Sie sind auf Seite 1von 10

GOVT 4348

Course Office Phone 972-883-6843


Terrorism
Professor Dr. Holmes Office Location Gr 3.209
Term Fall 2007 Email Address jholmes@utdallas.edu
Meetings Tues/Thurs 1-2:15 Office Hours 11-12 Tuesday & Thursday

General Course Information you miss more than one exam, you will receive a zero
for the additional missed exam. There are no
Course Description This course examines terrorism
exceptions.
within the context of democratic stability. We will
THE OPTIONAL COMPREHENSIVE EXAM CANNOT BE MADE
examine cases of domestic and international
UP IF MISSED. Plan on taking the optional
terrorism. Alternative government responses to these
comprehensive exam at your own risk.
crises will also be covered, with attention to the
consequences of those policies on democratic
Extra Credit: Students may write a review essay of
stability. In addition, we will also examine state
five pages on an approved book. This paper is due
repression, economic crisis and foreign influence on
the last day of class (11/20). No late papers will be
democratic stability. Substantively, we will deal with
accepted. This is worth up to 2.5% of your final
these questions within the context of individual
grade.
democracies in Latin American and in other regions
of the world. We will also have occasional speakers
Attendance: Class attendance is required. You are
and movies to supplement the readings.
responsible for all announcements and information
Learning Objectives: Course content is designed to given in class. On days in which speakers are
develop students’ international awareness and scheduled, attendance will be taken and those who do
analytical ability. Course assignments aim to develop not attend will lose 1% of the final points for each
students’ abilities to analyze world affairs, to class not attended.
formulate arguments, to read critically, and to write
well. Specifically, students should understand the Late Work: No late extra credit papers will be
debates about the causes of terrorism, consequences accepted.
of terrorism, and the merits of different policy
responses to terrorism Expectations of Students: The exams are based on
lecture material and required readings. Some of the
Required Texts & Materials lecture material will not be in the readings. (The
• Terrorism in Context, edited by Martha Crenshaw professor will not provide copies of class notes). The
(Penn State Press, 1995) students should have carefully read the material at
• Jennifer S. Holmes, Terrorism and Democratic least once before class.
Stability Transaction Press 2006
• Major international news source of your choice: Cell Phones: Due to receiving numerous complaints
nytimes.com, ft.com, http://news.bbc.co.uk/ from students, this policy is necessary. If you allow
• Numerous articles available in electronic format your cell phone or beeper to audibly ring or beep in
through the library’s electronic databases. class, you will be penalized. The first time is a
warning, after that you lose points. The penalty starts
Course Policies at two percentage points and will double every time
Grading (credit) Criteria: thereafter. If you answer the phone, no warning will
o September 27th First midterm exam (30%) be granted and you will be immediately assessed the
o October 25th Preliminary outline, search penalty.
results, and bibliography (10%).
o November 13th Second midterm exam Classroom Citizenship: I expect students to be
(30%) attentive during class and to actively participate in
o November 20th Extra credit (2.5%) group activities. You are expected to listen
o November 29th A seven to nine page paper respectfully to me and to other students when
(30%) due at 4:00 pm speaking. Racism, sexism, homophobia, classism,
o November 29th Comprehensive Make-up ageism and other forms of bigotry are inappropriate
11:00 to express in this class. We may discuss issues that
require sensitivity and maturity. Disruptive students
Make-up Exams: NO MAKE UP EXAMS WILL BE GIVEN. will be asked to leave and may be subject to
Instead, with advance notice, students may take a disciplinary action.
comprehensive final exam to replace one exam. If
Student Conduct and Discipline: The University of mail. At the same time, email raises some issues
Texas System and The University of Texas at Dallas concerning security and the identity of each
have rules and regulations for the orderly and individual in an email exchange. The university
efficient conduct of their business. It is the encourages all official student email correspondence
responsibility of each student and each student be sent only to a student’s U.T. Dallas email address
organization to be knowledgeable about the rules and and that faculty and staff consider email from
regulations which govern student conduct and students official only if it originates from a UTD
activities. student account. This allows the university to
The University of Texas at Dallas administers student maintain a high degree of confidence in the identity of
discipline within the procedures of recognized and all individual corresponding and the security of the
established due process. Procedures are defined and transmitted information. UTD furnishes each student
described in the Rules and Regulations, Board of with a free email account that is to be used in all
Regents, The University of Texas System, Part 1, communication with university personnel. The
Chapter VI, Section 3, and in Title V, Rules on Student Department of Information Resources at U.T. Dallas
Services and Activities of the university’s Handbook provides a method for students to have their U.T.
of Operating Procedures. Copies of these rules and Dallas mail forwarded to other accounts.
regulations are available to students in the Office of
the Dean of Students, where staff members are Withdrawal from Class: The administration of this
available to assist students in interpreting the rules institution has set deadlines for withdrawal of any
and regulations (SU 1.602, 972/883-6391). college-level courses. These dates and times are
A student at the university neither loses the rights nor published in that semester's course catalog.
escapes the responsibilities of citizenship. He or she Administration procedures must be followed. It is the
is expected to obey federal, state, and local laws as student's responsibility to handle withdrawal
well as the Regents’ Rules, university regulations, and requirements from any class. In other words, I cannot
administrative rules. Students are subject to drop or withdraw any student. You must do the
discipline for violating the standards of conduct proper paperwork to ensure that you will not receive
whether such conduct takes place on or off campus, a final grade of "F" in a course if you choose not to
or whether civil or criminal penalties are also attend the class once you are enrolled.
imposed for such conduct.
Student Grievance Procedures: Procedures for
Academic Integrity: The faculty expects from its student grievances are found in Title V, Rules on
students a high level of responsibility and academic Student Services and Activities, of the university’s
honesty. Because the value of an academic degree Handbook of Operating Procedures.
depends upon the absolute integrity of the work done In attempting to resolve any student grievance
by the student for that degree, it is imperative that a regarding grades, evaluations, or other fulfillments of
student demonstrate a high standard of individual academic responsibility, it is the obligation of the
honor in his or her scholastic work. student first to make a serious effort to resolve the
Scholastic dishonesty includes, but is not limited to, matter with the instructor, supervisor, administrator,
statements, acts or omissions related to applications or committee with whom the grievance originates
for enrollment or the award of a degree, and/or the (hereafter called “the respondent”). Individual
submission as one’s own work or material that is not faculty members retain primary responsibility for
one’s own. As a general rule, scholastic dishonesty assigning grades and evaluations. If the matter
involves one of the following acts: cheating, cannot be resolved at that level, the grievance must be
plagiarism, collusion and/or falsifying academic submitted in writing to the respondent with a copy of
records. Students suspected of academic dishonesty the respondent’s School Dean. If the matter is not
are subject to disciplinary proceedings. resolved by the written response provided by the
Plagiarism, especially from the web, from portions of respondent, the student may submit a written appeal
papers for other classes, and from any other source is to the School Dean. If the grievance is not resolved by
unacceptable and will be dealt with under the the School Dean’s decision, the student may make a
university’s policy on plagiarism (see general catalog written appeal to the Dean of Graduate or
for details). This course will use the resources of Undergraduate Education, and the deal will appoint
turnitin.com, which searches the web for possible and convene an Academic Appeals Panel. The
plagiarism and is over 90% effective. decision of the Academic Appeals Panel is final. The
results of the academic appeals process will be
Email Use: The University of Texas at Dallas distributed to all involved parties.
recognizes the value and efficiency of communication Copies of these rules and regulations are available to
between faculty/staff and students through electronic students in the Office of the Dean of Students, where
staff members are available to assist students in
interpreting the rules and regulations. hours.

Incomplete Grades: As per university policy, Resources to Help You Succeed: The university
incomplete grades will be granted only for work offers assistance to students in many areas. Please do
unavoidably missed at the semester’s end and only if not feel stigmatized by using these resources. Good
70% of the course work has been completed. An students become better students by using them.
incomplete grade must be resolved within eight (8) Learning Resource Center offers a variety of
weeks from the first day of the subsequent long programs to help you, ranging from individual
semester. If the required work to complete the course tutoring to review classes for the GRE, GMAT, etc.
and to remove the incomplete grade is not submitted They are located in MC2.402 and can be reached at
by the specified deadline, the incomplete grade is 883-6707.
changed automatically to a grade of F.
Religious Holy Days: The University of Texas at
Webct: Webct is used in this class. This is how I will Dallas will excuse a student from class or other
communicate with you. You are responsible for required activities for the travel to and observance of
announcements made through webct. Please select a a religious holy day for a religion whose places of
forwarding address in your mail preferences if you do worship are exempt from property tax under Section
not regularly check your utdallas email. 11.20, Tax Code, Texas Code Annotated. The student
is encouraged to notify the instructor or activity
Disability Services: The goal of Disability Services is sponsor as soon as possible regarding the absence,
to provide students with disabilities educational preferably in advance of the assignment. The student,
opportunities equal to those of their non-disabled so excused, will be allowed to take the exam or
peers. Disability Services is located in room 1.610 in complete the assignment within a reasonable time
the Student Union. Office hours are Monday and after the absence: a period equal to the length of the
Thursday, 8:30 a.m. to 6:30 p.m.; Tuesday and absence, up to a maximum of one week. A student
Wednesday, 8:30 a.m. to 7:30 p.m.; and Friday, 8:30 who notifies the instructor and completes any missed
a.m. to 5:30 p.m. exam or assignment may not be penalized for the
The contact information for the Office of Disability absence. A student who fails to complete the exam or
Services is: assignment within the prescribed period may receive
The University of Texas at Dallas, SU 22 a failing grade for that exam or assignment. If a
PO Box 830688 student or an instructor disagrees about the nature of
Richardson, Texas 75083-0688 the absence [i.e., for the purpose of observing a
(972) 883-2098 (voice or TTY) religious holy day] or if there is similar disagreement
Essentially, the law requires that colleges and about whether the student has been given a
universities make those reasonable adjustments reasonable time to complete any missed assignments
necessary to eliminate discrimination on the basis of or examinations, either the student or the instructor
disability. For example, it may be necessary to may request a ruling from the chief executive officer
remove classroom prohibitions against tape recorders of the institution, or his or her designee. The chief
or animals (in the case of dog guides) for students executive officer or designee must take into account
who are blind. Occasionally an assignment the legislative intent of TEC 51.911(b), and the student
requirement may be substituted (for example, a and instructor will abide by the decision of the chief
research paper versus an oral presentation for a executive officer or designee.
student who is hearing impaired). Classes enrolled
students with mobility impairments may have to be Off-Campus Instruction and Course Activities: Off-
rescheduled in accessible facilities. The college or campus, out-of-state, and foreign instruction and
university may need to provide special services such activities are subject to state law and University
as registration, note-taking, or mobility assistance. It policies and procedures regarding travel and risk-
is the student’s responsibility to notify his or her related activities. Information regarding these rules
professors of the need for such an accommodation. and regulations may be found at
Disability Services provides students with letters to http://www.utdallas.edu/BusinessAffairs/Travel_Ri
present to faculty members to verify that the student sk_Activities.htm. Additional information is
has a disability and needs accommodations. available from the office of the school dean.
Individuals requiring special accommodation should
contact the professor after class or during office
Date Topic Reading
8.16.2007 Introduction Syllabus
Thursday
1. “Thoughts on Relating Terrorism to Historical Contexts” by Martha Crenshaw in
8.21.2007 Definitions
Terrorism in Context
Tuesday 2. Leonard Weinberg, Ami Pedahzur, and Sivan Hirsch-Hoefler, “The Challenges of
Conceptualizing Terrorism.” Terrorism & Political Violence, 16/4 (Winter 2004)
3. Beril Dedeoglu “Bermuda Triangle: Comparing Official Definitions of Terrorist
Activity.” Terrorism and Political Violence, Volume 15, Number 3, October 2003,
pp. 81-110.
Theoretical 1. Magnus Ranstorp, “Terrorism in the name of religion” Journal of International
8.23.2007
Issues Affairs, Summer96, Vol. 50 Issue 1, p41, 22p
Thursday 2. Colin Gray, “Thinking Asymmetrically in Times of Terror” Parameters Spring
2002
3. David C. Rapoport, “Fear and Trembling: Terrorism in Three Religious
Traditions,” American Political Science Review, 78 (1984), pp. 658-77.
4. Jennifer Holmes, Terrorism and Democratic Stability Chapter 1
Origins and 1. Leonard Weinberg, “Turning to Terror: The Conditions under Which Political
8.28.2007
Parties Turn to Terrorist Activities,” Comparative Politics 23, 4 (July 1991), pp.
Tuesday Globalization
423-38.
2. S. Brock Blomberg, Gregory D. Hess and Akila Weerapana, “Economic conditions
and terrorism” European Journal of Political Economy Vol 20. Issue 2 (2004):
463-478
3. David C. Rapoport, “The Fourth Wave: September 11 in the History of Terrorism”
Current History, Volume 100, Number 650 (December 2001)
4. Fox, Jonathan. Is Ethnoreligious Conflict a Contagious Disease? Studies in Conflict
& Terrorism 27:89-106 March-April 2004.
1. Charles Townshend, “The Culture of Paramilitarism in Ireland” in Terrorism in
8.30.2007 N. Ireland
Context Ch. 8
Thursday 2. Andrew Silke, “Ragged Justice: Loyalist Vigilantism in Northern Ireland”
Terrorism & Political Violence Vol. 11 No. 3 (Autumn 1999)
3. Anthony Richards, “Terrorist Groups and Political Fronts: The IRA, Sinn Fein, the
Peace Process and Democracy” Terrorism and Political Violence Vol. 13. No. 4
(Winter 2001)
4. Steve Bruce “Terrorism and Politics: The Case of Northern Ireland’s Loyalist
9.4.2007 N. Ireland
Paramilitaries” Terrorism & Political Violence Vol. 13 No. 2 (Summer 2001)
Tuesday 5. Paul Dixon, “Political Skills or Lying and Manipulation? The Choreography of the
Northern Ireland Peace Process,” Political Studies 50 (2002), pp. 725-741
6. David Veness “Terrorism and Counterterrorism: An International Perspective”
Studies in Conflict and Terrorism Volume 24, Number 5 / September 1, 2001 pp.
407 - 416
1. Nadav Morag. “Measuring Success in Coping with Terrorism: The Israeli Case”
9.6.2007 Palestinian/
Studies in Conflict and Terrorism Volume 28, Number 4 / (July-August 2005) 307 -
Thursday Israeli 320
Conflict 2. Ian Lustick, “Terrorism in the Arab-Israeli Conflict” in Terrorism in Context Ch.
12
3. Sharm El-Sheikh Fact-Finding Committee Report (The Mitchel Report)
http://www.state.gov/p/nea/rls/rpt/3060.htm
9.11.2007 Palestinian/
4. Nadav Morag, “Measuring Success in Coping with Terrorism: The Israeli Case”
Tuesday Israeli Studies in Conflict & Terrorism; July 2005; Volume 28 No. 4 Pages 307 – 320
Conflict 5. Ami Pedahzur, “The Transformation of Israel’s Extreme Right” Studies in Conflict
and Terrorism 24 ( 2001):25-42.
6. The Roadmap for Middle East Peace at
http://www.state.gov/r/pa/prs/ps/2003/20062.htm.
1. Irm Haleem. “Micro-Target, Macro-Impact: The Resolution of the Kashmir Conflict
9.13.2007 India
as a Key to Shrinking Al-Qaeda’s International Terrorist Network” Terrorism and
Thursday Political Violence, Volume 16, Number 1 (Spring 2004), pp. 18-47
2. Krisha Kumar, “Religious Fundamentalism in India and Beyond” Parameters
Autumn 2002
3. Paul Wallace, “Political Violence and Terrorism in India: The Crisis of Identity” in
Terrorism in Context Ch. 12
4. James Cotton. “Southeast Asia after 11 September.” Terrorism and Political
Violence, Volume 15, Number 1 (March 2003), pp. 148-170
1. William Avilés, “Paramilitarism and Colombia’s Low-Intensity Democracy.”
9.18.2007 Colombia
Journal of Latin American Studies Volume: 38 Issue: 2 (2006): 379-408
Tuesday 2. Patricia Bibes, “Transnational Organized Crime and Terrorism: Colombia as a case
study” Journal of Contemporary Criminal Justice Vol. 17 No 3, August 2001, 243-
258]
3. Holmes, Jennifer S., Sheila Amin Gutiérrez de Piñeres, and Kevin Curtin. 2006.
“Drugs, Violence and Development in Colombia: A Department Level Analysis”
Latin American Politics and Society, 48/3: 157-184.
1. Phillippe Serres, “The FARC and Democracy in Colombia in the 1990’s”
9.20.2007 Colombia
Democratization Vol. 7 No. 4 Winter 2000, pp. 191-218.
Thursday 2. Roman Ortiz, “Insurgent Strategies in the Post-Cold War: The Case of the
Revolutionary Armed Forces of Colombia” Studies in Conflict and Terrorism
25:127-143, 2002
3. Rubio, Mauricio. “Illegal Armed Groups and Local Politics in Colombia.” Journal
of Drug Issues Vol. 35 Issue 1 (Winter2005): 107-130
1. Jennifer S. Holmes. “Political Violence and Regime Stability in Argentina 1965-
9.25.2007 Argentina
1976” Terrorism and Political Violence (Spring 2001) Vol. 13 No. 1
Tuesday 2. Richard Gillespie, “Political Violence in Argentina: Guerrillas, Terrorists, and
Carapintadas,” in Terrorism in Context.
3. David Pion-Berlin; George A. Lopez “Of Victims and Executioners: Argentine State
Terror, 1975-1979” International Studies Quarterly, Vol. 35, No. 1. (Mar., 1991),
pp. 63-86.
9.27.2007 Exam
Thursday
1. Fernando Reinares “Who Are the Terrorists? Analyzing Changes in Sociological
10.2.2007 Spain
Profile among Members of ETA” Studies in Conflict and Terrorism Volume 27,
Tuesday (Number 6 / November-December 2004) 465 - 488
2. Goldie Shabad and Francisco Jose Llera Ramo, “Political Violence in a Democratic
State: Basque Terrorism in Spain” in Terrorism in Context Ch. 10
3. Holmes, Jennifer Terrorism and Democratic Stability Spain sections pp (47-54, 60-
2, 67-8, 86-8, 105-10, 121-4, 130-1, 144-7, 158-60)
1. Lewis Taylor, “Counter-insurgency strategy, the PCP-Sendero Luminoso and the
10.4.2007 Peru
civil war in Peru, 1980-1996) Bulletin of Latin American Research Vol 17 No 1
Thursday (January 1998) 35-58.
2. David Scott Palmer, “The Revolutionary Terrorism of Peru’s Shining Path” in
Terrorism in Context Ch 7
3. Holmes, Jennifer Terrorism and Democratic Stability Peru sections pp (42-7, 58-60,
65-7, 83-6, 98-105, 118-21, 126-30, 138-43, 154-8)

1. Holmes, Jennifer Terrorism and Democratic Stability Uruguay sections pp (36-42,


10.9.2007 Uruguay
55-8, 63-5, 80-3, 90-8, 116-8, 124-6, 134-8, 150-4)
Tuesday 2. Delgado, Maria. “Truth and Justice in Uruguay.” NACLA Report on the Americas,
Jul/Aug2000, Vol. 34 Issue 1, p37-9.
3. Charles G. Gillespie “Symposium: The Rebirth of Democracy in Latin
America Uruguay’s Return to Democracy “ Bulletin of Latin American
Research, Vol. 4, No. 2. (1985), pp. 99-107.
US Domestic 1. Leader, Stefan and Probst, Peter. “Earth Liberation Front and Environmental
10.11.2007
Terrorism.” Terrorism and Political Violence 15/4 (Winter 2003)
Thursday Threats
2. Ackerman, Gary A. “Beyond Arson? A Threat Assessment of the Earth
Liberation Front” Terrorism and Political Violence, vol. 15, no. 4, pp. 143-170,
winter 2003
3. Daniel Schwartz, “Environmental Terrorism: Analyzing the Concept,” Journal of
Peace Research 35:4 (July 1998), pp. 483-496
US Domestic 1. Durham, Martin “The American Far Right and 9/11” Terrorism and Political
10.16.2007
Threats Violence, 2003, 15, 2, summer, 96-111.
Tuesday 2. FBI Project Megiddo
http://permanent.access.gpo.gov/lps3578/www.fbi.gov/library/megiddo/megiddo.
pdf
3. George Michael, “The Revolutionary Model of Dr William L. Pierce” Terrorism
and Political Violence Vol 15 No 3 (Autumn 2003): 62-80.
Domestic 1. Donald Haider-Markel and Sean O’Brien. “Creating a ‘Well Regulated Militia’:
10.18.2007
Policy Policy Response to Paramilitary Groups in the American States,” Political
Thursday Research Quarterly September 1997 Vol. 50 No. 3,
Responses
2. James E. Duffy and Alan C. Brantley “Militias: Initiating Contact” Law
Enforcement Bulletin July 1997 http://www.fbi.gov/publications/leb/leb.htm
3. Laura Donahue, “In the Name of National Security: US Counterterrorist Measures,
1960-2000” Terrorism and Political Violence Vol. 13 No. 3 (Summer 2001)
Domestic 1. Martha Crenshaw, “Counterterrorism Policy and the Political Process” Studies in
10.23.2007
Policy Conflict and Terrorism Volume 24, Number 5 (September 2001): 329 – 337
Tuesday 2. Daniel Byman, “The Decision to Begin Talks with Terrorists: Lessons for
Responses
Policymakers” Studies in Conflict and Terrorism Volume 29, Number 5 (July-
August 2006): 403 – 414.
3. Jennifer Holmes, Terrorism and Democratic Stability Conclusion
1. Ryan Hendrickson, “American War Powers and Terrorists: The Case of Usama Bin
10.25.2007 Al Qaeda
Laden” Studies in Conflict and Terrorism 23:161-174, 2000
Thursday Preliminary 2. Bernard Lewis, “License to Kill” Foreign Affairs Nov/ Dec 1998
outline, search 3. Ladan Boroumand and Roya Boroumand, “Terror, Islam and Democracy” Journal
results, and of Democracy Vol. 13 no. 2 (April 2002)
bibliography 4. Javier Jordan, Luisa Boix. “Al-Qaeda and Western Islam” Terrorism and Political
due! Violence, Volume 16, Number 1 (Spring 2004), pp. 1-17.
1. Byman, Daniel. “Al-Qaeda as an Adversary: Do we Understand our Enemy?”
10.30.2007 Al Qaeda
World Politics 56, no. 1 (2003): 139-163.
Tuesday 2. Zimmerman, John. “Sayyid Qutb’s Influence on the 11 September Attacks.”
Terrorism and Political Violence. 16, issue 2 (Summer 2004)
3. Chipman, Don D. “Osama Bin Laden and Guerrilla War.” Studies in Conflict &
Terrorism, 26:3(May 2003): 163-170
4. Max Abrahms Al Qaeda’s Scorecard: A Progress Report on Al Qaeda’s Objectives
Studies in Conflict and Terrorism Volume 29, Number 5 (July-August 2006): 509
– 529.
International 1. Bruce Hoffman, “Rethinking Terrorism and Counterterrorism Since 9/11”
11.01.2007
Policy Studies in Conflict and Terrorism 25(2002):303-316
Thursday 2. Philip B. Heymann, “Dealing with Terrorism: An Overview” International Security
Responses
26.3 (Winter 2001/02)
3. Petter Nesser “Jihadism in Western Europe After the Invasion of Iraq: Tracing
Motivational Influences from the Iraq War on Jihadist Terrorism in Western
Europe” Studies in Conflict & Terrorism July 2006; Volume 29 No. 4 Pages 323 –
342
International 1. Tom Carothers. “Promoting Democracy and Fighting Terror” Foreign Affairs
11.06.2007
Policy (January/February 2003)
Tuesday 2. Bruce Hoffman, “Insurgency and Counterinsurgency in Iraq” Studies in Conflict
Responses
and Terrorism Volume 29, Number 2 (March-April 2006):103 - 121
3. Carr, Caleb. “Terrorism as Warfare: The Lessons of Military History,” World
Policy Journal Winter 1996 Vol. 13,No.4.
4. Defeating the Jihadists: A Blueprint for Action
http://www.tcf.org/Publications/HomelandSecurity/clarke/clarkesummary.pdf
Intelligence 1. Martin, Kate, “Domestic Intelligence and Civil Liberties” SAIS Review Volume 24,
11.08.2007
Reform Number 1, Winter-Spring 2004
Thursday 2. Richard A. Best, Jr., “Intelligence Issues for Congress CRS Issue Brief for
Congress” http://www.fas.org/sgp/crs/intel/IB10012.pdf
3. Treverton, Gregory. “Terrorism, Intelligence and Law Enforcement: Learning the
Right Lessons.” Intelligence and National Security 18, no. 4 (2003): 121-140.
11.13.2007 Exam #2
Tuesday

11.15.2007 Speaker Attendance Taken

Thursday

11.20.2007 Speaker Attendance Taken

Tuesday
11.22.2007 Thanksgiving No class
Thursday

11:00 ( This is a make-up exam only for those who missed either midterm)
11.29.2007 Comprehensive
Thursday Exam

11.29.2007 Final Paper 4:00 (submit to both GR 3.209 and turnitin.com)


Thursday Due

This syllabus is tentative and subject to change. Please feel free to contact me about any concerns you
have about the course
Paper Topic
Pick an approved topic. The paper should be seven to nine pages, excluding the bibliography. Good papers ask a
question, as opposed to just providing background information. Please note the papers that do not reflect
adequate peer reviewed research will receive no more than a C, regardless of the quality of the prose.

You must turn in a copy of your paper to me. In addition, you must submit the same paper electronically to:
http://turnitin.com/ BOTH COPIES MUST BE RECEIVED BY THE DEADLINE.
Register and then log on to the class. The course number is 1938547 and the password is bombs. Your paper will
receive a zero if it is not submitted by the deadline to turnitin.com.
Dr. Holmes’ Expectations for Papers
Format:
1. Use footnotes. (See The Chicago Manual of Style for details). A summary can be found at
http://www.libs.uga.edu/ref/chicago.html Use the documentary note style -not the author note system!!! This is
not the MLA form of citation. MLA citation is an author-date system. If using Microsoft word, under the insert
menu, choose reference and then footnote to automatically number the reference and place it at the bottom of the
page. The style is as follows:

Examples of footnotes:
1
David Stafford, Britain and European Resistance (Toronto: University of Toronto Press, 1980), 90.
2
James F. Powers, "Frontier Municipal Baths and Social Interaction in Thirteenth-Century Spain," American
Historical Review 84 (June 1979): 655.

Bibliography:
Stafford, David. Britain and European Resistance. Toronto: University of Toronto Press, 1980.
Powers, James F. "Frontier Municipal Baths and Social Interaction in Thirteenth-Century Spain." American
Historical Review 84 (June 1979): 649-67.

According to The Chicago Manual of Style, "the full reference of a note, as in a bibliographic entry, must include
enough information to enable the interested reader to find it in a library, though the form of the note need not
correspond precisely to that of the library catalog." 1

2. Use a 12 point font.


3. The text should be typed, double spaced, and have one inch margins.
4. Do not add extra spaces between paragraphs.
5. Number the pages.
6. Include a title page with your name, course title, and date.
7. Include a bibliography.

Style:
1. Include an introduction and conclusion with appropriate outlines and summation of the main points of your
paper.
2. Use topic sentences in your paragraphs. (Please – no two sentence paragraphs or two page paragraphs!)
3. Do not use a casual tone. (For example, do not use contractions such as “can’t,” “wouldn’t”, etc.)
4. Avoid speaking in the first person. (For example, “In this paper I will …”)
5. Spell check!

Sources:
1. Use multiple sources. Do not quote lecture notes.
2. You should have a combination of academic, peer reviewed books and journals as sources.
3. As a supplement only, you may use internet or conventional news sources (for example The Economist or the
New York Times). They should not constitute the core of your research.
4. Cite often. An overabundance of citations is always preferable to too few. Cite as if you want the reader to be
able to easily refer to your sources when you refer to facts, quotations, and interpretations.
5. If someone else says it, you must give credit to him or her. If you repeat the author verbatim, you must quote
and cite the author. If you paraphrase his or her words, you must cite the author. Failure to do this is
plagiarism.

General Warning:

1
Chicago Manual of Style, 13th ed. (Chicago: University of Chicago Press, 1982), 487.
Scholastic dishonesty will be severely punished. The student will be subject to university disciplinary
proceedings. The UTD Undergraduate Catalog defines scholastic dishonesty as the following: “Scholastic
dishonesty includes, but is not limited to, statements, acts or omissions related to applications for enrollment or the
award of a degree, and/or the submission as one’s own work of material that is not one’s own. As a general rule,
scholastic dishonesty involves one of the following acts: cheating, plagiarism, collusion and/or falsifying academic
records.”

Adapted from Duke University guidelines for writers


AVOIDING PLAGIARISM
GATHERING RESEARCH MATERIAL

Take time to make careful choices among -- and learn to use -- the research tools available to you. You will
probably find that your favorite Web search engine is not adequate, by itself, for college-level research. Consult with
your professor or a librarian. You may need to use specialized research tools, some of which may require learning
new searching techniques.

Expect to make trips to the library. While you can access many of the library's resources from your home
computer, you may find that you need to make several trips to the library to use materials or research tools that are
not accessible remotely. Of course you will be seeking the best information, not settling for sources simply because
they happen to be available online.

Allow time for gathering materials that are not available at UTD. The Interlibrary Loan office can borrow articles
and books from other libraries, but this process takes additional time.
Allow time for reading, rereading, absorbing information, taking notes, synthesizing, and revising your research
strategy or conducting additional research as new questions arise.

TAKING NOTES

Sloppy note-taking increases the risk that you will unintentionally plagiarize. Unless you have taken notes
carefully, it may be hard to tell whether you copied certain passages exactly, paraphrased them, or wrote them
yourself. This is especially problematic when using electronic source materials, since they can so easily be copied
and pasted into your own documents.

Identify words that you copy directly from a source by placing quotation marks around them, typing them in a
different color, or highlighting them. (Do this immediately, as you are making your notes. Don't expect to
remember, days or weeks later, what phrases you copied directly.) Make sure to indicate the exact beginning and
end of the quoted passage. Copy the wording, punctuation and spelling exactly as it appears in the original.

Jot down the page number and author or title of the source each time you make a note, even if you are not
quoting directly but are only paraphrasing.

Keep a working bibliography of your sources so that you can go back to them easily when it's time to double-
check the accuracy of your notes. If you do this faithfully during the note-taking phase, you will have no trouble
completing the "works cited" section of your paper later on.

Keep a research log. As you search databases and consult reference books, keep track of what search terms and
databases you used and the call numbers and url's of information sources. This will help if you need to refine your
research strategy, locate a source a second time, or show your professor what works you consulted in the process of
completing the project.
DOCUMENTING SOURCES

You must cite direct quotes.

You must cite paraphrases. Paraphrasing is rewriting a passage in your own words. If you paraphrase a passage,
you must still cite the original source of the idea. For detailed examples and a discussion, see Appropriate Uses
of Sources.

You must cite ideas given to you in a conversation, in correspondence, or over email.

You must cite sayings or quotations that are not familiar, or facts that are not "common knowledge."
However, it is not necessary to cite a source if you are repeating a well known quote such as Kennedy's "Ask not
what your country can do for you . . .," or a familiar proverb such as "You can't judge a book by its cover."
Common knowledge is something that is widely known. For example, it is common knowledge that Bill Clinton
served two terms as president. It would not be necessary to cite a source for this fact.

These types of sources Printed sources: books, parts of books, magazine or journal articles,
should be documented. newspaper articles, letters, diaries, public or private documents.

There is a common Electronic sources: web pages, articles from e-journals, newsgroup
misconception that only printed postings, graphics, email messages, software, databases.
sources of information, like
books and magazine articles, Images: works of art, illustrations, cartoons, tables, charts, graphs.
need to be formally cited. In
fact, audiovisual and electronic
Recorded or spoken material: course lectures, films, videos, TV or
sources -- even email messages
radio broadcasts, interviews, public speeches, conversations.
-- must be documented as well,
if you use ideas or words from
them in your writing. Here are
some examples of the kinds of
sources that should be cited:

Das könnte Ihnen auch gefallen