NCHU Course Outline
Course Name (中) 亞洲非傳統安全研究與永續發展(6087)
(Eng.) Non-Traditional Security and Sustainable Development of Asia
Offering Dept Graduate Institute of International Politics
Course Type Elective Credits 3 Teacher Naina Singh
Department International Master Program in Asia and China Studies/Graduate Language English Semester 2026-SPRING
Course Description Security studies have long been associated with military threats, state survival, and strategic competition among great powers. However, in the absence of large-scale wars, the meaning and practice of security have expanded significantly. This course introduces students to this shift and explains the core idea that security today extends beyond armies and borders to include a range of non-traditional sectors. With the primary focus on the Asian context, the course dissects the eurocentrism of the security paradigm and highlights how dense populations, deep social inequalities, lack of basic infrastructure, diversity and limited resources have been at center of Asian “insecurities”. The course is structured to first ground students in key theoretical debates within security studies.

By engaging with approaches such as traditional realism, broadened and deepened security frameworks, human security, and critical security perspectives, students will develop the analytical tools needed to question what counts as a “security threat,” whose security matters, and how security is produced and governed. This theoretical foundation equips students to better understand and critically assess real-world practices, policies, and how these responses reshape regional cooperation, state sovereignty, and everyday life. By the end of the course, students will be able to connect abstract debates to concrete security issues shaping Asia today.
Prerequisites
self-directed learning in the course Y
Relevance of Course Objectives and Core Learning Outcomes(%) Teaching and Assessment Methods for Course Objectives
Course Objectives Competency Indicators Ratio(%) Teaching Methods Assessment Methods
1) Develop a clear understanding of the origins and evolution of Security Studies as a sub-discipline of International Relations

2) Acquire a holistic grasp of the conceptual and empirical landscape of Critical Security Studies by engaging with contemporary theoretical debates that challenge traditional notions of threat, referent objects, and security practices.

3)Apply critical thinking skills to examine linkage among different layers and versions of security
topic Discussion/Production
Visit
Discussion
Lecturing
Attendance
Oral Presentation
Assignment
Course Content and Homework/Schedule/Tests Schedule
Week Course Content
Week 1 Introducing Security

Baldwin, David A. “The Concept of Security.” Review of International Studies 23, no. 1 (1997): 5–26. http://www.jstor.org/stable/20097464.

Walker, R. B. J. ”Security: When? Where? From what? Of what? For whom?.” In Security Studies: An Applied Introduction , Chapter 2
Week 2 Transformations within Security Studies

Smith, Steve. ”The increasing insecurity of security studies: Conceptualizing security in the last twenty years.” In Critical Reflections on Security and Change, pp. 72-101. Routledge, 2013.

Bellanova, R., Jacobsen, K. L., & Monsees, L. (2020). Taking the trouble: science, technology and security studies. Critical Studies on Security, 8(2), 87–100. https://doi.org/10.1080/21624887.2020.1839852
Week 3 The Copenhagen School of Security Studies

Buzan, Barry, Ole Wæver, and Jaap De Wilde. Security: A new framework for analysis. Lynne Rienner Publishers, 1998.

Chapter 1: (Page 1-10)
Chapter 2: (Page 20-45)
Chapter 8: (Page 163-190)
Week 4 Aberystwyth School of Security Studies

Booth, Ken. “Security and Emancipation.” Review of International Studies 17, no. 4 (1991): 313–26. http://www.jstor.org/stable/20097269.

Bajpai, K. (2003). The Idea of Human Security. International Studies, 40(3), 195-228. https://doi.org/10.1177/002088170304000301 (Original work published 2003)

United Nations Development Programme. Human Development Report 1994: New Dimensions of Human Security. New York: Oxford University Press, 1994.
Week 5 Postcolonial Perspective on Security

Bilgin, Pinar. ”Securing the postcolonial.” In Routledge handbook of postcolonial politics, pp. 48-57. Routledge, 2018.

Persaud, Randolph B. ”Security studies, postcolonialism and the Third World.” In Race, Gender, and Culture in International Relations, pp. 155-179. Routledge, 2018.
Week 6 Paris School and Security Studies

Bigo, Didier. ”International political sociology.” In Security Studies, pp. 140-154. Routledge, 2008.

Gricius, G. Whose anxiety? What practices? The Paris School and ontological security studies. Int Polit 61, 322–342 (2024). https://doi.org/10.1057/s41311-023-00543-8

Security Research Database: https://security-research-map.eu/
Week 7 (mid-term assignment) Choose a sample of people around (8-10). Ask them following questions:
1) “What threatens them most”?
2) “Why this is the immediate threat for them?
3) “Do they think it can be addressed? And who they want to address it”?

選擇周圍約8至10人作為樣本,向他們提出以下問題:
1) 「什麼對他們構成最大威脅?」
2) 「為何此威脅對他們具有迫切性?」
3) 「他們認為此威脅能否被解決?若能,希望由誰來解決?」

Use this new data and the discussed frameworks in the class to prepare a reflection PPT. (運用這些新資料與課堂中討論的框架,準備一份反思簡報。)
Week 8 Guest Lecture Sahand Faez “Iran Sanctions Debate: Whose security is at the center here?”
Week 9 Environment Security: Climate Change and Southeast Asia

Elliott, Lorraine. Climate change and migration in Southeast Asia: Responding to a new human security challenge. S. Rajaratnam School of International Studies., 2022.

Howe, B. (2019). Cyclone Nargis in Myanmar: The Perfect Storm? In: Hernandez, C., Kim, E., Mine, Y., Xiao, R. (eds) Human Security and Cross-Border Cooperation in East Asia. Security, Development and Human Rights in East Asia. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-95240-6_6

Caballero-Anthony, Mely, Paul Teng, Goh Tian, Maxim Shrestha, and Jonatan Lassa. ”Linking climate change adaptation and food security in ASEAN.” Economic Research Institute for ASEAN and East Asia (ERIA) (2015).
Week 10 Terrorism and Indian State Security

Ogden, C. (2013). Tracing the Pakistan–Terrorism Nexus in Indian Security Perspectives: From 1947 to 26/11. India Quarterly: A Journal of International Affairs, 69(1), 35-50. https://doi.org/10.1177/0974928412472102

Chandra, V. (2020). India’s Counter-Terrorism Diplomacy at the United Nations: Progress and Problems. India Quarterly: A Journal of International Affairs, 76(1), 40

Feyyaz, M., & Husnain Bari, S. (2024). A critical analysis of India and Pakistan’s terrorism discourse in the context of geopolitics and imperialism. Critical Studies on Terrorism, 17(3), 606–630. https://doi.org/10.1080/17539153.2024.2360274
Week 11 Illicit Drugs and Insecurities

Thoson, Nicholas, and Patrick Meehan. ”Understanding the drugs policy landscape in Myanmar.” (2021).

Meehan, Patrick, Mandy Sadan, Sai Aung Hla, Sai Kham Phu, and Nang Muai Oo. ”Young people’s everyday pathways into drug harms in Shan State, Myanmar.” Third World Quarterly 43, no. 11 (2022): 2712-2730.

Banerjee, Sreeparna. ”From poppy fields to black markets: Understanding the drug trade across India and Myanmar.” In From poppy fields to black markets: understanding the drug trade across India and Myanmar: Banerjee, Sreeparna. New Delhi, India: ORF, Observer Research Foundation, 2024.
Week 12 Misgovernance and Security

Hassan, Ahmed Mohamed. ”The impact of corruption on the human security of societies in transition (Iraq case study since 2003).” Review of Economics and Political Science 9, no. 3 (2024): 212-232.

Barthwal-Datta, Monika. Understanding security practices in south asia. Taylor & Francis, 2012. Chapter 3

Nundy, Samiran, Keshav Desiraju, and Sanjay Nagral. Healers or predators?: Healthcare corruption in India. Oxford University Press, 2018. Chapter 4
Week 13 Borders, Mobility and Security Narratives

Part I
Plümmer, Franziska. ”Chinese border security: historical and contemporary threat perceptions at China’s borders.” In Handbook on Migration to China, pp. 307-321. Edward Elgar Publishing, 2025.

Elena Barabantseva, When Borders Lie Within: Ethnic Marriages and Illegality on the Sino-Vietnamese Border, International Political Sociology, Volume 9, Issue 4, December 2015, Pages 352–368

Part II
Sarkar, Swagato. ”The illicit economy of power: smuggling, trafficking and the securitization of the Indo-Bangladesh borderland.” Dialectical Anthropology 41, no. 2 (2017): 185-199.

Liang, Xiaochen. ”Marriage trafficking: Demand, exploitation, and conducive contexts—A study in China–Vietnam border areas.” Violence against women 29, no. 3-4 (2023): 548-579.
Week 14 Networks Society and Security Threats

Arquilla, John. Bitskrieg: the new challenge of cyberwarfare. John Wiley & Sons, 2021. Chapter 1

Ad’ha Aljunied, Syed Mohammed. ”The securitization of cyberspace governance in Singapore.” Asian Security 16, no. 3 (2020): 343-362.

Slupska, Julia. ”Safe at home: Towards a feminist critique of cybersecurity.” St Antony’s International Review 15, no. 1 (2019): 83-100.
Week 15 Critical Security Studies and Methods

Salter, Mark B., and Can E. Mutlu. ”Research methods in critical security studies.” New York, NY (2013).
Chapter 10: Listening to Migrants Stories
Chapter 33: Pictoral texts
Week 16 Final Assignment
self-directed
learning
   01.Participation in professional forums, lectures, and corporate sharing sessions related to industry-government-academia-research exchange activities.
   03.Preparing presentations or reports related to industry and academia.

Evaluation
Attendance 10%
Mid-term Reflection PPT 20%
Class Discussion/Presentation 30%
Final Written Assignment 40%
Textbook & other References

Teaching Aids & Teacher's Website
Fakhri Abdurrahman Muhammad
Email ID: fakhrirosadi@gmail.com
Office Hours
Tuesday 14:00-17:00
Sustainable Development Goals, SDGs(Link URL)
10.Reduced Inequalities   13.Climate Action   16.Peace and Justiceinclude experience courses:N
Please respect the intellectual property rights and use the materials legally.Please respect gender equality.
Update Date, year/month/day:2026/02/11 17:00:57 Printed Date, year/month/day:2026 / 2 / 18
The second-hand book website:http://www.myub.com.tw/