International Security – Postgraduate Course Syllabus

Course Description

The aim of the course is to provide students with a broad theoretical basis in the field and to prepare them for further research and employment in the field of International Security. There are many dramatic issues in international security, such as wars, conflicts, terrorism, drone attacks, interventions, and cyber threats. The course helps students understand and explain these events by giving them the right tools to think about them.

Students will explore, compare, and debate the merits of key security concepts through in-depth discussion to develop a solid understanding of the various theoretical and practical perspectives. In each lecture, we will place these theories and concepts in their historical context, show how they contribute to a better understanding of international security, and assess their strengths and weaknesses.

Applying the Aristotelian method of teaching, I will focus on developing both the intellectual and moral virtues of students. Intellectual virtues are character traits such as the ability to judge the truth and comprehend the nature of things, whereas moral virtues are habits of living that involve the whole person and include justice, temperance, prudence, and fortitude, which are characterised by desire and emotion.

In addition, the course is designed with the following implications in mind: to understand the diverse backgrounds of undergraduate students, to provide full support to non-native speakers in relation to academic English, and to engage the students in practical discussions and seminars. An inclusive curriculum implements policies and resources to ensure that all students are supported in their learning.

Learning Objectives and Outcomes

  • Analyse and apply diverse theoretical approaches to advanced security thoughts.
  • Examine critically the reasons for cooperation and conflict in international relations.
  • Engage in contemporary theoretical discussions in both, international and national security.
  • Construct and defend theoretically sophisticated arguments regarding international security.
  • Learn to think and write critically about crucial concepts in international security studies.
  • Effective oral and written communication in professional applications of security scholarship.
  • Develop innovative ways of thinking about the practical implications of security relations (cyberthreats, drone strikes, terrorism, conflicts, hybrid threats, artificial intelligence). 

Reading Materials

Foundation texts

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

Additionally, recommended readings based on scholarly articles are provided for each lecture to introduce students to academic analytical and critical thinking. The quality of teaching, course content, and literature included reflects the advanced practice of worldwide recognized departments of politics and international relations.

Course Content

Lecture 1: Post-Cold War Security Reflections

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Thinking about Security after the Cold War

Recommended Reading

  • Adler, E. (2008) ‘The Spread of Security Communities: Communities of Practice, Self-Restraint, and NATO’s Post—Cold War Transformation’, European Journal of International Relations, 14(2), pp. 195–230. Available at: https://doi.org/10.1177/1354066108089241.
  • Bennett, D.S. (1996) ‘Security, Bargaining, and the End of Interstate Rivalry’, International Studies Quarterly, 40(2), p. 157. Available at: https://doi.org/10.2307/2600955.
  • Buzan, B. (2003) ‘Security architecture in Asia: the interplay of regional and global levels’, The Pacific Review, 16(2), pp. 143–173. Available at: https://doi.org/10.1080/0951274032000069660.
  • de Mesquita, B.B. et al. (1999) ‘An Institutional Explanation of the Democratic Peace’, American Political Science Review, 93(4), pp. 791–807. Available at: https://doi.org/10.2307/2586113.
  • Dorussen, H. (2001) ‘Mixing Carrots with Sticks: Evaluating the Effectiveness of Positive Incentives’, Journal of Peace Research, 38(2), pp. 251–262. Available at: https://doi.org/10.1177/0022343301038002009.
  • Dunne, T. (2004) ‘“When the shooting starts”: Atlanticism in British security strategy’, International Affairs, 80(5), pp. 893–909. Available at: https://doi.org/10.1111/j.1468-2346.2004.00424.x.
  • Forsberg, T. (2019) ‘Russia and the European security order revisited: from the congress of Vienna to the post-cold war’, European Politics and Society, 20(2), pp. 154–171. Available at: https://doi.org/10.1080/23745118.2018.1545182.
  • Frederking, B. (2003) ‘Constructing Post-Cold War Collective Security’, American Political Science Review, 97(03). Available at: https://doi.org/10.1017/S0003055403000741.
  • Goldgeier, J.M. and McFaul, M. (1992) ‘A tale of two worlds: core and periphery in the post-cold war era’, International Organization, 46(2), pp. 467–491. Available at: https://doi.org/10.1017/S0020818300027788.
  • Græger, N. (2005) ‘Norway between NATO, the EU, and the US: A Case Study of Post-Cold War Security and Defence Discourse’, Cambridge Review of International Affairs, 18(1), pp. 85–103. Available at: https://doi.org/10.1080/09557570500059605.
  • Humphreys, J. and Smith, M.L.R. (2011) ‘War and wildlife: the Clausewitz connection’, International Affairs, 87(1), pp. 121–142. Available at: https://doi.org/10.1111/j.1468-2346.2011.00963.x.
  • Hurrell, A. (2006) ‘Hegemony, liberalism and global order: what space for would-be great powers?’, International Affairs, 82(1), pp. 1–19. Available at: https://doi.org/10.1111/j.1468-2346.2006.00512.x.
  • Lustick, I.S. (1997) ‘The Absence of Middle Eastern Great Powers: Political “Backwardness” in Historical Perspective’, International Organization, 51(4), pp. 653–683. Available at: https://doi.org/10.1162/002081897550483.
  • Maoz, Z. and Russett, B. (1993) ‘Normative and Structural Causes of Democratic Peace, 1946–1986’, American Political Science Review, 87(3), pp. 624–638. Available at: https://doi.org/10.2307/2938740.
  • Meernik, J., Krueger, E.L. and Poe, S.C. (1998) ‘Testing Models of U.S. Foreign Policy: Foreign Aid during and after the Cold War’, The Journal of Politics, 60(1), pp. 63–85. Available at: https://doi.org/10.2307/2648001.
  • Oneal, J.R. et al. (1996) ‘The Liberal Peace: Interdependence, Democracy, and International Conflict, 1950-85’, Journal of Peace Research, 33(1), pp. 11–28. Available at: https://doi.org/10.1177/0022343396033001002.
  • Risse-Kappen, T. (1994) ‘Ideas do not float freely: transnational coalitions, domestic structures, and the end of the cold war’, International Organization, 48(2), pp. 185–214. Available at: https://doi.org/10.1017/S0020818300028162.
  • Rousseau, D.L. et al. (1996) ‘Assessing the Dyadic Nature of the Democratic Peace, 1918–88’, American Political Science Review, 90(3), pp. 512–533. Available at: https://doi.org/10.2307/2082606.
  • Sakwa, R. (2015) ‘The death of Europe? Continental fates after Ukraine’, International Affairs, 91(3), pp. 553–579. Available at: https://doi.org/10.1111/1468-2346.12281.
  • Shifrinson, J.R.I. (2016) ‘Deal or No Deal? The End of the Cold War and the U.S. Offer to Limit NATO Expansion’, International Security, 40(4), pp. 7–44. Available at: https://doi.org/10.1162/ISEC_a_00236.
  • Smith, A. and Stam, A.C. (2004) ‘Bargaining and the Nature of War’, Journal of Conflict Resolution, 48(6), pp. 783–813. Available at: https://doi.org/10.1177/0022002704268026.
  • Wallander, C.A. (2000) ‘Institutional Assets and Adaptability: NATO After the Cold War’, International Organization, 54(4), pp. 705–735. Available at: https://doi.org/10.1162/002081800551343.
  • Webber, M. et al. (2004) ‘The governance of European security’, Review of International Studies, 30(1), pp. 3–26. Available at: https://doi.org/10.1017/S0260210504005807.
  • White, R.K. (1949) ‘Hitler, Roosevelt, and the nature of war propaganda.’, The Journal of Abnormal and Social Psychology, 44(2), pp. 157–174. Available at: https://doi.org/10.1037/h0056667.
  • Williams, M.C. and Neumann, I.B. (2000) ‘From Alliance to Security Community: NATO, Russia, and the Power of Identity’, Millennium: Journal of International Studies, 29(2), pp. 357–387. Available at: https://doi.org/10.1177/03058298000290020801.

Lecture 2: IR Theories and Security Studies after the Cold War

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Theorizing about Security after the Cold War

Recommended Reading

  • Acharya, A. (2001) ‘Human Security: East versus West’, International Journal, 56(3), p. 442. Available at: https://doi.org/10.2307/40203577.
  • Adler, E. (1997) ‘Imagined (Security) Communities: Cognitive Regions in International Relations’, Millennium: Journal of International Studies, 26(2), pp. 249–277. Available at: https://doi.org/10.1177/03058298970260021101.
  • Balzacq, T., Léonard, S. and Ruzicka, J. (2016) ‘“Securitization” revisited: theory and cases’, International Relations, 30(4), pp. 494–531. Available at: https://doi.org/10.1177/0047117815596590.
  • Browning, C.S. and McDonald, M. (2013) ‘The future of critical security studies: Ethics and the politics of security’, European Journal of International Relations, 19(2), pp. 235–255. Available at: https://doi.org/10.1177/1354066111419538.
  • Chandler, D. (2012) ‘Resilience and human security: The post-interventionist paradigm’, Security Dialogue, 43(3), pp. 213–229. Available at: https://doi.org/10.1177/0967010612444151.
  • Floyd, R. (2011) ‘Can securitization theory be used in normative analysis? Towards a just securitization theory’, Security Dialogue, 42(4–5), pp. 427–439. Available at: https://doi.org/10.1177/0967010611418712.
  • Guzzini, S. (2000) ‘A Reconstruction of Constructivism in International Relations’, European Journal of International Relations, 6(2), pp. 147–182. Available at: https://doi.org/10.1177/1354066100006002001.
  • Guzzini, S. (2005) ‘The Concept of Power: a Constructivist Analysis’, Millennium: Journal of International Studies, 33(3), pp. 495–521. Available at: https://doi.org/10.1177/03058298050330031301.
  • Hoogensen, G. and Stuvøy, K. (2006) ‘Gender, Resistance and Human Security’, Security Dialogue, 37(2), pp. 207–228. Available at: https://doi.org/10.1177/0967010606066436.
  • Howell, A. and Richter-Montpetit, M. (2020) ‘Is securitization theory racist? Civilizationism, methodological whiteness, and antiblack thought in the Copenhagen School’, Security Dialogue, 51(1), pp. 3–22. Available at: https://doi.org/10.1177/0967010619862921.
  • Hudson, H. (2005) ‘“Doing” Security As Though Humans Matter: A Feminist Perspective on Gender and the Politics of Human Security’, Security Dialogue, 36(2), pp. 155–174. Available at: https://doi.org/10.1177/0967010605054642.
  • Jarvis, L. and Lister, M. (2013) ‘Vernacular Securities and Their Study: A Qualitative Analysis and Research Agenda’, International Relations, 27(2), pp. 158–179. Available at: https://doi.org/10.1177/0047117812460880.
  • Kaldor, M., Martin, M. and Selchow, S. (2007) ‘Human security: a new strategic narrative for Europe’, International Affairs, 83(2), pp. 273–288. Available at: https://doi.org/10.1111/j.1468-2346.2007.00618.x.
  • King, G. and Murray, C.J.L. (2001) ‘Rethinking Human Security’, Political Science Quarterly, 116(4), pp. 585–610. Available at: https://doi.org/10.2307/798222.
  • Miller, B. and Saltzman, I.Z. (2016) ‘Beyond the three “isms”: Rethinking IR and the post-cold war order’, International Politics, 53(3), pp. 385–414. Available at: https://doi.org/10.1057/ip.2016.3.
  • Newman, E. (2010) ‘Critical human security studies’, Review of International Studies, 36(1), pp. 77–94. Available at: https://doi.org/10.1017/S0260210509990519.
  • Owen, T. (2004) ‘Human Security – Conflict, Critique and Consensus: Colloquium Remarks and a Proposal for a Threshold-Based Definition’, Security Dialogue, 35(3), pp. 373–387. Available at: https://doi.org/10.1177/0967010604047555.
  • Sørensen, G. (1998) ‘IR theory after the Cold War’, Review of International Studies, 24(5), pp. 83–100. Available at: https://doi.org/10.1017/S0260210598000837.
  • Stritzel, H. (2007) ‘Towards a Theory of Securitization: Copenhagen and Beyond’, European Journal of International Relations, 13(3), pp. 357–383. Available at: https://doi.org/10.1177/1354066107080128.
  • Suhrke, A. (1999) ‘Human Security and the Interests of States’, Security Dialogue, 30(3), pp. 265–276. Available at: https://doi.org/10.1177/0967010699030003002.
  • Thies, C.G. (2013) ‘The Roles of Bipolarity: A Role Theoretic Understanding of the Effects of Ideas and Material Factors on the Cold War’, International Studies Perspectives, 14(3), pp. 269–288. Available at: https://doi.org/10.1111/j.1528-3585.2012.00486.x.
  • Thomas, C. (2001) ‘Global governance, development and human security: exploring the links’, Third World Quarterly, 22(2), pp. 159–175. Available at: https://doi.org/10.1080/01436590120037018.
  • Vuori, J.A. (2008) ‘Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders’, European Journal of International Relations, 14(1), pp. 65–99. Available at: https://doi.org/10.1177/1354066107087767.
  • Wilkinson, C. (2007) ‘The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?’, Security Dialogue, 38(1), pp. 5–25. Available at: https://doi.org/10.1177/0967010607075964.
  • Williams, M.C. (2003) ‘Words, Images, Enemies: Securitization and International Politics’, International Studies Quarterly, 47(4), pp. 511–531. Available at: https://doi.org/10.1046/j.0020-8833.2003.00277.x.

Lecture 3: Contemporary Warfare and the State

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Understanding Contemporary War and Insecurity

Recommended Reading

  • Adger, W.N. (2010) ‘Climate Change, Human Well-Being and Insecurity’, New Political Economy, 15(2), pp. 275–292. Available at: https://doi.org/10.1080/13563460903290912.
  • Andreas, P. (2004) ‘The Clandestine Political Economy of War and Peace in Bosnia’, International Studies Quarterly, 48(1), pp. 29–52. Available at: https://doi.org/10.1111/j.0020-8833.2004.00290.x.
  • Barkawi, T. (2016) ‘Decolonising war’, European Journal of International Security, 1(2), pp. 199–214. Available at: https://doi.org/10.1017/eis.2016.7.
  • Boix, C. (2008) ‘Economic Roots of Civil Wars and Revolutions in the Contemporary World’, World Politics, 60(3), pp. 390–437. Available at: https://doi.org/10.1017/S0043887100009047.
  • Bremer, S.A. (1992) ‘Dangerous Dyads: Conditions Affecting the Likelihood of Interstate War, 1816-1965’, Journal of Conflict Resolution, 36(2), pp. 309–341. Available at: https://doi.org/10.1177/0022002792036002005.
  • Crescenzi, M.J.C. and Enterline, A.J. (1999) ‘Ripples from the Waves? A Systemic, Time-Series Analysis of Democracy, Democratization, and Interstate War’, Journal of Peace Research, 36(1), pp. 75–94. Available at: https://doi.org/10.1177/0022343399036001005.
  • Desch, M.C. (2008) ‘America’s Liberal Illiberalism: The Ideological Origins of Overreaction in U.S. Foreign Policy’, International Security, 32(3), pp. 7–43. Available at: https://doi.org/10.1162/isec.2008.32.3.7.
  • Gurr, T.R. (1994) ‘Peoples Against States: Ethnopolitical Conflict and the Changing World System: 1994 Presidential Address’, International Studies Quarterly, 38(3), p. 347. Available at: https://doi.org/10.2307/2600737.
  • Hameiri, S. (2009) ‘Capacity and its Fallacies: International State Building as State Transformation’, Millennium: Journal of International Studies, 38(1), pp. 55–81. Available at: https://doi.org/10.1177/0305829809335942.
  • Jessop, B. (2007) ‘From micro-powers to governmentality: Foucault’s work on statehood, state formation, statecraft and state power’, Political Geography, 26(1), pp. 34–40. Available at: https://doi.org/10.1016/j.polgeo.2006.08.002.
  • Kaplan, S. (2014) ‘Identifying Truly Fragile States’, The Washington Quarterly, 37(1), pp. 49–63. Available at: https://doi.org/10.1080/0163660X.2014.893173.
  • Kay, S.J. (1999) ‘Unexpected Privatizations: Politics and Social Security Reform in the Southern Cone’, Comparative Politics, 31(4), p. 403. Available at: https://doi.org/10.2307/422237.
  • Kocs, S.A. (1995) ‘Territorial Disputes and Interstate War, 1945-1987’, The Journal of Politics, 57(1), pp. 159–175. Available at: https://doi.org/10.2307/2960275.
  • Le Billon, P. (2001) ‘The political ecology of war: natural resources and armed conflicts’, Political Geography, 20(5), pp. 561–584. Available at: https://doi.org/10.1016/S0962-6298(01)00015-4.
  • Lees, N. (2021) ‘Why the English school needs conflict studies: Retheorising the place of war in international society’, Cambridge Review of International Affairs, 34(1), pp. 3–21. Available at: https://doi.org/10.1080/09557571.2019.1677555.
  • Liff, A.P. (2012) ‘Cyberwar: A New “Absolute Weapon”? The Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies, 35(3), pp. 401–428. Available at: https://doi.org/10.1080/01402390.2012.663252.
  • McMichael, P. (2013) ‘Land Grabbing as Security Mercantilism in International Relations’, Globalizations, 10(1), pp. 47–64. Available at: https://doi.org/10.1080/14747731.2013.760925.
  • Perlmutter, A. (1969) ‘The Praetorian State and the Praetorian Army: Toward a Taxonomy of Civil-Military Relations in Developing Polities’, Comparative Politics, 1(3), p. 382. Available at: https://doi.org/10.2307/421446.
  • Russett, B., Oneal, J.R. and Davis, D.R. (1998) ‘The Third Leg of the Kantian Tripod for Peace: International Organizations and Militarized Disputes, 1950–85’, International Organization, 52(3), pp. 441–467. Available at: https://doi.org/10.1162/002081898550626.
  • Schroeder, U.C., Chappuis, F. and Kocak, D. (2014) ‘Security Sector Reform and the Emergence of Hybrid Security Governance’, International Peacekeeping, 21(2), pp. 214–230. Available at: https://doi.org/10.1080/13533312.2014.910405.
  • Schwarz, R. (2008) ‘The political economy of state-formation in the Arab Middle East: Rentier states, economic reform, and democratization’, Review of International Political Economy, 15(4), pp. 599–621. Available at: https://doi.org/10.1080/09692290802260662.
  • Straus, S. (2012) ‘Wars do end! Changing patterns of political violence in sub-Saharan Africa’, African Affairs, 111(443), pp. 179–201. Available at: https://doi.org/10.1093/afraf/ads015.
  • Van den Heede, P., Ribbens, K. and Jansz, J. (2018) ‘Replaying Today’s Wars? A Study of the Conceptualization of Post-1989 Conflict in Digital “War” Games’, International Journal of Politics, Culture, and Society, 31(3), pp. 229–250. Available at: https://doi.org/10.1007/s10767-017-9267-5.
  • Williams, P.D. (2013) ‘Protection, Resilience and Empowerment: United Nations Peacekeeping and Violence against Civilians in Contemporary War Zones’, Politics, 33(4), pp. 287–298. Available at: https://doi.org/10.1111/1467-9256.12014.

Lecture 4: Intervention

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Dilemmas and Challenges of Intervention

Recommended Reading

  • Arbour, L. (2008) ‘The responsibility to protect as a duty of care in international law and practice’, Review of International Studies, 34(3), pp. 445–458. Available at: https://doi.org/10.1017/S0260210508008115.
  • Averre, D. and Davies, L. (2015) ‘Russia, humanitarian intervention and the Responsibility to Protect: the case of Syria’, International Affairs, 91(4), pp. 813–834. Available at: https://doi.org/10.1111/1468-2346.12343.
  • Ayoob, M. (2004) ‘Third World Perspectives on Humanitarian Intervention and International Administration’, Global Governance: A Review of Multilateralism and International Organizations, 10(1), pp. 99–118. Available at: https://doi.org/10.1163/19426720-01001009.
  • Bulley, D. (2010) ‘The politics of ethical foreign policy: A responsibility to protect whom?’, European Journal of International Relations, 16(3), pp. 441–461. Available at: https://doi.org/10.1177/1354066109350051.
  • Chesterman, S. (2011) ‘“Leading from Behind”: The Responsibility to Protect, the Obama Doctrine, and Humanitarian Intervention after Libya’, Ethics & International Affairs, 25(3), pp. 279–285. Available at: https://doi.org/10.1017/S0892679411000190.
  • Collier, P., Hoeffler, A. and Söderbom, M. (2004) ‘On the Duration of Civil War’, Journal of Peace Research, 41(3), pp. 253–273. Available at: https://doi.org/10.1177/0022343304043769.
  • DeMeritt, J.H.R. (2015) ‘Delegating Death: Military Intervention and Government Killing’, Journal of Conflict Resolution, 59(3), pp. 428–454. Available at: https://doi.org/10.1177/0022002713515406.
  • Droz-Vincent, P. (2020) ‘The Renewed “Struggle for Syria”: From the War “in” Syria to the War “over” Syria’, The International Spectator, 55(3), pp. 115–131. Available at: https://doi.org/10.1080/03932729.2020.1796007.
  • Dunford, R. and Neu, M. (2019) ‘The Responsibility to Protect in a world of already existing intervention’, European Journal of International Relations, 25(4), pp. 1080–1102. Available at: https://doi.org/10.1177/1354066119842208.
  • Evans, G. and Sahnoun, M. (2002) ‘The Responsibility to Protect’, Foreign Affairs, 81(6), p. 99. Available at: https://doi.org/10.2307/20033347.
  • Fortna, V.P. (2004) ‘Does Peacekeeping Keep Peace? International Intervention and the Duration of Peace After Civil War’, International Studies Quarterly, 48(2), pp. 269–292. Available at: https://doi.org/10.1111/j.0020-8833.2004.00301.x.
  • Henke, M.E. (2017) ‘Why did France intervene in Mali in 2013? Examining the role of Intervention Entrepreneurs’, Canadian Foreign Policy Journal, 23(3), pp. 307–323. Available at: https://doi.org/10.1080/11926422.2017.1352004.
  • Hildebrandt, T. et al. (2013) ‘The Domestic Politics of Humanitarian Intervention: Public Opinion, Partisanship, and Ideology’, Foreign Policy Analysis, 9(3), pp. 243–266. Available at: https://doi.org/10.1111/j.1743-8594.2012.00189.x.
  • Hoffman, D. (2004) ‘The civilian target in Sierra Leone and Liberia: Political power, military strategy, and humanitarian intervention’, African Affairs, 103(411), pp. 211–226. Available at: https://doi.org/10.1093/afraf/adh025.
  • Hultman, L., Kathman, J. and Shannon, M. (2013) ‘United Nations Peacekeeping and Civilian Protection in Civil War: UNITED NATIONS PEACEKEEPING AND CIVILIAN PROTECTION IN CIVIL WAR’, American Journal of Political Science, p. n/a-n/a. Available at: https://doi.org/10.1111/ajps.12036.
  • Jentleson, B.W. and Britton, R.L. (1998) ‘Still Pretty Prudent: Post-Cold War American Public Opinion on the Use of Military Force’, Journal of Conflict Resolution, 42(4), pp. 395–417. Available at: https://doi.org/10.1177/0022002798042004001.
  • Kuperman, A.J. (2013) ‘A Model Humanitarian Intervention? Reassessing NATO’s Libya Campaign’, International Security, 38(1), pp. 105–136. Available at: https://doi.org/10.1162/ISEC_a_00126.
  • Nincic, M. (1997) ‘Loss Aversion and the Domestic Context of Military Intervention’, Political Research Quarterly, 50(1), p. 97. Available at: https://doi.org/10.2307/449030.
  • Pattison, J. (2011) ‘The Ethics of Humanitarian Intervention in Libya’, Ethics & International Affairs, 25(3), pp. 271–277. Available at: https://doi.org/10.1017/S0892679411000256.
  • Peak, T. (2020) ‘Rescuing Humanitarian Intervention from Liberal Hegemony’, Global Responsibility to Protect, 13(1), pp. 37–59. Available at: https://doi.org/10.1163/1875-984X-2020X002.
  • Peksen, D. (2012) ‘Does Foreign Military Intervention Help Human Rights?’, Political Research Quarterly, 65(3), pp. 558–571. Available at: https://doi.org/10.1177/1065912911417831.
  • Reus-Smit, C. (2013) ‘The concept of intervention’, Review of International Studies, 39(5), pp. 1057–1076. Available at: https://doi.org/10.1017/S0260210513000296.
  • Spitka, T. (2018) ‘Mediating among Mediators: Building a Consensus in Multilateral Interventions’, International Negotiation, 23(1), pp. 125–154. Available at: https://doi.org/10.1163/15718069-23011132.
  • Thomas, N. and Tow, W.T. (2002) ‘The Utility of Human Security: Sovereignty and Humanitarian Intervention’, Security Dialogue, 33(2), pp. 177–192. Available at: https://doi.org/10.1177/0967010602033002006.
  • Weiss, T.G. (2004) ‘The Sunset of Humanitarian Intervention? The Responsibility to Protect in a Unipolar Era’, Security Dialogue, 35(2), pp. 135–153. Available at: https://doi.org/10.1177/0967010604044973.
  • Weller, M. (1999) ‘The Rambouillet Conference on Kosovo*’, International Affairs, 75(2), pp. 211–251. Available at: https://doi.org/10.1111/1468-2346.00069.
  • Wheeler, N.J. (1992) ‘Pluralist or Solidarist Conceptions of International Society: Bull and Vincent on Humanitarian Intervention’, Millennium: Journal of International Studies, 21(3), pp. 463–487. Available at: https://doi.org/10.1177/03058298920210030201.

Lecture 5: Alliances and Security Cooperation

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Collective Security, Alliances and Security Cooperation

Recommended Reading

  • Aldrich, R.J. (1998) ‘British intelligence and the Anglo‐American “Special Relationship” during the Cold War’, Review of International Studies, 24(3), pp. 331–351. Available at: https://doi.org/10.1017/S0260210598003313.
  • Aldrich, R.J. (2004) ‘Transatlantic intelligence and security cooperation’, International Affairs, 80(4), pp. 731–753. Available at: https://doi.org/10.1111/j.1468-2346.2004.00413.x.
  • Allison, R. (2004) ‘Regionalism, Regional Structures and Security Management in Central Asia’, International Affairs, 80(3), pp. 463–483. Available at: https://doi.org/10.1111/j.1468-2346.2004.00393.x.
  • Blankenship, B. and Lin-Greenberg, E. (2022) ‘Trivial Tripwires?: Military Capabilities and Alliance Reassurance’, Security Studies, 31(1), pp. 92–117. Available at: https://doi.org/10.1080/09636412.2022.2038662.
  • Cha, V.D. (2010) ‘Powerplay: Origins of the U.S. Alliance System in Asia’, International Security, 34(3), pp. 158–196. Available at: https://doi.org/10.1162/isec.2010.34.3.158.
  • Crocker, C.A., Hampson, F.O. and Aall, P. (2011) ‘Collective conflict management: a new formula for global peace and security cooperation?’, International Affairs, 87(1), pp. 39–58. Available at: https://doi.org/10.1111/j.1468-2346.2011.00959.x.
  • Gause, F. (2003) ‘BALANCING WHAT? THREAT PERCEPTION AND ALLIANCE CHOICE IN THE GULF’, Security Studies, 13(2), pp. 273–305. Available at: https://doi.org/10.1080/09636410490521271.
  • Græger, N. (2016) ‘European security as practice: EU–NATO communities of practice in the making?’, European Security, 25(4), pp. 478–501. Available at: https://doi.org/10.1080/09662839.2016.1236021.
  • Haacke, J. (2009) ‘The ASEAN Regional Forum: from dialogue to practical security cooperation?’, Cambridge Review of International Affairs, 22(3), pp. 427–449. Available at: https://doi.org/10.1080/09557570903104057.
  • Jervis, R. (1985) ‘From Balance to Concert: A Study of International Security Cooperation’, World Politics, 38(1), pp. 58–79. Available at: https://doi.org/10.2307/2010351.
  • Jones, D.M. and Jenne, N. (2016) ‘Weak states’ regionalism: ASEAN and the limits of security cooperation in Pacific Asia’, International Relations of the Asia-Pacific, 16(2), pp. 209–240. Available at: https://doi.org/10.1093/irap/lcv015.
  • Kim, T. (2011) ‘Why Alliances Entangle But Seldom Entrap States’, Security Studies, 20(3), pp. 350–377. Available at: https://doi.org/10.1080/09636412.2011.599201.
  • Koga, K. (2020) ‘Japan’s “Indo-Pacific” question: countering China or shaping a new regional order?’, International Affairs, 96(1), pp. 49–73. Available at: https://doi.org/10.1093/ia/iiz241.
  • Loewen, H. and Nabers, D. (2005) ‘Transregional security cooperation after September 11, 2001’, Asia Europe Journal, 3(3), pp. 333–346. Available at: https://doi.org/10.1007/s10308-005-0007-5.
  • Lynch, M. (1998) ‘Abandoning Iraq: Jordan’s alliances and the politics of state identity’, Security Studies, 8(2–3), pp. 347–388. Available at: https://doi.org/10.1080/09636419808429382.
  • Martill, B. and Sus, M. (2018) ‘Post-Brexit EU/UK security cooperation: NATO, CSDP+, or “French connection”?’, The British Journal of Politics and International Relations, 20(4), pp. 846–863. Available at: https://doi.org/10.1177/1369148118796979.
  • Mutschler, M.M. (2015) ‘Security Cooperation in Space and International Relations Theory’, in K.-U. Schrogl et al. (eds) Handbook of Space Security. New York, NY: Springer New York, pp. 41–56. Available at: https://doi.org/10.1007/978-1-4614-2029-3_71.
  • Resende-Santos, J. (2002) ‘The Origins of Security Cooperation in the Southern Cone’, Latin American Politics and Society, 44(4), p. 89. Available at: https://doi.org/10.2307/3176996.
  • Resnick, E.N. (2013) ‘Hang Together or Hang Separately? Evaluating Rival Theories of Wartime Alliance Cohesion’, Security Studies, 22(4), pp. 672–706. Available at: https://doi.org/10.1080/09636412.2013.844520.
  • Satake, T. and Hemmings, J. (2018) ‘Japan–Australia security cooperation in the bilateral and multilateral contexts’, International Affairs, 94(4), pp. 815–834. Available at: https://doi.org/10.1093/ia/iiy028.
  • Snyder, G.H. (1990) ‘ALLIANCE THEORY: A NEOREALIST FIRST CUT’, Journal of International Affairs, 44(1), pp. 103–123. Available at: https://www.jstor.org/stable/24357226.
  • Van Ness, P. (2008) ‘Designing a Mechanism for Multilateral Security Cooperation in Northeast Asia’, Asian Perspective, 32(4), pp. 107–126. Available at: https://doi.org/10.1353/apr.2008.0006.
  • Walt, S.M. (1992) ‘Alliances, Threats, and U.S. Grand Strategy: A Reply to Kaufmann and Labs’, Security Studies, 1(3), pp. 448–482. Available at: https://doi.org/10.1080/09636419209347478.
  • Weber, K. (1997) ‘Hierarchy Amidst Anarchy: A Transaction Costs Approach to International Security Cooperation’, International Studies Quarterly, 41(2), pp. 321–340. Available at: https://doi.org/10.1111/1468-2478.00044.
  • Wilkins, T.S. (2008) ‘Russo–Chinese Strategic Partnership: A New Form of Security Cooperation?’, Contemporary Security Policy, 29(2), pp. 358–383. Available at: https://doi.org/10.1080/13523260802284365.
  • Wilkins, T.S. (2012) ‘“Alignment”, not “alliance” – the shifting paradigm of international security cooperation: toward a conceptual taxonomy of alignment’, Review of International Studies, 38(1), pp. 53–76. Available at: https://doi.org/10.1017/S0260210511000209.

Lecture 6: Environmental Security

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Environmental Security

Recommended Reading

  • Allenby, B.R. (2000) ‘Environmental Security: Concept and Implementation’, International Political Science Review, 21(1), pp. 5–21. Available at: https://doi.org/10.1177/0192512100211001.
  • Benjaminsen, T.A. (2008) ‘Does Supply-Induced Scarcity Drive Violent Conflicts in the African Sahel? The Case of the Tuareg Rebellion in Northern Mali’, Journal of Peace Research, 45(6), pp. 819–836. Available at: https://doi.org/10.1177/0022343308096158.
  • Corry, O. (2014) ‘From Defense to Resilience: Environmental Security beyond Neo-liberalism’, International Political Sociology, 8(3), pp. 256–274. Available at: https://doi.org/10.1111/ips.12057.
  • de Wilde, J.H. (2008) ‘Environmental Security Deconstructed’, in H.G. Brauch et al. (eds) Globalization and Environmental Challenges. Berlin, Heidelberg: Springer Berlin Heidelberg (Hexagon Series on Human and Environmental Security and Peace), pp. 595–602. Available at: https://doi.org/10.1007/978-3-540-75977-5_45.
  • Detraz, N. (2009) ‘Environmental Security and Gender: Necessary Shifts in an Evolving Debate’, Security Studies, 18(2), pp. 345–369. Available at: https://doi.org/10.1080/09636410902899933.
  • Detraz, N. and Betsill, M.M. (2009) ‘Climate Change and Environmental Security: For Whom the Discourse Shifts’, International Studies Perspectives, 10(3), pp. 303–320. Available at: https://doi.org/10.1111/j.1528-3585.2009.00378.x.
  • Elliott, L. (2015) ‘Human security/environmental security’, Contemporary Politics, 21(1), pp. 11–24. Available at: https://doi.org/10.1080/13569775.2014.993905.
  • Grove, K.J. (2010) ‘Insuring “Our Common Future?” Dangerous Climate Change and the Biopolitics of Environmental Security’, Geopolitics, 15(3), pp. 536–563. Available at: https://doi.org/10.1080/14650040903501070.
  • Haldén, P. (2011) ‘The past, present and future(s) of environmental security studies’, Cooperation and Conflict, 46(3), pp. 406–414. Available at: https://doi.org/10.1177/0010836711407660.
  • Hay, C. (1994) ‘Environmental security and state legitimacy’, Capitalism Nature Socialism, 5(1), pp. 83–97. Available at: https://doi.org/10.1080/10455759409358577.
  • Koff, H. (2016) ‘Reconciling Competing Globalizations through Regionalisms? Environmental Security in the Framework of Expanding Security Norms and Narrowing Security Policies’, Globalizations, 13(6), pp. 664–682. Available at: https://doi.org/10.1080/14747731.2015.1133044.
  • Litfin, K.T. (1999) ‘Constructing Environmental Security and Ecological Interdependence’, Global Governance: A Review of Multilateralism and International Organizations, 5(3), pp. 359–377. Available at: https://doi.org/10.1163/19426720-00503005.
  • Mason, M. and Zeitoun, M. (2013) ‘Questioning environmental security: Questioning environmental security’, The Geographical Journal, 179(4), pp. 294–297. Available at: https://doi.org/10.1111/geoj.12030.
  • Methmann, C. and Oels, A. (2015) ‘From “fearing” to “empowering” climate refugees: Governing climate-induced migration in the name of resilience’, Security Dialogue, 46(1), pp. 51–68. Available at: https://doi.org/10.1177/0967010614552548.
  • Rothe, D. (2017) ‘Seeing like a satellite: Remote sensing and the ontological politics of environmental security’, Security Dialogue, 48(4), pp. 334–353. Available at: https://doi.org/10.1177/0967010617709399.
  • Schilling, J. et al. (2017) ‘Resilience and environmental security: towards joint application in peacebuilding’, Global Change, Peace & Security, 29(2), pp. 107–127. Available at: https://doi.org/10.1080/14781158.2017.1305347.
  • Soroos, M.S. (1994) ‘Global Change, Environmental Security, and the Prisoner’s Dilemma’, Journal of Peace Research, 31(3), pp. 317–332. Available at: https://doi.org/10.1177/0022343394031003006.
  • Stalley, P. (2003) ‘Environmental Scarcity and International Conflict’, Conflict Management and Peace Science, 20(2), pp. 33–58. Available at: https://doi.org/10.1177/073889420302000202.
  • Stokke, O.S. (2011) ‘Environmental Security in the Arctic: The Case for Multilevel Governance’, International Journal: Canada’s Journal of Global Policy Analysis, 66(4), pp. 835–848. Available at: https://doi.org/10.1177/002070201106600412.
  • Theisen, O.M., Holtermann, H. and Buhaug, H. (2012) ‘Climate Wars? Assessing the Claim That Drought Breeds Conflict’, International Security, 36(3), pp. 79–106. Available at: https://doi.org/10.1162/ISEC_a_00065.
  • Trombetta, M.J. (2008) ‘Environmental security and climate change: analysing the discourse’, Cambridge Review of International Affairs, 21(4), pp. 585–602. Available at: https://doi.org/10.1080/09557570802452920.
  • Turner, M.D. (2004) ‘Political ecology and the moral dimensions of “resource conflicts”: the case of farmer–herder conflicts in the Sahel’, Political Geography, 23(7), pp. 863–889. Available at: https://doi.org/10.1016/j.polgeo.2004.05.009.
  • Walker, J. and Cooper, M. (2011) ‘Genealogies of resilience: From systems ecology to the political economy of crisis adaptation’, Security Dialogue, 42(2), pp. 143–160. Available at: https://doi.org/10.1177/0967010611399616.

Lecture 7: Geopolitical Struggle for Natural Resources

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • The Struggle for Resources: Oil and Water

Recommended Reading

Lecture 8: Security Implications of Migration

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • People on the Move: Migration as a Security Issue

Recommended Reading

  • Adamson, F.B. (2006) ‘Crossing Borders: International Migration and National Security’, International Security, 31(1), pp. 165–199. Available at: https://doi.org/10.1162/isec.2006.31.1.165.
  • Alexseev, M.A. (2011) ‘Societal security, the security dilemma, and extreme anti-migrant hostility in Russia’, Journal of Peace Research, 48(4), pp. 509–523. Available at: https://doi.org/10.1177/0022343311406155.
  • Alexseev, M.A. and Hofstetter, C.R. (2006) ‘Russia, China, and the Immigration Security Dilemma’, Political Science Quarterly, 121(1), pp. 1–32. Available at: https://doi.org/10.1002/j.1538-165X.2006.tb00563.x.
  • Alkopher, T.D. and Blanc, E. (2017) ‘Schengen area shaken: the impact of immigration-related threat perceptions on the European security community’, Journal of International Relations and Development, 20(3), pp. 511–542. Available at: https://doi.org/10.1057/s41268-016-0005-9.
  • Avdan, N. (2014) ‘Do asylum recognition rates in Europe respond to transnational terrorism? The migration-security nexus revisited’, European Union Politics, 15(4), pp. 445–471. Available at: https://doi.org/10.1177/1465116514534908.
  • Baele, S.J. and Sterck, O.C. (2015) ‘Diagnosing the Securitisation of Immigration at the EU Level: A New Method for Stronger Empirical Claims’, Political Studies, 63(5), pp. 1120–1139. Available at: https://doi.org/10.1111/1467-9248.12147.
  • Bove, V., Böhmelt, T. and Nussio, E. (2021) ‘Terrorism abroad and migration policies at home’, Journal of European Public Policy, 28(2), pp. 190–207. Available at: https://doi.org/10.1080/13501763.2020.1729227.
  • Cannon, B.J. and Fujibayashi, H. (2018) ‘Security, structural factors and sovereignty: Analysing reactions to Kenya’s decision to close the Dadaab refugee camp complex’, African Security Review, 27(1), pp. 20–41. Available at: https://doi.org/10.1080/10246029.2017.1408475.
  • de Jong, S. (2022) ‘Resettling Afghan and Iraqi interpreters employed by Western armies: The Contradictions of the Migration–Security Nexus’, Security Dialogue, 53(3), pp. 220–237. Available at: https://doi.org/10.1177/09670106211050811.
  • Eichler, J. (2020) ‘Immigration in France and its security consequences’, Vojenské rozhledy, 29(4), pp. 003–022. Available at: https://doi.org/10.3849/2336-2995.29.2020.04.003-022.
  • Fakhoury, T. (2016) ‘Securitising Migration: The European Union in the Context of the Post-2011 Arab Upheavals’, The International Spectator, 51(4), pp. 67–79. Available at: https://doi.org/10.1080/03932729.2016.1245463.
  • Hammerstad, A. (2000) ‘Whose Security?: UNHCR, Refugee Protection and State Security After the Cold War’, Security Dialogue, 31(4), pp. 391–403. Available at: https://doi.org/10.1177/0967010600031004002.
  • Holvikivi, A. and Reeves, A. (2020) ‘Women, Peace and Security after Europe’s “refugee crisis”’, European Journal of International Security, 5(2), pp. 135–154. Available at: https://doi.org/10.1017/eis.2020.1.
  • Ilgit, A. and Klotz, A. (2014) ‘How far does “societal security” travel? Securitization in South African immigration policies’, Security Dialogue, 45(2), pp. 137–155. Available at: https://doi.org/10.1177/0967010613519161.
  • Karatrantos, T. (2021) ‘Migration and Security: The Case of Greece’, in T. Joensen and I. Taylor (eds) Small States and the European Migrant Crisis. Cham: Springer International Publishing, pp. 113–131. Available at: https://doi.org/10.1007/978-3-030-66203-5_6.
  • Lahav, G. and Courtemanche, M. (2012) ‘The Ideological Effects of Framing Threat on Immigration and Civil Liberties’, Political Behavior, 34(3), pp. 477–505. Available at: https://doi.org/10.1007/s11109-011-9171-z.
  • Léonard, S. and Kaunert, C. (2022) ‘The securitisation of migration in the European Union: Frontex and its evolving security practices’, Journal of Ethnic and Migration Studies, 48(6), pp. 1417–1429. Available at: https://doi.org/10.1080/1369183X.2020.1851469.
  • Light, M.T. and Thomas, J.T. (2021) ‘Undocumented immigration and terrorism: Is there a connection?’, Social Science Research, 94, p. 102512. Available at: https://doi.org/10.1016/j.ssresearch.2020.102512.
  • Loescher, G. and Milner, J. (2005) ‘The long road home: Protracted refugee situations in Africa’, Survival, 47(2), pp. 153–174. Available at: https://doi.org/10.1080/00396330500156636.
  • Mirilovic, N. (2010) ‘The Politics of Immigration: Dictatorship, Development, and Defense’, Comparative Politics, 42(3), pp. 273–292. Available at: https://doi.org/10.5129/001041510X12911363509675.
  • Mwangi, O.G. (2019) ‘The “Somalinisation” of terrorism and counterterrorism in Kenya: the case of refoulement’, Critical Studies on Terrorism, 12(2), pp. 298–316. Available at: https://doi.org/10.1080/17539153.2018.1498190.
  • Savun, B. and Gineste, C. (2019) ‘From protection to persecution: Threat environment and refugee scapegoating’, Journal of Peace Research, 56(1), pp. 88–102. Available at: https://doi.org/10.1177/0022343318811432.
  • Totten, R.J. (2015) ‘Epidemics, national security, and US immigration policy’, Defense & Security Analysis, 31(3), pp. 199–212. Available at: https://doi.org/10.1080/14751798.2015.1056940.
  • Veebel, V. and Markus, R. (2015) ‘Europe´s Refugee Crisis in 2015 and Security Threats from the Baltic Perspective’, Journal of Politics and Law, 8(4), p. 254. Available at: https://doi.org/10.5539/jpl.v8n4p254.

Lecture 9: International Terrorism

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • International Terrorism and the Impact of 9/11

Recommended Reading

  • Andreani, G. (2004) ‘The “War on Terror”: Good Cause, Wrong Concept’, Survival, 46(4), pp. 31–50. Available at: https://doi.org/10.1093/survival/46.4.31.
  • Andronova, I., Gusakov, N. and Zavyalova, E. (2020) ‘Terrorism Financing: New Challenges for International Security’, International Organisations Research Journal, 15(1), pp. 120–134. Available at: https://doi.org/10.17323/1996-7845-2020-01-05.
  • Badey, T.J. (1998) ‘Defining international terrorism: A pragmatic approach’, Terrorism and Political Violence, 10(1), pp. 90–107. Available at: https://doi.org/10.1080/09546559808427445.
  • Bamford, B. (2004) ‘The United Kingdom’s “War Against Terrorism”’, Terrorism and Political Violence, 16(4), pp. 737–756. Available at: https://doi.org/10.1080/095465590898660.
  • Bjørkheim, A.S. (2020) ‘One terrorism to rule them all: Turkey, the PKK and global terrorism discourse’, Journal of International Relations and Development, 23(3), pp. 487–510. Available at: https://doi.org/10.1057/s41268-018-00167-z.
  • Choi, S.-W. (2010) ‘Fighting Terrorism through the Rule of Law?’, Journal of Conflict Resolution, 54(6), pp. 940–966. Available at: https://doi.org/10.1177/0022002710371666.
  • Choi, S.-W. and Luo, S. (2013) ‘Economic Sanctions, Poverty, and International Terrorism: An Empirical Analysis’, International Interactions, 39(2), pp. 217–245. Available at: https://doi.org/10.1080/03050629.2013.768478.
  • Cronin, A.K. (2003) ‘Behind the Curve: Globalization and International Terrorism’, International Security, 27(3), pp. 30–58. Available at: https://doi.org/10.1162/01622880260553624.
  • Engene, J.O. (2007) ‘Five Decades of Terrorism in Europe: The TWEED Dataset’, Journal of Peace Research, 44(1), pp. 109–121. Available at: https://doi.org/10.1177/0022343307071497.
  • Ezcurra, R. and Palacios, D. (2016) ‘Terrorism and spatial disparities: Does interregional inequality matter?’, European Journal of Political Economy, 42, pp. 60–74. Available at: https://doi.org/10.1016/j.ejpoleco.2016.01.004.
  • Kim, W. and Sandler, T. (2020) ‘Middle East and North Africa: Terrorism and Conflicts’, Global Policy, 11(4), pp. 424–438. Available at: https://doi.org/10.1111/1758-5899.12829.
  • Kis-Katos, K., Liebert, H. and Schulze, G.G. (2011) ‘On the origin of domestic and international terrorism’, European Journal of Political Economy, 27, pp. S17–S36. Available at: https://doi.org/10.1016/j.ejpoleco.2011.02.002.
  • Krieger, T. and Meierrieks, D. (2011) ‘What causes terrorism?’, Public Choice, 147(1–2), pp. 3–27. Available at: https://doi.org/10.1007/s11127-010-9601-1.
  • Lai, B. (2007) ‘“Draining the Swamp”: An Empirical Examination of the Production of International Terrorism, 1968—1998’, Conflict Management and Peace Science, 24(4), pp. 297–310. Available at: https://doi.org/10.1080/07388940701643649.
  • Meyer, C.O. (2009) ‘International terrorism as a force of homogenization? A constructivist approach to understanding cross-national threat perceptions and responses’, Cambridge Review of International Affairs, 22(4), pp. 647–666. Available at: https://doi.org/10.1080/09557570903325462.
  • Midlarsky, M.I., Crenshaw, M. and Yoshida, F. (1980) ‘Why Violence Spreads: The Contagion of International Terrorism’, International Studies Quarterly, 24(2), p. 262. Available at: https://doi.org/10.2307/2600202.
  • Morgades-Bamba, C.I., Raynal, P. and Chabrol, H. (2020) ‘Exploring the Radicalization Process in Young Women’, Terrorism and Political Violence, 32(7), pp. 1439–1457. Available at: https://doi.org/10.1080/09546553.2018.1481051.
  • Nesser, P. (2006) ‘Jihadism in Western Europe After the Invasion of Iraq: Tracing Motivational Influences from the Iraq War on Jihadist Terrorism in Western Europe’, Studies in Conflict & Terrorism, 29(4), pp. 323–342. Available at: https://doi.org/10.1080/10576100600641899.
  • Neumayer, E. and Plümper, T. (2009) ‘International Terrorism and the Clash of Civilizations’, British Journal of Political Science, 39(4), pp. 711–734. Available at: https://doi.org/10.1017/S0007123409000751.
  • Neumayer, E. and Plümper, T. (2010) ‘Galton’s Problem and Contagion in International Terrorism along Civilizational Lines’, Conflict Management and Peace Science, 27(4), pp. 308–325. Available at: https://doi.org/10.1177/0738894210374397.
  • Plümper, T. and Neumayer, E. (2010) ‘The friend of my enemy is my enemy: International alliances and international terrorism’, European Journal of Political Research, 49(1), pp. 75–96. Available at: https://doi.org/10.1111/j.1475-6765.2009.01885.x.
  • Post, J., Sprinzak, E. and Denny, L. (2003) ‘The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists∗∗This research was conducted with the support of the Smith Richardson Foundation.’, Terrorism and Political Violence, 15(1), pp. 171–184. Available at: https://doi.org/10.1080/09546550312331293007.
  • Strachan, H. (2009) ‘The Strategic Gap in British Defence Policy’, Survival, 51(4), pp. 49–70. Available at: https://doi.org/10.1080/00396330903168840.
  • van Ham, P. (2003) ‘War, Lies, and Videotape: Public Diplomacy and the USA’s War on Terrorism’, Security Dialogue, 34(4), pp. 427–444. Available at: https://doi.org/10.1177/0967010603344004.
  • Weinberg, L.B. and Eubank, W.L. (1998) ‘Terrorism and democracy: What recent events disclose’, Terrorism and Political Violence, 10(1), pp. 108–118. Available at: https://doi.org/10.1080/09546559808427446.

Lecture 10: Weapons of Mass Destruction

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Proliferation of Weapons of Mass Destruction

Recommended Reading

  • Albright, M.K. (1998) ‘The Testing of American Foreign Policy’, Foreign Affairs, 77(6), p. 50. Available at: https://doi.org/10.2307/20049130.
  • Auda, J. and Bino, T. (2022) ‘The Middle East Weapons of Mass Destruction Free Zone in the IAEA General Conference: Is There a “Grand Strategy” behind the IAEA Track?’, Journal for Peace and Nuclear Disarmament, 5(1), pp. 86–100. Available at: https://doi.org/10.1080/25751654.2022.2079328.
  • Betts, R.K. (1998) ‘The New Threat of Mass Destruction’, Foreign Affairs, 77(1), p. 26. Available at: https://doi.org/10.2307/20048360.
  • Blair, C.W., Chu, J.A. and Schwartz, J.A. (2022) ‘The Two Faces of Opposition to Chemical Weapons: Sincere Versus Insincere Norm-Holders’, Journal of Conflict Resolution, 66(4–5), pp. 677–703. Available at: https://doi.org/10.1177/00220027211057057.
  • Carter, A., Deutch, J. and Zelikow, P. (1998) ‘Catastrophic Terrorism: Tackling the New Danger’, Foreign Affairs, 77(6), p. 80. Available at: https://doi.org/10.2307/20049132.
  • Cooper, D.A. (2011) ‘Challenging Contemporary Notions of Middle Power Influence: Implications of the Proliferation Security Initiative for “Middle Power Theory”: PSI and Middle Power Theory’, Foreign Policy Analysis, 7(3), pp. 317–336. Available at: https://doi.org/10.1111/j.1743-8594.2011.00140.x.
  • Dolev, S. and Bandarra, L. (2022) ‘Towards an Achievable WMDFZ Treaty for the Middle East: Insights from Civil Society’, Journal for Peace and Nuclear Disarmament, 5(1), pp. 9–27. Available at: https://doi.org/10.1080/25751654.2022.2092369.
  • Duyvesteyn, I. (2004) ‘How New Is the New Terrorism?’, Studies in Conflict & Terrorism, 27(5), pp. 439–454. Available at: https://doi.org/10.1080/10576100490483750.
  • Feinstein, L. and Slaughter, A.-M. (2004) ‘A Duty to Prevent’, Foreign Affairs, 83(1), p. 136. Available at: https://doi.org/10.2307/20033835.
  • Fetter, S. (1991) ‘Ballistic Missiles and Weapons of Mass Destruction: What is the Threat? What Should be Done?’, International Security, 16(1), p. 5. Available at: https://doi.org/10.2307/2539050.
  • Foyle, D.C. (2004) ‘Leading the Public To War? The Influence of American Public Opinion on the Bush Administration’s Decision to go to War in Iraq’, International Journal of Public Opinion Research, 16(3), pp. 269–294. Available at: https://doi.org/10.1093/ijpor/edh025.
  • Fuhrmann, M. (2008) ‘Exporting Mass Destruction? The Determinants of Dual-Use Trade’, Journal of Peace Research, 45(5), pp. 633–652. Available at: https://doi.org/10.1177/0022343308094324.
  • Gressang IV, D. (2001) ‘Audience and Message: Assessing Terrorist WMD Potential’, Terrorism and Political Violence, 13(3), pp. 83–106. Available at: https://doi.org/10.1080/09546550109609691.
  • Heupel, M. (2008) ‘Combining Hierarchical and Soft Modes of Governance: The UN Security Council’s Approach to Terrorism and Weapons of Mass Destruction Proliferation after 9/11’, Cooperation and Conflict, 43(1), pp. 7–29. Available at: https://doi.org/10.1177/0010836707082689.
  • Horowitz, M.C. and Narang, N. (2014) ‘Poor Man’s Atomic Bomb? Exploring the Relationship between “Weapons of Mass Destruction”’, Journal of Conflict Resolution, 58(3), pp. 509–535. Available at: https://doi.org/10.1177/0022002713509049.
  • Jervis, R. (2006) ‘Reports, politics, and intelligence failures: The case of Iraq’, Journal of Strategic Studies, 29(1), pp. 3–52. Available at: https://doi.org/10.1080/01402390600566282.
  • Kier, E. and Mercer, J. (1996) ‘Setting Precedents in Anarchy: Military Intervention and Weapons of Mass Destruction’, International Security, 20(4), pp. 77–106. Available at: https://doi.org/10.1162/isec.20.4.77.
  • Mian, Z. (2021) ‘Establishing Nuclear Weapons Obligations for a Middle East Zone Free of Nuclear Weapons and Other Weapons of Mass Destruction’, Journal for Peace and Nuclear Disarmament, 4(2), pp. 295–308. Available at: https://doi.org/10.1080/25751654.2021.1993644.
  • Morse, J.C. and Keohane, R.O. (2014) ‘Contested multilateralism’, The Review of International Organizations, 9(4), pp. 385–412. Available at: https://doi.org/10.1007/s11558-014-9188-2.
  • Mueller, J. and Mueller, K. (1999) ‘Sanctions of Mass Destruction’, Foreign Affairs, 78(3), p. 43. Available at: https://doi.org/10.2307/20049279.
  • Oren, I. and Solomon, T. (2015) ‘WMD, WMD, WMD: Securitisation through ritualised incantation of ambiguous phrases’, Review of International Studies, 41(2), pp. 313–336. Available at: https://doi.org/10.1017/S0260210514000205.
  • Rathbun, B.C. and Stein, R. (2020) ‘Greater Goods: Morality and Attitudes toward the Use of Nuclear Weapons’, Journal of Conflict Resolution, 64(5), pp. 787–816. Available at: https://doi.org/10.1177/0022002719879994.
  • Santhana Dass, R.A. (2021) ‘Jihadists’ Use and Pursuit of Weapons of Mass Destruction: A Comparative Study of Al-Qaeda and Islamic State’s Chemical, Biological, Radiological and Nuclear (CBRN) Weapons Programs’, Studies in Conflict & Terrorism, pp. 1–35. Available at: https://doi.org/10.1080/1057610X.2021.1981203.
  • Siracusa, J.M. and Warren, A. (2017) Weapons of mass destruction: the search for global security. Lanham, Maryland: Rowman & Littlefield (Weapons of mass destruction).
  • Tong, Z. (2022) ‘Humanizing the Victims: A Middle East Zone (MEZ) Free of Nuclear Weapons and the Historical Necessity of Including “Other Weapons of Mass Destruction”’, Journal for Peace and Nuclear Disarmament, pp. 1–18. Available at: https://doi.org/10.1080/25751654.2022.2138097.
  • Western, J. (2005) ‘The War over Iraq: Selling War to the American Public’, Security Studies, 14(1), pp. 106–139. Available at: https://doi.org/10.1080/09636410591002518.

Lecture 11: The Fifth Domain and Future

Core Required Reading

Dannreuther, R. (2013) International security: the contemporary agenda. Second edition. Cambridge, UK; Malden, MA: Polity.

  • Cyber-Warfare and New Spaces of Security (by Jamie Allinson)

Recommended Reading

  • Lynn, W.J. (2010) ‘Defending a New Domain: The Pentagon’s Cyberstrategy’, Foreign Affairs, 89(5), pp. 97–108. Available at: https://www.jstor.org/stable/20788647.
  • Manjikian, M.M. (2010) ‘From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik: From Global Village to Virtual Battlespace’, International Studies Quarterly, 54(2), pp. 381–401. Available at: https://doi.org/10.1111/j.1468-2478.2010.00592.x.
  • Baliga, S., Bueno De Mesquita, E. and Wolitzky, A. (2020) ‘Deterrence with Imperfect Attribution’, American Political Science Review, 114(4), pp. 1155–1178. Available at: https://doi.org/10.1017/S0003055420000362.
  • Liff, A.P. (2013) ‘The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio’, Journal of Strategic Studies, 36(1), pp. 134–138. Available at: https://doi.org/10.1080/01402390.2012.733312.
  • Lehto, M. (2018) ‘The Modern Strategies in the Cyber Warfare’, in M. Lehto and P. Neittaanmäki (eds) Cyber Security: Power and Technology. Cham: Springer International Publishing (Intelligent Systems, Control and Automation: Science and Engineering), pp. 3–20. Available at: https://doi.org/10.1007/978-3-319-75307-2_1.
  • Marsili, M. (2019) ‘The War on Cyberterrorism’, Democracy and Security, 15(2), pp. 172–199. Available at: https://doi.org/10.1080/17419166.2018.1496826.
  • Martins, R.P. (2018) ‘Punching Above Their Digital Weight: Why Iran is Developing Cyberwarfare Capabilities Far Beyond Expectations’, International Journal of Cyber Warfare and Terrorism, 8(2), pp. 32–46. Available at: https://doi.org/10.4018/IJCWT.2018040103.
  • Jiang, T. (2022) ‘The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s’, Journal of Chinese Political Science [Preprint]. Available at: https://doi.org/10.1007/s11366-022-09813-3.
  • Olagbemiro, A. (2015) ‘Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare’:, International Journal of Cyber Warfare and Terrorism, 5(4), pp. 1–14. Available at: https://doi.org/10.4018/IJCWT.2015100101.
  • Dortmans, P.J., Thakur, N. and Ween, A. (2015) ‘Conjectures for framing cyberwarfare’, Defense & Security Analysis, 31(3), pp. 172–184. Available at: https://doi.org/10.1080/14751798.2015.1056935.
  • Dossi, S. (2020) ‘On the asymmetric advantages of cyberwarfare. Western literature and the Chinese journal Guofang Keji’, Journal of Strategic Studies, 43(2), pp. 281–308. Available at: https://doi.org/10.1080/01402390.2019.1581613.
  • Farwell, J.P. and Rohozinski, R. (2011) ‘Stuxnet and the Future of Cyber War’, Survival, 53(1), pp. 23–40. Available at: https://doi.org/10.1080/00396338.2011.555586.
  • Hansen, L. and Nissenbaum, H. (2009) ‘Digital Disaster, Cyber Security, and the Copenhagen School’, International Studies Quarterly, 53(4), pp. 1155–1175. Available at: https://doi.org/10.1111/j.1468-2478.2009.00572.x.
  • Kello, L. (2013) ‘The Meaning of the Cyber Revolution: Perils to Theory and Statecraft’, International Security, 38(2), pp. 7–40. Available at: https://doi.org/10.1162/ISEC_a_00138.
  • Dunn Cavelty, M. (2013) ‘From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse’, International Studies Review, 15(1), pp. 105–122. Available at: https://doi.org/10.1111/misr.12023.
  • Lindsay, J.R. (2015) ‘The Impact of China on Cybersecurity: Fiction and Friction’, International Security, 39(3), pp. 7–47. Available at: https://doi.org/10.1162/ISEC_a_00189.
  • Borghard, E.D. and Lonergan, S.W. (2017) ‘The Logic of Coercion in Cyberspace’, Security Studies, 26(3), pp. 452–481. Available at: https://doi.org/10.1080/09636412.2017.1306396.
  • Carrapico, H. and Barrinha, A. (2017) ‘The EU as a Coherent (Cyber)Security Actor?: The EU as a Coherent (Cyber)Security Actor?’, JCMS: Journal of Common Market Studies, 55(6), pp. 1254–1272. Available at: https://doi.org/10.1111/jcms.12575.
  • Maschmeyer, L., Deibert, R.J. and Lindsay, J.R. (2021) ‘A tale of two cybers – how threat reporting by cybersecurity firms systematically underrepresents threats to civil society’, Journal of Information Technology & Politics, 18(1), pp. 1–20. Available at: https://doi.org/10.1080/19331681.2020.1776658.
  • Jasper, S.E. (2017) ‘U.S. Cyber Threat Intelligence Sharing Frameworks’, International Journal of Intelligence and CounterIntelligence, 30(1), pp. 53–65. Available at: https://doi.org/10.1080/08850607.2016.1230701.
  • Kostyuk, N. and Wayne, C. (2021) ‘The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public’, Journal of Global Security Studies, 6(2), p. ogz077. Available at: https://doi.org/10.1093/jogss/ogz077.
  • Sharp, T. (2017) ‘Theorizing cyber coercion: The 2014 North Korean operation against Sony’, Journal of Strategic Studies, 40(7), pp. 898–926. Available at: https://doi.org/10.1080/01402390.2017.1307741.
  • Stoddart, K. (2016) ‘UK cyber security and critical national infrastructure protection’, International Affairs, 92(5), pp. 1079–1105. Available at: https://doi.org/10.1111/1468-2346.12706.
  • Brenner, J.F. (2013) ‘Eyes wide shut: The growing threat of cyber attacks on industrial control systems’, Bulletin of the Atomic Scientists, 69(5), pp. 15–20. Available at: https://doi.org/10.1177/0096340213501372.
  • Epstein, J.M. (1989) ‘The 3:1 Rule, the Adaptive Dynamic Model, and the Future of Security Studies’, International Security, 13(4), p. 90. Available at: https://doi.org/10.2307/2538781.
  • Williams, M.C. (1998) ‘Identity and the Politics of Security’, European Journal of International Relations, 4(2), pp. 204–225. Available at: https://doi.org/10.1177/1354066198004002003.

Required Students’ Skills

Read the course materials carefully and focus on the core and recommended readings that will greatly increase your level of knowledge.

Learn how to use search engines for academic articles, primarily Web of Science, JSTOR, SAGE Journals, and Google Scholar.

To pass an essay assignment with flying colours, you must master the Harvard citation style. Also, it is highly recommended to read the following publication about research methods and design to improve your essay score:

  • Lamont, C. and Boduszynski, M. (2020) Research methods in politics and international relations. Thousand Oaks: SAGE.

Throughout the course, students are also expected to familiarize themselves with leading academic journals to locate the latest articles, thereby connecting with the international relations academic community.

Scroll to Top