<<

Paul Roe Department of ‘Critical Studies’ (MA: Winter Semester, 2019-20)

This course is concerned with how the so-called ‘critical turn’ in International Relations has been reflected specifically in thinking about Strategy and Security. ‘Critical ’ is, in its broadest sense, a collection of approaches all united by a profound dissatisfaction with so-called ‘traditional’ security studies. Critical Security Studies seeks to question, though not always completely do away with, the foundations upon which the dominant state-centrism and military-centrism is built. This course deals with a number of these approaches: from the ‘conventional’ constructivists, through the ‘Copenhagen’ and ‘Aberystwyth’, or ‘Welsh’, Schools, to more ‘critical’ constructivist positions. In doing so, not only does it seek to illuminate the main theoretical assumptions underpinning each of the various approaches, but also to explore just how they are ‘critical’; that is, in what ways they challenge traditional security studies, and in what ways they compare and contrast with each other. While the course is mainly theoretical in its orientation, much emphasis is also placed on empirical application; how, and to what kind of cases, each of the approaches can be profitably applied.

Teaching Method For this course, there are no lectures. Instead, students will participate in seminars where they are expected to form their own opinions through ‘critical’ evaluation of the readings. For each seminar, there will be one or two key texts (which are in the course reader). Seminar discussion will be structured around a short presentation of the text(s), in which students will summarise and critically evaluate the readings. Seminar discussion therefore depends on serious preparation: it is crucial that students do all of the reading required and come into the seminar fully prepared to actively take part in the discussion. For the topics discussed, there is not necessarily a right answer. What is important is to focus on the way that people think.

Method of Assessment Each student will be assessed through a combination of seminar contribution, oral presentation, and written work. There will be one oral, in-class presentation (20% of the final grade). In addition, two written pieces of work are required; one Literature Review (30%) (see guidelines, below), and one Research Paper (40%) (the requirements for which will be discussed in class). The final 10% of the grade is given to seminar attendance and contribution. The length of the Literature Review is 2,500 words (+/-10%). While the Research Paper will be 4,500 words (+/-10%). The Literature Review is due at the end of week 7. The deadline for the Research Paper will be established sometime during the second half of the semester. The oral presentation and the Literature Review should be based on different key texts. The Research Paper, however, may be written on the same subject matter as the Literature Review.

Guidelines for the Literature Review The purpose of the literature review is essentially two-fold: one, to situate the chosen key text within the wider debate(s); and two, to make a critique of the key text informed by the existing literature. Any text can be situated in a wider debate: its theoretical/conceptual standpoint and the more specific arguments that derive from that standpoint can only be properly understood when set against other works. Together, these texts collectively constitute a written conversation. Some texts may exemplify a particular debate; others might be read as belonging to several, overlapping written conversations. The literature review thus demands that students not only identify the general context within which the key text can be situated, but are also explicit as to the specific nature of the debate according to which they will structure their critique. In terms of structure, one or two introductory paragraphs should be devoted to the above task (context and debate). Following on from this, the main body should then put in place a coherent and sustained, critical evaluation of the key text. Some concluding paragraph is also warranted, although the exact content of that paragraph is dependent on the purpose of the critique. The main points of the critical evaluation should derive explicitly from the wider literature. Given the length of the literature review; just 2,500 words, it is reasonable to expect that no more than 4-5 other works are utilized, likewise informing no more than just a couple of related critical points. Week 1/Seminar 1. Introduction

Week 1/Seminar 2. No Class

Week 2/Seminar 3. Third Generation Strategic Culture: Global Norms Key Text: Nina Tannenwald, ‘Stigmatizing the Bomb: Origins of the Nuclear Taboo’, , vol.29, no.4, 2005.

Week 2/Seminar 4. Third Generation Strategic Culture: Institutional Culture Key Text: Andrew Bell, ‘Military Culture and Restraint Towards Civilians in : Examining the Ugandan Civil ’, Security Studies, vol.25, no.3, 2016. Further Reading for 2/3 & 2/4: Theo Farrell, ‘Non-Nuclear Use: Constructing a History’; Lynn Eden, ‘The Contingent Taboo’; Carol Atkinson, ‘Using Nuclear Weapons’; T.V. Paul, ‘Taboo or Tradition?...’; William Walker, ‘The Absence of a Taboo on the Possession of Nuclear Weapons’, Review of International Studies, vol.36, no.4, 2010. Jeffrey Legro, ‘Military Culture and Inadvertent Escalation in World War II’, International Security, vol.18, no.4, 1994. Tannenwald, The Nuclear Taboo: The U.S. and the Non-Use of Weapons Since 1945 (Cambridge: CUP, 2007). Peter Katzenstein (ed.), The Culture of (New York: Columbia University Press, 1996), Chapter 4: Richard Price & Tannenwald, ‘Norms and Deterrence: The Nuclear and Chemical Weapons Taboos’; Chapter 6: Elizabeth Kier, ‘Culture and French Military Doctrine Before World War II’; Chapter 7: Alistair Iain Johnston, ‘Cultural Realism and Strategy in Maoist China’. Theo Farrell & Helene Lambert, ‘Courting Controversy: International Law, National Norms and American Nuclear Use’, Review of International Studies, vol.27, no.3, 2001. Farrell, ‘Transnational Norms and Military Development: Constructing Ireland’s Professional Army’, European Journal of International Relations, vol.7, no.1, 2001. Farrell, ‘World Culture and Military Power’, Security Studies, vol.14, no.3, 2005. Emily Goldman, ‘Cultural Foundations of Military Diffusion’, Review of International Studies, vol.32, no.1, 2006. Edward Lock, ‘Refining Strategic Culture: Return of the Second Generation’, Review of International Studies, vol.36, no.3, 2010

Week 3/Seminar 5. No Class

Week 3/Seminar 6. Key Text: Ole Waever et al., Identity, Migration and the New Security Agenda in Europe (London: Pinter, 1993), Chapter 2: Waever, ‘Societal Security: The Concept’. Further Reading: Waever et al., Identity, Migration, Chapter 3: Buzan, ‘Societal Security, State Security and Internationalisation’. Bill McSweeney, ‘Identity and Security: Buzan and the Copenhagen School’, Review of International Studies, vol.22, no.1, 1996. Buzan & Waever, ‘Slippery? Contradictory? Sociologically Untenable? The Copenhagen School Replies’, Review of International Studies, vol.23, no.2, 1997. Jef Huysmans, ‘Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda’, European journal of International Relations, vol.4, no.4, 1998. Tobias Theiler, ‘Societal Security and Social Psychology’, Review of International Studies, vol.29, no.2, 2003. Collins (ed.), Contemporary Security Studies, Chapter 10: Roe, ‘Societal Security’.

Week 4/Seminar 7. Security and Contestation: Identity and Symbolic Power Key Text: Ronald Krebs & Jennifer Lobasz, ‘Fixing the Meaning of 9/11: Hegemony, Coercion and the Road to War in Iraq, Security Studies, vol.16, no.3, 2007. Further Reading: Krebs & Patrick Jackson, ‘Twisting Tongues and Twisting Arms: The Power of Political Rhetoric’, European Journal of International Relations, vol.13, no.1, 2007. Janice Bially Mattern, ‘The Power Politics of Identity’, European Journal of International Relations, vol.7, no.3, 2001. Jane Cramer, ‘Militarized Patriotisms: Why the U.S. Place of Ideas Failed Before the Iraq War’, Security Studies, vol.16, no.3, 2007. A. Trevor Thrall, ‘A Bear in the Woods? Threat Framing and the Market Place of Ideas’, Security Studies, vol.16, no.3, 2007. Jack Holland, ‘‘When You Think of the Taliban, Think of the Nazis’: Teaching Americans ‘9/11’ in NBC’s The West Wing’, Millennium, vol.40, no.1, 2011. Richard Jackson, Writing the War on Terrorism (Manchester: MUP, 2005). Michael Williams, Culture and Security: Symbolic Power and the Politics of International Security (London: Routledge, 2007).

Week 4/Seminar 8. ‘Second Generation’ Securitization Key Text: Thierry Balzacq, ‘The Three Faces of Securitization: Political Agency, Audience and Context’, European Journal of International Relations, vol.11, no.2, 2005. Further Reading: Adam Cote, ‘Agents Without Agency: Assessing the Role of Audience in Securitization Theory’, Security Dialogue, vol.47, no.6, 2016. Balzacq, Securitization Theory: How Security Problems Emerge and Dissolve (London: Routledge, 2011). Matt McDonald, ‘Securitization and the Construction of Security’, European Journal of International Relations, vol.14, no.4, 2008. Holger Stritzel, ‘Towards a Theory of Securitization: Copenhagen and Beyond’, European Journal of International Relations, vol.13, no.3, 2007. Stritzel, ‘Security, the Translation’, Security Dialogue, vol.42, no.4-5, 2011. Paul Roe, ‘Actor, Audience(s) and Emergency Measures: Securitization and the UK’s Decision to Invade Iraq’, Security Dialogue, vol.39, no.6, 2008.

Week 5/Seminar 9. Contextualising Securitization Key Text: Claire Wilkinson, ‘The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside of Europe?’, Security Dialogue, vol.38, no.1, 2007. Further Reading: Juha Vuori, ‘Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders’, European Journal of International Relations, vol.14, no.1, 2008. Monika Barthwal-Datta, ‘Securitising Threats Without the State: A Case Study of Misgovernance as a Security Threat in Bangladesh’, Review of International Studies, vol.35, no.2, 2009. Nicole Jackson, ‘International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework’, Security Dialogue, vol.37, no.3, 2006. Pinar Bilgin, ‘Politics of Studying Securitization? Copenhagen School in Turkey’, Security Dialogue, vol.42, no.4-5, 2011. Maria Julia Trombetta, ‘ and : Analysing the Discourse’, Cambridge Review of International Affairs, vol.21, no.4, 2008. Shirley Scott, ‘Securitizing Climate Change: International Legal Implications and Obstacles’, Cambridge Review of International Affairs, vol.21, no.4, 2008. Hakan Seckinelgin, Joseph Bigirumwami, & Jill Morris, ‘Securitization of HIV/AIDS in Context: Gendered Vulnerability in Burundi’, Security Dialogue, vol.41, no.5, 2010. Felix Ciuta, ‘Security and the Problem: A Hermeneutical Critique of Securitisation Theory’, Review of International Studies, vol.35, no.2, 2009.

Week 5/Seminar 10. The Ethics of Securitization Key Text: Stefan Elbe, ‘Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security’, International Studies Quarterly, vol.50, no.1, 2006. Further Reading: Floyd, ‘Towards a Consequentialist Evaluation of Security: Bringing Together the Copenhagen and Welsh Schools of Security Studies’, Review of International Studies, vol.37, no.2, 2007. Floyd, Security and the Environment: Securitisation Theory and US Environmental Security Policy (Cambridge: CUP, 2010). Floyd, ‘Can Securitization Theory be used in Normative Analysis: Towards a ‘Just Securitization Theory’, Security Dialogue, vol.42, no.4-5, 2011. Huysmans, ‘Minding Exceptions: The Politics of Insecurity and Liberal Democracy’, Contemporary Political Theory, vol.3, no.3, 2004.

Week 6/Seminar 11. The ‘Paris School’: Securitization as Practice Key Text: Didier Bigo, ‘Security and Immigration: Toward a Critique of the Governmentality of Unease’, Alternatives, vol.27, Special Issue, 2002. Further Reading: Ayse Ceyhan & Anastassia Tsoukala, ‘The Securitization of Migration in Western Societies: Ambivalent Discourses and Policies’, Alternatives, vol.27, Special Issue, 2002. Jef Huysmans, ‘Defining Social Constructivism in Security Studies: The Normative Dilemma of Writing Security’, Alternatives, vol.27, Special Issue, 2002. Huysmans, ‘What’s in an Act: On Security Speech Acts and Little Security Nothings’, Security Dialogue, vol.42, no.4-5, Huysmans, ‘Politics of Exception and Unease: Immigration, Asylum, and Terrorism in Parliamentary Debates in the UK’, Political Studies, vol.56, no.4, 2008. Kelstrup & Williams (ed.), International Relations Theory and the Politics of European Integration (London: Routledge, 2000), Chapter 8: Bigo, ‘When Two Become One: Internal and External Securitisations in Europe’. Philippe Borbeau, ‘Moving Forward Together: Logics of the Securitisation Process’, Millennium, vol.43, no.1, 2014. Christina Boswell, ‘Migration Control in Europe After 9/11: Explaining the Absence of Securitization’, Journal of Common Market Studies, vol.45, no.3, 2007.

Week 6/Seminar 12. Desecuritisation Key Text: , ‘Reconstructing Desecuritization: The Normative-Political in the Copenhagen School and Directions for How to Apply it’, Review of International Studies, vol.38, no.3, 2012. Further Reading: Faye Donnelly, ‘The Queen’s Speech: Desecuritizing the Past, Present, and Future of Anglo-Irish Relations, European Journal of International Relations, vol.?, no.?, 2015. Paul Roe, ‘Securitization and Minority Rights: Conditions of Desecuritization’, Security Dialogue, vol.35, no.3, 2004. Robert Miles & Dietrich Thranhardt (eds.), Migration and European Integration: The Dynamics of Inclusion and Exclusion (London: Pinter, 1995), Chapter 3: Jef Huysmans, ‘Migrants as a Security Problem: Dangers of “Securitizing” Societal Issues’. Jef Huysmans, ‘The Question of the Limit: Desecuritization and the Aesthetics of Horror in Political Realism’, Millennium, vol.27, no.3, 1998. Mark Salter, ‘Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Authority’, Journal of International Relations and Development, vol.11, no.4, 2008. Matti Jutila, ‘Desecuritizing Minority Rights: Against Determinism’, Security Dialogue, vol.37, no.2, 2006. Roe, ‘Reconstructing Identities or Managing Minorities? Desecuritizing Minority Rights: A Response to Jutila’, Security Dialogue, vol.37, no.3, 2006. Kristian Atland, ‘Mikhail Gorbachev, the Murmansk Initiative, and the Desecuritization of Interstate Relations in the Arctic’, Cooperation and Conflict, vol.43, no.3, 2008.

Week 7/Seminar 13. Ontological Security: Social Dependence and Routinisation Key Text: Jennifer Mitzen, ‘Ontological Security in World Politics: State Identity and the Security Dilemma, European Journal of International Relations, vol.12, no.3, 2006.

Week 7/Seminar 14. No Class (Literature Review Preparation)

Week 8/Seminar 15. Ontological Security: Shame. Honour, and Self Narrative Key Text: Brent Steele, ‘‘Ideals That Were Never Really in Our Possession: Torture, Honor and US Identity’, International Relations, vol.22, no.2, 2008. Further Reading (for 7/13 & 8/15): Steele, ‘Making Words Matter: The Asian Tsunami, Darfur, and “Reflexive Discourse” in International Politics’, International Studies Quarterly, vol.51, no.4 2007 Alexander Wendt, ‘The State as Person in International Theory’, Review of International Studies, vol.30, no.2, 2004. Jacob Schiff, ‘‘Real’? As if! Critical Reflections on State Personhood’, Review of International Studies, vol.34, no.3, 2008. Steele, Ontological Security in International Relations: Self-Identity and the IR State (London: Routledge, 2008), Chapter 2, ‘Identity, Morality, and Social Action’; Chapter 3, ‘The Possibilities as Self’. Steele, Organizational Processes and Ontological (in)Security: Torture, the CIA and the ’, Cooperation and Conflict, vol.52, no.1, 2017, Bahar Rumelili, ‘Identity and Desecuritisation’: The Pitfalls of Conflating Ontological Security and Physical Security’, Journal of International Relations and Development, vol.18, no.1, 2013. Ayse Zarakol, ‘Ontological (In)security and State Denial of Historical Crimes: Turkey and Japan’, International Relations, vol.24, no.1, 2010. Huysmans, ‘Security! What do you Mean? From Concept to Thick Signifier’, European Journal of International Relations, vol.4, no.2, 1998. Bill McSweeney, Security, Identity, and Interests: A Sociology of International Relations (Cambridge: CUP, 1999). Catarina Kinnvall, ‘Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security’, Political Psychology, vol.25, no.4, 2004. Kinnvall, ‘Feeling Ontologically (in)Secure: States, Traumas and the Governing of Gendered Spaces’, Cooperation and Conflict, vol.52, no.1, 2017. Steele, ‘Ontological Security and the Power of Self Identity: British Neutrality and the American Civil War’, Review of International Studies, vol.31, no.3, 2005. Mitzen, ‘Anchoring Europe’s Civilizing Identity: Habits, Capabilities and Ontological Security’, Journal of European Public Policy, vol.13, no.2, 2006.

Week 8/Seminar 16. ‘Discourses of Danger’: Security as ‘Socio-Political Organising Principle’ Key Text: David Campbell, Writing Security: United States Foreign Policy and the Politics of Identity (Minneapolis: University of Minnesota Press, 1992), Introduction: ‘On Dangers and Their Interpretation’; Chapter 6: ‘Writing Security’. Further Reading: Bradley Klein, Strategic Studies and World Order (Cambridge: CUP, 1994). Lene Hansen, ‘A Case for Seduction? Evaluating the Poststructuralist Conceptualization of Security’, Cooperation and Conflict, vol.32, no.4, 1997. Krause & Williams (eds.), Critical Security Studies, Chapter 3: R.B.J Walker, ‘The Subject of Security’. Jutta Weldes, Mark Laffey, Hugh Gusterson, & Raymond Duvall (eds.), Cultures of Insecurity (Minneapolis, University of Minnesota Press, 1999), Weldes, et al., ‘Introduction: Constructing Insecurity’.

Week 9/Seminar 17. Risk Key Text: Michael Williams, ‘(In)Security Studies, Reflexive Modernisation and the Risk Society’, Cooperation and Conflict, vol.43, no.1, 2008. Further Reading: William Clapton, ‘Risk in International Relations’, International Relations, vol.25, no.3, 2011. Craig McClean, Alan Patterson & John Williams, ‘Risk Assessment, Policy-Making and the Limits of Knowledge: The Precautionary Principle in International Relations’, International Relations, vol.23, no.4, 2010. Mikkel Vedby Rasmussen, ‘‘It Sounds Like a Riddle’: Security Studies, the War on Terror and Risk’, Millennium, vol.33, no.2, 2004. Rasmussen ‘Reflexive Security: NATO and International Risk Society’, Millennium, vol.30, no.2, 2001. Rasmussen, ‘‘A Parallel Globalization of Terror’: 9-11, Security and Globalization’, Cooperation and Conflict, vol.37, no.3, 2002 Karen Lund Petersen, ‘Risk Analysis: A Field Within Security Studies?’, European Journal of International Relations, vol.18, no.4, 2011. Olaf Corry, ‘Securitization and ‘Riskification’: Second Order Security and the Politics of Climate Change’, Millennium, vol.40, no.2, 2012. Mitzen & Randall Schweller, ‘Knowing the Unknown Unknowns: Misplaced Certainty and the Onset of War’, Security Studies, vol.20, no.2, 2011.

Week 9/Seminar 18. Security as Emancipation Key Text: Joao Nunes, ‘Reclaiming the Political: Emancipation and Critique in Security Studies’, Security Dialogue, vol.43, no.4, 2012. Further Reading: Mike Bourne & Dan Bulley, ‘Securing the Human in Critical Security Studies: The Insecurity of a Secure Ethics’, European Security, vol.20, no.3, 2011. Ken Booth, ‘Anchored in Tahrir Square’, European Security, vol.20, no.3, 2011. Booth, ‘Security and Emancipation’, Review of International Studies, vol.17, no.4, 1991. Booth, Theory of World Security (Cambridge: CUP, 2007). Booth, ‘Human Wrongs and International Relations’, International Affairs, vol.71, no.1, 1995. Williams & Kaith Krause (eds.), Critical Security Studies, Chapter 4: Booth, ‘Security and Self: Reflections of a Fallen Realist; Chapter 11: Booth & Peter Vale, ‘Critical Security Studies and Regional Insecurity: The Case of Southern Africa’. Richard Wyn Jones, Security, Strategy, and Critical Theory (Boulder: Lynne Rienner, 1999), Chapter 6: ‘Emancipation: Reconceptualizing Practice’. Booth (ed.) Critical Security Studies and World Politics (London: Lynne Rienner, 2005), Chapter 9: Richard Wyn Jones, ‘On Emancipation: Necessity, Capacity, and Concrete Utopias’; Chapter 11: Booth, ‘Beyond Critical Security Studies’. Mark Neufeld, ‘Pitfalls of Emancipation and Discourses of Security: Reflections on Canada’s ‘Security With a Human Face’’, International Relations, vol.18, no.1, 2004. Christopher Browning & Matt McDonald, ‘The Future of Critical Security Studies: Ethics and the Politics of Security’, European Journal of International Relations, vol.19, no.2, 2013.

Week 10/Seminar 19. Marginalisations, Nothings, Images Key Text: Hansen, ‘The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School’, Millennium, vol.29, no.2, 2000. Further Reading: Brandon Hamber, Paddy Hillyard, Amy Maguire, Monika McWilliams, Gillian Robinson, David Russell, & Margaret Ward, ‘Discourses in Transition: Re-imagining Women’s Insecurity’, International Relations, vol.20, no.4, 2006. Hansen, ‘The Politics of Securitization and the Muhammad Cartoon Crisis: A Post-Structuralist Perspective’, Security Dialogue, vol.42, no.4-5, 2011. Hansen, ‘Theorizing the Image for Security Studies: Visual Securitization and the Muhammad Cartoon Crisis’, European Journal of International Relations, vol.17, no.1, 2011. Huysmans, ‘What is in an Act? On Security Speech Acts and Little Security Nothings’, Security Dialogue, vol.42, no.4-4, 2011. Vibeke Schou Tjalve, ‘Designing (de)Security: European Exceptionalism, Atlantic Republicanism and the ‘Public Sphere’, Security Dialogue, vol.42, no.4-5, 2011. Campbell, ‘Cultural Governance and Pictorial Resistance: Reflections on the Imaging of War, Review of International Studies, vol.29, no.2, 2003. Stuart Croft, ‘Images and Imaginings of Security’; James Gow, ‘Strategic Pedagogy and Pedagogic Strategy’; Andrew Hoskins, ‘Temporality, Proximity, and Security: Terror in a Media- Drenched Age’, International Relations, vol.20, no.4, 2006. Michael Williams, ‘Words, Images, Enemies: Securitization and International Politics’, International Studies Quarterly, vol.47, no.4, 2003.

Week 10/Seminar 20. (More) Marginalisations… Speaking for and Silencing Key Text: Christina Masters, ‘Femina Sacra: The ‘War on Terror’, Women and the Feminine’, Security Dialogue, vol.40, no.1, 2009. Further Reading: Laura Sjoberg & Caron E. Gentry, ‘Reduced to Bad Sex: Narratives of Violent Women from the Bible to the War on Terror’, International Relations, vol.22, no.1, 2008. Veronique Pin-Fat, ‘The Scripting of Private Jessica Lynch: Biopolitics, Gender, and the “Feminization” of the U.S. Military’, Alternatives, vol.30, no.1, 2008. Deepa Kumar, ‘War Propaganda and the (Ab)Uses of Women: Media Constructions of the Jessica Lynch Story’, Feminist Media Studies, vol.4, no.3, 2004. Sjoberg, ‘Agency, Militarized Femininity and Enemy Others: Observations from the War in Iraq’, International Feminist Journal of Politics, vol., no.1, 2007. Cynthia Nantais & Martha F. Lee, ‘Women in the United States Military: Protectors or Protected? The Case of Prisoner of War Melissa Rathbun-Nealy’, Journal of Gender Studies, vol.8, no.2, 1999. Enloe, The Morning After, Chapter 7: ‘The Politics of Constructing the American Woman Soldier’.

Week 11/Seminar 21. ‘Positive-’, ‘Negative-’ and ‘Anti-Security’ Key Text: Jonna Nyman, ‘What is the Value of Security? Contextualising the Negative/Positive Debate’, Review of International Studies, vol.42, no.5, 2016. Further Reading: Claudia Aradau, ‘Security and the Democratic Scene: Desecuritization and Emancipation’, Journal of International Relations and Development, vol.7, no.4, 2004. Rita Taureck (later Floyd), ‘Securitization Theory and Securitization Studies’; Andreas Behnke, ‘No Way Out: Desecuritization, Emancipation and the Eternal Return of the Political – A Reply to Aradau’; Hayward Alker, ‘On Securitization Politics as Contexted Texts and Talks’; Claudia Aradau, ‘Limits of Security, Limits of Politics? A Response’, Journal of International Relations and Development, vol.9, no.1, 2006. Jef Huysmans, ‘Minding Exceptions: The Politics of Insecurity and Liberal Democracy’, Contemporary Political Theory, vol.3, no.3, 2004. David Chandler, ‘The Revival of Carl Schmitt in International Relations: The Last Refuge of Critical Theorists?’, Millennium, vol.37, no.1, 2008. Ole Waever, ‘Politics, Security, Theory’, Security Dialogue, vol.42, no.4-5, 2011. Mark Neoclous, ‘The Problem with Normality: Taking Exception to Permanent Emergency’, Alternatives, vol.31, no.2, 2006. Gunhild Hoogensen Gjorv, ‘Security by any Other Name: Negative Security, Positive Security, and a Multi-Actor Security Approach’, Review of International Studies, vol.38, no.4, 2012. Paul Roe, ‘The ‘Value’ of Positive Security’, Review of International Studies, vol.34, no.4, 2008. Roe, ‘Is Securitization a ‘Negative’ Concept? Revisiting the Normative Debate over Normal versus Extraordinary Politics’, Security Dialogue, vol.43, no.3, 2012. Roe, ‘Gender and Positive Security’, International Relations, vol.28, no.1, 2014. Bill McSweeney, Security, Identity, and Interests: A Sociology of International Relations (Cambridge, CUP, 1999).

Week 11/Seminar 22. The Non-Human Referent: Beyond Critical Security Studies? Key Text: Audra Mitchell, ‘Only Human? A Worldly Approach to Security’, Security Dialogue, vol.45, no.1, 2014.

Week 12/Seminar 23. Conclusions

Week 12/Seminar 24. No Class