Programs in International Affairs



Yüklə 28,39 Kb.
tarix06.05.2018
ölçüsü28,39 Kb.
#42684

SCHOOL OF PUBLIC POLICY

GEORGE MASON UNIVERSITY

ARLINGTON, VA




NONTRADITIONAL THREATS: GLOBAL SECURITY CHALLENGES IN THE 21ST CENTURY


(PUBP 710-006)

3 Credits

Contact Information:

Christopher A. Corpora, Ph.D.

Adjunct Professor

Phone: (540) 834-3561

E-mail: ccorpora@gmu.edu

Cacorpora@comcast.net


***Anything discussed or presented in this course is solely the perspective of the instructor and does not reflect the official positions of the Office of the Director of National Intelligence or the U.S. Government***
Spring Semester, 2009:

Course Day/Hours/Locations: Tuesdays, 7:10 – 9:50 PM, GMU Arlington Campus, Room 352.
Office Hours: By appointment, before and after class.

Course Overview


INTRODUCTION
The end of the Cold War suggested the dawn of a new security paradigm in the post-bipolar superpower era. Most scholars, practitioners and pundits recognized the changes, but struggled to understand and explain the emerging new, security paradigm. The liberal, Western expectations of an enduring epoch of peace almost immediately proved to be false with Iraq’s invasion of Kuwait, Somalia’s implosion, multiple conflicts in the African Great Lakes region, and the rapid dissolution of the former Yugoslavia. The expert community grappled with theories, methods and policies derived from a bi-polar super power experience, slowly recognizing that these conceptual and practical tools were no longer useful for dealing with these new and different events. International terrorism, nuclear proliferation and transnational organized crime (as well as, environmental and health pandemics) increasingly became a part of the security discourse with the bombing of the U.S. military housing complex, Khobar Towers, in Saudi Arabia; increasing reports of nuclear materials being smuggled out of the former Soviet Union; and, the emergence of a new class of illicit entrepreneurs – exemplified earliest by the Russian Mafiya. These activities and events further complicated the assessment and approach to the new global security environment – insisting on an ability to account for these non-traditional threats. The events of 9/11/2001 and the following incidents in Bali, Spain, Kenya, Egypt and the UK solidified a sometimes grudging recognition for the need to re-think international security in order to focus better on these non-traditional and non-conventional threats to global order.
Early after 1991 some experts began to recognize that a newly observed cast of actors emerged out of the political, economic and social chaos, buttressed by the realignment of global power, increased regional conflicts, and the rapid emergence of globalization as a driving trend in the transformation of the world. These scholars and policymakers began the hard task of seriously re-thinking this new security environment and developing conceptual and practical tools to understand and address these issues. The primary tasks in this effort were to identify who was involved in propagating these non-traditional threats. What is their motivation and what are the exact circumstances that led to their growth and deepened impact on international society? How can legitimate international actors use these understandings and explanations to better address the challenges associated with non-traditional threats?
This course will trace the major intellectual discussions and empirical facts associated with these non-traditional threats – identifying their complex relationship with traditional and new realities of global security. In this discussion the students will be introduced to several new ways to think about these issues – driving a broader policy dialog around the possibilities for transforming and managing these global threats. Students will be challenged to question several long-held assumptions and entertain different ways to explain and address these non-traditional threats to global security and stability.
TEACHING APPROACH:
This seminar will have few formal lectures, beyond the first few sessions. Rather, students will participate in and help lead a structured, critical dialog about the readings and related world events. Students are expected to prepare informed assessments of the readings and articulate key questions that come from the readings – which are meant to be cumulative and, in some cases, presenting opposing views and approaches to the topic. The seminar will follow a modified Socratic approach, where most of the discussion will be based on addressing a series of questions in reference to the readings and the course topic. Some students prefer lecture-based instruction. However, this approach is a useful and sometimes refreshing approach that can yield great results if all engage fully and respectfully with an open mind and an eagerness to learn.

Prerequisites:

None
GRADED WORK:




  • Take Home Midterm -- 30%: Each student will prepare a 6-8 page paper demonstrating a clear understanding of non-traditional threats – based on the readings and class discussions up through the first half of the class. Students will write two short essays, responding to one mandatory question and choosing the second from a list of questions provided the week before midterms. Each essay will be 3-4 pages in length. This paper is due at the midterm week class noted below.

  • Final Research Paper – 50%: Each student will prepare a 10-15 page paper and presentation, addressing a specific non-traditional threat in an identified region of the world -- for example, environmental impacts of conflict in Western Africa. This paper will fully describe the issue in context -- discussing how the issue effects local, national, regional and international communities. The paper will also provide a critical assessment of varying positions and policies addressing how the challenges presented could be mitigated. Finally, the papers should survey and present a coherent set of policy strategies to mitigate the issues addressed. The presentations will be a 5-slide, 15 minute PowerPoint presentation, summarizing your research findings and presented to the class during one of the final sessions in the semester This is an academic research project that will require the student to find sources outside those used in class to present their case. This paper will have a minimum of 20 references – 50% of which must be scholarly articles or books. The research paper will count for 40 points and the presentation for 10 points.

  • Participation – 20%: Please engage! We all learn best through discussion, debate, and exchange of ideas. Each student will be required to lead a discussion during the term – bringing several cogent and critical thoughts to the class and formally engaging the group with questions to elicit dialog around key issues from the readings. Please remember to be respectful of your fellow students – allowing them the courtesy to make or defend a point. As part of this activity, each student will be assigned one set of readings to review and lead discussions each week on our class BLOG and during the session. Two or more unexcused absences will result in a full letter grade reduction.

All papers will be double spaced, 1 inch margin, 12pt Times New Roman Font with footnotes – NOT ENDNOTES. A full bibliography is expected for the final paper. All due dates are final with extensions only for those who have written, university approved reasons for delay. Each paper will be marked down a full latter grade for each day it is late. All papers should be sent via email, with return receipt required, and hard-copy in class. This hard and soft copy policy will ensure I receive all papers on time, in case of a need to miss class.


ACADEMIC INTEGRITY:
Plagiarism is a growing problem in academic and professional publication circles. Much of this comes from the ease with which a manuscript can be quickly scanned through publicly available software to check for the inappropriate use of intellectual capital. The George Mason University plagiarism policy is available in your student handbook and requires swift and irrevocable consequences for someone who is caught inappropriately using someone else’s’ text or ideas. The best way to ensure you do not fall into this category is through aggressive and thoughtful footnoting, with an exhaustive list of references used to form ideas in any formal written assignment. If you are uncertain, please refer to the GMU policy and contact instructor for guidance.
REQUIRED READINGS:


  1. Critical Approaches to International Security, K.M. Fierke, Cambridge: Polity Press, 2007: 978-0-7456-3293-3.




  1. Worlds in Collision: Terror and the Future of Global Order, Ken Booth and Tim Dunne, eds., New York: Palgrave, 2002: ISBN: 0-333-99805-7.




  1. Global Outlaws: Crime, Money, and Power in the Contemporary World, Carol Nordstrom, Berkley: University of California Press, 2007: ISBN:13-9780520250963.




  1. Beyond Sovereignty: Issues for a Global Agenda (3rd Edition), Maryann Cusimano Love, ed., Belmont: Thomson, 2007: ISBN: 0-495-09026-3.




  1. Six Nightmares: Real Threats in a Dangerous World and How America Can Meet Them, Anthony Lake, New York: Little Brown and Company, 2001: ISBN: 9780316559768.




  1. Threats in the Age of Obama, Michael Tanji, ed., Ann Arbor: Nimble Press, (due out Jan 20 2009)

Also required are various articles and official documents, detailed in the course plan below.
RECOMMENDED READINGS:


  1. Statecraft and Security: The Cold War and Beyond, Ken Booth, ed., Cambridge: Cambridge University Press, 1998.

  2. Security: A New Framework for Analysis, Barry Buzan, Ole Waever and Jaap de Wilde, Boulder: Lynne Rienner, 1998.

  3. Critical Security Studies, Keith Krause and Michael C. Williams, eds., Minneapolis: University of Minnesota Press, 1997.

  4. New and Old Wars: Organized Violence in a Global Era (2nd ed.), Mary Kaldor, Palo Alto: Stanford University Press, 2007: ISBN: 0-8047-5646-5.

  5. Global Politics as if People Mattered, Mary Ann Tetreault and Ronnie D. Lipschutz, Lanham: Rowman and Littlefield, 2005.

  6. After 9/11: Terrorism and Crime in a Globalised World, David A. Charters and Graham F. Walker, eds., New Brunswick: UNB Press and Dalhousie University Press, 2004.

  7. Illicit Flows and Criminal Things: States, Borders, and the Other Side of Globalization, Willem van Schendel and Itty Abraham, eds., Bloomington: University of Indiana Press, 2005.

  8. Policing the Globe: Criminalization and Crime Control in International Relations, Peter Andreas and Ethan Nadelmann, Oxford: Oxford University Press, 2006.

  9. Combating Proliferation: Strategic Intelligence and Security Policy, Jason D. Ellis and Geoffrey D. Kiefer, Baltimore: Johns Hopkins University, 2007.

  10. 21st Century Weapons Proliferation, Henery Sokolski and James M. Ludes, eds., London: Frank Cass, 2001.

  11. The Politics of Organized Crime and the Organized Crime of Politics: A Study in Criminal Power, Alfredo Schulte-Bockholt, Lanham: Rowan and Littlefield, 2006.

  12. War Economies in a Regional Context: Challenges of Transformation, Michael Pugh and Neil Cooper (with Jonathan Goodhand), Boulder: Lynne Rienner, 2004.


Course Plan



Jan 20: Class Rescheduled to 5 May Due to Inauguration
Jan 27: Debates


  1. KF, Ch 1

  2. Walt, Stephen, “The renaissance of security studies,” International Studies Quarterly, 35:2, 1991.

  3. Krause, Keith and Michael C. Williams, “Broadening the agenda of security studies: politics and methods,” Mershon International Studies Review, 40:2, 1996.


Feb 3: Concepts


  1. Andreas, Peter, “Redrawing the line: borders and security in the 21st century,” International Security, Fall 2003.

  2. Huysmans, Jef, “Defining social constructivism in security studies: the normative dilemma of writing security,” Alternatives, 27 (Sup), 2002.

  3. MT, Ch 1

  4. MCL, Ch 1

  5. KF, Ch 2


Feb 10: Of States, Securitization and the Global Political Economy


  1. Shifting Security Parameters: http://www.crisisgroup.org/home/index.cfm?id=2470&l=1

  2. Rice, Susan, “The threat of global poverty,” The National Interest, Spring 2006.

  3. KF, Chs. 5-6

  4. MCL, Ch 3-4


Feb 17: Human (in)Security


  1. HIV/AIDS as a Security Issue: http://www.crisisgroup.org/home/index.cfm?id=2606&l=1

  2. Paris, Roland, “Human security: paradigm shift or hot air?” International Security, 26:2, 2001.

  3. Shamim, Choudhury, “Alternative views of environmental security in a less developed country: the case of Bangladesh,” Journal of Third World Studies, 25:1, 2008.

  4. KF, ch. 7&9

  5. MT, Ch 4

  6. CN, Part 1


Feb 24: Power, Corruption and Lies – The New Order (Identity Politics)?


  1. KF, Ch 3-4

  2. MCL, Ch 2

  3. CN, Pt 2

  4. Thomas, Caroline, “Global governance, development and human security: exploring the links,” Third World Quarterly, 22:2, 2001.


Mar 3: Chaos, Change and Reflections (Issues Pt. 1)


  1. Wilson,Ward, “The myth of nuclear deterrence,” Nonproliferation Review, 15:3, 2008.

http://cns.miis.edu/npr/pdfs/153_wilson.pdf

  1. Arena, Michael P., “Hizballah’s global criminal operations,” Global Crime, 7:3-4, 2006.

  2. MT, Ch 5-6

  3. B&D: Pt. 1, Ch 2,4,7,9&11

  4. MCL, Ch 5-7 &11


Mar 10: SPRING BREAK
Mar 17: Contexts and the Coming Flood (Nontraditional Threat Complex – NTC-- Considered, Pt. 1)
(MIDTERM DUE)


  1. Lake, ALL


Mar 24: Convergences


  1. Voices from the Whirlwind: http://www.pbs.org/frontlineworld/stories/pakistan/interviews.html

  2. Shelley, Louise I., “Unraveling the new criminal nexus,” Georgetown Journal of International Affairs, 6:1, 2005.

  3. CN, Part 3

  4. MT, 2-3, 7, 8 and 11


Mar 31: The World We Live In (Issues Pt. 2)


  1. MCL, chs. 8-10 &12

  2. B&D, Pt. 2, Ch 13 &16-18

  3. MT, 15-16 and 21


Apr 7: Tools for Now and the Future (NTC Considered, Pt. 2)


  1. KF, Ch 8

  2. Buzan, Barry, Ole Waever and Jaap de Wilde, “Security analysis: conceptual apparatus,” in Security: A New Framework for Analysis, Boulder: Lynne Rienner, 1998. (Ch 2, on library reserve)

  3. Shelley, Louise I. and John T. Picarelli, “Methods and motives: exploring links between transnational crime and international terrorism,” Trends in Organized Crime, 9:2, 2005.

  4. Corpora, Christopher A., “Boxing with shadows: threat convergence, asymmetries, and the new security challenge,” in After 9/11: Terrorism and Crime in a Globalised World, David A. Charters and Graham F. Walker, eds., New Brunswick: UBB Centre for Conflict Studies, 2004 (provided by instructor).


Apr 14: Snapshots and Scenes from Here and Now (Space and Time Collapsed)


  1. Gunrunners: http://www.pbs.org/frontlineworld/stories/sierraleone/

  2. MCL, Ch 13

  3. MT, Ch 17-19

  4. Aguilar-Millan, Stephen, Joan E. Folz, John Jackson and Amy Oberg, “The globalization of crime,” The Futurist, Nov-Dec, 2008.


Apr 21: A Way Ahead?


  1. Rule based International Order: http://www.crisisgroup.org/home/index.cfm?id=4389&l=1

  2. B&D, Pt 3, Ch 22, 25, 27-28 & 31

  3. MCL, Ch 14

  4. MT, Ch 10, 20-21


Apr 28: Research Presentations
May 5: Research Presentations
FINAL RESEARCH PAPERS DUE ON SCHEDULED EXAM DAY
Yüklə 28,39 Kb.

Dostları ilə paylaş:




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə