Objectives The objectives of this course are both subject-specific and general. General objectives include the development of oral, written and research skills as the course requires students to become able to read, absorb and critically assess IR 616 a significant amount of complex (and at times contradictory) material. The Individual, National and Global Security subject-specific objectives include developing students’ • understanding of contending approaches to the study of Spring 2006 security; • knowledge and understanding of the key literature in the discipline; • knowledge and understanding of Security Studies Pınar Bilgin beyond their immediate area of interest; + A313 • ability to analyse contemporary security policies and (290) 2164 practices from a conceptual perspective;  [email protected] • ability to assess the implications of adopting critical  http://www.bilkent.edu.tr/~pbilgin approaches for the study and practices of security  Monday 16:40-17:30, Tuesday 10:40-11:30 around the world. and by appointment

Teaching Aims Despite the prevalence of state-based ('') approaches to Since the course is taught as a post-graduate level seminar, the onus is on security during the Cold War, alternative ways of thinking about security— you to read widely around the topics. The seminars on occasions may include focusing on the individual and society—also developed during this time period. mini lectures designed to introduce and/or contextualise that week’s topic, but In the post-Cold War era the primacy of state in considerations of security has you will be doing most of the work. My role will be to provide a basic overview come under increasing challenge from a variety of perspectives. This course is of that week’s topic, offer you contending perspectives on the issues designed to provide a critical overview of (1) state-based approaches to concerned, and seek to generate a discussion structured around a set of security in an increasingly globalised world; (2) alternative approaches to questions. The aim is to encourage you to think independently and critically security that focus on individual, societal and/or global security. The strengths whilst remaining firmly grounded in the knowledge provided by the and weaknesses of these approaches will be highlighted through a readings. consideration of cases such as Turkey's national security, and the role of security culture in Turkey-EU relations, regional security in the The following list is by no means exhaustive. It should rather be viewed as a Middle East and human security in the developing world. representative sample of the existing literature. In the pages that follow, you will find a list of required and recommended readings for each week. Our discussions will be based mostly on the required readings. The lists of recommended texts are there to provide a broader context as well as more detail, which may be useful as a starting point and reference for written

1 2 assignments or future studies. You are advised to do your readings in the Assessment 1 order they are presented. 30% of your assessment will be based on in-class participation. This will

take the form of participating in class discussions, which will be structured What you should remember at all times is that good discussions depend on around questions that will be provided in advance (i.e. questions that you will serious preparation by students. You are strongly encouraged to read the have time to prepare for). You will be expected to demonstrate evidence of texts carefully and prepare written answers to the questions to ensure having read and thought about that week’s topic. thorough preparation especially in the first few weeks of the course when you are less experienced in participating in seminars. It is critical that you do all 70% of your assessment will be based on a research project. In this your readings and come in ready to take active part in class discussions. assignment, you are expected to choose one country and critically analyse its This is critical not only for your own intellectual development but also because ‘national security’ conception. The country of your choice, which cannot be participation counts towards 40% of your overall grade. your country of origin, has to be approved by me before you start the research process. When analysing your country of choice, you are expected to make Please be reminded that you will only be in a position to do well in your use of the conceptual/theoretical material covered in class—i.e. presenting a assignments if you have attended the classes and read the literature (all of the descriptive/historical analysis of the case is not acceptable. When grading required texts plus some of the recommended ones). Coming to the classes your paper, I will be looking for evidence of grasp of the literature covered in prepared is necessary not only because this constitutes a part of your class as well as case study material. assessment, but also because this will help you understand the course In order to be able to provide maximum guidance to you throughout the material much better so that you would be in a very strong position to do well research process, I have broken down the project into three steps: in your exams/assignments. 1. An annotated bibliography (20% of the overall grade) due by April 3, 2006, 17:30. In this assignment, you are expected to provide You are required to attend all the classes (in accordance with the University short (maximum one paragraph) descriptions of the sources that you regulations). If you cannot attend please let me know beforehand, or contact are planning to use in your project (including encyclopaedia articles, me (immediately) afterwards to provide a ‘legitimate’ excuse for your absence. reference books, bibliographies, books, academic articles, book Attendance will be taken and absences will be noted. chapters, policy articles, popular magazines, web pages as well as official documents). 2. An annotated outline (20% of the overall grade) due by April 28, 2006, 17:30. In this assignment, you are expected to prepare an outline of your research project (preliminary argument, sub- arguments, etc.) annotated with the sources you are planning to use to support those arguments. 3. The research paper itself (30% of the overall grade). This paper

1 should not be longer than 2000 words and is due by May 12, 2006, Please note that this does not apply to the recommended texts which are listed in alphabetical order. 17:30.

3 4 WEEK I Introduction In-class discussions

What I am looking for WEEK II

Old and New Thinking About Security

• Evidence of active listening Required readings • Evidence of reading and independent thinking • Ken Booth, ‘Security and Self: Reflections of a Fallen Realist,’ in Critical Security Studies: Concepts and Cases, Keith Krause and • Gradual development of seminar skills Michael Williams, eds. (London: UCL Press, 1997) 83-119. • Keith Krause and Michael Williams, ‘From Strategy to Security: Foundations of Critical Security Studies’, in Critical Security Studies: I will be using the following criteria to assess your performance Concepts and Cases, Keith Krause and Michael Williams, eds. (London: UCL Press, 1997) 33-59. • Stephen Walt, 'The Renaissance of Security Studies,' International Evidence of having read the required material Studies Quarterly 25 (1991) 211-239. Relevant contribution Concern not to dominate the discussion Avoidance of anectodal / irrelevant accounts Recommended readings Encouragement / enablement of others’ contributions • Ken Booth and Eric Herring, ‘Strategic Studies or Security Studies,’ Respectful treatment of others’ beliefs, values and opinions in Keyguide to Information Sources in Strategic Studies (London: Evidence of ability to identify and evaluate different theoretical positions, bias, and Mansell, 1993). orientation • Bernard Brodie, 'Strategy as a Science,' World Politics 1:4 (1949) Confident handling of critical concepts and analytical terms 467-488. Ability to respond effectively to constructive feedback • Hedley Bull, 'Strategic Studies and Its Critics,’ World Politics 20:4 (July 1968) 593-605. • James Der Derian, ‘The Value of Security: Hobbes, Marx, Nietzsche and Baudrillard,’ in On Security, R.D. Lipscutz, ed. (New York: Columbia University Press, 1995) 24-45. • Lawrence Freedman, 'Strategic Studies,' in International Relations: British and American Perspectives, Steve Smith, ed. (Oxford: Basil Blackwell, 1985). • John Garnett, ‘Strategic Studies and its Assumptions,' in Contemporary Strategy, 2nd rev. and enl. ed., John Baylis et al, vol.I (New York: Holmes and Meier, 1987) 3-29. • Colin Gray, 'Clausewitz Rules, OK? The Future is the Past—with GPS,' in The Interregnum, Michael Cox, Ken Booth and Tim Dunne, eds. (Cambridge: Cambridge University Press, 1999) 161-182. • Colin Gray, 'New Directions for Strategic Studies? How Can Theory Help Practice?' Security Studies 1:4 (1992) 610-635. • Bradley S. Klein, Strategic Studies and World Order: The Global Politics of Deterrence (Cambridge: Cambridge University Press, 1994). • Joseph S. Nye, Jr. And Sean M. Mynn-Jones, ‘International Security Studies: A Report of a Conference on the State of the Field,’ International Security, 12:4 (1988) 5-27.

5 6 WEEK III Individual and/or National Security WEEK IV Securitization Theory

Required readings • , People, States and Fear: An Agenda for International Required readings Security Studies in the Post-Cold War Era (New York: Harvester • Ole Wæver, 'Securitization and Desecuritization,' in On Security, Wheatsheaf, 1991) 35-111. Ronnie D. Lipschutz, ed. (NY: Colombia University Press, 1995) 46- • Ken Booth, 'Security and Emancipation,' Review of International 86. ♣ Studies 17 (1991) 313-326.♣ • Michael Williams, ‘Words, Images, Enemies: Securitization and International Politics,’ International Studies Quarterly 47 (2003) 511- 531. Recommended readings • Pınar Bilgin, ‘Individual and Societal Dimensions of Security’, International Studies Review 5 (2003) 203-222. Recommended readings • Ken Booth, ‘Human Wrongs and International Relations,’ • Didier Bigo, ‘Security and Immigration: Toward a Critique of the International Affairs 71:1 (1995) 103-126. Governmentality of Unease,’ Alternatives 27 (2002) 63-92. • Brian L. Job, ‘The Insecurity Dilemma: National, Regime, and State • Didier Bigo, ‘When two Become One: Internal and External Securities in the Third World,’ in The Insecurity Dilemma: National Securitisations on Europe,’ in M. Kelstrup and M.C. Williams, eds. Security of Third World States, Brian L. Job, ed. (Boulder, CO: International Relations Theory and the Politics of European Lynne Rienner, 1992) 11-35. Integration (London: Routledge, 2000) 171-204. • Steve Smith, 'Mature Anarchy, Strong States and Security,' Arms • Helga Haftendorn, 'The Security Puzzle: Theory-Building and Control 12:2 (1991) 325-339. Discipline-Building in International Security,' International Studies • Georg Sørensen, 'Individual Security and National Security,' Quarterly 35:1 (1991) 3-17. Security Dialogue 27:4 (1996) 371-386. • Jef Huymans, ‘The European Union and the Securitization of • Richard Wyn Jones, 'Travel Without Maps: Thinking About Security Migration,’ Journal of Market Studies 38:5 (2000) 751-777. After the Cold War,' in Security Issues in the Post-Cold War, M. • Jef Huysmans, ‘Migrants as a Security Problem: Dangers of Jane Davis, ed. (Cheltenham: Edward Elgar) 196-218. “Securitizing” Societal Issues,’ Migration and European Integration: The Dynamics of Inclusion and Exclusion, Robert Miles and Dietrich Thränhardt, eds. (London: Pinter, 1995) 53-72. • Jef Huysmans, ‘Defining Social Constructivism in Security Studies: The Nortmative Dilemma of Writing Security,’ Alternatives 27 (2002) 41-62. • Jessica Tuchman Mathews, 'Redefining Security,' Foreign Affairs 68:2 (1989) 162-177. • Richard H. Ullman, 'Redefining Security,' International Security 8:1 (1983) 129-153. • Simon Dalby, ‘Contesting an Essential Concept: Reading the Dilemmas in Contemporary Security Discourse’, in Critical Security Studies: Concepts and Cases, Keith Krause and Michael Williams, eds. (London: UCL Press, 1997) 3-31.

♣ ♣ Photocopied material Photocopied material

7 8

WEEK V What is ‘National Security’? WEEK VI Societal Security

Required readings Required readings • Barry Buzan, Ole Wæver and Jaap de Wilde, Security: A New • Ole Wæver, Barry Buzan, Morten Kelstrup and Pierre Lemaitre, Framework for Analysis (Boulder, CO: Lynne Rienner, 1998) 21-47. Identity, Migration and the New Security Agenda in Europe (London: • Pinar Bilgin, Regional Security in the Middle East: A Critical Pinter Publishers, 1993) 1-40, 93-109.♣ Perspective (London: Routledge, 2005) 16-63. • Bill McSweeney, 'Identity and Security: Buzan and the Copenhagen School,' Review of International Studies 22:1 (1996) 82-93. • Barry Buzan and Ole Wæver, 'Slippery, Contradictory? Recommended readings Sociologically Untenable? The Copenhagen School Replies,' • Amitav Acharya, ‘Human Security: East versus West,’ International Review of International Studies 23:2 (1997) 241-250. Journal 56:3 (2001) 442-460. • William Bain, The Tyranny of Benevolence: National Security, Recommended readings Human Security and the Practice of Statecraft,’ Global Society 15:3 • Barry Buzan, Ole Wæver and Jaap de Wilde, Security: A New (2001) Framework for Analysis (Boulder, CO: Lynne Rienner, 1998). • Pinar Bilgin, ‘Beyond Statism in Security Studies? Human Agency • Bill McSweeney, 'Durkheim and the Copenhagen School: A and Security in the Middle East,’ Review of International Affairs 2:1 Response to Buzan and Waever,' Review of International Studies (2002) 100-118. 24:1 (1998) 137-140. • Yuen Foong Khong, ‘Human Security: A Shotgun Approach to • Bill McSweeney, Security, Identity and Interests: A Sociology of Human Misery? Global Governance 7 (2001) 231-236. International Relations (Cambridge: Cambridge University Press, • Roland Paris, ‘Human Security: Paradigm Shift or Hot Air?’ 1999). International Security 26:2 (2001) 87-102. • Michael C. Williams, ‘Identity and the Politics of Security,’ European • Georg Sørensen, 'Individual Security and National Security,' Journal of International Relations 4:2 (1998) 204-225. Security Dialogue 27:4 (1996) 371-386. • Richard Wyn Jones, 'Travel Without Maps: Thinking About Security • Ken Booth, ‘Nuclearism, Human Rights and Constructions of After the Cold War,' in Security Issues in the Post-Cold War, M. Security,’ International Journal of Human Rights 3:2 (1999) 1-24. Jane Davis, ed. (Cheltenham: Edward Elgar, 1995) 196-218. • Larry A. Swatuk and Peter Vale, ‘Why Democracy is Not Enough: • Morten Kelstrup, ‘Globalisation and Societal Insecurity: The Southern Africa and Human Security in the twenty-first Century,’ Securitisation of Terrorism and Competing Strategies for Global Alternatives 24 (1999) 361-389. Governance,’ in Contemporary Security Analysis and Copenhagen • United Nations Development Program, Human Deveopment Report Peace Research, Stefano Guzzini & Dietrich Jung, eds. (London: 1994 (New York: Oxford University Press, 1994). Routledge, 2004) 106-116. • Arnold Wolfers, 'National Security as an Ambiguous Symbol,' in Discord and Collaboration: Essays on International Politics, Arnold Wolfers, (Baltimore: The Johns Hopkins University Press, 1962) 147-204. • Richard Wyn Jones, 'Travel Without Maps: Thinking About Security After the Cold War,' in Security Issues in the Post-Cold War, M. Jane Davis ed. (Cheltenham: Edward Elgar,1995) 196-218.

♣ Photocopied material

9 10 WEEK VIII Reading Week WEEK VII

In/security in a Globalising World

Required readings

• Jean-Marie Guéhenno, ‘The Impact of Globalisation on Strategy,’

Survival 40:4 (1998-99) 5-19. WEEK IX • Tarak Barkawi, Globalization and War (Lanham, MD: Rowman & ♣ Security in the Developing World Littlefield, 2006). Required readings Recommended readings • Mohammed Ayoob, ‘Defining Security: A Subaltern Realist • Ulrich Beck, ‘The Silence of Words: On Terror and War,’ Security Perspective,’ in Critical Security Studies: Concepts and Cases, Keith Dialogue 34:3 (2003) 255-267. Krause and Michael Williams, eds. (London: UCL Press, 1997) 121- • Mikkel Vedby Rasmussen, ‘”A Parallel Globalization of Terror”: 9-11, 46. Security and Globalization,’ Cooperation and Conflict 37:3 (2002) • Brian L. Job, ‘The Insecurity Dilemma: National, Regime and State 323-349. Securities in the Third World,’ in The Insecurity Dilemma: National • Shlomo Griner, ‘Living in a World Risk Society: A Reply yo Mikkel V. Security of Third World States, Brian L. Job, ed. (Boulder, CO: Rasmussen,’ Millennium 31:1 (2002) 149-160. Lynne Rienner, 1992) 11-35. • Barry Buzan, ‘Security, the State and the “New World Order” and • James M. Goldgeier and Michael McFaul, ‘A Tale of Two Worlds: Beyond,’ in R.D.Lipschutz, ed. On Security (New York: Columbia Core and Periphery in the Post-Cold War Era,’ International University Press, 1995) 187-211. Organization 46:2 (1992) 469-491. • Stanley Hoffmann, ‘Clash of Globalizations,’ Foreign Affairs 81:4 (2002) Recommended readings • Ian Clark, ‘The Security State,’ in Globalization and International • Amitav Acharya, ‘The Periphery as the Core: The Third World and Relations Theory (Oxford: Oxford University Press, 1999) 107-126. Security Studies,’ in Critical Security Studies: Concepts and Cases, • Ian Clark, The Post-Cold War Order: The Spoils of Peace (Oxford: Keith Krause and Michael Williams, eds. (London: UCL Press, 1997) Oxford University Press, 2001) esp. pp. 139-163. 299-327. • David Held and Anthony McGrew, ‘Globalisation and the Liberal • Caroline Thomas, ‘Southern Instability, Security and Western Democratic State,’ Government and Opposition 28:2 (1993) 261- Concepts—On an Unhappy Marriage and the Need for a Divorce,’ in 285. The State and Instability in the South, Caroline Thomas and • Mary Kaldor, New and Old Wars: Organised Violence in a Global Paikiasothy Saravanamuttu, eds. (London: Macmillan, 1989) 174- Era (Cambridge: Polity Press, 1999). 91. • Mary Kaldor, ‘Terrorism as Regressive Globalisation,’ • Caroline Thomas, In Search of Security: The Third World in OpenDemocracy (2003). Available at www.opendemocracy.net International Relations (Brighton: Wheatsheaf, 1987). • Anna Leander, Globalisation and the Eroding State Monopoly of • Mohammed Ayoob, The Third World Security Predicament: State Legitimate Violence, Copenhangen Research Institute Working Making, Regional Conflict and the International System (London: Paper, no.12 (Copengahen: Copri, 2001). Lynne Rienner, 1995). • Kenneth N. Waltz, ‘Globalization and Governance,’ PS Online • Pinar Bilgin, ‘Beyond Statism in Security Studies? Human Agency (December 1999) and Security in the Middle East,’ The Review of International Affairs • Victor D. Cha, ‘Globalization and the Study of International Security,’ 2:1 (2002) 100-118. Journal of Peace Research 37:3 (2000) 391-403. • Yezid Sayigh, ‘Confronting the 1990s: Security in the Developing • Ulrich Beck, ‘The Terrorist Threat: World Risk Society Revisited,’ Countries,’ Adelphi Papers no.251 (1990). Theory, Culture and Society 19:4 (2002) 39-55. • Edward E. Azar and Chung-In Moon, ‘Legitimacy, Integration and Policy Capacity: “Software” Side of Third World National Security,’ in National Security in the Third World: The Management of Internal and External Threats, Edward E. Azar and Chung-In Moon, eds. ♣ (Aldershot: Edward Elgar, 1988) 77-101. Fotocopied material

11 12 WEEK X WEEK XI Regional In/security: The Middle Eastern case Cultures of In/security

Required readings Required readings • Pınar Bilgin, Regional Security in the Middle East: A Critical • John S. Duffield, ‘Political Culture and State Behaviour: Why Perspective (London: Routledge, 2005) 67-159. Germany Confounds Neorealism,’ International Organization 53:4 (1999) 765-803. Recommended readings • Jutta Weldes, Mark Laffey, Hugh Gusterson and Raymond Duvall, • Barry Buzan and Ole Wæver, Regions and Powers: The Structure of ‘Introduction,’ in Cultures of Insecurity: States, Communities and the International Security (Cambridge: Cambridge University Press, Production of Danger, Jutta Weldes, Mark Laffey, Hugh Gusterson 2003). and Raymond Duvall, eds. (Minneapolis: University of Minnesota • Emanuel Adler, ‘Condition(s) of Peace,’ Review of International Press, 1999) 1-33. Studies 24 (December 1998) 165-191. • Jutta Weldes, ‘The Cultural Production of Crises: U.S. Identity and • Emanuel Adler, 'Imagined (Security) Communities: Cognitive Missiles in Cuba,’ in Cultures of Insecurity: States, Communities and Regions in International Relations,' Millennium: Journal of the Production of Danger, Jutta Weldes, Mark Laffey, Hugh International Studies (1997) 249-277. Gusterson and Raymond Duvall, eds. (Minneapolis: University of • Pınar Bilgin, ‘Whose “Middle East”? Geopolitical Inventions and Minnesota Press, 1999) 35-62. Practices of Security,’ International Relations 18:1 (2004) 17-33. • Pınar Bilgin, ‘Alternative Futures for the Middle East,’ Futures 33 (2001) 423-436. Recommended readings • Pınar Bilgin, ‘Beyond Statism in Security Studies? Human Agency • Michael Barnett, ‘Culture, Strategy and Foreign Policy Change: and Security in the Middle East,’ The Review of International Affairs Israel’s Road to Oslo,’ European Journal of International Relations 2:1 (2002) 100-118. 5:1 (1999) 5-36. • Richard Falk, ‘The State: Globalisation and the Middle East,’ in The • Contemporary Security Policy, vol.19, no.1 (1998) special issue on International Relations of the Middle East in the 21st Century: security culture, Keith Krause, ed. Patterns of Continuity and Change, Tareq Ismael, ed. (London: • Michael C. Desch, 'Culture Clash: Assessing the Importance of Ashgate, 2000) 23-42. Ideas in Security Studies,' International Security 23:1 (1998) 141- • Bahgat Korany, ‘National Security in the Arab World: The 170. Persistence of Dualism,’ in The Arab World Today, Dan Tschirgi, ed. • Theo Farrell, ‘Culture and Military Power,’ Review of International (Boulder, CO: Lynne Rienner, 1994) 161-178. Studies 24 (1998) 407-416. • Theo Farrell, ‘Constructivist Security Studies: Portrait of a Research Program,’ International Stdies Review 4:1 (2002) 49-72. • David M. Jones and Mike M. Smith, ‘Noise but no Signal: Strategy, Culture, and the Poverty of Constructivism,’ Studies in Conflict and Terrorism 24 (2001) 485-495. • Peter J. Katzenstein, ed. The Culture of National Security: Norms and Identity in World Politics (New York: Columbia University Press, 1996. • Jeffrey S. Lantis, ‘Strategic Culture and National Security Policy,’ International Studies Review 4:3 (2002) 87-113. • Ido Oren, ‘Is Culture Independent of National Security? How America’s National Security Concerns Shaped ‘Political Culture’ Research,’ European Journal of International Relations 6:4 (2000) 543-573.

13 14 WEEK XII WEEK XIII Turkey’s Security Culture(s) Postcolonial Insecurities

Required readings Required readings • Ali Karaosmanoğlu, ‘The Evolution of the National Security Culture • Latha Varadarajan, ‘Identity and Neoliberal (In)security,’ Review of and the Military in Turkey,’ Journal of International Affairs 54:1 International Studies 30:3(2004) 319-341. (2000) 199-216. • Himadeep Muppidi, ‘Postcoloniality and the Production of • Hasan Kösebalaban, ‘Turkey’s EU Membership: A Clash of Security International Insecurity: The Persistent Puzzle of U.S.-Indian Cultures,’ Middle East Policy 9:2 (2002) 130-146. Relations,’ in Cultures of Insecurity: States, Communities and the Production of Danger, Jutta Weldes, Mark Laffey, Hugh Gusterson Pınar Bilgin, ‘Türkiye-AB İlişkilerinde Güvenlik Kültürünün Rolü,’ in • and Raymond Duvall, eds. (Minneapolis: University of Minnesota Soğuk Savaş Sonrasında Avrupa ve Türkiye, Cem Karadeli, ed. Press, 1999) 119-146. (Ankara: Ayraç, 2003) 192-220. ♣ • Mustapha Kemal Pasha, ‘Security as Hegemony,’ Alternatives • Philippos K. Savvides, 'Legitimation Crisis and Securitization in (1996) 283-302.♣ Modern Turkey,' Critique 16 (2000) 55-73.

Recommended readings Required readings • Hans-Henrik Holm, ‘A Disaggregated World Order in the Making: • Gencer Özcan, ‘Doksanlı Yıllarda Türkiye’nin Ulusal Güvenlik ve Dış Policy Towards Failed States as an Example,’ International Politics Politikasında Askeri Yapının Artan Etkisi,’ in En Uzun Onyıl: 38 (2001) Türkiye’nin Ulusal Güvenlik ve Dış Politika Gündeminde Doksanlı • Jean-Germain Gros, ‘Towards a Taxonomy of Failed States in the Yıllar, Gencer Özcan and Şule Kut, eds. (İstanbul: Boyut, 1998) 67- New World Order: Decaying Somalia, Liberia, Rwanda and Haiti,’ 100. Third World Quarterly 17:3 (1996) 435-471. • Beyaz Kitap (T.C. Savunma Bakanlığı, Genel Plan ve Prensipler • Jennifer Milliken, ed. State Failure, Collapse and Reconstruction Dairesi Başkanlığı). Available at http://www.msb.gov.tr (Oxford: Blackwell, 2004). • Gencer Özcan, ‘Doksanlı Yıllarda Türkiye’nin Değişen Güvenlik • Pınar Bilgin and Adam David Morton, ‘Historicising Representations Ortamı,’ in En Uzun Onyıl: Türkiye’nin Ulusal Güvenlik ve Dış of “Failed States”: Beyond the Cold War Annexation of the Social Politika Gündeminde Doksanlı Yıllar, Gencer Özcan and Şule Kut, Sciences?’ Third World Quarterly 23:1 (2002) 55-80. eds. (İstanbul: Boyut, 1998) 13-43. • Pınar Bilgin and Adam David Morton, ‘From “Rogue” to “Failed” • Gareth Jenkins, ‘Context and Circumstance: The Turkish Military States? The Fallacy of Short-termism,’ Politics 24:3 (2004) 169-180. and Politics,’ Adelphi Papers, no.337 (2001). • Robert H. Jackson, ‘Surrogate Sovereignty? Great Power • Gencer Özcan, ‘The Military and the Making of Foreign Policy in Responsibility and “Failed States,”’ The University of British Turkey,’ in Turkey in World Politics: An Emerging Multiregional Columbia Working Paper No.25 (1998). Available online at CIAO Power, Barry Rubin and kemal Kirişçi, eds. (Istanbul: Bogazici web-site University Press, 2002) 18-41.

♣ ♣ Photocopied material Photocopied material

15 16 WEEK XIV Rethinking National Security: the Case of Turkey

Required readings • Ümit Cizre, ‘Demythologising the National Security Concept,’ Middle East Journal 57:2 (2003) 213-229. • Gareth Jenkins, ‘Context and Circumstance: The Turkish Military and Politics,’ Adelphi Papers, no.337 (2001). • Pınar Bilgin, ‘Turkey’s Changing Security Discourses: The Challenge of Globalisation,’ European Journal of Political Research 44 (2005) 175-201.

Recommended readings • Beyaz Kitap (T.C. Savunma Bakanlığı, Genel Plan ve Prensipler Dairesi Başkanlığı). Available at http://www.msb.gov.tr • Ümit Cizre, ‘The Anatomy of Turkish Military’s Political Autonomy,’ Comparative Politics 29:4 (1997) 151-165. • Ümit Cizre, Politics and Military in Turkey into the 21st Century, EUI Working Paper no.24 (Florence: European University Institute, 2000). • Ümit Cizre, ‘Problems of Governance in Civil-Military Relations in Turkey and the February 28 Process,’ European Journal of Political Research 43:1 (2004) 107-125. • Gencer Özcan, ‘Doksanlı Yıllarda Türkiye’nin Ulusal Güvenlik ve Dış Politikasında Askeri Yapının Artan Etkisi,’ in En Uzun Onyıl: Türkiye’nin Ulusal Güvenlik ve Dış Politika Gündeminde Doksanlı Yıllar, Gencer Özcan and Şule Kut, eds. (İstanbul: Boyut, 1998) 67- 100. • Gencer Özcan, ‘Doksanlı Yıllarda Türkiye’nin Değişen Güvenlik Ortamı,’ in En Uzun Onyıl: Türkiye’nin Ulusal Güvenlik ve Dış Politika Gündeminde Doksanlı Yıllar, Gencer Özcan and Şule Kut, eds. (İstanbul: Boyut, 1998) 13-43. • Gencer Özcan, ‘The Military and the Making of Foreign Policy in Turkey,’ in Turkey in World Politics: An Emerging Multiregional Power, Barry Rubin and Kemal Kirişçi, eds. (Istanbul: Boğaziçi University Press, 2002) 18-41.

17