Friday, 5 August 2011

COURSE STRUCTURE


National Security and International Relations

School of International Studies
Jawaharlal Nehru University

Monsoon Semester 2011
MA Optional Course
Course No: IS 557N

Happymon Jacob, Ph.D.    
Room - 110, SIS, JNU
Office Hours: By apt
nsir2011@gmail.com

Class Timings :

Wednesday 4:15pm - 5:45pm
Friday 1:30pm - 3:00pm



Course Syllabus

Content, Structure and Objectives
The aim of the course is to undertake and encourage critical engagements with the idea of security in general and the notion of national security in International Relations in particular. It does so by examining the concept of national security from historical, theoretical and critical perspectives even as it engages the various contemporary issues of the international system and the politics therein. This combination of historico-theoretical analysis and contemporary discourses on security will help the students in gaining a comprehensive understanding of the subject. I hope that the course will help the students make informed critiques of various issues confronting humanity today.

Course Requirements
The class will meet twice every week. Students are expected to be compulsorily present for the classes. The assignments include one book review two research papers and seminar presentations. While the final examination would account for 50% of the marks, internal assessment is going to take care of the rest: so you better come to the classes! 

All assignments are to be submitted both in hard copy as well as by email on specified dates failing which they won’t be considered for grades. Students must contact me prior to assignment due dates if they wish to request extensions which will be granted only in cases of emergency.

Grading
The break up of the internal assessment is as follows:


Two research papers of approx. 3000-3500 words  -  30%
Seminar Presentation  -  10 %
A Book Review of approx. 1000 words  - 10%


Research Papers
Research papers should be approximately 3500 words in length, typed, and double spaced using a 12 point font, and must have footnotes or endnotes and a bibliography. All direct quotations and paraphrases must be cited. For a discussion of research methods, see Stephen Van Evera, Guide to Methods for Students of Political Science. SIS Research Manual may be consulted to know more about referencing styles in research papers: http://www.jnu.ac.in/academics/schools/schoolofinternationalstudies/sis_research_manual.pdf.

Plagiarism
Plagiarism of any kind is to be avoided and the slightest hint of such behaviour will be dealt with sternly. Disciplinary measures will be initiated against students who are found engaging in such unfair and unethical practices.

Readings and Resources
Most of the required readings prescribed for the course would be available with the Teaching Assistant. You can collect them from him. In addition, we will try and get a course reading package ready. You would be able to purchase it from the photocopy shop located in the basement of SIS as soon as the course begins. Always bring the assigned readings for the class since we will often refer to specific sections in them. Needless to remind that students taking this course agree to come to class prepared to discuss the assigned reading.

Course Blog: You can access the course blog at

Facebook page: Attempts will be made to post updates relating to the course on the facebook as well.

Course Email id: nsir2011@gmail.com

Teaching Assistant for the Course: Mr. Ladhu R. Choudhary is the TA for this course. The TA will answer most of your emails queries, handover additional reading material, maintain the course blog, and attend, guide and participate in the tutorials and research paper presentations.




Readings and Topics

A. Historical and Conceptual Narratives

State Formation, Power, Legitimacy, Security 

  1. Charles Tilly, “War Making and State Making as Organized Crime”, inBringing the State Back In, Peter Evans, Dietrich Rueschemeyer, and Theda Skocpol (Eds.), Cambridge University Press, Cambridge, 1985

  1. Bryan Mabee, “Security Studies and the ‘Security State': Security Provision in Historical Context,” International Relations Vol. 17, No. 2, 2003: 135-151

  1. Barry Buzan and Lene Hansen, “The Key questions in International Security Studies: The state, politics and epistemology”, in The Evolution of International Security Studies, Cambridge University Press, 2009

  1. Edward A. Kolodziej, “The Foundations of Security studies: Hobbes, Clausewitz, and Thucydides”, in Security and International Relations, Cambridge University Press, 2005

  1. Harold D. Lasswell, “The Garrison Sate”, The American Journal of Sociology, Vol. 46, No. 4 (Jan., 1941), pp. 455-468

  1. Anthony Burke, “Aporias of Security: From Leviathan to the Security State” in Burke Beyond Security, Ethics and Violence, Routledge, 2007

  1. R.B.J. Walker, “Security, sovereignty, and the challenge of world politics” Alternatives 15(1990), pp. 3–27


Evolution of Security Studies   

  1. Gwyn Prins, “The Four-stroke Cycle in Security Studies” International Affairs, Vol. 74, No. 4, 1998: 781-808

  1. Barry Buzan and Lene Hansen, The Evolution of International Security Studies, Cambridge University Press, 2009, (Chaps. 4 & 5)

  1. Stephen M. Walt, “The Renaissance of Security Studies”, International Studies Quarterly, Vol. 35, No. 2: 211-239

  1. Bill Mcsweeney, “Early Stages of Development” in Security, Identity and Interests: A Sociology of International Relations, Cambridge University Press, 1999, (Chap. 2)

  1. Robert G. Patman, “Globalisation, the end of the Cold War, and the Doctrine of National Security” in Patman, Globalization and Conflict: National Security in a New Strategic Era, Routledge, 2006



B. Conceptual Background

National Interest
  1. Scott Burchill, “Origins and Antecedents”, in The National Interest in International Relations Theory, Palgrave, 2005

  1. Jutta Weldes, “Constructing national interests”, European Journal of International Relations, September 1996 vol. 2 no. 3


Security and Power

  1. E. H. Carr, The Twenty Years' Crisis, 1919-1939: An Introduction to the  Study of International Relations, Macmillan, London, 1939 (Chapters 1-6)

  1. Charles L Glaser, “Realists as Optimists: Cooperation as Self- Help”, International Security, Vol.19, No.3: 50-90

  1. Robert Jervis,“ Realism, Neoliberalism, and Cooperation: Understanding the Debate”, International Security, Vol.24, No.1: 42-63

  1. John Mearsheimer, The Tragedy of Great Power Politics, W.W. Norton, New York, 2001 (Chapters 1-2)

  1. Evan Braden Montgomery, “Breaking Out of the Security Dilemma Realism, Reassurance, and the Problem of Uncertainty”, International Security, Vol.31, No. 2: 151–185

  1. Randall L.  Schweller, “Bandwagoning for Profit: Bringing theRevisionist State Back in”, International Security, Vol.19, No.1: 72-107

  1. Jeffrey W. Taliaferro, (2000-2001), “Security Seeking under Anarchy: Defensive Realism Revisited”, International Security, Vol.25, No.3: 128-161

National Security

  1. Arnold Wolfers, “'National Security' as an Ambiguous Symbol,” in Discord and Collaboration: Essays on International Politics, Johns Hopkins University Press, 1962, (Chap. 10)

  1. Barry Buzan, People, states and fear: National Security Problem in International Relations, Hartnolls, Cornwall, 1991


Security Dilemma  

  1. Robert Jervis, “Cooperation Under the Security Dilemma”, World Politics, Vol.30, No.2: 167-214

  1. Ken Booth and Nicholas J. Wheeler, The Security Dilemma: Fear, Cooperation and Trust in World Politics, Palgrave, 2008, (Chap. 1 & 11)

Suggested Readings:

  1. Charles L. Glaser, “The Security Dilemma Revisited”, World Politics, Vol. 50, No. 1 (October 1997), pp. 171–201

  1. John H. Herz, “Idealist Internationalism and the Security Dilemma”, World Politics, Vol.2, No.2: 157–80

Strategy & Grand Strategy

  1. John Baylis and James J. Wirtz, “Introduction” in John Baylis, James Wirtz, Eliot Cohen and Colin Grey, Strategy in the Contemporary World: An Introduction to Strategic Studies, Oxford University Press, 2002.

  1. B. H. Liddell Hart, “The Theory of Strategy”, in Strategy: The Indirect Approach, Natraj Publishers ,Indian Edition, 2003 

  1. Thomas C. Schelling, “The Retarded Science of International Strategy”, inThe Strategy of Conflict, Harvard University Press, 1981


C. Theoretical Aspects

Realism, liberalism and National Security  

  1. Steve Smith, “The Increasing Insecurity of Security Studies: Conceptualizing Security in the Last Twenty Years” in Critical Reflection on Security and Change, Stuart Croft and Terry Terriff, Frank Cass, 2000

  1. Edward A. Kolodziej, “Realism, neorealism and liberal institutionalism” in Security and International Relations ,Cambridge University Press, 2005,

  1. Patrick M. Morgan, “Liberalist and Realist Security Studies at 2000: Two Decades of Progress” in Critical Reflection on Security and Change, Stuart Croftand Terry Terriff, Frank Cass, 2000

Constructivism and National Security  

  1. Ronald L. Jepperson, Alexander Wendt, and Peter J. Katzenstein, “Norms,  Identity, and Culture in National security”, in Peter J. Katzenstein (ed.), The      Culture of National Security: Norms and Identity in World Politics, Columbia      University Press, 1996

  1. Kowert, Paul and Jeff Legro, `Norms, Identity and their Limits: A Theoretical Reprise', in Peter J. Katzenstein (ed.) The Culture of National Security: Norms and Identity in World Politics, Columbia University Press, 1996.

  1. Edward A. Kolodziej,  “Constructivism”, in Security and International Relations ,Cambridge University Press, 2005,

  1. Peter J. Katzenstein and Nobuo Okawara, “Japan's National Security: Structures, Norms, and Policies”, International Security, V-17, N-4, Spring 1993

  1. Bill Mcsweeney, “The Social Constructivist Approach” in Security, Identity and Interests: A Sociology of International Relations, Cambridge University Press, 1999, (Chap.6)

Critical Theory and National Security

1.     Ken Booth, Theory of World Security, Cambridge University Press, 2007,   (Chap. 3)

2.     Ken Booth, “Critical Explorations”, and “Beyond Critical Security Studies”, in Critical Security Studies and World Politics, Lynne Rienner Publishers, 2005

3.     Booth, Ken (1991), “Security and Emancipation”, Review of International Studies 17(4).

4.     Ken Booth, “Critical Explorations”, in Ken Booth (Ed.), Critical Security Studies and World Politics, Lynne Rienner, 2005

5.     Richard Wyn Jones, “Promise: Toward a Critical Theory of Society” and “Impasse: Emancipatory Politics After Auschwitz” in Security, Strategy, and Critical Theory, Lynne Rienner Publishers, Inc., 1999

6.     Ken Booth, “Deepening, Broadening and Reconstructing”, Theory of World Security, Cambridge University Press, 2007

Securitisation and Desecuritisation

1.     Ole Weaver, “Securitization and Desecuritization” in Barry Buzan, Ole Weaver and J. de Wilde, Security: a New Framework for Analysis, (Boulder: Lynne Rienner)

2.     Daniel Deudney, “The Case Against Linking Environmental Degradation and National Security", Millennium Vol.19, no. 3, Winter 1990.


D. Contemporary Security and Strategy

Concept of Deterrence

  1. Keith B. Payne and C. Dale Walton, “Deterrence in the post-Cold War World”, in John Baylis, James Wirtz, Eliot Cohen and Colin Grey, Strategy in the Contemporary World: An Introduction to Strategic Studies, Oxford University Press, 2002.

  1. Lawrence Freedman, “Towards a Policy of Deterrence”, The Evolution of Nuclear Strategy, Macmillan, 1981

  1. Barry Buzan, “Deterrence”, in Barry Buzan, An Introduction to Strategic Studies, Macmillan, 1987


Nuclear Stability

  1. Scott Sagan and Kenneth N. Waltz, “More may be Better” (by Waltz) and “More will be worse” (by Sagan) in The Spread of Nuclear Weapons: A Debate Renewed, W. W Norton and Company, New York, 2003

  1. Lawrence Freedman, “From Counterforce to Assured Destruction”, The Evolution of Nuclear Strategy, Macmillan, 1981

E. Regional Security

Regional Security Complex Theory

1.               Barry Buzan and Ole Weaver, “Security complexes: A Theory of Regional Security”, in Regions and Powers: The Structure of International Security, Cambridge University Press, 2003

2.               Deutsch, K., (et al) in Political Community in the North Atlantic Area; International Organisation in the Light of Historical Experience, Princeton University Press, Princeton,1957

3.              Adler, E., and Barnett, M., (eds.) in Security Communities, Cambridge University Press, Cambridge, 1998


Subaltern Realism  

1.     Mohammed Ayoob, “Subaltern Realism: International Relations Theory Meets the Third World”, in Stephanie G. Neuman (ed), International Relations and the Third World, St. Martin's Press, 1998.

2.     Michael Barnett, “Radical Chic? Subaltern Realism: A Rejoinder”, TheInternational Studies Review, Vol. 4, No. 3, December 2002

3.     Keith Krause, “Theorizing security, state formation and the 'Third World' in the post-Cold War world”, Review of International Studies (1998), 24:125-136 (Review of Mohammad Ayoob’s book The Third World Security Predicament)

4.     Amitav Acharya, “The Periphery as the Core: The Third World and Security Studies”, http://www.yorku.ca/yciss/publications/OP28-Acharya.pdf




F. Non-Traditional Security

1.     Ole Weaver, “Security Agendas Old and New, And How to Survive Them”, Universidad Torculato Di Tella, 2000

2.     Barry Buzan and Lene Hansen, “Widening and Deepening Security”, in The Evolution of International Security Studies, Cambridge University Press, 2009

Suggested Readings:

1.     Rita Taureck, “Securitization theory and securitization studies”, Journal of International Relations and Development (2006) 9, 53–61.

2.     Jessica Tuchman Mathews, "Redefining Security," Foreign Affairs, Vol. 68, No.2

3.     Richard Ullman, 'Redefining Security', International Security, Vol.8, No.1, 29-153

4.     Kanti Bajpai, Human Security: Concept and Measurement, Kroc Institute Occasional Paper, No. 19, Op: 1, 2000

5.     Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security, Vol.26, No.2: 87-102

6.     Edward Newman, “Critical human security studies”, Review of International Studies (2010), 36, 77–94

Security and Non-state actors

1.     Elke Krahmann, “From State to Non-State Actors: The Emergence of Security Governance”, in Krahmaan New Threats and New Actors in International Security, Palgrave Macmillian, 2005


No comments:

Post a Comment