| 週次 |
授課內容 |
| 第1週 |
Introducing Security
Baldwin, David A. “The Concept of Security.” Review of International Studies 23, no. 1 (1997): 5–26. http://www.jstor.org/stable/20097464.
Walker, R. B. J. ”Security: When? Where? From what? Of what? For whom?.” In Security Studies: An Applied Introduction , Chapter 2
|
| 第2週 |
Transformations within Security Studies
Smith, Steve. ”The increasing insecurity of security studies: Conceptualizing security in the last twenty years.” In Critical Reflections on Security and Change, pp. 72-101. Routledge, 2013.
Bellanova, R., Jacobsen, K. L., & Monsees, L. (2020). Taking the trouble: science, technology and security studies. Critical Studies on Security, 8(2), 87–100. https://doi.org/10.1080/21624887.2020.1839852
|
| 第3週 |
The Copenhagen School of Security Studies
Buzan, Barry, Ole Wæver, and Jaap De Wilde. Security: A new framework for analysis. Lynne Rienner Publishers, 1998.
Chapter 1: (Page 1-10)
Chapter 2: (Page 20-45)
Chapter 8: (Page 163-190)
|
| 第4週 |
Aberystwyth School of Security Studies
Booth, Ken. “Security and Emancipation.” Review of International Studies 17, no. 4 (1991): 313–26. http://www.jstor.org/stable/20097269.
Bajpai, K. (2003). The Idea of Human Security. International Studies, 40(3), 195-228. https://doi.org/10.1177/002088170304000301 (Original work published 2003)
United Nations Development Programme. Human Development Report 1994: New Dimensions of Human Security. New York: Oxford University Press, 1994.
|
| 第5週 |
Postcolonial Perspective on Security
Bilgin, Pinar. ”Securing the postcolonial.” In Routledge handbook of postcolonial politics, pp. 48-57. Routledge, 2018.
Persaud, Randolph B. ”Security studies, postcolonialism and the Third World.” In Race, Gender, and Culture in International Relations, pp. 155-179. Routledge, 2018.
|
| 第6週 |
Paris School and Security Studies
Bigo, Didier. ”International political sociology.” In Security Studies, pp. 140-154. Routledge, 2008.
Gricius, G. Whose anxiety? What practices? The Paris School and ontological security studies. Int Polit 61, 322–342 (2024). https://doi.org/10.1057/s41311-023-00543-8
Security Research Database: https://security-research-map.eu/
|
| 第7週 |
(mid-term assignment) Choose a sample of people around (8-10). Ask them following questions:
1) “What threatens them most”?
2) “Why this is the immediate threat for them?
3) “Do they think it can be addressed? And who they want to address it”?
選擇周圍約8至10人作為樣本,向他們提出以下問題:
1) 「什麼對他們構成最大威脅?」
2) 「為何此威脅對他們具有迫切性?」
3) 「他們認為此威脅能否被解決?若能,希望由誰來解決?」
Use this new data and the discussed frameworks in the class to prepare a reflection PPT. (運用這些新資料與課堂中討論的框架,準備一份反思簡報。)
|
| 第8週 |
Guest Lecture Sahand Faez “Iran Sanctions Debate: Whose security is at the center here?” |
| 第9週 |
Environment Security: Climate Change and Southeast Asia
Elliott, Lorraine. Climate change and migration in Southeast Asia: Responding to a new human security challenge. S. Rajaratnam School of International Studies., 2022.
Howe, B. (2019). Cyclone Nargis in Myanmar: The Perfect Storm? In: Hernandez, C., Kim, E., Mine, Y., Xiao, R. (eds) Human Security and Cross-Border Cooperation in East Asia. Security, Development and Human Rights in East Asia. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-95240-6_6
Caballero-Anthony, Mely, Paul Teng, Goh Tian, Maxim Shrestha, and Jonatan Lassa. ”Linking climate change adaptation and food security in ASEAN.” Economic Research Institute for ASEAN and East Asia (ERIA) (2015).
|
| 第10週 |
Terrorism and Indian State Security
Ogden, C. (2013). Tracing the Pakistan–Terrorism Nexus in Indian Security Perspectives: From 1947 to 26/11. India Quarterly: A Journal of International Affairs, 69(1), 35-50. https://doi.org/10.1177/0974928412472102
Chandra, V. (2020). India’s Counter-Terrorism Diplomacy at the United Nations: Progress and Problems. India Quarterly: A Journal of International Affairs, 76(1), 40
Feyyaz, M., & Husnain Bari, S. (2024). A critical analysis of India and Pakistan’s terrorism discourse in the context of geopolitics and imperialism. Critical Studies on Terrorism, 17(3), 606–630. https://doi.org/10.1080/17539153.2024.2360274
|
| 第11週 |
Illicit Drugs and Insecurities
Thoson, Nicholas, and Patrick Meehan. ”Understanding the drugs policy landscape in Myanmar.” (2021).
Meehan, Patrick, Mandy Sadan, Sai Aung Hla, Sai Kham Phu, and Nang Muai Oo. ”Young people’s everyday pathways into drug harms in Shan State, Myanmar.” Third World Quarterly 43, no. 11 (2022): 2712-2730.
Banerjee, Sreeparna. ”From poppy fields to black markets: Understanding the drug trade across India and Myanmar.” In From poppy fields to black markets: understanding the drug trade across India and Myanmar: Banerjee, Sreeparna. New Delhi, India: ORF, Observer Research Foundation, 2024. |
| 第12週 |
Misgovernance and Security
Hassan, Ahmed Mohamed. ”The impact of corruption on the human security of societies in transition (Iraq case study since 2003).” Review of Economics and Political Science 9, no. 3 (2024): 212-232.
Barthwal-Datta, Monika. Understanding security practices in south asia. Taylor & Francis, 2012. Chapter 3
Nundy, Samiran, Keshav Desiraju, and Sanjay Nagral. Healers or predators?: Healthcare corruption in India. Oxford University Press, 2018. Chapter 4
|
| 第13週 |
Borders, Mobility and Security Narratives
Part I
Plümmer, Franziska. ”Chinese border security: historical and contemporary threat perceptions at China’s borders.” In Handbook on Migration to China, pp. 307-321. Edward Elgar Publishing, 2025.
Elena Barabantseva, When Borders Lie Within: Ethnic Marriages and Illegality on the Sino-Vietnamese Border, International Political Sociology, Volume 9, Issue 4, December 2015, Pages 352–368
Part II
Sarkar, Swagato. ”The illicit economy of power: smuggling, trafficking and the securitization of the Indo-Bangladesh borderland.” Dialectical Anthropology 41, no. 2 (2017): 185-199.
Liang, Xiaochen. ”Marriage trafficking: Demand, exploitation, and conducive contexts—A study in China–Vietnam border areas.” Violence against women 29, no. 3-4 (2023): 548-579.
|
| 第14週 |
Networks Society and Security Threats
Arquilla, John. Bitskrieg: the new challenge of cyberwarfare. John Wiley & Sons, 2021. Chapter 1
Ad’ha Aljunied, Syed Mohammed. ”The securitization of cyberspace governance in Singapore.” Asian Security 16, no. 3 (2020): 343-362.
Slupska, Julia. ”Safe at home: Towards a feminist critique of cybersecurity.” St Antony’s International Review 15, no. 1 (2019): 83-100.
|
| 第15週 |
Critical Security Studies and Methods
Salter, Mark B., and Can E. Mutlu. ”Research methods in critical security studies.” New York, NY (2013).
Chapter 10: Listening to Migrants Stories
Chapter 33: Pictoral texts
|
| 第16週 |
Final Assignment
|
自主學習 內容 |
   01.參與專業論壇、講座、企業分享等產官學研相關交流活動    03.製作專題報告
|
|