Module overview
Aims and Objectives
Learning Outcomes
Learning Outcomes
Having successfully completed this module you will be able to:
- Critically assess the applicability of descriptive and normative security theories to past and present political challenges arising in world affairs.
- Generate new, theory-driven ideas for responding effectively to claimed security problems.
- Identify and explain contending theories of security.
- Identify, analyse and critique the political and/or ethical assumptions underpinning particular security policies and practices.
- Distinguish between and engage in different modes of theoretical reasoning applicable to claimed security problems.
- Demonstrate an ability to integrate theoretical and empirical knowledge when explaining or advancing arguments about security.
Syllabus
Learning and Teaching
Teaching and learning methods
| Type | Hours |
|---|---|
| Teaching | 24 |
| Guided independent study | 126 |
| Total study time | 150 |
Resources & Reading list
Journal Articles
Simon Rushton (2011). 'Global Health Security: Security for Whom? Security from What?’. Political Studies, 4(779-796).
Arnold Wolfers (1952). ‘National Security” as an Ambiguous Symbol’. Political Science Quarterly, 67(4), pp. 481-502.
David A. Baldwin (1997). The Concept of Security. Review of International Studies 23, 23(1), pp. 5-26.
Textbooks
Annick T. R. Wibben (2011). Feminist Security Studies: A narrative approach. London: Routledge.
David Fisher (2011). Morality and War: Can War be Just in the Twenty-First Century?. Oxford: Oxford University Press.
Myriam Dunn Cavelty and Victor Mauer (eds.) (2010). The Routledge Handbook of Security Studies. London: Routledge.
Alex J. Bellamy (2006). Just Wars: From Cicero to Iraq. Cambridge: Polity Press.
Thierry Balzacq (ed.), (2011). Securitization Theory: How Security Problems Emerge and Dissolve. London: Routedge.
Columba Poeples and Nick Vaughan-Williams (2010). Critical Security Studies: An Introduction. Routledge: London.
Michael Walzer (2006). Just and Unjust Wars: a Moral Argument with Historical Illustrations. New York: Basic Books.
C. A. J. Coady (2008). Morality and Political Violence. Cambridge: Cambridge University Press.
Ken Booth (ed.) (2005). Critical Security Studies and World Politics. Boulder CO: Lynne Rienner.
Barry Buzan, Ole Waever, and Jaap de Wilde (1998). Security. A New Framework for Analysis. Boulder: Lynne Reinner.
Ronnie Lipschutz (ed.) (1995). On Security. Columbia: Columbia University Press.
J. Peter Burgess (ed.) (2010). The Routledge Handbook of New Security Studies. London: Routledge.
Michael Sheehan (2005). International Security: An Analytical Survey. Boulder: Lynne Rienner.
Paul D. Williams (ed.), (2013). Security Studies: An Introduction. New York: Routledge.
Barry Buzan (1991). People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. New York: Harvester Wheatsheaf.
Ken Booth and Nicholas J. Wheeler (2008). The Security Dilemma: Fear, Cooperation and Trust in World Politics. Basingstoke: Palgrave Macmillan.
Assessment
Summative
This is how we’ll formally assess what you have learned in this module.
| Method | Percentage contribution |
|---|---|
| Essay | 60% |
| Essay | 40% |
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
| Method | Percentage contribution |
|---|---|
| Essay | 100% |
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
| Method | Percentage contribution |
|---|---|
| Essay | 100% |
Repeat Information
Repeat type: Internal & External