Sie sind auf Seite 1von 17

UCL School of Slavonic and East European Studies

SEES GS32 Security, Identity, Polarity


1











SEES GS32




SECURITY, IDENTITY, POLARITY:
THE CONTEMPORARY DEBATES






CONTENTS

1. Course information
2. Reading list (by seminar topic)




Dr FELIX CIUT


2012

Please bring this guide with you to the seminar Please bring this guide with you to the seminar Please bring this guide with you to the seminar Please bring this guide with you to the seminar
SCHOOL OF SLAVONIC
AND EAST EUROPEAN STUDIES

UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
2
SEES GS32
SECURITY, IDENTITY, POLARITY: THE CONTEMPORARY DEBATES

Credit Rating 30 UCL credits (8 ECTS) Pre-requisite: hard work
Course convenor DR. FELIX CIUT Room 424 16 Taviton Street
f.ciuta@ucl.ac.uk; 02076798764
Office hours Monday 2-3; Tuesday 11-12
Seminars 1x2hours per week Total: 10 x 2hr
Assessment 100% coursework
Coursework 1 x 800-1000 words book review Not assessed 12.11.2012
1 x 1500 words policy analysis paper 40% of the final mark 10.12.2012
1 x 3,500 words essay 60% of the final mark 21.01.2013

COURSE RATIONALE
Recent episodes like the war in Georgia, the GWOT, 9/11, Afghanistan, Iraq, or Kosovo constantly
keep security in the headlines. But what exactly is this security we incessantly hear about? Although
sometimes a glance at the news channels might you give the impression that this is not only obvious, but also
banal, the question what is security has always been at the core of the discipline of Security Studies. This is
not just a theoretical question, because all attempts to have security in other words, all security policies
are premised on particular ways of understanding security.
So what do we need (to know) in order to have security? Is power enough to be secure and is the
international distribution of power (i.e. polarity) the key to understanding security in all its forms? Yet think
of this: former US Secretary of State Condoleeza Rice observed that the fundamental character of regimes
now matters more than the international distribution of power. Does this mean that who has power matters
more than power itself? Is identity the clue for understanding security-related issues?
SIP explores these questions and provides an advanced introduction to contemporary security
theory. Our discussions will be structured by the identification of three distinct logics of security (war, threat
and risk), and three distinct analytical levels (international/regional, national and individual) which shape the
formulation of security theory and policy alike.
SIP is designed with a view to signalling the intrinsic relationship between the practice and theory of
security. This is not only to increase your awareness of the indispensable role of theory in the evaluation of
security problems and strategies, but also to emphasise that security practitioners routinely deploy concepts
of security in official documents, policy statements, and standardized security procedures. We will highlight
the conceptual, epistemological and methodological issues at stake in the analysis of security policies.
You should note that SIP will not because it tries not solve your dilemmas regarding the reasons
for NATOs intervention in Libya, the conflict in South-Ossetia, or Polands perceptions of energy
insecurity. However, by the end of the course you will be better equipped to understand and analyse various
points of view and especially your own point of view regarding any such issues. The seminar format and
the varied nature of the coursework seek to increase your theoretical understanding and analytical skills,
enabling you to formulate conceptually precise and empirically informed analyses of contemporary security
issues.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
3
COURSE AIMS
The course is intended to:
Give students an in-depth understanding of contemporary concepts of security;
Reflect the changing nature of security concepts and their relationship with security policy;
Give students the conceptual tools and analytical skills for the empirical study of security issues and policies;
Promote and improve students presentation and communicative skills.

COURSE OBJECTIVES
By the end of the course, students should be able to:
Identify, describe and critically assess the key contemporary debates in security theory;
Demonstrate an understanding of the relationship between theories of security and security policies;
Evaluate the security doctrines and policies of states and international organisations;
Give a well-organised presentation and participate actively in informed debates on security issues.

COURSE ORGANISATION
Attendance
Attendance at seminars is compulsory. If you know in advance that circumstances beyond your
control will prevent you from attending, you should contact the programme administrator.
Details can be found in the SSEES Handbook for Masters Students, and on Moodle.

Seminars
Format Each seminar is based on presentations prepared by students and group discussions. Some
seminars may include a short introductory exposition of the topic by the lecturer.
Preparation You can expect your lecturer to be well prepared and to offer guidance, clarification and
explanations. You cannot expect your lecturer to give a lecture. Seminars are designed to provide as
much opportunity as possible for you to participate and apply your knowledge. You will enjoy and
benefit from the seminar depending on your knowledge and willingness to participate in discussions.
Reading materials are listed under the seminar subject heading.

Security Portfolios
All students will be allocated to a small group which will prepare jointly a portfolio on a security issue
of their choice.
The topics of security portfolios will be established during the first seminar meeting.
Security portfolio groups will present their work in a 25 minutes presentation and a set of briefing papers
which will be uploaded on Moodle.
The role of the security portfolios is to encourage the application of the theoretical and conceptual
knowledge acquired in the course to cases and issues of interests to students.
Details about the preparation and presentation of security portfolios will be discussed in the first seminar.

Moodle
This course uses a Web-based Virtual Learning Environment called Moodle. When you log in to Moodle
you will have access to the course guide, seminar notes, reading materials organised by seminar topic,
dedicated email, useful links, and more. Log in using your UCL username and password
You are all required to register to Moodle, because all communication regarding the course (outside
class, naturally) will take place through that environment. You will therefore need to monitor email and
discussion postings regularly.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
4
ASSESSMENT
The course will be examined by coursework only. You will have to prepare 3 materials:

1 x 800-1000 words book review Non-assessed Deadline 12.11.2012

1 x 1500 words policy analysis paper 40% of final mark Topic approved by FC 20.11.2012
Deadline 10.12.2012
1 x 3,500 words essay 60% of final mark Topic approved by FC 11.12.2012
Deadline 21.01.2013

The Book Review must be submitted only via Moodle.
ONE hard copy of the PAP and the ESSAY must be submitted to the administration office, room 341.
An electronic copy of all coursework must also be submitted on Moodle. This will be checked using the
JISC detection service, Turnitin.
Your work will not be assessed unless both hard copy and electronic versions are submitted.

Format:
Submit your work in Word format. Name the file SIP Coursework Type YOUR NAME.
for example: SIP PAP Mia Wallace; SIP Essay Vincent Vega
Late submission The full allocated mark will be reduced by 5 percentage points for the first working
day after the deadline for the submission of coursework. The mark will be reduced by a further 10
percentage points if coursework is submitted during the following six days. If the essay is submitted after
seven days but before the relevant final deadline (first day of Term 3), the mark will be 0% but the
student will still complete the course. If not submitted at all, the student would be incomplete, unless
the coursework in question represented less then 20% of the overall module assessment.
Extensions If circumstances beyond your control prevent you from submitting coursework by the
deadline, you must contact me for an extension.
Extensions are granted only in special circumstances; dogs, cats, computer viruses, Lord
Voldemort, vampires and ninja-pirate-zombie-robots are regular occurrences on our
planet, so their potential interference with coursework is not a special circumstance.
Style All coursework should be typed, 1.5 spaced, and checked for spelling and grammar errors.
Referencing All coursework must contain both a bibliography and referencing system. Up to 10
points will be deducted from the mark if the bibliographical and referencing apparatus is unsatisfactory.
You can find more information regarding coursework bibliography and referencing, advice about
writing the essays, and the criteria used to mark them on Moodle, under Coursework.

Book Review (see Moodle for further instructions)
Length: 800-1000 words. Deadline: Monday, 12 November 2012
Titles: choose from the list of titles available on Moodle;
The rules concerning plagiarism and referencing apply.

Policy Analysis Paper (see Moodle for further instructions)
Length: 1500 words. Deadline: Monday, 10 December 2012
o Your choice of document must be approved by me on or before 20 November 2012
Topic a security policy document of a country or international organisation;
The rules concerning plagiarism and referencing apply.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
5

Essay (see Moodle for further instructions and potential topics)
Length: 3500 words. Deadline: Monday, 21 January 2013
o The essay topic must be approved by me on or before 11 December 2012
Topic one of the theoretical and conceptual issues covered in the course.
The rules concerning plagiarism and referencing apply.

Plagiarism
Plagiarism is a very serious offence. All students must consult the UCL Statement on plagiarism.
Plagiarism is defined as the presentation of another persons thoughts or words or artefacts or software
as though they were a students own. Any quotation from the published or unpublished works of other
persons must, therefore, be clearly identified as such by being placed inside quotation marks, and
students should identify their sources as accurately and fully as possible. A series of short quotations
from several different sources, if not clearly identified as such, constitutes plagiarism just as much as
does a single unacknowledged long quotation from a single source. Equally, if a student summarises
another persons ideas, judgements, figures, software or diagrams, a reference to that person in the text
must be made and the work referred to must be included in the bibliography.
Recourse to the services of ghost-writing agencies (for example in the preparation of essays or reports)
or of outside word-processing agencies which offer correction/improvement of English is strictly
forbidden, and students who make use of the services of such agencies render themselves liable for an
academic penalty.
Use of unacknowledged information downloaded from the internet also constitutes plagiarism.
Where part of an examination consists of take away papers, essays or other work written in a students
own time, or a coursework assessment, the work submitted must be the candidates own.
It is also illicit to reproduce material which a student has used in other work/assessment for the course or
programmes concerned. Students should be aware of this self-plagiarism. If in doubt, students should
consult their Personal Tutor or another appropriate teacher.
Failure to observe any of the provisions of this policy or of approved departmental guidelines constitutes
an examination offence under UCL and University Regulations. Examination offences will normally be
treated as cheating or irregularities under the
Regulations in respect of Examination Irregularities. Under these Regulations students found to have
committed an offence may be excluded from all further examinations of UCL or the University or of
both.

Turnitin
You should note that UCL has signed up to use a sophisticated detection system to scan work for
evidence of plagiarism and the School uses this for assessed coursework. This system gives access to
billions of sources worldwide, including websites and journals, as well as work previously submitted to
SSEES, UCL and other universities.
All coursework submitted in SIP will be checked through Turnitin.


COURSE ADMINISTRATION AND COMPLAINTS
The course convenor is Dr Felix Ciut. Queries or complaints should be addressed to the course
convenor or your personal tutor, who will advise you on further course of action.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
6
READING and PREPARATION
You are expected to read extensively for this course. Our seminars rely significantly on student
discussions and debates, and their success depends on your contributions being precise and well informed. Your
reading must cover every seminar topic; you can expect to have to read around 100 pages of text every week.
Below you will find reading materials organised by seminar topic. There is a vast amount of
publications on international security in books, journal articles, and a myriad of webpages, so this reading list
is not and cannot be comprehensive. Although the list may appear very long, the number and diversity of
sources is designed to improve your access to materials.
Most of the materials from this reading list are articles from academic journals. Given the changing
nature of the subject, it is very important that you keep up to date on contemporary policy issues and the state
of the art in theory. Read quality newspapers, use web sources and browse the new issues of IR theory and
international security journals, where most theoretical articles on international security are published.
Conduct your own searches on topics that are of special interest to you; this will be necessary and expected
of you especially when you research your portfolio, your essay, and later your dissertation.
I have tried to make as many materials as possible available online through the Moodle page of the
course, where you can find some of the sources listed, as well as additional material not listed in this guide. I will
add new material as it becomes available, so logon to Moodle weekly. I can also provide some materials for
those interested from my own resources, although more on some topics than on others.

Background Reading

Introductory: These are textbooks that may be a useful starting point especially for students who have had no
previous training in IR/security.

Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press)
Dannreuther, R. (2007) International Security: The Contemporary Agenda (Cambridge: Polity)
Hough, P. (2008) Understanding Global Security, 2
nd
edition (London: Routledge)
Williams, P. (ed.) (2008) Security Studies: An Introduction (London: Routledge).


More advanced: The following texts have been very influential in shaping the discipline in the past decade.
Most have been around for a while and a bit of hunting should dig up second-hand copies as well as new ones.

Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era
(Brighton: Wheatsheaf) [This is one of the most influential books in the discipline of Security Studies.
Its ideas have been substantially refined since its publication, so it will feel a bit dated in the light of
the newer literature, but it is still a landmark text.]
Buzan, B. el al. (1998) Security: A New Framework for Analysis (Boulder/London: Lynne Rienner) [The most
detailed presentation of securitization theory and sectoral security]
Croft, S. and Terriff, T. (eds.) (2000) Critical Reflections on Security and Change (London: Frank Cass) [A
text that reflected on the state of the art in the discipline of Security Studies.]
Katzenstein, P. (ed.) (1996) The Culture of National Security (New York: Columbia University Press)
[Something of a classic already, this volume opened the discipline to a whole range of new concerns.]
Lipschutz, R.D. (ed.) (1995) On Security (New York: Columbia University Press) [An excellent collection that
still captures well the transformation of the discipline of Security Studies in the past two decades.]

UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
7
SEMINAR TOPICS

1. Security Studies: A Secure Discipline?
Introduction. Definitions of security
2. Security: Concepts, Logics, Paradigms
Definitions of security. Securitization
3. The Level of Analysis Problem in Security Studies
Levels of analysis in IR. Security levels
4. Security in the War Paradigm
Anarchy and polarity; hegemony; security complex theory; region-building approaches
5. Security in the Threat Paradigm
Beyond war & peace: the sectoral approach economic, environmental, political & societal security
6. Security and Identity
Who matters: norms, anarchic cultures, cultures of national security
7. Securing People
Beyond the state: emancipation; human security; critical security
8. Security in the Risk Paradigm
Beyond levels and sectors: risk; biopower, biopolitical security assemblages
9. Making Sense of Contemporary Security
Truth, power, and the politics of security analysis
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
8
READING LIST BY TOPIC
Texts marked * are particularly relevant, but all the texts listed are useful.
You will find some of the key readings, plus other materials and documents, on Moodle.
More materials will be posted on Moodle as they become available throughout the term.
Please do not limit your reading to Moodle materials.

1. Security Studies: a secure discipline?
Key seminar themes:
What should Security Studies study?
What is the relationship between the theory and practice of security?

Arms Control (1992) Forum: What is Security and Security Studies? Revisited, 13(3): 463-544.
Baldwin, D. (1995) Security Studies and the End of the Cold War, World Politics 48(1): 117-141.
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press) [Chs. 1, 2]
C.A.S.E. Collective (2006) Critical Approaches to Security in Europe: A Networked Manifesto, Security
Dialogue 37(4): 443487.
*Croft, S. and Terriff, T. (eds.) (2000) Critical Reflections on Security and Change (London: Frank Cass).
[Chs. 2, 3, 4]
Kolodziej, E. (1992) Renaissance in Security Studies: Caveat Lector, International Studies Quarterly 36(4):
421-438. [Kolodziej answers to Walts paper, below.]
*Kolodziej, E. (1992) What is Security and Security Studies? Lessons from the Cold War, Arms Control 13(1):
1-31.
Krause, K. and Williams, M.C. (1996) Broadening the Agenda of Security Studies: Politics and Methods,
Mershon International Studies Review 40(2): 229-254.
Krause, K. and Williams, M.C. (1997) From Strategy to Security: Foundations of Critical Security Studies,
in Krause, K. and Williams, M.C. (eds.) Critical Security Studies (Minneapolis: University of
Minnesota Press), pp. 33-59.
McSweeney, B. (1999) Security, Identity and Interests: A Sociology of International Relations (Cambridge:
Cambridge University Press). [Chs. 2, 5]
*Walt, S. (1991) The Renaissance of Security Studies, International Studies Quarterly 35(2): 211-239.


2. Security: concepts, logics, paradigms
Key seminar themes:
Can security be defined? Should security be defined?
Is the traditional understanding of security still relevant and sufficient?
What does securitization tell us about how security works?

The concept of security
*Baldwin, D. (1997) The Concept of Security, Review of International Studies 23(1): 5-26.
Bubandt, N. (2005) Vernacular Security: The Politics of Feeling Safe in Global, National and Local
Worlds, Security Dialogue 36(3): 275-296.
Buzan, B. (1997) Rethinking Security after the Cold War, Cooperation and Conflict 32(1): 5-28.
Dalby, S. (1997) Contesting an Essential Concept: Reading the Dilemmas in Contemporary Security
Discourse, in Keith Krause and Michael Williams (eds.) Critical Security Studies (Minneapolis:
University of Minnesota Press), pp. 3-32.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
9
Fierke, K. (1997) Changing Worlds of Security, in Krause, K. and Williams, M.C. (eds.) Critical Security
Studies (Minneapolis: University of Minnesota Press), pp. 223-252.
Hansen, L. (1997) A Case for Seduction? Evaluating the Poststructuralist Conceptualization of Security,
Cooperation and Conflict 32(4): 36998.
Matthews, J. T. (1989) Redefining Security, Foreign Affairs 68(2): 162-177.
Tickner, J.A. (1995) Re-visioning Security, in K. Booth and S. Smith (eds.) International Relations Theory
Today (Cambridge: Polity Press), pp. 175-197.
Ullman, R. (1983) Redefining Security, International Security 8(1): 129-153.
*Wolfers, A. (1952) National Security as an Ambiguous Symbol, Political Science Quarterly 67(4): 481-
502.

Securitization theory
Aradau, C. (2004) Security and the Democratic Scene: Desecuritization and Emancipation, Journal of
International Relations and Development 7(4): 388413.
Balzacq, T. (2005) The Three Faces of Securitization: Political Agency, Audience and Context, European
Journal of International Relations 11(2): 171-201.
Balzacq, T. (ed.) (2010) Securitization Theory: How Security Problems Emerge and Dissolve (London:
Routledge).
*Buzan et al. (1998) Security: a New Framework for Analysis (Boulder/London: Lynne Rienner). [Ch. 2]
Ciut, F. (2009) Security and the Problem of Context: A Hermeneutical Critique of Securitization Theory,
Review of International Studies 35(2): 301-326.
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press). [Ch. 7]
Elbe, S. (2006), Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security,
International Studies Quarterly 50(1): 119-144.
Hansen, L. (2000) The Little Mermaids Silent Security Dilemma and the Absence of Gender in the
Copenhagen School, Millennium 29(2): 285-306.
Hansen, L. (2011) Theorizing the Image for Security Studies: Visual Securitization and the Muhammad
Cartoon Crisis, European Journal of International Relations 17(1): 51-74.
Knudsen, O.F. (2001) Post-Copenhagen Security Studies, Security Dialogue 32(3): 355-368.
Laustsen, C.B. and Wver, O. (2000) In Defence of Religion: Sacred Referent Objects for Securitization,
Millennium 29(3): 705-739.
Roe, P. (2004) Securitization and Minority Rights: Conditions of Desecuritization, Security Dialogue
35(3): 279294.
Sjstedt, R. (2008) Exploring the Construction of Threats: The Securitization of HIV/AIDS in Russia,
Security Dialogue 39(1): 7-29.
*Wver, W. (1995) Securitization and Desecuritization, in Ronnie Lipschutz (ed.) On Security (New York:
Columbia University Press), pp. 46-86.
Wver, O. (1996) European Security Identities, Journal of Common Market Studies 34(1): 103-132.
Wver, O. (1998) Insecurity, Security, and Asecurity in the West European Non-war Community, in
Emmanuel Adler and Michael Barnett (eds.) Security Communities (Cambridge: Cambridge
University Press), pp. 69-118.
Wver, O. (2000) The EU as a Security Actor: Reflections from a Pessimistic Constructivist on Post-
Sovereign Security Orders, in Kelstrup, M. and Williams, M. (eds.) International Relations Theory
and the Politics of European Integration: Power, Security, and Community (London: Routledge), pp.
250294.
Williams, M.C. (2003) Words, Images, Enemies: Securitization and International Politics, International
Studies Quarterly 47(4): 511-531.

UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
10
3. The level of analysis problem in Security Studies
Key seminar themes:
Why is the level of analysis important?
Is Buzans distinction between international, national and individual security still relevant?
Do the level and unit of analysis influence the formulation of security policy?

Levels of analysis in IR
*Singer, J.D. (1961) The Level of Analysis Problem in International Relations, World Politics 14(1): 77-
92.
*Waltz, K.N. (1959) Man, the State, and War: A Theoretical Analysis (New York: Columbia University
Press). [Introduction; 80-123, 159-186, 224-238]
*Buzan, B. (1995) The Level of the Analysis Problem in International Relations Reconsidered, in Booth,
K. and Smith, S. (eds.) International Relations Theory Today (Cambridge: Polity Press), pp. 198-216
Gourevitch, P. (1978) The Second Image Reversed: The International Sources of Domestic Politics,
International Organization 32(4): 881-912.
Graham, A. (1969) Conceptual Models of the Cuban Missile Crisis, American Political Science Review
63(3): 689-718.
Hollis, M. and Smith, S. (1990) Explaining and Understanding International Relations (Oxford: Oxford
University Press).
Jervis, R. (1976) Perception and Misperception in International Politics (Princeton: Princeton University
Press) [Ch. 1 Perceptions and the Level-of-Analysis Problem]
Kolodziej, E.A. (2005) Security and International Relations (Cambridge: Cambridge University Press) [Ch.
1]
Moravcsik, A. (1997) Taking Preferences Seriously: A Liberal Theory of International Politics,
International Organization 51(4): 513-553.
Onuf, N. (1995) Levels, European Journal of International Relations 1(1): 35-58.
Waltz, K.N. (1979) Theory of International Politics (New York: McGraw-Hill). [Ch 1]
Wolfers, A. (1976) The Actors in International Politics, in Discord and Collaboration (Baltimore, MD:
Johns Hopkins University Press), pp. 13-31.

Levels of security analysis
*Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Introduction]
Buzan et al. (1998) Security: a New Framework for Analysis (Boulder/London: Lynne Rienner). [pp. 9-20]
Buzan, B. (1991) Is International Security Possible?, in Ken Booth (ed.) New Thinking about Strategy and
Security (London: Harper Collins), pp. 31-55.
Buzan, B. (1995) Security, the State, the New World Order and Beyond, in Ronnie Lipschutz (ed.) On
Security (New York: Columbia University Press), pp. 187-211.


4. Security in the war paradigm: international and regional security
Key seminar themes:
What are the systemic determinants of security? Just how determinant are they?
What exactly are regions? What are the distinguishing characteristics of regional security?

International security
*Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Ch. 5 & 10]
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
11
Buzan, B. and Little, R. (2000) International Systems in World History: Remaking the Study of International
Relations (Oxford: Oxford University Press). [Chs. 1, 2, 3]
Buzan, B. et al. (1993) The Logic of Anarchy: Neorealism to Structural Realism (New York: Columbia
University Press). [Chs. 1 & 3]
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press) [Ch. 8]
Hollis, M. and Smith, S. (1990) Explaining and Understanding International Relations (Oxford: Oxford
University Press). [Ch. 5]
Huntington, S. (1999) The Lonely Superpower, Foreign Affairs 78(2): 35-49.
Huntington, S. (1993) Why International Primacy Matters, International Security 17(4): 68-83.
Jervis, R. (1978) Cooperation under the Security Dilemma World Politics 30(2): 167-214.
Jervis, R. (1993) International Primacy: Is the Game Worth the Candle?, International Security 17(4): 52-
67.
Kupchan, C.A. (1998) After Pax Americana: Benign Power, Regional Integration, and the Sources of a
Stable Multipolarity, International Security 23(2): 40-79.
Layne, C. (1993) The Unipolar Illusion: Why New Great Powers Will Arise, International Security 17(4):
5-51.
Mearsheimer, J. (1990) Back to the Future: Instability in Europe after the Cold War, International Security
15(1): 5-56. See also the follow-up in IS numbers 15(2 and 3).
*Waltz, Kenneth N. (1979) Theory of International Politics (New York: McGraw-Hill). [Ch 6]
*Waltz, K.N. (1993) The Emerging Structure of International Politics, International Security 18(2): 44-79.
*Waltz, K.N. (2000) Structural Realism after the Cold War, International Security 25(1): 5-41.
Wohlforth, W. (1999) The Stability of a Unipolar World, International Security 24(1): 5-41.

Regional security
Browning, C.S. and Joenniemi, P. (2004) Regionality beyond Security? The Baltic Sea Region after
Enlargement, Cooperation and Conflict 39(3): 23353.
*Buzan, B. and Wver, O. (2003) Regions and Powers. The Structure of International Security (Cambridge:
Cambridge University Press) [Chs. 1, 2, 3]
Buzan et al. (1998) Security: a New Framework for Analysis (Boulder/London: Lynne Rienner). [pp. 9-20]
Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Ch. 6]
Ciut, F. (2007) Parting the Black Sea (Region): Geopolitics, Institutionalisation, and the Reconfiguration of
European Security, European Security 16(1): 51-78.
Ciut, F. (2008) Region? Why Region? Security, Hermeneutics, and the Making of the Black Sea Region,
Geopolitics 13(1): 120-147.
Hurrell, A. (1995) Regionalism in Theoretical Perspective, in Fawcett, L. and Hurrell, A. (eds.)
Regionalism in World Politics: Regional Organisation and International Order (Oxford: Oxford
University Press), pp. 37-73.
Katzenstein, P.J. (1996) Regionalism in Comparative Perspective, Cooperation and Conflict 31(2): 123-
159
*Lake, D.A. and Morgan, P. (eds.) (1997) Regional Orders: Building Security in a New World (Pennsylvania
State University Press) [Chs. 1, 2, 3]
Murphy, A.B. (1991) Regions as Social Constructs: The Gap between Theory and Practice, Progress in
Human Geography 15:2235.
Paasi, A. (2003) Region and Place: Regional Identity in Question, Progress in Human Geography 27(4):
475485.
Vyrynen, R. (2003) Regionalism: Old and New, International Studies Review 5: 2551.

UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
12
5. Security in the threat paradigm: the sectoral approach
Key seminar themes:
Is the sectoral approach a significant shift from the traditional paradigm?
What is the relationship between security sectors?
Are sectors governed by similar security logics?

SEE Moodle for further reading on each sector
*Buzan, B. et al. (1998) Security: A New Framework for Analysis (Boulder/London: Lynne Rienner). [Chs. 4-7,
which deal with each of the sectors]
Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Chs. 3 and 10]
Buzan, B. (1991) New Patterns of Global Security in the Twenty-First Century, International Affairs 67(3):
431-451.
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press) [Chs. 10, 11, 12]
Terriff, T. et al. (1999) Security Studies Today (London: Polity). [Ch. 7]


6. The culture of national security: security and identity
Key seminar themes:
What is identity to security: cause, referent object, variable, requisite, or something else?
What is the relationship between national identity and international norms of security?
What is the relationship between security, identity and power?

Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Ch. 3]
Buzan et al. (1998) Security: a New Framework for Analysis (Boulder/London: Lynne Rienner). [Ch. 6]
Campbell, C. (1998) Writing Security: United States Foreign Policy and the Politics of Identity (Manchester:
Manchester University Press). [Introduction and Chs. 6, 8]
Farrell, T. (2002) Constructivist Security Studies: Portrait of a Research Program, International Studies
Review 4(1): 49-72.
*Fierke, K. (1999) Dialogues of Manoeuvre and Entanglement: NATO, Russia, and the CEECs,
Millennium 28(1): 27-52.
Fierke, K.M. (1997) Changing Worlds of Security, in Krause, K. and Williams, M.C. (eds.) Critical
Security Studies (London: UCL Press).
*Katzenstein, P.J. (1996) (ed.) The Culture of National Security (New York: Columbia University Press). [Chs.
1, 2, 8]
Kowert, P.A. (1998/9) National Identity: Inside and Out, Security Studies 8(2/3): 1-34.
McSweeney, B. (1996) Identity and Security: Buzan and the Copenhagen School, Review of International
Studies 22(1): 82-93.
McSweeney, B. (1999) Security, Identity and Interests: A Sociology of International Relations (Cambridge:
Cambridge University Press).
Neumann, I.B. (1992) Identity and Security, Journal of Peace Research 29(2): 221-226.
Schimmelfennig, F. (1998/1999) NATO Enlargement: A Constructivist Explanation, Security Studies 8(2-
3): 1998-234.
Wver, O. et al. (1993) Identity, Migration and the New Security Agenda in Europe (London: Pinter). [Ch. 2, 3]
Weldes, J. (1996) Constructing National Interests, European Journal of International Relations 2(3): 275-
318.
*Wendt, A. (1999) Social Theory of International Politics (Cambridge: CUP). [Ch. 6]
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
13
*Williams, M. (1998) Identity and the Politics of Security, European Journal of International Relations
4(2): 204-225.
*Williams, M. and Neumann, I.B. (2000) From Alliance to Security Community: NATO, Russia, and the
Power of Identity, Millennium 29(2): 357-387.

Further reading
Berger, T.U. (1998) Cultures of Anti-Militarism: National Security in Germany and Japan (Baltimore, MD:
Johns Hopkins University Press).
Campbell, C. (1998) MetaBosnia: Narratives of the Bosnian War, Review of International Studies 24(2): 261-
281.
Cortell, A., and Davis, J. (2000) Understanding the Domestic Impact of International Norms: A Research
Agenda, International Studies Review 2(1): 6587.
Desch, M.C. (1998) Culture Clash: Assessing the Importance of Ideas in Security Studies, International
Security 23(1): 141170.
Farrell, T. (1998) Culture and Military Power, Review of International Studies 24(3): 407-416
Farrell, T. (2005) World Culture and Military Power, Security Studies 14(3): 448-488.
Fierke, K. and Wiener, A. (1999) Constructing Institutional Interests: EU and NATO Enlargement, Journal
of European Public Policy 6(5): 721-742.
Finnemore, M. (1996) Norms, Culture, and World Politics: Insights from Sociologys Institutionalism,
International Organization 50(2): 325-347.
Finnemore, M. (1996) National Interest in International Society (Ithaca, NY: Cornell University Press).
Hopf, T. (1998) The Promise of Constructivism in International Relations Theory, International Security
23(1): 171-200.
Lawler, P.J. (2005) The Good State: In Praise of Classical Internationalism, Review of International
Studies 31(3): 427-449.
Legro, J. (1995) Cooperation under Fire: Anglo-German Restraint during World War II (Ithaca, NY:
Cornell University Press).
Snyder, J. (1991) Myths of Empire: Domestic Politics and International Ambition (Ithaca: Cornell University
Press).
Thomas, W. (2000) Norms and Security: The Case of International Assassination, International Security 25(1):
105-133.


7. Securing people: emancipation & human security
Key seminar themes:
What is critical in critical security studies?
How useful is emancipation as a normative goal of security?
Is human security a theory of security? Is it a useful framework for security policy?

Security is emancipation?
*Booth, K. (1991) Security and Emancipation, Review of International Studies 17(4): 313-326.
Buzan, B. (1991) People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Brighton:
Wheatsheaf). [Ch. 2]
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press) [Ch. 4]
*Duffield, M. and Waddell, N. (2006) Securing Humans in a Dangerous World, International Politics 43(1): 1-
23.
Dunne, T. and Wheeler, N.J. (2004) We the Peoples: Contending Discourses of Security in Human Rights
Theory and Practice, International Relations 18(1): 9-23.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
14
Neufeld, M. (2004) Pitfalls of Emancipation and Discourses of Security: Reflections on Canadas Security
with a Human Face, International Relations 18(1): 109-123.
Newman, E. (2010) Critical Human Security Studies, Review of International Studies 36(1): 77-94.
Pettman, R. (2005) Human Security as Global Security: Reconceptualising Strategic Studies, Cambridge
Review of International Affairs 18(1): 137-150.
*Shaw, M. (1993) There is No Such Thing as Society: Beyond Individualism and Statism in International
Security Studies, Review of International Studies 19(2): 159-175.
Steans, J. (1998) Gender and International Relations: An Introduction (New Brunswick, N.J.: Rutgers
University Press). [Chapter 5]
Tickner, J. (1992) Gender in International Relations: Feminist Perspectives on Achieving Global Security
(New York: Columbia University Press).
Tickner, J. (2001) Gendering World Politics (New York: Columbia University Press) [Ch. 2]
Weldes, J., et al. (eds.) (1999) Cultures of Insecurity. States, Communities, and the Production of Danger
(London and Minneapolis: University of Minnesota Press). [Introduction: Constructing Insecurity]
Wyn Jones, R. (1995) Message in a Bottle? Theory and Praxis in Critical Security Studies, Contemporary
Security Policy 16(3): 299-319.

Human security
Axworthy, L. (2004) Human Security: An Opening for UN Reform, in Richard M. Price and Mark W.
Zacher (eds.) The United Nations and Global Security (London: Palgrave), pp. 245-260.
Cockell, J.G. (2001) Human Security and Preventive Action Strategies, in Edward Newman and Oliver P.
Richmond (eds.) The United Nations and Human Security (London: Palgrave), pp. 15-30.
Collins, A. (ed.) (2007) Contemporary Security Studies (Oxford: Oxford University Press) [Ch. 6]
Commission on Human Security (2003) Human Security Now (New York: UN).
Gough, M. (2002) Human Security: The Individual in the Security Question - The Case of Bosnia,
Contemporary Security Policy 23(3): 145-191.
Hampson, F.O. (2004) Human Security, Globalisation and Global Governance, in John N. Clarke and
Geoffrey R. Edwards (eds.) Global Governance in the 21
st
Century (London: Palgrave), pp. 177-203.
Kaldor, M. et al. (2007) Human Security: A New Strategic Narrative for Europe, International Affairs 83(2):
273-288.
Khong, Y.F. (2001) Human Security: A Shotgun Approach to Alleviating Human Misery?, Global
Governance 7(3): 231-236.
MacDonald, M. (2002) Human Security and the Construction of Security, Global Society 16(3): 277-95.
Newman, E. (2001) Human Security and Constructivism, International Studies Perspectives 2(3): 239-251.
*Paris, R. (2001) Human Security: Paradigm Shift or Hot Air?, International Security 26(2): 87-102.
*Srensen, G. (1996) Individual Security and National Security. The State Remains the Principal Problem,
Security Dialogue 27(4): 371-386.
Suhrke, A. (1999) Human Security and the Interests of States, Security Dialogue 30(3): 265-76.
*Security Dialogue (2004) Symposium: What is Human Security?, 35(3).
Williams, P. (ed.) (2008) Security Studies: An Introduction (London: Routledge). [Ch. 16]


UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
15
8. Security in the risk paradigm: the biopolitics of security
Key seminar themes:
How useful are the concepts of risk, biopower and biopolitics for understanding contemporary security?
Can security be achieved in the risk society?

Albert, M. (2000) From Defending Borders towards Managing Geographical Risks? Security in a
Globalised World, Geopolitics 5(1): 57 -80.
Amoore, L. and De Goede, M. (eds.) (2008) Risk and the War on Terror (London: Routledge).
Amoore, L. and De Goede, M. (2005) Governance, Risk and Dataveillance in the War on Terror, Crime,
Law & Social Change 43: 149-173.
Aradau, C. et al. (2008) Security, Technologies of Risk, and the Political, Security Dialogue 39(23): 147-
154.
Aradau, C. and Van Munster, R. (2007) Governing Terrorism through Risk: Taking Precautions,
(un)Knowing the Future, European Journal of International Relations 13(1): 89-115.
Aradau, C. (2004) The Perverse Politics of Four-Letter Words: Risk and Pity in the Securitisation of Human
Trafficking, Millennium 33(2): 251-277.
Beck, U. (2003) The Silence of Words: On Terror and War, Security Dialogue 34(3): 255-67.
Beck, U. (2002) The Terrorist Threat: World Risk Society Revisited, Theory, Culture and Society 19(4):
39-55.
Beck, U. (2001) World Risk Society (London: Blackwell).
Beck, U. (1995) Risk Society; Ecological Politics in an Age of Risk (Cambridge: Polity).
Beck, U. (1994) The Reinvention of Politics, in Reflexive Modernisation: Politics, Tradition and Aesthetics
in the Modern Social Order (Stanford: Stanford University Press).
Beck, U. (1992) Risk Society: Towards a New Modernity (London: Sage).
Bigo, D. (2002) Security and Immigration: Toward a Critique of the Governmentality of Unease,
Alternatives: Global, Local, Political 27: 63-92.
Bigo, D. (2006) Internal and External Aspects of Security, European Security 15(4): 385-404.
Bigo, D. (2008) Globalized (in)Security: The Field and the Ban-Opticon, in Bigo, D. and Tsoukala, A.
(eds.) Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11 (London:
Routledge), pp. 10-48.
Campbell, D. (2005) The Biopolitics of Security: Oil, Empire, and the Sports Utility Vehicle, American
Quarterly 57(3): 943-972.
Debrix, F. and Barder, A.D. (2009) Nothing to Fear but Fear: Governmentality and the Biopolitical
Production of Terror, International Political Sociology 3(4): 398-413.
Dillon, M. (2008) Underwriting Security, Security Dialogue 39(23): 309-332.
Dillon, M. and Reid, J. (2001) Global Liberal Governance: Biopolitics, Security and War, Millennium
30(1): 41-66.
Elbe, S. (2008) Risking Lives: AIDS, Security and Three Concepts of Risk, Security Dialogue 39(23):
177198.
Elbe, S. (2005) AIDS, Security, Biopolitics, International Relations 19(4): 403419.
Griner, S. (2002) Living in a World Risk Society: A Reply to Rasmussen, Millennium 31(1): 149-60.
Ingram, A. (2010) Governmentality and Security in the US Presidents Emergency Plan for AIDS Relief
(PEPFAR), Geoforum 41(4): 607-616.
Krahmann, E. (2010) Beck and Beyond: Selling Security in the World Risk Society, Review of
International Studies 36(3): 1-20.
Lobo-Guerrero, L. (2007) Biopolitics of Specialized Risk: An Analysis of Kidnap and Ransom Insurance,
Security Dialogue 38(3): 315-334.
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
16
Tuathail, G. (1998) De-Territorialised Threats and Global Dangers: Geopolitics and Risk Society,
Geopolitics 3(1): 17-31.
Rasmussen, M.V. (2001) Reflexive Security: NATO and International Risk Society, Millennium 30(2):
285-309.
Rasmussen, M.V. (2004) It Sounds Like a Riddle: Security Studies, the War on Terror and Risk,
Millennium 33(2): 381-395.
Salter, M.B. (2009) Surveillance, in Burgess, P.J. (ed.) Handbook of New Security Studies (London,
Routledge), pp. 187-196.
Spence, K. (2005) World Risk Society and War against Terror, Political Studies 53(2): 284-302.
Williams, M.J. (2008) (In)Security Studies, Reflexive Modernization and the Risk Society, Cooperation
and Conflict 43(1): 5779.


9. Truth, Power, and the Politics of Security Analysis
Key seminar themes:
What is the purpose of security theory? What is the role of the security analyst?
What are we doing when we are analysing security; what should we be doing?

*Behnke, A. (2000) The Message or the Messenger? Reflections on the Role of Security Experts and the
Securitization of Political Issues, Cooperation and Conflict 35(1): 89-105.
Booth, K. (1997) Discussion: A Reply to Wallace, Review of International Studies 23(3): 371-377.
Bger, C. and Villumsen, T. (2007) Beyond the Gap: Relevance, Fields of Practice and the Securitizing
Consequences of (Democratic Peace) Research, Journal of International Relations and Development
10(4): 417448.
Bull, H. (1972[2000]) International Relations as an Academic Pursuit, in Alderson, K. and Hurrell, A.
(eds.) Hedley Bull on International Society (London, Palgrave), pp. 246-64.
*Cooperation and Conflict (1999) Symposium: Observers or Advocates? On the Political Role of Security
Analysts, 34(3) [Contributions by Eriksson, Goldmann, Wver and Williams]
Dijkink, G. (1998) Geopolitical Codes and Popular Representations, GeoJournal 46(4):293299.
Huysmans, J. (2002) Defining Social Constructivism in Security Studies. The Normative Dilemma of
Writing Security, Alternatives 27(Supplement): 4162.
Huysmans, J. (1995) Migrants as a Security Problem: Dangers of Securitizing Societal Issues, in Miles,
R. and Thrnhardt, D. (eds.) Migration and European Integration: The Dynamics of Inclusion and
Exclusion (London: Pinter), pp. 5372.
Jentleson, B.W. (2002) The Need for Praxis: Bringing Policy Relevance Back In, International Security
26(4): 169-183.
Kuus, M. (2007) Intellectuals and Geopolitics: The Cultural Politicians of Central Europe, Geoforum
37(2): 241-251.
Lepgold. J. and Nincic, M. (2002) Beyond the Ivory Tower: International Relations Theory and the Issue of
Relevance (New York: Columbia University Press).
Mallin, M. and Latham, R. (2001) The Public Relevance of International Security Research in and Era of
Globalism, International Studies Perspectives 2(2): 221-230.
Tuathail, G. and Agnew, J. (1992) Geopolitics and Discourse: Practical Geopolitical Reasoning in
American Foreign Policy, Political Geography 11(2): 190-204.
Reus-Smit, C. and Snidal, D. (eds.) (2008) The Oxford Handbook of International Relations (Oxford: Oxford
University Press). [Chs. 36 & 37]
Rieff, P. (1969) On Intellectuals: Theoretical Studies, Case Studies (Garden City, N.Y.: Doubleday & Co)
UCL School of Slavonic and East European Studies
SEES GS32 Security, Identity, Polarity
17
*Smith, S. (1997) Power and Truth: A Reply to William Wallace, Review of International Studies 23(4):
507-516.
Tickner, J.A. (2006) On The Frontlines or Sidelines of Knowledge and Power? Feminist Practices of
Responsible Scholarship, International Studies Review 8(3): 383-395.
*Wallace, W. (1996) Truth and Power, Monks and Technocrats: Theory and Practice in International
Relations, Review of International Studies 22(3): 301-321.
Walt, S. (2005) The Relationship between Theory and Policy in International Relations, Annual Review of
Political Science 8: 23-48.
Whiting, A. S. (1972) The Scholar and the Policy-Maker, World Politics 24(Supplement): 229-247.
Wildavsky, A. (1993) Speaking Truth to Power: The Art and Craft of Policy Analysis (New Brunswick, NJ:
Transaction Publishers).

Das könnte Ihnen auch gefallen