Vous êtes sur la page 1sur 9

Institute of Security and Global Affairs

Leiden University Faculty of Governance and Global Affairs

Introduction into
Crisis and Security
Management

Course code: S2-6454564B-CSM-1617FGGA


Program: CSM
Level: 500
Credit: 5 ECTS

Period: 30th January 2017 - 13th March 2017


Lectures: Monday, 10:00-13:00
Location: Wijnhaven, Turfmarkt 99
Venue: 346

Course Instructors: Dr. Jelle van Buuren


Prof. Dr. Edwin Bakker
Contact: csm@fgga.leidenuniv.nl

1
Programme
Introduction into Crisis and Security Management
January 2017 March 2017

Security ranks high in both the public conscience and political and administrative policies. Acts of
terrorism have frightened the public, the fear for crime is high and man or nature made disasters make
their way into the headlines. In this course students will get acquainted with shifts in definitions,
concepts and meaning of crisis & security, the main theoretical and empirical insights in security and
the function of security as a governing technique. Further, attention is called for shifts in the
management or governance of crisis and security. Security nowadays is no longer the prerogative of
the state, but is also provided by private actors, citizens, civil society and international security actors.
Empirical studies into actual security issues will be presented to familiarize students with
methodological challenges in studying the governance of crisis & security. A simulation game and/or
final seminar will be organized to this end.

The course also serves as an essential footing that explores the broad field of crisis and security
governance that is studied in depth in other CSM courses. It functions as the theoretical and
conceptual foundation for two successive courses: Research Design, in which students are provided
with an understanding of the basic principles of research design in the social sciences, and security
studies in particular; and the Master Thesis, in which students will combine the previously gained
insights in the conceptual and theoretical dimensions of crisis and security governance and the
methodological insights introduced during the course Research Design in their own thesis project.

Course objectives

The main goals of the course are:

1. Students will be able to identify and qualify the ongoing broadening and deepening of the object of
security studies in terms of the involvement of a multitude of security actors, security threats and
referent objects of security by studying, reviewing and commenting key texts in security studies.

2. Students will be able to recognize and apply the multidisciplinary approach towards crisis and
security studies by comparing different disciplinary approaches towards current security and crisis
situations in terms of differences and similarities between, amongst others, international relations,
history, law, public administration, political science, sociology, social psychology and communication
studies and their relevance for understanding (in)security by studying, reviewing and commenting key
texts in security studies.

3. Students will be able to map and analyze the (functioning of the) multiplicity of public, private and
civic security actors engaged in security practices by using theoretical insights on the governance of
security networks on both local as well as national, regional or global levels and will be able to

2
critically analyze the changing power constellations as a result of the emergence of security networks
by discussing and analyzing concrete and current examples of security networks

4. Students are able to identify some of the main research designs common in security studies, such as
case studies, comparative research, historical research and qualitative and explorative research, and
some of the main research methodologies common in security studies, such as agenda setting, process
tracing, network mapping, social media research, discourse analysis and document analysis, and
compare them in terms of feasibility, validity and reliability.

5. Students will be able as member of a crisis team to solve a specific simulated crisis situation while
using relevant academic skills in terms of information processing, information analysis and decision
making

6. Students will be able to identify and apply the social constructivist dimensions of (in)security by
analyzing current security and crisis incidents while relating them to the academic study of security
and showing by that their awareness of the political, social, economic and media dynamics inherent in
security and crisis discourses and practices

Timetable

Monday 30-01-2017 10:00-13:00 Wijnhaven 346


Monday 06-02-2017 10:00-13:00 Wijnhaven 346
Monday 13-02-2017 10:00-13:00 Wijnhaven 346
Monday 20-02-2017 10:00-13:00 Wijnhaven 346
Monday 27-02-2017 10:00-13:00 Wijnhaven 346
Monday 06-03-2017 09:00-21:00 SBS Living Lab
Monday 13-03-2017 10:00-13:00 Wijnhaven 346

Deadline final paper: 20th March 2017, 23:59

Re-take: 15th May 2017, 23:59

Mode of instruction

The sessions are dedicated to lectures and discussion, and a simulation game.

3
Assessment method

Students will be evaluated as follows:

Assignment Percentage of total grade Word count Deadline

1. CSM today 5% 800 words each week Friday 10:00 before the
lecture on Monday

2. Rolling exam 4*10% 750 words each week Friday 10:00 before the
lecture on Monday

3. Evaluation Serious 5% 500 words Friday 10th March 2017,


Game 10:00

4. Final Paper 50% 3.000 words 20th March 2017, 23:59

Failed partial grades weighing less than 30% should be compensated by a passed partial grade
weighing more than 30%. The calculated grade must be at least 5,50 in order to pass the course.

Three times CSM today:

1) CSM Today: Write two short reviews of a recent safety or security incident or
crisis that you find relevant for the study and understanding of crisis and
security management. Analyse one incident or crisis from your home country
and one international incident or crisis. For each incident or crisis first shortly
describe what has happened (about 150 words on what happened, when and
where, why and by whom), second analyze its relevancy to the academic field
of crisis and security management (about 250 words). Your CSM Today is to be
handed in each Friday 10:00 before the lectures on Monday. Each lecture will
start with a discussion of the CSM Today contributions, so each student should
be prepared to elaborate on his/her CSM Today contributions when asked
during discussion. CSM Today will be graded the following way at random,
one will be selected and will contribute five percent of the total grade.

2) The four rolling exams equal 10% each. These take home exams pertain to the literature of the
upcoming lecture and have to be handed in every Friday 10:00 before the lectures on Monday.
Your answer should contain max. 750 words.

3) The evaluation of the Serious Game equals 5% of total grade. The topic of the evaluation will be
announced later on. Your evaluation should contain 500 words

4) The final paper equals 50% of the total grade. The topic of the final paper will be announced later
on. Your final paper should contain max. 3.000 words

Hand in CSM Today, Rolling Exam Questions, Evaluation of the Serious Game and Final Paper
both in Turnitin on Blackboard and send a copy to csm@fgga.leidenuniv.nl

4
The quality of your assignments will be evaluated on the following points:

Quality/relevance of the sources used & quality/relevance of the examples used.

Quality of the analysis: Is your reasoning logical, lucid, coherent, consistent and convincing?

Quality of writing: does your assignment read well, is it grammatically correct, have you
carefully checked spelling, accuracy of citations, and presented a complete bibliographical
reference section at the end of your paper, and added your name and student number on the
front page?

Blackboard

Instructors use Blackboard.

Registration

Via USIS

Lecturers

Jelle van Buuren and Edwin Bakker

Contact information

csm@fgga.leidenuniv.nl

5
Overview of the sessions

Lecture 1: What is CSM?

What is CSM: Introduction

The ISGA/CSM approach: social constructivist light approach; looking for dynamics and
changing practices; CSM in societal context; theory & practice

Studying CSM: disciplines, experts, sources (journals & important articles) & The CSM-
Thesis Project

Syllabus: outline of the course and assignments

Required reading:

Baldwin, D.A. (1997) The concept of security, Review of International Studies, 23, pp. 5-26

Zedner, L. (2003) 'Too much Security?', International Journal of the Sociology of Law, 31, 155-184

* Hand in CSM Today I and Rolling Exam Question I on Friday 3rd of February 2017, 10:00

Lecture 2: Security: Concepts and theories

* CSM Today

* Concepts and theories

* Different scholarly approaches

* The construction of Security

Required reading:

COT (2007) Notions of Security. Shifting Concepts and Perspectives. Deliverable 1, Work package 2
'Citizens and governance in a knowledge-based society'

Nunes, J. (2012) 'Reclaiming the political: Emancipation and critique in security studies', Security
Dialogue, 43(4) 345-361

Litfin, K.T. (1999) 'Constructing Environmental Security and Ecological Interdependence', Global
Governance, Vol. 5, pp. 359-377

McDonald, M. (2002) Human Security and the Construction of Security, Global Society, 16:3, 277-
295

6
* Hand in CSM Today II and Rolling Exam Question II on Friday 10th of February 2017, 10:00

Lecture 3: governance of CSM

CSM today

The concept of governance: general societal and political changes

The governance of Security

Required reading:

Burris, C., M. Kempa & C. Shearing (2008) Changes in Governance: A Cross-Disciplinary Review of
Current Scholarship, Akron Law Review, Vol. 41, pp. 1-66

Walters, W. (2004) 'Some critical notes on "Governance"', Studies in Political Economy, Vol. 73, pp.
27-46

Garland, D. (1996) The Limits of the Sovereign State. Strategies of Crime Control in Contemporary
Society, British Journal of Criminology, Vol. 36, No. 4, pp. 445-471

Crawford, A. (2006) Networked governance and the post-regulatory state? Steering, rowing and
anchoring the provision of policing and security, Theoretical Criminology, Vol. 10, No. 4, pp. 449-
479

* Hand in CSM Today III and Rolling Exam Question III on Friday 17th of February 2017, 10:00

Lecture 4: Risk, Preventism and Surveillance

CSM today

From post-crime to pre-crime

Surveillance, dataveillance and sousveillance

Required reading:

Beck, U. (2002) 'The Terrorist Threat: World Risk Society Revisited', Theory, Culture & Society, Vol.
19(4): 3955

Zedner, L. (2007) 'Pre-crime and post criminology?', Theoretical Criminology, Vol. 11, pp. 261-281

7
Lyon, D. (2004) Globalizing Surveillance: Comparative and Sociological Perspectives', International
Sociology, Vol 19(2): 135149

Haggerty, K.D. & R. V. Ericson (2000) 'The surveillant assemblage', British Journal of Sociology, Vol.
51, No. 4, pp. 605-622

* Hand in Rolling Exam Question IV on Friday 24th of February 2017, 10:00

Lecture 5: Researching CSM

Researching CSM: Thesis trajectory and thesis preparation

Researching CSM: common approaches (case studies; political and policy process; policy
(theory) evaluation; network analyses; quantitative studies)

Researching CSM: problems and dilemmas (secrecy and missing data; small N-data; logic of
practicality: the gap between policy and practice)

Guest speaker: example of CSM-research

Required reading:

Mazarr, M.J. (2007) The Iraq War and Agenda Setting, Foreign Policy Analysis, Vol. 3, No. 1, pp. 1
23

Lamb, B.J. (2012) Preventing Violent Extremism; A Policing Case Study of the West Midlands,
Policing, Vol. 6, No. 4, pp. 1-8

Koehler, D. (2014-2015) 'The Radical Online: Individual Radicalization Processes and the Role of the
Internet', Journal for Deradicalization, winter 2014-2015, No. 1, pp. 116-134

Weggemans, D., E. Bakker & Peter Grol (2014) 'Who Are They and Why Do They Go? The
Radicalisation and Preparatory Processes of Dutch Jihadist Foreign Fighters', Perspectives on
Terrorism, Vol. 8, Issue 4

Baker-Beall, C. (2014) 'The evolution of the European Unions fight against terrorism discourse:
Constructing the terrorist other', Cooperation and Conflict, Vol. 49, Issue 2, pp. 212-238

Lecture 6 Serious Game

Serious Game in Living Lab

8
* Hand in evaluation of the serious game on Friday 10th of March 2017, 10:00.

Lecture 7: Conspiracy, Propaganda and Fake News

Evaluating the Serious Game

Conspiracy, Propaganda and Fake News

Required reading:

Harsin, J. (2015) 'Regimes of Posttruth, Postpolitics, and Attention Economies', Communication,


Culture & Critique, Vol. 8, Issue 2, Pages 327-333

Winter, C. (2015) Documenting the Virtual Caliphate, London: Quilliam

Swami, V. & A. Furnham (2014) 'Political paranoia and conspiracy theories', in: J.W. van Prooijen &
P. A.M. van Lange (Eds) Power, Politics and Paranoia. Why People Are Suspicious of their Leaders.
Cambridge: Cambridge University Press, pp. 218-236

Deadline final paper: Monday 20th of March 2017, 23:59

Vous aimerez peut-être aussi