Dr Jack Holland
Tutor information is taken from the Module Catalogue
- Week One beginning 1/10/18
- Week Two beginning 8/10/18
- Week Three beginning 15/10/18
- Week Four beginning 22/10/18
- Week Five beginning 29 /10/18
- Week Six Beginning 5/11/18
- Week Seven beginning 12/11/18
- Week Eight beginning 19/11/18
- Week Nine beginning 26/11/18
- Week Ten beginning 3/12/18
- Week Eleven beginning 10/12/18
School of Politics and International Studies
Semester One 2018
Taught By: Professor Graeme Davies, Office: 14.06 Phone: 0113 343 9012
The aim of this module is to provide an introduction to debates on security in international relations. The first objective is to outline what we mean by security and to discuss the limitations of its different conceptions. The second objective is to analyse the different theoretical schools that examine security, starting with realism and then move onto the newer theoretical approaches such as the Copenhagen school. The third objective is to examine contemporary security threats, what they mean for the analysis of international politics and how the earlier theoretical models can be applied to understand these issues. The module is in two parts. The first part examines and debates a range of competing theories and conceptualisations of security. This part explores the different meanings of the term ‘security’ and whose security we can talk about. The second objective is to examines contemporary security threats with implications for international politics. These will include inter and intra-state conflict, terrorism, organised crime, health and the environment.
On completion of this module, students should be able to:
1. Demonstrate an ability to critically evaluate the principal debates about conceptualising security
2. Explain the strengths and weaknesses of competing approaches to security
3. Assess the utility of theory in understanding security
4. Evaluate the security challenges facing policymakers
5. Critically evaluate the reasons for labelling an issue a security threat
6. Discuss the dangers of labelling an issue a security threat
7. Analyze current and potential responses to current security threats
8. Critically re-evaluate the direction of security studies
Part One: Theories and Concepts
1. Traditional Approaches to Security: Realism, Strategy and Security Studies
2. New Security Challenges
3. Critical Security Studies
4. Terrorism and Counter-Terrorism
Part Two: Threats and Responses
6. Reading Week
7. Gender and Security
8. Environmental Change
10. Cyber Security
11. Conclusion: The Future of Security Studies
You will complete one 2500 word essay which counts towards 50% of the assessment.
There is also a formative feedback on the first 500 words of the essay you intend to answer.
See the POLIS Assessment Guide for the handing in dates for this module.
The weekly lectures introduce you to the topics identified on the syllabus. Students are required to read core and additional readings listed in the reading list in preparation for seminar discussion and essays.
Attendance at lectures and seminars is compulsory.
Week One beginning 1/10/18
Lecture: Traditional Approaches to Security: Realism, Strategy and Security Studies
1. How important is the military sector of security? Does it remain relevant?
2. What are the most important security concerns for states?
3. What is the Security Dilemma? How can it be overcome?
4. What is the nature of power in international politics?
5. Which state has more power- the USA or China?
Alan Collins (2015), Contemporary security studies (Oxford: OUP)- Chapters 1,2,3
Barry Buzan and Lene Hansen (2009), The evolution of international security studies, (Cambridge University Press), particularly the Introduction and Chapters 1 and 2
Miller, Steven E. (2010), ‘The Hegemonic Illusion? Traditional Strategic Studies in Context’, Security Dialogue, 41: 6
Stephen M. Walt, ‘The Renaissance of Security Studies’, International studies quarterly., 35:2, 1991
Richard Betts, ‘Should Strategic Studies Survive? ’, World politics., 50:1, 1997
John Mearsheimer, Richard Little, Christopher Hill, Chris Brown and Ken Booth (2005), ‘Roundtable: the Battle Rages On’, International relations., 19 (3), pp. 337-360.
John Baylis, James Wirtz, Eliot Cohen, Colin S. Gray (eds) (2006), Strategy in the contemporary world : an introduction to strategic studies, (Oxford: Oxford University Press), Introduction and Chapters 13 and 14
Daniel Drezner (2011) Theories of international politics and zombies (Princeton University Press)
Baldwin, D. (1997), “The Concept of Security”, Review of international studies. 23(1): 5-26
Buzan, Barry, People, States and Fear , Second Edition, (Hemel Hempstead: Harvester Wheatsheaf, 1991)
Gilpin, R (1981), War and change in world politics (New York: Cambridge University Press)
Mearsheimer, J, J. (2001), The tragedy of great power politics (New York: W.W. Norton)
Paul T.V., Wirtz, J., and Fortmann, M. (eds.) (2004), Balance of power : theory and practice in the 21st century (Stanford: Stanford University Press)
Vasquez J, and C Elman (eds.) (2003), Realism and the balancing of power : a new debate. (Upper Saddle River, NJ)
Morgenthau, H (1985), Politics Among Nations: The Struggle for Power and Peace (6th edition) (New York: McGraw-Hill)
Schweller, R.L. (1998), Deadly imbalances : tripolarity and Hitler's strategy of world conquest (New York: Columbia University Press)
Walt S.M. (1987), The origins of alliances (Ithaca, NY: Cornell University Press)
Waltz K.N. (1979) Theory of International Politics (Reading, MA: Addison Wesley)
Bull, H (1977), The Anarchical Society: A Study of Order in World Politics (New York, Columbia University Press)
Organski, A.F.K. and J Kugler (1980), The war ledger (Chicago, University of Chicago Press)
Keohane R.O (1984), After Hegemony (Princeton, Princeton University Press)
Doyle M (1997), Ways of war and peace : realism, liberalism, and socialism, (New York, W.W. Norton)
Week Two beginning 8/10/18
Lecture: New Security Challenges
Seminar: How broad should the study of security be?
What does the widening (and deepening) of security studies involve?
Should security be broadened beyond military threats to the state?
Alan Collins (2015), Contemporary security studies (Oxford: OUP)- Chapters 10
Krause, K. and M. C. Williams, ‘Broadening the Agenda of Security Studies: Politics and Methods’, Mershon international studies review., 40:6 (1996), 229-54.
Mathews, J. T., ‘Redefining Security’, Foreign affairs.ISSN: 0015-7120, 68:2 (1989), 162-77.
UNDP, Human Development Report 1994 (UNDP, 1995). Chapter 2: New Dimensions of Human Security. Available at: http://hdr.undp.org/reports/global/1994/en/ .
Sheehan, M., International security : an analytical surveyISBN: 1588262987 (pbk. : alk. paper); 1588262731 (hardcover : alk. paper) (Lynne Rienner, 2005). Ch 4. OCR REQUESTED BY LIBRARY (fad 16/10/2018)
Bilgin, P., ‘Reflection, Evaluation, Integration: Individual and Societal Dimensions of Security’, International studies review.ISSN: 1079-1760; 1521-9488, 5:2 (2003), 203-22.
Smith, S., ‘The Increasing Insecurity of Security Studies’, Contemporary Security. Policy, 20:3 (1999), 72-101. ‘e’ only Also available in Croft and Terriff (eds.), Critical Reflections on Security and Change.
Smith, S., ‘The contested concept of security’ in Booth (ed.), Critical security studies and world politicsISBN: 1555878261 (pbk. : alk. paper); 1555878253 (Lynne Rienner, 2005).
Ullman, R. H., ‘Redefining Security’, International security.ISSN: 0162-2889, 8:1 (1983), 129-53.
Owen, T. (ed.), Special Section on Human Security, Security dialogue.ISSN: 0967-0106, 35:3 (2004), 345-87.
Paris, R., ‘Human Security: Paradigm Shift or Hot Air? ’, International security.ISSN: 0162-2889, 26:2 (2001), 87-102.
Suhrke, A., ‘Human Security and the Interests of States" Security dialogue.ISSN: 0967-0106, Vol. 30 (No. 3): 1999, pp. 265-76.
Mihalka, M., ‘Cooperative Security in the 21st Century’, Partnership for Peace Consortium Quarterly Journal, Winter (2005). Available at:
Hampson, F., ‘Human Security’, in Williams (ed.), Security Studies (Routledge: 2008).
Week Three beginning 15/10/18
Lecture: Critical Security Studies
Seminar: What’s so critical about Critical Security Studies?
1. What does the (widening and) deepening of security studies involve?
2. Is security socially constructed? (Constructivism)
3. What is securitization? (Copenhagen School)
4. Is security emancipation? (Welsh School)
Alan Collins (2015), Contemporary security studies (Oxford: OUP)-chapter 7,8
Newman, Edward, 'New Forms of Security and the Challenge for Human Security’ in Mark Beeson and Nick Bisley eds., Issues in 21st century world politics, 2nd Edition, Palgrave, 2013 .
Agamben, Giorgio, 1995. Homo Sacer : sovereign power and bare life. Stanford: Stanford University Press.
Agamben, Giorgio, 2005. State of Exception. Chicago: University of Chicago Press.
Campbell, David, 1998. Writing security : United States foreign policy and the politics of identity. Minneapolis: University of Minnesota Press.
Dillon, Michael, 2007. ‘Governing Terror: The State of Emergency of Bio-Political Emergence’. International Political Sociology 1(1)
Dillon, Michael & Neal, Andrew [eds.] 2008. Foucault on politics, security and war. London: Palgrave.
Dillon, Michael & Reid, Julian, 2009. The liberal way of war : killing to make life live. London: Routledge.
Duffield, Mark, 2007. Development, security and unending war : governing the world of peoples. Cambridge: Polity Press.
Duffield, Mark, 2008. ‘Global Civil War: The Non-Insured, International Containment & Post-interventionary Society’, Journal of refugee studies. 21 (2): 145-165
Evans, Brad, 2010. 'Foucault's Legacy: Security, War and Violence in the 21st Century'. Security Dialogue 41(4): 1-21
Foucault, Michel, 2003. Society must be defended : lectures at the Collège de France, 1975-76. New York: Picador.
Foucault, Michel, 2007. Security, territory, population : lectures at the Collège de France, 1977-1978. New York: Palgrave Macmillan.
Krause, K and M.C. Williams, (1997), Critical security studies : concepts and cases (Minneapolis: University of Minnesota Press)
Weldes, J, M. Laffey, H Gusterson and Duvall, R (eds.) (1999), Cultures of insecurity : states, communities, and the production of danger, (Minneapolis: University of Minnesota Press)
Krause, K (1998), ‘Critical Theory and Security Studies: The Research Programme of “Critical Security Studies”’, Cooperation and conflict 33/3:298-333.
Buzan, B (1991), People, states, and fear : an agenda for international security studies in the post-cold war era (2nd edn, Boulder, CO:Lynne Rienner)
Barry B, O Waever & J de Wilde (1998), Security : a new framework for analysis (London: Lynne Rienner)
Hansen, L (2000), ‘The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School’, Millennium. 29/2:285-306
Booth, K (ed.) (2005), Critical security studies and world politics, (Boulder, CO: Lynne Rienner)
Booth, K (2005), Theory of world security (Cambridge, Cambridge University Press)
Jones, R. W. (1999), Security, strategy, and critical theory, (Boulder, CO: Lynne Rienner)
Klein, Bradley (1994), Strategic studies and world order, (Cambridge: Cambridge University Press)
Week Four beginning 22/10/18
Lecture: Terrorism and Counter-Terrorism
Seminar: Terrorism- Causes and Consequences
1. Should I be more scared of my toilet than a terrorist?
2. What role does the media play in international and domestic terrorism?
3. Will terrorists get a nuclear bomb?
4. Should terrorism be treated as a war or a crime?
5. What should the balance be between fighting terrorism and protecting civil liberties?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) chapter 21
John Mueller, (2005), Simplicity and Spook: Terrorism and the Dynamics of Threat Exaggeration. International studies perspectives. , 6: 208–234
John Mueller, (2005).Six Rather Unusual Propositions about Terrorism, Terrorism and political violence. 17, no. 4 (Winter 2005): 487–505.
Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 1998)
Russell Howard and Reid Sawyer (eds.), Terrorism and counterterrorism : understanding the new security environment : readings & interpretations , Revised and Updated edition (Guilford, CT: McGraw Hill, 2004)
Walter Reich (ed.), Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind (The Woodrow Wilson Center Press, 1998)
Grant Wardlaw, Political terrorism : theory, tactics, and counter-measures (Cambridge: Cambridge University Press, 1989).
Alexander George (ed.) (1991). Western state terrorism (Cambridge, Polity Press).
Does Al Qaeda Continue to Pose a Serious International Threat?
YES: The Enduring al-Qa’ida Threat: A Network Perspective, Jeffrey Cozzens and Magnus Ranstorp NO: Al Qaeda: A Diminishing Threat, Lee Jarvis IN Richard Jackson and Samuel Justin Sinclair (eds.). Contemporary debates on terrorism , Abingdon: Routledge 2012
Hoffman, Bruce, (2009), ‘A Counterterrorism Strategy for the Obama Administration’, Terrorism and political violence. , 21(3), pp. 359-377.
McCrisken, Trevor (2013), ‘Obama’s Drone War, Survival. , 55(2), pp 97-122.
Cronin, Audrey (2009), How terrorism ends : understanding the decline and demise of terrorist campaigns , (Princeton University Press, Cambridge)
Jackson, Richard et al, (2011), Terrorism : a critical introduction , (Basingstoke, Palgrave Macmillan), chapter 6.
Audrey Kurth Cronin and James M. Ludes (eds.) (2004). Attacking terrorism : elements of a grand strategy (Washington, DC; Georgetown University Press, 2004)
Philip B. Heymann and Juliette N. Kayyem (2005). Protecting liberty in an age of terror (Cambridge, MA: MIT Press).
Paul R. Pillar (2003). Terrorism and U.S. foreign policy (Washington, DC: Brookings Institution Press).
Horgan, John (2005). The psychology of terrorism (London: Routledge)
Richard A. Posner (2005). Preventing surprise attacks : intelligence reform in the wake of 9/11 (Lanham, MD: Rowman and Littlefield).
The U.S. Army/Marine Corps Counterinsurgency Field Manual (Chicago, IL: University of Chicago Press).
Crenshaw, M., 1995. Terrorism in context . Pennsylvania State University Press, University Park, PA
Tilly Charles (2003), The politics of collective violence . Cambridge: Cambridge University Press.
Wievorka Michel (1988), The making of terrorism , Chicago: University of Chicago Press
Bigo Didier, Tsoukala Anastassia (eds.) (2008), Terror, insecurity and liberty : illiberal practices of liberal regimes after 9/11 , London: Routledge
Della Porta Donatella (ed.) (1992), Social movements and violence : participation in underground organizations . Greenwich: JAI Press.
Jackson Richard (2005), Writing the war on terrorism : language, politics and counter-terrorism , Manchester: Manchester University Press
Week Five beginning 29 /10/18
Lecture: Weapons of Mass Destruction
Seminar: Are WMD all that bad?
1. Would the world be a safer place if all states had nuclear weapons?
2. Why would Iran want a nuclear weapon? Should we be scared if they get one?
3. Should military action or negotiations be used to counter the spread of WMD? Why?
4. Is today’s nuclear weapons environment more or less dangerous than that of the Cold War?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) chapter 20
Freedman, Lawrence (2003), The Evolution of Nuclear Strategy , (New York: Palgrave Macmillan)
Schell, Jonathan (1982), The fate of the earth , (New York: Knopf)
Sagan, Scott D. And Kenneth Waltz (2002), The spread of nuclear weapons : a debate renewed : with new sections on India and Pakistan, terrorism, and missile defense , (New York: W.W. Norton and Co).
Croddy, Eric A. And Wirtz, James J. (eds.) (2005), Weapons of mass destruction : an encyclopedia of worldwide policy, technology, and history , 2 vols. (Santa Barbara, CA: ABC-Clio)
Mandelbaum, Michael (1979), The nuclear question : the United States and nuclear weapons, 1946-1976 (New York: Cambridge University Press)
Mandelbaum, Michael (1981), The nuclear revolution : international politics before and after Hiroshima (New York: Cambridge University Press)
Schelling, Thomas C. (1960), The strategy of conflict (Cambridge, MA: Harvard University Press)
Schelling, Thomas C. (1966), Arms and influence (New Haven, CT: Yale University Press)
Robert Jervis, Robert (1989), The meaning of the nuclear revolution : statecraft and the prospect of Armageddon (Ithaca, NY: Cornell University Press)
Kathleen Bailey, Kathleen (1991), Doomsday weapons in the hands of many : the arms control challenge of the '90s (Urbana, IL: University of Illinois Press)
Falkenrath, Richard A., Robert D. Newman, and Bradley A. Thayer (1998), America's Achilles' heel : nuclear, biological, and chemical terrorism and covert attack (Cambridge, MA: MIT Press)
Lederberg, Joshua Lederberg (ed.) (1999), Biological weapons : limiting the threat (Cambridge, MA: MIT Press).
Utgoff, Victor A. (ed.) (2000), The coming crisis : nuclear proliferation, U.S. interests, and world order (Cambridge, MA: MIT Press)
Jeffrey A. Larsen (ed) Arms control : cooperative security in a changing environment , Lynne Rienner Publishers, 2002.
Stuart Croft. Strategies of arms control : a history and typology , Manchester University Press. 1996.
John Steinbrunner. ‘Biological Weapons: a plague upon all houses’, Foreign policy. , issue 109, Winter 1997/98.
Joshua Lederberg (1999) [foreword by William S. Cohen]. Biological weapons : limiting the threat , MIT Press, c1999.
Malcolm Dando (2002) Preventing biological warfare : the failure of American leadership , Palgrave.
Joseph Cirincione et al (2002) Deadly Arsenals : Tracking Weapons of Mass Destruction, Carnegie Endowment for International Peace. (the 2nd edition of this book is - Deadly arsenals : nuclear, biological, and chemical threats)
Week Six Beginning 5/11/18
Reading and Essay Preparation Week. Extra consultation hours this week.
Week Seven beginning 12/11/18
Lecture: Gender and Security
Seminar: Going beyond the state, why gender matters.
- Why is gender important for the study of security?
- What are the limitations of standard theories of security in regards to gender?
- How does gender intersect with development?
- How do state policies on abortion and contraception affect women's security?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 11
Anderlini, Sanam (2007), Women building peace : what they do, why it matters (Boulder, CO: Lynne Rienner)
Enloe, Cynthia (1989), Bananas, beaches & bases : making feminist sense of international politics (London,Pinter)
Enloe, Cynthia (2000), Maneuvers : the international politics of militarizing women's lives , (Berkeley CA: University of Californian Press)
Giles, Wenona and Jennifer Hyndman (eds.)(2004), Sites of violence : gender and conflict zones (Berkley, CA:University of California Press)
Peterson, V. Spike and Anne Sisson Runyan (1999), Global Gender Issues (Boulder, CO: Westview Press)
Steans, Jill (2006), Gender and international relations : issues, debates and future directions (Cambridge,Polity Press)
Tickner, Ann(1992), Gender in international relations : feminist perspectives on achieving global security , (New York, Columbia University Press)
Van Crevald, Martin (2001), Men, Women and War , (London:Cassell and Co.)
Whitworth, Sandra, (2004), Men, militarism, and UN peacekeeping : a gendered analysis (Boulder CO: Lynne Rienner)
Robert O. Keohane, “International Relations Theory: Contributions of a Feminist Standpoint.” Millennium. 18:2 (Summer 1989), pp. 245-253.
Cynthia Weber, “Good Girls, Little Girls, and Bad Girls: Male Paranoia in Robert Keohane’s Critique of Feminist International Relations.” Millennium. 23:2 (Summer 1994), pp. 337-349.
Peter Beckman and Francine D’Amico, eds., Women, gender, and world politics : perspectives, policies, and prospects (1994).
Hudson, Heidi, 2005. ‘“Doing” Security as Though Humans Matter: A Feminist Perspective on Gender and the Politics of Human Security’, Security dialogue. 36(2):155–174.
Week Eight beginning 19/11/18
Lecture: Environmental Change
Seminar: Environmental Security
1. In what ways can climate change be considered to be a security threat?
2. As a non-traditional security challenge, how does environmental degradation challenge the realist model of international security?
3. If climate change has been securitised, is that likely to strengthen attempts to protect the environment?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 16
Deudney, D. (1990), The Case Against Linking Environmental Degradation and National Security, Millennium. ,19(3): 461-476
Barnett, J. (2001), The meaning of environmental security : environmental politics and policy in the new security era , (London: Zed Books)
Conka, K and G. Dabelko, G. (eds.) (2002), Environmental peacemaking , (Baltimore: Johns Hopkins)
Deudney, D. And R. Matthew (eds.) (1999), Contested grounds : security and conflict in the new environmental politics , (Albany: State University of New York Press).
Diehl, P. And N.P. Gleditsch (eds.) (2001), Environmental conflict , (Boulder, CO: Westview Press)
Elliott, L. (1998), The Global Politics of the Environment , (London, Macmillan)
Homer-Dixon, T. (1999), Environment, Scarcity and Violence , (Princeton: Princeton University Press)
Peluso, N. And Watts, M. (eds.) (2001), Violent environments , (Ithaca, NY: Cornell University Press)
WECD (World Commission on Environment and Development) (1987), Our common future , (Oxford: Oxford University Press)
Dodds, Felix and Tim Pippard (eds.) (2005), Human and environmental security : an agenda for change (London: Earthscan).
Kahl, Colin (2006), States, scarcity, and civil strife in the developing world (Princeton, NJ: Princeton University Press)
Klare, Michael (2004), Blood and oil : the dangers and consequences of America's growing petroleum dependency , (New York: Metropolitan)
McNeill, J.R. (2000), Something New Under the Sun: An Environmental History of the Twentieth Century World , (New York: Norton)
Pirages, D.C. and T.M. DeGeest (2004), Ecological Security: An Evolutionary Perspective on Globalization (Lanham, MD: Rowman and Littlefield)
Khagram, Sanjeev & Saleem Ali, 2006. ‘Environment and Security’, Annual review of environment and resources. 31: 395–411
Homer-Dixon, Thomas, 1991. ‘On the Threshold: Environmental Changes as Causes of Acute Conflict, ‘ International security. 16(2): 76–116
Urdal, Henrik, 2005. ‘People vs Malthus: Population Pressure, Environmental Degradation and Armed Conflict Revisited’, Journal of peace research. 42(4): 417–434
Li, Quan & Rafael Reuveny, 2006. ‘Democracy and Environmental Degradation’, International studies quarterly. 50(4): 935–956
Ross, Michael L., 2004b. ‘What Do We Know About Natural Resources and Civil War? ’, Journal of peace research. 41(3): 337–356
Gleditsch, Nils Petter; Kathryn Furlong, Håvard Hegre, Bethany Lacina & Taylor Owen, 2006. ‘Conflicts over Shared Rivers: Resource Scarcity or Fuzzy Boundaries? ’, Political geography. 25(4): 361–382
Barnett, Jon & Neil Adger, 2005. 'Security and Climate Change: Towards an Improved Understanding’, paper presented to the international workshop on human security and climate change, Holmen nr. Oslo, 21–23 June - Available online: https://www.researchgate.net/publication/228381383_Security_and_Climate_Change_Towards_an_Improved_Understanding
Beck, U. (1995) Ecological politics in an age of risk (Cambridge : Polity Press)
Dalby, S. (2009) Security and environmental change (Cambridge: Polity Press)
Dalby, S. (2002) ‘Security and Ecology in the Age of Globalization’ Security and ecology in the age of globalization Issue 8 (Woodrow Wilson Centre), Summer, 2002, pp. 95-108; & (Columbia International Affairs Online, 2002)
Dalby, S. (1992) ‘Security, Modernity, Ecology: The Dilemmas of Post-Cold War Security Discourse’ Alternatives : global, local, political. . 17, 1: 95-134. - Available online: http://journals.sagepub.com/doi/abs/10.1177/030437549201700104
Dyer, H.C. (2001) ‘Environmental Security and International Relations: The Case for Enclosure’, Review of international studies. . (Vol 27, No 3, July 2001)
Floyd, R. (2010) ‘ Security and the environment : securitisation theory and US environmental security policy ' (Cambridge: Cambridge University Press)
Homer-Dixon, T. (1991) ‘On the Threshold: Environmental Changes as Causes of Acute Conflict’ International security. . (16, 2) pp. 76-116.
Kakonen, J (ed) (1994) Green security or militarized environment (London: Dartmouth).
Lowi, M.R. and B.R. Shaw (2000) Environment and security : discourses and practices (London: Macmillan) Lowi, M. (1993) ‘Bridging the Divide: Transboundary Resource Disputes and the Case of West Bank Water’, International security. . 18, 1: 113--138.
Myers, N., (1993) Ultimate security : the environmental basis of political stability (New York: W. W. Norton)
Page, E.A. and M. Redclift (2002) Human security and the environment : international comparisons (Cheltenham: Edward Elgar)
Environmental Change and Security Project (ECSP) (Woodrow Wilson International Center - fully searchable archive of ECSP publications) www.wilsoncenter.org/ecsp
Week Nine beginning 26/11/18
Lecture: Health and Security
Seminar: How do we manage global health security?
1. What is a bigger risk to British national security: terrorism, nuclear weapons, global pandemics or Burgers?
2. How about in Sierra Leone and Afghanistan?
3. How can realism inform our understanding of health security?
4.What policy solutions are there? What are their limitations?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 25
Elbe, Stefan (2003), Strategic implications of HIV/AIDS , (International Institute for Strategic Studies, Oxford:Oxford University Press)
Maclean, S. (2008) ‘Microbes, Mad Cows and Militaries: Exploring the Links Between Health and Security’, Security Dialogue 39(5): 475–494.
McInnes, Colin, 2005. Health and foreign policy in the UK : the experience since 1997 .London: Nuffield Trust.
McInnes, Colin & Kelly Lee, 2006. ‘Health, Security and Foreign Policy’, Review of international studies. 32(1): 5–23.
Brower, Jennifer & Peter Chalk, 2003. The global threat of new and reemerging infectious diseases : reconciling U.S. national security and public health policy . Santa Monica, CA: RAND.
Callabero-Anthony, Mely, 2006. ‘Combating Infectious Diseases in East Asia: Securitization and Global Public Goods for Health and Human Security’, Journal of international affairs. 59(2): 105–127.
Elbe, Stefan, 2006. ‘Should HIV/AIDS Be Securitized? The Ethical Dilemma of Linking HIV/AIDS and Security’, International studies quarterly. 50(1): 119–144.
Feldbaum, Harley; Preeti Patel, Egbert Sondorp & Kelley Lee, 2006. ‘Global Health and National Security: The Need for Critical Engagement’, Medicine, conflict and survival. 22(3): 192–198.
Garrett, Laurie, 2005. ‘The Lessons of HIV/AIDS’, Foreign affairs. 84(4): 54–61.
Peterson, Susan, 2002/03. ‘Epidemic Disease and National Security’, Security Studies 12(2): 43–81.
Paris, Roland, 2001. ‘Human Security: Paradigm Shift or Hot Air? ’, International security. 26(2): 87–102.
Price-Smith, Andrew T., 2002. The health of nations : infectious disease, environmental change, and their effects on national security and development . Cambridge, MA: MIT Press.
Singer, Peter, 2002. ‘AIDS and International Security’, Survival. 44(1): 145–158.
Lee, Kelly (2003), Globalization and Health , (Basingstoke: Palgrave Macmillan)
Week Ten beginning 3/12/18
Lecture: Cyber Security
Seminar: How do we maintain security in Cyber-Space?
1. Is cyber warfare a major security threat?
2. Is election intereference a type of cyber-war? Is it
3. How does deterrence work in cyberspace?
4. How relevant is military power in today’s world?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 27
Whyte, C. (2018). Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research. International studies review. ISSN: 1079-1760; 1521-9488.
Rid, T. (2012). Cyber war will not take place. The journal of strategic studies. ISSN: 0140-2390, 35(1), 5-32.
Stone, John. "Cyber war will take place!." The journal of strategic studies. ISSN: 0140-2390 36, no. 1 (2013): 101-108.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 53(1), 23-40.
Gompert, D. C., & Libicki, M. (2015). Waging cyber war the american way. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 57(4), 7-28.
Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International security. ISSN: 0162-2889, 38(2), 41-73.
Cavaiola, L. J., Gompert, D. C., & Libicki, M. (2015). Cyber house rules: On war, retaliation and escalation. Survival : global politics and strategy. ISSN: 0039-6338; 1468-2699, 57(1), 81-104.
Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda's Catalyst for Global Terror. Studies in conflict and terrorism. ISSN: 1057-610X; 1521-0731, 40(1), 10-23.
Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists. ISSN: 0096-3402, 72(5), 284-291.
Maness, R. C., & Valeriano, B. (2018). International cyber conflict and national security. In The Oxford handbook of U.S. national security ISBN: 9780190680015 (hardcover); 0190680016 (hardcover).
Clarke, R. A. (2016). The Risk of Cyber War and Cyber Terrorism. Journal of international affairs. ISSN: 0022-197X, 70(1), 179.
Lindsay, J. R. (2015). The impact of China on cybersecurity: Fiction and friction. International security. ISSN: 0162-2889, 39(3), 7-47.
Lindsay, J. R. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53-67. http://www.infosecon.net/workshop/downloads/2015/pdf/Tipping_the_scales:_the_attribution_problem_and_the_feasibility_of_deterrence_against_cyberattack.pdf
Adamson, F. B. (2016). Spaces of global security: Beyond methodological nationalism. Journal of global security studies. ISSN: 2057-3170; 2057-3189, 1(1), 19-35.
Slayton, R. (2017). What is the cyber offense-defense balance? Conceptions, causes, and assessment. International security. ISSN: 0162-2889, 41(3), 72-109.
Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cyber-security. European Journal of International Security ISSN: 2057-5637, 1(2), 176-198.
Zeitzoff, T. (2017). How social media is changing conflict. The journal of conflict resolution. ISSN: 0022-0027, 61(9), 1970-1991.
Week Eleven beginning 10/12/18
Lecture: The Future of Security Studies
Seminar: Is everything security?
1. Is Security Studies a (sub)field or a (sub)discipline?
2. Is interdisciplinarity key?
3. What are the most important security issues we face today? Why?
4.Should academics work closely with policy-makers?
5.How is the evolving security agenda?
Alan Collins, Contemporary security studies (Oxford: OUP, 2015) Chapter 28
Strategic Defence and Security Review (The Cabinet Office, 2010),
The national security strategy – A strong Britain in an age of insecurity, (The Cabinet Office, 2010), https://www.gov.uk/government/publications/the-national-security-strategy-a-strong-britain-in-an-age-of-uncertainty
This list was last updated on 26/09/2018