Postgraduate Course: Security Governance (PGSP11381)
Course Outline
School | School of Social and Political Science |
College | College of Humanities and Social Science |
Credit level (Normal year taken) | SCQF Level 11 (Postgraduate) |
Availability | Not available to visiting students |
SCQF Credits | 15 |
ECTS Credits | 7.5 |
Summary | This course is about how żsecurityż works as a governmental activity. Security is no longer the żexceptionż to the żnormż of everyday government. Once the exclusive domain of a few secretive agencies and externally facing ministries, security governance now is practiced at local, national, regional and international levels of government; within public and private organisations; and through innovative governmental technologies.
In this course, students will learn about key concepts and practices in security governance. We will make little distinction between żdomesticż and żinternationalż governance. Students will explore the practical, political and ethical implications of security governance through selected academic literature and government documents. The course will feature input from a variety of security governance practitioners. |
Course description |
Each lecture will be structured around three themes:
Practical: How is this particular topic practiced in security governance?
Political: How have governments adopted these measures? What have been the take-up processes, the political debates, and the degree of consensus/contention?
Ethical: We will look an ethical case study to humanise each topic, focusing on the implications of a type of security governance for a particular individual or group.
Topics covered may include, but are not limited to: intelligence, knowledge and uncertainty; surveillance and privacy; borders and mobility; terrorism; cyber security; contingency planning and resilience; oversight and legislation.
|
Entry Requirements (not applicable to Visiting Students)
Pre-requisites |
|
Co-requisites | |
Prohibited Combinations | |
Other requirements | None |
Course Delivery Information
|
Academic year 2015/16, Not available to visiting students (SS1)
|
Quota: 25 |
Course Start |
Semester 2 |
Timetable |
Timetable |
Learning and Teaching activities (Further Info) |
Total Hours:
150
(
Seminar/Tutorial Hours 30,
Programme Level Learning and Teaching Hours 3,
Directed Learning and Independent Learning Hours
117 )
|
Assessment (Further Info) |
Written Exam
0 %,
Coursework
100 %,
Practical Exam
0 %
|
Additional Information (Assessment) |
20%: 48-hour crisis response exercise
10%: Peer reviews of 48-hour crisis response exercise
70%: 2000 word policy brief.
|
Feedback |
Not entered |
No Exam Information |
Learning Outcomes
A critical understanding of the principal theories, concepts and principles of security governance.
Application of a range of standard and specialised research instruments and techniques of enquiry.
Critical analysis, evaluation and synthesis of key issues in security governance.
Ability to communicate, using appropriate methods, to a range of audiences with different levels of knowledge/expertise.
Use of a range of ICT applications to support and enhance work and adjust features to suit purpose.
Taking responsibility for own work and responsibility for the work of others.
|
Reading List
Indicative reading list:
HM Government. (2010) A Strong Britain in an Age of Uncertainty: The National Security Strategy.
Loader I and Walker N. (2007) Civilizing security, Cambridge: Cambridge University Press. pp 7-18, 195-233.
żThe Butler Reportż. (2004) Report of a Committee of Privy Counsellors, Review of intelligence on weapons of mass destruction, HC 898 London: House of Commons.
Hagmann J and Cavelty MD. (2012) National risk registers: Security scientism and the propagation of permanent insecurity. Security Dialogue 43: 79-96.
Haggerty KD and Ericson RV. (2000) The surveillant assemblage. The British Journal of Sociology 51: 605-622.
Huysmans J. (2006) The politics of insecurity: fear, migration and asylum in the EU, London: Routledge.
de Goede M. (2012) Fighting the network: a critique of the network as a security technology. Distinktion: Scandinavian Journal of Social Theory 13: 215-232.
Favarel-Garrigues G, Godefroy T and Lascoumes P. (2011) Reluctant partners?: Banks in the fight against money laundering and terrorism financing in France. Security Dialogue 42: 179-196.
de Goede M. (2012) Speculative Security: The Politics of Pursuing Terrorist Monies: University of Minnesota Press.
Betz DJ and Stevens T. (2013) Analogical reasoning and cyber security. Security Dialogue 44: 147-164.
Anderson B and Adey P. (2012) Governing events and life: 'Emergency' in UK Civil Contingencies. Political Geography 31: 24-33.
Walker J and Cooper M. (2011) Genealogies of resilience: From systems ecology to the political economy of crisis adaptation. Security Dialogue 42: 143-160.
Neal AW. (2012) Terrorism, lawmaking and democratic politics: legislators as security actors. Terrorism and Political Violence 24: 357-374. |
Additional Information
Graduate Attributes and Skills |
Not entered |
Keywords | Security, public policy, governance |
Contacts
Course organiser | Dr Andrew Neal
Tel: (0131 6)50 4236
Email: |
Course secretary | Mr Lee Corcoran
Tel:
Email: |
|
|