Students

PICX111 – Security in an Age of Risk

2016 – SP3 OUA

General Information

Download as PDF
Unit convenor and teaching staff Unit convenor and teaching staff
Sylvia Jastkowiak
Gai Ramesh
Prerequisites Prerequisites
Corequisites Corequisites
Co-badged status Co-badged status
Unit description Unit description
This unit presents a conceptual framework for the study of security studies. It examines the different ways in which security can be conceptualised and the various levels of analysis used in security analysis. Students will examine security politics and securitisation, the legal and political contexts in which security operates and the relationship between chaos, order and resilience in assessing systemic risk. Throughout there is a focus on the confluence of risk factors in an increasingly interconnected world. In addition, an all-hazard approach to security planning and risk assessment is explored. In addition, critical security issues and objections to dominant narratives of security are addressed. The unit then presents an overview of the impact of globalisation and interconnection on security issues and security impacts. It also introduces complexity and systemic approaches to security to examine national and international societal systems. The curriculum concludes with questions about the diminishing returns of security investment in complex systems and how risk-based analysis can overcome stagnation in security actions. All enrolment queries should be directed to Open Universities Australia (OUA): see www.open.edu.au

Important Academic Dates

Information about important academic dates including deadlines for withdrawing from units are available at https://www.open.edu.au/student-admin-and-support/key-dates/

Learning Outcomes

On successful completion of this unit, you will be able to:

  • Define the concept of security as it relates to the various levels of analysis used in security studies, including individual, group, national, regional, international and human security.
  • Explain the key theories of Security Studies applicable to the contemporary security environment.
  • Describe risk-based analysis of security issues, including system effects and security trade-offs in managing risk.
  • Explain the process of securitisation in relation to political and security issues on the current international agenda.
  • Describe the legal and political contexts in which security studies is situated.
  • Appraise the utility of key risk analysis tools in responding to threats and managing vulnerabilities.

Assessment Tasks

Name Weighting Due Groupwork/Individual Short Extension AI Approach
Minor Essay 20% Week 4 No
Major Essay 40% Week 12 No
Exam 30% Week 13 No
Participation 10% Ongoing No

Minor Essay

Due: Week 4
Weighting: 20%
Groupwork/Individual:
Short extension 3: No
AI Approach:

See ilearn for details


On successful completion you will be able to:
  • Define the concept of security as it relates to the various levels of analysis used in security studies, including individual, group, national, regional, international and human security.
  • Describe risk-based analysis of security issues, including system effects and security trade-offs in managing risk.
  • Describe the legal and political contexts in which security studies is situated.

Major Essay

Due: Week 12
Weighting: 40%
Groupwork/Individual:
Short extension 3: No
AI Approach:

See ilearn for details


On successful completion you will be able to:
  • Define the concept of security as it relates to the various levels of analysis used in security studies, including individual, group, national, regional, international and human security.
  • Explain the key theories of Security Studies applicable to the contemporary security environment.
  • Describe risk-based analysis of security issues, including system effects and security trade-offs in managing risk.
  • Describe the legal and political contexts in which security studies is situated.
  • Appraise the utility of key risk analysis tools in responding to threats and managing vulnerabilities.

Exam

Due: Week 13
Weighting: 30%
Groupwork/Individual:
Short extension 3: No
AI Approach:

See details on ilearn


On successful completion you will be able to:
  • Define the concept of security as it relates to the various levels of analysis used in security studies, including individual, group, national, regional, international and human security.
  • Explain the key theories of Security Studies applicable to the contemporary security environment.
  • Explain the process of securitisation in relation to political and security issues on the current international agenda.

Participation

Due: Ongoing
Weighting: 10%
Groupwork/Individual:
Short extension 3: No
AI Approach:

See ilearn for details


On successful completion you will be able to:
  • Appraise the utility of key risk analysis tools in responding to threats and managing vulnerabilities.

Delivery and Resources

DELIVERY AND RESOURCES

 

UNIT REQUIREMENTS AND EXPECTATIONS

  • You should spend an average of at least 12 hours per week on this unit. This includes listening to pre-recorded lectures prior to seminar discussions and reading weekly required readings detailed in iLearn.
  • Internal students are expected to attend all seminar sessions and external students are expected to contribute to on-line discussions.
  • Students are required to submit all major assessment tasks in order to pass the unit.

 

 

REQUIRED READINGS

  • The citations for all the required readings for this unit are available to enrolled students through the unit iLearn site, and at Macquarie University's Library EReserve site.  Electronic copies of required readings may be accessed at the EReserve site.

 

  • The compulsory textbook is:

Paul D. Williams, (ed.), Security Studies: An Introduction, (London: Routledge, 2013).

Students can purchase either a physical or electronic copy online directly from Routledge (www.routledge.com) or from Amazon (www.amazon.com) or the Book Depository (www.bookdepository.com). Copies are also available from the Macquarie University Co-op bookshop.

All materials are available through the Macquarie University library. The compulsory textbook is available in Reserve.

 

TECHNOLOGY USED AND REQUIRED

 

SUBMITTING ASSESSMENT TASKS

  • All assessment tasks are to be submitted, marked and returned electronically.  This will only happen through the unit iLearn site. 
  • Assessment tasks must be submitted either as a PDF or MS word document by the due date.
  • Most assessment tasks will be subject to a 'TurnitIn' review as an automatic part of the submission process.
  • The granting of extensions of up to one week are at the discretion of the unit convener.  Any requests for extensions must be made in writing before the due date for the submission of the assessment task.  Extensions beyond one week are subject to the university’s Disruptions Policy (http://www.mq.edu.au/policy/docs/disruption_studies/policy.html#purpose).

 

 

LATE SUBMISSION OF ASSESSMENT TASKS

  • If an assignment is submitted late, 5% of the available mark will be deducted for each day (including weekends) the paper is late.
  • For example, if a paper is worth 20 marks, 1 mark will be deducted from the grade given for each day that it is late (i.e. a student given 15/20 who submitted 4 days late will lose 4 marks = 11/20).
  • The same principle applies if an extension is granted and the assignment is submitted later than the amended date.

 

 

WORD LIMITS FOR ASSESSMENT TASKS

  • Stated word limits do not include references, bibliography, or title page.
  • Word limits can generally deviate by 10% either over or under the stated figure.
  • If the number of words exceeds the limit by more than 10%, then penalties will apply. These penalties are 5% of he awarded mark for every 100 words over the word limit. If a paper is 300 words over, for instance, it will lose 3 x 5% = 15% of the total mark awarded for the assignment. This percentage is taken off the total mark, i.e. if a paper was graded at a credit (65%) and was 300 words over, it would be reduced by 15 marks to a pass (50%).
  • The application of this penalty is at the discretion of the course convener.

 

REASSESSMENT OF ASSIGNMENTS DURING THE SEMESTER

  • Macquarie University operates a Grade Appeal Policy in cases where students feel their work was graded inappropriately (http://mq.edu.au/policy/docs/gradeappeal/policy.html). This process involves all assignments submitted for that unit being reassessed. However, in exceptional cases students may request that a single piece of work is reassessed.

Unit Schedule

PICX111: Syllabus

 

 

Week 1

 

What is Risk?

 

Week 2

 

Intelligence

 

Week 3

 

Cyber Security

 

Week 4

 

Arms Race and Arms Control

 

Week 5

 

Energy Security

 

Week 6

 

Human Security

 

Week 7

 

Environmental Conflict

 

Week 8

 

Poverty and Health

 

Week 9

 

Population Movements and Refugees

 

Week 10

 

Transnational Organised Crime

 

Week 11

 

Regional Security Institutions

 

Week 12

 

Peace Operations

 

Week 13

 

Conclusion: Challenges for Australia

 

 

Week 1: What is risk?

In this module we will introduce the course and define what is meant by ‘an age of risk’. Risks are conceptually different from threats as the latter imply recognition of a current security challenge to status quo. In contrast, risks are potential future security challenges that could become threats if we treat them as such. It is argued that we are living in an era of risk as the domestic and international system is undergoing a transformation. There is not a clear threat to status quo as status quo itself is changing with the rise of non-traditional security challenges. Change itself cannot be reversed, and security becomes an issue of managing risk. We will first discuss how the international system is changing and the risks it produces, debate the influences and impact of perceptions, prioritise risks by using a risk matrix comparing probability and severity, and lastly address how to manage risks by utilising a cost-benefit analysis.

 

Seminar Questions:

  1. What is risk?

  2. What are the adverse security implications of treating risks as threats?

  3. What and who affects our risk perceptions?

  4. How can a risk matrix and cost-benefit analysis contribute to manage risks?

     

Required Reading

Beck, Ulrich. "Living in the world risk society." Economy and Society 35, no. 3 (2006): 329-345.

Rasmussen, Mikkel Vedby. "Reflexive security: NATO and international risk society." Millennium-Journal of International Studies 30, no. 2 (2001): 285-309.

Recommended Reading

Petersen, Karen Lund. "Risk Analysis-a Field Within Security Studies." European Journal of International Relations (2011): 1-25.

Beck, Ulrich. "The terrorist threat world risk society revisited." Theory, Culture & Society 19, no. 4 (2002): 39-55.

 

Week 2: Intelligence

This module will delve into the question of what the term 'intelligence' actually means, in the context of puzzles, mysteries and risk in security analysis.  Students' preconceived notions defining what intelligence is, as well as how intelligence processes and approaches really work, will be challenged with the objective being to discover where intelligence fits in modern day security operations.

Guest Lecturer: Fred Smith

 

Seminar Questions:

  1. Why is intelligence important to manage risks?

  2. What are the main misconceptions about intelligence?

  3. What are puzzles and a mysteries and why is it imperative to distinguish between the two?

 

Required Reading

Aldrich, Richard J. “Intelligence”, in Security studies: an introduction (Second edition.), Williams, Paul D (ed.).  Routledge, 2013, 235-249.

Marrin, Stephen. "Improving intelligence studies as an academic discipline." Intelligence and National Security (2014): 1-14.

Recommended Reading

Marrin, Stephen. Guide to the Study of Intelligence: Why Teach About Intelligence, The Intelligencer, Volume 20, Number 1, Spring/Summer 2013, available at:https://www.afio.com/publications/MARRIN%20Stephen%20FINAL%20-%20Why%20Teach%20About%20Intelligence%20-%20AFIO%20Intelligencer.pdf

Cavelty, Myriam Dunn, and Victor Mauer. "Postmodern intelligence: Strategic warning in an age of reflexive intelligence." Security Dialogue 40, no. 2 (2009): 123-144.

 

Week 3: Cyber Security

In this module we will explore cyber-security as a growing challenge for national and international security. There is a lack of understanding about the cyber-attacks and what mechanisms can be used in improving both detection and prevention. Providing a secure cyberspace is now a key concern for governments and private sector organisations throughout the world, which requires development of critical infrastructure and an organizational and national/international research agenda supported by multidisciplinary expertise. Dr. Mamoun  Alazab’s presentation provides an overview of cybercrime, cyber security, and cyber terrorism from a technological and a criminological perspective, and explains how criminological theories can be applied to mitigate cyber-attacks. The purpose of this presentation is also to describe recent trends, such as zero-day exploits, botnet attacks against internet banking applications, the emergence of the darknet, the role of organised crime, cybercrime-as-a-service, big data, ransomware, and spam emails. He will also illustrate how new analytics can be used to uncover hidden patterns in malicious software (malware) and offer the promise of improved countermeasures, draw on real world data . 

 Guest Lecturer: Mamoun Alazab

 

Seminar Questions:

  1. What is cybercrime, cyber security, and cyber terrorism?
  2. List some recent trends in the cyberspace?
  3. Does the main threat derive from state or non-state actors?
  4. What are the international norms concerning cyber security?
  5. How can we mitigate the risks to cyber security?

  

Required Reading

O’Connell, Mary Ellen. "Cyber security without cyber war." Journal of Conflict and Security Law 17, no. 2 (2012): 187-209.

Hjortdal, Magnus. "China's use of cyber warfare: Espionage meets strategic deterrence." Journal of Strategic Security 4, no. 2 (2011): 1-24.

Recommended Reading

Kenney, Michael. "Cyber-Terrorism in a Post-Stuxnet World." Orbis 59, no. 1 (2015): 111-128.

Rid, Thomas. "Cyber war will not take place." Journal of Strategic Studies 35, no. 1 (2012): 5-32.

Lewis, James Andrew. Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies, 2002.

Denning, Dorothy E. "Cyberterrorism: The logic bomb versus the truck bomb." Global Dialogue 2, no. 4 (2000): 29. (public access)http://www.worlddialogue.org/content.php?id=111

 

 

 

Week 4: Arms Race and Arms Control

In this module we will explore arms race and race arms control. A common debate in recent scholarship and in the media is whether the military modernisation of the regional countries of the Asia-Pacific constitutes an arms race. Such a question is significant as the region has no arms control regimes to halt destabilizing build-ups of sophisticated weapons platforms, for instance, submarines and ballistic missiles. In the first part of this session we will look at the history of the ‘arms race’ and the consequent debate on arms control versus disarmament, In the second part of this session we will examine the case study of East Asian military modernization programs since 2001.

Guest Lecturer: Sheryn Lee

 

Seminar Questions:

  1. Why do arms races develop?

  2. What are the challenges with implementing arms control?

  3. Why are there no arms control regimes in Asia?

  4. Is an East-Asian arms race probable, or is one already under way?

 

Required Reading

Waheguru, Pal Singh Sidhu. “The Nuclear Disarmament and Non-Proliferation Regime”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.).  Routledge, 2013, 355-373.

Colin S. Gray, ‘The Urge to Compete: Rationales for Arms Racing’, World Politics, Vol. 6, no. 2, January 1974, 207-233.

Recommended Reading

Huntington, Samuel P. "Arms races: Prerequisites and Results.” Public Policy 8, no. 1 (1958): 41-86.

Schelling, Thomas C. Arms and Influence (2nd ed.). New Haven and London, Yale University Press, 2008.

Hedley Bull. “Arms Control and the Balance of Power”, in Ernest W. Lefever, ed., Arms & Arms Control: A Symposium, New York: Praeger for The Washington Center of Foreign Policy Research, 1962, 27-48.

Ayson, Robert. "Arms control in Asia: yesterday's concept for today's region?." Australian Journal of International Affairs 67, no. 1 (2013): 1-17.

 

Week 5: Energy Security

In this module we will explore competing conceptions of ‘energy security’ and how changes in the international system affect energy security. Energy security was traditionally defined as ‘the reliable supply of energy resources’, which is increasingly important to keep modern economies alive. We will address how this concept has been expanded to include the control over energy resources and transportation corridors, which paradoxically can undermine the reliable supply of energy.

 

Seminar Questions:

  1. What is energy security?

  2. Why is energy security of growing importance?

  3. What is the relationship between energy security and war?

  4. What are the energy security risks for China, and does the management of these risks create new risks?

  5. Is the EU and Russia locked in an ‘energy security dilemma’?

 

Required Reading

Klare, Michael T. “Energy Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.).  Routledge, 2013, 535-552.

Yergin, Daniel. "Ensuring Energy Security." Foreign Affairs 85, no. 2 (2006): 69-82.

Recommended Reading

Kruyt, Bert, Detlef P. van Vuuren, H. J. M. De Vries, and Heleen Groenenberg. "Indicators for Energy Security." Energy Policy 37, no. 6 (2009): 2166-2181.

Winzer, Christian. "Conceptualizing energy security." Energy Policy 46 (2012): 36-48.

Monaghan, Andrew. "Russia-EU Relations: an emerging energy security dilemma." Pro et Contra 10, no. 2-3 (2006): 1-13.

 

 

Week 6: Human Security

In this module we will discuss the concept of human security. The paradigm shift from state-centric security to human security challenges previous conceptions of what security entails and how it can be enforced. Human security is a contested concept, ranging from non-coercive peace studies to military interventionism. While protection of the individual has traditionally been the prerogative of the state, history has demonstrated that people are more likely to be killed by their own government than a foreign state. We will introduce the concept of the Responsibility to Protect (R2P) as a key concept and focal point of the human security debate.

 

Seminar Questions:

  1. What is human security?

  2. What are the tensions between the development-focused approach and the interventionist approach to human security?

  3. Does the human security concept strengthen or challenge state security?

  4. What is the Responsibility to Protect?

 

Required Reading

Hampson, Fen Osler. “Human Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.).  Routledge, 2013, 279-294.

Acharya, Amitav. "Human Security: East versus West." International Journal 56, no. 3 (2001): 442-460.

Recommended Reading

Chandler, David. "Resilience and Human Security: The Post-Interventionist Paradigm." Security Dialogue 43, no. 3 (2012): 213-229.

Bellamy, Alex J, The Responsibility to Protect, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 486-502.

Gasper, Des. "Securing humanity: Situating ‘human security’ as concept and discourse." Journal of Human Development 6, no. 2 (2005): 221-245.

 

 

Week 7: Environmental Security

In this module we will discuss environmental security as an emerging risk. Pollution and environmental degradation creates both known and unknown security challenges. Floods, drought, climate change, access to water, food scarcity and other possible effects are an issue of human security and state security. We can respond to these risks by reducing our environmental ‘footprint’ and/or prepare for the consequences. These new and shared risks have the capacity to unite and to divide the international community.

 

Seminar Questions:

  1. What is environmental security?

  2. Is environmental security a branch of human security and state security, or can the environment itself become the referent object?

  3. Employing risk analysis, what is the probability and severity of environmental degradation and global warming, and what are the costs and benefits of managing and mitigating this risk?

 

Required Reading

Dalby, Simon. “Climate Change and Environmental Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 311-323.

Barnett, Jon, and W. Neil Adger. "Climate change, human security and violent conflict." Political Geography 26, no. 6 (2007): 639-655.

Recommended Reading

Trombetta, Maria Julia. "Environmental security and climate change: analysing the discourse." Cambridge Review of International Affairs 21, no. 4 (2008): 585-602.

Oels, Angela. "From ‘securitization’ of climate change to 'climatization' of the security field: comparing three theoretical perspectives." In Climate Change, Human Security and Violent Conflict, Springer Berlin Heidelberg, 2012, 185-205.

Floyd, Rita, and Richard Matthew. Environmental Security: Approaches and Issues. Routledge, 2013.

 

 

Week 8: Poverty and Health

In this module we will explore the nexus between poverty, health and security. Poverty fuels insecurity that are no longer contained to a specific region. While extreme poverty is in decline, inequality (also in the West) is on the rise. Health issues have also climbed on the security agenda over the last years as diseases such as HIV/AIDS are considered both a risk and threat to human security and state security.

 

Seminar Questions:

  1. How does poverty and diseases affect human security and state security?

  2. What is the link between poverty and war?

  3. Is health an issue of national and/or international security?

  4. Where do diseases and epidemics fit on the security matrix, and why does it not receive more attention?

 

Required Reading

McInnes, Colin. “Health”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 324-336.

Thomas, Caroline, and Paul D. Williams. “Poverty”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 295-310.

Recommended Reading

Piazza, James A. "Rooted in poverty?: Terrorism, poor economic development, and social cleavages 1." Terrorism and Political Violence 18, no. 1 (2006): 159-177.

Wilkin, Peter. "Global poverty and orthodox security." Third World Quarterly 23, no. 4 (2002): 633-645.

Justino, Patricia. "On the links between violent conflict and chronic poverty: How much do we really know?." Chronic Poverty Research Centre Working Paper61 (2006).

Brainard, Lael, and Derek H. Chollet. Too poor for peace?: global poverty, conflict, and security in the 21st century. Brookings Institution Press, 2007.

 

Week 9: Population Movements and Refugees

In this module we will explore the relationship between population movements and security risk. Population movements are an issue of both national and international security as population movements have fuelled ethnic tensions, led to the rise of right-wing parties, and even brought down states. We will analyse the risks deriving from the current refugee/migrant crisis in Europe. This case study will demonstrate that the shared risk has created great impetus for unity, while concurrently it has become a source of division that could break apart the European Union.

 

Seminar Questions:

  1. Do population movements create security risks?

  2. How can this security risk be managed without creating new risks?

  3. What are the consequences of treating population movements as a threat rather than a risk?

 

Required Reading

Bali, Sita. “Population Movements”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 520-534.

Cohen, Robin. "Diasporas and the nation-state: from victims to challengers." International Affairs 72, no. 3 (1996): 507-520.

Recommended Reading

Salehyan, Idean, and Kristian Skrede Gleditsch. "Refugees and the spread of civil war." International Organization 60, no. 02 (2006): 335-366.

Mayer, Benoît. "The Arbitrary Project of Protecting Environmental Migrants." in Environmental Migration and Social Inequality, Springer International Publishing, 2016, 189-200.

Bigo, Didier. "Security and immigration: toward a critique of the governmentality of unease." Alternatives 27, no. 1 (2002): 63-92.

Basaran, Tugba. "The saved and the drowned: Governing indifference in the name of security." Security Dialogue (2015): 1-16.

 

Week 10: Transnational Organised Crime

In this module we will explore transnational organised crime as a risk to both state and human security. Assessing transnational organised crime entails addressing a wide variety of crimes by very different types of people. Organised crime has prospered due to ‘globalisation’ or ‘internationalisation’ as people, goods and capital flow across borders with increasing ease. It is widely recognised that weak states produce and/or attract organised crime. A sound argument can be made that transnational governance is required to counter a transnational threat.

Guest Lecturer: John Langdale

 

Seminar Questions:

  1. What is transnational organised crime, and what challenges does it present?

  2. What is the link between organised crime and terrorism?

  3. How can we govern transnational organised crime?

 

Required Reading

Williams, Phil. “Transnational Organised Crime”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 503-519.

Hutchinson, Steven, and Pat O’malley. "A Crime–Terror Nexus? Thinking on Some of the Links between Terrorism and Criminality." Studies in Conflict Terrorism 30, no. 12 (2007): 1095-1107.

Recommended Reading

Cornell, Svante E., and Niklas LP Swanström. "The Eurasian drug trade: A challenge to regional security." Problems of Post-Communism 53, no. 4 (2006): 10-28.

Rollins, John. International terrorism and transnational crime: Security threats, US policy, and considerations for Congress. Diane Publishing, 2010.

Wang, Peng. "The Increasing Threat of Chinese Organised Crime: National, Regional and International Perspectives." The RUSI Journal 158, no. 4 (2013): 6-18.

Miraglia, Paula, Rolando Ochoa, and Ivan Briscoe. "Transnational organised crime and fragile states." OECD (2012).

McCusker, Rob. Transnational crime in the Pacific Islands: real or apparent danger?. Australian Institute of Criminology, 2006.

 

 

Week 11: Regional Security Institutions

In this module we will address the proliferation of regional security institutions as both a management of risk and source of risk. The UN is recognised as the main security institution and representative of international law. However, regional security institutions such as the African Union or ASEAN are more capable of responding to regional challenges. In this module we will discuss how the variety of institutions manages relations between member states, how they engage with other regional security institutions (inter-regionalism), and lastly their relationship with the UN.

 

Seminar Questions:

  1. Are regional security institutions partners and/or competitors to the UN?

  2. How do regional security institutions manage relations among its member states and engage with the broader world?

  3. Why do regional security institutions proliferate?

  4. Are we experiencing a trend towards inter-regionalism and/or is competition simply elevated to competition between more powerful, fewer and less compatible units of power?

 

Required Reading

Fawcett, Louise. “Regional Institutions”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013,, 355-373.

Pempel, Thomas J. "Soft balancing, hedging, and institutional darwinism: The economic-security nexus and East Asian regionalism." Journal of East Asian Studies 10, no. 2 (2010): 209-238.

Manning, Robert A. “Obama’s Sunnylands Summit: Does ASEAN Really Matter?” Atlantic Council, 12 February (2016) available at:http://www.atlanticcouncil.org/blogs/new-atlanticist/obama-s-sunnylands-summit-does-asean-really-matter

Recommended Reading

Jones, Catherine. "Great powers, ASEAN, and security: reason for optimism?." The Pacific Review 28, no. 2 (2015): 259-280.

Coker, Christopher. Globalisation and Insecurity in the Twenty-first Century: NATO and the Management of Risk. Routledge, 2014.

Hasenclever, Andreas, and Brigitte Weiffen. "International institutions are the key: a new perspective on the democratic peace." Review of International Studies32, no. 4 (2006): 563-585.

Kelly, Robert E. "Security Theory in the “New Regionalism” International Studies Review 9, no. 2 (2007): 197-229.

 

 

Week 12: Peace Operations

In this module we will explore the various forms of peace operations, ranging from observation and monitoring, peacekeeping, peace-building and peace-enforcement. During the Cold War a key challenge was to de-couple peace operations from competition between the great powers. After the Cold War, greater focus has been devoted to human security, but without losing their impartiality. There is a dilemma in peace operations as the ‘peace-makers’ either have interests that challenges their impartiality, or they do not have interests and therefore unwilling to contribute blood and treasury.

 

Seminar Questions:

  1. What are the objectives of peace operations?

  2. What are the means for peace operations?

  3. Who is responsible for keeping the peace?

  4. What is the difference between neutrality and impartiality?

  5. Does the involvement of the international community contain and/or proliferate conflicts?

     

Required Reading

Pugh, Michael. “Peace Operations”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 393-408.

Bellamy, Alex J., and Paul D. Williams. "Who's keeping the peace? Regionalization and contemporary peace operations." International Security 29, no. 4 (2005): 157-195.

Recommended Reading

Williams, Michael J. "Empire Lite Revisited: NATO, the Comprehensive Approach and State-building in Afghanistan." International Peacekeeping 18, no. 1 (2011): 64-78.

Bellamy, Alex J. "The ‘next stage’ in peace operations theory?." International Peacekeeping 11, no. 1 (2004): 17-38.

Huéhenno, Jean-Marie. "On the challenges and achievements of reforming UN peace operations." International Peacekeeping 9, no. 2 (2002): 69-80.

Pugh, Michael. "Peacekeeping and critical theory." International Peacekeeping 11, no. 1 (2004): 39-58.

 

 

Week 13: Conclusion: Challenges for Australia

In this module we will discuss the security risks for Australia. The physical geographical isolation of Australia does not insulate it from the emerging security risks. In contrast, Australia faces several risks from issues such as climate change, terrorism and population movements. Beyond unconventional security challenges, the shift in power from the West to the East is changing Australia’s security strategy as it must reconcile its European history and Asian geography. The positioning between the US and China continues to be a pressing topic.

 

Seminar Questions:

  1. What are the main security risks for Australia?

  2. Can Australia harmonise its European history and Asian geography?

  3. How should Australia position itself between the US and China?

  4. What are the risks from migration, terrorism and climate change? Does Australia’s management of these risks create new risks?

 

Required Reading

O'Neil, Andrew. "Conceptualising future threats to Australia's security." Australian Journal of Political Science 46, no. 1 (2011): 19-34.

McDonald, Matt. "Constructing insecurity: Australian security discourse and policy post-2001." International Relations 19, no. 3 (2005): 297-320.

Recommended Reading

Tow, William. "Deputy sheriff or independent ally? Evolving Australian–American ties in an ambiguous world order." The Pacific Review 17, no. 2 (2004): 271-290.

Pietsch, Juliet, and Ian McAllister. "Human security in Australia: public interest and political consequences." Australian Journal of International Affairs 64, no. 2 (2010): 225-244.

Dibb, Paul. "Is the US Alliance of Declining Importance to Australia?." Security Challenges 5, no. 2 (2009): 31-40.

O'neil, Andrew. "Degrading and managing risk: Assessing Australia's counter-terrorist strategy." Australian Journal of Political Science 42, no. 3 (2007): 471-487.

Learning and Teaching Activities

Video Lectures

Weekly video lectures will be provided on the unit iLearn site.

Workshops

Weekly workshops will be facilitate for internal and external students. Workshops focus on practical activities which build analytical and technical skills. Each workshops focuses on one or more structured analytical techniques. Some will include using software platforms which allow users to manipulate information to assist analysis. Internal students will attend a one hour face-to-face session. External students will complete the same activities online with forum and chat support.

Weekly Chat Sessions

Weekly live chat sessions with the unit convenor and/or tutors will allow internal and external students to engage in real-time discussion of course content.

Policies and Procedures

Late Submission - applies unless otherwise stated elsewhere in the unit guide

Unless a Special Consideration request has been submitted and approved, (a) a penalty for lateness will apply – two (2) marks out of 100 will be deducted per day for assignments submitted after the due date – and (b) no assignment will be accepted more than seven (7) days (incl. weekends) after the original submission deadline. No late submissions will be accepted for timed assessments – e.g. quizzes, online tests.

Extension Request

Special Consideration Policy and Procedure (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policies/special-consideration)

The University recognises that students may experience events or conditions that adversely affect their academic performance. If you experience serious and unavoidable difficulties at exam time or when assessment tasks are due, you can consider applying for Special Consideration.

You need to show that the circumstances:

  1. were serious, unexpected and unavoidable
  2. were beyond your control
  3. caused substantial disruption to your academic work
  4. substantially interfered with your otherwise satisfactory fulfilment of the unit requirements
  5. lasted at least three consecutive days or a total of 5 days within the teaching period and prevented completion of an assessment task scheduled for a specific date.

If you feel that your studies have been impacted submit an application as follows:

  1. Visit Ask MQ and use your OneID to log in
  2. Fill in your relevant details
  3. Attach supporting documents by clicking 'Add a reply', click 'Browse' and navigating to the files you want to attach, then click 'Submit Form' to send your notification and supporting documents
  4. Please keep copies of your original documents, as they may be requested in the future as part of the assessment process

Outcome

Once your submission is assessed, an appropriate outcome will be organised.

OUA Specific Policies and Procedures

Withdrawal from a unit after the census date

You can withdraw from your subjects prior to the census date (last day to withdraw). If you successfully withdraw before the census date, you won’t need to apply for Special Circumstances. If you find yourself unable to withdraw from your subjects before the census date - you might be able to apply for Special Circumstances. If you’re eligible, we can refund your fees and overturn your fail grade.

If you’re studying Single Subjects using FEE-HELP or paying up front, you can apply online.

If you’re studying a degree using HECS-HELP, you’ll need to apply directly to Macquarie University.

Macquarie University policies and procedures are accessible from Policy Central. Students should be aware of the following policies in particular with regard to Learning and Teaching:

Academic Honesty Policy http://mq.edu.au/policy/docs/academic_honesty/policy.html

New Assessment Policy in effect from Session 2 2016 http://mq.edu.au/policy/docs/assessment/policy_2016.html. For more information visit http://students.mq.edu.au/events/2016/07/19/new_assessment_policy_in_place_from_session_2/

Assessment Policy prior to Session 2 2016 http://mq.edu.au/policy/docs/assessment/policy.html

Grading Policy prior to Session 2 2016 http://mq.edu.au/policy/docs/grading/policy.html

Grade Appeal Policy http://mq.edu.au/policy/docs/gradeappeal/policy.html

Complaint Management Procedure for Students and Members of the Public http://www.mq.edu.au/policy/docs/complaint_management/procedure.html​

Disruption to Studies Policy http://www.mq.edu.au/policy/docs/disruption_studies/policy.html The Disruption to Studies Policy is effective from March 3 2014 and replaces the Special Consideration Policy.

In addition, a number of other policies can be found in the Learning and Teaching Category of Policy Central.

Student Code of Conduct

Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/support/student_conduct/

Results

Results shown in iLearn, or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au.

Student Support

Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/

Learning Skills

Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.

Student Services and Support

Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.

Student Enquiries

For all student enquiries, visit Student Connect at ask.mq.edu.au

IT Help

For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/

When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.