Handbook
Handbook
Handbook
2022-2023
Key Information
Course Convenor
Dr Luba Zatsepina, Luba.Zatsepina@ed.ac.uk
Guidance and feedback hours 11:00-13:00, Tuesdays, week 1-11, Room 2.14
Chrystal Macmillan Building
Lecture
Tuesday 14:10-15:00, week 1-10
MST_G.07 Meadows Lecture Theatre - Doorway 4
Tutorial
Please see course timetable
Course Tutors
Guidance and feedback hours: other than course organizer, by arrangement
Course Administrator
Ms Ieva Rascikaite ieva.rascikaite@ed.ac.uk
***
Primary guidance for all matters related to the course is contained herein or will be
communicated via LEARN. This supersedes and overrides any meeting, timing, or
other guidance and information found on PATH, DRPS, or timetabling.
***
Contents
Key Information................................................................................................ 1
Aims and Objectives.........................................................................................3
Teaching Methods............................................................................................4
Assessment......................................................................................................5
Communications and Feedback.......................................................................9
Readings and Resource List............................................................................9
Lecture Summary...........................................................................................12
Course Lectures and Readings......................................................................13
Appendix 1 – General Information..................................................................28
Students with Disabilities................................................................................28
Learning Resources for Undergraduates........................................................28
English Language Support.............................................................................28
Discussing Sensitive Topics...........................................................................29
Tutorial Allocation...........................................................................................29
Data Protection Guidance for Students..........................................................29
Appendix 2 – Feedback sheets......................................................................30
This course aims to discuss a range of approaches to global security, providing a set
of key concepts and resources that help you develop an in-depth understanding of
the modern security environment. In doing so, it will explore both the orthodox
approach to international security as well as the recent turn towards a broader
security agenda (heralded in academic Security Studies by the emergence of ‘critical
security studies’). In particular, it will explore the ideas associated with Strategic
Studies, realism and liberalism broadly conceived, feminism, postcolonialism, and
works associated with the Copenhagen, Welsh, and Paris Schools of security
research. Students will thus be presented with an opportunity to investigate and
question what security might mean in the context of contemporary international
politics – in particular, we will return to three animating questions: security for whom,
security of what, and security from which ‘threat’?
The course also takes an expansive view of practical security issues. While inter-
state dynamics and the role of power politics are prominent in, for example, the
thermonuclear dilemma, we will also cover issues that transcend the traditional IR
focus on state-based actors alone, e.g., irregular warfare, bioterrorism, gender,
health, and climate change. Through a policy brief and an analytical essay, students
will also learn to synthesize and master both theoretical and practical forms of
knowledge and to develop the analytical tools for unpacking and assessing political
responses to security challenges.
Learning Outcomes
This course consists of one 50-minute lecture plus one tutorial per week.
Attendance of lectures and tutorials is compulsory and both are subject of
participation assessment.
There are 2-hour slots scheduled for each lecture (Tuesdays 14.10-16.00)
but the main session will always be held in the first part (14.10-15.00). The
additional hour is used for practicals, which consist of various activities,
films, discussions, briefing sessions, and alternative learning formats
(please see ‘Lecture Summary’, p. 12). Practical hours are entirely
voluntary and non-assessed, and there is no expectation of preparation
beyond that required for lecture. They are also, more often than not,
opportunities to engage security issues outside of traditional reading,
writing, and lecturing formats.
Tutorials
Weekly tutorials are an essential part of your academic learning and provide you with
the chance to discuss the material covered during the course, further your own
thinking about a specific tradition, approach or issue and, importantly, to engage with
the Course Organiser/Tutor as well as your fellow students in an extended, primarily
written dialogue.
Students are expected to prepare in advance for tutorials and then actively
participate in discussions, including making presentations or undertaking activities on
relevant topics. These will vary by tutorial group depending on the tutor. More details
on the organization of and requirements in tutorials will be provided during the first
week of tutorials (i.e., Week 2).
How to sign up
Assessment
Students will be assessed by:
Word limit1
Do not exceed
the word limit or
penalties will be Weighting
Assessment
applied
(excluding
bibliography)
Tutorial
N/A 15%
participation
Note: All coursework is submitted electronically through ELMA. Please read the
School Policies and Coursework Submission Procedures which you will find here.
Please check the ‘Assessments’ tab on the course LEARN page for assessment
deadline information for the current academic year.
Information on how to apply for extensions and special circumstances can be found
here.
We cannot guarantee that markers will meet the usual norm of 15 working days for
marking and feedback on late submissions, regardless of whether these fall within
special circumstances, authorized extensions, or simply late work. The Global
Security teaching team recognizes and supports all students who may receive an
extension or who may need to file for special circumstances, things happen every
semester that legitimately impact students' ability to work to deadlines. This decision
strikes a balance between that support and a year-on year increase in late
submissions of all kinds, which impacts tutors’ ability to meet their other
responsibilities (e.g., researching and writing their PhDs, preparing for academic
conferences and workshops where appropriate, and tutoring other courses).
If you submit an assessment after the scheduled deadline for any reason,
please do not expect a 15 working day turnaround. Where possible we will work
to ensure that you receive a provisional mark and feedback prior to the second
assessment deadline, so that you can benefit from the formative aspects of
feedback.
1
Do not exceed the word limit or penalties will be applied. There is no buffer. You
will not be penalized for submitting work below the word limit, but considerably
shorter papers struggle to achieve the required depth and coverage needed for a
high mark.
The specific assignment for the policy brief will be posted on LEARN at the beginning
of the semester.
You will also receive plenty of guidance by the course organizer (both in class and on
LEARN) on how to write a policy brief. On Tuesday 27 September 2022, course
organiser will hold a Policy Brief Information Session during the Practical (15:10 -
16:00, MST_G.07 Meadows Lecture Theatre - Doorway 4), which you are strongly
advised to attend.
We encourage you to start working on the brief early in the semester and to discuss
your draft plan/outline with the course organizer or your tutor.3
Assessment Criteria
The policy brief is specifically assessed on:
1. Research Effort;
2. Understanding;
3. Quality of Analysis;
4. Evaluation of Options and Recommendation, and;
5. Writing and Presentation.
Please note that policy briefs going over the maximum word count will incur penalties
according to the school Honours guidelines. All parts of the policy brief count
towards the word count; the list of key sources and the bibliography, however, are
not included. See Appendix 2 for the policy brief feedback sheet.
2
The educational rationale of policy briefs as a teaching tool is discussed in: Keating,
Michael F. and James D. Boys, (2009) ‘The Policy Brief: Building Practical and
Academic Skills in International Relations and Political Science’, Politics 29:3, 201-
208.
3
While we are happy to look at and discuss a bullet point outline, due to fair practices
standards, we cannot read any drafts ahead of the submission.
Specific essay topics will be posted on LEARN at the start of the semester.
Assessment Criteria
The essay will be assessed according to the following criteria:
As with the policy brief, the maximum word count is non-negotiable. All parts of the
essay including references (be they in text or in footnotes) count towards your word
count; the bibliography, however, is not included. See Appendix 2 for the essay
feedback sheet.
Please refer to the assessment and submission procedure information which you will
find here.
Attendance will be monitored in tutorials, and you are expected to attend all
compulsory sessions of the course (i.e., attend all lectures, attend all tutorials).
Should you be unable to attend you must inform us in advance of the relevant
session: for tutorials, please contact your tutor directly. Please be prepared to
provide medical evidence where appropriate. Note that repeated or unexcused
absence will directly affect your participation mark and be reported to the relevant
Student Adviser (SA).
Engagement and active participation are encouraged. We will seek to make sure
everybody gets an opportunity to take part in the discussions and in-class activities.
Note that overly passive behaviour and disinterest can affect your participation mark.
Preparation for tutorial tasks and discussion is essential because the tutorial depends
on your contributions as much as others’. Make sure you read both the core readings
and the more specific tutorial readings before the session. Always bring some ideas
or points for discussion and be ready to be asked to share your perspective on topics
raised in the lecture and in the readings.
A mark will be awarded for each of the above components; these will then be
averaged out to give you an overall mark for the participation element (15% of your
total mark for the course). You will also receive specific feedback by your tutor.
Please keep in mind that the aim of participation assessment is mainly to reward your
contribution to the course, and not to catch you out or continuously monitor you. The
criteria set out in the feedback sheet (see Appendix 2 of this course handbook) are
meant to make the marking process more transparent, but you should not be too
concerned about this or even feel forced to e.g., compete for talking time or to
constantly “prove” that you are prepared. The aim is really just to get everybody
involved and to give you an incentive to participate.
This is the ONLY email address we shall use to communicate with you. Please note
that we will NOT use ‘private’ email addresses such as yahoo or gmail; it is therefore
essential that you check your university email regularly, preferably each day.
There are various avenues for you to provide us with feedback about the course:
At the end of each section, some tutorial time will be given over to feedback
sessions on various aspects of the course, and the tutors will pass on your
comments to the course organiser.
Each class will have one or more programme representatives based on the
size of the class. Programme representatives (Programme Reps) are a link
between students and staff and will collect feedback for the course review
meeting. They will also have opportunities to feedback to Staff Student Liaison
Committees. Your Programme Rep(s) contact details will be available on the
course Learn page should you wish to contact them.
If you would like to apply to be a Programme Rep, or are looking for more
information, please see our Student Representation webpage.
At the end of the course, we ask all students to fill in an online questionnaire
about the various lecture blocks and other aspects of the course. We do hope
you will take note of what you like and dislike as the course progresses, and
that you then take the time to share your experience with us. We do our best
to include your constructive suggestions into the program for subsequent
years.
• Core readings: these are compulsory readings that you should complete before
coming to the lecture, which may be delivered on the assumption you have
completed the core reading.
• Tutorial readings: these are compulsory readings that you should complete before
the tutorial to be able to contribute to the discussion and activities. They complement
the core readings of each week, so make sure you read those first (see above).
• Further readings: these are suggested readings that are intended to give you
more specific insights into a topic you are particularly interested in. They are also a
starting point for your essay research, although note that you are expected to show
evidence in your sources of research beyond these non-exhaustive lists.
Where available, Core and Tutorial Readings can be obtained electronically via
LEARN and the Course Resource List (available at resourcelist.ed.ac.uk and on
LEARN) or the links in the main library catalogue. If you have any difficulty getting
hold of any of the readings, contact the course organiser.
Make use of the Oxford University Press online bibliographies (you must be
logged into EASE):
http://www.oxfordbibliographies.com/obo/page/international-relations
Useful websites
Please make sure to use all of these sources critically, i.e., consider their background
and own agenda before taking their opinions and findings as ‘facts’.
International organisations
www.un.org/en/, www.nato.int, www.europa.eu, www.osce.org,
Non-governmental organisations
Human Rights Watch www.hrw.org
International Committee of the Red Cross/Crescent www.icrc.org
International Crisis Group https://www.crisisgroup.org
Minority Rights Group www.minorityrights.org
Nature Friends International https://www.nf-int.org/en
Prevent Genocide www.preventgenocide.org
Stop Genocide Now https://stopgenocidenow.org
Core reading
1. McSweeney, B. (1999) Security, Identity, and Interests (Cambridge
University Press) chp. 1 ‘The Meaning of Security’, pp. 13-22. [Resource
List]
2. Buzan, B. and Lene Hansen (2009) The Evolution of International
Security Studies (Cambridge University Press) chp. 1, ‘Defining
International Security Studies’, pp. 8-20. [Resource List]
3. Skim at least one of the US, UK and EU security strategy statements:
a. US 2017 National Security Strategy (NSS), available at:
http://nssarchive.us/wp-content/uploads/2020/04/2017.pdf
(previous versions in 2015, 2010, 2006, and 2002 will also be
informative)
b. ‘European Security Strategy (ESS): A Secure Europe in a Better
World’ (2003)
https://www.consilium.europa.eu/media/30823/qc7809568enc.pdf
c. ‘Global Britain in a Competitive Age: The Integrated Review of
Security, Defence, Development and Foreign Policy’ (2021)
available at:
https://assets.publishing.service.gov.uk/government/uploads/syste
m/uploads/attachment_data/file/975077/
Global_Britain_in_a_Competitive_Age-
_the_Integrated_Review_of_Security__Defence__Development_a
nd_Foreign_Policy.pdf
Tutorial reading
No tutorials in week 1
Further reading
The changing concept of security
David Baldwin, “The concept of security”, Review of International Studies 23/1
(1997).
L. Bialasiewicz, et al., (2007) ‘Performing Security: the Imaginative Geographies of
Current US Strategy’, Political Geography 26:4, 405–422.
J. Peter Burgess, ‘Value, security, and temporality in Nietzsche’s critique of
modernity’, The Sociological Review, v60n4 (2012): 696-714.
James der Derian, ‘The value of security: Hobbes, Marx, Nietzsche, and Baudrillard’
chapter 2 in Lipschutz, ed., On Security, Columbia Univ. Press (1995): 24-45.
Michael Dillon, ‘Specters of biopolitics: finitude, eschaton, and katechon’ South
Atlantic Quarterly, v110n3 (2011): 780-92.
K.M. Fierke, ‘Definitions and Redefinitions’ & ‘The Proliferation of Security Concepts’
in Critical Approaches to International Security. Polity 2007.
Lawrence Freedman, “International Security: Changing Targets”, Foreign Policy
110/1 (1998).
Andrew R. Hom, ‘Angst springs eternal: Dangerous times and the dangers of timing
the “Arab Spring”’, Security Dialogue 47(2): 165-183 (2016).
Jeff Huysmans (1998) ‘Security! What Do You Mean? From Concept to Thick
Signifier’, European Journal of International Relations 4:2, 226–255.
Snyder, J. (2004) ‘One World, Rival Theories’, Foreign Policy, 145, 53-62.
Richard Ullman, “Redefining Security”, International Security 8/1 (1983).
Core reading
1. Strachan, H. (2005) ‘The Lost Meaning of Strategy’, Survival 47(3) 33-54.
[Resource List]
2. Cronin, A. (2014) ‘The “War on Terrorism”: What Does It Mean to Win?’
Journal of Strategic Studies 37(2) 174-97. [Resource List]
3. For policy brief information session – Matt Davies (2014) IR Theory:
Problem-Solving Theory Versus Critical Theory? [Online]. Available from:
https://www.e-ir.info/2014/09/19/ir-theory-problem-solving-theory-versus-
critical-theory/. [Resource List]
Tutorial reading
4. Heuser, B. (2017) Defeat as Moral Victory. In: Moral Victories: The Ethics
of Winning Wars, edited by Andrew R. Hom, Cian O’Driscoll, and Kurt Mills
(Oxford University Press), 52-68. [Resource List]
Further reading
Abrahamsen, R. and Williams, M.C. (2010) Security Beyond the State. Security
Privatization and International Politics. Cambridge: Cambridge University Press.
Arquilla, John (2007) ‘The end of war as we knew it? Insurgency, counterinsurgency
and lessons from the forgotten history of early terror networks’, Third World
Blum, Gabriella. 2013. ‘The Fog of Victory’ European Journal of International Law
24(1): 391-421.
Blum, Gabriella, and David Luban. “Unsatisfying Wars: Degrees of Risk and the Jus
Ex Bello.” Ethics 125, no. 3 (April 1, 2015): 751–80. doi:10.1086/679558.
van Creveld, Martin. The Transformation of War, Free Press, 1991.
**van Creveld, Martin (2006) The Changing Face of War. Lessons of Combat, from
the Marne to Iraq. New York: Presidio Press.
**von Clausewitz, Carl 1976. On War, trans. Michael Howard & Peter Paret,
Princeton University Press, especially Book 1, ch. 1: ‘What is War?’ (There
are many online copies of this book, which will be fine for our purposes; e.g.
the Project Gutenberg version, available at:
http://www.gutenberg.org/files/1946/1946-h/1946-h.htm#link2HCH0001 )
Gray, Chris H. Postmodern War: The New Politics of Conflict, Routledge, 2005.
Gray, Colin (2005) Another Bloody Century: Future Warfare. London: Phoenix [ch. 4
‘Grand Narratives of War 1800-2100’].
Gray, C.S. Irregular Enemies and the Essence of Strategy: Can the American Way of
War Adapt, US Army War College, 2006.
Heuser, Beatrice (2017) ‘Defeat as Moral Victory: The Historical Experience’, in
Moral Victories: The Ethics of Winning Wars, edited by Andrew R. Hom, Cian
O’Driscoll, and Kurt Mills (Oxford University Press): 52-68.
Heuser, Beatrice. The Evolution of Strategy, Cambridge: CUP.
Holmes, Terence M. (2017) ‘The Clausewitzian Fallacy of Absolute War’, Journal of
Strategic Studies 40(7): 1039-58.
Hom, Andrew R. and Cian O’Driscoll, and Kurt Mills, eds. 2017 Moral Victories: The
Ethics of Winning Wars, edited by (Oxford University Press).
**Kaldor, M. 1999. New and Old Wars: Organized Violence in a Global Era.
Cambridge: Polity. Introduction; chapter 1, ‘Old Wars’; and chapter 2, ‘Bosnia-
Herzergovina: A Case Study of a New War’, pp. 1-70.
Kalyvas, Stathis N.The Logic of Violence in Civil War, Cambridge U.P., 2006
Keen, D. (2000) ‘War and Peace: What’s the Difference?’, International
Peacekeeping, 7(4), 1-22.
Krahmann, E. (ed.) (2005) New Threats and New Actors in International Security.
London: Palgrave Macmillan.
Linn, B.M. and R.F. Weigley, The American Way of War Revisited, Journal of
Military History, Vol. 66, No. 2 (2002), 501-533.
Luttwak, Edward. “Give War a Chance”, Foreign Affairs, 2000.
Luttwak, Edward N. Strategy: the Logic of War and Peace, Cambridge Mass.
Harvard U.P., 2001.
Mandel, Robert. Security, Strategy and the Quest for Bloodless War, Lynne Rienner,
2004.
Martel, William. 2007. Victory in War: Foundations of Modern Military Policy.
(Cambridge Univ Press).
McIntosh, Christopher (2015) "Counterterrorism as War: The Dangers, Risks, and
Oppurtunity Costs of War with Al Qaeda and its Affiliates," Studies in Conflict
and Terrorism 38, no. 1 (2015): 104-118.
Core reading
1. Brodie, B.(1978) ‘The Development of Nuclear Strategy’ International Security
2(4): 65-83. [Resource List]
2. Sagan, S. and Kenneth Waltz (2010) ‘The Great Debate: Is Nuclear Zero the
Best Option?’ The National Interest September 1: 88-96 [Resource List]
Tutorial reading
3. Cohn, C. (1987) ‘Sex and Death in the Rational World of Defense
Intellectuals’, Signs: Journal of Women in Culture and Society 12 (4): 687–
718. [Resource List]
Further reading
Adib-Moghaddam, A. (2007) Manufacturing War: Iran in the Neo-Conservative
Imagination. Third World Quarterly, 28(3): 635–653.
Ahmed, S. “Pakistan’s nuclear weapons program: Turning points and nuclear
choices.” International Security (Spring 1999).
Barkawi, T. (2013) Nuclear Orientalism. Al Jazeera, [online] 17 April. Available at:
http://www.aljazeera.com/indepth/opinion/2013/04/201341695253805841.htm
l
Brown, Chaim and Christopher F. Chyba, “Proliferation Rings: New Challenges to the
Nuclear Nonproliferation Regime”, International Security 29/2 (2004).
Brown, M. E., Cote Jr., O. R., Lynn-Jones, S. M. and Miller, S. E. (2010) Going
Nuclear. Nuclear Proliferation and International Security in the 21st Century.
An International Security Reader. Cambridge, MA: MIT Press.
Busch, Nathan. “Russian roulette: The continuing relevance of Russia to the nuclear
proliferation debate,” Security Studies 11/3 (Spring 2002).
Caprioli, M. and Trumbore, P. F. (2005) Rhetoric Versus Reality. Rogue States in
Interstate Conflict. Journal of Conflict Resolution, 49(5): 770–791.
**Craig, Campbell. Glimmer of a New Leviathan: Total War in the Realism of
Niebuhr, Morgenthau, and Waltz. New York: Columbia University Press,
Core reading
1. McDonald, M. (2008) ‘Securitization and the Construction of Security’,
European Journal of International Relations 14(4): 563-87. [Resource
List]
2. Taureck, R. (2006) Securitization theory and securitization studies.
Tutorial reading
3. Hansen, L. (2016) ‘The Little Mermaid’s Silent Security Dilemma and the
Absence of Gender in the Copenhagen School’, Millennium. [Online] 29
(2), 285–306. Available from: doi:10.1177/03058298000290020501.
[Resource List]
Further reading
Core reading
1. Booth, K. (1991) ‘Security and Emancipation’, Review of International
Studies 17(4): 313-26. [Resource List]
2. Côté-Boucher, K., Federica Infantino & Mark B. Salter (2014) Border
security as practice: An agenda for research Karine Côté-Boucher,
Federica Infantino, & Mark B Salter (eds.). Security dialogue. [Online] 45
(3), 195–208. Available from: doi:10.1177/0967010614533243.
[Resource List]
Tutorial reading
3. Doty, R.L. (2007) States of Exception on the Mexico?U.S. Border:
Security, “Decisions,” and Civilian Border Patrols. International political
sociology. [Online] 1 (2), 113–137. Available from: doi:10.1111/j.1749-
5687.2007.00008.x. [Resource List]
Further reading
Aradau, C. and A. Neal (2015) Virtual Special Issue: Foucault and Security Studies.
Beyond biopolitics?, Security Dialogue (available at
http://sdi.sagepub.com/site/Virtualspecialissues/FoucaultSecurityStudies.xhtm
l)
Aradau, C. and Van Munster, R. (2012) Politics of Catastrophe: Genealogies of the
Unknown. London: Routledge.
Bigo, D (2001) ‘The Möbius Ribbon of Internal and External Security (ies)’,
in: Mathias Albert/David Jacobson/Yosef Lapid (eds.) Identities, Borders,
Orders. Rethinking International Relations Theory, Minneapolis: University of
Minnesota Press, pp. 91-116.
Bigo, D (2002) ‘Security and Immigration: Towards a Critique of the Governmentality
of Unease’, Alternatives 27: 63–92.
Bigo, D and E McCluskey (2018) ‘What Is a PARIS Approach to (In)securitization?
Political Anthropological Research for International Sociology,’ Oxford
Handbooks Online
Booth, K (ed) (2005) Critical Security Studies and World Politics, London: Lynne
Rienner.
Booth, Ken (2011) ‘Anchored in Tahrir Square’ European Security 20(3): 473-479.
Core reading
1. Chapter 1 and 2 Dalby, Simon (2009) Security and Environmental Change.
Cambridge: Polity. Pages 13-55. [Resource List]
Further reading
Burke, A., Fishel, S., Mitchell, A., Dalby, S., & Levine, D. J. (2016). Planet Politics: A
Manifesto from the End of IR. Millennium, 44(3), 499–523.
Chandler, D., Cudworth, E., & Hobden, S. (2018). ‘Anthropocene, Capitalocene and
Liberal Cosmopolitan IR: A Response to Burke et. als ‘Planet Politics’’ Millennium,
46(2): 190–208.
Cudworth, Erika and Stephen Hobden (2011) Posthuman International Relations:
Complexity, Ecologism and Global Politics. London: Zed Books.
Dalby, Simon, (2007), ‘Anthropocene geopolitics: globalisation, empire, environment
and critique’, Geography Compass, 1: 103–118.
Fagan, Madeleine (2017) “Security in the Anthropocene.” European Journal of
International Relations 23(2): 292–314.
Hamilton, S. (2018). The measure of all things? The Anthropocene as a global
biopolitics of carbon. European Journal of International Relations, 24(1), 33-57.
Hardt, Judith Nora (2017) Environmental Security in the Anthropocene. London:
Routledge.
Harrington, Cameron (2016) ‘The Ends of the World: International Relations and the
Anthropocene’, Millennium, 44: 478-498.
Kim, C. J. (2021) ‘Dugong v. Rumsfeld: social movements and the construction of
ecological security’, European Journal of International Relations, 27: 258–280.
Klare, Michael (2002) Resource Wars. New York: Henry Holt and Company.
Klein, Naomi (2015) This Changes Everything: Capitalism vs. the Climate. London:
Penguin.
Parenti, Christian (2011) Tropic of Chaos: Climate Change and the New Geography
of Violence. New York: Nation Books.
Rothe, Delf (2020) ‘Jellyfish encounters: science, technology and security in the
Anthropocene ocean’, Critical Studies on Security, 8: 145-159.
Ruddick, Sue (2015) ‘Situating the Anthropocene: Planetary Urbanization and the
Anthropological Machine’, Urban Geography 36: 1113–30.
Welzer, Harald (2012) Climate Wars: What People Will be Killed for in the 21st
Century. London: Polity Press.
Core reading
1. Rushton, S. (2011) ‘Global Health Security: Security for whom? Security from
what?’ Political studies. [Online] 59 (4), 779–796. Available from:
doi:10.1111/j.1467-9248.2011.00919.x. [Resource List]
2. Atlas, R. M. (1999) ‘Combating the Threat of Biowarfare and Bioterrorism:
Defending against Biological Weapons is Critical to Global Security’,
Bioscience, 49(6): 465 – 477. [Resource List]
Tutorial reading
3. McLeish, C. and Nightingale, P. (2007) ‘Biosecurity, bioterrorism and the
governance of science: The increasing convergence of science and security
policy’, Research Policy, 36(10): 1635-1654. [Resource List]
Bioterrorism
Atlas, R.M. (1998) ‘The medical threat of biological weapons’, Critical Reviews in
Microbiology 24: 157–168
Declercq, W., Geairon, Y., Bravo Navarro, C., Quintart, A., Vassiliou, A. (2021) ‘The
Threat of Bioterrorism: A Global Security Challenge’, Finabel, June 2021. Available
at: https://finabel.org/wp-content/uploads/2021/06/21.-Bioterrorism-1.pdf
Derbes, V.J. (1966) ‘De Musis and the great plague of 1348: A forgotten episode of
bacteriological war’, Journal of the American Medical Association 196: 59–62
Fidler, D. P. (2003) ‘Public Health and National Security in the Global Age: Infectious
Diseases, Bioterrorism, and Realpolitik’, The George Washington International Law
Review, 35(4): 787-856.
Guillemin, J. (2006) Biological Weapons: From the Invention of State-Sponsored
Programs to Contemporary Bioterrorism. New York: Columbia University Press.
Henderson D.A (1998) ‘Bioterrorism as a health threat’, Emerging Infectious
Diseases 4: 488–492.
Karwa, M., Currie, B. and Kvetan, V. (2005) ‘Bioterrorism: Preparing for the
impossible or the improbable’, Critical Care Medicine, 33(1): S75-S95.
Kittelsen, S. (2009) ‘Conceptualizing Biorisk: Dread Risk and the Threat of
Bioterrorism in Europe’, Security Dialogue, 40(1): 51-71.
Meselson, M.J., Guillemin, M., Hugh-Jones A Langmuir I Popova A Shelokov A
Yampolskaya O. (1994) ‘The Sverdlovsk anthrax outbreak of 1979’, Science 266:
1202–1208.
Ostfield, M. L. (2004) ‘Bioterrorism as a Foreign Policy Issue’, The SAIS Review of
International Affairs, 24(1): 131-146.
Parachini, J. V. and Gunaratna, R. K. (2022) ‘Implications of the Pandemic for
Terrorist Interest in Biological Weapons’, RAND Report, May 2022. Available at:
https://www.rand.org/pubs/research_reports/RRA612-1.html
Parker, L. (2013) ‘Bioterrorism and Intelligence’, Global Security Studies, 4(3): 53-63.
WEEK 8 – Deterrence in the 21st century (guest lecturer: Nicholas Taylor, DSTL)
Core reading
1. Payne, K. (2003) The Fallacies of Cold War Deterrence and a New
Direction. Comparative Strategy. 22 (5), 411–428. Available from:
doi:10.1080/01495930390261431. [Resource List]
2. Knopf, J.W. (2010) The Fourth Wave in Deterrence Research.
Contemporary Security Policy. 31 (1), 1–33. Available from:
doi:10.1080/13523261003640819.[Resource List]
Tutorial reading
3. Freedman, L. (2021) ‘Introduction—The Evolution of Deterrence
Strategy and Research’, in Osinga F., Sweijs T. (eds), NL ARMS
Netherlands Annual Review of Military Studies 2020. T.M.C. Asser
Press, The Hague. [Resource List]
Further reading
* The volume from which your tutorial reading comes is entitled NL ARMS 2020 –
Deterrence in the 21 st Century – Insigts from Theory and Practice, and is
available open access, with useful readings on subjects such as Russian
and Chinese concepts of deterrence, extended deterrence and ‘cyber
deterrence’, amongst other
things. https://www.asser.nl/asserpress/books/?rId=13965
* Deni, John R. (2018) ‘Alternative Deterrence in Modern Great Power Competition’,
Strategy Research Project Report (US Army War College, Carlisle Barracks).
* Friis, Karsten (2017) NATO and Collective Defence in the 21st Century: An
Assessment of the Warsaw Summit (Taylor & Francis).
* Haley, Frederick III M. (2018) A Modern Theory of Nuclear Deterrence:
Understanding 21st Century US Nuclear Posture Requirements (US Army
School for Advanced Military Studies, Fort Leavenworth) <available at:
https://apps.dtic.mil/sti/citations/AD1087267 >
* Morgan, Patrick M. (n.d.) ‘The Concept of Deterrence and Deterrence Theory’ in
Oxford Research Encyclopedia of Politics (OUP).
* Prior, Tim (2018) ‘Resilience: The “Fifth Wave” in the Evolution of Deterrence’ in
Strategic Trends 2018 (ETH Zurich), 63-80.
Adler, E. and Greve, P. (2009) ‘When security community meets balance of power:
overlapping regional mechanisms of security governance’, Review of
International Studies 35:S1, 59-84.
Adler, E. and M. Barnett (eds) (1998) Security Communities. Cambridge: Cambridge
University Press.
Brooks, S.G. and W.C. Wohlforth (2008) World Out of Balance: International
Relations and the Challenge of American Primacy. Princeton: Princeton
University Press.
Caporaso, J. A. (1992) ‘International Relations Theory and Multilateralism: the
Search for Foundations’, International Organization 46:3, 599-632.
Core reading
1. Barkawi, T. (2016) ‘Decolonising War’, European Journal of International
Security, 1(2): 199-214. [Resource List]
2. Barkawi, T. and Laffey, M. (2006) ’The Postcolonial Moment in Security
Studies’, Review of International Studies, 32(2): 329 -352. [Resource
List]
Tutorial reading
3. Howell, A. and Richter-Montpetit, M. (2020) ‘Is securitization theory racist?
Civilizationism, methodological whiteness, and antiblack thought in the
Copenhagen School’, Security Dialogue, 51(1): 3-22. [Resource List]
Further reading
Barkawi, T. (2004) ‘On the pedagogy of “small wars”’, International Affairs, 80(1): 19-
37.
Benzing, B. (2019) “Whom You Don’t Know, You Don’t Trust: Vernacular Security
Distrust and Its Exclusionary Effect in Post-Conflict Societies.” Journal of Global
Security Studies 5 (1): 97–109.
Bilgin, P. (2009) ‘The International Political ‘Sociology of a Not So International
Discipline’, International Political Sociology, 3(3): 338-342.
Bilgin, P. (2010) ‘The ‘Western-Centrism of Security Studies: ‘Blind Spot’ or
Constitutive Practice?’, Security Dialogue, 41(6): 615-622.
Chukwuma, K. H. (2022) ‘Critical terrorism studies and postcolonialism: constructing
ungoverned spaces in counter-terrorism discourse in Nigeria’, Critical Studies on
Terrorism, 15(2): 399-416.
Doty, R. L. (1996) Imperial Encounters: The Politics of Representation in North-
South Relations. Minneapolis: University of Minnesota Press.
Core reading
1. Sjoberg, L. (2012) ‘Gender, Structure, and War: What Waltz Couldn’t See’,
International Theory 4(1): 1–38. [Resource List]
2. Bergman Rosamond, A. & Kronsell, A. (2018) ’Cosmopolitan militaries and
dialogic peacekeeping: Danish and Swedish women soldiers in Afghanistan’,
International Feminist Journal of Politics, 20:2, 172-187. [Resource List]
3. Wibben, A. (2018) “Why we need to study (US) militarism: A critical feminist
lens”, Security Dialogue, 49(1-2): 136-148. [Resource List]
Tutorial reading
4. Wibben, A. (2020) “Everyday Security, Feminism, and the Continuum of
Violence”, Journal of Global Security Studies, 5(1): 115-121.
Further reading
Agius, C. Bergman Rosamond, A. and Kinnvall, C. (2020) “Populism, ontological
insecurity and gendered nationalism: Masculinity, climate denial and Covid-19”
Politics, Religion and Ideology, 21:4, 432-450.
Cohn, C., F. Hill and S. Ruddick (2005) The Relevance of Gender for Eliminating
Weapons of Mass Destruction. Weapons of Mass Destruction Commission.
Daigle, Megan D. From Cuba with Love: Sex and Money in the Twenty-First Century.
Oakland, California: University of California Press, 2015.
Duncanson, Claire and Catherine Eschle (2008) ‘Gender and the Nuclear Weapons
State: A Feminist Critique of the UK Government's White Paper on Trident’
New Political Science 30:4 pp. 545-63.
Hansen, L. (2000) ‘The Little Mermaid's Silent Security Dilemma and the Absence of
Gender in the Copenhagen School’, Millennium: Journal of International
Studies 29:2, 285-306.
Hansen, L. (2000) ‘Gender, Nation, Rape: Bosnia and the Construction of Security’,
International Feminist Journal of Politics, Vol. 3:1, 55-57.
Hesford, Victoria, and Lisa Diedrich. “Introduction: Thinking Feminism in a Time of
War.” In Feminist Time Against Nation Time: Gender, Politics, and the Nation-
State in an Age of Permanent War, edited by Victoria Hesford and Lisa
Diedrich, 1–22. Lanham, MD: Rowman & Littlefield, 2010.
You can also contact the Student Disability and Learning Support Service, based on
the University of Edinburgh, Third Floor, Main Library, You can find their details as
well as information on all of the support they can offer at:
http://www.ed.ac.uk/student-disability-service
The study development resources are available at ‘Study Hub’. Follow the link from
the IAD Study Development web page: www.ed.ac.uk/iad/undergraduates. This page
also offers links to workshops on study skills and Exam Bootcamp, a self-enrol online
resource to help students do well in exams
Workshops are interactive: they will give you the chance to take part in activities,
have discussions, exchange strategies, share ideas and ask questions. They are 90
minutes long and held on Wednesday afternoons at 1.30pm or 3.30pm. The
schedule is available from the IAD Undergraduate web page (see above).
Workshops are open to all undergraduates but you need to book in advance, using
the MyEd booking system. Each workshop opens for booking two weeks before the
date of the workshop itself. If you book and then cannot attend, please cancel in
advance through MyEd so that another student can have your place. (To be fair to all
students, anyone who persistently books on workshops and fails to attend may be
barred from signing up for future events).
Study Development Advisors are also available for an individual consultation if you
have specific questions about your own approach to studying, working more
effectively, strategies for improving your learning and your academic work. Please
note, however, that Study Development Advisors are not subject specialists so they
cannot comment on the content of your work. They also do not check or proof read
students' work.
We will discuss these topics frankly and openly (which is not the same as bluntly).
And we will discuss these topics sensitively – that is, with the expectation that our
cohort includes a variety of backgrounds and experiences, some of which may be
quite close to the topics in question.
You should read this Course Guide carefully and if there are any topics that you may
feel distressed by you should seek advice from the course convenor and/or your
Personal Tutor.
For more general issues you may consider seeking the advice of the Student
Counselling Service, http://www.ed.ac.uk/schools-departments/student-counselling
Tutorial Allocation
You will be automatically assigned to a Tutorial group by the beginning of week 1.
This allocation is done using Student Allocator, a tool which will randomly assign you
to a suitable tutorial group based on your timetable. The benefits of this system are
that students will be able to instantly view their tutorial group on their personal
timetable and timetable clashes will be more easily avoided.
Please check your timetable regularly in week 1 to see which group you have been
assigned. Guidance on how to view your personalised timetable can be found at:
https://www.ed.ac.uk/timetabling-examinations/timetabling/personalised-timetables/
student-timetables
Please note that there are limited spaces in tutorial groups and there will be little
room for movement. If you are unable to attend the tutorial group you have been
allocated for a valid reason, you can submit a change request by completing the
online Tutorial Change Request form. You can access the form via the Timetabling
webpages here
*Exam number
*Course
*Policy brief title
*Word count
Marker’s name
*If you consent for the School to retain a copy of your coursework and make it available to
other students to assist them in completing their assignment, please check the box below.
Where your work is made available, it will be anonymized. Please be sure to read the full
details of our coursework retention policy here before providing your consent.
I consent to my coursework being retained for the purpose stated above ☐.
NOTE: Essay marks are reviewed by another member of staff prior to being returned
to students
Initial Mark
Word count penalties
Lateness penalties
Adjusted Mark
Overview
Aspect of performance + Avg -
Research Effort
Understanding
Quality of Analysis
Evaluation of Options and Recommendation
Presentation
*Exam number
Course
*Essay title
*Word Count
Marker’s name
* If you consent for the School to retain a copy of your coursework and make it available to other
students to assist them in completing their assessment, please check the box below. Where your work
is made available, it will be anonymized. Please be sure to read the full details of our coursework
retention policy here before providing your consent.
I consent to my coursework being retained for the purpose stated above Yes/No
Initial Mark
Word count penalties
Late submission penalties
Adjusted Mark
Overview
Aspect of performance + Avg -
Thinking skills (criticism, analysis, interpretation, logic,
argumentation, evaluation, use of comparison,
anticipating counter-arguments, etc.)
Comprehension (accuracy in facts, details and
representation of authors’ views, breadth of reading,
grasp of major issues, etc.)
Writing skills (structure and organisation, clarity,
precision, grammar/spelling, use of illustration, style,
etc.)
Academic integrity (referencing, acknowledgement of
sources, source text placed in quotation marks with page
numbers provided, writing in ‘own voice’)
This and
future essays
could be
improved by…
Average ____
Marker comments: