Admission requirements
- Only students of the MSc Crisis and Security Management can take this course.
Description
One of the core concepts of the MA Crisis & Security Management is ‘governance’. In this course, we will focus on the interaction between the local level of security governance and technological developments. As a result of broad societal changes, historical events, and a growing complexity of security issues, authorities throughout the world increasingly govern security in partnerships and networks with other public and private actors (e.g., private security, technology developers, schools, housing corporations, shop owners, citizens, etc.).
At the same time, influential technological developments pose both opportunities and challenges to security governance. Smart urban infrastructures, big data, predictive algorithms, social media and surveillance technologies provide lots of opportunities for dealing with complex security problems that cannot be tackled independently by traditional security actors. However, this multi-actor, multi-level mode of governance comes with its own set of challenges.
In this course we will combine insights from public administration, security studies, surveillance studies, as well as philosophy of technology. We will discuss the history of security networks, what they look like, how they function, how to conceptualise their challenges and how to think about the role of digital technologies in security networks.
Course objectives
After finalizing this course, students are able to:
- Critically apply theoretical knowledge on ‘real life’ security networks.
- Make interdisciplinary analyses of security networks and technologies and the factors that influence their functioning
- Understand the challenges of organizing and running a security network.
Timetable
On the right-hand side of the programme front page of the E-guide you will find links to the website and timetables, uSis and Brightspace.
Mode of instruction
This course consists of seven lectures, including guest lectures, workgroups and general debates.
Throughout the course we will play a serious game in which you will take the roles of various security actors. You will work towards the end goal of a policy report that should specify how to collectively organize, run and maintain a security network that deals with a particular security problem. The rules of the game will be presented in the first lecture.
Attendance is mandatory. Students are only allowed to miss one session if there are special, demonstrable personal circumstances. The Board of Examiners, in consultation with the study advisors, will decide on such an exceptional exemption of mandatory attendance.
Total study load 140 hours:
21 Contact hours
119 Self-study hours: reading, preparing lectures, assignments, etc.
Assessment method
Students are not obliged to hand in an assignment at the first opportunity in order to make use of the re-sit opportunity. The re-sit assignment will test the same course objectives, but will be different in terms of topics, cases or substance.
Group paper, 25% of final grade
Course can be compensated in case of a fail (grade < 5.50), resit not possible.
Reflection paper, 25% of final grade
Course can be compensated in case of a fail (grade < 5.50), resit not possible.
Final paper, 50% of final grade
Grade cannot be compensated, a 5.50 is required to pass the course
Please note: the reflection paper mentioned above is a different assignment compared to the reflection notes that form part of the final CSM portfolio.
The calculated grade of the assignments must be at least 5.50 in order to pass the course.
If a student passed an assignment, it is not possible to participate in a re-sit in order to obtain a higher grade. Students are only permitted to resit the 50% assignment if they have a calculated overall course lower than 5.50.
Reading list
A selection of books and articles, to be announced on Brightspace.
Registration
Register for every course and workgroup via uSis.
Registration in uSis is possible from four weeks before the start of the course. Some courses and workgroups have a limited number of participants, so register on time (before the course starts). In uSis you can access your personal schedule and view your results.
Leiden University uses Brightspace as its online learning management system. Important information about the course is posted here.
After enrolment for the course in uSis you are also enrolled in the Brightspace environment of this course.
Contact
Dr. Vlad Niculescu-Dincă v.niculescu-dinca@fgga.leidenuniv.nl