Sunday, August 8, 2010


National Security and International Relations

School of International Studies-
Jawaharlal Nehru University

Monsoon Semester 2010
MA Optional Course 
Course No: IS 557N


Class Timings:                                                                Happymon Jacob, Ph.D.
Wednesdays 12.00 Noon to 1.30 p.m                               Room - 110, SIS, JNU
 Fridays 4.30 p.m to 6.30 p.m                                           Office Hours: By apt
                                                                                         happymon@gmail.com

Course Syllabus

Content, Structure and Objectives
The aim of the course is to undertake and encourage critical engagements with the idea of security in general and the notion of national security in International Relations in particular. It does so by examining the concept of national security from historical, theoretical and critical perspectives even as it engages the various contemporary issues of the international system and the politics therein. This combination of historico-theoretical analysis and contemporary discourse on security will help the students in gaining a comprehensive understanding of the subject. I hope that the course will help the students make informed critiques of various issues confronting humanity today.

Course Requirements
The class will meet three times a week. While 2/3rd of the allotted time in a week will be devoted to class lectures, the remaining 1/3rd is allocated for tutorials. The tutorials would involve in-depth discussions and presentations. Students are expected to be compulsorily present for the classes. The assignments include book reviews, response papers, research papers and paper presentations. While the final examination would account for 50% of the marks, internal assessment is going to take care of the rest: so you better come to the classes!  

All assignments are to be submitted on specified dates failing which they won’t be considered for grades. Students must contact me prior to assignment due dates if they wish to request extensions which will be granted only in cases of emergency. They are to be submitted both in hard and soft copies. The soft copy is to be sent to: nationalsecurity2010@gmail.com. Plagiarism of any kind is to be avoided and the slightest hint of such behaviour will be dealt with sternly. Disciplinary measures will be initiated against students who are found engaging in such unfair and unethical practices.


Grading
The break up of the internal assessment is as follows:
  1. A research paper of approx. 3000-3500 words along with the presentation  - 25%
  2. Response papers of approx. 500-700 words for each section                        - 20%
  3. A Book Review of approx. 800- 1000 words                                            -  10%

Term Paper
Research papers should be approximately 3500 words in length, typed, and double spaced using a 12 point font, and must have footnotes or endnotes and a bibliography. All direct quotations and paraphrases must be cited. For a discussion of research methods, see Stephen Van Evera, Guide to Methods for Students of Political Science. SIS Research Manual may be consulted to know more about referencing styles in research papers: http://www.jnu.ac.in/academics/schools/schoolofinternationalstudies/sis_research_manual.pdf.

Response papers
Students are required to submit a response paper of about 500-700 words on each of the six sections in this course. The paper should essentially say what you have understood in the specific section of the course.

Readings and Resources
Most of the required readings prescribed for the course would be available with the Teaching Assistant. You can collect them from him. In addition, we will try and get a course reading package ready. You would be able to purchase it from the photocopy shop located in the basement of SIS as soon as the course begins. Always bring the assigned readings for the class since we will often refer to specific sections in them. Needless to remind that students taking this course agree to come to class prepared to discuss the assigned reading.

Course Blog: The reading list as well as the articles (not book chapters) for the course will be posted on the blog. Three best assignments and book reviews will be chosen from those submitted as part of the course and posted on the blog. You can access the blog at
www.nationalsecurity2010.blogspot.com

Course Email id: nationalsecurity2010@gmail.com

Teaching Assistant for the Course: Mr. Souresh Roy is the TA for this course. The TA will answer most of your emails queries, handover additional reading material; maintain the course blog; and attend, guide and participate in the tutorials and research paper presentations.





Readings and Topics

A. Historical Narrative

  1. State Formation, Power, Legitimacy, Security   [2 classes]

·        Charles Tilly, “War Making and State Making as Organized Crime”, in Bringing the State Back In, Peter Evans, Dietrich Rueschemeyer, and Theda Skocpol (Eds.), Cambridge University Press, Cambridge, 1985

·        Barry Buzan and Lene Hansen, “The Key questions in International Security Studies: The state, politics and epistemology”, in The Evolution of International Security Studies, Cambridge University Press, 2009

·        Edward A. Kolodziej, “The Foundations of Security studies: Hobbes, Clausewitz, and Thucydides”, in Security and International Relations, Cambridge University Press, 2005

·        Harold D. Lasswell, “The Garrison Sate”, The American Journal of Sociology, Vol. 46, No. 4 (Jan., 1941), pp. 455-468

·        Bryan Mabee, “Security Studies and the ‘Security State': Security Provision in Historical Context,” International Relations Vol. 17, No. 2, 2003: 135-151


2.   Evolution of Security Studies    [3 classes]

·        Gwyn Prins, “The Four-stroke Cycle in Security Studies” International Affairs, Vol. 74, No. 4, 1998: 781-808

·        Barry Buzan and Lene Hansen, The Evolution of International Security Studies, Cambridge University Press, 2009, (Chaps. 4 & 5)

·        Stephen M. Walt, “The Renaissance of Security Studies”, International StudiesQuarterly, Vol. 35, No. 2: 211-239

·        Bill Mcsweeney, “Early Stages of Development” in Security, Identity and Interests: A Sociology of International Relations, Cambridge University Press, 1999, (Chap. 2)


B. Conceptual Background

      1.   Security, Power, National Interest   [4 classes]

            National Interest
·        Scott Burchill, “Origins and Antecedents”, in The National Interest in International Relations Theory, Palgrave, 2005

Security and Power

·        E.H.Carr, The Twenty Years' Crisis, 1919-1939: An Introduction to the  Study of International Relations, Macmillan, London, 1939

·        Charles L Glaser, “Realists as Optimists: Cooperation as Self- Help”, International Security, Vol.19, No.3: 50-90

·        Robert  Jervis,“ Realism, Neoliberalism, and Cooperation: Understanding the Debate”, International Security, Vol.24, No.1: 42-63

·        John Mearsheimer, The Tragedy of Great Power Politics, W.W. Norton, New York, 2001

·        Evan Braden Montgomery, “Breaking Out of the Security Dilemma Realism, Reassurance, and the Problem of Uncertainty”, International Security, Vol.31, No. 2: 151–185

·        Randall L.  Schweller, “Bandwagoning for Profit: Bringing the Revisionist State Back in”, International Security, Vol.19, No.1: 72-107

·        Jeffrey W. Taliaferro, (2000-2001), “Security Seeking under Anarchy: Defensive Realism Revisited”, International Security, Vol.25, No.3: 128-161

National Security

·        Arnold Wolfers, “'National Security' as an Ambiguous Symbol,” in Discord and Collaboration: Essays on International Politics, Johns Hopkins University Press, 1962, (Chap. 10)

·        Barry Buzan, People, states and fear: National Security Problem in International Relations, Hartnolls, Cornwall, 1991


  1. Security Dilemma   [2 class]

    • Robert Jervis, “Cooperation Under the Security Dilemma”, World Politics, Vol.30, No.2: 167-214

    • Ken Booth and Nicholas J. Wheeler, The Security Dilemma: Fear, Cooperation and Trust in World Politics, Palgrave, 2008, (Chap. 1 & 11)

Suggested Reading:

    • Charles L. Glaser, “The Security Dilemma Revisited”, World Politics, Vol. 50, No. 1 (October 1997), pp. 171–201

    • John H. Herz, “Idealist Internationalism and the Security Dilemma”, World Politics, Vol.2, No.2: 157–80

Strategy & Grand Strategy (1 class)

·        John Baylis and James J. Wirtz, “Introduction” in John Baylis, James Wirtz, Eliot Cohen and Colin Grey, Strategy in the Contemporary World: An Introduction to Strategic Studies, Oxford University Press, 2002.

·        B. H. Liddell Hart, “The Theory of Strategy”, in Strategy: The Indirect Approach, Natraj Publishers ,Indian Edition, 2003 

·        Thomas C. Schelling, “The Retarded Science of International Strategy”, in The Strategy of Conflict, Harvard University Press, 1981


C. Theoretical Aspects

  1. Security and IR Theory   [4 classes]

    • Edward A. Kolodziej, Security and International Relations , Cambridge University Press, 2005, (Chap. 4, 5, 6 & 7)

    • Bill Mcsweeney, “The Social Constructivist Approach” in Security, Identity and Interests: A Sociology of International Relations, Cambridge University Press, 1999, (Chap.6)

    • Patrick M. Morgan, “Liberalist and Realist Security Studies at 2000: Two Decades of Progress” in Critical Reflection on Security and Change, Stuart Croftand Terry Terriff, Frank Cass, 2000

    • Steve Smith, “The Increasing Insecurity of Security Studies: Conceptualizing Security in the Last Twenty Years” in Critical Reflection on Security and Change, Stuart Croft and Terry Terriff, Frank Cass, 2000

    • Ken Booth, Theory of World Security, Cambridge University Press, 2007,   (Chap. 3)

    • Ken Booth, “Critical Explorations”, and “Beyond Critical Security Studies”, in Critical Security Studies and World Politics, Lynne Rienner Publishers, 2005


  1. Culture, Identity, Norms and National Security   [2 classes]

·        Ronald L. Jepperson, Alexander Wendt, and Peter J. Katzenstein, “Norms,       Identity, and Culture in National security”, in Peter J. Katzenstein (ed.), The      Culture of National Security: Norms and Identity in World Politics, Columbia      University Press, 1996

·        Kowert, Paul and Jeff Legro, `Norms, Identity and their Limits: A Theoretical Reprise', in Peter J. Katzenstein (ed.) The Culture of National  Security: Norms and Identity in World Politics, Columbia University Press, 1996.


D. Contemporary Security and Strategy   [8 classes]

1.      Concept of Deterrence

·        Keith B. Payne and C. Dale Walton, “Deterrence in the post-Cold War World”, in John Baylis, James Wirtz, Eliot Cohen and Colin Grey, Strategy in the Contemporary World: An Introduction to Strategic Studies, Oxford University Press, 2002.

·        Lawrence Freedman, “Towards a Policy of Deterrence”, The Evolution of Nuclear Strategy, Macmillan, 1981

·        Barry Buzan, “Deterrence”, in Barry Buzan, An Introduction to Strategic Studies, Macmillan, 1987


2.      Nuclear Stability

·        Scott Sagan and Kenneth N. Waltz, “More may be Better” (by Waltz) and “More will be worse” (by Sagan) in The Spread of Nuclear Weapons: A Debate Renewed, W. W Norton and Company, New York, 2003

·        Lawrence Freedman, “From Counterforce to Assured Destruction”, The Evolution of Nuclear Strategy, Macmillan, 1981




3.      Limited War under Nuclear Conditions

·        John M. Collins, “The Nature of Limited War”, in Grand strategy: Principles and Practices, Naval Institute Press, 1973

·        Lawrence Freedman, “Limited War”, The Evolution of Nuclear Strategy,       Macmillan, 1981

·        Thomas C. Schelling, ““Nuclear Weapons and Limited War”, in The Strategy of Conflict, Harvard University Press, 1981

4.      Revolution in Military Affairs

  • Barry Buzan, “The Revolution in Military Technology”, in Barry Buzan, An Introduction to Strategic Studies, Macmillan, 1987

  • Andrew Latham, “Re-imagining warfare: The ‘Revolution in Military Affairs’”, in Craig A. Snyder, Contemporary Security and Strategy, Deakin University Press, 1997


E. Regional Security

1.      Regional Security Complex Theory   [1 class]

·        Barry Buzan and Ole Weaver, “Security complexes: A Theory of Regional Security”, in Regions and Powers: The Structure of International Security, Cambridge University Press, 2003

·        Deutsch, K., (et al) in Political Community in the North Atlantic Area; International Organisation in the Light of Historical Experience, Princeton University Press, Princeton,1957

·        Adler, E., and Barnett, M., (eds.) in Security Communities, Cambridge University Press, Cambridge, 1998


2.  Subaltern Realism   [2 classes]

  • Mohammed Ayoob, “Subaltern Realism: International Relations Theory Meets the Third World”, in Stephanie G. Neuman (ed), International Relations and the Third World, St. Martin's Press, 1998.

  • Michael Barnett, “Radical Chic? Subaltern Realism: A Rejoinder”, The International Studies Review, Vol. 4, No. 3, December 2002

  • Keith Krause, “Theorizing security, state formation and the 'Third World' in the post-Cold War world”, Review of International Studies (1998), 24:125-136 (Review of Mohammad Ayoob’s book The Third World Security Predicament)

  • Amitav Acharya, “The Periphery as the Core: The Third World and Security Studies”, http://www.yorku.ca/yciss/publications/OP28-Acharya.pdf


F. Non-Traditional Security     [5 classes]

  • Ken Booth, “Critical Explorations”, in Ken Booth (Ed.), Critical Security Studies and World Politics”, Lynne Rienner, 2005

  • Ole Weaver, 'Securitization and Desecuritization'; Barry Buzan, Ole Weaver and J. de Wilde, Security: a New Framework for Analysis, (Boulder: Lynne Rienner)

  • Ole Weaver, “Security Agendas Old and New, And How to Survive Them”, Universidad Torculato Di Tella, 2000

  • Ken Booth, “Deepening, Broadening and Reconstructing”, Theory of World Security, Cambridge University Press, 2007

  • Barry Buzan and Lene Hansen, “Widening and Deepening Security”, in The Evolution of International Security Studies, Cambridge University Press, 2009

Suggested Readings:

  • Rita Taureck, “Securitization theory and securitization studies”, Journal of International Relations and Development (2006) 9, 53–61.

  • Jessica Tuchman Mathews, "Redefining Security," Foreign Affairs, Vol. 68, No.2

  • Richard Ullman, 'Redefining Security', International Security, Vol.8, No.1, 29-153

  • Kanti Bajpai, Human Security: Concept and Measurement, Kroc Institute Occasional Paper, No. 19, Op: 1, 2000

  • Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security, Vol.26, No.2: 87-102

  • Edward Newman, “Critical human security studies”, Review of International Studies (2010), 36, 77–94