledge.

Duffield, Mark, 2007. Development, security and unending war : governing the world of peoples. Cambridge: Polity Press.

Duffield, Mark, 2008. ‘Global Civil War: The Non-Insured, International Containment & Post-interventionary Society’, Journal of refugee studies. 21 (2): 145-165

Evans, Brad, 2010. 'Foucault's Legacy: Security, War and Violence in the 21st Century'. Security Dialogue 41(4): 1-21

Foucault, Michel, 2003. Society must be defended : lectures at the Collège de France, 1975-76. New York: Picador.

Foucault, Michel, 2007. Security, territory, population : lectures at the Collège de France, 1977-1978. New York: Palgrave Macmillan.

Krause, K and M.C. Williams, (1997), Critical security studies : concepts and cases (Minneapolis: University of Minnesota Press)

Weldes, J, M. Laffey, H Gusterson and Duvall, R (eds.) (1999), Cultures of insecurity : states, communities, and the production of danger, (Minneapolis: University of Minnesota Press)

Krause, K (1998), ‘Critical Theory and Security Studies: The Research Programme of “Critical Security Studies”’, Cooperation and conflict 33/3:298-333.

Buzan, B (1991), People, states, and fear : an agenda for international security studies in the post-cold war era (2nd edn, Boulder, CO:Lynne Rienner)

Barry B, O Waever & J de Wilde (1998), Security : a new framework for analysis (London: Lynne Rienner)

Hansen, L (2000), ‘The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School’, Millennium. 29/2:285-306

Booth, K (ed.) (2005), Critical security studies and world politics, (Boulder, CO: Lynne Rienner)

Booth, K (2005), Theory of world security (Cambridge, Cambridge University Press)

Jones, R. W. (1999), Security, strategy, and critical theory, (Boulder, CO: Lynne Rienner)

Klein, Bradley (1994), Strategic studies and world order, (Cambridge: Cambridge University Press)

Top of page

Week Four beginning 22/10/18

Lecture: Terrorism and Counter-Terrorism

Seminar: Terrorism- Causes and Consequences

Discussion Topics:

1. Should I be more scared of my toilet than a terrorist?

2. What role does the media play in international and domestic terrorism?

3. Will terrorists get a nuclear bomb?

4. Should terrorism be treated as a war or a crime?

5. What should the balance be between fighting terrorism and protecting civil liberties?

Required Reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) chapter 21  

John Mueller, (2005), Simplicity and Spook: Terrorism and the Dynamics of Threat Exaggeration. International studies perspectives. , 6: 208–234

John Mueller, (2005).Six Rather Unusual Propositions about Terrorism, Terrorism and political violence. 17, no. 4 (Winter 2005): 487–505.

Further Reading:

Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 1998)

Russell Howard and Reid Sawyer (eds.), Terrorism and counterterrorism : understanding the new security environment : readings & interpretations , Revised and Updated edition (Guilford, CT: McGraw Hill, 2004)

Walter Reich (ed.), Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind (The Woodrow Wilson Center Press, 1998)

Grant Wardlaw, Political terrorism : theory, tactics, and counter-measures (Cambridge: Cambridge University Press, 1989).

Alexander George (ed.) (1991). Western state terrorism (Cambridge, Polity Press).

Does Al Qaeda Continue to Pose a Serious International Threat?

YES: The Enduring al-Qa’ida Threat: A Network Perspective, Jeffrey Cozzens and Magnus Ranstorp  NO: Al Qaeda: A Diminishing Threat, Lee Jarvis IN Richard Jackson and Samuel Justin Sinclair (eds.). Contemporary debates on terrorism , Abingdon: Routledge 2012

Hoffman, Bruce, (2009), ‘A Counterterrorism Strategy for the Obama Administration’, Terrorism and political violence. , 21(3), pp. 359-377.

McCrisken, Trevor (2013), ‘Obama’s Drone War, Survival. , 55(2), pp 97-122.

Cronin, Audrey (2009), How terrorism ends : understanding the decline and demise of terrorist campaigns , (Princeton University Press, Cambridge)

Jackson, Richard et al, (2011), Terrorism : a critical introduction , (Basingstoke, Palgrave Macmillan), chapter 6.

Audrey Kurth Cronin and James M. Ludes (eds.) (2004). Attacking terrorism : elements of a grand strategy (Washington, DC; Georgetown University Press, 2004)

Philip B. Heymann and Juliette N. Kayyem (2005). Protecting liberty in an age of terror (Cambridge, MA: MIT Press).

Paul R. Pillar (2003). Terrorism and U.S. foreign policy (Washington, DC: Brookings Institution Press).

Horgan, John (2005). The psychology of terrorism (London: Routledge)

Richard A. Posner (2005). Preventing surprise attacks : intelligence reform in the wake of 9/11 (Lanham, MD: Rowman and Littlefield).

The U.S. Army/Marine Corps Counterinsurgency Field Manual (Chicago, IL: University of Chicago Press).

Crenshaw, M., 1995. Terrorism in context . Pennsylvania State University Press, University Park, PA

Tilly Charles (2003), The politics of collective violence . Cambridge: Cambridge University Press.

Wievorka Michel (1988), The making of terrorism , Chicago: University of Chicago Press

Bigo Didier, Tsoukala Anastassia (eds.) (2008), Terror, insecurity and liberty : illiberal practices of liberal regimes after 9/11 , London: Routledge

Della Porta Donatella (ed.) (1992), Social movements and violence : participation in underground organizations . Greenwich: JAI Press.

Jackson Richard (2005), Writing the war on terrorism : language, politics and counter-terrorism , Manchester: Manchester University Press

Top of page

Week Five beginning 29 /10/18

Lecture: Weapons of Mass Destruction

Seminar: Are WMD all that bad?

Discussion Topics:

1. Would the world be a safer place if all states had nuclear weapons?

2. Why would Iran want a nuclear weapon? Should we be scared if they get one?

3. Should military action or negotiations be used to counter the spread of WMD? Why?

4. Is today’s nuclear weapons environment more or less dangerous than that of the Cold War?

Required Reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) chapter 20

Further Reading:

Freedman, Lawrence (2003), The Evolution of Nuclear Strategy , (New York: Palgrave Macmillan)

Schell, Jonathan (1982), The fate of the earth , (New York: Knopf)

Sagan, Scott D. And Kenneth Waltz (2002), The spread of nuclear weapons : a debate renewed : with new sections on India and Pakistan, terrorism, and missile defense , (New York: W.W. Norton and Co).

Croddy, Eric A. And Wirtz, James J. (eds.) (2005), Weapons of mass destruction : an encyclopedia of worldwide policy, technology, and history , 2 vols. (Santa Barbara, CA: ABC-Clio)

Mandelbaum, Michael (1979), The nuclear question : the United States and nuclear weapons, 1946-1976 (New York: Cambridge University Press)

Mandelbaum, Michael (1981), The nuclear revolution : international politics before and after Hiroshima (New York: Cambridge University Press)

Schelling, Thomas C. (1960), The strategy of conflict (Cambridge, MA: Harvard University Press)

Schelling, Thomas C. (1966), Arms and influence (New Haven, CT: Yale University Press)

Robert Jervis, Robert (1989), The meaning of the nuclear revolution : statecraft and the prospect of Armageddon (Ithaca, NY: Cornell University Press)

Kathleen Bailey, Kathleen (1991), Doomsday weapons in the hands of many : the arms control challenge of the '90s (Urbana, IL: University of Illinois Press)

Falkenrath, Richard A., Robert D. Newman, and Bradley A. Thayer (1998), America's Achilles' heel : nuclear, biological, and chemical terrorism and covert attack (Cambridge, MA: MIT Press)

Lederberg, Joshua Lederberg (ed.) (1999), Biological weapons : limiting the threat (Cambridge, MA: MIT Press).

Utgoff, Victor A. (ed.) (2000), The coming crisis : nuclear proliferation, U.S. interests, and world order (Cambridge, MA: MIT Press)

Jeffrey A. Larsen (ed) Arms control : cooperative security in a changing environment , Lynne Rienner Publishers, 2002.

Stuart Croft. Strategies of arms control : a history and typology , Manchester University Press. 1996.

John Steinbrunner. ‘Biological Weapons: a plague upon all houses’, Foreign policy. , issue 109, Winter 1997/98.

Joshua Lederberg (1999) [foreword by William S. Cohen]. Biological weapons : limiting the threat , MIT Press, c1999.

Malcolm Dando (2002) Preventing biological warfare : the failure of American leadership , Palgrave.

Joseph Cirincione et al (2002) Deadly Arsenals : Tracking Weapons of Mass Destruction, Carnegie Endowment for International Peace. (the 2nd edition of this book is - Deadly arsenals : nuclear, biological, and chemical threats)

Top of page

Week Six Beginning 5/11/18

Reading and Essay Preparation Week. Extra consultation hours this week.

Top of page

Week Seven beginning 12/11/18

Lecture: Gender and Security

Seminar: Going beyond the state, why gender matters.

Discussion topics:

  1. Why is gender important for the study of security?
  2. What are the limitations of standard theories of security in regards to gender?
  3. How does gender intersect with development?
  4. How do state policies on abortion and contraception affect women's security?

Required reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 11

Further reading:

Anderlini, Sanam (2007), Women building peace : what they do, why it matters (Boulder, CO: Lynne Rienner)

Enloe, Cynthia (1989), Bananas, beaches & bases : making feminist sense of international politics (London,Pinter)

Enloe, Cynthia (2000), Maneuvers : the international politics of militarizing women's lives , (Berkeley CA: University of Californian Press)

Giles, Wenona and Jennifer Hyndman (eds.)(2004), Sites of violence : gender and conflict zones (Berkley, CA:University of California Press)

Peterson, V. Spike and Anne Sisson Runyan (1999), Global Gender Issues (Boulder, CO: Westview Press)

Steans, Jill (2006), Gender and international relations : issues, debates and future directions (Cambridge,Polity Press)

Tickner, Ann(1992), Gender in international relations : feminist perspectives on achieving global security , (New York, Columbia University Press)

Van Crevald, Martin (2001), Men, Women and War , (London:Cassell and Co.)

Whitworth, Sandra, (2004), Men, militarism, and UN peacekeeping : a gendered analysis (Boulder CO: Lynne Rienner)

Robert O. Keohane, “International Relations Theory: Contributions of a Feminist Standpoint.” Millennium. 18:2 (Summer 1989), pp. 245-253.

Cynthia Weber, “Good Girls, Little Girls, and Bad Girls: Male Paranoia in Robert Keohane’s Critique of Feminist International Relations.” Millennium. 23:2 (Summer 1994), pp. 337-349.

Peter Beckman and Francine D’Amico, eds., Women, gender, and world politics : perspectives, policies, and prospects (1994). 

Hudson, Heidi, 2005. ‘“Doing” Security as Though Humans Matter: A Feminist Perspective on Gender and the Politics of Human Security’, Security dialogue. 36(2):155–174.

Top of page

Week Eight beginning 19/11/18

Lecture: Environmental Change

Seminar: Environmental Security

Discussion Topics:

1. In what ways can climate change be considered to be a security threat?

2. As a non-traditional security challenge, how does environmental degradation challenge the realist model of international security?

3. If climate change has been securitised, is that likely to strengthen attempts to protect the environment?

Required Reading

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 16

Further Reading

Deudney, D. (1990), The Case Against Linking Environmental Degradation and National Security, Millennium. ,19(3): 461-476

Barnett, J. (2001), The meaning of environmental security : environmental politics and policy in the new security era , (London: Zed Books)

Conka, K and G. Dabelko, G. (eds.) (2002), Environmental peacemaking , (Baltimore: Johns Hopkins)

Deudney, D. And R. Matthew (eds.) (1999), Contested grounds : security and conflict in the new environmental politics , (Albany: State University of New York Press).

Diehl, P. And N.P. Gleditsch (eds.) (2001), Environmental conflict , (Boulder, CO: Westview Press)

Elliott, L. (1998), The Global Politics of the Environment , (London, Macmillan)

Homer-Dixon, T. (1999), Environment, Scarcity and Violence , (Princeton: Princeton University Press)

Peluso, N. And Watts, M. (eds.) (2001), Violent environments , (Ithaca, NY: Cornell University Press)

WECD (World Commission on Environment and Development) (1987), Our common future , (Oxford: Oxford University Press)

Dodds, Felix and Tim Pippard (eds.) (2005), Human and environmental security : an agenda for change (London: Earthscan).

Kahl, Colin (2006), States, scarcity, and civil strife in the developing world (Princeton, NJ: Princeton University Press)

Klare, Michael (2004), Blood and oil : the dangers and consequences of America's growing petroleum dependency , (New York: Metropolitan)

McNeill, J.R. (2000), Something New Under the Sun: An Environmental History of the Twentieth Century World , (New York: Norton)

Pirages, D.C. and T.M. DeGeest (2004), Ecological Security: An Evolutionary Perspective on Globalization (Lanham, MD: Rowman and Littlefield)

Khagram, Sanjeev & Saleem Ali, 2006. ‘Environment and Security’, Annual review of environment and resources. 31: 395–411

Homer-Dixon, Thomas, 1991. ‘On the Threshold: Environmental Changes as Causes of Acute Conflict, ‘ International security. 16(2): 76–116

Urdal, Henrik, 2005. ‘People vs Malthus: Population Pressure, Environmental Degradation and Armed Conflict Revisited’, Journal of peace research. 42(4): 417–434

Li, Quan & Rafael Reuveny, 2006. ‘Democracy and Environmental Degradation’, International studies quarterly. 50(4): 935–956

Ross, Michael L., 2004b. ‘What Do We Know About Natural Resources and Civil War? ’, Journal of peace research. 41(3): 337–356

Gleditsch, Nils Petter; Kathryn Furlong, Håvard Hegre, Bethany Lacina & Taylor Owen, 2006. ‘Conflicts over Shared Rivers: Resource Scarcity or Fuzzy Boundaries? ’, Political geography. 25(4): 361–382

Barnett, Jon & Neil Adger, 2005. 'Security and Climate Change: Towards an Improved Understanding’, paper presented to the international workshop on human security and climate change, Holmen nr. Oslo, 21–23 June - Available online:

Beck, U. (1995) Ecological politics in an age of risk (Cambridge : Polity Press)

Dalby, S. (2009) Security and environmental change (Cambridge: Polity Press)

Dalby, S. (2002) ‘Security and Ecology in the Age of Globalization’ Security and ecology in the age of globalization Issue 8 (Woodrow Wilson Centre), Summer, 2002, pp. 95-108; & (Columbia International Affairs Online, 2002)

Dalby, S. (1992) ‘Security, Modernity, Ecology: The Dilemmas of Post-Cold War Security Discourse’ Alternatives : global, local, political. . 17, 1: 95-134. - Available online:

Dyer, H.C. (2001) ‘Environmental Security and International Relations: The Case for Enclosure’, Review of international studies. . (Vol 27, No 3, July 2001)

Floyd, R. (2010) ‘ Security and the environment : securitisation theory and US environmental security policy ' (Cambridge: Cambridge University Press)

Homer-Dixon, T. (1991) ‘On the Threshold: Environmental Changes as Causes of Acute Conflict’ International security. . (16, 2) pp. 76-116.

Kakonen, J (ed) (1994) Green security or militarized environment (London: Dartmouth).

Lowi, M.R. and B.R. Shaw (2000) Environment and security : discourses and practices (London: Macmillan) Lowi, M. (1993) ‘Bridging the Divide: Transboundary Resource Disputes and the Case of West Bank Water’, International security. . 18, 1: 113--138.

Myers, N., (1993) Ultimate security : the environmental basis of political stability (New York: W. W. Norton)

Page, E.A. and M. Redclift (2002) Human security and the environment : international comparisons (Cheltenham: Edward Elgar)

Environmental Change and Security Project (ECSP) (Woodrow Wilson International Center - fully searchable archive of ECSP publications)

Top of page

Week Nine beginning 26/11/18

Lecture: Health and Security

Seminar: How do we manage global health security?

Discussion Topics:

1. What is a bigger risk to British national security: terrorism, nuclear weapons, global pandemics or Burgers?

2. How about in Sierra Leone and Afghanistan?

3. How can realism inform our understanding of health security?

4.What policy solutions are there? What are their limitations?

Required Reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 25

Further Reading:

Elbe, Stefan (2003), Strategic implications of HIV/AIDS , (International Institute for Strategic Studies, Oxford:Oxford University Press)

Maclean, S. (2008) ‘Microbes, Mad Cows and Militaries: Exploring the Links Between Health and Security’, Security Dialogue 39(5): 475–494.

McInnes, Colin, 2005. Health and foreign policy in the UK : the experience since 1997 .London: Nuffield Trust.

McInnes, Colin & Kelly Lee, 2006. ‘Health, Security and Foreign Policy’, Review of international studies. 32(1): 5–23.

Brower, Jennifer & Peter Chalk, 2003. The global threat of new and reemerging infectious diseases : reconciling U.S. national security and public health policy . Santa Monica, CA: RAND.

Callabero-Anthony, Mely, 2006. ‘Combating Infectious Diseases in East Asia: Securitization and Global Public Goods for Health and Human Security’, Journal of international affairs. 59(2): 105–127.

Elbe, Stefan, 2006. ‘Should HIV/AIDS Be Securitized? The Ethical Dilemma of Linking HIV/AIDS and Security’, International studies quarterly. 50(1): 119–144.

Feldbaum, Harley; Preeti Patel, Egbert Sondorp & Kelley Lee, 2006. ‘Global Health and National Security: The Need for Critical Engagement’, Medicine, conflict and survival. 22(3): 192–198.

Garrett, Laurie, 2005. ‘The Lessons of HIV/AIDS’, Foreign affairs. 84(4): 54–61.

Peterson, Susan, 2002/03. ‘Epidemic Disease and National Security’, Security Studies 12(2): 43–81.

Paris, Roland, 2001. ‘Human Security: Paradigm Shift or Hot Air? ’, International security. 26(2): 87–102.

Price-Smith, Andrew T., 2002. The health of nations : infectious disease, environmental change, and their effects on national security and development . Cambridge, MA: MIT Press.

Singer, Peter, 2002. ‘AIDS and International Security’, Survival. 44(1): 145–158.

Lee, Kelly (2003), Globalization and Health , (Basingstoke: Palgrave Macmillan)

Top of page

Week Ten beginning 3/12/18

Lecture: Cyber Security

Seminar: How do we maintain security in Cyber-Space?

Seminar topics:

1. Is cyber warfare a major security threat?

2. Is election intereference a type of cyber-war? Is it

3. How does deterrence work in cyberspace?

4. How relevant is military power in today’s world?

Required Reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 27

Further Reading:

Whyte, C. (2018). Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research. International studies review. ISSN: 1079-1760; 1521-9488.  

Rid, T. (2012). Cyber war will not take place. The journal of strategic studies. ISSN: 0140-2390, 35(1), 5-32.  

Stone, John. "Cyber war will take place!." The journal of strategic studies. ISSN: 0140-2390 36, no. 1 (2013): 101-108.  

Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 53(1), 23-40.  

Gompert, D. C., & Libicki, M. (2015). Waging cyber war the american way. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 57(4), 7-28.

Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International security. ISSN: 0162-2889, 38(2), 41-73.

Cavaiola, L. J., Gompert, D. C., & Libicki, M. (2015). Cyber house rules: On war, retaliation and escalation. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 57(1), 81-104.  

Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda's Catalyst for Global Terror. Studies in conflict and terrorism. ISSN: 1057-610X; 1521-0731, 40(1), 10-23.  

Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists. ISSN: 0096-3402, 72(5), 284-291.  

Maness, R. C., & Valeriano, B. (2018). International cyber conflict and national security. In The Oxford handbook of U.S. national security ISBN: 9780190680015 (hardcover); 0190680016 (hardcover).  

Clarke, R. A. (2016). The Risk of Cyber War and Cyber Terrorism. Journal of international affairs. ISSN: 0022-197X, 70(1), 179. 

Lindsay, J. R. (2015). The impact of China on cybersecurity: Fiction and friction. International security. ISSN: 0162-2889, 39(3), 7-47.

Lindsay, J. R. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53-67.

Adamson, F. B. (2016). Spaces of global security: Beyond methodological nationalism. Journal of global security studies. ISSN: 2057-3170; 2057-3189, 1(1), 19-35.

Slayton, R. (2017). What is the cyber offense-defense balance? Conceptions, causes, and assessment. International security. ISSN: 0162-2889, 41(3), 72-109.  

Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cyber-security. European Journal of International Security ISSN: 2057-5637, 1(2), 176-198.  

Zeitzoff, T. (2017). How social media is changing conflict. The journal of conflict resolution. ISSN: 0022-0027, 61(9), 1970-1991.  


Top of page

Week Eleven beginning 10/12/18

Lecture: The Future of Security Studies

Seminar: Is everything security?

Discussion Topics:

1. Is Security Studies a (sub)field or a (sub)discipline?

2. Is interdisciplinarity key?

3. What are the most important security issues we face today? Why?

4.Should academics work closely with policy-makers?

5.How is the evolving security agenda?

Required Reading:

Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 28

Strategic Defence and Security Review (The Cabinet Office, 2010),

The national security strategy – A strong Britain in an age of insecurity, (The Cabinet Office, 2010),

This list was last updated on 26/09/2018