| Week |
Course Content |
| Week 1 |
Introducing Security
Baldwin, David A. “The Concept of Security.” Review of International Studies 23, no. 1 (1997): 5–26. http://www.jstor.org/stable/20097464.
Walker, R. B. J. ”Security: When? Where? From what? Of what? For whom?.” In Security Studies: An Applied Introduction , Chapter 2
|
| Week 2 |
Transformations within Security Studies
Smith, Steve. ”The increasing insecurity of security studies: Conceptualizing security in the last twenty years.” In Critical Reflections on Security and Change, pp. 72-101. Routledge, 2013.
Bellanova, R., Jacobsen, K. L., & Monsees, L. (2020). Taking the trouble: science, technology and security studies. Critical Studies on Security, 8(2), 87–100. https://doi.org/10.1080/21624887.2020.1839852
|
| Week 3 |
The Copenhagen School of Security Studies
Buzan, Barry, Ole Wæver, and Jaap De Wilde. Security: A new framework for analysis. Lynne Rienner Publishers, 1998.
Chapter 1: (Page 1-10)
Chapter 2: (Page 20-45)
Chapter 8: (Page 163-190)
|
| Week 4 |
Aberystwyth School of Security Studies
Booth, Ken. “Security and Emancipation.” Review of International Studies 17, no. 4 (1991): 313–26. http://www.jstor.org/stable/20097269.
Bajpai, K. (2003). The Idea of Human Security. International Studies, 40(3), 195-228. https://doi.org/10.1177/002088170304000301 (Original work published 2003)
United Nations Development Programme. Human Development Report 1994: New Dimensions of Human Security. New York: Oxford University Press, 1994.
|
| Week 5 |
Postcolonial Perspective on Security
Bilgin, Pinar. ”Securing the postcolonial.” In Routledge handbook of postcolonial politics, pp. 48-57. Routledge, 2018.
Persaud, Randolph B. ”Security studies, postcolonialism and the Third World.” In Race, Gender, and Culture in International Relations, pp. 155-179. Routledge, 2018.
|
| Week 6 |
Paris School and Security Studies
Bigo, Didier. ”International political sociology.” In Security Studies, pp. 140-154. Routledge, 2008.
Gricius, G. Whose anxiety? What practices? The Paris School and ontological security studies. Int Polit 61, 322–342 (2024). https://doi.org/10.1057/s41311-023-00543-8
Security Research Database: https://security-research-map.eu/
|
| Week 7 |
(mid-term assignment) Choose a sample of people around (8-10). Ask them following questions:
1) “What threatens them most”?
2) “Why this is the immediate threat for them?
3) “Do they think it can be addressed? And who they want to address it”?
選擇周圍約8至10人作為樣本,向他們提出以下問題:
1) 「什麼對他們構成最大威脅?」
2) 「為何此威脅對他們具有迫切性?」
3) 「他們認為此威脅能否被解決?若能,希望由誰來解決?」
Use this new data and the discussed frameworks in the class to prepare a reflection PPT. (運用這些新資料與課堂中討論的框架,準備一份反思簡報。)
|
| Week 8 |
Guest Lecture Sahand Faez “Iran Sanctions Debate: Whose security is at the center here?” |
| Week 9 |
Environment Security: Climate Change and Southeast Asia
Elliott, Lorraine. Climate change and migration in Southeast Asia: Responding to a new human security challenge. S. Rajaratnam School of International Studies., 2022.
Howe, B. (2019). Cyclone Nargis in Myanmar: The Perfect Storm? In: Hernandez, C., Kim, E., Mine, Y., Xiao, R. (eds) Human Security and Cross-Border Cooperation in East Asia. Security, Development and Human Rights in East Asia. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-95240-6_6
Caballero-Anthony, Mely, Paul Teng, Goh Tian, Maxim Shrestha, and Jonatan Lassa. ”Linking climate change adaptation and food security in ASEAN.” Economic Research Institute for ASEAN and East Asia (ERIA) (2015).
|
| Week 10 |
Terrorism and Indian State Security
Ogden, C. (2013). Tracing the Pakistan–Terrorism Nexus in Indian Security Perspectives: From 1947 to 26/11. India Quarterly: A Journal of International Affairs, 69(1), 35-50. https://doi.org/10.1177/0974928412472102
Chandra, V. (2020). India’s Counter-Terrorism Diplomacy at the United Nations: Progress and Problems. India Quarterly: A Journal of International Affairs, 76(1), 40
Feyyaz, M., & Husnain Bari, S. (2024). A critical analysis of India and Pakistan’s terrorism discourse in the context of geopolitics and imperialism. Critical Studies on Terrorism, 17(3), 606–630. https://doi.org/10.1080/17539153.2024.2360274
|
| Week 11 |
Illicit Drugs and Insecurities
Thoson, Nicholas, and Patrick Meehan. ”Understanding the drugs policy landscape in Myanmar.” (2021).
Meehan, Patrick, Mandy Sadan, Sai Aung Hla, Sai Kham Phu, and Nang Muai Oo. ”Young people’s everyday pathways into drug harms in Shan State, Myanmar.” Third World Quarterly 43, no. 11 (2022): 2712-2730.
Banerjee, Sreeparna. ”From poppy fields to black markets: Understanding the drug trade across India and Myanmar.” In From poppy fields to black markets: understanding the drug trade across India and Myanmar: Banerjee, Sreeparna. New Delhi, India: ORF, Observer Research Foundation, 2024. |
| Week 12 |
Misgovernance and Security
Hassan, Ahmed Mohamed. ”The impact of corruption on the human security of societies in transition (Iraq case study since 2003).” Review of Economics and Political Science 9, no. 3 (2024): 212-232.
Barthwal-Datta, Monika. Understanding security practices in south asia. Taylor & Francis, 2012. Chapter 3
Nundy, Samiran, Keshav Desiraju, and Sanjay Nagral. Healers or predators?: Healthcare corruption in India. Oxford University Press, 2018. Chapter 4
|
| Week 13 |
Borders, Mobility and Security Narratives
Part I
Plümmer, Franziska. ”Chinese border security: historical and contemporary threat perceptions at China’s borders.” In Handbook on Migration to China, pp. 307-321. Edward Elgar Publishing, 2025.
Elena Barabantseva, When Borders Lie Within: Ethnic Marriages and Illegality on the Sino-Vietnamese Border, International Political Sociology, Volume 9, Issue 4, December 2015, Pages 352–368
Part II
Sarkar, Swagato. ”The illicit economy of power: smuggling, trafficking and the securitization of the Indo-Bangladesh borderland.” Dialectical Anthropology 41, no. 2 (2017): 185-199.
Liang, Xiaochen. ”Marriage trafficking: Demand, exploitation, and conducive contexts—A study in China–Vietnam border areas.” Violence against women 29, no. 3-4 (2023): 548-579.
|
| Week 14 |
Networks Society and Security Threats
Arquilla, John. Bitskrieg: the new challenge of cyberwarfare. John Wiley & Sons, 2021. Chapter 1
Ad’ha Aljunied, Syed Mohammed. ”The securitization of cyberspace governance in Singapore.” Asian Security 16, no. 3 (2020): 343-362.
Slupska, Julia. ”Safe at home: Towards a feminist critique of cybersecurity.” St Antony’s International Review 15, no. 1 (2019): 83-100.
|
| Week 15 |
Critical Security Studies and Methods
Salter, Mark B., and Can E. Mutlu. ”Research methods in critical security studies.” New York, NY (2013).
Chapter 10: Listening to Migrants Stories
Chapter 33: Pictoral texts
|
| Week 16 |
Final Assignment
|
self-directed learning |
   01.Participation in professional forums, lectures, and corporate sharing sessions related to industry-government-academia-research exchange activities.    03.Preparing presentations or reports related to industry and academia.
|
|