bettermap.org - Presentation @ Humboldt-Viadrina School of Governance
VIADRINA SUMMER PROGRAM 2016 Understanding … · VIADRINA SUMMER PROGRAM 2016 Understanding...
-
Upload
truonghuong -
Category
Documents
-
view
214 -
download
0
Transcript of VIADRINA SUMMER PROGRAM 2016 Understanding … · VIADRINA SUMMER PROGRAM 2016 Understanding...
VIADRINA SUMMER PROGRAM 2016 Understanding Borders, Security & Identity June 1 – July 15, 2016
SYLLABUS1
Intercultural Management Training ........................................................................................................ 2
Introduction to Optimization Systems .................................................................................................... 4
Rethinking Migration: An Approach from Critical Border Theory ........................................................... 6
EU border security – a key challenge to its normative identity? ............................................................ 9
Responsibility in EU Migration Policy .................................................................................................... 13
European Environmental Politics .......................................................................................................... 16
The Comprehensive Notion of European Security ................................................................................ 21
1 This syllabus overview has been last updated on January 25, 2016. All information is subject to change.
2
Natalie Senf
INTERCULTURAL MANAGEMENT TRAINING ………………………………………….......
Natalie Senf Email: [email protected] Office: HG, Room 023
Office hour: on appointment, via mail
COURSE DESCRIPTION
The aim of the seminar is to raise awareness for potential problems of intercultural management and to provide options for solving them. In a highly interactive format, students will be enabled to experience critical intercultural situations through the use of simulations, case studies and group exercises. This helps to not only understand issues of intercultural management, but to actually feel them. After every exercise, the experiences will be discussed and analyzed on a theoretical level, generating long-lasting insights through self-reflection. ASSIGNMENTS
Intercultural Keyword: Poster presentation Every participant is assigned one keyword relevant to the field of intercultural management. The task is to research the keyword and its meaning and relevance within the field and to prepare a poster, which is supposed to both informative and vivid. The poster will be due before the seminar. During the seminar, every participant is supposed to present his/her poster, giving a 5-minute ad hoc presentation of his/her keyword. The presentation is supposed to be fluent, held freely and be well structured. Intercultural Case Study: Written assignment After the seminar, the participants will be handed a case study showing an intercultural problem. The task is to describe and analyze the problem referring to concepts of intercultural management discussed in the seminar (max. 1500 words) and to present theory-based and practical recommendations for solving the problem (max. 500 words). GRADING
The final course grade will be calculated as follows: Poster: 25% Ad hoc presentation: 25% Case study: 50% Total: 100% PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also
3
information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.2 Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University. SCHEDULE
The course will be held as a compact 3-day seminar.
Day 1 Introductory session & seminar preparation
Day 2
Welcome
Vernissage
Barnga
Albatross
Movie Analysis
Day 3
Cultural incidents
BaFa BaFa
Feedback and good-bye
COURSE READINGS
Hofstede, Geert (1983). "Culture's Consequences: International Differences in Work-Related Values". Administrative Science Quarterly 28 (4): 625–629.
Adler, N. J. (1983). A typology of management studies involving culture. Journal of International Business Studies, 14(2), 29-47.
Adler, N. J., & Bartholomew, S. (1992). Managing globally competent people. The Executive, 6(3), 52-65.
Hofstede, G. (1994). The business of international business is culture. International Business Review, 3(1), 1-14.
Hofstede, G., & Bond, M. H. (1988). The confucius connection: From cultural roots to economic growth. Organizational Dynamics, 16(4), 5-21.
2 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
4
Prof. Dr. Achim Koberstein
INTRODUCTION TO OPTIMIZATION SYSTEMS
………………………………………….......
Prof. Dr. Achim Koberstein
Email: [email protected]
Office: HG 043
Office hour: By appointment. Prior registration by email outlining topic of discussion for meeting
necessary.
COURSE DESCRIPTION
The participants learn to model and analyze complex decision situations in business organizations.
They acquire the capability to apply special modelling techniques and select appropriate solution
methods to solve the models and investigate the generated solutions. Furthermore, they will get to
know basic architectures of model based optimization system and state-of-the-art modelling and
solver software building the core parts of such systems.
Based on quantitative models from the field of applied mathematical optimization this module conveys
the core technologies in the field of model based optimization systems and prescriptive analytics.
ASSIGNMENTS
Lecture & Tutorial: Lectures are accompanied by tutorials and homework assignment. As a student,
you are expected to solve the exercises given as assignment by yourself, often using a computer. The
PC pools are available in the seminar building August-Bebel-Straße 12. You may also use your own PC
if you have one.
Methods and duration of examination: Successful written exam (120 min)
Prerequisites: completed basic studies (until and including the 3rd semester), good knowledge and
serious interest in quantitative methods
Workload and its composition (self-study, contact time): Contact time (lecture, tutorials etc.) 45 h;
self-study: 135 h
Registration in Moodle Viadrina required.
GRADING
100 % written Exam
10% homework assignment (can be used to gain bonus credits)
5
PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.3 Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE
Introduction to Optimization Systems
Session 1: Linear Models and Optimization
Session 2: Solution Software and Modeling Languages
Session 3: Solution Software and Modeling Languages
Session 4: Mixed-integer Linear Models and Optimization
Session 5: Solution Methods for LPs and MIPs
Session 6: Special MIP-Models
COURSE READINGS
• Suhl, Mellouli: Optimierungssysteme, Springer, 2006 (in German).
• Williams: Model Building in Mathematical Programming, John Wiley and Sohns, 1999.
• Kallrath, Wilson: Business Optimization using Mathematical Programming, Macmillan Press, 1997.
Heipke: Applications of optimization with Xpress-MP, Dash Optimization Ltd., 2000.
3 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
6
Prof. Dr. Werner Schiffauer
RETHINKING MIGRATION: AN APPROACH FROM CRITICAL BORDER
THEORY ………………………………………….......
Prof. Dr. Werner Schiffauer
Email: [email protected]
Office: HG, Room 249
Office hour: on appointment
COURSE DESCRIPTION
In the course I will systematically relate border theory to migration theory. We start by exploring the
border paradox: Borders are both arbitrarily drawn and can therefore always be challenged. At the
same time they are at easily naturalized and essentialized. They are simultaneously extremely
vulnerable and extremely persistent. I will ask what this paradox implies for the migratory experience
for which border crossing and border management are central. I will also ask how immigrant societies
conceptualize migration as a violation of borders and react to this by redrawing borders within the
nation state and by reinforcing them (i.e. though securitization).
ASSIGNEMENT
active participation in class
1 presentation (10 – 15 minutes)
2 essays (each 6 pages in length)*
*Deadline for essays to be turned in is July 20, 2016.
GRADING
presentation (20% of final grade)
2 essays (80% of final grade
PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.4
4 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
7
Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE
Session 1a
Border Theory: An Introduction
Werner Schiffauer (coordinator).2011. B/Orders in Motion. Initial Proposal for a Cluster of Excellence. Europa Universität Viadrina, Frankfurt/Oder. 7-28
Session 1b
Flight and the Social Organization of Human Rights
Arendt, Hannah. “The Decline of the Nation-State and the End of the Rights of Man.” Origins of Totalitarianism. New York: Meridian, 1958. 267-302.
Session 2a
Humanitarianism: Governing the excluded
Fassin, D. (2012). Ambivalent Hospitality. Governing the Unwanted. Humanitarian Reason. A moral history of the Present. D. Fassin. Berkeley, Los Angeles, London, University of Californai Press: 133-160.
Session 2b
Beyond Humanitarianism: Shifting the boundaries of the Political
Nyers, P. (2010). "No one is illegal between City and Nation." Studies in Social Justice 4(2): 127-143.
Session 3a
The challenge of border crossing: Calculating benefits and risks
Kindler, M. (2011). A Risky Business. Ukrainian Migrant Women in Warsaw's Domestic Work Sector. Amsterdam, Amsterdam University Press. 63-103
Session 3b
Benefitting from Borders: Transnational Strategies of status management
Nieswand, B. (2011). Theorising Transnational Migration. The Status Paradox of Migration. New York and London, Routledge. 124-150
Session 4a
Cross border identities Clifford, J. (1994) Diasporas. Cultural Anthropology, 9, 302-338.
Session 4b
Border configurations within Immigration Countries
Hüttermann, J. (2011). On the Sociogenesis of a culturalized immigration society ( Pdf will be provided)
Session 5a
Governing the Non-nationals: Tolerance and the logic of border drawing
Brown, W. (2006). Regulating Aversion. Princeton, Princeton UP. 1-24 Schiffauer, W. 2013 Logics of Toleration. Outline for a Comparative Approach of the Study of Tolerance. In: Dobernack, Jan / Modood, Tariq: Tolerance, Intolerance and Respect. Hart to Accept?. Hampshire / New York. Palgarave Macmillan. S. 103-126.
Session 5b
Beyond borders: Migration, Postmigration and religion
Schiffauer, W. (2013). Global Prayers Migration, Post Migration Global Prayers. Contemporary Manifestations of the Religious in the City. Edited by Jochen Becker, Katrin Klingan,
8
Stephan Lanz, Kathrin Wildner. Lars Müller Publishers. S. 49-63
Session 6a
Securitization and the strengthening of borders
Bigo, D. (2002) Security and Immigration: Toward a Critique of the Governmentality of Unease. Alternatives, 27, 63 - 92. Schiffauer, W. 2008. Suspect Subjects: Muslim Migrants and the Security Agencies in Germany. The Social Life of Anti-Terrorism Laws. The War on Terror and the Classification of the "Dangerous Other"J. M. Eckert. Bielefeld, transcript: 55-78.
Session 6b
Summing up: Border theory and migration theory
COURSE READINGS
Arendt, Hannah. “The Decline of the Nation-State and the End of the Rights of Man.” Origins of
Totalitarianism. New York: Meridian, 1958. 267-302.
Bigo, D. (2002) Security and Immigration: Toward a Critique of the Governmentality of Unease.
Alternatives, 27, 63 - 92.
Brown, W. (2006). Regulating Aversion. Princeton, Princeton UP. 1-24.
Clifford, J. (1994) Diasporas. Cultural Anthropology, 9, 302-338.
Fassin, D. (2012). Ambivalent Hospitality. Governing the Unwanted. Humanitarian Reason. A moral
history of the Present. D. Fassin. Berkeley, Los Angeles, London, University of Californai Press: 133-160.
Hüttermann, J. (2011). On the Sociogenesis of a culturalized immigration society ( Pdf will be provided).
Kindler, M. (2011). A Risky Business. Ukrainian Migrant Women in Warsaw's Domestic Work Sector.
Amsterdam, Amsterdam University Press. 63-103.
Nieswand, B. (2011). Theorising Transnational Migration. The Status Paradox of Migration. New York
and London, Routledge. 124-150.
Nyers, P. (2010). "No one is illegal between City and Nation." Studies in Social Justice 4(2): 127-143.
Schiffauer, W. 2008. Suspect Subjects: Muslim Migrants and the Security Agencies in Germany. The
Social Life of Anti-Terrorism Laws. The War on Terror and the Classification of the "Dangerous Other"J.
M. Eckert. Bielefeld, transcript: 55-78.
Schiffauer, W. 2013 Logics of Toleration. Outline for a Comparative Approach of the Study of Tolerance.
In: Dobernack, Jan / Modood, Tariq: Tolerance, Intolerance and Respect. Hart to Accept?. Hampshire
/ New York. Palgarave Macmillan. S. 103-126.
Schiffauer, W. (2013). Global Prayers Migration, Post Migration Global Prayers. Contemporary
Manifestations of the Religious in the City. Edited by Jochen Becker, Katrin Klingan, Stephan Lanz,
Kathrin Wildner. Lars Müller Publishers. S. 49-63.
9
Dr. Raphael Bossong
EU BORDER SECURITY – A KEY CHALLENGE TO ITS NORMATIVE
IDENTITY? ………………………………………….......
Dr. Raphael Bossong E-mail: [email protected] Office: Logenstraße 12, first floor, Room 110 Office hour: Mondays, 1 – 2 p.m.
COURSE DESCRIPTION The course addresses and contextualizes one of the most pressing challenges in contemporary Europe, namely how to respond to persistent migration. Most Western liberal states are troubled by the tensions between, on the one hand, human rights protection, respect for international law on refugee protection and economic openness and, on the other hand, pressures to limit immigration due to concerns about national identity, absorption capacities of welfare or education systems and labour markets. However, the EU experiences particularly deep tensions in this respect, as its very raison d´être revolves around the erosion of borders, whereas it is also easily used as a scapegoat by right-wing populists with regard to possible negative consequences of migration. In fact, the EU integration process and the question of “European solidarity” may have reached a critical turning point over the issue of border security. This obstructs the pressing requirements of limiting human suffering and fatalities that occur both at the edges and within the territory of the EU. Overall, the course aims to provide a rich and complex picture of the normative and political dilemmas the EU faces in this area, going beyond a straightforward “critique” of the so-called “Fortress Europe”. From a disciplinary perspective, the course focuses on social, political and institutional dynamics – rather than legal norms - that shape contemporary practices of border control. Familiarity with the main institutional structures and actors of the EU will be assumed. Due the extremely rapid developments in this field, several listed readings may well change and considerable time will be given to current policy debates. ASSIGNEMENT
active participation in class
1 presentation (10 – 15 minutes)
2 essays (each 6 pages in length)*
*Deadline for essays to be turned in is July 31, 2016.
GRADING
presentation (20% of final grade)
2 essays (80% of final grade
PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great
10
care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.5 Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE
Session Topic Readings
1 Long-term trends of EU border security
Guild, E. and D. Bigo (2010). The Transformation of European Border Controls. Extraterritorial Immigration Control: Legal Challenges. B. Ryan and V. Mitsilegas. Leiden, Brill: 257-280
2 Contemporary regimes of selective mobility
Turner, B. S. (2007). "The Enclave Society: Towards a Sociology of Immobility." European Journal of Social Theory 10(2): 287-304.
3 Technology, risk management and border security
Chalfin, B. (2012). Border Security as a late Capitalist Fix. A Companion to Border Studies. T. Wilson and H. Donnan. Malden, Blackwell: 283-30
4 Is there such a thing as a common EU border security and migration policy?
Parkes, R. (2015). Borders. EU institutions fail to reconcile their agendas despite communitarisation. Policy Change in the Area of Freedom, Security and Justice. How EU institutions matter. F. Trauner and A. Ripoll Servent. London, Routledge: 52-71.
5 EU migration and border policy – better than its reputation?
Zaun, N. (2015). "Why EU asylum standards exceed the lowest common denominator: the role of regulatory expertise in EU decision-making." Journal of European Public Policy(ahead-of-print): 1-19.
6 The problem of burden-sharing Thielemann, E. and C. Armstrong (2013). "Understanding European asylum cooperation under the Schengen/Dublin system: a public goods framework." European Security 22(2): 148-164.
5 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
11
7 Other security risks and border security
Leonard, S. (2015). "Border Controls as a Dimension of the European Union's Counter-Terrorism Policy: A Critical Assessment." Intelligence and National Security 30(2-3): 306-332.
8 Schengen – crisis and resilience Zaiotti, R. (2013). "The Italo-French Row over Schengen, Critical Junctures, and the Future of Europe's Border Regime." Journal of Borderlands Studies 28(3): 337-354.
9 FRONTEX - another ambiguous player in EU border security
Neal, A. W. (2009). "Securitization and risk at the EU border: the origins of FRONTEX*." JCMS: Journal of Common Market Studies 47(2): 333-356.
10 EU databases, technologies and systems for border security
Andersson, R. (2015). "Hardwiring the frontier? The politics of security technology in Europe’s ‘fight against illegal migration’." Security Dialogue: 0967010615606044.
11 Border control beyond the EU Bialasiewicz, L. (2012). "Off-shoring and Out-sourcing the Borders of EUrope: Libya and EU Border Work in the Mediterranean." Geopolitics 17(4): 843-866.
12 Sites of implementation / practices Puggioni, R. (2015). "Border politics, right to life and acts of dissensus: voices from the Lampedusa borderland." Third World Quarterly 36(6): 1145-1159.
13 Conclusion – current policy challenges
COURSE READINGS
(most on electronic reserve) Bigo, Didier. (2014) The (in) Securitization Practices of the Three Universes of Eu Border Control:
Military/Navy–Border Guards/Police–Database Analysts. Security Dialogue 45:209-25. Borg, Stefan. (2015) European Integration and the Problem of the State: A Critique of the Bordering of
Europe. Palgrave Macmillan. Casella Colombeau, Sara. (2015) Policing the Internal Schengen Borders–Managing the Double Bind
between Free Movement and Migration Control. Policing and Society:1-14. Côté-Boucher, Karine, Federica Infantino, and Mark B Salter. (2014) Border Security as Practice: An
Agenda for Research. Security Dialogue 45:195-208. Dijstelbloem, Huub, and Dennis Broeders. (2014) Border Surveillance, Mobility Management and the
Shaping of Non-Publics in Europe. European Journal of Social Theory. Kinnvall, Catarina, and Ted Svensson. (2014) Governing Borders and Security: The Politics of
Connectivity and Dispersal. Routledge.
12
Léonard, Sarah. (2010) Eu Border Security and Migration into the European Union: Frontex and Securitisation through Practices. European Security 19:231-54.
Müller, Andreas. (2014) Governing Mobility Beyond the State: Centre, Periphery and the Eu's External Borders. Palgrave Macmillan.
Muller, Benjamin J. (2011) Risking It All at the Biometric Border: Mobility, Limits, and the Persistence of Securitisation. Geopolitics 16:91 - 106.
Pedersen, Morten Jarlbæk. (2015) The Intimate Relationship between Security, Effectiveness, and Legitimacy: A New Look at the Schengen Compensatory Measures. European Security:1-19.
Roos, Christof. (2013) How to Overcome Deadlock in Eu Immigration Politics. International Migration 51:67-79.
Roos, Christof, and Natascha Zaun. (2014) Norms Matter! The Role of International Norms in Eu Policies on Asylum and Immigration. European Journal of Migration and Law 16:45-68.
Salter, Mark B, and Can E Mutlu. (2012) Psychoanalytic Theory and Border Security. European Journal of Social Theory 15:179-95.
Schumacher, Tobias. (2015) Uncertainty at the Eu's Borders: Narratives of Eu External Relations in the Revised European Neighbourhood Policy Towards the Southern Borderlands. European Security 24:381-401.
Takle, Marianne. (2012) The Treaty of Lisbon and the European Border Control Regime. Journal of Contemporary European Research 8:280‐99.
van der Woude, Marrtje AH, and Patrick Van Berlo. (2015) Crimmigration at the Internal Borders of Europe: Examining the Schengen Governance Package. Utrecht L. Rev. 11:61.
13
Prof. Dr. Jürgen Neyer
RESPONSIBILITY IN EU MIGRATION POLICY ………………………………………….......
Prof. Dr. Jürgen Neyer Email: [email protected] Office: Logenstraße 12, ground floor, Room 006 Office hour: on appointment
COURSE DESCRIPTION
European migration policy is one of the most contested policies of the European Union. It sits at the interface between global conflicts, European domestic policies and human rights. All three must be properly taken into consideration for understanding European policies in migration affairs. The class approaches this complex issue in six sessions per 4 hours. The sessions combine lectures, team work and presentations of team work in plenary. We start with an introduction to migration policy that traces its historical development and discusses the EU’s policies and law. The second session introduces the three concepts of interests, norms and responsibility and sketches the tensions between the three of them for policy-making. Session three takes a broader look at the EU and situates migration policy in the framework of EU foreign and security policy. The fourth session extends the analytical focus even more and analyses the regional and global dimension of migration policy. We will contrast this global focus in the fifth session with a close look on the domestic policies of most important member states and the growing impact of illiberal parties on EU policies. The final session will draw normative and analytical conclusions from the discussions of the class and deal with the future of responsible EU migration policy. The classes 1, 3 and 5 will be conducted in tandem with an introductory class on European integration. ASSIGNEMENT
active participation in class
1 presentation (10 – 15 minutes)
2 essays (each 6 pages in length)*
*Deadline for essays to be turned in is July 31, 2016. GRADING
presentation (20% of final grade)
2 essays (80% of final grade) PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also
14
information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.6 Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE
Session 1: Introduction to the EU: Migration Policy
Session 2: Interests, Norms and Responsibility in EU Migration Policy
Session 3: Introduction to the EU: Foreign and Security Policy
Session 4: The global dimension of migration policy
Session 5: Introduction to the EU: Weimar in Europe
Session 6: The Future of Responsible EU Migration Policy
COURSE READINGS
Avdan, Nazli 2014: Do asylum recognition rates in Europe respond to transnational terrorism? The
migration-security nexus revisited, in: European Union Politics 15:4, p. 445-471.
Collett, Elizabeth 2016: EU cooperation with third countries: rethinking concepts and investments, in:
Forced Migration Review. Jan2016, Issue 51, p. 40-42.
Cortinovis, Roberto 2015: The Evolution of Frontex Governance: Shifting from Soft to Hard Law?
Journal of Contemporary European Research 11: 3, p. 252-267.
De Bruycker, Philippe 2016: In search of fairness in responsibility sharing, in: Forced Migration Review
51, p. 64-65.
Grabbe, Heather/ Groot, Nadja 2014: Populism in the European Parliament: What Implications for the
Open Society? In: International Spectator 49: 4, p33-46.
Maisenbacher, Julia 2015: The Political Economy of Mobility Partnerships – Structural Power in the
EU's External Migration Policy, in: New Political Economy 20: 6, p. 871-893.
Martin, Susan 2016: International Migration: Unilateral Policies Are Bound to Fail, in: Governance,
29:1, p. 5-7.
Menz, Georg 2015: The promise of the principal-agent approach for studying EU migration policy: The
case of external migration control, in: Comparative European Politics, 13:3, p307-324.
Mezzetli, Petra/ Ceschi, Sebastiano 2015: Transnational policy networks in the migration field: a
challenge for the European Union, in: Contemporary Politics 21: 3, p. 323-340.
Rais, Mehdi 2016: European Union readmission agreements, in: Forced Migration Review 51, p. 45-46.
6 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
15
Reslow, Natasja/ Vink, Maarten 2015: Three-Level Games in EU External Migration Policy: Negotiating
Mobility Partnerships in West Africa, in: Journal of Common Market Studies 53: 4, p. 857-874.
Triandafyllidou, Anna/ Dimitriadi, Angelik 2014: Deterrence and Protection in the EU’s Migration
Policy.International Spectator 49: 4, p. 146-162.
Young, Iris M. Responsibility and Global Justice: A social Connection Model,
http://sites.coloradocollege.edu/engagingtheglobal/files/2013/01/Young_2006.pdf*,
1/21/2016.
16
Dr. Michael W. Mosser
EUROPEAN ENVIRONMENTAL POLITICS ………………………………………….......
Dr. Michael W. Mosser Email: [email protected] Office: t.b.a Office hours: by appointment COURSE DESCRIPTION
Environmental politics is one area where Europe arguably leads the world. Europe has, at both the national and European-Union level, committed itself to achieving reductions in carbon emissions far greater than anywhere else in the world. This course will examine the history of environmental politics in both the member states of the European Union and the EU itself. Beginning with a conceptual treatment of general environmental politics and policies, the course moves to a history of European environmentalism, before shifting to a discussion on the institutional responses at important ‘traditional’ Member States (Germany, France, Italy and the UK) as well as ‘new‘ Member States (Czech Republic, Poland and Hungary). The final section of the course examines EU environmental policies themselves, such as the EU Emissions Trading System and its institutional commitment to meeting Kyoto Protocol goals. ASSIGNMENTS AND GRADING
Papers: 80% The primary form of assessment for this course will be short papers. As this course meets European Credit Transfer and Accumulation System (ECTS) guidelines, the number of short papers will change according to the number of ECTS credits for which the student has signed up. The table below explains the variable assignments:
Number of ECTS
credits Assignment Due Dates
6 Three (3) five-page (2000-word) papers (15 pages total) Papers: 17 June, 24 June, 1 July
8 or 9 Four (4) five-page (2000-word) papers (20 pages total) +
PowerPoint presentation on final paper
Papers: 17 June, 24 June, 1 July,
8 July, 15 July
PowerPoint presentation: 15 July
The papers for this class will be short (2000-word) exploratory paper on topics chosen by the instructor. Each paper should be a reasonably thorough treatment of the topic chosen, including a clear thesis statement, logical consistency in the arguments used to show the validity of the thesis, and a clear and concise conclusion that effectively summarizes your argument. Ideally, the paper should be no more than 2000 words in length but a 5% variation will be permitted.
17
The PowerPoint presentation (for students signed up for 8 or 9 ECTS credits) will be based on the student’s final paper, and will consist of no more than five (5) slides containing the paper’s thesis, a short summary of the literature, an analysis of the research, and a conclusion. Presentations should be no more than 15 minutes in length. Participation / Discussion Questions: 20% Class discussion in a once-weekly seminar is more than expected; it is a given. Everyone has his or her own style of discussion, and I do not expect to turn those who prefer not to speak often in class into debate champions. Participation will be divided into two sections: Discussion questions and in-class participation. Since not everyone enjoys speaking in class, discussion questions will count for more than in-class participation. Discussion questions will count for 15% of your course grade, while in-class participation will count for 5% of your course grade. So that we can discuss points raised in the online postings in class, discussion questions for the week on which I am lecturing will be due by 17:00 every Wednesday (unless directed otherwise). Postings can be drawn from the readings; in this case, they should reflect any questions, comments, or cries of outrage you may have regarding the arguments set forth by the authors. They most definitely will help you get the most from the class. Postings may also be brief synopses of newsworthy events. In this case, you must post both the link to the news story and a brief (50-word) précis of what the article discusses. Finally, postings may be replies to others' questions or news stories, as long as they are informative replies and not merely agree/disagree posts. One post (or a thoughtful reply to a post) counts as your post for that week. The total number of discussion postings will be counted at the end of the summer session, and also will be examined throughout the session for evidence of consistent posting. Do not expect to “catch-up” post only at the end and receive full participation credit. 6 postings: Full credit 3-4 postings: 70% credit 2 postings: 50% credit Less than 2 postings: No credit A word on late or missed assignments. Over the course of the summer session, it is inevitable that some event will cause a time management issue, which might lead to a missed assignment deadline. Though normally handled on a case-by-case basis, there are some baseline penalties for missed or delayed assignments, detailed here:
• Late topic choices will receive a 1% deduction per day before grading. • Late topic outline and list of references will receive a 2% deduction per day before grading. • Late paper drafts will receive a 5% deduction per day before grading. • Missed exams will receive a 5% deduction per day until made up.
Extra credit (up to 6 points): Students who attend an academic lecture/event dealing with an international/global issue and submit a one-page summary may receive a 3 point increase on a paper draft grade. The maximum extra credit for the semester is two lectures/events (a total of 6 extra credit points). Summaries must be turned in within 7 days of the event.
18
PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any other work submitted for academic credit will be the student’s own. Students should always take great care to distinguish their own ideas and knowledge from information derived from sources. The term “sources” includes not only primary and secondary material published in print or online, but also information and opinions gained directly from other people. Quotations must be placed properly within quotation marks and must be cited fully. In addition, all paraphrased material must be acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research or from a student’s own writings, the sources must be indicated. It is the expectation of every course that all work submitted for a course or for any other academic purpose will have been done solely for that course or for that purpose.7 Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties, including failure in the course and be remanded to the appropriate authorities of their home university for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE & COURSE READINGS Session One Topic:
• Putting a value on the environment and understanding environmental politics Readings: • G. Hardin, “The Tragedy of the Commons,” Science 162:1243-1248 (1968). • E. Ostrom et.al., “Revisiting the Commons: Local Lessons, Global Challenges,” Science 284:278-
282 (1999). • Bierbaum, R., Holdren, J., MacCracken, M., Moss, R., Raven, P. (Eds.), 2007. Confronting Climate
Change: Avoiding the Unmanageable and Managing the Unavoidable . United Nations Foundation, Washington, DC, 144pp.
• Executive Summary • Harrison, Kathryn, Lisa McIntosh Sundstrom (2007). “The Comparative Politics of Climate
Change,” Global Environmental Politics 7:4, pp. 1-18. • M. Shellenberger and T. Nordhaus. “The Death of Environmentalism: Global Warming Politics in a
Post-Environmental World.”(2004) • William Cronon, “The Trouble with Wilderness: Or, Getting Back to the Wrong Nature,” in Global
Environmental History: A Reader (2013), pp. 339-363. Session Two Topic: • Global environmental politics, and (Western) European environmental politics Readings: • Matthew Paterson, “Introduction” from Understanding Global Environmental Politics:
Domination, Accumulation, Resistance.
7 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
19
• Hanf, Kenneth and Alf-Inge Jansen, Governance and environmental quality: Environmental politics, policy and administration in Western Europe. (New York: Addison Wesley Longman, 1998).
Chapter One
Chapter Thirteen • Morten Andersson, Gunver Bennekou, Henning Schroll "Environmental problems and
environmental regulations in Western Europe, 1980–1989," Environmental Management, March/April 1992, Volume 16, Issue 2, pp 187-194.
• Jae-Jae Spoon. 2011. Political Survival of Small Parties in Europe. Ann Arbor: University of Michigan Press. Chapters 2-4.
Requirements: • Paper One due today (17:00) via Moodle upload Session Three Topic: • (Eastern) European environmental politics Readings: • Waller, Michael and Frances Millard, “Environmental politics in Eastern Europe,” Environmental
Politics 1:2 (1992), pp. 159-185. • Waller, Michael, “The environmental issue in the East of Europe: top–down, bottom–up and
outside–in,” Environmental Politics 19:5 (2010), pp. 831-849. • Hicks, Barbara, “Setting Agendas and Shaping Activism: EU Influence on Central and Eastern
European Environmental Movements,” Environmental Politics 13:4 (2004), pp. 216-233. Requirements: • Paper Two due today (17:00) via Moodle upload Session Four Topic: • Environmental policies in Germany and France Readings: • Boehmer-Christiansen, S.; Skea, J. Acid politics: environmental and energy policies in Britain and
Germany.
Read German sections of Chapters 1-4
Read German sections of Chapters 5 and 6
Read entirety of Chapter 10 • Knill, Christoph and Andrea Lenschow, “Coping with Europe: the impact of British and German
administrations on the implementation of EU environmental policy,” Journal of European Public Policy 5:4 (1998), pp. 595-614.
• Organization for Economic Cooperation and Development, “Environmental Performance Reviews: Germany” (2012).
• Brand, Karl-Werner, “Dialectics of institutionalisation: The transformation of the environmental movement in Germany,” Environmental Politics 8:1 (1999).
• Prendiville, Brendan. Environmental Politics in France (Boulder, CO: Westview Press, 1994), Introduction and Part One
20
• Organization for Economic Cooperation and Development (OECD), “Conclusions and Recommendations of the OECD Environmental Performance Review of France” (2005).
Requirements: • Paper Three due today (17:00) via Moodle upload. Session Five Topic: • Environmental politics in Poland and Hungary Readings: • Andersson, Magnus, “Setting the Stage” and “National Environment Policy in the 1980s,” in
Change and Continuity in Poland’s Environmental Policy (Springer, 2000). • Krista Harper, Wild Capitalism (Introduction). • Organization for Economic Cooperation and Development (OECD), “Environmental Country
Reviews: Hungary”. • European Environment Agency, “2011 survey of resource efficiency policies in EEA member and
cooperating countries - HUNGARY”. Requirements: • Paper Four due today (17:00) via Moodle upload Session Six Topic: • EU environmental policies Readings: • Christian Hey, “EU Environmental Policies: A short history of the policy strategies” European
Environment Bureau (EEB). • Jon Birger Skjærseth, Jørgen Wettestad (2009) “The Origin, Evolution and Consequences of the
EU Emissions Trading System” Global Environmental Politics, 9:2, pp. 101-122 • Commission of the European Union, DG Climate Action, “The EU Emissions Trading System (EU
ETS)”. • EU ETS Factsheet. • European Commission, “The 2020 climate and energy package”. • European Commission, 2020 package supporting documents, sections TBD. • “The Paris Protocol – A blueprint for tackling climate change beyond 2020”. Requirements: • 8 and 9-credit student PowerPoint presentations due today in class
21
Dr. Michael W. Mosser
THE COMPREHENSIVE NOTION OF EUROPEAN SECURITY ………………………………………….......
Dr. Michael W. Mosser
Email: [email protected]
Office: t.b.a
Office hours: by appointment
COURSE DESCRIPTION
International security, a subfield of international relations, examines the nature of the international states system. It specifically focuses on what is known as the ‘security dilemma,’ the idea (or myth, depending on your theoretical predilection) that states in the international system desire above all to remain secure and extant, and will do whatever necessary to avoid becoming less secure or even disappearing entirely. Questions of how or whether it is necessary or even possible to cooperate to achieve security were seen as peripheral. Recently, many scholars and practitioners have begun to question the state-centric approach to international security, as well as its focus on power, rivalries, and conflict. Instead, these scholars and practitioners have begun to speak of ‘comprehensive’ security, or the ‘comprehensive approach’ to international security. Besides being a good catchphrase, what does comprehensive security mean? What does it entail? “Comprehensive security” has a variety of connotations, depending on the context in which the idea is presented, but generally most agree on the idea of a more all-encompassing, holistic understanding of ‘security’ than that embraced by traditional international relations theories. Part of the rationale for this course is to unpack some of the themes underpinning the various ‘flavors’ of comprehensive security, (among others, its human, economic, environmental dimensions). One of the regions of the world where the notion of ‘comprehensive’ security has been most explicitly theorized and implemented is in Europe. Thus the course pays special attention to this region of the world and examines the practical aspects of comprehensive security via the institutions charged with implementing it: the European Union (EU), the North Atlantic Treaty Organization (NATO), and the Organization for Security and Cooperation in Europe (OSCE). Part One: Theories of international security
This part of the course investigates the underlying theoretical premises of international security, with
special emphasis on:
Theories of conflict and cooperation, covering topics such as realism, institutionalism, constructivism, democratic peace theory.
Theories of influence, covering topics such as soft power, deterrence & coercion, domestic politics and influence, credibility, norms and institutions as influencers of behavior.
Part Two: The idea of comprehensive security
This section of the course takes the theoretical precepts gained from Part One and applies them to the
newly emerging idea within international security that true international (and regional) security must
take into account factors beyond mere state survival. To that end, the idea of ‘comprehensive’ security
is raised, bringing into play a more nuanced view of international security. In this section, we will
examine various ways in which comprehensive security has been thought about. Primarily, we will
22
explore the idea of ‘human’ security that developed out of the 1994 UN Human Development Report,
which has seven constituent elements:
Economic security
Food security
Health security
Environmental security
Personal security
Community security
Political security
The section will begin with a survey of the general concept of human security, then move to a
treatment of four of its components: economic, health and environmental, and community security.
The section will conclude with a discussion of security sector reform as the means to establishing
lasting peace in post-conflict societies, a key facet in any discussion of post Cold War comprehensive
security.
Part Three: The practice of comprehensive security in Europe: case studies
In Part Three of the course, we look at ways in comprehensive security has been implemented in
Europe. We look specifically at European notions of comprehensive security, focusing on the North
Atlantic Treaty Organization (NATO), the Organization for Security and Cooperation in Europe (OSCE),
and the European Union (EU).
ASSIGNMENTS AND GRADING
Papers: 80%
The primary form of assessment for this course will be short papers. As this course meets European
Credit Transfer and Accumulation System (ECTS) guidelines, the number of short papers will change
according to the number of ECTS credits for which the student has signed up. The table below explains
the variable assignments:
Number of ECTS
credits Assignment Due Dates
6 Three (3) five-page (2000-word) papers (15 pages total) Papers: 16 June, 23 June, 30 June
8 or 9 Four (4) five-page (2000-word) papers (20 pages total) +
PowerPoint presentation on final paper
Papers: 16 June, 23 June, 30 June,
7 July
PowerPoint presentation: 14 July
The papers for this class will be short (2000 word) exploratory paper on topics chosen by the instructor.
Each paper should be a reasonably thorough treatment of the topic chosen, including a clear thesis
statement, logical consistency in the arguments used to show the validity of the thesis, and a clear and
23
concise conclusion that effectively summarizes your argument. Ideally, the paper should be no more
than 2000 words in length but a variation of ± 5% is permitted.
The PowerPoint presentation (for students signed up for 8 or 9 ECTS credits) will be based on the
student’s final paper, and will consist of no more than five (5) slides containing the paper’s thesis, a
short summary of the literature, an analysis of the research, and a conclusion. Presentations should be
no more than 15 minutes in length.
Participation / Discussion Questions: 20%
Class discussion in a once-weekly seminar is more than expected; it is a given. Everyone has his or her
own style of discussion, and I do not expect to turn those who prefer not to speak often in class into
debate champions. Participation will be divided into two sections: Discussion questions and in-class
participation. Since not everyone enjoys speaking in class, discussion questions will count for more
than in-class participation. Discussion questions will count for 5% of your course grade, while in-class
participation will count for 15% of your course grade.
So that we can discuss points raised in the online postings in class, discussion questions for the week
on which I am lecturing will be due by 17:00 every Wednesday (unless directed otherwise). Postings
can be drawn from the readings; in this case, they should reflect any questions, comments, or cries of
outrage you may have regarding the arguments set forth by the authors. They most definitely will help
you get the most from the class. Postings may also be brief synopses of newsworthy events. In this
case, you must post both the link to the news story and a brief (50-word) précis of what the article
discusses. Finally, postings may be replies to others' questions or news stories, as long as they are
informative replies and not merely agree/disagree posts. One post (or a thoughtful reply to a post)
counts as your post for that week.
The total number of discussion postings will be counted at the end of the summer session, and also
will be examined throughout the session for evidence of consistent posting. Do not expect to “catch-
up” post only at the end and receive full participation credit.
6 postings: Full credit 3-4 postings: 70% credit 2 postings: 50% credit Less than 2 postings: No credit
A word on late or missed assignments. Over the course of the summer session, it is inevitable that
some event will cause a time management issue, which might lead to a missed assignment deadline.
Though normally handled on a case-by-case basis, there are some baseline penalties for missed or
delayed assignments, detailed here:
Late topic choices will receive a 1% deduction per day before grading. Late topic outline and list of references will receive a 2% deduction per day before grading. Late paper drafts will receive a 5% deduction per day before grading. Missed exams will receive a 5% deduction per day until made up.
Extra credit (up to 6 points):
Students who attend an academic lecture/event dealing with an international/global issue and submit
a one-page summary may receive a 3 point increase on a paper draft grade. The maximum extra credit
24
for the semester is two lectures/events (a total of 6 extra credit points). Summaries must be turned
in within 7 days of the event.
PLAGIARISM & ACADEMIC MISCONDUCT
It is expected that all homework assignments, projects, papers, theses, and examinations and any
other work submitted for academic credit will be the student’s own. Students should always take great
care to distinguish their own ideas and knowledge from information derived from sources. The term
“sources” includes not only primary and secondary material published in print or online, but also
information and opinions gained directly from other people. Quotations must be placed properly
within quotation marks and must be cited fully. In addition, all paraphrased material must be
acknowledged completely. Whenever ideas or facts are derived from a student’s reading and research
or from a student’s own writings, the sources must be indicated. It is the expectation of every course
that all work submitted for a course or for any other academic purpose will have been done solely for
that course or for that purpose.8
Students who violate University rules on scholastic dishonesty are subject to disciplinary penalties,
including failure in the course and be remanded to the appropriate authorities of their home university
for disciplinary action. This might lead up to a dismissal from the University.
SCHEDULE & COURSE READINGS
Session One
Topics:
Overview of the field of international relations
Sovereignty and the idea of the state: why is the state the accepted starting point for any discussion of international security?
Realism and Neoliberal Institutionalism as primary competitive theories of international security
Readings:
Stephen Walt, “International Relations: One World, Many Theories,” Foreign Policy Spring 1998, pp. 29-46.
Jack Snyder, “One World, Rival Theories,” Foreign Policy November/December 2004.
Charles Tilly, “War Making and State Making as Organized Crime,” in Peter B. Evans, Dietrich Rueschemeyer, Theda Skocpol, eds., Bringing the State Back In.
Kenneth N. Waltz, “Structural Realism After the Cold War,” International Security 25:1 (Summer 2000), pp. 5-41.
Robert Jervis, “Realism, Neoliberalism, and Cooperation: Understanding the Debate,” International Security 24:1 (Summer 1999), pp. 42-63.
John Mearsheimer, “The False Promise of International Institutions,” International Security 19:3 (Winter 1994/95), pp. 5-49.
Robert O. Keohane and Lisa L. Martin, “The Promise of Institutionalist Theory,” International Security 20:1 (Summer 1995), pp. 39-51.
Recommended:
Brian Schmidt, “Competing Realist Conceptions of Power,” Millennium – Journal of International Studies 33:3 (2005), pp. 523-549.
8 See Harvard Plagiarism Policy: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355322 (last accessed: 12.01.2016).
25
Randall Schweller, “The Progressiveness of Neo-classical Realism,” in Elman and Elman (eds.) Progress in International Relations Theory: Appraising the Field.
Session Two
Topics:
“New” Institutionalism and Constructivism as Theoretical Challenges to Realism and Neoliberal Institutionalism.
Readings:
James G. March and Johan P. Olsen, “Elaborating the ‘New Institutionalism’,” ARENA Working Paper 11 (March 2005).
Lisa Martin and Beth Simmons, “Theories and Empirical Studies of International Institutions,” International Organization 52:4 (Autumn 1998), pp. 729-757.
Emmanuel Adler, “Imagined (security) communities: cognitive regions in international relations,” International Security.
Klotz, Audie and Cecilia Lynch, “Constructivism,” in Strategies for Research in Constructivist International Relations (Armonk, NY: ME Sharpe), pp. 3-23.
Martha Finnemore and Kathryn Sikkink, “Taking Stock: The Constructivist Research Program in International Relations and Comparative Politics,” Annual Review of Political Science, 2001: 4, pp. 391-416.
Recommended:
Alexander Wendt, "Anarchy is what States Make of it: The Social Construction of Power Politics", International Organization, Vol. 46, No. 2 (Spring, 1992) , pp. 391—425.
Jeffrey T. Checkel, “The Constructivist Turn in International Relations Theory,” World Politics 50:2 (January 1998), pp. 324-348.
Michael Barnett, Dialogues in Arab Politics: Negotiations in Regional Order (Columbia, 1998), Introduction and Chapter One.
John Ruggie, “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge,” International Organization 52:4 (Autumn 1998), pp. 855-885.
Session Three
Topic:
The general concept of ‘human’ security
Readings:
Kaldor, Mary (2007) “Human Security,” in Human Security (London: Wiley), pp. 182-197.
Review the Commission on Human Security website.
Review the United Nations’ Human Security Unit (HSU) website.
Final Report of the Commission on Human Security (selected chapters).
Chapter One, “Human Security Now”.
Chapter Two, “People Caught Up in Violent Conflict”.
Chapter Five, “Economic security—the power to choose among opportunities”.
Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security 26:2 (Fall 2001), pp. 87-102.
Sakiko Fukuda-Parr and Carol Messineo, “Human Security: A critical review of the literature” CRPD Working Paper (January 2012).
26
Des Gasper, “Securing Humanity: Situating 'Human Security' as Concept and Discourse,” Journal of Human Development and Capabilities 6:2 (July 2005), pp. 221-245.
Recommended:
David Bosold and Sascha Werthes, “Human Security in Practice: Canadian and Japanese Experiences,” International Politics and Society 1(2005), pp. 84-101.
Kanti Bajpai, “Human Security: Concept and Measurement,” Kroc Institute (University of Notre Dame) Occasional Paper #19:OP:1.
Session Four
Topics:
Economic, environmental and health security
Readings:
Thomas O’Brien, “Food riots as representations of insecurity: examining the relationship between contentious politics and human security,’ Conflict, Security, and Development 12:1 (2012), pp. 31-49.
Dharam Ghai, “Economic Globalization, Institutional Change, and Human Security,” United Nations Research Institute for Social Development Discussion Paper 91 (November 1997).
“What is Environmental Security?” Institute for Environmental Security.
Michael Renner, “Introduction to the Concepts of Environmental Security and Environmental Conflict”
A.H. Westing, “The Environmental Component of Comprehensive Security,” Security Dialogue 20:2 (1989), pp. 129-134.
Climate Change and Conflict, Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (Germany).
o Executive Summary o Long-term Societal and Political Implications of Climate Change o Bangladesh case study o Stern Report on the Economics of Climate Change (2008), Read Executive Summary.
Michael Renner, The Anatomy of Resource Wars (WorldWatch Institute, 2002), Read pp. 5-47.
Robert Keohane, Peter Hass, and Marc Levy, Institutions for the Earth, Chapter One: “The Effectiveness of International Environmental Institutions,” pp. 3-24.
Mely Caballero-Anthony, “The Way Forward: Human Security Beyond Discourse to Action,” "The Way Forward: Human Security Beyond Discourse to Action," Health and Human Security: Moving from Concept to Action-Fourth Intellectual Dialogue on Building Asia's Tomorrow; (ed. Pamela J. Noda), Tokyo: Japan Center for International Exchange, 2002, pp. 11-20.
Available at http://www.jcie.org/researchpdfs/HealthHumSec/health_summary.pdf.
Requirements:
Paper One due today (17:00) via upload to Moodle
Session Five
Topic:
Comprehensive Security in Europe: Underlying Concepts
Readings:
27
Mary Kaldor, Mary Martin, and Sabine Selchow, “Human Security: A New Strategic Narrative for Europe,” International Affairs 83:2 (March 2007), pp. 273-288.
Gunter Hauser and Franz Kernic (eds.) European Security in Transition (London: Ashgate, 2006)
Chapter One: Franz Kernic, “European Security in Transition: The European Security Architecture since the End of the Second World War – An Overview,” pp. 5-22.
Available on Blackboard
Simon Duke and Hanna Ojanen, “Bridging Internal and External Security: Lessons from the European Security and Defence Policy,” Journal of European Integration 28:5 (2006), pp. 477-494.
Session Six
Topics:
European expressions of comprehensive security: the Organization for Security and Cooperation in Europe (OSCE).
The OSCE’s evolution and history.
The OSCE’s contemporary comprehensive security operations.
Readings:
OSCE website, http://www.osce.org.
Hauser and Kernic (eds.) European Security in Transition. o Chapter Two: Peter van Ham, “EU, NATO, OSCE: Interaction, Cooperation and
Confrontation,” pp. 23-38.
Dunkerley, Craig G. "Considering Security Amidst Strategic Change: The OSCE Experience." Middle East Policy 11, no. 3 (2004): 131-138.
The OSCE in the Maintenance of Peace and Security: Conflict Prevention, Crisis Management, and Peaceful Settlement of Disputes. o Selections TBD
Requirements:
Paper Two due today (17:00) via upload to Moodle
Session Seven
Topic:
European expressions of comprehensive security (II): the North Atlantic Treaty Organization (NATO)
Readings:
Pernille Rieker, “From Common Defence to Comprehensive Security: Towards the Europeanisation of French Foreign and Security Policy?,” Norwegian Institute of International Affairs Working Paper 691 (2005), pp. 1-29.
Michael J. Brenner, “Europe’s New Security Vocation,” McNair Paper 66, Institute for Strategic Studies, National Defense University, Read Chapters 1-2 (pp. 1-39).
Mearsheimer, John J. (1990) Back to the Future: Instability in Europe after the Cold War. International Security 15: 5-56.
Menon A and Walsh JI. (2011) Understanding NATO's Sustainability: The Limits of Institutionalist Theory. Global Governance 17: 81-94.
Session Eight
Topic:
European expressions of comprehensive security (II): The North Atlantic Treaty Organization (continued)
28
Readings:
Gheciu A. (2005) Security institutions as agents of socialization? NATO and the 'new Europe’. International Organization 59: 973-1012.
Giegerich B and Wallace W. (2004) Not such a soft power: the external deployment of European forces. Survival 46: 163-182.
Daalder I. (2006) Global NATO. Foreign Affairs 85: 105-+.
Sperling, J. and Webber, M. (2009), NATO: from Kosovo to Kabul. International Affairs, 85: 491–511.
Requirements:
Paper Three due today (17:00) via upload to Moodle
Session Nine
Topic:
European expressions of comprehensive security (III): the European Union (EU).
The European Union in the Mediterranean and individual expressions of European Security.
Readings:
Hauser and Kernic (eds.) European Security in Transition, Chapter Three: Gunter Hauser, “The ESDP: The European Security Pillar,” pp. 39-62.
Michael J. Brenner, “Europe’s New Security Vocation,” McNair Paper 66, Institute for Strategic Studies, National Defense University, Read Chapters 3-4 (pp. 40-80).
Biscop, S. "Opening up the ESDP to the South: A Comprehensive and Cooperative Approach to Euro-Mediterranean Security." Security Dialogue 34, no. 2 (2003): 183-197.
Weiss, M. "Power and Signals: Explaining the German Approach to European Security." Journal of International Relations and Development 12, no. 3 (2009): 317-348.
Session Ten
Topic:
European security since the Arab Spring
Readings:
Noutcheva, Gergana (2015), “Institutional Governance of European Neighbourhood Policy in the Wake of the Arab Spring,” Journal of European Integration 37:1, pp. 19-36.
Rasmussen, AF (2011) “NATO and the Arab Spring,” New York Times.
Hallams E and Schreer B. (2012) Towards a post-American' alliance? NATO burden-sharing after Libya. International Affairs 88: 313-327.
Strachan H. (2011) Strategy and contingency. International Affairs 87: 1281-+.
Gheciu A and Paris R. (2011) NATO and the Challenge of Sustainable Peacebuilding. Global Governance 17: 75-79.
Noetzel T. (2012) More flexible, less coherent: NATO after Lisbon. Australian Journal of International Affairs 66: 20-33.
Requirements:
Paper Four due today (17:00) via upload to Moodle
Session Eleven
29
Topic:
EU border security policy in the human security context
Readings:
EU FRONTEX web page o Explore sections as directed by instructor
Léonard, Sarah (2010), “EU border security and migration into the European Union: FRONTEX and securitisation through practices,” European Security 19:2, pp. 231-254.
Bremberg, Niklas (2015), “The European Union as Security Community-Building Institution: Venues, Networks and Co-operative Security Practices,” JCMS: Journal of Common Market Studies 53:3, pp. 674-692.
Kartsonaki, Argyro and Stefan Wolff (2015), “The EU's Responses to Conflicts in its Wider Neighbourhood: Human or European Security?” Global Society 29:2, pp. 199-226.
Shields, Peter (2015), “The Human Cost of the EU’s External Border Regime,” Peace Review: A Journal of Social Justice 27:1, pp. 82-90.
Session Twelve
Topic:
EU Migration policy
Readings:
European Commission, “COMMISSION PRIORITY: Migration: Towards a European agenda on Migration”
Huysmans, Jef (2000), “The European Union and the Securitization of Migration,” JCMS: The Journal of Common Market Studies 38:5, pp. 751-777.
Geddes, Anthony (2001), “Asylum in Europe: States, the European Union, and the International System,” Refugee Survey Quarterly 20:2, pp. 59-72.
Wodak, Ruth and Salomi Boukala (2015), “European identities and the revival of nationalism in the European Union,” Journal of Language and Politics 14:1, pp. 87-109.
Toshkov, Dimiter and Elitsa Kortenska (2015), “Does Immigration Undermine Public Support for Integration in the European Union?” JCMS: Journal of Common Market Studies 53:4, pp. 910-925.
Requirements:
8 and 9-credit student PowerPoint presentations