| Unit convenor and teaching staff |
Unit convenor and teaching staff
Sylvia Jastkowiak
Gai Ramesh
|
|---|---|
| Prerequisites |
Prerequisites
|
| Corequisites |
Corequisites
|
| Co-badged status |
Co-badged status
|
| Unit description |
Unit description
This unit presents a conceptual framework for the study of security studies. It examines the different ways in which security can be conceptualised and the various levels of analysis used in security analysis.
Students will examine security politics and securitisation, the legal and political contexts in which security operates and the relationship between chaos, order and resilience in assessing systemic risk. Throughout there is a focus on the confluence of risk factors in an increasingly interconnected world. In addition, an all-hazard approach to security planning and risk assessment is explored.
In addition, critical security issues and objections to dominant narratives of security are addressed. The unit then presents an overview of the impact of globalisation and interconnection on security issues and security impacts. It also introduces complexity and systemic approaches to security to examine national and international societal systems. The curriculum concludes with questions about the diminishing returns of security investment in complex systems and how risk-based analysis can overcome stagnation in security actions.
All enrolment queries should be directed to Open Universities Australia (OUA): see www.open.edu.au
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.open.edu.au/student-admin-and-support/key-dates/
On successful completion of this unit, you will be able to:
| Name | Weighting | Due | Groupwork/Individual | Short Extension | AI Approach |
|---|---|---|---|---|---|
| Minor Essay | 20% | Week 4 | No | ||
| Major Essay | 40% | Week 12 | No | ||
| Exam | 30% | Week 13 | No | ||
| Participation | 10% | Ongoing | No |
Due: Week 4
Weighting: 20%
Groupwork/Individual:
Short extension 3: No
AI Approach:
See ilearn for details
Due: Week 12
Weighting: 40%
Groupwork/Individual:
Short extension 3: No
AI Approach:
See ilearn for details
Due: Week 13
Weighting: 30%
Groupwork/Individual:
Short extension 3: No
AI Approach:
See details on ilearn
Due: Ongoing
Weighting: 10%
Groupwork/Individual:
Short extension 3: No
AI Approach:
See ilearn for details
DELIVERY AND RESOURCES
UNIT REQUIREMENTS AND EXPECTATIONS
REQUIRED READINGS
Paul D. Williams, (ed.), Security Studies: An Introduction, (London: Routledge, 2013).
Students can purchase either a physical or electronic copy online directly from Routledge (www.routledge.com) or from Amazon (www.amazon.com) or the Book Depository (www.bookdepository.com). Copies are also available from the Macquarie University Co-op bookshop.
All materials are available through the Macquarie University library. The compulsory textbook is available in Reserve.
TECHNOLOGY USED AND REQUIRED
SUBMITTING ASSESSMENT TASKS
LATE SUBMISSION OF ASSESSMENT TASKS
WORD LIMITS FOR ASSESSMENT TASKS
REASSESSMENT OF ASSIGNMENTS DURING THE SEMESTER
PICX111: Syllabus
|
Week 1 |
What is Risk?
|
|
Week 2 |
Intelligence
|
|
Week 3 |
Cyber Security
|
|
Week 4 |
Arms Race and Arms Control
|
|
Week 5 |
Energy Security
|
|
Week 6 |
Human Security
|
|
Week 7 |
Environmental Conflict
|
|
Week 8 |
Poverty and Health
|
|
Week 9 |
Population Movements and Refugees
|
|
Week 10 |
Transnational Organised Crime
|
|
Week 11 |
Regional Security Institutions
|
|
Week 12 |
Peace Operations
|
|
Week 13 |
Conclusion: Challenges for Australia
|
Week 1: What is risk?
In this module we will introduce the course and define what is meant by ‘an age of risk’. Risks are conceptually different from threats as the latter imply recognition of a current security challenge to status quo. In contrast, risks are potential future security challenges that could become threats if we treat them as such. It is argued that we are living in an era of risk as the domestic and international system is undergoing a transformation. There is not a clear threat to status quo as status quo itself is changing with the rise of non-traditional security challenges. Change itself cannot be reversed, and security becomes an issue of managing risk. We will first discuss how the international system is changing and the risks it produces, debate the influences and impact of perceptions, prioritise risks by using a risk matrix comparing probability and severity, and lastly address how to manage risks by utilising a cost-benefit analysis.
Seminar Questions:
What is risk?
What are the adverse security implications of treating risks as threats?
What and who affects our risk perceptions?
How can a risk matrix and cost-benefit analysis contribute to manage risks?
Required Reading
Beck, Ulrich. "Living in the world risk society." Economy and Society 35, no. 3 (2006): 329-345.
Rasmussen, Mikkel Vedby. "Reflexive security: NATO and international risk society." Millennium-Journal of International Studies 30, no. 2 (2001): 285-309.
Recommended Reading
Petersen, Karen Lund. "Risk Analysis-a Field Within Security Studies." European Journal of International Relations (2011): 1-25.
Beck, Ulrich. "The terrorist threat world risk society revisited." Theory, Culture & Society 19, no. 4 (2002): 39-55.
Week 2: Intelligence
This module will delve into the question of what the term 'intelligence' actually means, in the context of puzzles, mysteries and risk in security analysis. Students' preconceived notions defining what intelligence is, as well as how intelligence processes and approaches really work, will be challenged with the objective being to discover where intelligence fits in modern day security operations.
Guest Lecturer: Fred Smith
Seminar Questions:
Why is intelligence important to manage risks?
What are the main misconceptions about intelligence?
What are puzzles and a mysteries and why is it imperative to distinguish between the two?
Required Reading
Aldrich, Richard J. “Intelligence”, in Security studies: an introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 235-249.
Marrin, Stephen. "Improving intelligence studies as an academic discipline." Intelligence and National Security (2014): 1-14.
Recommended Reading
Marrin, Stephen. Guide to the Study of Intelligence: Why Teach About Intelligence, The Intelligencer, Volume 20, Number 1, Spring/Summer 2013, available at:https://www.afio.com/publications/MARRIN%20Stephen%20FINAL%20-%20Why%20Teach%20About%20Intelligence%20-%20AFIO%20Intelligencer.pdf
Cavelty, Myriam Dunn, and Victor Mauer. "Postmodern intelligence: Strategic warning in an age of reflexive intelligence." Security Dialogue 40, no. 2 (2009): 123-144.
Week 3: Cyber Security
In this module we will explore cyber-security as a growing challenge for national and international security. There is a lack of understanding about the cyber-attacks and what mechanisms can be used in improving both detection and prevention. Providing a secure cyberspace is now a key concern for governments and private sector organisations throughout the world, which requires development of critical infrastructure and an organizational and national/international research agenda supported by multidisciplinary expertise. Dr. Mamoun Alazab’s presentation provides an overview of cybercrime, cyber security, and cyber terrorism from a technological and a criminological perspective, and explains how criminological theories can be applied to mitigate cyber-attacks. The purpose of this presentation is also to describe recent trends, such as zero-day exploits, botnet attacks against internet banking applications, the emergence of the darknet, the role of organised crime, cybercrime-as-a-service, big data, ransomware, and spam emails. He will also illustrate how new analytics can be used to uncover hidden patterns in malicious software (malware) and offer the promise of improved countermeasures, draw on real world data .
Guest Lecturer: Mamoun Alazab
Seminar Questions:
Required Reading
O’Connell, Mary Ellen. "Cyber security without cyber war." Journal of Conflict and Security Law 17, no. 2 (2012): 187-209.
Hjortdal, Magnus. "China's use of cyber warfare: Espionage meets strategic deterrence." Journal of Strategic Security 4, no. 2 (2011): 1-24.
Recommended Reading
Kenney, Michael. "Cyber-Terrorism in a Post-Stuxnet World." Orbis 59, no. 1 (2015): 111-128.
Rid, Thomas. "Cyber war will not take place." Journal of Strategic Studies 35, no. 1 (2012): 5-32.
Lewis, James Andrew. Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies, 2002.
Denning, Dorothy E. "Cyberterrorism: The logic bomb versus the truck bomb." Global Dialogue 2, no. 4 (2000): 29. (public access)http://www.worlddialogue.org/content.php?id=111
Week 4: Arms Race and Arms Control
In this module we will explore arms race and race arms control. A common debate in recent scholarship and in the media is whether the military modernisation of the regional countries of the Asia-Pacific constitutes an arms race. Such a question is significant as the region has no arms control regimes to halt destabilizing build-ups of sophisticated weapons platforms, for instance, submarines and ballistic missiles. In the first part of this session we will look at the history of the ‘arms race’ and the consequent debate on arms control versus disarmament, In the second part of this session we will examine the case study of East Asian military modernization programs since 2001.
Guest Lecturer: Sheryn Lee
Seminar Questions:
Why do arms races develop?
What are the challenges with implementing arms control?
Why are there no arms control regimes in Asia?
Is an East-Asian arms race probable, or is one already under way?
Required Reading
Waheguru, Pal Singh Sidhu. “The Nuclear Disarmament and Non-Proliferation Regime”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 355-373.
Colin S. Gray, ‘The Urge to Compete: Rationales for Arms Racing’, World Politics, Vol. 6, no. 2, January 1974, 207-233.
Recommended Reading
Huntington, Samuel P. "Arms races: Prerequisites and Results.” Public Policy 8, no. 1 (1958): 41-86.
Schelling, Thomas C. Arms and Influence (2nd ed.). New Haven and London, Yale University Press, 2008.
Hedley Bull. “Arms Control and the Balance of Power”, in Ernest W. Lefever, ed., Arms & Arms Control: A Symposium, New York: Praeger for The Washington Center of Foreign Policy Research, 1962, 27-48.
Ayson, Robert. "Arms control in Asia: yesterday's concept for today's region?." Australian Journal of International Affairs 67, no. 1 (2013): 1-17.
Week 5: Energy Security
In this module we will explore competing conceptions of ‘energy security’ and how changes in the international system affect energy security. Energy security was traditionally defined as ‘the reliable supply of energy resources’, which is increasingly important to keep modern economies alive. We will address how this concept has been expanded to include the control over energy resources and transportation corridors, which paradoxically can undermine the reliable supply of energy.
Seminar Questions:
What is energy security?
Why is energy security of growing importance?
What is the relationship between energy security and war?
What are the energy security risks for China, and does the management of these risks create new risks?
Is the EU and Russia locked in an ‘energy security dilemma’?
Required Reading
Klare, Michael T. “Energy Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 535-552.
Yergin, Daniel. "Ensuring Energy Security." Foreign Affairs 85, no. 2 (2006): 69-82.
Recommended Reading
Kruyt, Bert, Detlef P. van Vuuren, H. J. M. De Vries, and Heleen Groenenberg. "Indicators for Energy Security." Energy Policy 37, no. 6 (2009): 2166-2181.
Winzer, Christian. "Conceptualizing energy security." Energy Policy 46 (2012): 36-48.
Monaghan, Andrew. "Russia-EU Relations: an emerging energy security dilemma." Pro et Contra 10, no. 2-3 (2006): 1-13.
Week 6: Human Security
In this module we will discuss the concept of human security. The paradigm shift from state-centric security to human security challenges previous conceptions of what security entails and how it can be enforced. Human security is a contested concept, ranging from non-coercive peace studies to military interventionism. While protection of the individual has traditionally been the prerogative of the state, history has demonstrated that people are more likely to be killed by their own government than a foreign state. We will introduce the concept of the Responsibility to Protect (R2P) as a key concept and focal point of the human security debate.
Seminar Questions:
What is human security?
What are the tensions between the development-focused approach and the interventionist approach to human security?
Does the human security concept strengthen or challenge state security?
What is the Responsibility to Protect?
Required Reading
Hampson, Fen Osler. “Human Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 279-294.
Acharya, Amitav. "Human Security: East versus West." International Journal 56, no. 3 (2001): 442-460.
Recommended Reading
Chandler, David. "Resilience and Human Security: The Post-Interventionist Paradigm." Security Dialogue 43, no. 3 (2012): 213-229.
Bellamy, Alex J, The Responsibility to Protect, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 486-502.
Gasper, Des. "Securing humanity: Situating ‘human security’ as concept and discourse." Journal of Human Development 6, no. 2 (2005): 221-245.
Week 7: Environmental Security
In this module we will discuss environmental security as an emerging risk. Pollution and environmental degradation creates both known and unknown security challenges. Floods, drought, climate change, access to water, food scarcity and other possible effects are an issue of human security and state security. We can respond to these risks by reducing our environmental ‘footprint’ and/or prepare for the consequences. These new and shared risks have the capacity to unite and to divide the international community.
Seminar Questions:
What is environmental security?
Is environmental security a branch of human security and state security, or can the environment itself become the referent object?
Employing risk analysis, what is the probability and severity of environmental degradation and global warming, and what are the costs and benefits of managing and mitigating this risk?
Required Reading
Dalby, Simon. “Climate Change and Environmental Security”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 311-323.
Barnett, Jon, and W. Neil Adger. "Climate change, human security and violent conflict." Political Geography 26, no. 6 (2007): 639-655.
Recommended Reading
Trombetta, Maria Julia. "Environmental security and climate change: analysing the discourse." Cambridge Review of International Affairs 21, no. 4 (2008): 585-602.
Oels, Angela. "From ‘securitization’ of climate change to 'climatization' of the security field: comparing three theoretical perspectives." In Climate Change, Human Security and Violent Conflict, Springer Berlin Heidelberg, 2012, 185-205.
Floyd, Rita, and Richard Matthew. Environmental Security: Approaches and Issues. Routledge, 2013.
Week 8: Poverty and Health
In this module we will explore the nexus between poverty, health and security. Poverty fuels insecurity that are no longer contained to a specific region. While extreme poverty is in decline, inequality (also in the West) is on the rise. Health issues have also climbed on the security agenda over the last years as diseases such as HIV/AIDS are considered both a risk and threat to human security and state security.
Seminar Questions:
How does poverty and diseases affect human security and state security?
What is the link between poverty and war?
Is health an issue of national and/or international security?
Where do diseases and epidemics fit on the security matrix, and why does it not receive more attention?
Required Reading
McInnes, Colin. “Health”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 324-336.
Thomas, Caroline, and Paul D. Williams. “Poverty”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 295-310.
Recommended Reading
Piazza, James A. "Rooted in poverty?: Terrorism, poor economic development, and social cleavages 1." Terrorism and Political Violence 18, no. 1 (2006): 159-177.
Wilkin, Peter. "Global poverty and orthodox security." Third World Quarterly 23, no. 4 (2002): 633-645.
Justino, Patricia. "On the links between violent conflict and chronic poverty: How much do we really know?." Chronic Poverty Research Centre Working Paper61 (2006).
Brainard, Lael, and Derek H. Chollet. Too poor for peace?: global poverty, conflict, and security in the 21st century. Brookings Institution Press, 2007.
Week 9: Population Movements and Refugees
In this module we will explore the relationship between population movements and security risk. Population movements are an issue of both national and international security as population movements have fuelled ethnic tensions, led to the rise of right-wing parties, and even brought down states. We will analyse the risks deriving from the current refugee/migrant crisis in Europe. This case study will demonstrate that the shared risk has created great impetus for unity, while concurrently it has become a source of division that could break apart the European Union.
Seminar Questions:
Do population movements create security risks?
How can this security risk be managed without creating new risks?
What are the consequences of treating population movements as a threat rather than a risk?
Required Reading
Bali, Sita. “Population Movements”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 520-534.
Cohen, Robin. "Diasporas and the nation-state: from victims to challengers." International Affairs 72, no. 3 (1996): 507-520.
Recommended Reading
Salehyan, Idean, and Kristian Skrede Gleditsch. "Refugees and the spread of civil war." International Organization 60, no. 02 (2006): 335-366.
Mayer, Benoît. "The Arbitrary Project of Protecting Environmental Migrants." in Environmental Migration and Social Inequality, Springer International Publishing, 2016, 189-200.
Bigo, Didier. "Security and immigration: toward a critique of the governmentality of unease." Alternatives 27, no. 1 (2002): 63-92.
Basaran, Tugba. "The saved and the drowned: Governing indifference in the name of security." Security Dialogue (2015): 1-16.
Week 10: Transnational Organised Crime
In this module we will explore transnational organised crime as a risk to both state and human security. Assessing transnational organised crime entails addressing a wide variety of crimes by very different types of people. Organised crime has prospered due to ‘globalisation’ or ‘internationalisation’ as people, goods and capital flow across borders with increasing ease. It is widely recognised that weak states produce and/or attract organised crime. A sound argument can be made that transnational governance is required to counter a transnational threat.
Guest Lecturer: John Langdale
Seminar Questions:
What is transnational organised crime, and what challenges does it present?
What is the link between organised crime and terrorism?
How can we govern transnational organised crime?
Required Reading
Williams, Phil. “Transnational Organised Crime”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 503-519.
Hutchinson, Steven, and Pat O’malley. "A Crime–Terror Nexus? Thinking on Some of the Links between Terrorism and Criminality." Studies in Conflict Terrorism 30, no. 12 (2007): 1095-1107.
Recommended Reading
Cornell, Svante E., and Niklas LP Swanström. "The Eurasian drug trade: A challenge to regional security." Problems of Post-Communism 53, no. 4 (2006): 10-28.
Rollins, John. International terrorism and transnational crime: Security threats, US policy, and considerations for Congress. Diane Publishing, 2010.
Wang, Peng. "The Increasing Threat of Chinese Organised Crime: National, Regional and International Perspectives." The RUSI Journal 158, no. 4 (2013): 6-18.
Miraglia, Paula, Rolando Ochoa, and Ivan Briscoe. "Transnational organised crime and fragile states." OECD (2012).
McCusker, Rob. Transnational crime in the Pacific Islands: real or apparent danger?. Australian Institute of Criminology, 2006.
Week 11: Regional Security Institutions
In this module we will address the proliferation of regional security institutions as both a management of risk and source of risk. The UN is recognised as the main security institution and representative of international law. However, regional security institutions such as the African Union or ASEAN are more capable of responding to regional challenges. In this module we will discuss how the variety of institutions manages relations between member states, how they engage with other regional security institutions (inter-regionalism), and lastly their relationship with the UN.
Seminar Questions:
Are regional security institutions partners and/or competitors to the UN?
How do regional security institutions manage relations among its member states and engage with the broader world?
Why do regional security institutions proliferate?
Are we experiencing a trend towards inter-regionalism and/or is competition simply elevated to competition between more powerful, fewer and less compatible units of power?
Required Reading
Fawcett, Louise. “Regional Institutions”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013,, 355-373.
Pempel, Thomas J. "Soft balancing, hedging, and institutional darwinism: The economic-security nexus and East Asian regionalism." Journal of East Asian Studies 10, no. 2 (2010): 209-238.
Manning, Robert A. “Obama’s Sunnylands Summit: Does ASEAN Really Matter?” Atlantic Council, 12 February (2016) available at:http://www.atlanticcouncil.org/blogs/new-atlanticist/obama-s-sunnylands-summit-does-asean-really-matter
Recommended Reading
Jones, Catherine. "Great powers, ASEAN, and security: reason for optimism?." The Pacific Review 28, no. 2 (2015): 259-280.
Coker, Christopher. Globalisation and Insecurity in the Twenty-first Century: NATO and the Management of Risk. Routledge, 2014.
Hasenclever, Andreas, and Brigitte Weiffen. "International institutions are the key: a new perspective on the democratic peace." Review of International Studies32, no. 4 (2006): 563-585.
Kelly, Robert E. "Security Theory in the “New Regionalism” International Studies Review 9, no. 2 (2007): 197-229.
Week 12: Peace Operations
In this module we will explore the various forms of peace operations, ranging from observation and monitoring, peacekeeping, peace-building and peace-enforcement. During the Cold War a key challenge was to de-couple peace operations from competition between the great powers. After the Cold War, greater focus has been devoted to human security, but without losing their impartiality. There is a dilemma in peace operations as the ‘peace-makers’ either have interests that challenges their impartiality, or they do not have interests and therefore unwilling to contribute blood and treasury.
Seminar Questions:
What are the objectives of peace operations?
What are the means for peace operations?
Who is responsible for keeping the peace?
What is the difference between neutrality and impartiality?
Does the involvement of the international community contain and/or proliferate conflicts?
Required Reading
Pugh, Michael. “Peace Operations”, in Security Studies: an Introduction (Second edition.), Williams, Paul D (ed.). Routledge, 2013, 393-408.
Bellamy, Alex J., and Paul D. Williams. "Who's keeping the peace? Regionalization and contemporary peace operations." International Security 29, no. 4 (2005): 157-195.
Recommended Reading
Williams, Michael J. "Empire Lite Revisited: NATO, the Comprehensive Approach and State-building in Afghanistan." International Peacekeeping 18, no. 1 (2011): 64-78.
Bellamy, Alex J. "The ‘next stage’ in peace operations theory?." International Peacekeeping 11, no. 1 (2004): 17-38.
Huéhenno, Jean-Marie. "On the challenges and achievements of reforming UN peace operations." International Peacekeeping 9, no. 2 (2002): 69-80.
Pugh, Michael. "Peacekeeping and critical theory." International Peacekeeping 11, no. 1 (2004): 39-58.
Week 13: Conclusion: Challenges for Australia
In this module we will discuss the security risks for Australia. The physical geographical isolation of Australia does not insulate it from the emerging security risks. In contrast, Australia faces several risks from issues such as climate change, terrorism and population movements. Beyond unconventional security challenges, the shift in power from the West to the East is changing Australia’s security strategy as it must reconcile its European history and Asian geography. The positioning between the US and China continues to be a pressing topic.
Seminar Questions:
What are the main security risks for Australia?
Can Australia harmonise its European history and Asian geography?
How should Australia position itself between the US and China?
What are the risks from migration, terrorism and climate change? Does Australia’s management of these risks create new risks?
Required Reading
O'Neil, Andrew. "Conceptualising future threats to Australia's security." Australian Journal of Political Science 46, no. 1 (2011): 19-34.
McDonald, Matt. "Constructing insecurity: Australian security discourse and policy post-2001." International Relations 19, no. 3 (2005): 297-320.
Recommended Reading
Tow, William. "Deputy sheriff or independent ally? Evolving Australian–American ties in an ambiguous world order." The Pacific Review 17, no. 2 (2004): 271-290.
Pietsch, Juliet, and Ian McAllister. "Human security in Australia: public interest and political consequences." Australian Journal of International Affairs 64, no. 2 (2010): 225-244.
Dibb, Paul. "Is the US Alliance of Declining Importance to Australia?." Security Challenges 5, no. 2 (2009): 31-40.
O'neil, Andrew. "Degrading and managing risk: Assessing Australia's counter-terrorist strategy." Australian Journal of Political Science 42, no. 3 (2007): 471-487.
Unless a Special Consideration request has been submitted and approved, (a) a penalty for lateness will apply – two (2) marks out of 100 will be deducted per day for assignments submitted after the due date – and (b) no assignment will be accepted more than seven (7) days (incl. weekends) after the original submission deadline. No late submissions will be accepted for timed assessments – e.g. quizzes, online tests.
The University recognises that students may experience events or conditions that adversely affect their academic performance. If you experience serious and unavoidable difficulties at exam time or when assessment tasks are due, you can consider applying for Special Consideration.
You need to show that the circumstances:
If you feel that your studies have been impacted submit an application as follows:
Outcome
Once your submission is assessed, an appropriate outcome will be organised.
You can withdraw from your subjects prior to the census date (last day to withdraw). If you successfully withdraw before the census date, you won’t need to apply for Special Circumstances. If you find yourself unable to withdraw from your subjects before the census date - you might be able to apply for Special Circumstances. If you’re eligible, we can refund your fees and overturn your fail grade.
If you’re studying Single Subjects using FEE-HELP or paying up front, you can apply online.
If you’re studying a degree using HECS-HELP, you’ll need to apply directly to Macquarie University.
Macquarie University policies and procedures are accessible from Policy Central. Students should be aware of the following policies in particular with regard to Learning and Teaching:
Academic Honesty Policy http://mq.edu.au/policy/docs/academic_honesty/policy.html
New Assessment Policy in effect from Session 2 2016 http://mq.edu.au/policy/docs/assessment/policy_2016.html. For more information visit http://students.mq.edu.au/events/2016/07/19/new_assessment_policy_in_place_from_session_2/
Assessment Policy prior to Session 2 2016 http://mq.edu.au/policy/docs/assessment/policy.html
Grading Policy prior to Session 2 2016 http://mq.edu.au/policy/docs/grading/policy.html
Grade Appeal Policy http://mq.edu.au/policy/docs/gradeappeal/policy.html
Complaint Management Procedure for Students and Members of the Public http://www.mq.edu.au/policy/docs/complaint_management/procedure.html
Disruption to Studies Policy http://www.mq.edu.au/policy/docs/disruption_studies/policy.html The Disruption to Studies Policy is effective from March 3 2014 and replaces the Special Consideration Policy.
In addition, a number of other policies can be found in the Learning and Teaching Category of Policy Central.
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/support/student_conduct/
Results shown in iLearn, or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au.
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.