Académique Documents
Professionnel Documents
Culture Documents
Introduction into
Crisis and Security
Management
1
Programme
Introduction into Crisis and Security Management
January 2017 March 2017
Security ranks high in both the public conscience and political and administrative policies. Acts of
terrorism have frightened the public, the fear for crime is high and man or nature made disasters make
their way into the headlines. In this course students will get acquainted with shifts in definitions,
concepts and meaning of crisis & security, the main theoretical and empirical insights in security and
the function of security as a governing technique. Further, attention is called for shifts in the
management or governance of crisis and security. Security nowadays is no longer the prerogative of
the state, but is also provided by private actors, citizens, civil society and international security actors.
Empirical studies into actual security issues will be presented to familiarize students with
methodological challenges in studying the governance of crisis & security. A simulation game and/or
final seminar will be organized to this end.
The course also serves as an essential footing that explores the broad field of crisis and security
governance that is studied in depth in other CSM courses. It functions as the theoretical and
conceptual foundation for two successive courses: Research Design, in which students are provided
with an understanding of the basic principles of research design in the social sciences, and security
studies in particular; and the Master Thesis, in which students will combine the previously gained
insights in the conceptual and theoretical dimensions of crisis and security governance and the
methodological insights introduced during the course Research Design in their own thesis project.
Course objectives
1. Students will be able to identify and qualify the ongoing broadening and deepening of the object of
security studies in terms of the involvement of a multitude of security actors, security threats and
referent objects of security by studying, reviewing and commenting key texts in security studies.
2. Students will be able to recognize and apply the multidisciplinary approach towards crisis and
security studies by comparing different disciplinary approaches towards current security and crisis
situations in terms of differences and similarities between, amongst others, international relations,
history, law, public administration, political science, sociology, social psychology and communication
studies and their relevance for understanding (in)security by studying, reviewing and commenting key
texts in security studies.
3. Students will be able to map and analyze the (functioning of the) multiplicity of public, private and
civic security actors engaged in security practices by using theoretical insights on the governance of
security networks on both local as well as national, regional or global levels and will be able to
2
critically analyze the changing power constellations as a result of the emergence of security networks
by discussing and analyzing concrete and current examples of security networks
4. Students are able to identify some of the main research designs common in security studies, such as
case studies, comparative research, historical research and qualitative and explorative research, and
some of the main research methodologies common in security studies, such as agenda setting, process
tracing, network mapping, social media research, discourse analysis and document analysis, and
compare them in terms of feasibility, validity and reliability.
5. Students will be able as member of a crisis team to solve a specific simulated crisis situation while
using relevant academic skills in terms of information processing, information analysis and decision
making
6. Students will be able to identify and apply the social constructivist dimensions of (in)security by
analyzing current security and crisis incidents while relating them to the academic study of security
and showing by that their awareness of the political, social, economic and media dynamics inherent in
security and crisis discourses and practices
Timetable
Mode of instruction
The sessions are dedicated to lectures and discussion, and a simulation game.
3
Assessment method
1. CSM today 5% 800 words each week Friday 10:00 before the
lecture on Monday
2. Rolling exam 4*10% 750 words each week Friday 10:00 before the
lecture on Monday
Failed partial grades weighing less than 30% should be compensated by a passed partial grade
weighing more than 30%. The calculated grade must be at least 5,50 in order to pass the course.
1) CSM Today: Write two short reviews of a recent safety or security incident or
crisis that you find relevant for the study and understanding of crisis and
security management. Analyse one incident or crisis from your home country
and one international incident or crisis. For each incident or crisis first shortly
describe what has happened (about 150 words on what happened, when and
where, why and by whom), second analyze its relevancy to the academic field
of crisis and security management (about 250 words). Your CSM Today is to be
handed in each Friday 10:00 before the lectures on Monday. Each lecture will
start with a discussion of the CSM Today contributions, so each student should
be prepared to elaborate on his/her CSM Today contributions when asked
during discussion. CSM Today will be graded the following way at random,
one will be selected and will contribute five percent of the total grade.
2) The four rolling exams equal 10% each. These take home exams pertain to the literature of the
upcoming lecture and have to be handed in every Friday 10:00 before the lectures on Monday.
Your answer should contain max. 750 words.
3) The evaluation of the Serious Game equals 5% of total grade. The topic of the evaluation will be
announced later on. Your evaluation should contain 500 words
4) The final paper equals 50% of the total grade. The topic of the final paper will be announced later
on. Your final paper should contain max. 3.000 words
Hand in CSM Today, Rolling Exam Questions, Evaluation of the Serious Game and Final Paper
both in Turnitin on Blackboard and send a copy to csm@fgga.leidenuniv.nl
4
The quality of your assignments will be evaluated on the following points:
Quality of the analysis: Is your reasoning logical, lucid, coherent, consistent and convincing?
Quality of writing: does your assignment read well, is it grammatically correct, have you
carefully checked spelling, accuracy of citations, and presented a complete bibliographical
reference section at the end of your paper, and added your name and student number on the
front page?
Blackboard
Registration
Via USIS
Lecturers
Contact information
csm@fgga.leidenuniv.nl
5
Overview of the sessions
The ISGA/CSM approach: social constructivist light approach; looking for dynamics and
changing practices; CSM in societal context; theory & practice
Studying CSM: disciplines, experts, sources (journals & important articles) & The CSM-
Thesis Project
Required reading:
Baldwin, D.A. (1997) The concept of security, Review of International Studies, 23, pp. 5-26
Zedner, L. (2003) 'Too much Security?', International Journal of the Sociology of Law, 31, 155-184
* Hand in CSM Today I and Rolling Exam Question I on Friday 3rd of February 2017, 10:00
* CSM Today
Required reading:
COT (2007) Notions of Security. Shifting Concepts and Perspectives. Deliverable 1, Work package 2
'Citizens and governance in a knowledge-based society'
Nunes, J. (2012) 'Reclaiming the political: Emancipation and critique in security studies', Security
Dialogue, 43(4) 345-361
Litfin, K.T. (1999) 'Constructing Environmental Security and Ecological Interdependence', Global
Governance, Vol. 5, pp. 359-377
McDonald, M. (2002) Human Security and the Construction of Security, Global Society, 16:3, 277-
295
6
* Hand in CSM Today II and Rolling Exam Question II on Friday 10th of February 2017, 10:00
CSM today
Required reading:
Burris, C., M. Kempa & C. Shearing (2008) Changes in Governance: A Cross-Disciplinary Review of
Current Scholarship, Akron Law Review, Vol. 41, pp. 1-66
Walters, W. (2004) 'Some critical notes on "Governance"', Studies in Political Economy, Vol. 73, pp.
27-46
Garland, D. (1996) The Limits of the Sovereign State. Strategies of Crime Control in Contemporary
Society, British Journal of Criminology, Vol. 36, No. 4, pp. 445-471
Crawford, A. (2006) Networked governance and the post-regulatory state? Steering, rowing and
anchoring the provision of policing and security, Theoretical Criminology, Vol. 10, No. 4, pp. 449-
479
* Hand in CSM Today III and Rolling Exam Question III on Friday 17th of February 2017, 10:00
CSM today
Required reading:
Beck, U. (2002) 'The Terrorist Threat: World Risk Society Revisited', Theory, Culture & Society, Vol.
19(4): 3955
Zedner, L. (2007) 'Pre-crime and post criminology?', Theoretical Criminology, Vol. 11, pp. 261-281
7
Lyon, D. (2004) Globalizing Surveillance: Comparative and Sociological Perspectives', International
Sociology, Vol 19(2): 135149
Haggerty, K.D. & R. V. Ericson (2000) 'The surveillant assemblage', British Journal of Sociology, Vol.
51, No. 4, pp. 605-622
Researching CSM: common approaches (case studies; political and policy process; policy
(theory) evaluation; network analyses; quantitative studies)
Researching CSM: problems and dilemmas (secrecy and missing data; small N-data; logic of
practicality: the gap between policy and practice)
Required reading:
Mazarr, M.J. (2007) The Iraq War and Agenda Setting, Foreign Policy Analysis, Vol. 3, No. 1, pp. 1
23
Lamb, B.J. (2012) Preventing Violent Extremism; A Policing Case Study of the West Midlands,
Policing, Vol. 6, No. 4, pp. 1-8
Koehler, D. (2014-2015) 'The Radical Online: Individual Radicalization Processes and the Role of the
Internet', Journal for Deradicalization, winter 2014-2015, No. 1, pp. 116-134
Weggemans, D., E. Bakker & Peter Grol (2014) 'Who Are They and Why Do They Go? The
Radicalisation and Preparatory Processes of Dutch Jihadist Foreign Fighters', Perspectives on
Terrorism, Vol. 8, Issue 4
Baker-Beall, C. (2014) 'The evolution of the European Unions fight against terrorism discourse:
Constructing the terrorist other', Cooperation and Conflict, Vol. 49, Issue 2, pp. 212-238
8
* Hand in evaluation of the serious game on Friday 10th of March 2017, 10:00.
Required reading:
Swami, V. & A. Furnham (2014) 'Political paranoia and conspiracy theories', in: J.W. van Prooijen &
P. A.M. van Lange (Eds) Power, Politics and Paranoia. Why People Are Suspicious of their Leaders.
Cambridge: Cambridge University Press, pp. 218-236