Prospectus

nl en

Security from Below

Course
2020-2021

Admission requirements

  • Only students of the MSc Crisis and Security Management can take this course.

  • This course only offers a place to a maximum number of 40 students.

Description

When we think of “crisis”, “security”, and “management” we tend to think of states, IOs, or NGOs. But primarily we think about states: how states define crisis, how states securitize issues, and how states manage both. That is not an analytically neutral move, nor is it self-evidently a descriptively useful move. Indeed, it could be empirically misleading and normatively dangerous. This class flips the analytical perspective. It asks: how we can think of citizens, residents, migrants, and the global poor as the primary agents of security and crisis management? It then asks: what are the theoretical and policy implications of this different perspective?

There are good reasons to take this alternative perspective. Consider remittances. Today, the global migrant community—some 200+million people—may send upwards of €1 trillion annually to their families and communities “back home”. Remittances dwarf overseas development assistance, exceed foreign direct investment, and are crucial lifelines for the wellbeing of recipients, recipient families, communities, and countries. On a variety of issue—war, peace, global justice, post-war reconstruction, health, violence, development, education, etc.—remittances are crucial. Quantitatively and qualitatively, state-led security and crisis management pales in comparison. And yet, in studies of security this titanic global network of support usually goes without comment.

The first task (week 1) of this class is to begin to address this enormous gap in our empirical understanding of the phenomenon of bottom-up security and crisis management. We will do so through a consideration of the recent empirical literature and through various case studies. This empirical foundation points us towards two kinds of theoretical puzzles. First, how and why does the empirical evidence of bottom-up security clash with (or problematize) traditional approaches to security and crisis management? Second, how can we theorize securitization from below? Global migrants are crucial agents in real-world security, but how can we positively understand that contribution and why haven’t other theoretical frameworks “captured” that data?

The final task (week 7) of this course is to start thinking about relevant policy considerations. How can bottom-up security networks be protected? How can they be augmented? Where do these questions fit into to traditional policy debates about security policy?

Between those bookends the course will focus on various themes (e.g., civil war, peace, justice, health, famine) and related case studies (e.g., Haiti, Ghana, Somalia, the Mediterranean) (weeks 2-6).

This is a mixed methods course. However, this is not a methods course and participants will not need any prior methods training. We will consider quantitative, qualitative, ethnographic, and perhaps experimental research and we will spend some time learning about the advantages and disadvantages of various methods.

Course Objectives

After finalizing this course, students are able to:

  • understand, critique, criticize, and apply relevant theory;

  • analyse and use relevant empirical data;

  • understand some of the advantages and disadvantages of different research methods;

  • use their theoretical and empirical knowledge to evaluate policy;

  • write an argumentative paper.

Timetable

On the right side of programme front page of the e-Prospectus you will find links to the website and timetables, uSis and Brightspace.

Mode of Instruction

This course consists of 7 meetings and will include lectures, seminars, and presentations.

Attendance is mandatory. Students are only allowed to miss one session if there are special, demonstrable personal circumstances. The Board of Examiners, in consultation with the study advisors, will decide on such an exceptional exemption of mandatory attendance.

Total study load 140 hours:
21 Contact hours
119 Self-study hours: reading, preparing lectures, assignments, etc.

Assessment method

  • Research Proposal (15% of final grade).
    Course can be compensated in case of a fail (grade < 5.50), resit not possible.

  • Final research paper (85% of final grade).
    Grade cannot be compensated, a 5.50 is required to pass the course

  • Participation (pass/fail). Participants can expect to be tasked with leading a discussion on a particular topic (e.g. of a case, an article, a method, a theory, etc.).

Students are not obliged to hand in an assignment at the first opportunity to make use of the re-sit opportunity. The re-sit assignment will test the same course objectives, but will be different in terms of topics, cases or substance.

The calculated grade of the assignments must be at least 5.50 in order to pass the course.
If a student passed an assignment, it is not possible to participate in a re-sit in order to obtain a higher grade. Students are only permitted to re-sit the assignment if they have a calculated overall course lower than 5.50.

Reading list

Articles, book excerpts, and case studies will be made available.

Registration

Register for every course and workgroup via uSis.
Registration in uSis is possible from four weeks before the start of the course. Some courses and workgroups have a limited number of participants, so register on time (before the course starts). In uSis you can access your personal schedule and view your results.

Leiden University uses Brightspace as its online learning management system. Important information about the course is posted here.
After enrolment for the course in uSis you are also enrolled in the Brightspace environment of this course.
The corresponding Brightspace course will become available one week prior to the first seminar.

Contact

J.M. Hoye
E-Mail: csm@fgga.leidenuniv.nl

Remarks